KEYS: Allow unrestricted boot-time addition of keys to secondary keyring
authorDavid Howells <dhowells@redhat.com>
Fri, 5 May 2017 07:21:56 +0000 (08:21 +0100)
committerBen Hutchings <ben@decadent.org.uk>
Wed, 19 Jun 2019 22:16:58 +0000 (23:16 +0100)
commit5ab9c4ea102406f1993a70e5ef6ebf5b95fe625a
tree83a2f9e48997bdcc0a74b8dc53270c655f6c79be
parent04e1ac466b2ee2591b1793be2b273da77752ccac
KEYS: Allow unrestricted boot-time addition of keys to secondary keyring

Allow keys to be added to the system secondary certificates keyring during
kernel initialisation in an unrestricted fashion.  Such keys are implicitly
trusted and don't have their trust chains checked on link.

This allows keys in the UEFI database to be added in secure boot mode for
the purposes of module signing.

Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name 0001-KEYS-Allow-unrestricted-boot-time-addition-of-keys-t.patch
certs/internal.h [new file with mode: 0644]
certs/system_keyring.c