Message ID | 20230117171506.3888602-1-eric.snowberg@oracle.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp1886572wrn; Tue, 17 Jan 2023 09:32:16 -0800 (PST) X-Google-Smtp-Source: AMrXdXuNRk73rjjeiZsQ3IC6cvbFgmDKZWGS2yySdGn3XpOSGjXDxzSM+8O+snVrlm2jWQt0NnOg X-Received: by 2002:a05:6a20:12d4:b0:b8:bc6a:f696 with SMTP id v20-20020a056a2012d400b000b8bc6af696mr4904423pzg.14.1673976735677; Tue, 17 Jan 2023 09:32:15 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1673976735; cv=pass; d=google.com; s=arc-20160816; b=zwhBNArWlth8r0VXmEizjGqeuKUX5/uimttDhA/L5SNJ5PWQIXG29mddHZy7tFeRCA QsjEdEzhTk01IfjbK+AYwjHX/7FERURc9o+Jz7TnaQAKL4z7L7YMSD7FTvaZbn2LXGQl KQ4Kms8hS2XiqIFEzdtdBW0Bip3KlPDz7UN2J2vBHVX+qCVH5BwlTuN7dw3N/hsRG/zO xBIkZ59BnSakWX2mTNO8/nhC3cdvSSPcY006f1zJmQRhRQ4SByojJK5a2N22c5MbB0lZ XUfBKJEz7XQA7buxPE2paM7SSvjjurodGgWnP0CvIRz153XsJrT2voUfkYieOTTKJ9OK g4Yw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=or+alx80QTK1rdYob2DTBo+WqIGJBCgdFbNavw1SvXw=; b=BtGMR/grT8vJn1/S5HX984Yl7osGveRg982L+X4RSWSJThC1i54U5LQ3ns9e/+F1dN oKrm8SEwH+kuTdx8p0RMdpu/rP1dVmftI8OwlaViCPryXEARlCT/ZaQukQ4gbGKvYown mQvk5buRCElDIZF3OlgjtkuMmCVYKAtAGM+MgGMEtRwZ0AeePDKc2ZgvtGsrgMhP/c+E wpGCM6f+8KM4UzwXrfkCb57qCuDpsjfCKqVdgzpiR1/puBFm/1b9JtMPsbFq8xa3qKJW EgiBg9AfIQ7aRjPYmDcZZ96wJsRMRz02F4LeY2tuaDk/Qk2opBgFn9YcLYvbliKDJXML E/IQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2022-7-12 header.b=Jd2vzkeL; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=wzaz3ANB; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k14-20020a056a00134e00b0057627a6dde2si16099855pfu.374.2023.01.17.09.32.03; Tue, 17 Jan 2023 09:32:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2022-7-12 header.b=Jd2vzkeL; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=wzaz3ANB; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235011AbjAQRQy (ORCPT <rfc822;pfffrao@gmail.com> + 99 others); Tue, 17 Jan 2023 12:16:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43316 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234985AbjAQRQO (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 17 Jan 2023 12:16:14 -0500 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF5704C0D6; Tue, 17 Jan 2023 09:15:30 -0800 (PST) Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30HGSYSE010491; Tue, 17 Jan 2023 17:15:12 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : content-transfer-encoding : content-type : mime-version; s=corp-2022-7-12; bh=or+alx80QTK1rdYob2DTBo+WqIGJBCgdFbNavw1SvXw=; b=Jd2vzkeL6rfiE5GM/coqoalAfuPuW0w97fT/11JXGVK0KOYyaIgj111HGqvYE1OggYx7 4jWa+kNv38HoY5HdjTC8c4kmb8QCEVDN3IvcwTCcMlyvFLpur6db8KEQkoCvxTpLtXMk HSHRndzTXUS4TV2myKz1+1/mmVPT3SyhGapghZ9CqiVxITPxFrfpKPE3FpBRYyUmOrmc yLV6mKUuWggzXJEqmIhUzzWcdtGRcBXd1tj8sPRUEUqEhaZLsj0I7+ISaxVrCBBW5ibi WBvsrpZp3+MKhRT74Qi36y4snUKGIw98sqICC9wALbxlxKU1p/nMemkXKD5hltMGatqN ZA== Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3n3m0tnb3e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 17 Jan 2023 17:15:12 +0000 Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 30HG7awi004833; Tue, 17 Jan 2023 17:15:11 GMT Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2040.outbound.protection.outlook.com [104.47.57.40]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3n4qyywu08-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 17 Jan 2023 17:15:11 