Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1783075pxa; Sun, 16 Aug 2020 10:56:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxoWruMY2DeIqfxuBypXj96ZEEbGMY9gTA/K9fyfI6XYhfoyb0atVbI59F5wHhiTc8WZeHG X-Received: by 2002:a17:906:c7c8:: with SMTP id dc8mr11384177ejb.285.1597600579347; Sun, 16 Aug 2020 10:56:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597600579; cv=none; d=google.com; s=arc-20160816; b=fArHnS3yVzNRP9PB0fF2J4dk0L7sjwmuJn37IAjx5pGsfqXdtIctOfDCm9d2429nOQ 8PCutH84arrDpejW4FTgLFG0ijYqWTUKk7jpO6S1S3nNop3YtTZR0muYq3Gvom2uEIV9 CL9Pa4bfYahymLQF9NN8U2I5ZEbXGHsXwp5pkXA+Ztpi5b0k+pClFzB5wDh7EUxTW1UW Nd8pVPRdeTWhki+UoyYXm5N9AK8Ky4exfPyoCwtZiVWwVzR9srhSwFI+rHGtQ8z8WtMD jgeyl5ThqI4Ojde9rl5jgGO1j56b2B7rGoxWZkqOKRmlAtNXM1sPq6tjB6yNIPqgD122 Fl5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:from:references:cc:to:subject; bh=RTwKVhiawO8WjfncUTn9X0CJTBiSZZdIZAtEl3Fhzf8=; b=WUAWh4u4MQcYaVf72EqajsQr59IaFrLsXsOSVRhP1Cop284z0Z1WPoZaB8w3cyzuMo gq4Zny6aoFSeqHNZ5vzDx6DtEnwP4zb8DooZ1NWC6jHRvWCtSK3UGO3J6Agce8u38AsW XCVrDTcWZENtLQurZGK39uR3FseBS2xXhtLys8uW0bL5W3ZLugAUT5PMnlTiGsOguBkM ptL6CDF+YRkGFUIrP1vC1sRawsqY2QqOrud6jRA3a0rhG5z01Mx2TJHqarshW9+6bqfU pTpOGpIBsJ/QN8iIiJ9yMldxYN80oubjA0QiND2/64v6uy2+/v2wTWaz4nj9Pem9JeI4 7PgQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g22si9223128ejx.196.2020.08.16.10.55.25; Sun, 16 Aug 2020 10:56:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729086AbgHPRBs (ORCPT + 99 others); Sun, 16 Aug 2020 13:01:48 -0400 Received: from mx2.suse.de ([195.135.220.15]:35986 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726825AbgHPRBr (ORCPT ); Sun, 16 Aug 2020 13:01:47 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 6773CAFD5; Sun, 16 Aug 2020 17:02:08 +0000 (UTC) Subject: Re: [PATCH RESEND] docs: update trusted-encrypted.rst To: Stefan Berger Cc: keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Dan Williams , James Bottomley , Jarkko Sakkinen , Mimi Zohar References: <20200815075143.47082-1-colyli@suse.de> From: Coly Li Autocrypt: addr=colyli@suse.de; keydata= mQINBFYX6S8BEAC9VSamb2aiMTQREFXK4K/W7nGnAinca7MRuFUD4JqWMJ9FakNRd/E0v30F qvZ2YWpidPjaIxHwu3u9tmLKqS+2vnP0k7PRHXBYbtZEMpy3kCzseNfdrNqwJ54A430BHf2S GMVRVENiScsnh4SnaYjFVvB8SrlhTsgVEXEBBma5Ktgq9YSoy5miatWmZvHLFTQgFMabCz/P j5/xzykrF6yHo0rHZtwzQzF8rriOplAFCECp/t05+OeHHxjSqSI0P/G79Ll+AJYLRRm9til/ K6yz/1hX5xMToIkYrshDJDrUc8DjEpISQQPhG19PzaUf3vFpmnSVYprcWfJWsa2wZyyjRFkf J51S82WfclafNC6N7eRXedpRpG6udUAYOA1YdtlyQRZa84EJvMzW96iSL1Gf+ZGtRuM3k49H 1wiWOjlANiJYSIWyzJjxAd/7Xtiy/s3PRKL9u9y25ftMLFa1IljiDG+mdY7LyAGfvdtIkanr iBpX4gWXd7lNQFLDJMfShfu+CTMCdRzCAQ9hIHPmBeZDJxKq721CyBiGAhRxDN+TYiaG/UWT 7IB7LL4zJrIe/xQ8HhRO+2NvT89o0LxEFKBGg39yjTMIrjbl2ZxY488+56UV4FclubrG+t16 