linuxboot/qubes
Trammell Hudson 39cb4031f4
TPM disk encryption keys for Qubes.
Issue #123: This streamline Qubes startup experience by
making it possible to have a single-password decryption.

Issue #29: The disk keys in `/secret.key` are passed to the systemd
in initramfs through `/etc/crypttab`, which is generated on each boot.
This is slow; need to look at alternate ways.

Issue #110: By using LVM instead of partitions it is now
possible to find the root filesystem in a consistent way.

Issue #80: LVM is now included in the ROM.
2017-04-03 17:18:11 -04:00
..
boot.sh TPM disk encryption keys for Qubes. 2017-04-03 17:18:11 -04:00
boot.sh.asc TPM disk encryption keys for Qubes. 2017-04-03 17:18:11 -04:00
initramfs-4.4.38-11.pvops.qubes.x86_64.img.asc Move Qubes startup script to /boot/boot.sh 2017-04-02 22:21:49 -04:00
vmlinuz-4.4.38-11.pvops.qubes.x86_64.asc Move Qubes startup script to /boot/boot.sh 2017-04-02 22:21:49 -04:00
xen-4.6.4.heads.asc Move Qubes startup script to /boot/boot.sh 2017-04-02 22:21:49 -04:00