ICE_TEA_BIOS/Board/Oem/L05AlderLakePMultiBoardPkg/PlatformConfig/bpmgen2_km.txt
LCFC\AiXia.Jiang a870bff2f4 1.Frist commit
2022-09-30 14:59:06 +08:00

494 lines
22 KiB
Plaintext

BpmGen Tool Version 2.7.5
Command Line: F:\ADL-L05-35\Intel\AlderLake\AlderLakePlatSamplePkg\Tools\BpmGen2\BpmGen2.exe KMGEN -KEY pubkey.pem BPM -KM F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin -SIGNKEY keyprivkey.pem -SIGHASHALG SHA384 -SCHEME RSAPSS -KMKHASH SHA384 -KMID 0x01 -SVN 1 -d:2
Start KM Gen function
Adding Public Key pubkey.pem,
Producing KM binary output file F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin
KM Signing Key keyprivkey.pem, Sign Hash: 12, Signing Scheme: 22, KM Key Hash: 12, Key Manifest ID: 1, KMSVN: 1,
pKmOutFileName F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin || KeyCount 1 || SigSource 1
Generating KM
- Get Public Keys (1)
Usage: 1, Alg: 0xB
## DEBUG (ReadKey) - 0 pubkey.pem - looking for Public Key
## DEBUG (ReadInputFile) start - Filename: pubkey.pem
@@ malloc 012bba00
## DEBUG (ReadInputFile) End - Filename: pubkey.pem
## Opened Key file
## FileData = 2d 2d 2d 2d
## DEBUG (GetDerFromPEM)
-- Found 0x0A at offset 27 (0x1b)
-- pPemHeader: 0x12bba00
-- pPemHeader: -----BEGIN PUBLIC KEY-----
## processing header at 12bba00
## Base64 data starting address: 12bba1c
## Found '-' at offset 434 (0x1b2) - start of trailer
## Base64 data length: 0x196 (0x196)
@@ malloc 0129f130
## Placing result in DER Buffer at address: 129f130 (size=304 0x130)
## DEBUG (Base64Decode) pB64String: 12bba1c, B64Length: 0x196 pDecodeLocation: 129f130
## PEM Type = 9
## DEBUG (ReadKey) - Processing DER
## Debug (GetKeyFromDER) - 0 PEM Type = 9
## DEBUG (ParseASN1) ASN.1 Size: 294 Starting Index: 0
## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 22
## [0] Adjust (2), Type: 0x30, Length: 290, Value[0] = 30
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 290 Starting Index: 1
## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9
## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2
## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86
## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a
## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82
## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3
## DEBUG Index: 4, Offset: 0xf :: 3 82 1 f
## [4] Adjust (2), Type: 0x3, Length: 271, Value[0] = 0
## Processing embedded Sequence in BitString
## DEBUG (ParseASN1) ASN.1 Size: 270 Starting Index: 5
## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 a
## [5] Adjust (2), Type: 0x30, Length: 266, Value[0] = 2
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 266 Starting Index: 6
## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 1
## [6] Adjust (2), Type: 0x2, Length: 257, Value[0] = 0
## DEBUG Index: 7, Offset: 0x105 :: 2 3 1 0
## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
DER ASN.1 Decode (8 elements)
[0] Type: 0x30, Length: 290, Value[0] = 30 0d 06 09 ...
[1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ...
[2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ...
[3] Type: 0x05, Length: 0
[4] Type: 0x03, Length: 271, Value[0] = 00 30 82 01 ...
[5] Type: 0x30, Length: 266, Value[0] = 02 82 01 01 ...
[6] Type: 0x02, Length: 256, Value[0] = ca fe 82 0f ...
[7] Type: 0x02, Length: 3, Value[0] = 01 00 01
## DEBUG - Extracting RSA key
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 256
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x100
@@ -- Free 0x012bba00
@@ -- Free 0x0129f130
## DEBUG (ReadKey) end
- Calcualting Public Keyhash
-- an RSA key 256
## DEBUG (GetIppHashAlgID)- Alg: 0xB
## --SHA256 is 2
## DEBUG (CreateHash) size=32
0000: 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85 a0 2f 5a 82
0010: 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb c2 2a 16 cf
- Creating KM signature
## DEBUG (KmGenMain) Addr KM: fcf598, pSignature: fcf5dc
- RSA signature
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
@@ malloc 012bba00
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
## Opened Key file
## FileData = 2d 2d 2d 2d
## DEBUG (GetDerFromPEM)
-- Found 0x0A at offset 32 (0x20)
-- pPemHeader: 0x12bba00
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
## processing header at 12bba00
## Base64 data starting address: 12bba21
## Found '-' at offset 2467 (0x9a3) - start of trailer
## Base64 data length: 0x982 (0x982)
@@ malloc 012bc3d0
## Placing result in DER Buffer at address: 12bc3d0 (size=1825 0x721)
## DEBUG (Base64Decode) pB64String: 12bba21, B64Length: 0x982 pDecodeLocation: 12bc3d0
## PEM Type = 4
## DEBUG (ReadKey) - Processing DER
## Debug (GetKeyFromDER) - 0 PEM Type = 4
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
DER ASN.1 Decode (10 elements)
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
[1] Type: 0x02, Length: 1, Value[0] = 00
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
## DEBUG - Extracting RSA key
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180
@@ -- Free 0x012bba00
@@ -- Free 0x012bc3d0
## DEBUG (ReadKey) end
## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: keyprivkey.pem
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Public Key
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
@@ malloc 012c0b68
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
## Opened Key file
## FileData = 2d 2d 2d 2d
## DEBUG (GetDerFromPEM)
-- Found 0x0A at offset 32 (0x20)
-- pPemHeader: 0x12c0b68
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
## processing header at 12c0b68
## Base64 data starting address: 12c0b89
## Found '-' at offset 2467 (0x9a3) - start of trailer
## Base64 data length: 0x982 (0x982)
@@ malloc 012bca08
## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721)
## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08
## PEM Type = 4
## DEBUG (ReadKey) - Processing DER
## Debug (GetKeyFromDER) - 0 PEM Type = 4
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
DER ASN.1 Decode (10 elements)
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
[1] Type: 0x02, Length: 1, Value[0] = 00
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
## DEBUG - Extracting RSA key
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180
@@ -- Free 0x012c0b68
@@ -- Free 0x012bca08
## DEBUG (ReadKey) end
## DEBUG (ReadKey) - 0 keyprivkey.pem - looking for Private Key
## DEBUG (ReadInputFile) start - Filename: keyprivkey.pem
@@ malloc 012c0b68
## DEBUG (ReadInputFile) End - Filename: keyprivkey.pem
## Opened Key file
## FileData = 2d 2d 2d 2d
## DEBUG (GetDerFromPEM)
-- Found 0x0A at offset 32 (0x20)
-- pPemHeader: 0x12c0b68
-- pPemHeader: -----BEGIN RSA PRIVATE KEY-----
## processing header at 12c0b68
## Base64 data starting address: 12c0b89
## Found '-' at offset 2467 (0x9a3) - start of trailer
## Base64 data length: 0x982 (0x982)
@@ malloc 012bca08
## Placing result in DER Buffer at address: 12bca08 (size=1825 0x721)
## DEBUG (Base64Decode) pB64String: 12c0b89, B64Length: 0x982 pDecodeLocation: 12bca08
## PEM Type = 4
## DEBUG (ReadKey) - Processing DER
## Debug (GetKeyFromDER) - 0 PEM Type = 4
## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 0
## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 e4
## [0] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2
## Processing embedded Sequence
## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 1
## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 2
## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0
## DEBUG Index: 2, Offset: 0x3 :: 2 82 1 81
## [2] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0
## DEBUG Index: 3, Offset: 0x188 :: 2 3 1 0
## [3] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1
## DEBUG Index: 4, Offset: 0x18d :: 2 82 1 80
## [4] Adjust (2), Type: 0x2, Length: 384, Value[0] = 6e
## DEBUG Index: 5, Offset: 0x311 :: 2 81 c1 0
## [5] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 6, Offset: 0x3d5 :: 2 81 c1 0
## [6] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 7, Offset: 0x499 :: 2 81 c0 5b
## [7] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5b
## DEBUG Index: 8, Offset: 0x55c :: 2 81 c1 0
## [8] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
## DEBUG Index: 9, Offset: 0x620 :: 2 81 c1 0
## [9] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0
DER ASN.1 Decode (10 elements)
[0] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ...
