public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
* Set "db" variable in secure boot setup mode still requires generating PKCS#7?
@ 2018-05-01 21:13 David F.
  2018-05-01 21:25 ` Bill Paul
  2018-05-02 10:21 ` Laszlo Ersek
  0 siblings, 2 replies; 8+ messages in thread
From: David F. @ 2018-05-01 21:13 UTC (permalink / raw)
  To: edk2 developers list

Hi,

Had a fairly simple task of wanting to install the latest MS .crt
files for KEK, and their two files for the "db" (the Windows CA and
UEFI CA) in a system placed in setup/custom mode.  However, even
though it seemed to take the KEK, it never took the "db", always had a
problem on a DH77KC mobo (dumped data headers looked as expected).
Now when I constructed it, I thought I could leave out any PKCS#7 data
(set the expected CertType but in the Hdr dwLength only included
CertType and not any CertData), but looking at the algo in UEFI Spec
2.6 page 245, it looks like we'd always have to generate the hash,
sign it, create all the PKCS stuff even in setup mode?    That would
surely unnecessarily bloat any apps that really only need to update
things in setup mode wouldn't it?   So to confirm, that is a
requirement even in setup mode?    If so, why?

TIA!!


^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2018-05-21  1:46 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-05-01 21:13 Set "db" variable in secure boot setup mode still requires generating PKCS#7? David F.
2018-05-01 21:25 ` Bill Paul
2018-05-02  2:23   ` David F.
2018-05-02 10:21 ` Laszlo Ersek
2018-05-02 16:26   ` David F.
2018-05-03  3:09     ` Long, Qin
2018-05-20 19:54       ` David F.
2018-05-21  1:46         ` Zhang, Chao B

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox