From 41ef4cf147aa0d5a4feaaa29f527bef614ee8b9a Mon Sep 17 00:00:00 2001 From: cfig Date: Fri, 15 Apr 2016 00:22:11 +0800 Subject: [PATCH] add mkbootfs task, add Android default keys, --- build.gradle | 70 ++++++++++++++++++++++++++++++++++--- security/Android.mk | 12 +++++++ security/README | 34 ++++++++++++++++++ security/media.pk8 | Bin 0 -> 1216 bytes security/media.x509.pem | 27 ++++++++++++++ security/platform.pk8 | Bin 0 -> 1216 bytes security/platform.x509.pem | 27 ++++++++++++++ security/shared.pk8 | Bin 0 -> 1218 bytes security/shared.x509.pem | 27 ++++++++++++++ security/testkey.pk8 | Bin 0 -> 1217 bytes security/testkey.x509.pem | 27 ++++++++++++++ security/verity.pk8 | Bin 0 -> 1219 bytes security/verity.x509.pem | 24 +++++++++++++ security/verity_key | Bin 0 -> 524 bytes 14 files changed, 244 insertions(+), 4 deletions(-) create mode 100644 security/Android.mk create mode 100644 security/README create mode 100644 security/media.pk8 create mode 100644 security/media.x509.pem create mode 100644 security/platform.pk8 create mode 100644 security/platform.x509.pem create mode 100644 security/shared.pk8 create mode 100644 security/shared.x509.pem create mode 100644 security/testkey.pk8 create mode 100644 security/testkey.x509.pem create mode 100644 security/verity.pk8 create mode 100644 security/verity.x509.pem create mode 100644 security/verity_key diff --git a/build.gradle b/build.gradle index 953407f..7e76865 100644 --- a/build.gradle +++ b/build.gradle @@ -16,7 +16,7 @@ model { abootimg(NativeExecutableSpec) { binaries.all { cppCompiler.define 'HAS_BLKID' - linker.args '-lblkid' + linker.args "-lblkid" } } } @@ -38,11 +38,12 @@ task unpack_bootimg(type: Exec, dependsOn: 'abootimgExecutable') { } task unpack_ramdisk_gz << { - unGunzipFile(workdir+"/ramdisk.img.gz", workdir + "/ramdisk.img") + unGnuzipFile(workdir+"/ramdisk.img.gz", workdir + "/ramdisk.img") } unpack_ramdisk_gz.dependsOn(unpack_bootimg) -task unpack_cpio(type: Exec, dependsOn: unpack_ramdisk_gz) { +//task unpack_cpio(type: Exec, dependsOn: unpack_ramdisk_gz) { +task unpack_cpio(type: Exec) { workingDir workdir + "/root" executable 'cpio' args = ['-i', '-F', '../ramdisk.img'] @@ -52,7 +53,30 @@ task unpack(type: Delete, dependsOn: unpack_cpio) { delete workdir + "/ramdisk.img.gz" } -public void unGunzipFile(String compressedFile, String decompressedFile) throws IOException { +task pack_ramdisk_and_gz { Task task -> + doLast { + ByteArrayOutputStream mkbootfs_out = new ByteArrayOutputStream() + task.project.exec { + commandLine = [ + 'build/exe/mkbootfs/mkbootfs', workdir + "/root" + ] + standardOutput = mkbootfs_out + } + def