aboutsummaryrefslogtreecommitdiff
path: root/lib/libsecureboot/Makefile.inc
Commit message (Collapse)AuthorAgeFilesLines
* libsecureboot: make it easier to customize trust anchorsSimon J. Gerraty2019-05-091-7/+20
| | | | | | | | | | | | | Avoid making hash self-tests depend on X.509 certs. Include OpenPGP keys in trust store count. Reviewed by: stevek MFC after: 1 week Sponsored by: Juniper Networks Differential Revision: https://reviews.freebsd.org/D20208 Notes: svn path=/head/; revision=347408
* Extend libsecureboot(old libve) to obtain trusted certificates from UEFI and ↵Marcin Wojtas2019-03-061-1/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | implement revocation UEFI related headers were copied from edk2. A new build option "MK_LOADER_EFI_SECUREBOOT" was added to allow loading of trusted anchors from UEFI. Certificate revocation support is also introduced. The forbidden certificates are loaded from dbx variable. Verification fails in two cases: There is a direct match between cert in dbx and the one in the chain. The CA used to sign the chain is found in dbx. One can also insert a hash of TBS section of a certificate into dbx. In this case verifications fails only if a direct match with a certificate in chain is found. Submitted by: Kornel Duleba <mindal@semihalf.com> Reviewed by: sjg Obtained from: Semihalf Sponsored by: Stormshield Differential Revision: https://reviews.freebsd.org/D19093 Notes: svn path=/head/; revision=344840
* Allow for reproducible buildSimon J. Gerraty2019-03-041-3/+14
| | | | | | | | | | | | Use SOURCE_DATE_EPOCH for BUILD_UTC if MK_REPRODUCIBLE_BUILD is yes. Default SOURCE_DATE_EPOCH to 2019-01-01 Reviewed by: emaste Sponsored by: Juniper Networks Differential Revision: https://reviews.freebsd.org/D19464 Notes: svn path=/head/; revision=344784
* Add libsecurebootSimon J. Gerraty2019-02-261-0/+133
Used by loader and veriexec Depends on libbearssl Reviewed by: emaste Sponsored by: Juniper Networks Differential Revision: D16335 Notes: svn path=/head/; revision=344565