[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210614201620.30451-1-richard@nod.at>
Date: Mon, 14 Jun 2021 22:16:17 +0200
From: Richard Weinberger <richard@....at>
To: keyrings@...r.kernel.org
Cc: Richard Weinberger <richard@....at>,
Ahmad Fatoum <a.fatoum@...gutronix.de>,
David Gstir <david@...ma-star.at>,
David Howells <dhowells@...hat.com>,
"David S. Miller" <davem@...emloft.net>,
Fabio Estevam <festevam@...il.com>,
Herbert Xu <herbert@...dor.apana.org.au>,
James Bottomley <jejb@...ux.ibm.com>,
James Morris <jmorris@...ei.org>,
Jarkko Sakkinen <jarkko@...nel.org>,
Jonathan Corbet <corbet@....net>,
linux-arm-kernel@...ts.infradead.org, linux-crypto@...r.kernel.org,
linux-doc@...r.kernel.org, linux-integrity@...r.kernel.org,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
Mimi Zohar <zohar@...ux.ibm.com>,
NXP Linux Team <linux-imx@....com>,
Pengutronix Kernel Team <kernel@...gutronix.de>,
Sascha Hauer <s.hauer@...gutronix.de>,
"Serge E. Hallyn" <serge@...lyn.com>,
Shawn Guo <shawnguo@...nel.org>
Subject: [PATCH 0/3] DCP as trusted keys backend
DCP is an IP core found on NXP SoCs such as i.mx6ull.
While its bigger brother, CAAM, can directly wrap and unwrap blobs
in hardware[0], DCP offers only the bare minimum and the blob
mechanism needs aid from software.
This series adds support for a new trusted keys backend that makes use
of DCP's feature to use hardware keys which can never be read out.
[0] https://lore.kernel.org/lkml/cover.56fff82362af6228372ea82e6bd7e586e23f0966.1615914058.git-series.a.fatoum@pengutronix.de/
---
Cc: Ahmad Fatoum <a.fatoum@...gutronix.de>
Cc: David Gstir <david@...ma-star.at>
Cc: David Howells <dhowells@...hat.com>
Cc: "David S. Miller" <davem@...emloft.net>
Cc: Fabio Estevam <festevam@...il.com>
Cc: Herbert Xu <herbert@...dor.apana.org.au>
Cc: James Bottomley <jejb@...ux.ibm.com>
Cc: James Morris <jmorris@...ei.org>
Cc: Jarkko Sakkinen <jarkko@...nel.org>
Cc: Jonathan Corbet <corbet@....net>
Cc: keyrings@...r.kernel.org
Cc: linux-arm-kernel@...ts.infradead.org
Cc: linux-crypto@...r.kernel.org
Cc: linux-doc@...r.kernel.org
Cc: linux-integrity@...r.kernel.org
Cc: linux-kernel@...r.kernel.org
Cc: linux-security-module@...r.kernel.org
Cc: Mimi Zohar <zohar@...ux.ibm.com>
Cc: NXP Linux Team <linux-imx@....com>
Cc: Pengutronix Kernel Team <kernel@...gutronix.de>
Cc: Richard Weinberger <richard@....at>
Cc: Sascha Hauer <s.hauer@...gutronix.de>
Cc: "Serge E. Hallyn" <serge@...lyn.com>
Cc: Shawn Guo <shawnguo@...nel.org>
David Gstir (1):
doc: trusted-encrypted: add DCP as new trust source
Richard Weinberger (2):
crypto: mxs-dcp: Add support for hardware provided keys
KEYS: trusted: Introduce support for NXP DCP-based trusted keys
.../admin-guide/kernel-parameters.txt | 1 +
.../security/keys/trusted-encrypted.rst | 84 ++++-
MAINTAINERS | 9 +
drivers/crypto/mxs-dcp.c | 110 +++++-
include/keys/trusted_dcp.h | 13 +
include/linux/mxs-dcp.h | 19 +
security/keys/trusted-keys/Makefile | 1 +
security/keys/trusted-keys/trusted_core.c | 6 +-
security/keys/trusted-keys/trusted_dcp.c | 325 ++++++++++++++++++
9 files changed, 554 insertions(+), 14 deletions(-)
create mode 100644 include/keys/trusted_dcp.h
create mode 100644 include/linux/mxs-dcp.h
create mode 100644 security/keys/trusted-keys/trusted_dcp.c
--
2.26.2
Powered by blists - more mailing lists