summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJenkins for Enea Linux Test Framework <eltf@list.enea.se>2019-05-24 12:00:13 +0200
committerJenkins for Enea Linux Test Framework <eltf@list.enea.se>2019-05-24 12:00:13 +0200
commit9b97864a55e2720ac5c1c81570b09974f34c20ef (patch)
tree05324ff9cea2db747e0606b0b0e58f5a8d885b98
parentcdfd320516250acdc5d3a9b11b07a066262ad849 (diff)
downloadnfv-access-documentation-9b97864a55e2720ac5c1c81570b09974f34c20ef.tar.gz
Updated licenses.xml
-rwxr-xr-xdoc/book-enea-nfv-access-esdk-open-source/doc/licenses.xml66
-rw-r--r--doc/book-enea-nfv-access-open-source/doc/licenses.xml66
-rw-r--r--doc/book-enea-nfv-access-sdk-open-source/doc/licenses.xml66
3 files changed, 198 insertions, 0 deletions
diff --git a/doc/book-enea-nfv-access-esdk-open-source/doc/licenses.xml b/doc/book-enea-nfv-access-esdk-open-source/doc/licenses.xml
index a90d10e..67efef7 100755
--- a/doc/book-enea-nfv-access-esdk-open-source/doc/licenses.xml
+++ b/doc/book-enea-nfv-access-esdk-open-source/doc/licenses.xml
@@ -492,6 +492,24 @@ specific documentation.-->
492 <entry>MIT</entry> 492 <entry>MIT</entry>
493</row> 493</row>
494<row> 494<row>
495 <entry>efibootmgr</entry>
496 <entry>0.15</entry>
497 <entry>Linux user-space application to modify the EFI Boot Manager.</entry>
498 <entry>GPL-2.0</entry>
499</row>
500<row>
501 <entry>efitools</entry>
502 <entry>1.7.0</entry>
503 <entry>From the EFI Tools package in the Linux user-space it's now possible to read and manipulate the UEFI signatures database via the new efi-readvar and efi-updatevar commands. Aside from needing efitools 1.4 the EFIVARFS file-system is also needed which was only introduced in the Linux 3.8 kernel. </entry>
504 <entry>GPL-2.0</entry>
505</row>
506<row>
507 <entry>efivar</entry>
508 <entry>0.31</entry>
509 <entry>efivar provides a simple command line interface to the UEFI variable facility</entry>
510 <entry>LGPL-2.1</entry>
511</row>
512<row>
495 <entry>element-vcpe</entry> 513 <entry>element-vcpe</entry>
496 <entry>4.0.3</entry> 514 <entry>4.0.3</entry>
497 <entry>vCPE(based on Element-ODM)</entry> 515 <entry>vCPE(based on Element-ODM)</entry>
@@ -852,6 +870,12 @@ specific documentation.-->
852 <entry>GPL-3.0</entry> 870 <entry>GPL-3.0</entry>
853</row> 871</row>
854<row> 872<row>
873 <entry>help2man</entry>
874 <entry>1.47.4</entry>
875 <entry>Program for creating simple man pages.</entry>
876 <entry>GPL-3.0</entry>
877</row>
878<row>
855 <entry>htop</entry> 879 <entry>htop</entry>
856 <entry>1.0.3</entry> 880 <entry>1.0.3</entry>
857 <entry>htop process monitor.</entry> 881 <entry>htop process monitor.</entry>
@@ -1122,6 +1146,12 @@ specific documentation.-->
1122 <entry>MIT</entry> 1146 <entry>MIT</entry>
1123</row> 1147</row>
1124<row> 1148<row>
1149 <entry>libfile-slurp-perl</entry>
1150 <entry>9999.19</entry>
1151 <entry>This module provides subroutines to read or write entire files with a simple call. It also has a subroutine for reading the list of filenames in a directory. </entry>
1152 <entry> Artistic-1.0, GPL-1.0</entry>
1153</row>
1154<row>
1125 <entry>libgcc</entry> 1155 <entry>libgcc</entry>
1126 <entry>7.3.0</entry> 1156 <entry>7.3.0</entry>
1127 <entry>GNU cc and gcc C compilers.</entry> 1157 <entry>GNU cc and gcc C compilers.</entry>