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AwWV2lGCw1GKyf5qKPMj+30Obv+wSRnGmoOd4Urf5ah4scFcSrEc6PLBXivA48Tkeyk80v7oBqyKrGLYrrrwueIZkGsofP+0qA6msJ34AvNdf0AnQ+Zs9KByDUR50Ux2myhKhgzUIjLTiDRz9y6BmQwrTJi1qy6PmgyXcOyDp4/AWETgQq0PPMkMJ4Cj0BJZzHthp/o5Y6vCoxe9/lWUW74OpxFxN+aLvBKWlgkLn4UqlKDbf5FYck4jtAKng35yyRrE+j2StxuImq49q5oMUKK9Rzc9qzQ4Ad8vcNQUJWUmx7grpiSF86mJ6bwJItmA81CZQpHdL0dBIKmj4hynpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=or+alx80QTK1rdYob2DTBo+WqIGJBCgdFbNavw1SvXw=; b=Eg4kZNUf+muBTbEUZZ147N5wgQeOcu5PKD+0vq8/VK7Oe7vIki9G3QoGnXyMDlvVYDb7yIgv6Ym/SiQ5bpqnnzTRugFTgJz4oP1Fun+u8DR0pS9ExZscC3athIhYJMGXVpEV7Hf2IZs2oObdEr51gezlaiJ4rDfQQ4xLa+VryVwSy9BuOmZKF7VE+YKv0aIVRV4WPc/eJFdL1ECyp5CwPmGdZHkdlwjwalRpAnrmWWpqxQAjVZg72WQjUv9aZYhSOiybO0tLJxnkIViIg4/i9FeFE1cVYFGi0xoEE4OeoZ3I+iBb5quagYl9PthTPHkqomu21gtmFjmGAwtYX8T+Ig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=or+alx80QTK1rdYob2DTBo+WqIGJBCgdFbNavw1SvXw=; b=wzaz3ANBB+Llnjvyo+oF0O6EEXFAf+/TPM5xBuzIq+rsGXOVe2Q9AqjkIdTXqyTdGjxwxYyaUTv+4CxlW51oclk0Hxp+e1GGT434QX1K8c55qwVFzYUGmtOufIUt7USf6ElylMJ/JpXUhJ0OFYkzUwBHnJKxjtTHxJhnGCLeZYU= Received: from CH2PR10MB4150.namprd10.prod.outlook.com (2603:10b6:610:ac::13) by CH3PR10MB6738.namprd10.prod.outlook.com (2603:10b6:610:149::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6002.10; Tue, 17 Jan 2023 17:15:04 +0000 Received: from CH2PR10MB4150.namprd10.prod.outlook.com ([fe80::7c66:aec8:b4fd:4554]) by CH2PR10MB4150.namprd10.prod.outlook.com ([fe80::7c66:aec8:b4fd:4554%9]) with mapi id 15.20.6002.011; Tue, 17 Jan 2023 17:15:04 +0000 From: Eric Snowberg <eric.snowberg@oracle.com> To: dhowells@redhat.com, jarkko@kernel.org, dwmw2@infradead.org Cc: keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, eric.snowberg@oracle.com, kanth.ghatraju@oracle.com, konrad.wilk@oracle.com Subject: [PATCH] certs: Reference revocation list for all keyrings Date: Tue, 17 Jan 2023 12:15:06 -0500 Message-Id: <20230117171506.3888602-1-eric.snowberg@oracle.com> X-Mailer: git-send-email 2.27.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SJ0PR03CA0246.namprd03.prod.outlook.com (2603:10b6:a03:3a0::11) To CH2PR10MB4150.namprd10.prod.outlook.com (2603:10b6:610:ac::13) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PR10MB4150:EE_|CH3PR10MB6738:EE_ X-MS-Office365-Filtering-Correlation-Id: c919589f-4e93-474c-1739-08daf8ae5f9c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH2PR10MB4150.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(136003)(396003)(346002)(366004)(39860400002)(376002)(451199015)(36756003)(86362001)(8936002)(41300700001)(44832011)(5660300002)(38100700002)(66556008)(6486002)(83380400001)(107886003)(478600001)(186003)(6512007)(6506007)(66476007)(316002)(8676002)(66946007)(4326008)(2616005)(1076003)(2906002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: c919589f-4e93-474c-1739-08daf8ae5f9c X-MS-Exchange-CrossTenant-AuthSource: CH2PR10MB4150.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Jan 2023 17:15:04.0752 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: uZWxiCWJd73CFQFmIJSGEdUGshHusmLPfCaYdmPv7cBCJX76+nmAOaLm6sOF8Xvl8P2PilZyQAyHrZXnXXDh8Th2BNEw6HBcHp4NPquawms= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR10MB6738 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.923,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-17_08,2023-01-17_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 malwarescore=0 phishscore=0 suspectscore=0 spamscore=0 bulkscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301170138 X-Proofpoint-GUID: eMKCYlhN0uhOrnCkXSoXlZ6n6f1s8sPo X-Proofpoint-ORIG-GUID: eMKCYlhN0uhOrnCkXSoXlZ6n6f1s8sPo X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755291829260660398?= X-GMAIL-MSGID: =?utf-8?q?1755291829260660398?= |
