@@ -34,13 +34,9 @@ EFI signing commands
34
34
35
35
*-e*, *--export*;;
36
36
The directory to persist the exported keys.
37
- +
38
- Default: "/usr/share/secureboot/keys/"
39
37
40
38
*-d*, *--database-path*;;
41
39
Path to save the GUID file when generating keys.
42
- +
43
- Default: "/usr/share/secureboot/"
44
40
45
41
**enroll-keys**::
46
42
Enrolls the created key into the EFI variables.
@@ -65,8 +61,8 @@ EFI signing commands
65
61
This feature is experimental
66
62
67
63
*-c*, *--custom*;;
68
- Enroll custom KEK and db certificates from "/usr/share/secureboot /keys/custom/KEK/",
69
- "/usr/share/secureboot /keys/custom/db/",
64
+ Enroll custom KEK and db certificates from "/var/lib/sbctl /keys/custom/KEK/",
65
+ "/var/lib/sbctl /keys/custom/db/",
70
66
respectively.
71
67
72
68
*-f*, *--firmware-builtin*;;
@@ -449,7 +445,7 @@ not be enabled unless no other way to enter key management is provided.
449
445
If this step is not completed, enrolling custom keys will be rejected by the firmware.
450
446
451
447
Next is creating the keys for secure boot. 'create-keys' creates the key
452
- hierarchy needed for secure boot into "/usr/share/secureboot ".
448
+ hierarchy needed for secure boot into "/var/lib/sbctl/keys ".
453
449
454
450
# sbctl create-keys
455
451
Created Owner UUID a9fbbdb7-a05f-48d5-b63a-08c5df45ee70
0 commit comments