|
NAMEpesign - command line tool for signing UEFI applicationsSYNOPSISpesign [--in=infile | -i infile] [--out=outfile | -o outfile] [--certdir=certdir/fR | -n certdir] [--nss-token=token | -t token] [--certificate=nickname | -c nickname] [--force | -f] [--sign | -s] [--hash | -h] [--digest_type=digest | -d digest] [--show-signature | -S ] [--remove-signature | -r ] [--export-pubkey=outkey | -K outkey] [--export-cert=outcert | -C outcert] [--ascii-armor | -a] [--daemonize | -D] [--nofork | -N] [--signature-number=signum | -u signum]DESCRIPTIONpesign is a command line tool for manipulating signatures and cryptographic digests of UEFI applications.OPTIONS
EXAMPLESIf you have a certificate file and private key file, the following steps may be used to sign a PE image:# Create a pkcs12 file from private key and
# certificate file.
host:~$ openssl pkcs12 -export -out foo_key.p12 \
-inkey signing_key.pem \
-in xyz_cert.x509.pem
# Import pkcs12 file into pesign db
host:~$ pk12util -i foo_key.p12 -d /etc/pki/pesign
# Do the signing
host:~$ pesign -i <input-file> -o
<output-file> \
-c <cert nickname> -s
Please note that this is just an example, and that recommended best practice is to always store private keys in a FIPS 140-2 hardware security module, level 2 or higher. SEE ALSOpesign-client(1)FIPS 140-2 http://csrc.nist.gov/publications/PubsFIPS.html AUTHORSPeter Jones
Visit the GSP FreeBSD Man Page Interface. |