[1] Type: 0x02, Length: 1, Value[0] = 00
[2] Type: 0x02, Length: 384, Value[0] = d8 76 4a c6 ...
[3] Type: 0x02, Length: 3, Value[0] = 01 00 01
[4] Type: 0x02, Length: 384, Value[0] = 6e 3e 81 03 ...
[5] Type: 0x02, Length: 192, Value[0] = f2 fd 19 db ...
[6] Type: 0x02, Length: 192, Value[0] = e4 0d 90 39 ...
[7] Type: 0x02, Length: 192, Value[0] = 5b 6f 3c 4c ...
[8] Type: 0x02, Length: 192, Value[0] = bb f1 19 9c ...
[9] Type: 0x02, Length: 192, Value[0] = e4 3e e6 0f ...
## DEBUG - Extracting RSA key
## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384
## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180
@@ -- Free 0x012c0b68
@@ -- Free 0x012bca08
## DEBUG (ReadKey) end
## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001)
@@ malloc 012bca08
##-- Setting Modulus and Exponent (0x00010001)
0000: d9 03 fc 44 eb ad 15 79
## Creating BigNumber Context - NumBytes: 384
@@ malloc 012c0b68
##-- BigNumInit
##-- Created BigNumber Context @0x 12C0B68 size: 803
##-- pData: fcf344
## Creating BigNumber Context - NumBytes: 4
@@ malloc 012b57a0
##-- BigNumInit
##-- Created BigNumber Context @0x 12B57A0 size: 43
##-- pData: fcf194
@@ -- Free 0x012c0b68
@@ -- Free 0x012b57a0
##-- Created RSA PubKey Context @0x 12BCA08 size: 2026
## Creating RSA PrivateKey Context - KeyLength: 3072
@@ malloc 012c0b68
##-- Setting Modulus:
0000: d9 03 fc 44 eb ad 15 79
##-- Setting PrivateExp:
0000: a1 35 36 62 5a 4f 27 7b
## Creating BigNumber Context - NumBytes: 384
@@ malloc 012c14f8
##-- BigNumInit
##-- Created BigNumber Context @0x 12C14F8 size: 803
##-- pData: fcf344
## Creating BigNumber Context - NumBytes: 384
@@ malloc 012c1828
##-- BigNumInit
##-- Created BigNumber Context @0x 12C1828 size: 803
##-- pData: fcf1c4
@@ -- Free 0x012c14f8
@@ -- Free 0x012c1828
##-- Created RSA PrivateKey Context @0x 12C0B68 size: 2434
@@ malloc 012c14f8
Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
## Creating PRNG Context
@@ malloc 012a0fe8
## -- Randomize the seed
## -- seed: 16576876
## Creating BigNumber Context - NumBytes: 4
@@ malloc 012b5880
##-- BigNumInit
##-- Created BigNumber Context @0x 12B5880 size: 43
##-- pData: fcf16c
@@ -- Free 0x012b5880
@@ -- Free 0x012a0fe8
Random Number (384 bits): f6 24 47 9b 51 ec e7 98 6e b5 37 44 c1 e7 39 bb a5 2e 3b 3c 10 4f 44 1f 5b e8 de 22 33 8b d c4 a 32 ff b5 1d 4 2 bb 99 1e 36 53 b8 7 97 1
## DEBUG (GetIppHashAlgID)- Alg: 0xC
## -- SHA384 is 5
@@ -- Free 0x012bca08
@@ -- Free 0x012c0b68
@@ -- Free 0x012c14f8
0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00