@@ -1248,6 +1278,12 @@ specific documentation.-->
1248 <entry>LGPL-2.1</entry> 1278 <entry>LGPL-2.1</entry>
1249</row> 1279</row>
1250<row> 1280<row>
1281 <entry>libsign</entry>
1282 <entry>0.3.2</entry>
1283 <entry>This project targets to provide a generic signing framework. This framework separates the signing request and signing process and correspondingly forms the so-called signlet and signaturelet. Each signaturelet only concerns about the details about how to construct the layout of a signature format and signlet only cares how to construct the signing request. </entry>
1284 <entry>BSD-3-Clause</entry>
1285</row>
1286<row>
1251 <entry>libsm</entry> 1287 <entry>libsm</entry>
1252 <entry>1.2.2</entry> 1288 <entry>1.2.2</entry>
1253 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry> 1289 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry>
@@ -1488,6 +1524,12 @@ specific documentation.-->
1488 <entry> GPL-2.0, LGPL-2.1</entry> 1524 <entry> GPL-2.0, LGPL-2.1</entry>
1489</row> 1525</row>
1490<row> 1526<row>
1527 <entry>mokutil</entry>
1528 <entry>0.3.0</entry>
1529 <entry>The utility to manipulate machines owner keys which managed in shim.</entry>
1530 <entry>GPL-3.0</entry>
1531</row>
1532<row>
1491 <entry>mozjs</entry> 1533 <entry>mozjs</entry>
1492 <entry>17.0.0</entry> 1534 <entry>17.0.0</entry>
1493 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry> 1535 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry>
@@ -1656,6 +1698,12 @@ specific documentation.-->
1656 <entry>MIT</entry> 1698 <entry>MIT</entry>
1657</row> 1699</row>
1658<row> 1700<row>
1701 <entry>packagegroup-efi-secure-boot</entry>
1702 <entry>1.0</entry>
1703 <entry>EFI Secure Boot packages for secure-environment.</entry>
1704 <entry>MIT</entry>
1705</row>
1706<row>
1659 <entry>packagegroup-enea-virtualization-4gusb-modems</entry> 1707 <entry>packagegroup-enea-virtualization-4gusb-modems</entry>
1660 <entry>1.0</entry> 1708 <entry>1.0</entry>
1661 <entry>Packagegroup for 4G usb modems.</entry> 1709 <entry>Packagegroup for 4G usb modems.</entry>
@@ -1968,12 +2016,24 @@ specific documentation.-->
1968 <entry>Apache-2.0</entry> 2016 <entry>Apache-2.0</entry>
1969</row> 2017</row>
1970<row> 2018<row>
2019 <entry>sbsigntool</entry>
2020 <entry>0.6</entry>
2021 <entry>Utilities for signing UEFI binaries for use with secure boot.</entry>
2022 <entry>GPL-3.0</entry>
2023</row>
2024<row>
1971 <entry>sed</entry> 2025 <entry>sed</entry>
1972 <entry>4.2.2</entry> 2026 <entry>4.2.2</entry>
1973 <entry>Stream EDitor (text filtering utility).</entry> 2027 <entry>Stream EDitor (text filtering utility).</entry>
1974 <entry>GPL-3.0</entry> 2028 <entry>GPL-3.0</entry>
1975</row> 2029</row>
1976<row> 2030<row>
2031 <entry>seloader</entry>
2032 <entry>0.4.6</entry>
2033 <entry>The SELoader is designed to authenticate the non-PE files such as grub configuration initrd grub modules which cannot be verified by the MOK Verify Protocol registered by shim loader. In order to conveniently authenticate the PE file with gBS-&gt;LoadImage() and gBS-&gt;StartImage() the SELoader hooks EFI Security2 Architectural Protocol and employs MOK Verify Protocol to verify the PE file. If only UEFI Secure Boot is enabled the SELoader just simplily calls gBS-&gt;LoadImage() and gBS-&gt;StartImage() to allow BIOS to verify PE file. The SELoader publishes MOK2 Verify Protocol which provides a flexible interface to allow the bootloader to verify the file file buffer or memory buffer without knowing the file format. </entry>
