linux-stable/certs
Stefan Berger 013177ccc4 certs: Trigger creation of RSA module signing key if it's not an RSA key
[ Upstream commit ea35e0d5df ]

Address a kbuild issue where a developer created an ECDSA key for signing
kernel modules and then builds an older version of the kernel, when bi-
secting the kernel for example, that does not support ECDSA keys.

If openssl is installed, trigger the creation of an RSA module signing
key if it is not an RSA key.

Fixes: cfc411e7ff ("Move certificate handling to its own directory")
Cc: David Howells <dhowells@redhat.com>
Cc: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Tested-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-09-15 09:47:29 +02:00
..
.gitignore
blacklist.c certs: Add EFI_CERT_X509_GUID support for dbx entries 2021-06-30 08:47:55 -04:00
blacklist.h certs: Add EFI_CERT_X509_GUID support for dbx entries 2021-06-30 08:47:55 -04:00
blacklist_hashes.c
blacklist_nohashes.c
common.c certs: Move load_system_certificate_list to a common function 2021-06-30 08:47:55 -04:00
common.h certs: Move load_system_certificate_list to a common function 2021-06-30 08:47:55 -04:00
Kconfig certs: Add EFI_CERT_X509_GUID support for dbx entries 2021-06-30 08:47:55 -04:00
Makefile certs: Trigger creation of RSA module signing key if it's not an RSA key 2021-09-15 09:47:29 +02:00
system_certificates.S
system_keyring.c certs: Move load_system_certificate_list to a common function 2021-06-30 08:47:55 -04:00