This page describes how to get systems into and out of UEFI setup mode for the purposes either of installing a bootloader hash, or for taking control of all of the keys.  For more details of how UEFI secure boot works and for tools for creating and manipulating keys, see


The systems we currently know about are