ByteArrayInputStream gzip_in = new ByteArrayInputStream(mkbootfs_out.buf) + gnuZipFile(workdir + "/ramdisk.img.gz", gzip_in) + } +} + +task featuresWaiting(type: Exec) { + commandLine 'build/exe/mkbootimg/mkbootimg', \ + '--kernel', workdir + "/kernel", \ + '--ramdisk', workdir + "/ramdisk.img.gz", \ + '--cmdline', "cmdlineeeee", \ + '--base', '0x01000000', \ + '--output', 'out' +} + +public void unGnuzipFile(String compressedFile, String decompressedFile) throws IOException { byte[] buffer = new byte[1024]; try { FileInputStream fileIn = new FileInputStream(compressedFile); @@ -69,3 +93,41 @@ public void unGunzipFile(String compressedFile, String decompressedFile) throws throw ex; } } + +public void gnuZipFile(String compressedFile, InputStream fis) throws IOException { + byte[] buffer = new byte[1024]; + try { + FileOutputStream fos = new FileOutputStream(compressedFile); + GZIPOutputStream gos = new GZIPOutputStream(fos); + + int bytes_read; + while ((bytes_read = fis.read(buffer)) > 0) { + gos .write(buffer, 0, bytes_read); + } + gos.finish(); + gos.close(); + System.out.println("The file compressed successfully!"); + } catch (IOException ex) { + throw ex; + } +} + +public void gnuZipFile(String compressedFile, String decompressedFile) throws IOException { + byte[] buffer = new byte[1024]; + try { + FileOutputStream fos = new FileOutputStream(compressedFile); + GZIPOutputStream gos = new GZIPOutputStream(fos); + + FileInputStream fis = new FileInputStream(decompressedFile); + int bytes_read; + while ((bytes_read = fis.read(buffer)) > 0) { + gos .write(buffer, 0, bytes_read); + } + fis.close(); + gos.finish(); + gos.close(); + System.out.println("The file compressed successfully!"); + } catch (IOException ex) { + throw ex; + } +} diff --git a/security/Android.mk b/security/Android.mk new file mode 100644 index 0000000..5a40397 --- /dev/null +++ b/security/Android.mk @@ -0,0 +1,12 @@ +LOCAL_PATH:= $(call my-dir) + +####################################### +# verity_key +include $(CLEAR_VARS) + +LOCAL_MODULE := verity_key +LOCAL_SRC_FILES := $(LOCAL_MODULE) +LOCAL_MODULE_CLASS := ETC +LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) + +include $(BUILD_PREBUILT) diff --git a/security/README b/security/README new file mode 100644 index 0000000..24f984c --- /dev/null +++ b/security/README @@ -0,0 +1,34 @@ +The following commands were used to generate the test key pairs: + + development/tools/make_key testkey '/C=US/ST=California/L=Mountain View/O=Android/OU=Android/CN=Android/emailAddress=android@android.com' + development/tools/make_key platform '/C=US/ST=California/L=Mountain