Series |
certs: Reference revocation list for all keyrings
|
|
Commit Message
Eric Snowberg
Jan. 17, 2023, 5:15 p.m. UTC
Systems booted with shim have a Forbidden Signature Database called mokx.
During boot, hashes and certs contained within the mokx are loaded into the
blacklist keyring. When calling verify_pkcs7_message_sig the contents of
the blacklist keyring (or revocation list) are referenced when validating
keys on the platform keyring. Currently, when validating against the
secondary or builtin keyrings, the revocation list is not referenced. Move
up the check to allow the revocation list to be used with all keyrings,
including the secondary and builtin, allowing the system owner to take
corrective action should a vulnerability be found within keys contained
within either keyring.
Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com>
---
certs/system_keyring.c | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
Comments
On Tue, Jan 17, 2023 at 12:15:06PM -0500, Eric Snowberg wrote: > Systems booted with shim have a Forbidden Signature Database called mokx. > During boot, hashes and certs contained within the mokx are loaded into the > blacklist keyring. When calling verify_pkcs7_message_sig the contents of > the blacklist keyring (or revocation list) are referenced when validating > keys on the platform keyring. Currently, when validating against the > secondary or builtin keyrings, the revocation list is not referenced. Move > up the check to allow the revocation list to be used with all keyrings, > including the secondary and builtin, allowing the system owner to take > corrective action should a vulnerability be found within keys contained > within either keyring. > > Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com> > --- > certs/system_keyring.c | 12 ++++++------ > 1 file changed, 6 insertions(+), 6 deletions(-) > > diff --git a/certs/system_keyring.c b/certs/system_keyring.c > index 5042cc54fa5e..865a0510fdeb 100644 > --- a/certs/system_keyring.c > +++ b/certs/system_keyring.c > @@ -243,6 +243,12 @@ int verify_pkcs7_message_sig(const void *data, size_t len, > if (ret < 0) > goto error; > > + ret = is_key_on_revocation_list(pkcs7); > + if (ret != -ENOKEY) { > + pr_devel("PKCS#7 key is on revocation list\n"); > + goto error; > + } > + > if (!trusted_keys) { > trusted_keys = builtin_trusted_keys; > } else if (trusted_keys == VERIFY_USE_SECONDARY_KEYRING) { > @@ -262,12 +268,6 @@ int verify_pkcs7_message_sig(const void *data, size_t len, > pr_devel("PKCS#7 platform keyring is not available\n"); > goto error; > } > - > - ret = is_key_on_revocation_list(pkcs7); > - if (ret != -ENOKEY) { > - pr_devel("PKCS#7 platform key is on revocation list\n"); > - goto error; > - } > } > ret = pkcs7_validate_trust(pkcs7, trusted_keys); > if (ret < 0) { > -- > 2.27.0 > Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org> BR, Jarkko
