Secure Boot Customization Guide - Technical whitepaper

Technical whitepaper
© Copyright 2017 HP Development Company, L.P.
If successful, the command should produce output similar to the following:
Figure 18 Successful creation of SetVariable() package
2.6.2 Import KEK Using Windows Tools
There is one more step required to use the Windows tools to import the KEK: writing the KEK itself to Non-volatile Random
Access Memory (NVRAM). Use the Set-SecureBootUEFI
command inside Windows PowerShell for this purpose.
Set-SecureBootUEFI Command Line Parameter
Meaning
-Name KEK Indicates that you are working with the Key Exchange Key (KEK)
-Time 2016-02-01T13:30:00Z Specifies the current date and time, which must be specified.
-ContentFilePath .\KEK_SigList.bin Specifies the name of the file which contains the unsigned, unformatted KEK,
created in a previous step.
-SignedFilePath
.\KEK_SigList_Serialization_for_KEK.bin.p7
Specifies the name of the file which contains the signed, formatted KEK.
Table 6 Command line switches to import KEK
If successful, the command should produce output similar to the following:
Figure 19 Successful import of KEK
At this point, both the new PK and the new PK-signed KEK are on the system, and you officially own the platform. The next
step is to import your DB and DBX files, each of which must be signed by the KEK. For purposes of this example, we shall
simply sign the DB and DBX files previously backed-up as HpDb.BAK and HpDbx.BAK.