View/O=Android/OU=Android/CN=Android/emailAddress=android@android.com' + development/tools/make_key shared '/C=US/ST=California/L=Mountain View/O=Android/OU=Android/CN=Android/emailAddress=android@android.com' + development/tools/make_key media '/C=US/ST=California/L=Mountain View/O=Android/OU=Android/CN=Android/emailAddress=android@android.com' + +The following standard test keys are currently included: + +testkey -- a generic key for packages that do not otherwise specify a key. +platform -- a test key for packages that are part of the core platform. +shared -- a test key for things that are shared in the home/contacts process. +media -- a test key for packages that are part of the media/download system. + +These test keys are used strictly in development, and should never be assumed +to convey any sort of validity. When $BUILD_SECURE=true, the code should not +honor these keys in any context. + + +signing using the openssl commandline (for boot/system images) +-------------------------------------------------------------- + +1. convert pk8 format key to pem format + % openssl pkcs8 -inform DER -nocrypt -in testkey.pk8 -out testkey.pem + +2. create a signature using the pem format key + % openssl dgst -binary -sha1 -sign testkey.pem FILE > FILE.sig + +extracting public keys for embedding +------------------------------------ +it's a Java tool +but it generates C code +take a look at commands/recovery/Android.mk +you'll see it running $(HOST_OUT_JAVA_LIBRARIES)/dumpkey.jar diff --git a/security/media.pk8 b/security/media.pk8 new file mode 100644 index 0000000000000000000000000000000000000000..a6db9ba176d83a1c22f3b7faa57be4aa33033a2d GIT binary patch literal 1216 zcmV;x1V8&Qf&{z*0RS)!1_>&LNQUrrZ9p8q5=T`0)hbn0InqrS{Cn@ z{3vOxWg9XV%r?3XhL%BS)rth4K+c7RaU-MuwD#Fa!#wiZIt9W$tg2Vo1Bja!S-kb0 zd~YF%3gS?Ox9wJ{Vr&VC@0`sxHY}j%(Yath)YvkIXOe8p2@Ghrb*_K&2{g<$p7MoS zCTHIaW`EGf&s~nXWmpDta|63#M<(jJ?fY`@e%GgJv&)(|97}!8fSVKzi5~zVJLCcN zjcNv_9<9Tv!tusda)q#(;FCh8Z=@mW`8wZqbD${0G1mqGt2+10gaba#e0M53TZXXP z>DPC|q>8D49^CFHfmokJ+2j#9d0+*0sgw}9fe8{>+S!b3X#aRij{*S$0)hbmbQrSc zx%ChIa7J?O5+P+W&nC24xq$GFTmux<-vh4p7s9G|q>$U!efK;ju7Q6Y#^pM#1-!aD z(@trqN)}sOmf%?>NaS&r^05Y=z1}1w9l)D5dzF9VI?P%{3`mFu2u07M$*Q6TBQnnv zp{_g`nv}Bc|KNo*=?T%8>$5U#0zl=0uP4ahx4+4GFwL~2l*KmV*S@jliyP93JEMC zQZBSn3JJwT1Z`Zz?qGL)zJY1NEZ*pvpv|c|dD<&SYSFQ|_guV9f!*Y*0)c@5*^eZ; zw`_h-g>EXcl6bQrQiq~K8UP*4T1`fN?txRb?QEiU+FR!ssRdZjj-;b ztqaXjG>j5TGv*eDk3@VnXy6XE`~G_e~-!i zsgujA{piBr{tDfS4jVRV7j!}_5ZoKd6A|t1!Nn_psJ&-PwDGvSS3K3eQ_EO^0)c@5 zkqQ`mdPr0@M$2iR2jP>P-+2%VP1Z5gSOzEJu=fAjfMKKyX^rA_0kZk1ZR)LR{>2?1PRhUtFIqw#+T>YH}E900MN zUUl?rb6qowcwJ$J%|s6c3N5H4Me4m@0)c@5h@2O>6)O&T=OB65_v^DQaMJh_SKP3L zC4)5g!uB78ha||0?