r2KrandM7P5RjR+cuHhkKseim50Qsw0B+Eu33Hjry7YCihmGswARAQABtBhDb2x5IExpIDxj b2x5bGlAc3VzZS5kZT6JAlYEEwEIAEACGyMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgBYh BOo+RS/0+Uhgjej60Mc5B5Nrffj8BQJcR84dBQkY++fuAAoJEMc5B5Nrffj8ixcP/3KAKg1X EcoW4u/0z+Ton5rCyb/NpAww8MuRjNW82UBUac7yCi1y3OW7NtLjuBLw5SaVG5AArb7IF3U0 qTOobqfl5XHsT0o5wFHZaKUrnHb6y7V3SplsJWfkP3JmOooJsQB3z3K96ZTkFelsNb0ZaBRu gV+LA4MomhQ+D3BCDR1it1OX/tpvm2uaDF6s/8uFtcDEM9eQeqATN/QAJ49nvU/I8zDSY9rc 0x9mP0x+gH4RccbnoPu/rUG6Fm1ZpLrbb6NpaYBBJ/V1BC4lIOjnd24bsoQrQmnJn9dSr60X 1MY60XDszIyzRw7vbJcUn6ZzPNFDxFFT9diIb+wBp+DD8ZlD/hnVpl4f921ZbvfOSsXAJrKB 1hGY17FPwelp1sPcK2mDT+pfHEMV+OQdZzD2OCKtza/5IYismJJm3oVUYMogb5vDNAw9X2aP XgwUuG+FDEFPamFMUwIfzYHcePfqf0mMsaeSgtA/xTxzx/0MLjUJHl46Bc0uKDhv7QUyGz0j Ywgr2mHTvG+NWQ/mDeHNGkcnsnp3IY7koDHnN2xMFXzY4bn9m8ctqKo2roqjCzoxD/njoAhf KBzdybLHATqJG/yiZSbCxDA1n/J4FzPyZ0rNHUAJ/QndmmVspE9syFpFCKigvvyrzm016+k+ FJ59Q6RG4MSy/+J565Xj+DNY3/dCuQINBFYX6S8BEADZP+2cl4DRFaSaBms08W8/smc5T2CO YhAoygZn71rB7Djml2ZdvrLRjR8Qbn0Q/2L2gGUVc63pJnbrjlXSx2LfAFE0SlfYIJ11aFdF 9w7RvqWByQjDJor3Z0fWvPExplNgMvxpD0U0QrVT5dIGTx9hadejCl/ug09Lr6MPQn+a4+qs aRWwgCSHaIuDkH3zI1MJXiqXXFKUzJ/Fyx6R72rqiMPHH2nfwmMu6wOXAXb7+sXjZz5Po9GJ g2OcEc+rpUtKUJGyeQsnCDxUcqJXZDBi/GnhPCcraQuqiQ7EGWuJfjk51vaI/rW4bZkA9yEP B9rBYngbz7cQymUsfxuTT8OSlhxjP3l4ZIZFKIhDaQeZMj8pumBfEVUyiF6KVSfgfNQ/5PpM R4/pmGbRqrAAElhrRPbKQnCkGWDr8zG+AjN1KF6rHaFgAIO7TtZ+F28jq4reLkur0N5tQFww wFwxzROdeLHuZjL7eEtcnNnzSkXHczLkV4kQ3+vr/7Gm65mQfnVpg6JpwpVrbDYQeOFlxZ8+ GERY5Dag4KgKa/4cSZX2x/5+KkQx9wHwackw5gDCvAdZ+Q81nm6tRxEYBBiVDQZYqO73stgT ZyrkxykUbQIy8PI+g7XMDCMnPiDncQqgf96KR3cvw4wN8QrgA6xRo8xOc2C3X7jTMQUytCz9 0MyV1QARAQABiQI8BBgBCAAmAhsMFiEE6j5FL/T5SGCN6PrQxzkHk2t9+PwFAlxHziAFCRj7 5/EACgkQxzkHk2t9+PxgfA//cH5R1DvpJPwraTAl24SUcG9EWe+NXyqveApe05nk15zEuxxd e4zFEjo+xYZilSveLqYHrm/amvQhsQ6JLU+8N60DZHVcXbw1Eb8CEjM5oXdbcJpXh1/1BEwl 4phsQMkxOTns51bGDhTQkv4lsZKvNByB9NiiMkT43EOx14rjkhHw3rnqoI7ogu8OO7XWfKcL CbchjJ8t3c2XK1MUe056yPpNAT2XPNF2EEBPG2Y2F4vLgEbPv1EtpGUS1+JvmK3APxjXUl5z 6xrxCQDWM5AAtGfM/IswVjbZYSJYyH4BQKrShzMb0rWUjkpXvvjsjt8rEXpZEYJgX9jvCoxt oqjCKiVLpwje9WkEe9O9VxljmPvxAhVqJjX62S+TGp93iD+mvpCoHo3+CcvyRcilz+Ko8lfO hS9tYT0HDUiDLvpUyH1AR2xW9RGDevGfwGTpF0K6cLouqyZNdhlmNciX48tFUGjakRFsxRmX K0Jx4CEZubakJe+894sX6pvNFiI7qUUdB882i5GR3v9ijVPhaMr8oGuJ3kvwBIA8lvRBGVGn 9xvzkQ8Prpbqh30I4NMp8MjFdkwCN6znBKPHdjNTwE5PRZH0S9J0o67IEIvHfH0eAWAsgpTz +jwc7VKH7vkvgscUhq/v1/PEWCAqh9UHy7R/jiUxwzw/288OpgO+i+2l11Y= Message-ID: <096636f4-a928-dd00-dba6-216651c3d63b@suse.de> Date: Mon, 17 Aug 2020 01:01:38 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/8/17 00:06, Stefan Berger wrote: > On 8/15/20 3:51 AM, Coly Li wrote: >> The parameters in tmp2 commands are