<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/lib/libsecureboot/Makefile.inc, branch releng/12.2</title>
<subtitle>FreeBSD source tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/'/>
<entry>
<title>libsecureboot: make it easier to customize trust anchors</title>
<updated>2019-05-16T16:15:41+00:00</updated>
<author>
<name>Simon J. Gerraty</name>
<email>sjg@FreeBSD.org</email>
</author>
<published>2019-05-16T16:15:41+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=e9134c4661ea9e0ffbeaa1acfe121b8a5a5a1559'/>
<id>e9134c4661ea9e0ffbeaa1acfe121b8a5a5a1559</id>
<content type='text'>
Avoid making hash self-tests depend on X.509 certs.
Include OpenPGP keys in trust store count.

MFC of r347408

Reviewed by:	stevek
Sponsored by:	Juniper Networks
Differential Revision:	https://reviews.freebsd.org/D20208
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Avoid making hash self-tests depend on X.509 certs.
Include OpenPGP keys in trust store count.

MFC of r347408

Reviewed by:	stevek
Sponsored by:	Juniper Networks
Differential Revision:	https://reviews.freebsd.org/D20208
</pre>
</div>
</content>
</entry>
<entry>
<title>MFC r344840: Extend libsecureboot(old libve) to obtain trusted certificates from UEFI and implement revocation</title>
<updated>2019-04-26T00:48:52+00:00</updated>
<author>
<name>Marcin Wojtas</name>
<email>mw@FreeBSD.org</email>
</author>
<published>2019-04-26T00:48:52+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=63fd89c7cdb04dada3f82eb75201782b8712c8b6'/>
<id>63fd89c7cdb04dada3f82eb75201782b8712c8b6</id>
<content type='text'>
UEFI related headers were copied from edk2.

A new build option "MK_LOADER_EFI_SECUREBOOT" was added to allow
loading of trusted anchors from UEFI.

Certificate revocation support is also introduced.
The forbidden certificates are loaded from dbx variable.
Verification fails in two cases:

There is a direct match between cert in dbx and the one in the chain.
The CA used to sign the chain is found in dbx.
One can also insert a hash of TBS section of a certificate into dbx.
In this case verifications fails only if a direct match with a
certificate in chain is found.

Submitted by: Kornel Duleba &lt;mindal@semihalf.com&gt;
Obtained from: Semihalf
Sponsored by: Stormshield
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
UEFI related headers were copied from edk2.

A new build option "MK_LOADER_EFI_SECUREBOOT" was added to allow
loading of trusted anchors from UEFI.

Certificate revocation support is also introduced.
The forbidden certificates are loaded from dbx variable.
Verification fails in two cases:

There is a direct match between cert in dbx and the one in the chain.
The CA used to sign the chain is found in dbx.
One can also insert a hash of TBS section of a certificate into dbx.
In this case verifications fails only if a direct match with a
certificate in chain is found.

Submitted by: Kornel Duleba &lt;mindal@semihalf.com&gt;
Obtained from: Semihalf
Sponsored by: Stormshield
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for loader veriexec</title>
<updated>2019-04-12T01:03:00+00:00</updated>
<author>
<name>Simon J. Gerraty</name>
<email>sjg@FreeBSD.org</email>
</author>
<published>2019-04-12T01:03:00+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=ae8c08e7ce273c86febc4fd9d6357232b277548a'/>
<id>ae8c08e7ce273c86febc4fd9d6357232b277548a</id>
<content type='text'>
Also sbin/veriexec for mac_veriexec

MFC r343281,344564-344568,344780,344784,345289,346070
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Also sbin/veriexec for mac_veriexec

MFC r343281,344564-344568,344780,344784,345289,346070
</pre>
</div>
</content>
</entry>
</feed>
