2727ARCH=amd64
2828PLATFORM=
2929SECURE_UPGRADE_MODE=" no_sign"
30- SECURE_UPGRADE_DEV_SIGNING_CERT =
30+ SECURE_UPGRADE_SIGNING_CERT =
3131if [ $# -ge 1 ]; then
3232 ARCH=$1
3333fi
@@ -38,7 +38,7 @@ if [ $# -ge 3 ]; then
3838 SECURE_UPGRADE_MODE=$3
3939fi
4040if [ $# -ge 4 ]; then
41- SECURE_UPGRADE_DEV_SIGNING_CERT =$4
41+ SECURE_UPGRADE_SIGNING_CERT =$4
4242fi
4343
4444case " $ARCH " in
@@ -163,12 +163,12 @@ ret_process_inc_ex=$(process_inclusion_exclusion_files > /dev/null; echo $?)
163163
164164# Secure Boot support
165165if [ $ret_process_inc_ex -eq 0 ]; then
166- echo " Secure Boot params: SECURE_UPGRADE_MODE=${SECURE_UPGRADE_MODE} , SECURE_UPGRADE_DEV_SIGNING_CERT =${SECURE_UPGRADE_DEV_SIGNING_CERT } "
166+ echo " Secure Boot params: SECURE_UPGRADE_MODE=${SECURE_UPGRADE_MODE} , SECURE_UPGRADE_SIGNING_CERT =${SECURE_UPGRADE_SIGNING_CERT } "
167167 if [ ${SECURE_UPGRADE_MODE} == " dev" -o ${SECURE_UPGRADE_MODE} == " prod" ]; then
168168 echo " set kconfig-secure-boot-exclusions & kconfig-secure-boot-inclusions"
169169
170- if [ ! -f " ${SECURE_UPGRADE_DEV_SIGNING_CERT } " ]; then
171- echo " ERROR: SECURE_UPGRADE_DEV_SIGNING_CERT =${SECURE_UPGRADE_DEV_SIGNING_CERT } file does not exist"
170+ if [ ! -f " ${SECURE_UPGRADE_SIGNING_CERT } " ]; then
171+ echo " ERROR: SECURE_UPGRADE_SIGNING_CERT =${SECURE_UPGRADE_SIGNING_CERT } file does not exist"
172172 exit 1
173173 fi
174174
@@ -177,7 +177,7 @@ if [ $ret_process_inc_ex -eq 0 ]; then
177177 force_inclusion_file=" ../patch/kconfig-force-secure-boot-inclusions"
178178
179179 # save the new pub key in kernel
180- sed -i " s|^CONFIG_SYSTEM_TRUSTED_KEYS=.*|CONFIG_SYSTEM_TRUSTED_KEYS=\" $SECURE_UPGRADE_DEV_SIGNING_CERT \" |g" ${inclusion_file}
180+ sed -i " s|^CONFIG_SYSTEM_TRUSTED_KEYS=.*|CONFIG_SYSTEM_TRUSTED_KEYS=\" $SECURE_UPGRADE_SIGNING_CERT \" |g" ${inclusion_file}
181181
182182 ret_process_inc_ex=$( process_inclusion_exclusion_files > /dev/null; echo $? )
183183 echo " Secure Boot kernel configuration done."
0 commit comments