That would be very difficult to do, and also very expensive considering how many hard bricks it would probably make. I mean I suppose if someone with the know how analyzed several bootloaders for all the devices that have signed boot loaders that are omap based we might be able to get a better idea of what the signature is that is added to the file to replicate, but no one seems to have done that, probably because its immensely difficult I would imagine. I kinda compare it to making a keygen for a program that spits out a random code and asks for the code that goes with it. Though I'm assuming way more difficult.
Sent from my Amazon Kindle Fire HD running CM10.1 Tablet UI using xda-developers app