494 lines
22 KiB
Plaintext
494 lines
22 KiB
Plaintext
BpmGen Tool Version 2.7.5
|
|
Command Line: F:\ADL-L05-35\Intel\AlderLake\AlderLakePlatSamplePkg\Tools\BpmGen2\BpmGen2.exe KMGEN -KEY pubkey.pem BPM -KM F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin -SIGNKEY keyprivkey.pem -SIGHASHALG SHA384 -SCHEME RSAPSS -KMKHASH SHA384 -KMID 0x01 -SVN 1 -d:2
|
|
|
|
Start KM Gen function
|
|
|
|
Adding Public Key pubkey.pem,
|
|
Producing KM binary output file F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin
|
|
KM Signing Key keyprivkey.pem, Sign Hash: 12, Signing Scheme: 22, KM Key Hash: 12, Key Manifest ID: 1, KMSVN: 1,
|
|
pKmOutFileName F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin || KeyCount 1 || SigSource 1
|
|
|
|
|
|
Generating KM
|
|
- Get Public Keys (1)
|
|
Usage: 1, Alg: 0xB
|
|
## DEBUG (ReadKey) - 0 pubkey.pem - looking for Public Key
|
|
## DEBUG (ReadInputFile) start - Filename: pubkey.pem
|
|
@@ malloc 012bba00
|
|
## DEBUG (ReadInputFile) End - Filename: pubkey.pem
|
|
## Opened Key file
|
|
## FileData = 2d 2d 2d 2d
|
|
## DEBUG (GetDerFromPEM)
|
|
-- Found 0x0A at offset 27 (0x1b)
|
|
-- pPemHeader: 0x12bba00
|
|
-- pPemHeader: -----BEGIN PUBLIC KEY-----
|
|
## processing header at 12bba00
|
|
## Base64 data starting address: 12bba1c
|
|
## Found '-' at offset 434 (0x1b2) - start of trailer
|
|
## Base64 data length: 0x196 (0x196)
|
|
@@ malloc 0129f130
|
|
## Placing result in DER Buffer at address: 129f130 (size=304 0x130)
|
|
|
|
## DEBUG (Base64Decode) pB64String: 12bba1c, B64Length: 0x196 pDecodeLocation: 129f130
|
|
## PEM Type = 9
|
|
## DEBUG (ReadKey) - Processing DER
|
|
## Debug (GetKeyFromDER) - 0 PEM Type = 9
|
|
## DEBUG (ParseASN1) ASN.1 Size: 294 Starting Index: 0
|
|
## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 22
|
|
## [0] Adjust (2), Type: 0x30, Length: 290, Value[0] = 30
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 290 Starting Index: 1
|
|
## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9
|
|
## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2
|
|
## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86
|
|
## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a
|
|
## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82
|
|
## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3
|
|
## DEBUG Index: 4, Offset: 0xf :: 3 82 1 f
|
|
## [4] Adjust (2), Type: 0x3, Length: 271, Value[0] = 0
|
|
## Processing embedded Sequence in BitString
|
|
## DEBUG (ParseASN1) ASN.1 Size: 270 Starting Index: 5
|
|
## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 a
|
|
## [5] Adjust (2), Type: 0x30, Length: 266, Value[0] = 2
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 266 Starting Index: 6
|
|
## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 1
|
|
## [6] Adjust (2), Type: 0x2, Length: 257, Value[0] = 0
|
|
## DEBUG Index: 7, Offset: 0x105 :: 2 3 1 0
|
|
## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
|
|
|
|
DER ASN.1 Decode (8 elements)
|
|
[0] Type: 0x30, Length: 290, Value[0] = 30 0d 06 09 ...
|
|
[1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ...
|
|
[2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ...
|
|
[3] Type: 0x05, Length: 0
|
|
[4] Type: 0x03, Length: 271, Value[0] = 00 30 82 01 ...
|
|
[5] Type: 0x30, Length: 266, Value[0] = 02 82 01 01 ...
|
|
[6] Type: 0x02, Length: 256, Value[0] = ca fe 82 0f ...
