<feed xmlns='http://www.w3.org/2005/Atom'>
<title>efi-boot-shim.git/Makefile, branch 0.3</title>
<subtitle> (mirror of https://github.com/vyos/efi-boot-shim.git)
</subtitle>
<id>https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=0.3</id>
<link rel='self' href='https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=0.3'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/'/>
<updated>2013-05-16T15:03:32+00:00</updated>
<entry>
<title>Bump version to 0.3</title>
<updated>2013-05-16T15:03:32+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2013-05-16T15:03:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=ea3a0a0b8769ed0705719ab8e93cd1c2b1f2769a'/>
<id>urn:sha1:ea3a0a0b8769ed0705719ab8e93cd1c2b1f2769a</id>
<content type='text'>
Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Use MS ABI instead of terrible wrappers.</title>
<updated>2013-05-16T14:21:15+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2013-05-16T14:09:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=25d6c434dfcbcf03513589df18d79c272422367d'/>
<id>urn:sha1:25d6c434dfcbcf03513589df18d79c272422367d</id>
<content type='text'>
This means that we now require gnu-efi 3.0s

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Add a fallback loader for when shim is invoked as BOOTX64.EFI</title>
<updated>2013-04-30T13:46:22+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2013-03-15T16:40:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=3ce517fdbb4eb895060e99bc86e63e223091faab'/>
<id>urn:sha1:3ce517fdbb4eb895060e99bc86e63e223091faab</id>
<content type='text'>
If shim is invoked as \EFI\BOOT\BOOT*.EFI and a file exists named
\EFI\BOOT\FALLBACK.EFI, try it instead of our second stage.  So don't
put fallback.efi on your install media in \EFI\BOOT, because that won't
do whatever it is you're hoping for, unless you're hoping not to start
the installer.

So here's the process for using this:
in /EFI/fedora/ (or whichever directory you happen to own), you put:
  shim.efi
  grub.efi
  boot.csv - format is: shim.efi,Nice Label,cmdline arguments,comments
           - filenames refer only to files in this directory, with no
	     leading characters such as L"./" or L"/EFI/fedora/"
           - note that while this is CSV, the character encoding is
	     UCS-2

and if /EFI/BOOT/BOOTX64.EFI doesn't already exist, then in /EFI/BOOT:
  shim.efi as BOOTX64.EFI
  fallback.efi

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Sign MokManager with a locally-generated key</title>
<updated>2012-11-26T18:43:50+00:00</updated>
<author>
<name>Matthew Garrett</name>
<email>mjg59@srcf.ucam.org</email>
</author>
<published>2012-11-24T05:07:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=6d50f87a06ff70d2075863f4c145235c081263d6'/>
<id>urn:sha1:6d50f87a06ff70d2075863f4c145235c081263d6</id>
<content type='text'>
shim needs to verify that MokManager hasn't been modified, but we want to
be able to support configurations where shim is shipped without a vendor
certificate. This patch adds support for generating a certificate at build
time, incorporating the public half into shim and signing MokManager with
the private half. It uses pesign and nss, but still requires openssl for
key generation. Anyone using sbsign will need to figure this out for
themselves.
</content>
</entry>
<entry>
<title>Bump version</title>
<updated>2012-11-01T19:32:12+00:00</updated>
<author>
<name>Matthew Garrett</name>
<email>mjg@redhat.com</email>
</author>
<published>2012-11-01T19:32:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=5c9cf018c7a2010a42e29929ed8ba847cbfaf9c2'/>
<id>urn:sha1:5c9cf018c7a2010a42e29929ed8ba847cbfaf9c2</id>
<content type='text'>
This seems pretty much functionally complete, so let's call it 0.2.
</content>
</entry>
<entry>
<title>Merge branch 'mok' into netboot</title>
<updated>2012-11-01T14:45:22+00:00</updated>
<author>
<name>Matthew Garrett</name>
<email>mjg@redhat.com</email>
</author>
<published>2012-11-01T14:45:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=5c9470f288f3c93c449233ec740edee317e3084b'/>
<id>urn:sha1:5c9470f288f3c93c449233ec740edee317e3084b</id>
<content type='text'>
Conflicts:
	Makefile
	shim.c
</content>
</entry>
<entry>
<title>Support a vendor-specific DBX list.</title>
<updated>2012-10-23T15:47:41+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2012-10-23T15:06:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=e0b78774d98a4f766c47254b959d295887963f21'/>
<id>urn:sha1:e0b78774d98a4f766c47254b959d295887963f21</id>
<content type='text'>
In some rare corner cases, it's useful to add a blacklist of things that
were allowed by a copy of shim that was never signed by the UEFI signing
service.  In these cases it's okay for them to go into a local dbx,
rather than taking up precious flash.

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Add draft version of Neil's netboot code</title>
<updated>2012-10-13T00:14:14+00:00</updated>
<author>
<name>Matthew Garrett</name>
<email>mjg@redhat.com</email>
</author>
<published>2012-10-13T00:13:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=d8e330b95368ce43da47e114eb1d699eedb18e57'/>
<id>urn:sha1:d8e330b95368ce43da47e114eb1d699eedb18e57</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Build debug image for all efi files</title>
<updated>2012-09-26T07:46:42+00:00</updated>
<author>
<name>Gary Ching-Pang Lin</name>
<email>glin@suse.com</email>
</author>
<published>2012-09-26T07:46:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=c6bd45d065bbd665d82f37af623eccf88d5aeb3a'/>
<id>urn:sha1:c6bd45d065bbd665d82f37af623eccf88d5aeb3a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add a separate efi application to manage MOKs</title>
<updated>2012-09-11T08:38:29+00:00</updated>
<author>
<name>Gary Ching-Pang Lin</name>
<email>glin@suse.com</email>
</author>
<published>2012-09-11T08:38:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=481c1e1e76f8158d262589dc571f95623a74e846'/>
<id>urn:sha1:481c1e1e76f8158d262589dc571f95623a74e846</id>
<content type='text'>
</content>
</entry>
</feed>