On Sat, Jan 21, 2023 at 03:20:46AM +0000, Jarkko Sakkinen wrote: > On Tue, Jan 17, 2023 at 12:15:06PM -0500, Eric Snowberg wrote: > > Systems booted with shim have a Forbidden Signature Database called mokx. > > During boot, hashes and certs contained within the mokx are loaded into the > > blacklist keyring. When calling verify_pkcs7_message_sig the contents of > > the blacklist keyring (or revocation list) are referenced when validating > > keys on the platform keyring. Currently, when validating against the > > secondary or builtin keyrings, the revocation list is not referenced. Move > > up the check to allow the revocation list to be used with all keyrings, > > including the secondary and builtin, allowing the system owner to take > > corrective action should a vulnerability be found within keys contained > > within either keyring. > > > > Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com> > > --- > > certs/system_keyring.c | 12 ++++++------ > > 1 file changed, 6 insertions(+), 6 deletions(-) > > > > diff --git a/certs/system_keyring.c b/certs/system_keyring.c > > index 5042cc54fa5e..865a0510fdeb 100644 > > --- a/certs/system_keyring.c > > +++ b/certs/system_keyring.c > > @@ -243,6 +243,12 @@ int verify_pkcs7_message_sig(const void *data, size_t len, > > if (ret < 0) > > goto error; > > > > + ret = is_key_on_revocation_list(pkcs7); > > + if (ret != -ENOKEY) { > > + pr_devel("PKCS#7 key is on revocation list\n"); > > + goto error; > > + } > > + > > if (!trusted_keys) { > > trusted_keys = builtin_trusted_keys; > > } else if (trusted_keys == VERIFY_USE_SECONDARY_KEYRING) { > > @@ -262,12 +268,6 @@ int verify_pkcs7_message_sig(const void *data, size_t len, > > pr_devel("PKCS#7 platform keyring is not available\n"); > > goto error; > > } > > - > > - ret = is_key_on_revocation_list(pkcs7); > > - if (ret != -ENOKEY) { > > - pr_devel("PKCS#7 platform key is on revocation list\n"); > > - goto error; > > - } > > } > > ret = pkcs7_validate_trust(pkcs7, trusted_keys); > > if (ret < 0) { > > -- > > 2.27.0 > > > > Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org> Should I pick this? BR, Jarkko
On Tue, 2023-01-17 at 12:15 -0500, Eric Snowberg wrote: > Systems booted with shim have a Forbidden Signature Database called mokx. > During boot, hashes and certs contained within the mokx are loaded into the > blacklist keyring. When calling verify_pkcs7_message_sig the contents of > the blacklist keyring (or revocation list) are referenced when validating > keys on the platform keyring. Currently, when validating against the > secondary or builtin keyrings, the revocation list is not referenced. Move > up the check to allow the revocation list to be used with all keyrings, > including the secondary and builtin, allowing the system owner to take > corrective action should a vulnerability be found within keys contained > within either keyring. > > Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 5042cc54fa5e..865a0510fdeb 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -243,6 +243,12 @@ int verify_pkcs7_message_sig(const void *data, size_t len, if (ret < 0) goto error; + ret = is_key_on_revocation_list(pkcs7); + if (ret != -ENOKEY) { + pr_devel("PKCS#7 key is on revocation list\n"); + goto error; + } + if (!trusted_keys) { trusted_keys = builtin_trusted_keys; } else if (trusted_keys == VERIFY_USE_SECONDARY_KEYRING) { @@ -262,12 +268,6 @@ int verify_pkcs7_message_sig(const void *data, size_t len, pr_devel("PKCS#7 platform keyring is not available\n"); goto error; } - - ret = is_key_on_revocation_list(pkcs7); - if (ret != -ENOKEY) { - pr_devel("PKCS#7 platform key is on revocation list\n"); - goto error; - } } ret = pkcs7_validate_trust(pkcs7, trusted_keys); if (ret < 0) {