2034 <entry>BSD-3-Clause</entry>
2035</row>
2036<row>
1977 <entry>serf</entry> 2037 <entry>serf</entry>
1978 <entry>1.3.9</entry> 2038 <entry>1.3.9</entry>
1979 <entry>High-Performance Asynchronous HTTP Client Library.</entry> 2039 <entry>High-Performance Asynchronous HTTP Client Library.</entry>
@@ -2010,6 +2070,12 @@ specific documentation.-->
2010 <entry>LGPL-2.0</entry> 2070 <entry>LGPL-2.0</entry>
2011</row> 2071</row>
2012<row> 2072<row>
2073 <entry>shim</entry>
2074 <entry>12</entry>
2075 <entry>shim is a trivial EFI application that when run attempts to open and execute another application. It will initially attempt to do this via the standard EFI LoadImage() and StartImage() calls. If these fail (because secure boot is enabled and the binary is not signed with an appropriate key for instance) it will then validate the binary against a built-in certificate. If this succeeds and if the binary or signing key are not blacklisted then shim will relocate and execute the binary.</entry>
2076 <entry>BSD-2-Clause</entry>
2077</row>
2078<row>
2013 <entry>simpleproxy</entry> 2079 <entry>simpleproxy</entry>
2014 <entry>1.0</entry> 2080 <entry>1.0</entry>
2015 <entry>Simpleproxy.</entry> 2081 <entry>Simpleproxy.</entry>
diff --git a/doc/book-enea-nfv-access-open-source/doc/licenses.xml b/doc/book-enea-nfv-access-open-source/doc/licenses.xml
index a90d10e..67efef7 100644
--- a/doc/book-enea-nfv-access-open-source/doc/licenses.xml
+++ b/doc/book-enea-nfv-access-open-source/doc/licenses.xml
@@ -492,6 +492,24 @@ specific documentation.-->
492 <entry>MIT</entry> 492 <entry>MIT</entry>
493</row> 493</row>
494<row> 494<row>
495 <entry>efibootmgr</entry>
496 <entry>0.15</entry>
497 <entry>Linux user-space application to modify the EFI Boot Manager.</entry>
498 <entry>GPL-2.0</entry>
499</row>
500<row>
501 <entry>efitools</entry>
502 <entry>1.7.0</entry>
503 <entry>From the EFI Tools package in the Linux user-space it's now possible to read and manipulate the UEFI signatures database via the new efi-readvar and efi-updatevar commands. Aside from needing efitools 1.4 the EFIVARFS file-system is also needed which was only introduced in the Linux 3.8 kernel. </entry>
504 <entry>GPL-2.0</entry>
505</row>
506<row>
507 <entry>efivar</entry>
508 <entry>0.31</entry>
509 <entry>efivar provides a simple command line interface to the UEFI variable facility</entry>
510 <entry>LGPL-2.1</entry>
511</row>
512<row>
495 <entry>element-vcpe</entry> 513 <entry>element-vcpe</entry>
496 <entry>4.0.3</entry> 514 <entry>4.0.3</entry>
497 <entry>vCPE(based on Element-ODM)</entry> 515 <entry>vCPE(based on Element-ODM)</entry>
@@ -852,6 +870,12 @@ specific documentation.-->
852 <entry>GPL-3.0</entry> 870 <entry>GPL-3.0</entry>
853</row> 871</row>
854<row> 872<row>
873 <entry>help2man</entry>
874 <entry>1.47.4</entry>
875 <entry>Program for creating simple man pages.</entry>
876 <entry>GPL-3.0</entry>
877</row>
878<row>
855 <entry>htop</entry> 879 <entry>htop</entry>
856 <entry>1.0.3</entry> 880 <entry>1.0.3</entry>