|
|
[7] Type: 0x02, Length: 3, Value[0] = 01 00 01
|
|
## DEBUG - Extracting RSA key
|
|
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 256
|
|
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x100
|
|
@@ -- Free 0x012bba00
|
|
@@ -- Free 0x0129f130
|
|
## DEBUG (ReadKey) end
|
|
- Calcualting Public Keyhash
|
|
-- an RSA key 256
|
|
## DEBUG (GetIppHashAlgID)- Alg: 0xB
|
|
## --SHA256 is 2
|
|
## DEBUG (CreateHash) size=32
|
|
0000: 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85 a0 2f 5a 82
|
|
0010: 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb c2 2a 16 cf
|
|
- Creating KM signature
|
|
## DEBUG (KmGenMain) Addr KM: fcf598, pSignature: fcf5dc
|
|
- RSA signature
|
|
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key
|
|
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
|
|
@@ malloc 012bba00
|
|
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
|
|
## Opened Key file
|
|
## FileData = 2d 2d 2d 2d
|
|
## DEBUG (GetDerFromPEM)
|
|
-- Found 0x0A at offset 32 (0x20)
|
|
-- pPemHeader: 0x12bba00
|
|
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
|
|
## processing header at 12bba00
|
|
## Base64 data starting address: 12bba21
|
|
## Found '-' at offset 2467 (0x9a3) - start of trailer
|
|
## Base64 data length: 0x982 (0x982)
|
|
@@ malloc 012bc3d0
|
|
## Placing result in DER Buffer at address: 12bc3d0 (size=1825 0x721)
|
|
|
|
## DEBUG (Base64Decode) pB64String: 12bba21, B64Length: 0x982 pDecodeLocation: 12bc3d0
|
|
## PEM Type = 4
|
|
## DEBUG (ReadKey) - Processing DER
|
|
## Debug (GetKeyFromDER) - 0 PEM Type = 4
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
|
|
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
|
|
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
|
|
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
|
|
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
|
|
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
|
|
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
|
|
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
|
|
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
|
|
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
|
|
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
|
|
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
|
|
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
|
|
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
|
|
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
|
|
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
|
|
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
|
|
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
|
|
DER ASN.1 Decode (10 elements)
|
|
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
|
|
[1] Type: 0x02, Length: 1, Value[0] = 00
|
|
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
|
|
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
|
|
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
|
|
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
|
|
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
|
|
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
|
|
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
|
|
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
|
|
## DEBUG - Extracting RSA key
|
|
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
|
|
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180
|
|
@@ -- Free 0x012bba00
|
|
@@ -- Free 0x012bc3d0
|
|
## DEBUG (ReadKey) end
|
|
## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: keyprivkey.pem
|
|
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key
|
|
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
|
|
@@ malloc 012c0b68
|
|
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
|
|
## Opened Key file
|
|
## FileData = 2d 2d 2d 2d
|
|
## DEBUG (GetDerFromPEM)
|
|
-- Found 0x0A at offset 32 (0x20)
|
|
-- pPemHeader: 0x12c0b68
|
|
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
|
|
