diff options
author | David Howells <dhowells@redhat.com> | 2015-08-14 10:20:41 -0400 |
---|---|---|
committer | David Woodhouse <David.Woodhouse@intel.com> | 2015-08-14 11:06:13 -0400 |
commit | cfc411e7fff3e15cd6354ff69773907e2c9d1c0c (patch) | |
tree | c67e679c1c2bbe4a657ce58d60e995c63535952b /init | |
parent | 0e38c35815f50e5a347977d76fb5eb4c3bf020b5 (diff) |
Move certificate handling to its own directory
Move certificate handling out of the kernel/ directory and into a certs/
directory to get all the weird stuff in one place and move the generated
signing keys into this directory.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: David Woodhouse <David.Woodhouse@intel.com>
Diffstat (limited to 'init')
-rw-r--r-- | init/Kconfig | 39 |
1 files changed, 0 insertions, 39 deletions
diff --git a/init/Kconfig b/init/Kconfig index 5d1a703663ad..5526dfaac628 100644 --- a/init/Kconfig +++ b/init/Kconfig | |||
@@ -1740,31 +1740,6 @@ config MMAP_ALLOW_UNINITIALIZED | |||
1740 | 1740 | ||
1741 | See Documentation/nommu-mmap.txt for more information. | 1741 | See Documentation/nommu-mmap.txt for more information. |
1742 | 1742 | ||
1743 | config SYSTEM_TRUSTED_KEYRING | ||
1744 | bool "Provide system-wide ring of trusted keys" | ||
1745 | depends on KEYS | ||
1746 | help | ||
1747 | Provide a system keyring to which trusted keys can be added. Keys in | ||
1748 | the keyring are considered to be trusted. Keys may be added at will | ||
1749 | by the kernel from compiled-in data and from hardware key stores, but | ||
1750 | userspace may only add extra keys if those keys can be verified by | ||
1751 | keys already in the keyring. | ||
1752 | |||
1753 | Keys in this keyring are used by module signature checking. | ||
1754 | |||
1755 | config SYSTEM_TRUSTED_KEYS | ||
1756 | string "Additional X.509 keys for default system keyring" | ||
1757 | depends on SYSTEM_TRUSTED_KEYRING | ||
1758 | help | ||
1759 | If set, this option should be the filename of a PEM-formatted file | ||
1760 | containing trusted X.509 certificates to be included in the default | ||
1761 | system keyring. Any certificate used for module signing is implicitly | ||
1762 | also trusted. | ||
1763 | |||
1764 | NOTE: If you previously provided keys for the system keyring in the | ||
1765 | form of DER-encoded *.x509 files in the top-level build directory, | ||
1766 | those are no longer used. You will need to set this option instead. | ||
1767 | |||
1768 | config SYSTEM_DATA_VERIFICATION | 1743 | config SYSTEM_DATA_VERIFICATION |
1769 | def_bool n | 1744 | def_bool n |
1770 | select SYSTEM_TRUSTED_KEYRING | 1745 | select SYSTEM_TRUSTED_KEYRING |
@@ -1965,20 +1940,6 @@ config MODULE_SIG_HASH | |||
1965 | default "sha384" if MODULE_SIG_SHA384 | 1940 | default "sha384" if MODULE_SIG_SHA384 |
1966 | default "sha512" if MODULE_SIG_SHA512 | 1941 | default "sha512" if MODULE_SIG_SHA512 |
1967 | 1942 | ||
1968 | config MODULE_SIG_KEY | ||
1969 | string "File name or PKCS#11 URI of module signing key" | ||
1970 | default "signing_key.pem" | ||
1971 | depends on MODULE_SIG | ||
1972 | help | ||
1973 | Provide the file name of a private key/certificate in PEM format, | ||
1974 | or a PKCS#11 URI according to RFC7512. The file should contain, or | ||
1975 | the URI should identify, both the certificate and its corresponding | ||
1976 | private key. | ||
1977 | |||
1978 | If this option is unchanged from its default "signing_key.pem", | ||
1979 | then the kernel will automatically generate the private key and | ||
1980 | certificate as described in Documentation/module-signing.txt | ||
1981 | |||
1982 | config MODULE_COMPRESS | 1943 | config MODULE_COMPRESS |
1983 | bool "Compress modules on installation" | 1944 | bool "Compress modules on installation" |
1984 | depends on MODULES | 1945 | depends on MODULES |