[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3714194.1617275498@warthog.procyon.org.uk>
Date: Thu, 01 Apr 2021 12:11:38 +0100
From: David Howells <dhowells@...hat.com>
To: Richard Weinberger <richard.weinberger@...il.com>
Cc: dhowells@...hat.com, Ahmad Fatoum <a.fatoum@...gutronix.de>,
Jarkko Sakkinen <jarkko@...nel.org>,
Horia Geantă <horia.geanta@....com>,
Mimi Zohar <zohar@...ux.ibm.com>,
Aymen Sghaier <aymen.sghaier@....com>,
Herbert Xu <herbert@...dor.apana.org.au>,
"David S. Miller" <davem@...emloft.net>,
James Bottomley <jejb@...ux.ibm.com>, kernel@...gutronix.de,
James Morris <jmorris@...ei.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
Steffen Trumtrar <s.trumtrar@...gutronix.de>,
Udit Agarwal <udit.agarwal@....com>,
Jan Luebbe <j.luebbe@...gutronix.de>,
David Gstir <david@...ma-star.at>,
Franck LENORMAND <franck.lenormand@....com>,
Sumit Garg <sumit.garg@...aro.org>,
linux-integrity@...r.kernel.org, keyrings@...r.kernel.org,
Linux Crypto Mailing List <linux-crypto@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
LSM <linux-security-module@...r.kernel.org>
Subject: Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger <richard.weinberger@...il.com> wrote:
> On Wed, Mar 17, 2021 at 3:08 PM Ahmad Fatoum <a.fatoum@...gutronix.de> wrote:
> > keyctl add trusted $KEYNAME "load $(cat ~/kmk.blob)" @s
>
> Is there a reason why we can't pass the desired backend name in the
> trusted key parameters?
> e.g.
> keyctl add trusted $KEYNAME "backendtype caam load $(cat ~/kmk.blob)" @s
I wonder... Does it make sense to add a new variant of the add_key() and
keyctl_instantiate() syscalls that takes an additional parameter string,
separate from the payload blob?
key_serial_t add_key2(const char *type, const char *description,
const char *params,
const void *payload, size_t plen,
key_serial_t keyring);
which could then by used, say:
keyctl add --payload=~/kmk.blob trusted $KEYNAME "backendtype caam load" @s
This would then appear in
struct key_preparsed_payload {
const char *orig_description;
char *description;
char *params; <---
union key_payload payload;
const void *data;
size_t datalen;
size_t quotalen;
time64_t expiry;
};
params would then be NULL for add_key().
If add_key2() is not available, the --payload param gets concatenated to the
parameters string.
Might be too complicated, I guess. Though it might make sense just to do the
concatenation inside the keyctl program.
David
Powered by blists - more mailing lists