857 <entry>htop process monitor.</entry> 881 <entry>htop process monitor.</entry>
@@ -1122,6 +1146,12 @@ specific documentation.-->
1122 <entry>MIT</entry> 1146 <entry>MIT</entry>
1123</row> 1147</row>
1124<row> 1148<row>
1149 <entry>libfile-slurp-perl</entry>
1150 <entry>9999.19</entry>
1151 <entry>This module provides subroutines to read or write entire files with a simple call. It also has a subroutine for reading the list of filenames in a directory. </entry>
1152 <entry> Artistic-1.0, GPL-1.0</entry>
1153</row>
1154<row>
1125 <entry>libgcc</entry> 1155 <entry>libgcc</entry>
1126 <entry>7.3.0</entry> 1156 <entry>7.3.0</entry>
1127 <entry>GNU cc and gcc C compilers.</entry> 1157 <entry>GNU cc and gcc C compilers.</entry>
@@ -1248,6 +1278,12 @@ specific documentation.-->
1248 <entry>LGPL-2.1</entry> 1278 <entry>LGPL-2.1</entry>
1249</row> 1279</row>
1250<row> 1280<row>
1281 <entry>libsign</entry>
1282 <entry>0.3.2</entry>
1283 <entry>This project targets to provide a generic signing framework. This framework separates the signing request and signing process and correspondingly forms the so-called signlet and signaturelet. Each signaturelet only concerns about the details about how to construct the layout of a signature format and signlet only cares how to construct the signing request. </entry>
1284 <entry>BSD-3-Clause</entry>
1285</row>
1286<row>
1251 <entry>libsm</entry> 1287 <entry>libsm</entry>
1252 <entry>1.2.2</entry> 1288 <entry>1.2.2</entry>
1253 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry> 1289 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry>
@@ -1488,6 +1524,12 @@ specific documentation.-->
1488 <entry> GPL-2.0, LGPL-2.1</entry> 1524 <entry> GPL-2.0, LGPL-2.1</entry>
1489</row> 1525</row>
1490<row> 1526<row>
1527 <entry>mokutil</entry>
1528 <entry>0.3.0</entry>
1529 <entry>The utility to manipulate machines owner keys which managed in shim.</entry>
1530 <entry>GPL-3.0</entry>
1531</row>
1532<row>
1491 <entry>mozjs</entry> 1533 <entry>mozjs</entry>
1492 <entry>17.0.0</entry> 1534 <entry>17.0.0</entry>
1493 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry> 1535 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry>
@@ -1656,6 +1698,12 @@ specific documentation.-->
1656 <entry>MIT</entry> 1698 <entry>MIT</entry>
1657</row> 1699</row>
1658<row> 1700<row>
1701 <entry>packagegroup-efi-secure-boot</entry>
1702 <entry>1.0</entry>
1703 <entry>EFI Secure Boot packages for secure-environment.</entry>
1704 <entry>MIT</entry>
1705</row>
1706<row>
1659 <entry>packagegroup-enea-virtualization-4gusb-modems</entry> 1707 <entry>packagegroup-enea-virtualization-4gusb-modems</entry>
1660 <entry>1.0</entry> 1708 <entry>1.0</entry>
1661 <entry>Packagegroup for 4G usb modems.</entry> 1709 <entry>Packagegroup for 4G usb modems.</entry>
@@ -1968,12 +2016,24 @@ specific documentation.-->
1968 <entry>Apache-2.0</entry> 2016 <entry>Apache-2.0</entry>
1969</row> 2017</row>
1970<row> 2018<row>
2019 <entry>sbsigntool</entry>
2020 <entry>0.6</entry>
2021 <entry>Utilities for signing UEFI binaries for use with secure boot.</entry>
2022 <entry>GPL-3.0</entry>
2023</row>
2024<row>
1971 <entry>sed</entry> 2025 <entry>sed</entry>
1972 <entry>4.2.2</entry> 2026 <entry>4.2.2</entry>
