From patchwork Sun Nov 20 20:47:09 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Schultschik, Sven" X-Patchwork-Id: 13050150 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AE1A6C4332F for ; Sun, 20 Nov 2022 20:50:12 +0000 (UTC) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (EUR04-DB3-obe.outbound.protection.outlook.com [40.107.6.56]) by mx.groups.io with SMTP id smtpd.web11.22508.1668977405544013151 for ; Sun, 20 Nov 2022 12:50:06 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@siemens.com header.s=selector2 header.b=Mr0jhzzo; spf=pass (domain: siemens.com, ip: 40.107.6.56, mailfrom: sven.schultschik@siemens.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QUwRrppoR86EpmoIkfHc7c+L8F6lMiesTCygwh8IhPUdG6NmYyyHFfM+J1ETRgjVYCAy9eL0m8RMAk1zmCd71181L2TjluHurfATklN0s2UUdEd2eVWYuR83gyrIFEq0eDTe4OQ9G7aLgtPZX/4idH+Dr5kpQUX4SHV3HMdiSEveR27/ku8HbZZP7onBKdETvH44FquxA/5SuRa4yyVWucDpQiamoxWPHmGDiOPIgMQJdYk1cYhAwqPiEOGUnxXHnIJQgklyfardzVMdddHxFkDTwCw8wVm+TqZcv0RxA3NDaP6O5jlbBoEutZsIbpJl4+TKy1CZURsItyNhvTzlhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8xfYvrWZU2lyTJqQHL5tBCPzVpAR97SSRKbNu88XBoo=; b=OuXBgM+/vykMZnsJqiUth6pSSF08YtIHmp1cSad0AG5y7xHlm/Pv0tRAySD+XT30n80B/vZxpKf7Xho8aVjS1RRPoaoi+P6VWFQYjG7BC1rlAK5JagNX+RJxe9p1UFp5VqFqV+QTfOHzlDL+BcyURJ/bpxcwHVHdeDd5H95+VaZnfv7FZS4PgL9cdpIlcu7mfHHqs8XNVwGf3FaY4Sz5j0kkfCS3IWLAl6fQjqmyfqqGcg4HKROegxetF3v41FCyZxU1xEMW8LWhzNUBTWtQjSSPpQZG9Rl0lH+EuCuXZ5pQWwBFO2utnliw9tLpgBSSfLrnhJhcbj/aRO58lz1KRw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8xfYvrWZU2lyTJqQHL5tBCPzVpAR97SSRKbNu88XBoo=; b=Mr0jhzzou+XIVBbWN5FnSt8UjE7BenxqJmehsgJbRqqWtW6ln2h4P15jyz7AqQYAHfKGbm9/cmtaVRILOncUBlPplYklNVQN8203V/wfMaXdjejUs3TRBgIXijq995BpQRIP9VAiSv2GPBjPZJ4N0VeIwADH2oz2mYqLrQj6AEbb2gZcxXKJaP4OLJauLQU832vY5tt7bjkyvsZurR4EFBoQK0SirxQ4mt+W/qcSfKgMAwZy7wpdjZLydWSe8R0HcnZE3/yDXeqlMhCDaKliS53PnPVtQ76fkVQcFFQU8oCrI2swaeGrzhD0wldUYOJB7d/KmW1FE5MuFmAINoHkYg== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com; Received: from PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:210::11) by DU0PR10MB7094.