KEYS: Allow unrestricted boot-time addition of keys to secondary keyring
authorDavid Howells <dhowells@redhat.com>
Fri, 5 May 2017 07:21:56 +0000 (08:21 +0100)
committerSalvatore Bonaccorso <carnil@debian.org>
Thu, 18 Jul 2019 22:23:17 +0000 (23:23 +0100)
commit15e8fbbb8d13b0e6336fe41eb1dad1f61b83039d
tree70e5046789b5c172fbae0f0205878134219c57c9
parent7bcb219cca3cac0e2d0cd3c5b7833ed00cb5e45e
KEYS: Allow unrestricted boot-time addition of keys to secondary keyring

Allow keys to be added to the system secondary certificates keyring during
kernel initialisation in an unrestricted fashion.  Such keys are implicitly
trusted and don't have their trust chains checked on link.

This allows keys in the UEFI database to be added in secure boot mode for
the purposes of module signing.

Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0001-KEYS-Allow-unrestricted-boot-time-addition-of-keys-t.patch
certs/internal.h [new file with mode: 0644]
certs/system_keyring.c