1973 <entry>Stream EDitor (text filtering utility).</entry> 2027 <entry>Stream EDitor (text filtering utility).</entry>
1974 <entry>GPL-3.0</entry> 2028 <entry>GPL-3.0</entry>
1975</row> 2029</row>
1976<row> 2030<row>
2031 <entry>seloader</entry>
2032 <entry>0.4.6</entry>
2033 <entry>The SELoader is designed to authenticate the non-PE files such as grub configuration initrd grub modules which cannot be verified by the MOK Verify Protocol registered by shim loader. In order to conveniently authenticate the PE file with gBS-&gt;LoadImage() and gBS-&gt;StartImage() the SELoader hooks EFI Security2 Architectural Protocol and employs MOK Verify Protocol to verify the PE file. If only UEFI Secure Boot is enabled the SELoader just simplily calls gBS-&gt;LoadImage() and gBS-&gt;StartImage() to allow BIOS to verify PE file. The SELoader publishes MOK2 Verify Protocol which provides a flexible interface to allow the bootloader to verify the file file buffer or memory buffer without knowing the file format. </entry>
2034 <entry>BSD-3-Clause</entry>
2035</row>
2036<row>
1977 <entry>serf</entry> 2037 <entry>serf</entry>
1978 <entry>1.3.9</entry> 2038 <entry>1.3.9</entry>
1979 <entry>High-Performance Asynchronous HTTP Client Library.</entry> 2039 <entry>High-Performance Asynchronous HTTP Client Library.</entry>
@@ -2010,6 +2070,12 @@ specific documentation.-->
2010 <entry>LGPL-2.0</entry> 2070 <entry>LGPL-2.0</entry>
2011</row> 2071</row>
2012<row> 2072<row>
2073 <entry>shim</entry>
2074 <entry>12</entry>
2075 <entry>shim is a trivial EFI application that when run attempts to open and execute another application. It will initially attempt to do this via the standard EFI LoadImage() and StartImage() calls. If these fail (because secure boot is enabled and the binary is not signed with an appropriate key for instance) it will then validate the binary against a built-in certificate. If this succeeds and if the binary or signing key are not blacklisted then shim will relocate and execute the binary.</entry>
2076 <entry>BSD-2-Clause</entry>
2077</row>
2078<row>
2013 <entry>simpleproxy</entry> 2079 <entry>simpleproxy</entry>
2014 <entry>1.0</entry> 2080 <entry>1.0</entry>
2015 <entry>Simpleproxy.</entry> 2081 <entry>Simpleproxy.</entry>
diff --git a/doc/book-enea-nfv-access-sdk-open-source/doc/licenses.xml b/doc/book-enea-nfv-access-sdk-open-source/doc/licenses.xml
index a90d10e..67efef7 100644
--- a/doc/book-enea-nfv-access-sdk-open-source/doc/licenses.xml
+++ b/doc/book-enea-nfv-access-sdk-open-source/doc/licenses.xml
@@ -492,6 +492,24 @@ specific documentation.-->
492 <entry>MIT</entry> 492 <entry>MIT</entry>
493</row> 493</row>
494<row> 494<row>
495 <entry>efibootmgr</entry>
496 <entry>0.15</entry>
497 <entry>Linux user-space application to modify the EFI Boot Manager.</entry>
498 <entry>GPL-2.0</entry>
499</row>
500<row>
501 <entry>efitools</entry>
502 <entry>1.7.0</entry>
503 <entry>From the EFI Tools package in the Linux user-space it's now possible to read and manipulate the UEFI signatures database via the new efi-readvar and efi-updatevar commands. Aside from needing efitools 1.4 the EFIVARFS file-system is also needed which was only introduced in the Linux 3.8 kernel. </entry>
504 <entry>GPL-2.0</entry>
505</row>
506<row>
507 <entry>efivar</entry>