## processing header at 12c0b68
|
|
## Base64 data starting address: 12c0b89
|
|
## Found '-' at offset 2467 (0x9a3) - start of trailer
|
|
## Base64 data length: 0x982 (0x982)
|
|
@@ malloc 012bca08
|
|
## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721)
|
|
|
|
## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08
|
|
## PEM Type = 4
|
|
## DEBUG (ReadKey) - Processing DER
|
|
## Debug (GetKeyFromDER) - 0 PEM Type = 4
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
|
|
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
|
|
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
|
|
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
|
|
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
|
|
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
|
|
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
|
|
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
|
|
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
|
|
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
|
|
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
|
|
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
|
|
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
|
|
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
|
|
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
|
|
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
|
|
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
|
|
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
|
|
DER ASN.1 Decode (10 elements)
|
|
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
|
|
[1] Type: 0x02, Length: 1, Value[0] = 00
|
|
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
|
|
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
|
|
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
|
|
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
|
|
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
|
|
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
|
|
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
|
|
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
|
|
## DEBUG - Extracting RSA key
|
|
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
|
|
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180
|
|
@@ -- Free 0x012c0b68
|
|
@@ -- Free 0x012bca08
|
|
## DEBUG (ReadKey) end
|
|
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Private Key
|
|
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
|
|
@@ malloc 012c0b68
|
|
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
|
|
## Opened Key file
|
|
## FileData = 2d 2d 2d 2d
|
|
## DEBUG (GetDerFromPEM)
|
|
-- Found 0x0A at offset 32 (0x20)
|
|
-- pPemHeader: 0x12c0b68
|
|
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
|
|
## processing header at 12c0b68
|
|
## Base64 data starting address: 12c0b89
|
|
## Found '-' at offset 2467 (0x9a3) - start of trailer
|
|
## Base64 data length: 0x982 (0x982)
|
|
@@ malloc 012bca08
|
|
## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721)
|
|
|
|
## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08
|
|
## PEM Type = 4
|
|
## DEBUG (ReadKey) - Processing DER
|
|
## Debug (GetKeyFromDER) - 0 PEM Type = 4
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
|
|
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
|
|
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
|
|
## Processing embedded Sequence
|
|
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
|
|
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
|
|
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
|
|
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
|
|
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
|
|
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
|
|
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
|
|
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
|
|
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
|
|
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
|
|
