[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <db88a381739e08806e2370e8fbe8fdde82731464.camel@kernel.org>
Date: Wed, 05 Jan 2022 22:12:27 +0200
From: Jarkko Sakkinen <jarkko@...nel.org>
To: Yael Tiomkin <yaelt@...gle.com>, linux-integrity@...r.kernel.org
Cc: jejb@...ux.ibm.com, zohar@...ux.ibm.com, corbet@....net,
dhowells@...hat.com, jmorris@...ei.org, serge@...lyn.com,
keyrings@...r.kernel.org, linux-doc@...r.kernel.org,
linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org
Subject: Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided
decrypted data
On Wed, 2021-12-29 at 16:53 -0500, Yael Tiomkin wrote:
> The encrypted.c class supports instantiation of encrypted keys with
> either an already-encrypted key material, or by generating new key
> material based on random numbers. This patch defines a new datablob
> format: [<format>] <master-key name> <decrypted data length>
> <decrypted data> that allows to instantiate encrypted keys using
> user-provided decrypted data, and therefore allows to perform key
> encryption from userspace. The decrypted key material will be
> inaccessible from userspace.
The 2nd to last sentence is essentially a tautology but fails to
be even that, as you can already "perform key encryption" from user
space, just not with arbitrary key material.
It does not elighten any applications of this feature.
/Jarkko
Powered by blists - more mailing lists