Skip to content

Commit d6b08f3

Browse files
authored
Update README.md
1 parent b052b54 commit d6b08f3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Kernel signing utility for easy overall kernel management on Ubuntu systems.
1414

1515
## Updating EFI keys & Signature Database
1616

17-
You need to have a directory containing a signature database file on your system - you'll need to create this, i created a "/etc/efikeys" directory as suggested by Sakaki ('chmod -v 700 <dirname>' to make sure only superuser can access!).
17+
You need to have a directory containing a signature database file on your system - you'll need to create this, i created a "/etc/efikeys" directory as suggested by Sakaki ('chmod -v 700 ``<dirname>``' to make sure only superuser can access!).
1818

1919
In order to create keys for signing kernels, first generate new keys using the utility and then follow the relevent sections of [Sakaki's EFI Install Guide](https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki's_EFI_Install_Guide/Configuring_Secure_Boot) for appending the keys to your existing keys (I won't go into detail here as the method varies across motherboards - it may be using the efi-updatevar command, it may be by accessing the keystore directly from the BIOS GUI and appending keys from a USB stick, etc). Once exported using efi-readvar, this should create a valid set of key files/certificates.
2020
Once created, follow the suitable method for your system [on Sakaki's guide](https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki's_EFI_Install_Guide/Configuring_Secure_Boot#Installing_New_Keys_into_the_Keystore)

0 commit comments

Comments
 (0)