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
|
|
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
|
|
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
|
|
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
|
|
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
|
|
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
|
|
|
|
DER ASN.1 Decode (10 elements)
|
|
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
|
|
[1] Type: 0x02, Length: 1, Value[0] = 00
|
|
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
|
|
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
|
|
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
|
|
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
|
|
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
|
|
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
|
|
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
|
|
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
|
|
## DEBUG - Extracting RSA key
|
|
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
|
|
## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180
|
|
@@ -- Free 0x012c0b68
|
|
@@ -- Free 0x012bca08
|
|
## DEBUG (ReadKey) end
|
|
## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001)
|
|
@@ malloc 012bca08
|
|
##-- Setting Modulus and Exponent (0x00010001)
|
|
0000: d9 03 fc 44 eb ad 15 79
|
|
## Creating BigNumber Context - NumBytes: 384
|
|
@@ malloc 012c0b68
|
|
##-- BigNumInit
|
|
##-- Created BigNumber Context @0x 12C0B68 size: 803
|
|
##-- pData: fcf344
|
|
## Creating BigNumber Context - NumBytes: 4
|
|
@@ malloc 012b57a0
|
|
##-- BigNumInit
|
|
##-- Created BigNumber Context @0x 12B57A0 size: 43
|
|
##-- pData: fcf194
|
|
@@ -- Free 0x012c0b68
|
|
@@ -- Free 0x012b57a0
|
|
##-- Created RSA PubKey Context @0x 12BCA08 size: 2026
|
|
## Creating RSA PrivateKey Context - KeyLength: 3072
|
|
@@ malloc 012c0b68
|
|
##-- Setting Modulus:
|
|
0000: d9 03 fc 44 eb ad 15 79
|
|
##-- Setting PrivateExp:
|
|
0000: a1 35 36 62 5a 4f 27 7b
|
|
## Creating BigNumber Context - NumBytes: 384
|
|
@@ malloc 012c14f8
|
|
##-- BigNumInit
|
|
##-- Created BigNumber Context @0x 12C14F8 size: 803
|
|
##-- pData: fcf344
|
|
## Creating BigNumber Context - NumBytes: 384
|
|
@@ malloc 012c1828
|
|
##-- BigNumInit
|
|
##-- Created BigNumber Context @0x 12C1828 size: 803
|
|
##-- pData: fcf1c4
|
|
@@ -- Free 0x012c14f8
|
|
@@ -- Free 0x012c1828
|
|
##-- Created RSA PrivateKey Context @0x 12C0B68 size: 2434
|
|
@@ malloc 012c14f8
|
|
Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
|
|
## Creating PRNG Context
|
|
@@ malloc 012a0fe8
|
|
## -- Randomize the seed
|
|
## -- seed: 16576876
|
|
## Creating BigNumber Context - NumBytes: 4
|
|
@@ malloc 012b5880
|
|
##-- BigNumInit
|
|
##-- Created BigNumber Context @0x 12B5880 size: 43
|
|
##-- pData: fcf16c
|
|
@@ -- Free 0x012b5880
|
|
@@ -- Free 0x012a0fe8
|
|
Random Number (384 bits): f6 24 47 9b 51 ec e7 98 6e b5 37 44 c1 e7 39 bb a5 2e 3b 3c 10 4f 44 1f 5b e8 de 22 33 8b d c4 a 32 ff b5 1d 4 2 bb 99 1e 36 53 b8 7 97 1
|
|
## DEBUG (GetIppHashAlgID)- Alg: 0xC
|
|
## -- SHA384 is 5
|
|
@@ -- Free 0x012bca08
|
|
@@ -- Free 0x012c0b68
|
|
@@ -- Free 0x012c14f8
|
|
0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00
|
|
0010: 00 01 01 01 0c 00 01 00 01 00 00 00 00 00 00 00
|
|
0020: 0b 00 20 00 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85
|
|
0030: a0 2f 5a 82 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb
|
|
0040: c2 2a 16 cf 10 01 00 10 00 0c 01 00 01 00 d9 03
|
|
0050: fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8 6e bd
|
|
0060: b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89 e2 35
|
|
0070: 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77 e8 af
|
|
0080: f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4 bd b4
|
|
0090: 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64 5e d8
|
|
00a0: 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60 43 91
|
|
00b0: dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79 8e 92
|
|
00c0: b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8 4e e7
|
|
00d0: c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a ba 35
|
|
00e0: 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d 85 59
|
|
00f0: b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d d1 4f
|
|
0100: 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25 18 9c
|
|
0110: 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4 a8 6d
|
|
0120: c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b 18 16
|
|
0130: 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b 42 68
|
|
0140: f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f c6 fa
|
|
0150: 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20 90 60
|
|
0160: 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10 e9 80
|
|
0170: e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa 41 14
|
|
0180: 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed 9b de
|
|
0190: 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41 36 7a
|
|
01a0: d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00 65 88
|
|
01b0: 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41 f0 f6
|
|
01c0: 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8 16 00
|
|
01d0: 10 00 0c 0c 00 83 48 d7 2c 27 c0 0f 9c ae 14 58
|
|
01e0: 49 74 0b 32 10 2b 90 98 13 37 1f 9d f5 79 d3 78
|
|
01f0: ef 92 cd 1c fa 3b 3d 95 db 23 79 9d 87 67 5e 22
|
|
0200: 0c 99 19 5c e3 33 67 41 c7 f8 9b a9 83 ae dd b2
|
|
0210: d5 b6 88 c4 23 b8 32 fa f6 0f ca b3 8e eb 0d 7f
|
|
0220: 80 46 6e 6e bd d2 e9 33 87 20 fc 6c a6 dc 2c 9b
|
|
0230: 94 75 33 6c 73 b1 4b ff 1e 15 29 2a 0d 91 fb d7
|
|
0240: 59 95 08 80 41 23 dc 5f 95 77 8a 8f e1 9c e4 36
|
|
0250: a7 fd 90 9e de cb 25 34 c9 bc 8e d4 be 11 e2 a9
|
|
0260: 93 db 87 b2 a2 a6 83 18 40 4d 0c 71 e7 77 96 aa
|
|
0270: 04 31 50 75 37 ed b0 26 34 87 cf 46 22 e7 23 1a
|
|
0280: 6c 62 89 0d fe 08 82 21 b6 37 06 ab 81 1b e7 03
|
|
0290: 52 51 99 77 c3 2b fb 1a a4 ed 01 03 b1 60 39 bb
|
|
02a0: 40 35 6d 1d 16 05 ef a7 f8 dd b0 7d 33 0c b3 41
|
|
02b0: 4f b1 9a 4c 6f 61 15 dd 1b 71 63 81 8c 9d ee 5b
|
|
02c0: 29 65 02 d5 a8 28 e0 0b e3 3d 56 54 8c f3 6a 94
|
|
02d0: f2 b1 ea e7 38 54 20 c3 2e eb a0 19 43 6b 1a 32
|
|
02e0: 3a 23 5d 5f 37 1c 7c d6 87 1d 3d 84 b2 57 d8 06
|
|
02f0: fe 45 53 81 a5 65 5b 06 13 32 d0 ed d3 ab e8 db
|
|
0300: 90 19 e3 4f ee 98 43 38 ef 82 e2 ff ad 26 d8 4c
|
|
0310: 94 9e c9 7f 84 59 f6 cb ea 81 ac 37 5f 1c b7 70
|
|
0320: 45 88 dc ee 01 e4 3b e2 09 ae 4c 83 0a a7 ee 6e
|
|
0330: 32 e0 4e 3c af 10 31 88 9d 65 19 5f c3 bd 2e de
|
|
0340: 69 fc 63 fd 35 c7 95 b1 0e 99 6d bf ea 2c e4 a0
|
|
0350: 68 2a 4c 27 15
|
|
|
|
################
|
|
# Key Manifest #
|
|
################
|
|
StructureID: __KEYM__
|
|
StructVersion: 0x21
|
|
Reserved: 0x00 00 00
|
|
KeySigOffset: 0x0044
|
|
Reserved: 0x00 00 00
|
|
KeyManifestVer: 0x01
|
|
KMSVN: 0x01
|
|
KeyManifestID: 0x01
|
|
KmPubKey Alg: 0x000c - 0x0C:SHA384
|
|
Number of Manifest Key Digests: 1
|
|
KeyHashes:
|
|
[1] Usage: 0x0000000000000001 For: Boot Policy Manifest,
|
|
HashAlg: 0x000b - 0x0B:SHA256
|
|
Size: 0x0020
|
|
HashBuffer: 68837dd09e6db4ba7f08d385a02f5a823db8ba7c03e41ae5b006afcbc22a16cf
|
|
Signature Structure:
|
|
Version: 0x10
|
|
KeyAlg: 0x0001 0x01:RSA
|
|
RsaPublicKeyStructure:
|
|
Version: 0x10
|
|
KeySize: 0x0c00
|
|
Exponent: 0x00010001
|
|
Modulus:
|
|
0000: d9 03 fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8
|
|
0010: 6e bd b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89
|
|
0020: e2 35 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77
|
|
0030: e8 af f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4
|
|
0040: bd b4 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64
|
|
0050: 5e d8 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60
|
|
0060: 43 91 dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79
|
|
0070: 8e 92 b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8
