diff options
| author | Mat Martineau <mathew.j.martineau@linux.intel.com> | 2016-08-30 14:33:13 -0400 |
|---|---|---|
| committer | Mat Martineau <mathew.j.martineau@linux.intel.com> | 2017-04-03 13:24:56 -0400 |
| commit | aaf66c883813f0078e3dafe7d20d1461321ac14f (patch) | |
| tree | 5198162cc55309f8653a0a333c2cbdffc64debad /Documentation/security | |
| parent | 469ff8f7d46d75b36de68a0411a2ce80109ad00b (diff) | |
KEYS: Split role of the keyring pointer for keyring restrict functions
The first argument to the restrict_link_func_t functions was a keyring
pointer. These functions are called by the key subsystem with this
argument set to the destination keyring, but restrict_link_by_signature
expects a pointer to the relevant trusted keyring.
Restrict functions may need something other than a single struct key
pointer to allow or reject key linkage, so the data used to make that
decision (such as the trust keyring) is moved to a new, fourth
argument. The first argument is now always the destination keyring.
Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Diffstat (limited to 'Documentation/security')
| -rw-r--r-- | Documentation/security/keys.txt | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/Documentation/security/keys.txt b/Documentation/security/keys.txt index 4502237b12a7..bb575ab80207 100644 --- a/Documentation/security/keys.txt +++ b/Documentation/security/keys.txt | |||
| @@ -1054,10 +1054,10 @@ payload contents" for more information. | |||
| 1054 | can be verified by a key the kernel already has. | 1054 | can be verified by a key the kernel already has. |
| 1055 | 1055 | ||
| 1056 | When called, the restriction function will be passed the keyring being | 1056 | When called, the restriction function will be passed the keyring being |
| 1057 | added to, the key flags value and the type and payload of the key being | 1057 | added to, the key type, the payload of the key being added, and data to be |
| 1058 | added. Note that when a new key is being created, this is called between | 1058 | used in the restriction check. Note that when a new key is being created, |
| 1059 | payload preparsing and actual key creation. The function should return 0 | 1059 | this is called between payload preparsing and actual key creation. The |
| 1060 | to allow the link or an error to reject it. | 1060 | function should return 0 to allow the link or an error to reject it. |
| 1061 | 1061 | ||
| 1062 | A convenience function, restrict_link_reject, exists to always return | 1062 | A convenience function, restrict_link_reject, exists to always return |
| 1063 | -EPERM to in this case. | 1063 | -EPERM to in this case. |
