BpmGen Tool Version 2.7.5 Command Line: F:\ADL-L05-35\Intel\AlderLake\AlderLakePlatSamplePkg\Tools\BpmGen2\BpmGen2.exe KMGEN -KEY pubkey.pem BPM -KM F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin -SIGNKEY keyprivkey.pem -SIGHASHALG SHA384 -SCHEME RSAPSS -KMKHASH SHA384 -KMID 0x01 -SVN 1 -d:2 Start KM Gen function Adding Public Key pubkey.pem, Producing KM binary output file F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin KM Signing Key keyprivkey.pem, Sign Hash: 12, Signing Scheme: 22, KM Key Hash: 12, Key Manifest ID: 1, KMSVN: 1, pKmOutFileName F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin || KeyCount 1 || SigSource 1 Generating KM - Get Public Keys (1) Usage: 1, Alg: 0xB ## DEBUG (ReadKey) - 0 pubkey.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: pubkey.pem @@ malloc 012bba00 ## DEBUG (ReadInputFile) End - Filename: pubkey.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x12bba00 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 12bba00 ## Base64 data starting address: 12bba1c ## Found '-' at offset 434 (0x1b2) - start of trailer ## Base64 data length: 0x196 (0x196) @@ malloc 0129f130 ## Placing result in DER Buffer at address: 129f130 (size=304 0x130) ## DEBUG (Base64Decode) pB64String: 12bba1c, B64Length: 0x196 pDecodeLocation: 129f130 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 294 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 22 ## [0] Adjust (2), Type: 0x30, Length: 290, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 290 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 f ## [4] Adjust (2), Type: 0x3, Length: 271, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 270 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 a ## [5] Adjust (2), Type: 0x30, Length: 266, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 266 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 1 ## [6] Adjust (2), Type: 0x2, Length: 257, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x105 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 290, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 271, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 266, Value[0] = 02 82 01 01 ... [6] Type: 0x02, Length: 256, Value[0] = ca fe 82 0f ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 256 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x100 @@ -- Free 0x012bba00 @@ -- Free 0x0129f130 ## DEBUG (ReadKey) end - Calcualting Public Keyhash -- an RSA key 256 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85 a0 2f 5a 82 0010: 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb c2 2a 16 cf - Creating KM signature ## DEBUG (KmGenMain) Addr KM: fcf598, pSignature: fcf5dc - RSA signature ## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem @@ malloc 012bba00 ## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 32 (0x20) -- pPemHeader: 0x12bba00 -- pPemHeader: -----BEGIN RSA PRIVATE KEY----- ## processing header at 12bba00 ## Base64 data starting address: 12bba21 ## Found '-' at offset 2467 (0x9a3) - start of trailer ## Base64 data length: 0x982 (0x982) @@ malloc 012bc3d0 ## Placing result in DER Buffer at address: 12bc3d0 (size=1825 0x721) ## DEBUG (Base64Decode) pB64String: 12bba21, B64Length: 0x982 pDecodeLocation: 12bc3d0 ## PEM Type = 4 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 4 ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4 ## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81 ## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0 ## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80 ## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e ## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0 ## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0 ## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b ## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b ## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0 ## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0 ## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (10 elements) [0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ... [3] Type: 0x02, Length: 3, Value[0] = 01 00 01 [4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ... [5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ... [6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ... [7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ... [8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ... [9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x012bba00 @@ -- Free 0x012bc3d0 ## DEBUG (ReadKey) end ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: keyprivkey.pem ## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem @@ malloc 012c0b68 ## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 32 (0x20) -- pPemHeader: 0x12c0b68 -- pPemHeader: -----BEGIN RSA PRIVATE KEY----- ## processing header at 12c0b68 ## Base64 data starting address: 12c0b89 ## Found '-' at offset 2467 (0x9a3) - start of trailer ## Base64 data length: 0x982 (0x982) @@ malloc 012bca08 ## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721) ## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08 ## PEM Type = 4 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 4 ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4 ## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81 ## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0 ## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80 ## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e ## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0 ## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0 ## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b ## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b ## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0 ## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0 ## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (10 elements) [0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ... [3] Type: 0x02, Length: 3, Value[0] = 01 00 01 [4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ... [5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ... [6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ... [7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ... [8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ... [9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x012c0b68 @@ -- Free 0x012bca08 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem @@ malloc 012c0b68 ## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 32 (0x20) -- pPemHeader: 0x12c0b68 -- pPemHeader: -----BEGIN RSA PRIVATE KEY----- ## processing header at 12c0b68 ## Base64 data starting address: 12c0b89 ## Found '-' at offset 2467 (0x9a3) - start of trailer ## Base64 data length: 0x982 (0x982) @@ malloc 012bca08 ## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721) ## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08 ## PEM Type = 4 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 4 ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4 ## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81 ## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0 ## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80 ## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e ## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0 ## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0 ## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b ## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b ## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0 ## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0 ## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (10 elements) [0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ... [3] Type: 0x02, Length: 3, Value[0] = 01 00 01 [4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ... [5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ... [6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ... [7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ... [8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ... [9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x012c0b68 @@ -- Free 0x012bca08 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 012bca08 ##-- Setting Modulus and Exponent (0x00010001) 0000: d9 03 fc 44 eb ad 15 79 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 012c0b68 ##-- BigNumInit ##-- Created BigNumber Context @0x 12C0B68 size: 803 ##-- pData: fcf344 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 012b57a0 ##-- BigNumInit ##-- Created BigNumber Context @0x 12B57A0 size: 43 ##-- pData: fcf194 @@ -- Free 0x012c0b68 @@ -- Free 0x012b57a0 ##-- Created RSA PubKey Context @0x 12BCA08 size: 2026 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 012c0b68 ##-- Setting Modulus: 0000: d9 03 fc 44 eb ad 15 79 ##-- Setting PrivateExp: 0000: a1 35 36 62 5a 4f 27 7b ## Creating BigNumber Context - NumBytes: 384 @@ malloc 012c14f8 ##-- BigNumInit ##-- Created BigNumber Context @0x 12C14F8 size: 803 ##-- pData: fcf344 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 012c1828 ##-- BigNumInit ##-- Created BigNumber Context @0x 12C1828 size: 803 ##-- pData: fcf1c4 @@ -- Free 0x012c14f8 @@ -- Free 0x012c1828 ##-- Created RSA PrivateKey Context @0x 12C0B68 size: 2434 @@ malloc 012c14f8 Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 012a0fe8 ## -- Randomize the seed ## -- seed: 16576876 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 012b5880 ##-- BigNumInit ##-- Created BigNumber Context @0x 12B5880 size: 43 ##-- pData: fcf16c @@ -- Free 0x012b5880 @@ -- Free 0x012a0fe8 Random Number (384 bits): f6 24 47 9b 51 ec e7 98 6e b5 37 44 c1 e7 39 bb a5 2e 3b 3c 10 4f 44 1f 5b e8 de 22 33 8b d c4 a 32 ff b5 1d 4 2 bb 99 1e 36 53 b8 7 97 1 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x012bca08 @@ -- Free 0x012c0b68 @@ -- Free 0x012c14f8 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 01 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85 0030: a0 2f 5a 82 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb 0040: c2 2a 16 cf 10 01 00 10 00 0c 01 00 01 00 d9 03 0050: fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8 6e bd 0060: b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89 e2 35 0070: 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77 e8 af 0080: f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4 bd b4 0090: 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64 5e d8 00a0: 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60 43 91 00b0: dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79 8e 92 00c0: b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8 4e e7 00d0: c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a ba 35 00e0: 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d 85 59 00f0: b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d d1 4f 0100: 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25 18 9c 0110: 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4 a8 6d 0120: c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b 18 16 0130: 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b 42 68 0140: f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f c6 fa 0150: 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20 90 60 0160: 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10 e9 80 0170: e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa 41 14 0180: 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed 9b de 0190: 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41 