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:42e::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5834.11; Sun, 20 Nov 2022 20:50:02 +0000 Received: from PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM ([fe80::955a:f715:5319:7933]) by PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM ([fe80::955a:f715:5319:7933%9]) with mapi id 15.20.5834.015; Sun, 20 Nov 2022 20:50:02 +0000 From: sven.schultschik@siemens.com To: cip-dev@lists.cip-project.org CC: jan.kiszka@siemens.com, Sven Schultschik Subject: [isar-cip-core][PATCH 6/8] change ebg sb signer and secrets to pk kek db Date: Sun, 20 Nov 2022 21:47:09 +0100 Message-ID: <20221120204711.5826-7-sven.schultschik@siemens.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20221120204711.5826-1-sven.schultschik@siemens.com> References: <20221120204711.5826-1-sven.schultschik@siemens.com> X-ClientProxiedBy: FR0P281CA0069.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:49::22) To PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:210::11) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PAXPR10MB5037:EE_|DU0PR10MB7094:EE_ X-MS-Office365-Filtering-Correlation-Id: e11863f4-a05c-47d2-3300-08dacb38cbef X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230022)(4636009)(136003)(366004)(396003)(346002)(39860400002)(376002)(451199015)(2906002)(26005)(83380400001)(9686003)(86362001)(4326008)(6512007)(8676002)(66556008)(66476007)(82960400001)(66946007)(38100700002)(36756003)(41300700001)(30864003)(6916009)(8936002)(19627235002)(5660300002)(316002)(107886003)(55236004)(478600001)(186003)(1076003)(6486002)(2616005)(6506007)(378184002)(14743001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: bIdH6buvz4b+0XO1uBOT4xdO8TgIv2CbthGS9BixcT3C2yfsC28iMkYfiAfaKD/fiwlpEm7SqMej4MQvNrv3CC+k5cmz9I+qtbvC/+UI+ZD2JfvrioY7DW7S2ngRV30u0+WAQXbqZZv8p2DA2POwzuzxnxtAdmihdXxN0borM8SZPWnN18cN6WPI5k1re8e7psw1cH5YFALXIcQvznlN+tAdtVNpkbW5bBkMKttdgq6ffH0wOsZlfUHzvfUZPiDd8xOAwmoMOWhZKH6GhS64UxVHCVGLU7+KYH0MQN4Q7CxCIRhw+fTyh7yfgBUUg327ULMUcFdNfmo2fiKisUgzQRPqGrsEg0a901V7CKPkg4m14ESnYTARzfVDz/DdEE4BDveUahs4+sn+HPEyu0U6HZTOLZjL3vFGqxEmuanJ7ijaboLPd9Bzaw9U8IjVp2a+eZ7f8M+1mNFEW29vu6BAVvK7vi/VR+eOLh1pSETGGa9OABuJUyZiiOIFuBxqZEjRv7Q3U7bZD9rg+Mzy6WIDw+g4+43BzRuwEO+eX6acojjeS5TQMpTYrlGbHivpBuAjAwG/JMDtbIAXG9Afkf/3G/dOn5EKLDTfp5qMVFaAI3yfTOzehm3MN1zECKxsNZXaEWoztOcyfmuDpLenAuGDtIqBQcjm3xTXx5OJDiiVft+myyYrdeCbAOT81VJqV4l4gkWCGxY7Gz7zpdTR7Hm0gGLAH9MBmNQ7sOk0CTs9i69fCmWNbOr4h37+rVHnZpLauKUi2xS3Ni8FF+8wRQYTTl+Cf9KbzbogHc4sa40nj8srFHeAF9b7eFxt+EcmR7h4GJp/UjDQeQMO3QEnqtbfyivYWRWJCgj+s+AN36QSPCXFxLgaY6PmWUcu8jNsS/sdXVMSI5rUDpvRnF2MArnLAp/h1xkv2DZp5NUvtqfg0XiVD5yUEyyiR/thqbZqpnD5/PDTaxy6ba8sJKV23DZaVCDh7v4RGWVePyNap7YP7ekPLAComllfXmaltqHna+gD12Bmc55436ATGzP2IfBsAcuJpfdxINmgcKZwNy48RADJFIz/BGwDSPblevk4aBFakEj7oZvIDZmbrauVnfQSPFjY4uUg92RzMmrcz3FYRj2yQctMaDRIzwK82DccduQ1VQ/ENJEf9ZViEaWpVtEw7OJM0wnAlF+6oAKsMVEub3xS++gKM1p7GrpThKghvxpkTjL9Q+So6rMjqx3q7l0UMqIQBW96tXYXgYsY3o4+ulrghRqvtfyxPcRTR/+zM2RG9XAsPD6nPn27P1RUS9/n15iFejA55pGtWZle6Sskx+0en3zfMVKfVE97d7cY8m1x7n8v/H6Q0EnEm326gxAZ5cov6gL3oSj84y7lUPukZ2c4m/x0wcBgfW44LKgL8C3RXc7dqjYnLwciWT3ojBHhDaU8osz3aVRI1HCKWNSG2AV1pS4ZHdK5xM6Acco0i5qHXyiVTeugpCkYUyxQqx7uYEiaJm2Ro0hL4nr2O9VfqCUtwS+pu/rJO3zzQrGlGHcV8CO/kgREo4ezWUd9FAN655rZ12XJtBgrZm48G69vPmtTbLa7835jlEg/ybnuAr/PVzBzgncC+Geruab7XHvkyw== X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: e11863f4-a05c-47d2-3300-08dacb38cbef X-MS-Exchange-CrossTenant-AuthSource: PAXPR10MB5037.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2022 20:50:02.7340 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: QqkLYI4N0r9hvgmFqyX2deSOaQ/nHe/NYgzFziAvqFL6D2hiNP4iKlt9Y/fovyyOzyNS+TsyxW+fB/vo6r887zbySU4K1Go4Q7h1Qpmm6AY= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR10MB7094 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 20 Nov 2022 20:50:12 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/10059 From: Sven Schultschik The secure boot setup with OP-TEE, u-boot and EFI works with a platform key (pk), key exchange key (kek) and signature database (db). isar-cip-core should only provide one secure boot solution and so the key structure and setup needed to be adjusted. Signed-off-by: Sven Schultschik --- .../files/sign_secure_image.sh | 2 +- .../secure-boot-secrets/files/KEK.auth | Bin 0 -> 2066 bytes .../secure-boot-secrets/files/KEK.crt | 19 +++++++++ .../secure-boot-secrets/files/KEK.esl | Bin 0 -> 839 bytes .../secure-boot-secrets/files/KEK.key | 28 +++++++++++++ .../secure-boot-secrets/files/PK.auth | Bin 0 -> 2064 bytes .../secure-boot-secrets/files/PK.crt | 19 +++++++++ .../secure-boot-secrets/files/PK.esl | Bin 0 -> 837 bytes .../secure-boot-secrets/files/PK.key | 28 +++++++++++++ .../files/PkKek-1-snakeoil.key | 27 ------------- .../files/PkKek-1-snakeoil.pem | 21 ---------- .../secure-boot-secrets/files/db.auth | Bin 0 -> 2067 bytes .../secure-boot-secrets/files/db.crt | 19 +++++++++ .../secure-boot-secrets/files/db.esl | Bin 0 -> 837 bytes .../secure-boot-secrets/files/db.key | 28 +++++++++++++ .../secure-boot-secrets.inc | 37 ++++++++++++++---- .../secure-boot-snakeoil_0.1.bb | 5 ++- 17 files changed, 174 insertions(+), 59 deletions(-) create mode 100644 recipes-devtools/secure-boot-secrets/files/KEK.auth create mode 100644 recipes-devtools/secure-boot-secrets/files/KEK.crt create mode 100644 recipes-devtools/secure-boot-secrets/files/KEK.esl create mode 100644 recipes-devtools/secure-boot-secrets/files/KEK.key create mode 100644 recipes-devtools/secure-boot-secrets/files/PK.auth create mode 100644 recipes-devtools/secure-boot-secrets/files/PK.crt create mode 100644 recipes-devtools/secure-boot-secrets/files/PK.esl create mode 100644 recipes-devtools/secure-boot-secrets/files/PK.key delete mode 100644 recipes-devtools/secure-boot-secrets/files/PkKek-1-snakeoil.key delete mode 100644 recipes-devtools/secure-boot-secrets/files/PkKek-1-snakeoil.pem create mode 100644 recipes-devtools/secure-boot-secrets/files/db.auth create mode 100644 recipes-devtools/secure-boot-secrets/files/db.crt create mode 100644 recipes-devtools/secure-boot-secrets/files/db.esl create mode 100644 recipes-devtools/secure-boot-secrets/files/db.key diff --git a/recipes-devtools/ebg-secure-boot-signer/files/sign_secure_image.sh b/recipes-devtools/ebg-secure-boot-signer/files/sign_secure_image.sh index 0c9b898..42e5b90 100644 --- a/recipes-devtools/ebg-secure-boot-signer/files/sign_secure_image.sh +++ b/recipes-devtools/ebg-secure-boot-signer/files/sign_secure_image.sh @@ -30,4 +30,4 @@ fi keydir=/usr/share/secure-boot-secrets -sbsign --key ${keydir}/secure-boot.key --cert ${keydir}/secure-boot.pem --output $signed $signee +sbsign --key ${keydir}/db.key --cert ${keydir}/db.crt --output $signed $signee \ No newline at end of file diff --git a/recipes-devtools/secure-boot-secrets/files/KEK.auth b/recipes-devtools/secure-boot-secrets/files/KEK.auth new file mode 100644 index 0000000000000000000000000000000000000000..3127ddfd55edd8e07baf97df7fe3ea862b1c3d91 GIT binary patch literal 2066 zcma)+cT|&E7Qpi*A&Al;ARtA^LLihcWh4j+0V4r2fFQ6il%eZV6akT791Mo0bX1D8 zHGm^!fQ%H$3=S5AQ8qLsfS?