From 7228b66aaf723a623e578aa4db7d083bb39546c9 Mon Sep 17 00:00:00 2001 From: Mat Martineau Date: Thu, 13 Jul 2017 13:17:03 +0100 Subject: KEYS: Add documentation for asymmetric keyring restrictions Provide more specific examples of keyring restrictions as applied to X.509 signature chain verification. Signed-off-by: Mat Martineau Signed-off-by: David Howells Signed-off-by: James Morris --- Documentation/security/keys/core.rst | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'Documentation/security') diff --git a/Documentation/security/keys/core.rst b/Documentation/security/keys/core.rst index 0d831a7afe4f..1648fa80b3bf 100644 --- a/Documentation/security/keys/core.rst +++ b/Documentation/security/keys/core.rst @@ -894,6 +894,12 @@ The keyctl syscall functions are: To apply a keyring restriction the process must have Set Attribute permission and the keyring must not be previously restricted. + One application of restricted keyrings is to verify X.509 certificate + chains or individual certificate signatures using the asymmetric key type. + See Documentation/crypto/asymmetric-keys.txt for specific restrictions + applicable to the asymmetric key type. + + Kernel Services =============== -- cgit