From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
To: tpmdd-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org
Cc: peterhuewe@gmx.de, gregkh@linuxfoundation.org,
jgunthorpe@obsidianresearch.com,
"open list:KEYS-TRUSTED" <keyrings@vger.kernel.org>,
"open list:KEYS-TRUSTED" <linux-security-module@vger.kernel.org>,
kevin.strasser@intel.com
Subject: Re: [PATCH v2 0/4] Basic trusted keys support for TPM 2.0
Date: Tue, 13 Oct 2015 11:53:59 +0300 [thread overview]
Message-ID: <20151013085359.GB4526@intel.com> (raw)
In-Reply-To: <1444723889-11650-1-git-send-email-jarkko.sakkinen@linux.intel.com>
On Tue, Oct 13, 2015 at 11:11:21AM +0300, Jarkko Sakkinen wrote:
> Basic trusted keys support: auth value and SHA256.
>
> v2:
>
> * Removed all the changes that modify the existing functions to use
> the new struct tpm_buf. These changes should be done separately from
> this patch set as they require separate QA + review.
> * 'keyhandle=' is now required for TPM2. Makes sense to always state
> the sealing key because there's no any fixed keys on the chip (thanks
> to Andreas Fuchs for this comment).
> * I updated tpm_buf to a be heap based structure. Now there's one full
> page of memory for variable sized messages. Also the stack is greatly
> reduced.
The basic test that I did was:
ID=$(keyctl add trusted kmk "new 32 keyhandle=0x80000000" @u)
keyctl pipe $ID > blob.hex
keyctl clear @u
keyctl add trusted kmk "load `cat blob.hex` keyhandle=0x80000000" @u
keyctl clear @u
I also checked that the code fails with -EINVAL when keyhandle is not
given.
For generating a sealing key I used tpm2-root-key script from
https://github.com/jsakkine/linux-tpm2
I think the code is in the shape that it is ready to be pulled but some
tested-by's are needed.
> Jarkko Sakkinen (4):
> tpm: introduce tpm_buf
> keys, trusted: move struct trusted_key_options to trusted-type.h
> tpm: seal/unseal for TPM 2.0
> keys, trusted: seal/unseal with TPM 2.0 chips
>
> drivers/char/tpm/tpm-interface.c | 76 ++++++++++++
> drivers/char/tpm/tpm.h | 110 +++++++++++++++++
> drivers/char/tpm/tpm2-cmd.c | 250 ++++++++++++++++++++++++++++++++++++++-
> include/keys/trusted-type.h | 14 ++-
> include/linux/tpm.h | 26 ++++
> security/keys/trusted.c | 36 +++++-
> security/keys/trusted.h | 11 --
> 7 files changed, 507 insertions(+), 16 deletions(-)
>
> --
> 2.5.0
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2015-10-13 8:54 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-10-13 8:11 [PATCH v2 0/4] Basic trusted keys support for TPM 2.0 Jarkko Sakkinen
2015-10-13 8:11 ` [PATCH v2 1/4] tpm: introduce tpm_buf Jarkko Sakkinen
2015-10-13 8:11 ` [PATCH v2 2/4] keys, trusted: move struct trusted_key_options to trusted-type.h Jarkko Sakkinen
2015-10-13 8:11 ` [PATCH v2 3/4] tpm: seal/unseal for TPM 2.0 Jarkko Sakkinen
2015-10-13 8:11 ` [PATCH v2 4/4] keys, trusted: seal/unseal with TPM 2.0 chips Jarkko Sakkinen
2015-10-13 8:53 ` Jarkko Sakkinen [this message]
2015-10-13 17:41 ` [PATCH v2 0/4] Basic trusted keys support for TPM 2.0 Jason Gunthorpe
2015-10-13 19:25 ` Jarkko Sakkinen
2015-10-16 16:21 ` David Howells
2015-10-16 18:30 ` Jarkko Sakkinen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20151013085359.GB4526@intel.com \
--to=jarkko.sakkinen@linux.intel.com \
--cc=gregkh@linuxfoundation.org \
--cc=jgunthorpe@obsidianresearch.com \
--cc=kevin.strasser@intel.com \
--cc=keyrings@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=peterhuewe@gmx.de \
--cc=tpmdd-devel@lists.sourceforge.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox