You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This makes it hard for the LVFS to parse it. Ideally we'd save it in the dump directory as an artefact that we can just load as an asset like we do all the other extracted information. This would let us load the pubkey on the LVFS like we do other assets, like this:
This would then allow us to check that the Boot Policy Key isn't one that's been accidentally leaked.
The text was updated successfully, but these errors were encountered:
At the moment UEFITool just prints the Boot Policy Key Signature like this on stdout:
This makes it hard for the LVFS to parse it. Ideally we'd save it in the dump directory as an artefact that we can just load as an asset like we do all the other extracted information. This would let us load the pubkey on the LVFS like we do other assets, like this:
This would then allow us to check that the Boot Policy Key isn't one that's been accidentally leaked.
The text was updated successfully, but these errors were encountered: