summaryrefslogtreecommitdiff
AgeCommit message (Expand)Author
2012-10-05Add filesystem browsing and enrollmentMatthew Garrett
2012-10-05releasing version 0~20120906.bcd0a4e8-0ubuntu3Steve Langasek
2012-10-05debian/patches/second-stage-path: Chainload grubx64.efi, notSteve Langasek
2012-10-04releasing version 0~20120906.bcd0a4e8-0ubuntu2Steve Langasek
2012-10-04Only build the package for amd64; we're not signing an i386 shim at thisSteve Langasek
2012-10-04debian/patches/prototypes: Include missing prototypes, and disableSteve Langasek
2012-10-04Don't show the invalid key numberGary Ching-Pang Lin
2012-10-04Use the same function to get commands and passwordGary Ching-Pang Lin
2012-10-04Print the key number for the non-existent key alsoGary Ching-Pang Lin
2012-10-04releasing version 0~20120906.bcd0a4e8-0ubuntu1Steve Langasek
2012-10-04Fix the changelog, which is inaccurate now that we just include the fileSteve Langasek
2012-10-04Use a clearer name for the VENDOR_CERT_FILE.Steve Langasek
2012-10-04Pull newer upstream snapshot, which fixes verification of the signature on ou...Steve Langasek
2012-10-03Import upstream version 0~20120906.bcd0a4e8Steve Langasek
2012-10-03Include the Canonical Secure Boot master CA (cert.der) and include asSteve Langasek
2012-10-02Don't print Backspace as we print nothingGary Ching-Pang Lin
2012-10-02Calculate SHA1 fingerprintGary Ching-Pang Lin
2012-10-02Replace functions with the ones in gnu-efiGary Ching-Pang Lin
2012-10-02Use LibDeleteVariable in gnu-efiGary Ching-Pang Lin
2012-09-27More tips for the MOK passwordGary Ching-Pang Lin
2012-09-26Filter out newline from the password arrayGary Ching-Pang Lin
2012-09-26correct wordingGary Ching-Pang Lin
2012-09-26Build debug image for all efi filesGary Ching-Pang Lin
2012-09-24Define the max length of passwordGary Ching-Pang Lin
2012-09-24Request a password to verify the key listGary Ching-Pang Lin
2012-09-21Erase stored keys when there is no key in the new key listGary Ching-Pang Lin
2012-09-21Make sure the variables are not brokenGary Ching-Pang Lin
2012-09-21Allow the new keys to be listed againGary Ching-Pang Lin
2012-09-21Reject the binary when there is no key in MokListGary Ching-Pang Lin
2012-09-20Make the key list interactiveGary Ching-Pang Lin
2012-09-20Make sure the time string is setGary Ching-Pang Lin
2012-09-20Improve the layout of the key infoGary Ching-Pang Lin
2012-09-20Remove the unused debug messageGary Ching-Pang Lin
2012-09-20Check the MOK list correctlyGary Ching-Pang Lin
2012-09-19Simplify the key managementGary Ching-Pang Lin
2012-09-19Abandon the variable, MokMgmtGary Ching-Pang Lin
2012-09-11Copy the MOK list to a RT variableGary Ching-Pang Lin
2012-09-11Use the machine owner keys to verify imagesGary Ching-Pang Lin
2012-09-11Add a separate efi application to manage MOKsGary Ching-Pang Lin
2012-09-11Always try StartImage firstGary Ching-Pang Lin
2012-09-11Only launch MokManager when necessaryGary Ching-Pang Lin
2012-09-11Retrieve attributes of variablesGary Ching-Pang Lin
2012-09-07Merge branch 'master' into mok-prototype3Gary Ching-Pang Lin
2012-09-07Load MokManager for MOK managementGary Ching-Pang Lin
2012-09-07Make the image loading process more genericGary Ching-Pang Lin
2012-09-06Fix data alignment on vendor_cert so we don't wind up with padding.Peter Jones
2012-09-06Add some convenience make targets.Peter Jones
2012-09-06Break out of our db checking loop at the appropriate time.Peter Jones
2012-09-06Use the file size, not the image size field, for verification.Matthew Garrett
2012-09-06Allow specification of vendor_cert through a build command line option.Peter Jones