Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp6892245ybi; Wed, 31 Jul 2019 23:51:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqyuExC5ufSy2+r6uYBsp01QCNtkJGbDwKhECUWjjZY4Y2H64O8fK52jEXvuDPH/xNLlspyp X-Received: by 2002:a65:6904:: with SMTP id s4mr112484777pgq.33.1564642311371; Wed, 31 Jul 2019 23:51:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564642311; cv=none; d=google.com; s=arc-20160816; b=fE6LWV+S10sWCuoL7ADqq/0CGnSb7es71IXzGZgdXddURlLZi7PTvLzSMslae0z761 kc9FBvJKK55Vls5Gvh0OG2bA8UMWYRL4TqljWcWZkAY8XfYUj30V7v5rOpkqL12pf90X 5EMNXOSzWD8i6qQodEMlHXVkOOyz9egLMbCuwBSLrLWRxEN2/aJ+V8gAHqotxd3r1iwF idvIfFSl3eCYhI1Ulq3y4lj199P1Ir8KXlhbDrIc3j41r8KE8yQyvJEgRUzCrWE6Jyu2 n0e0QPegdDG+MfAsGdqtnCksiVwutgsbgtPiZjzTg+TXICbtLO/f2A69nVv5+lFw6Gt9 Mh8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=mvLpkunrHA3dWOLt9Iv7yyfmvBKF9hgUAqnL3Ry7ag4=; b=lPK4ltiz5oW1qWppZBmgXiyZrcLQsBkkZax6DkLz6XzvV3PTDkM/KgdO+KQ+9whp3u vDFA7qa/yNuGRgG5Dq5j/scV8xR9IBQoclUs8ERdvPpXisKFCVoulT3qIuZaAHoQKY8o Cu2vvPpcLQgVWfg2JQypvOEToroixw702lgN3AuGik3oBb8N/l9xs+Dcx3ydruWLW5Dj Q8B1t/oMWwjBoWC8GgLVjPQRjXCv8DPWuVa2GAUpwuCLhGxJk7FvXGwwssgfX8HImBCp +H+XLO5eMQHcctMlrdeaWqbaHCwissqMDxOSzCPY/rUVmmjPmFf7TB7nUf/uIN+uPKeK z7bA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j70si33791161pgd.500.2019.07.31.23.51.36; Wed, 31 Jul 2019 23:51:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730366AbfHAGue (ORCPT + 99 others); Thu, 1 Aug 2019 02:50:34 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:60055 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725804AbfHAGud (ORCPT ); Thu, 1 Aug 2019 02:50:33 -0400 Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=localhost.localdomain) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1ht4ux-0006ob-9h; Thu, 01 Aug 2019 08:50:27 +0200 Message-ID: <19d9be198619e951750dedeb4d0a7f372083b42c.camel@pengutronix.de> Subject: Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support From: Rouven Czerwinski To: Janne Karhunen , Sumit Garg Cc: "tee-dev @ lists . linaro . org" , Daniel Thompson , Jonathan Corbet , jejb@linux.ibm.com, Ard Biesheuvel , Linux Doc Mailing List , Jarkko Sakkinen , Linux Kernel Mailing List , dhowells@redhat.com, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, Mimi Zohar , Casey Schaufler , linux-integrity@vger.kernel.org, linux-arm-kernel , "Serge E. Hallyn" Date: Thu, 01 Aug 2019 08:50:22 +0200 In-Reply-To: References: <1564489420-677-1-git-send-email-sumit.garg@linaro.org> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.32.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: r.czerwinski@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2019-08-01 at 09:36 +0300, Janne Karhunen wrote: > On Wed, Jul 31, 2019 at 5:23 PM Sumit Garg > wrote: > > > > I guess my wording was wrong, tried to say that physical TEEs in > > > the > > > wild vary massively hardware wise. Generalizing these things is > > > rough. > > > > > > > There are already well defined GlobalPlatform Standards to > > generalize > > the TEE interface. One of them is GlobalPlatform TEE Client API [1] > > which provides the basis for this TEE interface. > > I'm aware of it - I have implemented a large part of the GP TEE APIs > earlier (primarily the crypto functions). Does the TEE you work with > actually support GP properly? Can I take a look at the code? AFAIK Sumit is working with the OP-TEE implementation, which can be found on github: https://github.com/op-tee/optee_os Regards, Rouven