]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
man: change "secureboot-private-key.pem" filename for consistency
authorcvlc12 <cvlc12@outlook.fr>
Sat, 28 Dec 2024 18:19:08 +0000 (19:19 +0100)
committerYu Watanabe <watanabe.yu+github@gmail.com>
Mon, 30 Dec 2024 00:14:29 +0000 (09:14 +0900)
man/uki.conf.example
man/ukify.xml

index 9fcae71e852a69156d179a0d5cb2e863a1bf0466..f78c15fe7850d1bf455c5c745c0a2dbafae24fe8 100644 (file)
@@ -1,6 +1,6 @@
 [UKI]
-SecureBootPrivateKey=/etc/kernel/secure-boot-key.pem
-SecureBootCertificate=/etc/kernel/secure-boot-certificate.pem
+SecureBootPrivateKey=/etc/kernel/secureboot-private-key.pem
+SecureBootCertificate=/etc/kernel/secureboot-certificate.pem
 
 [PCRSignature:initrd]
 Phases=enter-initrd
index c3b8d920d16e529765e18e00efba911da6d59f55..13c14a45c843aedb55ca754a6d7445a58a25c2f9 100644 (file)
       --phases='enter-initrd:leave-initrd enter-initrd:leave-initrd:sysinit \
                 enter-initrd:leave-initrd:sysinit:ready' \
       --pcr-banks=sha384,sha512 \
-      --secureboot-private-key=sb.key \
-      --secureboot-certificate=sb.cert \
+      --secureboot-private-key=secureboot-private-key.pem \
+      --secureboot-certificate=secureboot-certificate.pem \
       --sign-kernel \
       --cmdline='quiet rw rhgb'
 </programlisting>
       <filename index='false'>tpm2-pcr-private-key-initrd.pem</filename>, and for the main system (phases
       <constant>leave-initrd</constant>, <constant>sysinit</constant>, <constant>ready</constant>) with the
       key <filename index='false'>tpm2-pcr-private-key-system.pem</filename>. The Linux binary and the resulting
-      combined image will be signed with the SecureBoot key <filename index='false'>sb.key</filename>.</para>
+      combined image will be signed with the SecureBoot key <filename index='false'>secureboot-private-key.pem</filename>.</para>
     </example>
 
     <example>
 Initrd=early_cpio
 Cmdline=quiet rw rhgb
 
-SecureBootPrivateKey=secure-boot-key.pem
-SecureBootCertificate=secure-boot-certificate.pem
+SecureBootPrivateKey=secureboot-private-key.pem
+SecureBootCertificate=secureboot-certificate.pem
 SignKernel=yes
 PCRBanks=sha384,sha512
 
@@ -731,8 +731,8 @@ $ ukify -c ukify.conf build \
       <title>Kernel command line PE addon</title>
 
       <programlisting>ukify build \
-      --secureboot-private-key=secure-boot-key.pem \
-      --secureboot-certificate=secure-boot-certificate.pem \
+      --secureboot-private-key=secureboot-private-key.pem \
+      --secureboot-certificate=secureboot-certificate.pem \
       --cmdline='debug' \
       --sbat='sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
       uki-addon.author,1,UKI Addon for System,uki-addon.author,1,https://www.freedesktop.org/software/systemd/man/systemd-stub.html'
@@ -753,8 +753,8 @@ $ ukify -c ukify.conf build \
 
       <para>Next, we can generate the certificate and keys:</para>
       <programlisting># ukify genkey --config=/etc/kernel/uki.conf
-Writing SecureBoot private key to /etc/kernel/secure-boot-key.pem
-Writing SecureBoot certificate to /etc/kernel/secure-boot-certificate.pem
+Writing SecureBoot private key to /etc/kernel/secureboot-private-key.pem
+Writing SecureBoot certificate to /etc/kernel/secureboot-certificate.pem
 Writing private key for PCR signing to /etc/systemd/tpm2-pcr-private-key-initrd.pem
 Writing public key for PCR signing to /etc/systemd/tpm2-pcr-public-key-initrd.pem
 Writing private key for PCR signing to /etc/systemd/tpm2-pcr-private-key-system.pem