efi-boot-shim/debian/ubuntu-dbx.hashes
Steve McIntyre de3def7f53 Improve how the dbx hashes are handled
Only include the hashes for the architecture we're building for - no
point in adding bloat and delay here.

Add a script "block_signed_deb" to scan a set of .deb files, extract
the hashes for .efi binaries and list them in the format wanted for
the dbx hashes file.

Split out the code to use that file from the rules file into a
separate helper.
2021-03-23 23:33:04 +00:00

23 lines
691 B
Plaintext

# debian-dbx.hashes
#
# This file contains the sha256 sums of the binaries that we want to
# blacklist directly in our signed shim. Add entries below, with comments
# to explain each entry (where possible).
#
# The data in this file needs should be of the form:
#
# <hex-encoded sha256 checksums> <arch>
#
# All other lines will be ignored. I'm using shell-style comments just
# for clarity.
#
# The hashes are generated using:
#
# pesign --hash --padding --in <binary>
#
# on *either* the signed or unsigned binary, pesign doesn't care
# which. See the helper script block_signed_deb for an easy way to
# generate this information.
# ... This file intentionally left blank for now ...