mirror of
https://github.com/acidanthera/audk.git
synced 2025-07-27 07:34:06 +02:00
OvmfPkg/EnrollDefaultKeys: import the non-default key into db
For QA test and development, we may need to test Secure Boot with a devel key instead of UEFI CA. This commit adds an argument, "--no-default", to EnrollDefaultKeys.efi. With the argument, the key from SMBIOS Type 11 will also be enrolled into db. Besides, the keys in AuthData.c, i.e. Microsoft KEK CA, Microsoft PCA, and Microsoft UEFI CA will be excluded, so the developer can easily create a varstore template for a specific key. Cc: Laszlo Ersek <lersek@redhat.com> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: Jordan Justen <jordan.l.justen@intel.com> Signed-off-by: Gary Lin <glin@suse.com> Message-Id: <20190516030834.12203-1-glin@suse.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com>
This commit is contained in:
parent
bf502ae449
commit
89d7c543cf
@ -538,6 +538,13 @@ ShellAppMain (
|
|||||||
SETTINGS Settings;
|
SETTINGS Settings;
|
||||||
UINT8 *PkKek1;
|
UINT8 *PkKek1;
|
||||||
UINTN SizeOfPkKek1;
|
UINTN SizeOfPkKek1;
|
||||||
|
BOOLEAN NoDefault;
|
||||||
|
|
||||||
|
if (Argc == 2 && StrCmp (Argv[1], L"--no-default") == 0) {
|
||||||
|
NoDefault = TRUE;
|
||||||
|
} else {
|
||||||
|
NoDefault = FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
// Prepare for failure.
|
// Prepare for failure.
|
||||||
@ -594,6 +601,14 @@ ShellAppMain (
|
|||||||
//
|
//
|
||||||
// Enroll db.
|
// Enroll db.
|
||||||
//
|
//
|
||||||
|
if (NoDefault) {
|
||||||
|
Status = EnrollListOfCerts (
|
||||||
|
EFI_IMAGE_SECURITY_DATABASE,
|
||||||
|
&gEfiImageSecurityDatabaseGuid,
|
||||||
|
&gEfiCertX509Guid,
|
||||||
|
PkKek1, SizeOfPkKek1, &gEfiCallerIdGuid,
|
||||||
|
NULL);
|
||||||
|
} else {
|
||||||
Status = EnrollListOfCerts (
|
Status = EnrollListOfCerts (
|
||||||
EFI_IMAGE_SECURITY_DATABASE,
|
EFI_IMAGE_SECURITY_DATABASE,
|
||||||
&gEfiImageSecurityDatabaseGuid,
|
&gEfiImageSecurityDatabaseGuid,
|
||||||
@ -601,6 +616,7 @@ ShellAppMain (
|
|||||||
mMicrosoftPca, mSizeOfMicrosoftPca, &gMicrosoftVendorGuid,
|
mMicrosoftPca, mSizeOfMicrosoftPca, &gMicrosoftVendorGuid,
|
||||||
mMicrosoftUefiCa, mSizeOfMicrosoftUefiCa, &gMicrosoftVendorGuid,
|
mMicrosoftUefiCa, mSizeOfMicrosoftUefiCa, &gMicrosoftVendorGuid,
|
||||||
NULL);
|
NULL);
|
||||||
|
}
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto FreePkKek1;
|
goto FreePkKek1;
|
||||||
}
|
}
|
||||||
@ -621,6 +637,14 @@ ShellAppMain (
|
|||||||
//
|
//
|
||||||
// Enroll KEK.
|
// Enroll KEK.
|
||||||
//
|
//
|
||||||
|
if (NoDefault) {
|
||||||
|
Status = EnrollListOfCerts (
|
||||||
|
EFI_KEY_EXCHANGE_KEY_NAME,
|
||||||
|
&gEfiGlobalVariableGuid,
|
||||||
|
&gEfiCertX509Guid,
|
||||||
|
PkKek1, SizeOfPkKek1, &gEfiCallerIdGuid,
|
||||||
|
NULL);
|
||||||
|
} else {
|
||||||
Status = EnrollListOfCerts (
|
Status = EnrollListOfCerts (
|
||||||
EFI_KEY_EXCHANGE_KEY_NAME,
|
EFI_KEY_EXCHANGE_KEY_NAME,
|
||||||
&gEfiGlobalVariableGuid,
|
&gEfiGlobalVariableGuid,
|
||||||
@ -628,6 +652,7 @@ ShellAppMain (
|
|||||||
PkKek1, SizeOfPkKek1, &gEfiCallerIdGuid,
|
PkKek1, SizeOfPkKek1, &gEfiCallerIdGuid,
|
||||||
mMicrosoftKek, mSizeOfMicrosoftKek, &gMicrosoftVendorGuid,
|
mMicrosoftKek, mSizeOfMicrosoftKek, &gMicrosoftVendorGuid,
|
||||||
NULL);
|
NULL);
|
||||||
|
}
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
goto FreePkKek1;
|
goto FreePkKek1;
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user