`CL$`3xu5H64}BOo{`|!>Mz}{A;O1;QIFAxOSHLNMp=o9|R({ zRSJfw8@JsZQ}BW7R0lp>31@kn52Dt{3q5DsVhi*1fi4{YaDGJHBTLYIkA36RH{9i` z0)c=#9@d+li&80?7Bvxa<%Qi$4YyY(*=my@$s9VYkz9gG)Y~hQI02kNfn3%r8z`r; zR$<1KH0T?{#}WAZE1ew>;_JWrQ|tlgeEn9*PSykGDr#|WnB+YoJ~d2vsGC!E+xErt eA0Eg=03gvAt$U-(c((LgJvS>Z*m!NYSoH9vs7Pr5 literal 0 HcmV?d00001 diff --git a/security/media.x509.pem b/security/media.x509.pem new file mode 100644 index 0000000..98cd443 --- /dev/null +++ b/security/media.x509.pem @@ -0,0 +1,27 @@ +-----BEGIN CERTIFICATE----- +MIIEqDCCA5CgAwIBAgIJAPK5jmEjVyxOMA0GCSqGSIb3DQEBBAUAMIGUMQswCQYD +VQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4g +VmlldzEQMA4GA1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UE +AxMHQW5kcm9pZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTAe +Fw0wODA0MTUyMzQwNTdaFw0zNTA5MDEyMzQwNTdaMIGUMQswCQYDVQQGEwJVUzET +MBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4G +A1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9p +ZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTCCASAwDQYJKoZI +hvcNAQEBBQADggENADCCAQgCggEBAK4lDFoW75f8KGmsZRsyF8w2ug6GlkFo1YoE +n0DOhYZxI6P/tPbZScM88to6BcI+rKpX2AOImxdZvPWefG8hiQriUIW37VaqYmwJ +ie+czTY2LKDo0blgP9TYModnkmzMCQxot3Wuf/MJNMw2nvKFWiZn3wxmf9DHz12O +umVYBnNzA7tiRybquu37cvB+16dqs8uaOBxLfc2AmxQNiR8AITvkAfWNagamHq3D +qcLxxlZyhbCa4JNCpm+kIer5Ot91c6AowzHXBgGrOvfMhAM+znx3KjpbhrDb6dd3 +w6SKqYAe3O4ngVifRNnkETl5YAV2qZQQuoEJElna2YxsaP94S48CAQOjgfwwgfkw +HQYDVR0OBBYEFMopPKqLwO0+VC7vQgWiv/K1fk11MIHJBgNVHSMEgcEwgb6AFMop +PKqLwO0+VC7vQgWiv/K1fk11oYGapIGXMIGUMQswCQYDVQQGEwJVUzETMBEGA1UE +CBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4GA1UEChMH +QW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9pZDEiMCAG +CSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbYIJAPK5jmEjVyxOMAwGA1Ud +EwQFMAMBAf8wDQYJKoZIhvcNAQEEBQADggEBAITelRbV5KhyF6c9qEhwSPUzc6X3 +M/OQ1hvfPMnlJRYlv8qnwxWcriddFyqa4eh21UWBJ6xUL2gpDdUQwAKdj1Hg7hVr +e3tazbOUJBuOx4t05cQsXK+uFWyvW9GZojonUk2gct6743hGSlM2MLDk0P+34I7L +cB+ttjecdEZ/bgDG7YiFlTgHkgOHVgB4csjjAHr0I6V6LKs6KChptkxLe9X8GH0K +fiQVll1ark4Hpt91G0p16Xk8kYphK4HNC2KK7gFo3ETkexDTWTJghJ1q321yfcJE +RMIh0/nsw2jK0HmZ8rgQW8HyDTjUEGbMFBHCV6lupDSfV0ZWVQfk6AIKGoE= +-----END CERTIFICATE----- diff --git a/security/platform.pk8 b/security/platform.pk8 new file mode 100644 index 0000000000000000000000000000000000000000..e27a3933e82ee93d4faa03ed06467bfecf81bf80 GIT binary patch literal 1216 zcmV;x1V8&Qf&{z*0RS)!1_>&LNQUrrZ9p8q5=T`0)hbn0GxOQlB^9~ zI2_)pW$ehN0B$x&3~h1;u^n%{9o*76`CfXB^Ed)p=?JBom8CbLTu zbt9ybXd+1j+yO~Gdh~&0EeWy&v4>s~ zteC;7cRgqTx$6DpZCJk8=-L+fqhJY~H>fnG-|e@yv`Pe?2cl{G&n#4y^3OKbP5BBt zjgK^=x~oj}GjXdYahp4(hg7W$Q~VU++eOtLBTu{OJe#EL`OZ`(6Hx3^RtLXnqW?;u zeYN-MAPoto!L*(sKre~y5s-;Gt6GtO@lxn7g``(g&tJiiamDV)CjtQj0)hbmXix*U z9bP^qXq0i8NQJ}zNqL1`o=gQGzzfthuF=Qrc<8GU>Pv)=OciWZ+KAp#k{NA%2LMPJ z%-px5Z5Uyi!G;4pRxs33vEOE{g`-ar0#ZOAX$ts^ELH2B9voUC&by28`W!GG26nB> zuapdP5P=*|ennN$M^o-d<xX;JnQoNPm9p-SYQM4# zVRJ*i(v&d>pk0OlG^Hsj``%F~3Mc5Xd{g{k?{<&Lsrldj*QmHzuGYJo0)c@5$R~Hg z?l7?sF8|84X|na>^?Wnles)*kBpG)f)o@X}2lylQRTMobi5g+k@HxLB&scnds{7ys zn-cu~ixUUTjs#taYUvfKp>|Yq?Ja?{ z4Z$WokggqDfdQ)Zr~>(grr#5{7x_v0m`d4U=oIQv`fjl84I{_${{@4kBtN)^T;61o zp)3>=qK8b?nJsX!m=;8{G?$bjYk5yw1g<`4r_nL@x!HY-FbcVJ8qu0Gg-Rs*0)c@5 zg>R)Sp35M$bgG9Vo6Mu_PEyT2{`rsVZDvnuj!NMtTBU7H<6_fs1`(ExO3^A7iaPzQ zas5C85)7!RvJ9`?w0EZH(l{V#*YsZD4FLu6*`kL0++;~x>qsB#t(p+DAhe1;F@hKT zQxv~?`qtv_AwA~ZPB}4?R!o+8(U%5;0)c@5g=)`bdL*JlPgwg+@;ye{M@9~D!1;}# z^K+}sUVy|Y3m(2b0ISDNZ~^ZNNz5ve?xN&)^Bc%A zHCABO#0G6v)>>x`wWPcwb=sAH2Vo4G@gcF51Nd^%fH#Qt9l13)a12|{9ee~BLjha` e)`?Ej7eZFsUzB0T-7pi1g}8>P$D#^4VDU$4aXRP# literal 0 HcmV?d00001 diff --git a/security/platform.x509.pem b/security/platform.x509.pem new file mode 100644 index 0000000..087f02e --- /dev/null +++ b/security/platform.x509.pem @@ -0,0 +1,27 @@ +-----BEGIN CERTIFICATE----- +MIIEqDCCA5CgAwIBAgIJALOZgIbQVs/6MA0GCSqGSIb3DQEBBAUAMIGUMQswCQYD +VQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4g +VmlldzEQMA4GA1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UE +AxMHQW5kcm9pZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTAe +Fw0wODA0MTUyMjQwNTBaFw0zNTA5MDEyMjQwNTBaMIGUMQswCQYDVQQGEwJVUzET +MBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4G +A1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9p +ZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTCCASAwDQYJKoZI +hvcNAQEBBQADggENADCCAQgCggEBAJx4BZKsDV04HN6qZezIpgBuNkgMbXIHsSAR +vlCGOqvitV0Amt9xRtbyICKAx81Ne9smJDuKgGwms0sTdSOkkmgiSQTcAUk+fArP +GgXIdPabA3tgMJ2QdNJCgOFrrSqHNDYZUer3KkgtCbIEsYdeEqyYwap3PWgAuer9 +5W1Yvtjo2hb5o2AJnDeoNKbf7be2tEoEngeiafzPLFSW8s821k35CjuNjzSjuqtM +9TNxqydxmzulh1StDFP8FOHbRdUeI0+76TybpO35zlQmE1DsU1YHv2mi/0qgfbX3 +6iANCabBtJ4hQC+J7RGQiTqrWpGA8VLoL4WkV1PPX8GQccXuyCcCAQOjgfwwgfkw +HQYDVR0OBBYEFE/koLPdnLop9x1yh8Tnw48ghsKZMIHJBgNVHSMEgcEwgb6AFE/k +oLPdnLop9x1yh8Tnw48ghsKZoYGapIGXMIGUMQswCQYDVQQGEwJVUzETMBEGA1UE +CBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4GA1UEChMH +QW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9pZDEiMCAG +CSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbYIJALOZgIbQVs/6MAwGA1Ud +EwQFMAMBAf8wDQYJKoZIhvcNAQEEBQADggEBAFclUbjZOh9z3g9tRp+G2tZwFAAp +PIigzXzXeLc9r8wZf6t25iEuVsHHYc/EL9cz3lLFCuCIFM78CjtaGkNGBU2Cnx2C +tCsgSL+ItdFJKe+F9g7dEtctVWV+IuPoXQTIMdYT0Zk4u4mCJH+jISVroS0dao+S +6h2xw3Mxe6DAN/DRr/ZFrvIkl5+6bnoUvAJccbmBOM7z3fwFlhfPJIRc97QNY4L3 +J17XOElatuWTG5QhdlxJG3L7aOCA29tYwgKdNHyLMozkPvaosVUz7fvpib1qSN1L +IC7alMarjdW4OZID2q4u1EYjLk/pvZYTlMYwDlE448/Shebk5INTjLixs1c= +-----END CERTIFICATE----- diff --git a/security/shared.pk8 b/security/shared.pk8 new file mode 100644 index 0000000000000000000000000000000000000000..cf99acd5215ea81649c189155a19ea276435ec4e GIT binary patch literal 1218 zcmV;z1U>sOf&{(-0RS)!1_>&LNQUrs4#*Aqyhl|0)hbn0La4I{Rv7f z^jtsjqb|}I1?+PCSkM=j8_@Q(EG8{*ft?u{XW>}i)1t@mv*73qC`cj#5$lHV z{eu$IdqNBmH&D!!VT$N-^oV3*y~JXCstg2!$Yhh_QB`pl1316j#La5m(ZHhfUtID| z)8qs?K3L+gUS>?q;Va8$b6?iq5=p~p<|RVB3P&mBIT!WAkNQ&4dvnRhH<;bAj?{r! z2z69`X1~SS%1kAu>y{4LX(Mo*qXN2QY_yiMCFpEii!ORIce1SU;Mutruktx9+5}Kifr!RY%bNt8y4Pi2?xw0)hbn0EO2* zQ(K0~O_J41!XGxeuAQO%kczrwy*2sH9d5|=tG*DsnwC31;%tRW%|M#7LxbfLa4;6E z3-Vd@{#Rk*QY;7ydNtj+K?g;l_*(6k)7U|%aa~wf+U>XO;NzgW0wvWw*og7zHh^rR zKa)%}jY6$_DUg>SKJMM#mK`!g_GaO#v)gW;VJYk1@%!Xra{}V1=BznKl{o?<2jowP zD$1`0qh*6D^5@*8bSq<cx1f=tDORR98^Kdd# z8$i*RNCkB!9uXle@cSp>^cCV5rvib20Nu?T^R{ais7Ss3vs`@QY+S&gE#reFX9JvO zwQ0$;R7Qj~vF;PbRYa()pXDca0d*fGQNj{NiovwL%n@*#t&OX_H+&a?A4zQ_$B$tJ zDNf{{^QO9jV|g8R%x1ma>xtNGoLzRbJRRdQJMUlPm(F0ulnn_!0@rcA7f+uXPXd8~ z0GfI%3o&->a=vVyNA=`N6?yA!unnewcxN0PPUXGJQIq+*mP!3i!)i9ps2N4spb3O4 zNoduqTYPLmz2RRd=G$MlMb!_R1JyoAt;0<9i0S}u)Q&b-hLAgpo{5}NoxVTo@saA6 zO!ao+5-T=kg;@B+6box}_58&_O=Ij3ZvugV0F&MmO(aKTa4>$U%;-}=os%mSbL|2c z?^nH<&PIlKI4=UucAmG{jxEK=YM8|O0QkRdHi2P;T!AAg-C*^-9$s>OB>iOozlKP| zFSP4e#x$5}qHiYwm!=b>h(vyq@>}Jdy_2MPC==|=C-mx2sGbG-}8)NUVK**T?*VgBTBgp==Gp8x;= literal 0 HcmV?d00001 diff --git a/security/shared.x509.pem b/security/shared.x509.pem new file mode 100644 index 0000000..7f886a8 --- /dev/null +++ b/security/shared.x509.pem @@ -0,0 +1,27 @@ +-----BEGIN CERTIFICATE----- +MIIEqDCCA5CgAwIBAgIJAPKnM5a9OHZ6MA0GCSqGSIb3DQEBBAUAMIGUMQswCQYD +VQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4g +VmlldzEQMA4GA1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UE +AxMHQW5kcm9pZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTAe +Fw0wODA3MjMyMTU3NTlaFw0zNTEyMDkyMTU3NTlaMIGUMQswCQYDVQQGEwJVUzET +MBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4G +A1UEChMHQW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9p +ZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTCCASAwDQYJKoZI +hvcNAQEBBQADggENADCCAQgCggEBAMjC2/0JSi30XD/xoy7SGAXscvxY0BeXG9D2 +tSwmLXCBnRkZZ+FY39Oix/Gz4OgM5UXXnShIIgIR64bw/YMS03tCDBE3UMyUYYro +cvSIZGO9xGJ8qgwEg8hkk+NRVXEXAzi/3MTNat3RwKLzX1zyTtPkBDo+WOKwXmZM +zeEry2dzX9bfEknDaeYlQrwKRynlORf1w4/6UtF7c8nHN5jdsY7UgVkIdVR+Zr/F +2spMJabrlg7ZaSNwnaMCumRstJazJehsXIsuejN3srvkx88zJUKRFj9okVKsCIVQ +yDxQj0v1rfCu1aLcoFg/mrCtF2UNt+6ksj/bRYhVR9D+q3IYOIkCAQOjgfwwgfkw +HQYDVR0OBBYEFMtMfizbs/CtqY2reZaNFy6dux7RMIHJBgNVHSMEgcEwgb6AFMtM +fizbs/CtqY2reZaNFy6dux7RoYGapIGXMIGUMQswCQYDVQQGEwJVUzETMBEGA1UE +CBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEQMA4GA1UEChMH +QW5kcm9pZDEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9pZDEiMCAG +CSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbYIJAPKnM5a9OHZ6MAwGA1Ud +EwQFMAMBAf8wDQYJKoZIhvcNAQEEBQADggEBAECo0JaZeVnpF6NsRCRra6wrrgVD +fs2JeUEY94NHIDUtHG+KObCGmUL02mWYH6opUdM5cRKewZIdeVZxxSfW4knyUoKf +r1tZExAxHi3gllANVorUEUplbcNKjG9hBFOvwep5ktukqns/hUOm41wHKN53/pfu +rIN3H9DskPjkRJQ07gtgRXg+cMei5GAkkmDgA892CNw1Kkye9wbe9LJgUOl4ri// +16MyN4cBSRXrPMh0/MeprpMId8XIx9HC4qjuhjyJGA0YVc7bpADnukPMyqckPTl+ +fA6Ojk19T5K2u+rUnAzwGAae3coufi+0Zo2J2715UNDNJUGA+h6q/CpVb4Q= +-----END CERTIFICATE----- diff --git a/security/testkey.pk8 b/security/testkey.pk8 new file mode 100644 index 0000000000000000000000000000000000000000..586c1bd5cf96f9358f36b37ea98fef93f4d0a8e3 GIT binary patch literal 1217 zcmV;y1U~yPf&{$+0RS)!1_>&LNQUrr!ay9qXGc{0)hbn0M?Tk1m4CA zB(d$sV&K`>B|bjQZ0jB3{|1bx=)9=SYtwjcrwXTR<_^0LnKfDe**XXo? z!`w>qP$CUb2nRCYfR`8UY6UY{=BAYFEVJ^2prmHVdX(5ZF$p?nH!d$^62NY4Lh)D_ z-~I!E%nZ~-+HBp!xFlE^NCC4YWD`%n-k8ZKcSzgyXKGXpfmF!5$_KgPM^!Ts#A}-O zZ{F<8j%nw}qR@_bCLokQnR0zR1pacF9hu*ot~j8w7k{H2TWbF49|8db0)hbn0FMm2 zSd@eZZOil8LF+r^ZYh5=o$?dxssvrd@O{PJN8(UP#IeNlLarW*N_QWU=dJbtwUa9MNB6mRRfiD@u-F4570O|hs88oP`H<{-WtCyW#0(F+HjcFBTNtPVs zqOAxo7-A$eO)H3r6sgRe?MH7gF5FJ$Tk3bck@E0NKQy`twmC#7`?TOyTgJ~$><(c= zegFe}?aLXyS&y+x7cyW?K{hgS`ZOu%e`OsJB7tT%e$vUP84FySkKHZd#R8E)%>sde z0Gxnk4`^q&#Rvr|X}T^DSmg_(X~iRQqj#>*`b>&xVy7{s?@%B>l*r?UT zWofQjN z+qr0%Y;#)55J7EtGjdx74aSIRNZLvuA3cfg=kcW}3-?Ohe|UTbd3%Dz{Ubm)=h@$h z^0YwLsa02~o`+_B=3mQ)WXwP_fX>WJrp<9hszYeD7Xa?hso~qjW(SiJU+Bp}E&;YH zGXjBtV=ArL8r`H~*_EbpVp|2xsYW66=~;8`kD4v(aiPJi8`ByM)}o1ZhZ|~p>uyzH zw4p3uqoir?dUseWHOKf>xwmY}&%k#`MgFNpFR|mPj0O9er&4Gc#l%UD4Z+(RrHVV$ f`+&LNQUrsW5^Br2+u}0)hbn0O;#@O)pJU zk$QWxJKN`JXXMf3GhwFmf~sQc5HpLXW)JJ2phAh6v*Nf;L&5#EipG7q6%@NiP&1C5 zD~cQ|6A`V+<{KQH7JjIH&CU#y7dlJ!fThd)S6dMGLvI}2yUh2>PnPSuoiq2=?Pl6T zaL&?6?)ogsYESo1ja=sH7nu(=P}@Mw5wjV{O;vLyTI9w$NIFyP2-!D#E6lG@#i0RX z&!nR5RDWv#zEjRN4M*Lg&C;CDa3e;-HwifHrX@fGXP418BSkBj2eQ2ou6i9`juh0o zBU4X}(EAjGp~z`!sh3nbKon($r*4=YPm_BShO<@1mVAVlm$ zD9=yWK|e}|G5TSFSQRFzdH*xY zgIPN*BNBwfol-TXX5#p5)M)dPl7jmJQ2Gv(*Ym!j$FB{5swvIpd-Slm)`GxcHM>N< z=qwC5ks5erFMHPzIEXs4156qVPhcaHx|jz4_eld#x|4N6g;ISU`V^mclfpv-O5-}s zCDaLL1Up}63MrecTJ4u}ku{vxgXcqjtWUEC09s5Q2)zY>lWfc=XuX&M^1V3`QYB$9*s{u3$!abr0$fUJ z-12GL=T3KRPhSrASRWxC4Q0urGV;N^XA z(~i%%tC+CGVzR;ACxiZOzztALDPz}*l?T220d|ALu*L%VKTw`qR9YCy6s^XC;N|^x zul{=N zxMq-2@ZMecjS-do1NIF#cZ?k}jaJ5br_xSWG zb~V#f9(rZtO=Is~*?;GDu(P&EhR3l3vD*_CUl`&1rfw4z)+vb2OAfb9b>HpD2)1|X zHff6lW9d0QbM@FopS{X-j{?