0010: 00 01 01 01 0c 00 01 00 01 00 00 00 00 00 00 00
0020: 0b 00 20 00 68 83 7d d0 9e 6d b4 ba 7f 08 d3 85
0030: a0 2f 5a 82 3d b8 ba 7c 03 e4 1a e5 b0 06 af cb
0040: c2 2a 16 cf 10 01 00 10 00 0c 01 00 01 00 d9 03
0050: fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8 6e bd
0060: b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89 e2 35
0070: 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77 e8 af
0080: f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4 bd b4
0090: 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64 5e d8
00a0: 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60 43 91
00b0: dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79 8e 92
00c0: b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8 4e e7
00d0: c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a ba 35
00e0: 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d 85 59
00f0: b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d d1 4f
0100: 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25 18 9c
0110: 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4 a8 6d
0120: c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b 18 16
0130: 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b 42 68
0140: f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f c6 fa
0150: 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20 90 60
0160: 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10 e9 80
0170: e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa 41 14
0180: 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed 9b de
0190: 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41 36 7a
01a0: d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00 65 88
01b0: 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41 f0 f6
01c0: 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8 16 00
01d0: 10 00 0c 0c 00 83 48 d7 2c 27 c0 0f 9c ae 14 58
01e0: 49 74 0b 32 10 2b 90 98 13 37 1f 9d f5 79 d3 78
01f0: ef 92 cd 1c fa 3b 3d 95 db 23 79 9d 87 67 5e 22
0200: 0c 99 19 5c e3 33 67 41 c7 f8 9b a9 83 ae dd b2
0210: d5 b6 88 c4 23 b8 32 fa f6 0f ca b3 8e eb 0d 7f
0220: 80 46 6e 6e bd d2 e9 33 87 20 fc 6c a6 dc 2c 9b
0230: 94 75 33 6c 73 b1 4b ff 1e 15 29 2a 0d 91 fb d7
0240: 59 95 08 80 41 23 dc 5f 95 77 8a 8f e1 9c e4 36
0250: a7 fd 90 9e de cb 25 34 c9 bc 8e d4 be 11 e2 a9
0260: 93 db 87 b2 a2 a6 83 18 40 4d 0c 71 e7 77 96 aa
0270: 04 31 50 75 37 ed b0 26 34 87 cf 46 22 e7 23 1a
0280: 6c 62 89 0d fe 08 82 21 b6 37 06 ab 81 1b e7 03
0290: 52 51 99 77 c3 2b fb 1a a4 ed 01 03 b1 60 39 bb
