Skip to content

SecureBootConfigDxe: Implement parsing missing hashes #251

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: dasharo
Choose a base branch
from

Conversation

miczyg1
Copy link
Contributor

@miczyg1 miczyg1 commented Jun 13, 2025

Some hashes were simply ignored (lack of all CompareGuid in conditions) and it caused the browser to enter an infinite loop. Because CertList variable was never updated, the exit condition for the while loop never met.

Also add formatting for displaying image hashes or certificate hashes instead of prue GUIDs.

Fixes Dasharo/dasharo-issues#1365

TEST=Enroll DTS grubx64.efi to DB then delete its signature from DB using the Secure Boot menu on QEMU OVMF.

Some hashes were simply ignored (lack of all CompareGuid in
conditions) and it caused the browser to enter an infinite loop.
Because CertList variable was never updated, the exit condition
for the while loop never met.

Also add formatting for displaying image hashes or certificate
hashes instead of prue GUIDs.

Fixes Dasharo/dasharo-issues#1365

TEST=Enroll DTS grubx64.efi to DB then delete its signature
from DB using the Secure Boot menu on QEMU OVMF.

Signed-off-by: Michał Żygowski <[email protected]>
Base automatically changed from usb_port_power_fix to dasharo June 13, 2025 14:07
@miczyg1 miczyg1 requested review from mkopec and philipanda June 13, 2025 14:08
@pietrushnic
Copy link
Contributor

@miczyg1 I wonder what upstream would say about that.

@miczyg1
Copy link
Contributor Author

miczyg1 commented Jun 16, 2025

@miczyg1 I wonder what upstream would say about that.

They should probably accept that, because it is clearly full of bugs...

@pietrushnic
Copy link
Contributor

@miczyg1 I wonder what upstream would say about that.

They should probably accept that, because it is clearly full of bugs...

@miczyg1 in that case, let's try to upstream.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Can't delete signature of enrolled EFI file from DB as it's not shown
2 participants