#$DG4A-lQQwl>^aOH*V*^aefPY3@4M%g-y3mp1z98# z@}JWV7u}$X(k1;r*iW1g+NFO_pqsh}SAz_A8597pGN2Sf;@e~j5DbGu0Wk=;2O(jQ zOi5mm0>puG222HHz>pvV*er)Z0Vq^42;*jER;h5)Da}i_d!;?l>V2f=rx1Vm0DD9s zRIz(OB?Qb34wIB|wIhE`c69YSPIf)+=j;G#C`;jRpefc2OTb}qSTB)^-=TidmjP(+ z{7RH9i~-0%MA_|zG5`Q_3z_^2^Bx1kwAUWPz0`a%5x3Xfi5EmgKP{v@%klR;QyY+% zHF$oezrAGn?Hh4P{kn^_mLE0QW8P|ye4gvS@pVWcTqG4<3JVG4AXS=2#yFw-5F{%d zcXw}cN8$Rn7t{_rd4n{3&qBvct?iZm_7jI4BqHj#n9@ov-_Xr!f58K##xjJp{Pg4G zLx?id8s{!%cG=pXmcSVrsT>`VMC32$jM64XgFoy`D}iZcIEql_tiE8yh}LiY`&%y=nvnWfhsYUru}ZYOPJX zbXd$Zhxp%Vo>BY`3Iia(O;_+3s4l9$x-?t~u9!P;UeH~-$ZBa^6Gle|5$R3y1W@zS zvkqL;rNqx0$b2$T0Dx_{7zh)Ion;qwSX6cZ5}4t8@ zLFQkL3u51jRhH`K)&Q9q{wIwhwNIe}c5lLW9h??wD?$+)X<Y`E?N`;rJt(YRbW2F2c?o;f@ET!BRk!z_DAUo!L_%a{ zN?Z7L3dPSmWJ%a$Uxr|T&5Zh6G7oIf^O@;Bse&8*ocg}H`PML5Vu!9A^6Sulp9{df ze#8zYSW-y|rw+}%W-O{Km>=(5TvC&rJ78O07jnK~%mZ_DMY>p7KJi?^chOnuHopA9 z+^cx0B%0rJ4-P#E9i3N>qYrTO?poBlVHtprX!JZqTLj|1G`IhIX?E`2jvW#WHk<)K zRK-IpB`;^5;Ky)_S}%-14_pC9Ji1AGm#IDm`5*AIPYGzC3lmJKw8qEgd00uLRD-de zMYAme%Ljt8kveX+PU6dj!KfsCSlmzL&2V-Yehe+Cev#FXL~&4WT|S-8A3bk2B`YCB zY_5-W=VZq~wyAL`TTeLx=iZye1~=k)N8VL?oAa%cdLKS**j;3+LR%rX<#Z3G?sYjm zQl^)3G-h4R4nvZgPcWGst^E*;s_L43W%u@*3f+ROkU0yCRh1llwVgu9ynetcZvd9RY6 zUu~aqrv~YbSvX@0`yFZ+k(3i1ZEZaM$Psyh`?(^Hh*HX;W^DgKDVNCnXv5ry^{+xH z>lThCo$5&GtN%5_pc+;MRQ{b(vVWqK1NpBp^+o5u;#B8t%d`it?zxflsE}D%D|UdeZJ0GD(c?5b zTm12PxGK62)4mZiKzdP|AD)*Z*t2z4=`Af*%+beCa=OTA|9z*Cgj^xnWbK0&ZNdOp zJGy+92J;VjR1wQIj)q*zVyf`s!`p{_&GR+d;y=f!D&y5lJ?<@&sp-N9Brx6@2-ima ziBq37_;HNBh)}F0Ujc&JbzC)L*@ZnYm{=y~cmI_@eXY zyZf^a^twKDKpmv-`v+9blPhL(I5mR~0tc_;>Aq<2NY;aIm#~%u7g*ucfrzvWCHj3c z-0^q3zP~k;wC+=oy$3_78by^{3T%s-j)ZOz3QZ0gR`@TgwcEPSW|g(zk93SEu91`#C>TMt=&TC|3U~Xt>Xkuh&WEchH8Y6M>Yi?pxLbi;Nm4Ug5 zk)HwRJ}#yvMn;B1tL!_EJUkHUsP4n?`rWprtgG0AzIU$CU$VowYtuaW9~)*ZaQc?K z;)Z+q{<$q7cOtHLZVqI&ogZHWX-YULd8?}5~qkFe5pSgf}&LfM3?p$ZS9k-4|jJmvrT_3Yo*bEGsbYVZD2 za@q0jnkhMxC%)zWw@d6rRVk}qtPao1S^kQL{clxIdgrSD^J`SqeJ#eHZr{qPm=n{E zEiB!vSIjW2zg6;PWzOy!an@7hc2+VmGcqtP4mJohkOhXnEFX&)i^wv)A1$ZCwm<6V zdY3E8cyC8Ci;{|gJV;uZMZ!R=0lNZzkOE;w#{Vp=2FySTIoN@53=DQghVo0gPyOGC znk#Hx?tJh1k}^e&*wv2R->Vy5SybKdIURMQbyCrxsC(-h?;hH>OR?YVT<}qE6{}jA zEGFs53#`s|9lf;%j8;99)$VQxZ&PRaKX=LJw{=T$d@kp9_KMXWwloU)bn~L>hPgXr zgar;Tt4Qe<&TUEFS@<%K>7U6=eJh=XiQlAmyNA8*H=lic$L*V~cMVrodNAFP`uw)! zTywb4LZ>JD10OkO>aU(EmYs3#=*?wQViWJr_|wGLJJB%dibj*%VGD;l7yd;h>7M#< zwS1jOOupj!