<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sb-signing-utils, branch master</title>
<subtitle>OpenPOWER code signing utility sources</subtitle>
<id>https://git.raptorcs.com/git/sb-signing-utils/atom?h=master</id>
<link rel='self' href='https://git.raptorcs.com/git/sb-signing-utils/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/'/>
<updated>2019-04-10T21:30:57+00:00</updated>
<entry>
<title>start of 0.9</title>
<updated>2019-04-10T21:30:57+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>32454633+mtvaught-ibm@users.noreply.github.com</email>
</author>
<published>2019-04-10T21:30:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=c1b8572945e87fcf862e750b0f577609b439f236'/>
<id>urn:sha1:c1b8572945e87fcf862e750b0f577609b439f236</id>
<content type='text'>
</content>
</entry>
<entry>
<title>prep for 0.8 release</title>
<updated>2019-04-10T21:29:51+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>32454633+mtvaught-ibm@users.noreply.github.com</email>
</author>
<published>2019-04-10T21:29:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=f32d44a147159d7e766def302fc47238bbc7d7b6'/>
<id>urn:sha1:f32d44a147159d7e766def302fc47238bbc7d7b6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #31 from open-power/bofferdn-fix-double-delete</title>
<updated>2019-04-10T21:26:55+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>32454633+mtvaught-ibm@users.noreply.github.com</email>
</author>
<published>2019-04-10T21:26:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=8349ff9b511670ec90ba53c4925c8f2d296346c2'/>
<id>urn:sha1:8349ff9b511670ec90ba53c4925c8f2d296346c2</id>
<content type='text'>
Fix double delete bug when using OpenSSL v1.1 or higher</content>
</entry>
<entry>
<title>Fix double delete bug when using OpenSSL v1.1 or higher</title>
<updated>2019-04-10T18:05:57+00:00</updated>
<author>
<name>Nick Bofferding</name>
<email>opensource@bofferding.net</email>
</author>
<published>2019-04-10T18:05:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=f2b28370d0838388f9ea5a8b1e0eba799430ac3f'/>
<id>urn:sha1:f2b28370d0838388f9ea5a8b1e0eba799430ac3f</id>
<content type='text'>
This commit fixes a problem wherein, in the verify_signature API, if OpenSSL version is 1.1 or higher, the call to ECDSA_SIG_set0 assigns memory ownership of R+S to the ECDSA signature, but then still frees them before calling ECDSA_SIG_free, leading to an application crash.  Now, those frees will be inhibited in that path, and ECDSA_SIG_free will take care of reclaiming the memory instead.

Signed-off-by: Nick Bofferding opensource@bofferding.net</content>
</entry>
<entry>
<title>prep for 0.7 release</title>
<updated>2019-03-05T18:05:32+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>Matthew.Vaught@ibm.com</email>
</author>
<published>2019-03-05T18:05:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=017e481a8b58fbcbb303c05ae4e6006131c9a1fc'/>
<id>urn:sha1:017e481a8b58fbcbb303c05ae4e6006131c9a1fc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Make commit log URL point to open-power repo</title>
<updated>2019-03-05T15:43:56+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>Matthew.Vaught@ibm.com</email>
</author>
<published>2019-03-05T15:43:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=75ada4b49ffce9ee773567661284e689bc49d603'/>
<id>urn:sha1:75ada4b49ffce9ee773567661284e689bc49d603</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #29 from bofferdn/support-sw-flags</title>
<updated>2019-03-04T19:51:22+00:00</updated>
<author>
<name>Matthew Vaught</name>
<email>32454633+mtvaught-ibm@users.noreply.github.com</email>
</author>
<published>2019-03-04T19:51:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=12b9bca9c11c58f53781970c3140f1268a4e6a5e'/>
<id>urn:sha1:12b9bca9c11c58f53781970c3140f1268a4e6a5e</id>
<content type='text'>
Support setting software flags field in software header</content>
</entry>
<entry>
<title>Support setting software flags field in software header</title>
<updated>2019-03-04T17:07:54+00:00</updated>
<author>
<name>Nick Bofferding</name>
<email>bofferdn@us.ibm.com</email>
</author>
<published>2019-03-04T17:07:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=2c46bcc027916101a9b6e5fc91d6d736e1d20107'/>
<id>urn:sha1:2c46bcc027916101a9b6e5fc91d6d736e1d20107</id>
<content type='text'>
- Adds support to specify --sw-flags in crtSignedContainer.sh
</content>
</entry>
<entry>
<title>start of 0.7</title>
<updated>2018-09-25T23:22:41+00:00</updated>
<author>
<name>Dave Heller</name>
<email>hellerda@us.ibm.com</email>
</author>
<published>2018-09-25T23:22:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=e30f6413b3e3e932d0bf2638c5668bd16cf8ce4d'/>
<id>urn:sha1:e30f6413b3e3e932d0bf2638c5668bd16cf8ce4d</id>
<content type='text'>
Signed-off-by: Dave Heller &lt;hellerda@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>prep for 0.6 release</title>
<updated>2018-09-25T23:18:28+00:00</updated>
<author>
<name>Dave Heller</name>
<email>hellerda@us.ibm.com</email>
</author>
<published>2018-09-25T23:18:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/sb-signing-utils/commit/?id=d7235a3b4d8cdeaa47218faf87f8390bcc25d318'/>
<id>urn:sha1:d7235a3b4d8cdeaa47218faf87f8390bcc25d318</id>
<content type='text'>
Signed-off-by: Dave Heller &lt;hellerda@us.ibm.com&gt;
</content>
</entry>
</feed>