02a0: 40 35 6d 1d 16 05 ef a7 f8 dd b0 7d 33 0c b3 41
02b0: 4f b1 9a 4c 6f 61 15 dd 1b 71 63 81 8c 9d ee 5b
02c0: 29 65 02 d5 a8 28 e0 0b e3 3d 56 54 8c f3 6a 94
02d0: f2 b1 ea e7 38 54 20 c3 2e eb a0 19 43 6b 1a 32
02e0: 3a 23 5d 5f 37 1c 7c d6 87 1d 3d 84 b2 57 d8 06
02f0: fe 45 53 81 a5 65 5b 06 13 32 d0 ed d3 ab e8 db
0300: 90 19 e3 4f ee 98 43 38 ef 82 e2 ff ad 26 d8 4c
0310: 94 9e c9 7f 84 59 f6 cb ea 81 ac 37 5f 1c b7 70
0320: 45 88 dc ee 01 e4 3b e2 09 ae 4c 83 0a a7 ee 6e
0330: 32 e0 4e 3c af 10 31 88 9d 65 19 5f c3 bd 2e de
0340: 69 fc 63 fd 35 c7 95 b1 0e 99 6d bf ea 2c e4 a0
0350: 68 2a 4c 27 15
################
# Key Manifest #
################
StructureID: __KEYM__
StructVersion: 0x21
Reserved: 0x00 00 00
KeySigOffset: 0x0044
Reserved: 0x00 00 00
KeyManifestVer: 0x01
KMSVN: 0x01
KeyManifestID: 0x01
KmPubKey Alg: 0x000c - 0x0C:SHA384
Number of Manifest Key Digests: 1
KeyHashes:
[1] Usage: 0x0000000000000001 For: Boot Policy Manifest,
HashAlg: 0x000b - 0x0B:SHA256
Size: 0x0020
HashBuffer: 68837dd09e6db4ba7f08d385a02f5a823db8ba7c03e41ae5b006afcbc22a16cf
Signature Structure:
Version: 0x10
KeyAlg: 0x0001 0x01:RSA
RsaPublicKeyStructure:
Version: 0x10
KeySize: 0x0c00
Exponent: 0x00010001
Modulus:
0000: d9 03 fc 44 eb ad 15 79 bf b1 a5 45 22 f2 af a8
0010: 6e bd b8 62 f5 4b 59 fe 6b 97 a6 9a f0 74 59 89
0020: e2 35 27 00 74 7e 8b 10 df ef 15 84 d0 d9 a7 77
0030: e8 af f3 7e de 4a 2a 1a 18 5f 50 ed 01 b7 4d a4
0040: bd b4 65 a5 74 88 10 8a 22 f6 b0 c6 e6 a1 ba 64
0050: 5e d8 5e 8f fc 91 37 ef fa 88 66 56 40 1d 9a 60
0060: 43 91 dc 0b 6d 8b 01 28 4a 5b 4d b7 1f fc 0f 79
0070: 8e 92 b4 03 0b 02 b8 3b 16 ba d3 a7 f4 70 72 d8
0080: 4e e7 c0 0c 52 57 b1 05 74 c7 24 d2 6b c6 b7 5a
0090: ba 35 6e 81 0f ca 0c 46 cf 8f bb f4 8d fc 5b 3d
00a0: 85 59 b0 35 7b 30 c2 10 4e 93 3c 6e cc 66 cc 2d
00b0: d1 4f 5a 5e ce 73 4c 25 78 f1 73 4c e2 25 33 25
00c0: 18 9c 63 9b 21 58 1f c5 6f aa 40 36 58 25 78 a4
00d0: a8 6d c5 ca 5f 95 11 d2 03 6e 00 fa 74 61 9d 2b
00e0: 18 16 41 0a 3c cf 84 e8 bb b4 a7 76 d3 d9 86 2b
00f0: 42 68 f3 1e 31 31 4e ad 28 ec f6 66 53 e5 26 9f
0100: c6 fa 39 6d 17 04 bf 5b d3 3e 55 24 0e b1 1f 20
0110: 90 60 8d 97 c5 b3 b7 ed dc 9f 46 9f 2f 62 5d 10
0120: e9 80 e8 4c cc 0d 64 e0 1a b2 11 d6 03 44 24 aa
0130: 41 14 07 28 0d e3 a8 a6 e7 27 17 23 65 88 46 ed
0140: 9b de 9a c2 37 e2 2f 4f 14 3d 32 2a e2 0e 2c 41
0150: 36 7a d6 9b f1 a4 ea 8d 26 a9 a8 85 f0 56 69 00
0160: 65 88 47 ca 3b 7d 17 f6 7b e9 cb 5a 49 39 8b 41
0170: f0 f6 5b d0 11 30 c8 92 c8 98 51 af c6 4a 76 d8
