diff mbox series

[isar-cip-core,v2,1/2] doc/REAME.secureboot.md: Add steps to inject UEFI keys from KeyTool.efi

Message ID 20240705071129.1374609-2-Shivanand.Kunijadar@toshiba-tsip.com (mailing list archive)
State Accepted
Headers show
Series Update README files | expand

Commit Message

Shivanand Kunijadar July 5, 2024, 7:11 a.m. UTC
From: Shivanand <Shivanand.Kunijadar@toshiba-tsip.com>

Signed-off-by: Shivanand <Shivanand.Kunijadar@toshiba-tsip.com>
---
 doc/README.secureboot.md | 23 ++++++++++++++++++++++-
 1 file changed, 22 insertions(+), 1 deletion(-)

Comments

Jan Kiszka July 5, 2024, 11:12 a.m. UTC | #1
On 05.07.24 09:11, Shivanand Kunijadar wrote:
> From: Shivanand <Shivanand.Kunijadar@toshiba-tsip.com>
> 
> Signed-off-by: Shivanand <Shivanand.Kunijadar@toshiba-tsip.com>
> ---
>  doc/README.secureboot.md | 23 ++++++++++++++++++++++-
>  1 file changed, 22 insertions(+), 1 deletion(-)
> 
> diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md
> index 3ae4154..337ece0 100644
> --- a/doc/README.secureboot.md
> +++ b/doc/README.secureboot.md
> @@ -322,7 +322,28 @@ The following keys need to be enrolled onto the device:
>  
>  The enrollment can typically be achieved with the help of
>  [efi-updatevar](https://manpages.debian.org/bookworm/efitools/efi-updatevar.1.en.html)
> -on the device. Otherwise, consult the manual of the specific UEFI Firmware.
> +on the device.
> +
> +If the device supports built in EFI shell then the enrollment of keys can also be done by KeyTool.efi tool like below:
> +
> +Format the USB memory stick
> +
> +```
> +host$ sudo mkfs.vfat <usb device>
> +host$ sudo mount -t vfat /dev/<usb device> /mnt/
> +```
> +
> +Copy the KeyTool.efi binary and self signed Secure Boot keys to USB stick
> +
> +Here the folder "keys" contains Secure Boot keys(DB, KEK and PK).
> +```
> +host$ sudo apt install efitools
> +host$ sudo mkdir -p /mnt/efi/boot
> +host$ sudo cp /usr/lib/efitools/x86_64-linux-gnu/KeyTool.efi /mnt/efi/boot/KeyTool.efi
> +host$ sudo cp -r keys /mnt/
> +host$ sudo umount /mnt
> +```
> +Launch KeyTool.efi binary from the built in EFI shell and follow step-4 from the section [Add Keys to OVMF](#add-keys-to-ovmf) to inject Secure Boot keys. Otherwise, consult the manual of the specific UEFI Firmware.
>  
>  Use the recipes [secure-boot-key](###secure-boot-key) to provided the keys
>  to the signing script contained in

Thanks, applied.

Jan
diff mbox series

Patch

diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md
index 3ae4154..337ece0 100644
--- a/doc/README.secureboot.md
+++ b/doc/README.secureboot.md
@@ -322,7 +322,28 @@  The following keys need to be enrolled onto the device:
 
 The enrollment can typically be achieved with the help of
 [efi-updatevar](https://manpages.debian.org/bookworm/efitools/efi-updatevar.1.en.html)
-on the device. Otherwise, consult the manual of the specific UEFI Firmware.
+on the device.
+
+If the device supports built in EFI shell then the enrollment of keys can also be done by KeyTool.efi tool like below:
+
+Format the USB memory stick
+
+```
+host$ sudo mkfs.vfat <usb device>
+host$ sudo mount -t vfat /dev/<usb device> /mnt/
+```
+
+Copy the KeyTool.efi binary and self signed Secure Boot keys to USB stick
+
+Here the folder "keys" contains Secure Boot keys(DB, KEK and PK).
+```
+host$ sudo apt install efitools
+host$ sudo mkdir -p /mnt/efi/boot
+host$ sudo cp /usr/lib/efitools/x86_64-linux-gnu/KeyTool.efi /mnt/efi/boot/KeyTool.efi
+host$ sudo cp -r keys /mnt/
+host$ sudo umount /mnt
+```
+Launch KeyTool.efi binary from the built in EFI shell and follow step-4 from the section [Add Keys to OVMF](#add-keys-to-ovmf) to inject Secure Boot keys. Otherwise, consult the manual of the specific UEFI Firmware.
 
 Use the recipes [secure-boot-key](###secure-boot-key) to provided the keys
 to the signing script contained in