<feed xmlns='http://www.w3.org/2005/Atom'>
<title>talos-petitboot/lib/file, branch master</title>
<subtitle>Blackbird™ petitboot sources</subtitle>
<id>https://git.raptorcs.com/git/talos-petitboot/atom?h=master</id>
<link rel='self' href='https://git.raptorcs.com/git/talos-petitboot/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/'/>
<updated>2018-08-07T01:30:36+00:00</updated>
<entry>
<title>lib/log: Switch to pb_log_fn</title>
<updated>2018-08-07T01:30:36+00:00</updated>
<author>
<name>Geoff Levand</name>
<email>geoff@infradead.org</email>
</author>
<published>2018-08-02T17:29:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=c78f9ec47ba92b74698dacdae963dbbefd9b676f'/>
<id>urn:sha1:c78f9ec47ba92b74698dacdae963dbbefd9b676f</id>
<content type='text'>
The only functional change should be an additional '/n' to
a few log messagees that seemed to be missing it.

Signed-off-by: Geoff Levand &lt;geoff@infradead.org&gt;
Signed-off-by: Samuel Mendoza-Jonas &lt;sam@mendozajonas.com&gt;
</content>
</entry>
<entry>
<title>lib/file: remove mkstemp umask in copy_file_secure_dest</title>
<updated>2018-05-04T00:26:59+00:00</updated>
<author>
<name>Brett Grandbois</name>
<email>brett.grandbois@opengear.com</email>
</author>
<published>2018-05-03T06:02:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=17d9d54a46beab44db751b9bcf7f289b9bf101cf'/>
<id>urn:sha1:17d9d54a46beab44db751b9bcf7f289b9bf101cf</id>
<content type='text'>
mkstemp will generate the temp file with permissions 0600 so the
umask(0644) is causing the file to have permissions of 0000, making
signature files unreadable

Signed-off-by: Brett Grandbois &lt;brett.grandbois@opengear.com&gt;
Signed-off-by: Samuel Mendoza-Jonas &lt;sam@mendozajonas.com&gt;
</content>
</entry>
<entry>
<title>lib/file: Avoid off-by-one error in array</title>
<updated>2018-03-23T00:39:35+00:00</updated>
<author>
<name>Samuel Mendoza-Jonas</name>
<email>sam@mendozajonas.com</email>
</author>
<published>2018-03-19T23:03:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=abf92c05c31955333719f1a83cffb0d0d194c770'/>
<id>urn:sha1:abf92c05c31955333719f1a83cffb0d0d194c770</id>
<content type='text'>
Fixes Coverity defect CIDs 143606, 143610

Signed-off-by: Samuel Mendoza-Jonas &lt;sam@mendozajonas.com&gt;
</content>
</entry>
<entry>
<title>lib/file: Fix errors found by Coverity scan</title>
<updated>2016-10-11T03:39:38+00:00</updated>
<author>
<name>Samuel Mendoza-Jonas</name>
<email>sam@mendozajonas.com</email>
</author>
<published>2016-09-07T05:36:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=de2f990a98718d15bff074b9ae65f2eb92a2f938'/>
<id>urn:sha1:de2f990a98718d15bff074b9ae65f2eb92a2f938</id>
<content type='text'>
Fix several errors in copy_file_secure_dest() found by Coverity and some
minor formatting issues:

143603: Correctly handle mkstemp() return value
143605: Avoid accessing dest_filename[-1] on readlink() error
143606, 143610: Avoid accessing dest_filename[sizeof(dest_filename)]
143607: Fix incorrectly passing sizeof(pointer) to fread()
143608, 143611: Cleanup resources on early exit
143609: Explicitly set umask before calling mkstemp()

Signed-off-by: Samuel Mendoza-Jonas &lt;sam@mendozajonas.com&gt;
</content>
</entry>
<entry>
<title>Add support for GPG signature enforcement on booted</title>
<updated>2016-08-26T03:23:01+00:00</updated>
<author>
<name>tpearson@raptorengineering.com</name>
<email>tpearson@raptorengineering.com</email>
</author>
<published>2016-08-18T09:45:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=86c9d34380b0074dab1ba89a569a94280d6999c4'/>
<id>urn:sha1:86c9d34380b0074dab1ba89a569a94280d6999c4</id>
<content type='text'>
kernels and related blobs

This can be used to implement a form of organization-controlled secure boot,
whereby kernels may be loaded from a variety of sources but they will only
boot if a valid signature file is found for each component, and only if the
signature is listed in the /etc/pb-lockdown file.

Signed-off-by: Timothy Pearson &lt;tpearson@raptorengineering.com&gt;
Signed-off-by: Samuel Mendoza-Jonas &lt;sam@mendozajonas.com&gt;
(Minor build fixes and gpgme.m4, comment on secure boot in gpg.c)
</content>
</entry>
<entry>
<title>lib: Move generic file-handling code to lib/</title>
<updated>2014-08-05T02:49:30+00:00</updated>
<author>
<name>Jeremy Kerr</name>
<email>jk@ozlabs.org</email>
</author>
<published>2014-07-23T05:47:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-petitboot/commit/?id=052961eb2e8279f103c091e850c317da335c0207'/>
<id>urn:sha1:052961eb2e8279f103c091e850c317da335c0207</id>
<content type='text'>
Signed-off-by: Jeremy Kerr &lt;jk@ozlabs.org&gt;
</content>
</entry>
</feed>
