summaryrefslogtreecommitdiff
path: root/man
diff options
context:
space:
mode:
authorLuca Boccassi <bluca@debian.org>2023-05-11 10:45:59 +0100
committerGitHub <noreply@github.com>2023-05-11 10:45:59 +0100
commitfcb4ba6c141a09db40b0a9f79331714eae7ccb91 (patch)
tree4962371f3184e7284b6f807f5857e1681987745e /man
parentd698679112ada999fbd22c3df01eb9865628cead (diff)
parent4e906270a31ccfe402e4bb645398dd4de6df94cc (diff)
downloadsystemd-fcb4ba6c141a09db40b0a9f79331714eae7ccb91.tar.gz
Merge pull request #27539 from esposem/ukify_pesign
ukify: support pesign as alternative to sbsign
Diffstat (limited to 'man')
-rw-r--r--man/ukify.xml34
1 files changed, 31 insertions, 3 deletions
diff --git a/man/ukify.xml b/man/ukify.xml
index 6aa136298d..f5a2fcc3e8 100644
--- a/man/ukify.xml
+++ b/man/ukify.xml
@@ -254,12 +254,22 @@
</varlistentry>
<varlistentry>
+ <term><varname>SecureBootSigningTool=<replaceable>SIGNER</replaceable></varname></term>
+ <term><option>--signtool=<replaceable>SIGNER</replaceable></option></term>
+
+ <listitem><para>Whether to use <literal>sbsign</literal> or <literal>pesign</literal>.
+ Depending on this choice, different parameters are required in order to sign an image.
+ Defaults to <literal>sbsign</literal>.</para></listitem>
+ </varlistentry>
+
+ <varlistentry>
<term><varname>SecureBootPrivateKey=<replaceable>SB_KEY</replaceable></varname></term>
<term><option>--secureboot-private-key=<replaceable>SB_KEY</replaceable></option></term>
<listitem><para>A path to a private key to use for signing of the resulting binary. If the
<varname>SigningEngine=</varname>/<option>--signing-engine=</option> option is used, this may also be
- an engine-specific designation.</para></listitem>
+ an engine-specific designation. This option is required by
+ <varname>SecureBootSigningTool=sbsign</varname>/<option>--signtool=sbsign</option>. </para></listitem>
</varlistentry>
<varlistentry>
@@ -268,7 +278,25 @@
<listitem><para>A path to a certificate to use for signing of the resulting binary. If the
<varname>SigningEngine=</varname>/<option>--signing-engine=</option> option is used, this may also
- be an engine-specific designation.</para></listitem>
+ be an engine-specific designation. This option is required by
+ <varname>SecureBootSigningTool=sbsign</varname>/<option>--signtool=sbsign</option>. </para></listitem>
+ </varlistentry>
+
+ <varlistentry>
+ <term><varname>SecureBootCertificateDir=<replaceable>SB_PATH</replaceable></varname></term>
+ <term><option>--secureboot-certificate-dir=<replaceable>SB_PATH</replaceable></option></term>
+
+ <listitem><para>A path to a nss certificate database directory to use for signing of the resulting binary.
+ Takes effect when <varname>SecureBootSigningTool=pesign</varname>/<option>--signtool=pesign</option> is used.
+ Defaults to <filename>/etc/pki/pesign</filename>.</para></listitem>
+ </varlistentry>
+
+ <varlistentry>
+ <term><varname>SecureBootCertificateName=<replaceable>SB_CERTNAME</replaceable></varname></term>
+ <term><option>--secureboot-certificate-name=<replaceable>SB_CERTNAME</replaceable></option></term>
+
+ <listitem><para>The name of the nss certificate database entry to use for signing of the resulting binary.
+ This option is required by <varname>SecureBootSigningTool=pesign</varname>/<option>--signtool=pesign</option>.</para></listitem>
</varlistentry>
<varlistentry>
@@ -435,7 +463,7 @@ Phases=enter-initrd:leave-initrd
--secureboot-private-key=sb.key \
--secureboot-certificate=sb.cert \
--cmdline='debug' \
- --output=debug.cmdline.efi
+ --output=debug.cmdline
</programlisting>
<para>This creates a signed PE binary that contains the additional kernel command line parameter