SigScheme: 0x0016 0x16:RSAPSS
RsaSsaSigStructure:
Version: 0x10
KeySize: 0x0c00
HashAlg: 0x000c 0x0C:SHA384
Signature:
0000: 83 48 d7 2c 27 c0 0f 9c ae 14 58 49 74 0b 32 10
0010: 2b 90 98 13 37 1f 9d f5 79 d3 78 ef 92 cd 1c fa
0020: 3b 3d 95 db 23 79 9d 87 67 5e 22 0c 99 19 5c e3
0030: 33 67 41 c7 f8 9b a9 83 ae dd b2 d5 b6 88 c4 23
0040: b8 32 fa f6 0f ca b3 8e eb 0d 7f 80 46 6e 6e bd
0050: d2 e9 33 87 20 fc 6c a6 dc 2c 9b 94 75 33 6c 73
0060: b1 4b ff 1e 15 29 2a 0d 91 fb d7 59 95 08 80 41
0070: 23 dc 5f 95 77 8a 8f e1 9c e4 36 a7 fd 90 9e de
0080: cb 25 34 c9 bc 8e d4 be 11 e2 a9 93 db 87 b2 a2
0090: a6 83 18 40 4d 0c 71 e7 77 96 aa 04 31 50 75 37
00a0: ed b0 26 34 87 cf 46 22 e7 23 1a 6c 62 89 0d fe
00b0: 08 82 21 b6 37 06 ab 81 1b e7 03 52 51 99 77 c3
00c0: 2b fb 1a a4 ed 01 03 b1 60 39 bb 40 35 6d 1d 16
00d0: 05 ef a7 f8 dd b0 7d 33 0c b3 41 4f b1 9a 4c 6f
00e0: 61 15 dd 1b 71 63 81 8c 9d ee 5b 29 65 02 d5 a8
00f0: 28 e0 0b e3 3d 56 54 8c f3 6a 94 f2 b1 ea e7 38
0100: 54 20 c3 2e eb a0 19 43 6b 1a 32 3a 23 5d 5f 37
0110: 1c 7c d6 87 1d 3d 84 b2 57 d8 06 fe 45 53 81 a5
0120: 65 5b 06 13 32 d0 ed d3 ab e8 db 90 19 e3 4f ee
0130: 98 43 38 ef 82 e2 ff ad 26 d8 4c 94 9e c9 7f 84
0140: 59 f6 cb ea 81 ac 37 5f 1c b7 70 45 88 dc ee 01
0150: e4 3b e2 09 ae 4c 83 0a a7 ee 6e 32 e0 4e 3c af
0160: 10 31 88 9d 65 19 5f c3 bd 2e de 69 fc 63 fd 35
0170: c7 95 b1 0e 99 6d bf ea 2c e4 a0 68 2a 4c 27 15
Key Manifest Size: 0x355
## DEBUG (PrintKmKeyHash)
## Hash Ctx Size: 232
## DEBUG (GetIppHashAlgID)- Alg: 0xC
## -- SHA384 is 5
# FYI: KM Public Key Hash Digest (Modulus+Exponent)#
78 9a ca fe 0b b6 aa 6e b4 ef 7d 90 15 f6 19 16
8e a4 24 fc c1 3f ea ae 2d 57 7f 2c 1c b0 d3 a1
6f cf 12 68 31 db 67 99 5b 7c 36 45 f2 a7 4b a1
# FYI: KM Public Key Hash Digest (Modulus Only)#
## DEBUG (GetIppHashAlgID)- Alg: 0xC
## -- SHA384 is 5
## DEBUG (CreateHash) size=48
0000: 15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc
0010: 54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8
0020: e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc
15 44 bc c0 d3 aa 55 a5 66 c6 13 b5 6f a0 a8 dc
54 72 4d 24 76 7d 35 2b 49 68 a0 12 07 7f d8 a8
e5 96 32 cc 4f b5 c5 55 e4 1d 4f b8 3b 88 ad dc
Writing KM to file (F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin)
## DEBUG (WriteOutputFile) start Filename: F:\ADL-L05-35\Build\L05AlderLakePMultiBoardPkg\RELEASE_DEVTLSxVC16\FV\KeyManifest.bin, BufAddress: fcf598, Size 0x355
## DEBUG (WriteOutputFile) opened
## DEBUG (WriteOutputFile) written
## DEBUG (WriteOutputFile) end