outdated, people are not able to >> create trusted key by the example commands. >> >> This patch updates the paramerters of tpm2 commands, they are verified >> by tpm2-tools-4.1 with Linux v5.8 kernel. >> >> Signed-off-by: Coly Li >> Cc: Dan Williams >> Cc: James Bottomley >> Cc: Jarkko Sakkinen >> Cc: Mimi Zohar >> Cc: Stefan Berger >> --- >>   Documentation/security/keys/trusted-encrypted.rst | 9 ++++----- >>   1 file changed, 4 insertions(+), 5 deletions(-) >> >> diff --git a/Documentation/security/keys/trusted-encrypted.rst >> b/Documentation/security/keys/trusted-encrypted.rst >> index 9483a7425ad5..442a2775156e 100644 >> --- a/Documentation/security/keys/trusted-encrypted.rst >> +++ b/Documentation/security/keys/trusted-encrypted.rst >> @@ -39,10 +39,9 @@ With the IBM TSS 2 stack:: >>     Or with the Intel TSS 2 stack:: >>   -  #> tpm2_createprimary --hierarchy o -G rsa2048 -o key.ctxt >> +  #> tpm2_createprimary --hierarchy o -G rsa2048 key.ctxt >>     [...] >> -  handle: 0x800000FF > > > Are you sure about this? My documentation for 4.1.3 on F32 states > > > -c, --key-context=FILE: > >          The file path to save the object context of the generated > primary object. > > Yes of course you are right, it is s/-o/-c > >> -  #> tpm2_evictcontrol -c key.ctxt -p 0x81000001 >> +  #> tpm2_evictcontrol -c key.ctxt 0x81000001 >>     persistentHandle: 0x81000001 > > > This seems correct. > > >>     Usage:: >> @@ -115,7 +114,7 @@ append 'keyhandle=0x81000001' to statements >> between quotes, such as > > > A note in this file states this: > > Note: When using a TPM 2.0 with a persistent key with handle 0x81000001, > append 'keyhandle=0x81000001' to statements between quotes, such as > "new 32 keyhandle=0x81000001". > > Now if someone was (still) interested in TPM 1.2 then the below changes > you are proposing wouldn't work for them. Maybe you should adapt the > note to state that these keyhandle=... should be removed for the TPM 1.2 > case. > I agree. Indeed I have no idea why number 0x81000001 is used, and I don't have practice experience with TPM 1.2. Now the purpose of this patch accomplished: experts response and confirm my guess :-) Thanks. >>     :: >>   -    $ keyctl add trusted kmk "new 32" @u >> +    $ keyctl add trusted kmk "new 32 keyhandle=0x81000001" @u >>       440502848 >>         $ keyctl show >> @@ -138,7 +137,7 @@ append 'keyhandle=0x81000001' to statements >> between quotes, such as >>     Load a trusted key from the saved blob:: >>   -    $ keyctl add trusted kmk "load `cat kmk.blob`" @u >> +    $ keyctl add trusted kmk "load `cat kmk.blob` >> keyhandle=0x81000001" @u >>       268728824 >>         $ keyctl print 268728824 > > Coly Li