508 <entry>0.31</entry>
509 <entry>efivar provides a simple command line interface to the UEFI variable facility</entry>
510 <entry>LGPL-2.1</entry>
511</row>
512<row>
495 <entry>element-vcpe</entry> 513 <entry>element-vcpe</entry>
496 <entry>4.0.3</entry> 514 <entry>4.0.3</entry>
497 <entry>vCPE(based on Element-ODM)</entry> 515 <entry>vCPE(based on Element-ODM)</entry>
@@ -852,6 +870,12 @@ specific documentation.-->
852 <entry>GPL-3.0</entry> 870 <entry>GPL-3.0</entry>
853</row> 871</row>
854<row> 872<row>
873 <entry>help2man</entry>
874 <entry>1.47.4</entry>
875 <entry>Program for creating simple man pages.</entry>
876 <entry>GPL-3.0</entry>
877</row>
878<row>
855 <entry>htop</entry> 879 <entry>htop</entry>
856 <entry>1.0.3</entry> 880 <entry>1.0.3</entry>
857 <entry>htop process monitor.</entry> 881 <entry>htop process monitor.</entry>
@@ -1122,6 +1146,12 @@ specific documentation.-->
1122 <entry>MIT</entry> 1146 <entry>MIT</entry>
1123</row> 1147</row>
1124<row> 1148<row>
1149 <entry>libfile-slurp-perl</entry>
1150 <entry>9999.19</entry>
1151 <entry>This module provides subroutines to read or write entire files with a simple call. It also has a subroutine for reading the list of filenames in a directory. </entry>
1152 <entry> Artistic-1.0, GPL-1.0</entry>
1153</row>
1154<row>
1125 <entry>libgcc</entry> 1155 <entry>libgcc</entry>
1126 <entry>7.3.0</entry> 1156 <entry>7.3.0</entry>
1127 <entry>GNU cc and gcc C compilers.</entry> 1157 <entry>GNU cc and gcc C compilers.</entry>
@@ -1248,6 +1278,12 @@ specific documentation.-->
1248 <entry>LGPL-2.1</entry> 1278 <entry>LGPL-2.1</entry>
1249</row> 1279</row>
1250<row> 1280<row>
1281 <entry>libsign</entry>
1282 <entry>0.3.2</entry>
1283 <entry>This project targets to provide a generic signing framework. This framework separates the signing request and signing process and correspondingly forms the so-called signlet and signaturelet. Each signaturelet only concerns about the details about how to construct the layout of a signature format and signlet only cares how to construct the signing request. </entry>
1284 <entry>BSD-3-Clause</entry>
1285</row>
1286<row>
1251 <entry>libsm</entry> 1287 <entry>libsm</entry>
1252 <entry>1.2.2</entry> 1288 <entry>1.2.2</entry>
1253 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry> 1289 <entry>"The Session Management Library (SMlib) is a low-level \""C\"" language interface to XSMP. The purpose of the X Session Management Protocol (XSMP) is to provide a uniform mechanism for users to save and restore their sessions. A session is a group of clients each of which has a particular state."</entry>
@@ -1488,6 +1524,12 @@ specific documentation.-->
1488 <entry> GPL-2.0, LGPL-2.1</entry> 1524 <entry> GPL-2.0, LGPL-2.1</entry>
1489</row> 1525</row>
1490<row> 1526<row>
1527 <entry>mokutil</entry>
1528 <entry>0.3.0</entry>
1529 <entry>The utility to manipulate machines owner keys which managed in shim.</entry>
1530 <entry>GPL-3.0</entry>
1531</row>
1532<row>
1491 <entry>mozjs</entry> 1533 <entry>mozjs</entry>
1492 <entry>17.0.0</entry> 1534 <entry>17.0.0</entry>
1493 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry> 1535 <entry>SpiderMonkey is Mozilla's JavaScript engine written in C/C++.</entry>
@@ -1656,6 +1698,12 @@ specific documentation.-->