<=~{%;!JL^wOpJ_%{06*ioC$3n zjH%2lOpL4y2Hb3%T5TR}-+39?85cA$OBysWiyAaB{$0S##K^=XlA;}IX}MH*v43Zj z+R5*`lO4X~MS_fg>S5#t8X;vUVIaoF9LmDX!yoMF>g(zk93SEu91n3@bh!?VkJX#WQvu&9#kd?0?H|z7r#TEcUwQ zvpDZ|lSapxE!k=5dqgF--MX_UU53rkK{+fe#&!S9UkP>6cK$I2RmP`2?0>b!z30;I z3_EYm+_e|9=PkYPL?_fiamEp`jq}-@gkGL#vt^razB=G|>xB6~uPD3?V9FCOF8yO6 zcvU5HdfcR)0@wdCJ?*!&wYKaPS9-EmxLW&o@}6a_dwR8^WFsbfr}G=f-;h4#`S@kS z?2QctPdiy}mfyKi=2$#e^5(;h25;vt>@zx85EZBJ^JUO}n^)V?61Q%9B~s7C%*epF zIM^W2Ko%JKvV1IJEFzOG*StMB@8go~8-KnlE>5wi-SpnXKprHm%mR$12J8y>K?;N! z8UM4e8ZZMX=vT#_ve5WMB#P+8%dsa?(<)i8E_SB{-Z{Kn4@4Xq{bOTmz zGMH}15$CCXVcEt_zy3d5Zo#c$s9wB1Ezf%H<{vuKOg>Agom-@0e*0sCNnT(3&Yb`4 z9`P}0pWkirn$NbxU|Z9=75qn>HQx7i#df@%b7{}Ii)-KS$QH2JuO=w!oBq5a$>{O1 z&8a5#K91G-wr?IceU$uQ9dhpDXK8^qX6_5trqyh?6Rz#{oo}|dP(#Ix`r>|B=eQ?V zCQUWwZLW%cdCExR5!3DW;^noM_o(l(Sr=;9#25=qdXd0fWMG6Z-QvzP$oUQ_4*?T4 zOA{jlfB(f}Z?dbJs$vc#PyAdRS+MT8&TnUyy2(e|JrfG~#FIN*V&dv;r^Ndt*1Ab; zUR_kX=((cNMK|&%W;8Wr@j8-%S*^ zI<@0x_L=T8fw?o?D!v|QPw`ll9=hO(%n~bC;awS%>gNhdPWyd7BGz(M{o?d~*NujL zd-vW-Vd#^oIMo?z`F4>~Y<{+w!6V};>HB@n>u;@}$Yt@Z(o&Wsz-jk`T!*VwPyej! z|Freo%J$9;r;jOJ;t&rER@E?I;8?xrskEDs%2DYBpP23ys~>tlk2A&O`|DKR3DSSR zEB+S`WIJspwximoePQH*rB9|T_iEp|S~N!cLy;>pq)^iY(t<#sq-1RD;v!@cRxxYO PXel*XN{yCMSV}1Xh66(< literal 0 HcmV?d00001 diff --git a/recipes-devtools/secure-boot-secrets/files/PK.crt b/recipes-devtools/secure-boot-secrets/files/PK.crt new file mode 100644 index 0000000..b775cd9 --- /dev/null +++ b/recipes-devtools/secure-boot-secrets/files/PK.crt @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDFTCCAf2gAwIBAgIUZCtVOTmlE6NPiVomyfe7Y0D0blkwDQYJKoZIhvcNAQEL +BQAwGjEYMBYGA1UEAwwPU0lFTUVOU19URVNUX1BLMB4XDTIyMDcxOTE0MjEyMVoX +DTIzMDcxOTE0MjEyMVowGjEYMBYGA1UEAwwPU0lFTUVOU19URVNUX1BLMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqBWGwYXAgiuFSiLcMuAfzN93GFZP +2WRMKM2ZSNaRYV5yrGKTj9R86tK7nfbo5gcMKa2BrD/7H7PcXBvGXdcp5l5LhzSB +QZmEa2ZnvBUZttrcvGccBkFAI1ZWXEW/mfpgfhs+T1wwejPK8L/qrEeM0rtoPksJ +ba3QK56l0OQsVUAhmMQWsZ8GQhLpyIY9Bp83q1DHhZCf+dQg7VACbhdzdfw4EdUk +aZdekrkQ1/0C5Y85PTs5jRci5K0TeyvHY7ymhbyNKlodWJNLZw8zX9gbyknj6YCb +sYBw5YkF2Xfc2HZBc50Z2eGxMO2foY4ywXBaXiD56VK/POq2ZmG1tuoUfwIDAQAB +o1MwUTAdBgNVHQ4EFgQUktN87cme8aS3sfnuc3NkOH2y7zQwHwYDVR0jBBgwFoAU +ktN87cme8aS3sfnuc3NkOH2y7zQwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0B +AQsFAAOCAQEAYiDDUdI4DNGzyHGObM+2Xk/WeoosVdhkOzXe7XXoBaWeKZKrAY6N +YWktbiJvJGIK/QQIOunuIhQCBvyJa5psV3nil+68fWUjt7jW/d6Y9i1Qq7Iwlz4I +Xkkn0Kaxsvr/4ac4CyQxJ3O3Zm47nbP4LJY08xomzqIkN9vxgDRujoe5bP+HSF9c +ZvPuskqfBqQwtoKuqA/EQyjvjopdiO2c0ryu0a3vuGsQOL8mERVNZ+d4YjLjxrNl +ND9MQXtvPezjgvEZ8DtUzvHzGxDsNkegrWZ8sNxXK0b3DpsXEoB4mH9zjx1DXuTU +kpUzDYN6X+nKMijiAtvvF3d907wnujyuVQ== +-----END CERTIFICATE----- diff --git a/recipes-devtools/secure-boot-secrets/files/PK.esl b/recipes-devtools/secure-boot-secrets/files/PK.esl new file mode 100644 index 0000000000000000000000000000000000000000..acd616b5ce5fa5fedfcd0a77334821fc834f1a88 GIT binary patch literal 837 zcmZ1&d0^?2Da*aux2_hA(f&~6%FF-;nm}3*2$YnJja^)XOu{N=?J;O#7By&M{JVge ziIIs(Bt<*a(sHTrV*k!4wUgg>Cp&z}i!|V6g(zk93SEu91z-b%DA|a~-s$|t@i(MTc|LyGFneP|!P8FGo8@`>`zAPV$7>mfH%QbIL&ilAz`^KN| zii=Y$YB#+%F^~sIE3*J&sR6qJevkrTM#ldvtOm?L3OU$;F$@fLMusGX!-1D9crI=} zQP`Jrep{UXwW=Jb%ruW{KzF=KCPjk|0#=hRfOx--Ce3c}wzbqV9FW)JNFtPpV z%$}7KUioPHyFIn3%G-Bb`+IN3H{F2Mn+&Ggam0D5Us$$r)35&zms@bF7^)X?mOpJ_%{06*ioC$3n zjH%2lOpL4y2Hb3%T5TR}-+39?85cA$OB*yXiyJgC{$Ie%#K^=X5|lTkSZ7l1FVl37 zUp9XFhh#S5#t8X;{cX&}zV9LmDXBM|KA>g(zk93SEu91`#C>TMt=&TC|3 zU~Xt>Xkuh&WEchH8Y6M>Yi?pxLbeR(Ugjo7eg>fXxR{z485s_(vhO_d@Ia`ex(~za zciWb-u3``R-nmA9$qwhPP4nb`Y?!sc>09!O8}fk@m;d;@!n3v3rjE_Y{OX!QYqbfH zOWq{UKA!UB*M-QdocAXd{cY9L&&geKbBc%H7bn@PDp$gn|2-Kq#qy$wb*;q?-ly(+ ztN4Cx)beqS?%le4<^tw9k1Q6tbDjBi+*Y$cxA}?QThh73vwvUDk_-{IlFJfSx=GMS;@rA z$iTQb*dWkA78w4rd@N!tBFprCw44gt{-~qtU9KqOy&cIcN-75OAZcY52?MbP>| zOxY|=j12s?c735Ig`OsH-^~1DIs5L74v`$U2X-DyTc$2ERn4BgZ0>&33cpjH=evH% z*)-TMy?=J|zsPeuDH3lFSR1tLUlClOzWMdcw_oS%`ZNFag*&UVrAKAE!It9|Qg(HQLyMXt<{a!nIR3j%?XlCiOii;ziJ z#jHKRf=Uz^8-Jk%m2R`C_mYQ()0xbay@%5lGQlZ=Vel4HHvs}y{S>^+aHRk;1lN83w5{ppJJ-xbnrq=+0>f~afhSR;~TVBy6SQ~*>Zo~EPK_L+uZE? zHwi!7bedO6P&!NRS$t`~v1vv4id_w+HA;HoCnsInDciE^aXZ8N8IykJUX9ePzkBFH zbl-`1w+iRNi^3<*9_(Qi3uX4wIEby7$_hOun7lWpF0yaq%p3Ls{!PZmub~uESQQXc zOwF_xD0nGoIBC(Xj{9p1m$h{+BYvqA;@sk&QUFJ~1z+QRPnDyhl z=I6@Y^S(ds@Z2>a(O`R|%Y&PpntQjHl$P%?PUh~uJu_)zbKlPIzQMX(k=sNr>dh^B