Commit Graph

9 Commits

Author SHA1 Message Date
Salvatore Bonaccorso 89d82e4e2a certs: Rotate to use the Debian Secure Boot Signer 2020 certificate 2020-07-23 12:30:25 +02:00
Yves-Alexis Perez af53d158a0 certs: include both root CA and direct signing certificate. closes: #924545
Module loading needs the issuer certificate to validate the signature,
and that certificate is not embedded in the signature itself.

For now embed both the signing certificate and the root CA.
2019-03-14 14:16:50 +01:00
Ben Hutchings 16e5e055ca certs: Replace test signing certificate with production signing certificate 2019-03-10 22:28:08 +00:00
Ben Hutchings 35ab00b41b certs: Revert switch to production certificate
This reverts commit b91655bf3e and part
of commit 16dec97798.

The signing service is still using secure-boot-test-key-lfaraone and
we should make at least one more upload to be signed by it.
2018-08-18 19:59:32 +01:00
Ben Hutchings b91655bf3e certs: Add certificate for production key used in Debian signing service 2018-08-02 13:11:02 +08:00
Ben Hutchings 16dec97798 certs: Remove certificates for test key used in Debian signing service and for my personal signing key 2018-08-02 13:08:57 +08:00
Ben Hutchings d948b7a44d wireless: Add Debian wireless-regdb certificates (see #892229) 2018-04-13 20:22:12 +01:00
Ben Hutchings ef9c7e11c5 certs: Add certificate for test key used in Debian signing service 2018-04-08 14:39:52 +02:00
Ben Hutchings f880a7ff25 Fix config for module signing
Replace my pubkey with an X.509 (PEM encoded) certificate as actually
required.  Add quotes around the filenames in kconfig.
2016-04-04 10:41:46 +01:00