OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-213
/
include
/
keys
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:15 AM
rwxr-xr-x
📄
asymmetric-parser.h
1.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
asymmetric-subtype.h
1.6 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
asymmetric-type.h
2.87 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
big_key-type.h
943 bytes
06/16/2023 05:32:39 PM
rw-r--r--
📄
ceph-type.h
162 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dns_resolver-type.h
689 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
encrypted-type.h
1.25 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
keyring-type.h
544 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
request_key_auth-type.h
931 bytes
06/16/2023 05:32:39 PM
rw-r--r--
📄
rxrpc-type.h
4.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
system_keyring.h
2.13 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
trusted-type.h
1.17 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
user-type.h
2.12 KB
06/16/2023 05:32:39 PM
rw-r--r--
Editing: system_keyring.h
Close
/* System keyring containing trusted public keys. * * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved. * Written by David Howells (dhowells@redhat.com) * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public Licence * as published by the Free Software Foundation; either version * 2 of the Licence, or (at your option) any later version. */ #ifndef _KEYS_SYSTEM_KEYRING_H #define _KEYS_SYSTEM_KEYRING_H #include <linux/key.h> #ifdef CONFIG_SYSTEM_TRUSTED_KEYRING extern int restrict_link_by_builtin_trusted(struct key *keyring, const struct key_type *type, const union key_payload *payload, struct key *restriction_key); #else #define restrict_link_by_builtin_trusted restrict_link_reject #endif #ifdef CONFIG_SECONDARY_TRUSTED_KEYRING extern int restrict_link_by_builtin_and_secondary_trusted( struct key *keyring, const struct key_type *type, const union key_payload *payload, struct key *restriction_key); #else #define restrict_link_by_builtin_and_secondary_trusted restrict_link_by_builtin_trusted #endif extern struct pkcs7_message *pkcs7; #ifdef CONFIG_SYSTEM_BLACKLIST_KEYRING extern int mark_hash_blacklisted(const char *hash); extern int is_hash_blacklisted(const u8 *hash, size_t hash_len, const char *type); #else static inline int is_hash_blacklisted(const u8 *hash, size_t hash_len, const char *type) { return 0; } #endif #ifdef CONFIG_SYSTEM_REVOCATION_LIST extern int add_key_to_revocation_list(const char *data, size_t size); extern int is_key_on_revocation_list(struct pkcs7_message *pkcs7); #else static inline int add_key_to_revocation_list(const char *data, size_t size) { return 0; } static inline int is_key_on_revocation_list(struct pkcs7_message *pkcs7) { return -ENOKEY; } #endif #ifdef CONFIG_IMA_BLACKLIST_KEYRING extern struct key *ima_blacklist_keyring; static inline struct key *get_ima_blacklist_keyring(void) { return ima_blacklist_keyring; } #else static inline struct key *get_ima_blacklist_keyring(void) { return NULL; } #endif /* CONFIG_IMA_BLACKLIST_KEYRING */ #endif /* _KEYS_SYSTEM_KEYRING_H */