^ndXUUrpQG5+qVDrwoszQpxbtr<-zTL5q~cNgVs+&@ z2C)KxfdHOmL!fWm!wfP<2Mlq=g8;nS3Mq#2s_*R^>nR|;8&bwy?9T|Fo6wYa_|xdV zOUsZ*;cW!aem(yO0-@)ToG{KSNO$)g^D87t%DobVP%fxxWmfP hk4vOBJnVsAiAcI)+4Ln>*X%OBo25xJ{%5YX31a)eQE>nO literal 0 HcmV?d00001 diff --git a/security/verity.x509.pem b/security/verity.x509.pem new file mode 100644 index 0000000..86399c3 --- /dev/null +++ b/security/verity.x509.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIID/TCCAuWgAwIBAgIJAJcPmDkJqolJMA0GCSqGSIb3DQEBBQUAMIGUMQswCQYD +VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNTW91bnRhaW4g +VmlldzEQMA4GA1UECgwHQW5kcm9pZDEQMA4GA1UECwwHQW5kcm9pZDEQMA4GA1UE +AwwHQW5kcm9pZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTAe +Fw0xNDExMDYxOTA3NDBaFw00MjAzMjQxOTA3NDBaMIGUMQswCQYDVQQGEwJVUzET +MBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNTW91bnRhaW4gVmlldzEQMA4G +A1UECgwHQW5kcm9pZDEQMA4GA1UECwwHQW5kcm9pZDEQMA4GA1UEAwwHQW5kcm9p +ZDEiMCAGCSqGSIb3DQEJARYTYW5kcm9pZEBhbmRyb2lkLmNvbTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAOjreE0vTVSRenuzO9vnaWfk0eQzYab0gqpi +6xAzi6dmD+ugoEKJmbPiuE5Dwf21isZ9uhUUu0dQM46dK4ocKxMRrcnmGxydFn6o +fs3ODJMXOkv2gKXL/FdbEPdDbxzdu8z3yk+W67udM/fW7WbaQ3DO0knu+izKak/3 +T41c5uoXmQ81UNtAzRGzGchNVXMmWuTGOkg6U+0I2Td7K8yvUMWhAWPPpKLtVH9r +AL5TzjYNR92izdKcz3AjRsI3CTjtpiVABGeX0TcjRSuZB7K9EK56HV+OFNS6I1NP +jdD7FIShyGlqqZdUOkAUZYanbpgeT5N7QL6uuqcGpoTOkalu6kkCAwEAAaNQME4w +HQYDVR0OBBYEFH5DM/m7oArf4O3peeKO0ZIEkrQPMB8GA1UdIwQYMBaAFH5DM/m7 +oArf4O3peeKO0ZIEkrQPMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AHO3NSvDE5jFvMehGGtS8BnFYdFKRIglDMc4niWSzhzOVYRH4WajxdtBWc5fx0ix +NF/+hVKVhP6AIOQa+++sk+HIi7RvioPPbhjcsVlZe7cUEGrLSSveGouQyc+j0+m6 +JF84kszIl5GGNMTnx0XRPO+g8t6h5LWfnVydgZfpGRRg+WHewk1U2HlvTjIceb0N +dcoJ8WKJAFWdcuE7VIm4w+vF/DYX/A2Oyzr2+QRhmYSv1cusgAeC1tvH4ap+J1Lg +UnOu5Kh/FqPLLSwNVQp4Bu7b9QFfqK8Moj84bj88NqRGZgDyqzuTrFxn6FW7dmyA +yttuAJAEAymk1mipd9+zp38= +-----END CERTIFICATE----- diff --git a/security/verity_key b/security/verity_key new file mode 100644 index 0000000000000000000000000000000000000000..31982d95ad57005430b65bb28dbfd39adb231347 GIT binary patch literal 524 zcmV+n0`vVq00007*!mSo>Tao#&V;50r@F4bKzox<9++;YhGi5$I#idbYH7%!gcSSG zjZae}y3`boUmbd`5WTVonJYyjH_?}81VAOG?KlZH!bT%-&z#cDqTNRgHqKMN0Be6# z?V_a5V*#PXP_N7@dpFq#?Nd5PI>zK$CUaFy$QiQ{%|P2wH4m8=>gHUHPxnu1$}IZs zNz%@6L)vET*7q}=yX%%u%J-5hU2_YhlG{L7_)_Deb!lMK$yeyDyHog5qH$*mC+ zD;$a|osKh5N4pdix_!oqwf(_EPPpQ;nTbN6pz9B2r;9TX>td>c^rm4mRQO5Icr(+stoA0|`|}7FmS+A=VX_>8 zY{CI-h?eiWdWapYX_c4Z!3_b~H#5fBwAQHXK>snOd)%677I<*-H^|dT5Y^3neCwAV z5g%<5@KOth19r#9E`RiKU>MT}%f}#VQ~0Nv^RDDd7csx@I@O`AG3{dh1+U@!cT>&$ z`t<&6{lIv