1656 <entry>MIT</entry> 1698 <entry>MIT</entry>
1657</row> 1699</row>
1658<row> 1700<row>
1701 <entry>packagegroup-efi-secure-boot</entry>
1702 <entry>1.0</entry>
1703 <entry>EFI Secure Boot packages for secure-environment.</entry>
1704 <entry>MIT</entry>
1705</row>
1706<row>
1659 <entry>packagegroup-enea-virtualization-4gusb-modems</entry> 1707 <entry>packagegroup-enea-virtualization-4gusb-modems</entry>
1660 <entry>1.0</entry> 1708 <entry>1.0</entry>
1661 <entry>Packagegroup for 4G usb modems.</entry> 1709 <entry>Packagegroup for 4G usb modems.</entry>
@@ -1968,12 +2016,24 @@ specific documentation.-->
1968 <entry>Apache-2.0</entry> 2016 <entry>Apache-2.0</entry>
1969</row> 2017</row>
1970<row> 2018<row>
2019 <entry>sbsigntool</entry>
2020 <entry>0.6</entry>
2021 <entry>Utilities for signing UEFI binaries for use with secure boot.</entry>
2022 <entry>GPL-3.0</entry>
2023</row>
2024<row>
1971 <entry>sed</entry> 2025 <entry>sed</entry>
1972 <entry>4.2.2</entry> 2026 <entry>4.2.2</entry>
1973 <entry>Stream EDitor (text filtering utility).</entry> 2027 <entry>Stream EDitor (text filtering utility).</entry>
1974 <entry>GPL-3.0</entry> 2028 <entry>GPL-3.0</entry>
1975</row> 2029</row>
1976<row> 2030<row>
2031 <entry>seloader</entry>
2032 <entry>0.4.6</entry>
2033 <entry>The SELoader is designed to authenticate the non-PE files such as grub configuration initrd grub modules which cannot be verified by the MOK Verify Protocol registered by shim loader. In order to conveniently authenticate the PE file with gBS-&gt;LoadImage() and gBS-&gt;StartImage() the SELoader hooks EFI Security2 Architectural Protocol and employs MOK Verify Protocol to verify the PE file. If only UEFI Secure Boot is enabled the SELoader just simplily calls gBS-&gt;LoadImage() and gBS-&gt;StartImage() to allow BIOS to verify PE file. The SELoader publishes MOK2 Verify Protocol which provides a flexible interface to allow the bootloader to verify the file file buffer or memory buffer without knowing the file format. </entry>
2034 <entry>BSD-3-Clause</entry>
2035</row>
2036<row>
1977 <entry>serf</entry> 2037 <entry>serf</entry>
1978 <entry>1.3.9</entry> 2038 <entry>1.3.9</entry>
1979 <entry>High-Performance Asynchronous HTTP Client Library.</entry> 2039 <entry>High-Performance Asynchronous HTTP Client Library.</entry>
@@ -2010,6 +2070,12 @@ specific documentation.-->
2010 <entry>LGPL-2.0</entry> 2070 <entry>LGPL-2.0</entry>
2011</row> 2071</row>
2012<row> 2072<row>
2073 <entry>shim</entry>
2074 <entry>12</entry>
2075 <entry>shim is a trivial EFI application that when run attempts to open and execute another application. It will initially attempt to do this via the standard EFI LoadImage() and StartImage() calls. If these fail (because secure boot is enabled and the binary is not signed with an appropriate key for instance) it will then validate the binary against a built-in certificate. If this succeeds and if the binary or signing key are not blacklisted then shim will relocate and execute the binary.</entry>
2076 <entry>BSD-2-Clause</entry>
2077</row>
2078<row>
2013 <entry>simpleproxy</entry> 2079 <entry>simpleproxy</entry>
2014 <entry>1.0</entry> 2080 <entry>1.0</entry>
2015 <entry>Simpleproxy.</entry> 2081 <entry>Simpleproxy.</entry>