[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFA6WYNjS=1JsAPfh=j8D6HUn9rCEADyZxtWvYWuvbz_FsVbTQ@mail.gmail.com>
Date: Thu, 1 Apr 2021 19:42:49 +0530
From: Sumit Garg <sumit.garg@...aro.org>
To: Richard Weinberger <richard@....at>
Cc: Ahmad Fatoum <a.fatoum@...gutronix.de>,
Jarkko Sakkinen <jarkko@...nel.org>,
horia geanta <horia.geanta@....com>,
Mimi Zohar <zohar@...ux.ibm.com>,
aymen sghaier <aymen.sghaier@....com>,
Herbert Xu <herbert@...dor.apana.org.au>,
davem <davem@...emloft.net>,
James Bottomley <jejb@...ux.ibm.com>,
kernel <kernel@...gutronix.de>,
David Howells <dhowells@...hat.com>,
James Morris <jmorris@...ei.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
Steffen Trumtrar <s.trumtrar@...gutronix.de>,
Udit Agarwal <udit.agarwal@....com>,
Jan Luebbe <j.luebbe@...gutronix.de>,
david <david@...ma-star.at>,
Franck Lenormand <franck.lenormand@....com>,
linux-integrity <linux-integrity@...r.kernel.org>,
"open list, ASYMMETRIC KEYS" <keyrings@...r.kernel.org>,
Linux Crypto Mailing List <linux-crypto@...r.kernel.org>,
linux-kernel <linux-kernel@...r.kernel.org>,
LSM <linux-security-module@...r.kernel.org>
Subject: Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP
CAAM-based trusted keys
On Thu, 1 Apr 2021 at 19:29, Richard Weinberger <richard@....at> wrote:
>
> Sumit,
>
> ----- Ursprüngliche Mail -----
> > Von: "Sumit Garg" <sumit.garg@...aro.org>
> > In this case why would one prefer to use CAAM when you have standards
> > compliant TPM-Chip which additionally offers sealing to specific PCR
> > (integrity measurement) values.
>
> I don't think we can dictate what good/sane solutions are and which are not.
> Both CAAM and TPM have pros and cons, I don't see why supporting both is a bad idea.
I didn't mean to say that supporting both is a bad idea but rather I
was looking for use-cases where one time selection of the best trust
source (whether it be a TPM or TEE or CAAM etc.) for a platform
wouldn't suffice for user needs.
>
> >> > IMHO allowing only one backend at the same time is a little over simplified.
> >>
> >> It is, but I'd rather leave this until it's actually needed.
> >> What can be done now is adopting a format for the exported keys that would
> >> make this extension seamless in future.
> >>
> >
> > +1
>
> As long we don't make multiple backends at runtime impossible I'm
> fine and will happily add support for it when needed. :-)
>
You are most welcome to add such support. I will be happy to review it.
-Sumit
> Thanks,
> //richard
Powered by blists - more mailing lists