diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2013-08-20 22:36:27 +0400 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2014-07-17 17:35:15 +0400 |
commit | 3be4beaf7c91ec9c6fefa5f11173af37113d10ae (patch) | |
tree | c4007c5fc0ddd6bccb279fbae8a5ee52f7af01de /include/keys | |
parent | a4e3b8d79a5c6d40f4a9703abf7fe3abcc6c3b8d (diff) | |
download | linux-3be4beaf7c91ec9c6fefa5f11173af37113d10ae.tar.xz |
KEYS: verify a certificate is signed by a 'trusted' key
Only public keys, with certificates signed by an existing
'trusted' key on the system trusted keyring, should be added
to a trusted keyring. This patch adds support for verifying
a certificate's signature.
This is derived from David Howells pkcs7_request_asymmetric_key() patch.
Changelog v6:
- on error free key - Dmitry
- validate trust only for not already trusted keys - Dmitry
- formatting cleanup
Changelog:
- define get_system_trusted_keyring() to fix kbuild issues
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
Diffstat (limited to 'include/keys')
-rw-r--r-- | include/keys/system_keyring.h | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/include/keys/system_keyring.h b/include/keys/system_keyring.h index 8dabc399bd1d..72665eb80692 100644 --- a/include/keys/system_keyring.h +++ b/include/keys/system_keyring.h @@ -17,7 +17,15 @@ #include <linux/key.h> extern struct key *system_trusted_keyring; - +static inline struct key *get_system_trusted_keyring(void) +{ + return system_trusted_keyring; +} +#else +static inline struct key *get_system_trusted_keyring(void) +{ + return NULL; +} #endif #endif /* _KEYS_SYSTEM_KEYRING_H */ |