freebsd-skq/stand/efi/loader
mw 330f749452 Extend libsecureboot(old libve) to obtain trusted certificates from UEFI and implement revocation
UEFI related headers were copied from edk2.

A new build option "MK_LOADER_EFI_SECUREBOOT" was added to allow
loading of trusted anchors from UEFI.

Certificate revocation support is also introduced.
The forbidden certificates are loaded from dbx variable.
Verification fails in two cases:

There is a direct match between cert in dbx and the one in the chain.
The CA used to sign the chain is found in dbx.
One can also insert a hash of TBS section of a certificate into dbx.
In this case verifications fails only if a direct match with a
certificate in chain is found.

Submitted by: Kornel Duleba <mindal@semihalf.com>
Reviewed by: sjg
Obtained from: Semihalf
Sponsored by: Stormshield
Differential Revision:	https://reviews.freebsd.org/D19093
2019-03-06 06:39:42 +00:00
..
arch EFI: don't call printf after ExitBootServices, since it uses Boot Services 2019-03-02 04:02:11 +00:00
autoload.c efiloader: Setup FDT in autoload to fix overlays clobbering kenv 2018-08-23 13:38:38 +00:00
bootinfo.c Add retry loop around GetMemoryMap call to fix fragmentation bug 2019-03-06 05:39:40 +00:00
conf.c
copy.c Add retry loop around GetMemoryMap call to fix fragmentation bug 2019-03-06 05:39:40 +00:00
efi_main.c Cast error message in efi_main.c to CHAR16* to avoid build error 2018-12-13 23:49:20 +00:00
framebuffer.c efi-autoresizecons: Don't fail the boot w/o GOP or UGA 2018-08-04 06:40:18 +00:00
framebuffer.h
loader_efi.h
main.c Extend libsecureboot(old libve) to obtain trusted certificates from UEFI and implement revocation 2019-03-06 06:39:42 +00:00
Makefile Extend libsecureboot(old libve) to obtain trusted certificates from UEFI and implement revocation 2019-03-06 06:39:42 +00:00
Makefile.depend
version