]> code.ossystems Code Review - openembedded-core.git/commit
runqemu: Add support to handle EnrollDefaultKeys PK/KEK1 certificate
authorRicardo Neri <ricardo.neri-calderon@linux.intel.com>
Mon, 5 Aug 2019 22:18:23 +0000 (18:18 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 8 Aug 2019 09:26:40 +0000 (10:26 +0100)
commit5e47316ae62f7632fb62bc3b8093ac42f9e3541c
tree153def7ea7fcb41f3e6584e45ef4ef0dbd9d1643
parentdaaf9d7bd8c3586609ab0eccf49af38dbdb0b02e
runqemu: Add support to handle EnrollDefaultKeys PK/KEK1 certificate

The EnrollDefaultKeys.efi application (distributed in ovmf-shell-image)
expects the hypervisor to provide a Platform Key and first Key Exchange
Key certificate.

For QEMU, this is done by adding an OEM string in the Type 11 SMBIOS
table. The string contains the EnrollDefaultKeys application GUID followed
by the certificate string. For now, the string is passed in the command
line until QEMU understands OEM strings from regular files (please see
https://bugs.launchpad.net/qemu/+bug/1826200).

If runqemu detects it is given an OVMF binary with support for Secure Boot
(i.e., ovmf.secboot* binaries), extract the certificate string from the
OvmfPkKek1.pem certificate and modify the command-line parameters to
provide the key. Such certificate is created when building OVMF with
support for Secure Boot.

Cc: Ross Burton <ross.burton@intel.com>
Cc: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
scripts/runqemu