This page describes how to get systems into and out of UEFI setup mode for the purposes either of installing a bootloader hash, or for taking control of all of the keys. For more details of how UEFI secure boot works and for tools for creating and manipulating keys, see
http://blog.hansenpartnership.com/uefi-secure-boot/
The systems we currently know about are