zkiFfYFT`8&*DE1!s|AnxzD!MWTv?Ugec;Vm=_9>~6Q}oYYPLEwcc$ewVW%obJ03T# zt9suaB~4lsuNxp3eCuqPuKIcXEEZ)Qs|#Nvi%xu1U%JNYW|FOU)|DHMuf(=I+kINa Paf;{kpd$s2M~?siFKstz literal 0 HcmV?d00001 diff --git a/recipes-devtools/secure-boot-secrets/files/db.crt b/recipes-devtools/secure-boot-secrets/files/db.crt new file mode 100644 index 0000000..d8016c0 --- /dev/null +++ b/recipes-devtools/secure-boot-secrets/files/db.crt @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDFTCCAf2gAwIBAgIULYM1S6ThMZcCNiIfnfnXYA/n4awwDQYJKoZIhvcNAQEL +BQAwGjEYMBYGA1UEAwwPU0lFTUVOU19URVNUX2RiMB4XDTIyMDcxOTE0MjEyMloX +DTIzMDcxOTE0MjEyMlowGjEYMBYGA1UEAwwPU0lFTUVOU19URVNUX2RiMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp0S/0yPuxYYZIIyrwOCT2Z7u+nxv +6jn1TF8XOZBLqm0LlBL0tjC4NHS/6leQgtKbFs/M/FpBv0OCHDRCpMaNK6ogTHI/ +ScStINv2TCtKICjY7yeOvzrvX88wxZ3l1c1oc+NFVCwz3ylnPwpHzmi8nI6JZ/1i +sYXr9wTMOW/SgLU9PHdIdipnEhDayxtTPS+7/DX5tdctcKeUNSxCwdB8dpXZIF7D +W2dfgCupRS0I5LTfrpo/Jem2Rj+PshPhsssNGhEbai7mX3WPMzV4V6i6gDV8Ii4X +yZLSuR2EuuOHAO+Ykvtt1Vktf93C0FuOyF9GeENx0RPJzcGMBRZVA0oowQIDAQAB +o1MwUTAdBgNVHQ4EFgQUalXGEWO9XH5ZjrGZ2D8QT4Izx9YwHwYDVR0jBBgwFoAU +alXGEWO9XH5ZjrGZ2D8QT4Izx9YwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0B +AQsFAAOCAQEAmT8QcOkRMZKi2ojfrXGmhommCJaHZcRF7BzmiOP5tyJORccLRXCl +05zLoW8JJSZmgXlEvWpVEA4LU4JtrhpCG2dqEbotKmkDI8oAVWAzlbraItJfk6L1 +pkB4AAd51TMF8Z6D5yOLnvfjiEm6kGEwt1lE4NmJKb20NHV3vDNjC4vbmWKxg465 +901TLYpZthTRLp1y4Gu3MI5USxn66hJLOqDijvSVYkGpemeLwOzNG8SNYZGXj7KD +OsKdmTm2E0J6QT4MRgrVLvbiYpKiXy1QEVPazXYtJ88vagQjLDrQ9VlyyPUnpaxK +2WI9S2rU2EHqFrTmu8skQZRJl1LEcEHFxA== +-----END CERTIFICATE----- diff --git a/recipes-devtools/secure-boot-secrets/files/db.esl b/recipes-devtools/secure-boot-secrets/files/db.esl new file mode 100644 index 0000000000000000000000000000000000000000..644357bedea2acb605e9f3abbd97423133844c0c GIT binary patch literal 837 zcmZ1&d0^?2Da*aux2_hA(f&~6%FF-;nm}3*2$YnJja^)XOu{N=?J;O#7By&M{JVge ziIIs(M7P=0d&xt?=}cxy@^gP)PvC$4aE$>k8>d#AN85K^Mn-N{1_LQW2?H@U=1>-9 z9{ylYS6^4Z;P?>N;E?!~Bm+5dULzv|b3;o*6C*<-qbMNP7>SElZxf>uvQ><%49rc8 z{0u4~45bZMt-%dW@m4DV-5`ki|oSK52KLIU#;hObH9uGGp7;H6hv%*d zi3ZyvT^`)*)ZDwpq_ljGaWZ%J?U_j%oBMWt_YKzVirgl0QEzV1gY4}FeIeeGzg`J> zTP=9h_ho95oH)IIQ?u2fxic-d2|HCe+VQw?UDf;cC~4B7c-;WO z;9FjSY7xUS#;v7`qDLCH