|
|
0080: 4e e7 c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a
|
|
0090: ba 35 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d
|
|
00a0: 85 59 b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d
|
|
00b0: d1 4f 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25
|
|
00c0: 18 9c 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4
|
|
00d0: a8 6d c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b
|
|
00e0: 18 16 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b
|
|
00f0: 42 68 f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f
|
|
0100: c6 fa 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20
|
|
0110: 90 60 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10
|
|
0120: e9 80 e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa
|
|
0130: 41 14 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed
|
|
0140: 9b de 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41
|
|
0150: 36 7a d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00
|
|
0160: 65 88 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41
|
|
0170: f0 f6 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8
|
|
|
|
SigScheme: 0x0016 0x16:RSAPSS
|
|
RsaSsaSigStructure:
|
|
Version: 0x10
|
|
KeySize: 0x0c00
|
|
HashAlg: 0x000c 0x0C:SHA384
|
|
Signature:
|
|
0000: 83 48 d7 2c 27 c0 0f 9c ae 14 58 49 74 0b 32 10
|
|
0010: 2b 90 98 13 37 1f 9d f5 79 d3 78 ef 92 cd 1c fa
|
|
0020: 3b 3d 95 db 23 79 9d 87 67 5e 22 0c 99 19 5c e3
|
|
0030: 33 67 41 c7 f8 9b a9 83 ae dd b2 d5 b6 88 c4 23
|
|
0040: b8 32 fa f6 0f ca b3 8e eb 0d 7f 80 46 6e 6e bd
|
|
0050: d2 e9 33 87 20 fc 6c a6 dc 2c 9b 94 75 33 6c 73
|
|
0060: b1 4b ff 1e 15 29 2a 0d 91 fb d7 59 95 08 80 41
|
|
0070: 23 dc 5f 95 77 8a 8f e1 9c e4 36 a7 fd 90 9e de
|
|
0080: cb 25 34 c9 bc 8e d4 be 11 e2 a9 93 db 87 b2 a2
|
|
0090: a6 83 18 40 4d 0c 71 e7 77 96 aa 04 31 50 75 37
|
|
00a0: ed b0 26 34 87 cf 46 22 e7 23 1a 6c 62 89 0d fe
|
|
00b0: 08 82 21 b6 37 06 ab 81 1b e7 03 52 51 99 77 c3
|
|
00c0: 2b fb 1a a4 ed 01 03 b1 60 39 bb 40 35 6d 1d 16
|
|
00d0: 05 ef a7 f8 dd b0 7d 33 0c b3 41 4f b1 9a 4c 6f
|
|
00e0: 61 15 dd 1b 71 63 81 8c 9d ee 5b 29 65 02 d5 a8
|
|
00f0: 28 e0 0b e3 3d 56 54 8c f3 6a 94 f2 b1 ea e7 38
|
|
0100: 54 20 c3 2e eb a0 19 43 6b 1a 32 3a 23 5d 5f 37
|
|
0110: 1c 7c d6 87 1d 3d 84 b2 57 d8 06 fe 45 53 81 a5
|
|
0120: 65 5b 06 13 32 d0 ed d3 ab e8 db 90 19 e3 4f ee
|
|
0130: 98 43 38 ef 82 e2 ff ad 26 d8 4c 94 9e c9 7f 84
|
|
0140: 59 f6 cb ea 81 ac 37 5f 1c b7 70 45 88 dc ee 01
|
|
0150: e4 3b e2 09 ae 4c 83 0a a7 ee 6e 32 e0 4e 3c af
|
|
0160: 10 31 88 9d 65 19 5f c3 bd 2e de 69 fc 63 fd 35
|
|
0170: c7 95 b1 0e 99 6d bf ea 2c e4 a0 68 2a 4c 27 15
|
|
|
|
Key Manifest Size: 0x355
|
|
|
|
## DEBUG (PrintKmKeyHash)
|
|
## Hash Ctx Size: 232
|
|
## DEBUG (GetIppHashAlgID)- Alg: 0xC
|
|
## -- SHA384 is 5
|
|
# FYI: KM Public Key Hash Digest (Modulus+Exponent)#
|
|
78 9a ca fe 0b b6 aa 6e b4 ef 7d 90 15 f6 19 16
|
|
8e a4 24 fc c1 3f ea ae 2d 57 7f 2c 1c b0 d3 a1
|
|
6f cf 12 68 31 db 67 99 5b 7c 36 45 f2 a7 4b a1
|
|
|
|
# FYI: KM Public Key Hash Digest (Modulus Only)#
|
|
## DEBUG (GetIppHashAlgID)- Alg: 0xC
|
|
## -- SHA384 is 5
|
|
## DEBUG (CreateHash) size=48
|
|
0000: 15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc
|
|
0010: 54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8
|
|
0020: e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc
|
|
15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc
|
|
54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8
|
|
e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc
|
|
|
|
|
|
Writing KM to file (F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin)
|
|
## DEBUG (WriteOutputFile) start Filename: F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin, BufAddress: fcf598, Size 0x355
|
|
## DEBUG (WriteOutputFile) opened
|
|
## DEBUG (WriteOutputFile) written
|
|
## DEBUG (WriteOutputFile) end
|