summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys/asymmetric_keys.h
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.vnet.ibm.com>2013-08-20 22:36:27 +0400
committerMimi Zohar <zohar@linux.vnet.ibm.com>2014-07-17 17:35:15 +0400
commit3be4beaf7c91ec9c6fefa5f11173af37113d10ae (patch)
treec4007c5fc0ddd6bccb279fbae8a5ee52f7af01de /crypto/asymmetric_keys/asymmetric_keys.h
parenta4e3b8d79a5c6d40f4a9703abf7fe3abcc6c3b8d (diff)
downloadlinux-3be4beaf7c91ec9c6fefa5f11173af37113d10ae.tar.xz
KEYS: verify a certificate is signed by a 'trusted' key
Only public keys, with certificates signed by an existing 'trusted' key on the system trusted keyring, should be added to a trusted keyring. This patch adds support for verifying a certificate's signature. This is derived from David Howells pkcs7_request_asymmetric_key() patch. Changelog v6: - on error free key - Dmitry - validate trust only for not already trusted keys - Dmitry - formatting cleanup Changelog: - define get_system_trusted_keyring() to fix kbuild issues Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
Diffstat (limited to 'crypto/asymmetric_keys/asymmetric_keys.h')
0 files changed, 0 insertions, 0 deletions