diff options
author | Dominik Sliwa <dominik.sliwa@toradex.com> | 2018-09-14 10:41:12 +0200 |
---|---|---|
committer | Dominik Sliwa <dominik.sliwa@toradex.com> | 2018-09-14 10:41:12 +0200 |
commit | 6142e8731c3e5b9c9f96d9af83052b9787604b39 (patch) | |
tree | 45b17840142b10874bf8974a74152eb3f9021e82 /backport-include/keys |
initial commit
Generated againts 4.18 kernel source with
git backports 0795d050c62e04c7c4fd7fcb554756e6adb4ec64
Signed-off-by: Dominik Sliwa <dominik.sliwa@toradex.com>
Diffstat (limited to 'backport-include/keys')
-rw-r--r-- | backport-include/keys/asymmetric-type.h | 35 | ||||
-rw-r--r-- | backport-include/keys/system_keyring.h | 10 |
2 files changed, 45 insertions, 0 deletions
diff --git a/backport-include/keys/asymmetric-type.h b/backport-include/keys/asymmetric-type.h new file mode 100644 index 0000000..5744de9 --- /dev/null +++ b/backport-include/keys/asymmetric-type.h @@ -0,0 +1,35 @@ +#ifndef __BP_ASYMMETRIC_TYPE_H +#define __BP_ASYMMETRIC_TYPE_H +#ifdef CPTCFG_BPAUTO_BUILD_SYSTEM_DATA_VERIFICATION + +#include <linux/string.h> + +struct asymmetric_key_id { + unsigned short len; + unsigned char data[]; +}; + +struct asymmetric_key_ids { + struct asymmetric_key_id *id[2]; +}; + +static inline bool asymmetric_key_id_same(const struct asymmetric_key_id *kid1, + const struct asymmetric_key_id *kid2) +{ + if (!kid1 || !kid2) + return false; + if (kid1->len != kid2->len) + return false; + return memcmp(kid1->data, kid2->data, kid1->len) == 0; +} + +extern struct asymmetric_key_id * +asymmetric_key_generate_id(const void *val_1, size_t len_1, + const void *val_2, size_t len_2); + +extern struct key *find_asymmetric_key(struct key *keyring, + const struct asymmetric_key_id *id_0, + const struct asymmetric_key_id *id_1, + bool partial); +#endif +#endif /* __BP_ASYMMETRIC_TYPE_H */ diff --git a/backport-include/keys/system_keyring.h b/backport-include/keys/system_keyring.h new file mode 100644 index 0000000..00d2bff --- /dev/null +++ b/backport-include/keys/system_keyring.h @@ -0,0 +1,10 @@ +#ifndef __BP_SYSTEM_KEYRING_H +#define __BP_SYSTEM_KEYRING_H +#ifndef CPTCFG_BPAUTO_BUILD_SYSTEM_DATA_VERIFICATION +#include_next <keys/system_keyring.h> +#else +#include <linux/key.h> + +#define is_hash_blacklisted(...) 0 +#endif /* CPTCFG_BPAUTO_BUILD_SYSTEM_DATA_VERIFICATION */ +#endif /* __BP_SYSTEM_KEYRING_H */ |