Secure Boot Customization Guide - Technical whitepaper
Technical whitepaper 
© Copyright 2017 HP Development Company, L.P. 
2 Setting up a customized Secure Boot environment 22 
2.7.2 DBX 
To import the previously backed-up DBX file, you should follow the same procedure as for the DB, except that you need to 
substitute the desired proscribed certificates for DBX. The default set of HP-proscribed certificates is provided here as an 
attachment, immediately following. 
Again, these certificates need to be formatted properly using the Format-SecureBootUEFI
 command. 
Format-SecureBootUEFI Command Line Parameter 
Meaning 
-Name DBX  Indicates that you are working with the Secure Boot DBX. 
-Time 
2016-02-01T13:30:00Z 
Specifies the current date and time, which must be specified. 
-SignatureOwner DEF16466-F946-4E71-BE22-CF8B1B7B36A0  The hexadecimal number is a GUID that uniquely identifies 
you to the platform. Since this represents the signature 
owner, it should be the same GUID used to import the PK. 
-ContentFilePath .\HpDbx_SigList.bin  Specifies the name of the file which contains the unsigned, 
unformatted collection of DB certificates. 
-CertificateFilePath .\ HP_DBX_Default1.DER, .\ HP_DBX_Default2.DER  These are the two HP default DER-encoded certificate files. 
Each filename is separated by a comma (,) on the command 
line. 
-FormatWithCert  Tells Format-SecureBootUEFI to integrate the entire 
certificate into the formatted content. 
-SignableFilePath .\ HpDbx_SigList_Serialization_for_DBX.bin  Specifies the file that should be signed after formatting. 
Table 10  Command line switches to format DBX 
If the command succeeds, you should see something like the following. 
Figure 24  Successful output 
Here, the file to submit to your HSM solution for signing is the signature list serialization file, in this case, 
HpDbx_SigList_Serialization_for_DBX.bin. This file should be signed using the private key for your new KEK. A proper 
HP_Default_DBX_Certificates.zip










