<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openslx-ng/ipxe.git/src/crypto, branch openslx</title>
<subtitle>Fork of ipxe; additional commands and features</subtitle>
<id>https://git.openslx.org/openslx-ng/ipxe.git/atom/src/crypto?h=openslx</id>
<link rel='self' href='https://git.openslx.org/openslx-ng/ipxe.git/atom/src/crypto?h=openslx'/>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/'/>
<updated>2026-01-14T16:10:29+00:00</updated>
<entry>
<title>[build] Mark MD4 and MD5 as forbidden for UEFI Secure Boot</title>
<updated>2026-01-14T16:10:29+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2026-01-14T15:51:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=46510f36ab721b501b2bc8fc3f1409d2dc091561'/>
<id>urn:sha1:46510f36ab721b501b2bc8fc3f1409d2dc091561</id>
<content type='text'>
A past security review identified MD4 and MD5 support as features that
ought to be disabled by default.  (There is zero impact on UEFI Secure
Boot itself from having these algorithms enabled: this was just a side
comment in the review.)

As noted in the resulting commit 7f2006a ("[crypto] Disable MD5 as an
OID-identifiable algorithm by default"), the actual MD5 code will
almost certainly still be present in the binary due to its implicit
use by various features.  Disabling MD5 support via config/crypto.h
simply removes the OID-identified algorithm, which prevents it from
being used as an explicitly identified algorithm (e.g. in an X.509
certificate digest).

Match the intent of this review comment by marking the OID-identified
algorithms for MD4 and MD5 as forbidden for UEFI Secure Boot.

Extend this to also disable the "md4sum" command and the use of the
md5WithRSAEncryption OID-identified algorithm.  (The "md5sum" command
is left enabled for historical reasons, and we have no definition for
md4WithRSAEncryption anyway.)

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[build] Mark known reviewed files as permitted for UEFI Secure Boot</title>
<updated>2026-01-14T16:10:29+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2026-01-14T14:36:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=adcaaf9b93f9de14ba93bea54aecef103fe16b5f'/>
<id>urn:sha1:adcaaf9b93f9de14ba93bea54aecef103fe16b5f</id>
<content type='text'>
Some past security reviews carried out for UEFI Secure Boot signing
submissions have covered specific drivers or functional areas of iPXE.
Mark all of the files comprising these areas as permitted for UEFI
Secure Boot.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[build] Mark core files as permitted for UEFI Secure Boot</title>
<updated>2026-01-14T13:25:34+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2026-01-14T13:25:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=6cccb3bdc00359068c07125258d71ce24db5118a'/>
<id>urn:sha1:6cccb3bdc00359068c07125258d71ce24db5118a</id>
<content type='text'>
Mark all files used in a standard build of bin-x86_64-efi/snponly.efi
as permitted for UEFI Secure Boot.  These files represent the core
functionality of iPXE that is guaranteed to have been included in
every binary that was previously subject to a security review and
signed by Microsoft.  It is therefore legitimate to assume that at
least these files have already been reviewed to the required standard
multiple times.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Fix identification of non-wrapped elliptic curve identifiers</title>
<updated>2025-12-22T16:14:06+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-22T16:13:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=3832147944209ece35557234102548413ef1b460'/>
<id>urn:sha1:3832147944209ece35557234102548413ef1b460</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Add ECDSA-based TLS cipher suites</title>
<updated>2025-12-19T18:18:45+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-19T18:18:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=5aab6b7a312b8497389f52ac4691d686763129d4'/>
<id>urn:sha1:5aab6b7a312b8497389f52ac4691d686763129d4</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Add OID-identified algorithms for ECDSA with SHA2 hash family</title>
<updated>2025-12-19T15:26:29+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-19T14:43:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=d6eeb9039f64d03dc53638a974ca4a76350d5df9'/>
<id>urn:sha1:d6eeb9039f64d03dc53638a974ca4a76350d5df9</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Allow ecPublicKey to be identified as a public-key algorithm</title>
<updated>2025-12-19T15:26:29+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-19T15:24:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=d14066e924dd553936a8539055f1ea45bdb90603'/>
<id>urn:sha1:d14066e924dd553936a8539055f1ea45bdb90603</id>
<content type='text'>
Add a public-key algorithm to the definition of the "ecPublicKey"
OID-identified algorithm, and move this definition to ecdsa.c to avoid
unconditionally dragging in ECDSA support.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[x509] Correct debug message</title>
<updated>2025-12-19T13:54:24+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-19T13:54:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=aa247f6e385ca7b1643f997d532d1226fa7e406b'/>
<id>urn:sha1:aa247f6e385ca7b1643f997d532d1226fa7e406b</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Add support for ECDSA signatures</title>
<updated>2025-12-19T10:06:50+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-18T23:33:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=4e3cbeef83363425ddb9cc0d9691c8c1115a6929'/>
<id>urn:sha1:4e3cbeef83363425ddb9cc0d9691c8c1115a6929</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Allow for an explicit representation of point at infinity</title>
<updated>2025-12-18T15:47:29+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-12-18T15:38:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=cfbf0da93c27a33c6e76c0caac65708160425500'/>
<id>urn:sha1:cfbf0da93c27a33c6e76c0caac65708160425500</id>
<content type='text'>
ECDSA requires the ability to add two arbitrary curve points, either
of which may legitimately be the point at infinity.

Update the API so that curves must choose an explicit affine
representation for the point at infinity, and provide a method to test
for this representation.  Multiplication and addition will now allow
this representation to be provided as an input, and will not fail if
the result is the point at infinity.  Callers must explicitly check
for the point at infinity where needed (e.g. after computing the ECDHE
shared secret curve point).

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
</feed>