36 7a 01a0: d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00 65 88 01b0: 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41 f0 f6 01c0: 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8 16 00 01d0: 10 00 0c 0c 00 83 48 d7 2c 27 c0 0f 9c ae 14 58 01e0: 49 74 0b 32 10 2b 90 98 13 37 1f 9d f5 79 d3 78 01f0: ef 92 cd 1c fa 3b 3d 95 db 23 79 9d 87 67 5e 22 0200: 0c 99 19 5c e3 33 67 41 c7 f8 9b a9 83 ae dd b2 0210: d5 b6 88 c4 23 b8 32 fa f6 0f ca b3 8e eb 0d 7f 0220: 80 46 6e 6e bd d2 e9 33 87 20 fc 6c a6 dc 2c 9b 0230: 94 75 33 6c 73 b1 4b ff 1e 15 29 2a 0d 91 fb d7 0240: 59 95 08 80 41 23 dc 5f 95 77 8a 8f e1 9c e4 36 0250: a7 fd 90 9e de cb 25 34 c9 bc 8e d4 be 11 e2 a9 0260: 93 db 87 b2 a2 a6 83 18 40 4d 0c 71 e7 77 96 aa 0270: 04 31 50 75 37 ed b0 26 34 87 cf 46 22 e7 23 1a 0280: 6c 62 89 0d fe 08 82 21 b6 37 06 ab 81 1b e7 03 0290: 52 51 99 77 c3 2b fb 1a a4 ed 01 03 b1 60 39 bb 02a0: 40 35 6d 1d 16 05 ef a7 f8 dd b0 7d 33 0c b3 41 02b0: 4f b1 9a 4c 6f 61 15 dd 1b 71 63 81 8c 9d ee 5b 02c0: 29 65 02 d5 a8 28 e0 0b e3 3d 56 54 8c f3 6a 94 02d0: f2 b1 ea e7 38 54 20 c3 2e eb a0 19 43 6b 1a 32 02e0: 3a 23 5d 5f 37 1c 7c d6 87 1d 3d 84 b2 57 d8 06 02f0: fe 45 53 81 a5 65 5b 06 13 32 d0 ed d3 ab e8 db 0300: 90 19 e3 4f ee 98 43 38 ef 82 e2 ff ad 26 d8 4c 0310: 94 9e c9 7f 84 59 f6 cb ea 81 ac 37 5f 1c b7 70 0320: 45 88 dc ee 01 e4 3b e2 09 ae 4c 83 0a a7 ee 6e 0330: 32 e0 4e 3c af 10 31 88 9d 65 19 5f c3 bd 2e de 0340: 69 fc 63 fd 35 c7 95 b1 0e 99 6d bf ea 2c e4 a0 0350: 68 2a 4c 27 15 ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x01 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x0000000000000001 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 68837dd09e6db4ba7f08d385a02f5a823db8ba7c03e41ae5b006afcbc22a16cf Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: d9 03 fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8 0010: 6e bd b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89 0020: e2 35 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77 0030: e8 af f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4 0040: bd b4 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64 0050: 5e d8 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60 0060: 43 91 dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79 0070: 8e 92 b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8 0080: 4e e7 c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a 0090: ba 35 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d 00a0: 85 59 b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d 00b0: d1 4f 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25 00c0: 18 9c 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4 00d0: a8 6d c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b 00e0: 18 16 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b 00f0: 42 68 f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f 0100: c6 fa 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20 0110: 90 60 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10 0120: e9 80 e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa 0130: 41 14 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed 0140: 9b de 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41 0150: 36 7a d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00 0160: 65 88 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41 0170: f0 f6 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000c 0x0C:SHA384 Signature: 0000: 83 48 d7 2c 27 c0 0f 9c ae 14 58 49 74 0b 32 10 0010: 2b 90 98 13 37 1f 9d f5 79 d3 78 ef 92 cd 1c fa 0020: 3b 3d 95 db 23 79 9d 87 67 5e 22 0c 99 19 5c e3 0030: 33 67 41 c7 f8 9b a9 83 ae dd b2 d5 b6 88 c4 23 0040: b8 32 fa f6 0f ca b3 8e eb 0d 7f 80 46 6e 6e bd 0050: d2 e9 33 87 20 fc 6c a6 dc 2c 9b 94 75 33 6c 73 0060: b1 4b ff 1e 15 29 2a 0d 91 fb d7 59 95 08 80 41 0070: 23 dc 5f 95 77 8a 8f e1 9c e4 36 a7 fd 90 9e de 0080: cb 25 34 c9 bc 8e d4 be 11 e2 a9 93 db 87 b2 a2 0090: a6 83 18 40 4d 0c 71 e7 77 96 aa 04 31 50 75 37 00a0: ed b0 26 34 87 cf 46 22 e7 23 1a 6c 62 89 0d fe 00b0: 08 82 21 b6 37 06 ab 81 1b e7 03 52 51 99 77 c3 00c0: 2b fb 1a a4 ed 01 03 b1 60 39 bb 40 35 6d 1d 16 00d0: 05 ef a7 f8 dd b0 7d 33 0c b3 41 4f b1 9a 4c 6f 00e0: 61 15 dd 1b 71 63 81 8c 9d ee 5b 29 65 02 d5 a8 00f0: 28 e0 0b e3 3d 56 54 8c f3 6a 94 f2 b1 ea e7 38 0100: 54 20 c3 2e eb a0 19 43 6b 1a 32 3a 23 5d 5f 37 0110: 1c 7c d6 87 1d 3d 84 b2 57 d8 06 fe 45 53 81 a5 0120: 65 5b 06 13 32 d0 ed d3 ab e8 db 90 19 e3 4f ee 0130: 98 43 38 ef 82 e2 ff ad 26 d8 4c 94 9e c9 7f 84 0140: 59 f6 cb ea 81 ac 37 5f 1c b7 70 45 88 dc ee 01 0150: e4 3b e2 09 ae 4c 83 0a a7 ee 6e 32 e0 4e 3c af 0160: 10 31 88 9d 65 19 5f c3 bd 2e de 69 fc 63 fd 35 0170: c7 95 b1 0e 99 6d bf ea 2c e4 a0 68 2a 4c 27 15 Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 232 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 78 9a ca fe 0b b6 aa 6e b4 ef 7d 90 15 f6 19 16 8e a4 24 fc c1 3f ea ae 2d 57 7f 2c 1c b0 d3 a1 6f cf 12 68 31 db 67 99 5b 7c 36 45 f2 a7 4b a1 # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: 15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc 0010: 54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8 0020: e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc 15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc 54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8 e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc Writing KM to file (F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin) ## DEBUG (WriteOutputFile) start Filename: F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin, BufAddress: fcf598, Size 0x355 ## DEBUG (WriteOutputFile) opened ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end