diff options
author | David Howells <dhowells@redhat.com> | 2019-06-26 21:02:32 +0100 |
---|---|---|
committer | David Howells <dhowells@redhat.com> | 2019-06-26 21:02:32 +0100 |
commit | dcf49dbc8077e278ddd1bc7298abc781496e8a08 (patch) | |
tree | e187765e6336fefc35d83f5b75b7cbe1d4ec194a /certs | |
parent | 355ef8e15885020da88f5ba2d85ce42b1d01f537 (diff) | |
download | linux-dcf49dbc8077e278ddd1bc7298abc781496e8a08.tar.gz linux-dcf49dbc8077e278ddd1bc7298abc781496e8a08.tar.bz2 linux-dcf49dbc8077e278ddd1bc7298abc781496e8a08.zip |
keys: Add a 'recurse' flag for keyring searches
Add a 'recurse' flag for keyring searches so that the flag can be omitted
and recursion disabled, thereby allowing just the nominated keyring to be
searched and none of the children.
Signed-off-by: David Howells <dhowells@redhat.com>
Diffstat (limited to 'certs')
-rw-r--r-- | certs/blacklist.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/certs/blacklist.c b/certs/blacklist.c index 3a507b9e2568..181cb7fa9540 100644 --- a/certs/blacklist.c +++ b/certs/blacklist.c @@ -128,7 +128,7 @@ int is_hash_blacklisted(const u8 *hash, size_t hash_len, const char *type) *p = 0; kref = keyring_search(make_key_ref(blacklist_keyring, true), - &key_type_blacklist, buffer); + &key_type_blacklist, buffer, false); if (!IS_ERR(kref)) { key_ref_put(kref); ret = -EKEYREJECTED; |