|  | # No default! Either this or MODSIGN_PRIVKEY/MODSIGN_X509 have to be | 
|  | # set explicitly in a local.conf before activating kernel-modsign. | 
|  | # To use the insecure (because public) example keys, use | 
|  | # MODSIGN_KEY_DIR = "${INTEGRITY_BASE}/data/debug-keys" | 
|  | MODSIGN_KEY_DIR ?= "MODSIGN_KEY_DIR_NOT_SET" | 
|  |  | 
|  | # Private key for modules signing. The default is okay when | 
|  | # using the example key directory. | 
|  | MODSIGN_PRIVKEY ?= "${MODSIGN_KEY_DIR}/privkey_modsign.pem" | 
|  |  | 
|  | # Public part of certificates used for modules signing. | 
|  | # The default is okay when using the example key directory. | 
|  | MODSIGN_X509 ?= "${MODSIGN_KEY_DIR}/x509_modsign.crt" | 
|  |  | 
|  | # If this class is enabled, disable stripping signatures from modules | 
|  | INHIBIT_PACKAGE_STRIP = "1" | 
|  |  | 
|  | kernel_do_configure_prepend() { | 
|  | if [ -f "${MODSIGN_PRIVKEY}" -a -f "${MODSIGN_X509}" ]; then | 
|  | cat "${MODSIGN_PRIVKEY}" "${MODSIGN_X509}" \ | 
|  | > "${B}/modsign_key.pem" | 
|  | else | 
|  | bberror "Either modsign key or certificate are invalid" | 
|  | fi | 
|  | } | 
|  |  | 
|  | do_shared_workdir_append() { | 
|  | cp modsign_key.pem $kerneldir/ | 
|  | } |