[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1563449086-13183-1-git-send-email-sumit.garg@linaro.org>
Date: Thu, 18 Jul 2019 16:54:44 +0530
From: Sumit Garg <sumit.garg@...aro.org>
To: keyrings@...r.kernel.org, linux-integrity@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-security-module@...r.kernel.org
Cc: dhowells@...hat.com, herbert@...dor.apana.org.au,
davem@...emloft.net, jejb@...ux.ibm.com,
jarkko.sakkinen@...ux.intel.com, zohar@...ux.ibm.com,
jmorris@...ei.org, serge@...lyn.com, casey@...aufler-ca.com,
ard.biesheuvel@...aro.org, daniel.thompson@...aro.org,
linux-kernel@...r.kernel.org, tee-dev@...ts.linaro.org,
Sumit Garg <sumit.garg@...aro.org>
Subject: [RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
This patch-set is an outcome of discussion here [1].
I have tested this framework with trusted keys support provided via TEE
but I wasn't able to test it with a TPM device as I don't possess one. It
would be really helpful if others could test this patch-set using a TPM
device.
[1] https://www.mail-archive.com/linux-doc@vger.kernel.org/msg30591.html
Changes in v2:
Split trusted keys abstraction patch for ease of review.
Sumit Garg (2):
KEYS: trusted: create trusted keys subsystem
KEYS: trusted: Add generic trusted keys framework
crypto/asymmetric_keys/asym_tpm.c | 2 +-
include/keys/trusted-type.h | 45 +++
include/keys/{trusted.h => trusted_tpm.h} | 19 +-
security/keys/Makefile | 2 +-
security/keys/trusted-keys/Makefile | 7 +
.../keys/{trusted.c => trusted-keys/trusted-tpm.c} | 347 ++++-----------------
security/keys/trusted-keys/trusted.c | 343 ++++++++++++++++++++
7 files changed, 458 insertions(+), 307 deletions(-)
rename include/keys/{trusted.h => trusted_tpm.h} (85%)
create mode 100644 security/keys/trusted-keys/Makefile
rename security/keys/{trusted.c => trusted-keys/trusted-tpm.c} (77%)
create mode 100644 security/keys/trusted-keys/trusted.c
--
2.7.4
Powered by blists - more mailing lists