KEYS: Allow unrestricted boot-time addition of keys to secondary keyring
authorDavid Howells <dhowells@redhat.com>
Fri, 5 May 2017 07:21:56 +0000 (08:21 +0100)
committerBen Hutchings <ben@decadent.org.uk>
Wed, 15 May 2019 22:07:16 +0000 (23:07 +0100)
commit01b0fc2d4a537c72e2123bae2a81dbbc6420c963
tree38032384c33d5988f424a82a1166cad60e4a2812
parent153feab094f6266d408fd0a7656367283db87d75
KEYS: Allow unrestricted boot-time addition of keys to secondary keyring

Allow keys to be added to the system secondary certificates keyring during
kernel initialisation in an unrestricted fashion.  Such keys are implicitly
trusted and don't have their trust chains checked on link.

This allows keys in the UEFI database to be added in secure boot mode for
the purposes of module signing.

Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0001-KEYS-Allow-unrestricted-boot-time-addition-of-keys-t.patch
certs/internal.h [new file with mode: 0644]
certs/system_keyring.c