[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1447777643-10777-1-git-send-email-jarkko.sakkinen@linux.intel.com>
Date: Tue, 17 Nov 2015 18:27:20 +0200
From: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
To: Peter Huewe <peterhuewe@....de>,
Marcel Selhorst <tpmdd@...horst.net>,
David Howells <dhowells@...hat.com>
Cc: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
James Morris <james.l.morris@...cle.com>,
Jason Gunthorpe <jgunthorpe@...idianresearch.com>,
keyrings@...r.kernel.org (open list:KEYS-ENCRYPTED),
linux-api@...r.kernel.org (open list:ABI/API),
linux-crypto@...r.kernel.org (open list:CRYPTO API),
linux-doc@...r.kernel.org (open list:DOCUMENTATION),
linux-kernel@...r.kernel.org (open list),
linux-security-module@...r.kernel.org (open list:KEYS-ENCRYPTED),
tpmdd-devel@...ts.sourceforge.net (moderated list:TPM DEVICE DRIVER)
Subject: [PATCH 0/2] TPM 2.0 trusted key features for v4.5
These are the remaining features to enable trusted keys for TPM 2.0 that very
not finished by the v4.4 merge window. These patches enable authorization
policy based sealing (like using PCRs together with a password for example or
something more complicated) with a user selected hash algorithm.
Jarkko Sakkinen (2):
keys, trusted: select hash algorithm for TPM2 chips
keys, trusted: seal with a policy
Documentation/security/keys-trusted-encrypted.txt | 31 ++++++----
crypto/hash_info.c | 2 +
drivers/char/tpm/tpm.h | 10 +++-
drivers/char/tpm/tpm2-cmd.c | 60 ++++++++++++++++---
include/crypto/hash_info.h | 3 +
include/keys/trusted-type.h | 4 ++
include/uapi/linux/hash_info.h | 1 +
security/keys/Kconfig | 1 +
security/keys/trusted.c | 73 ++++++++++++++++++++++-
9 files changed, 161 insertions(+), 24 deletions(-)
--
2.5.0
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists