[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YdoJD3Kaas07v6K4@iki.fi>
Date: Sat, 8 Jan 2022 23:58:39 +0200
From: Jarkko Sakkinen <jarkko@...nel.org>
To: Yael Tiomkin <yaelt@...gle.com>
Cc: linux-integrity@...r.kernel.org, jejb@...ux.ibm.com,
zohar@...ux.ibm.com, corbet@....net, dhowells@...hat.com,
jmorris@...ei.org, serge@...lyn.com, keyrings@...r.kernel.org,
linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org
Subject: Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided
decrypted data
On Wed, Dec 29, 2021 at 04:53:30PM -0500, Yael Tiomkin wrote:
> The encrypted.c class supports instantiation of encrypted keys with
> either an already-encrypted key material, or by generating new key
> material based on random numbers. This patch defines a new datablob
> format: [<format>] <master-key name> <decrypted data length>
> <decrypted data> that allows to instantiate encrypted keys using
> user-provided decrypted data, and therefore allows to perform key
> encryption from userspace. The decrypted key material will be
> inaccessible from userspace.
>
> Reviewed-by: Mimi Zohar <zohar@...ux.ibm.com>
> Signed-off-by: Yael Tiomkin <yaelt@...gle.com>
What is the use case for this?
BR, Jarkko
Powered by blists - more mailing lists