Received: by 2002:ab2:23c8:0:b0:1f2:fdbc:cb93 with SMTP id a8csp151764lqe; Wed, 27 Mar 2024 01:26:48 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVDlyrmlsOZ/BuDamc+xmCzvsBkKIrQL/jmY+yFzlVZEWhQ5eyGOArRMfXmO6yWU1wrekwjcdg2aL+ViYkVNA8XLo6x8CwJ73jYspB6Nw== X-Google-Smtp-Source: AGHT+IFGMJlj8FsRDdPiOkZlYL5YJdSKgkvdvvJT1W5qacAEuRmC9Fon4tL/UTlmsxlloGfWSE3a X-Received: by 2002:a17:906:6897:b0:a46:6804:3542 with SMTP id n23-20020a170906689700b00a4668043542mr2024237ejr.77.1711528007993; Wed, 27 Mar 2024 01:26:47 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711528007; cv=pass; d=google.com; s=arc-20160816; b=gqc0VzXuHvnE80TVoBqixqwn9CMIgwREpjNayETiWAzwN5bMDkuwvq1EMmrPkFRiGL jH1wDo4ag3eYq7l4+L6iwZi0+t/xd09bJZIT0h4NbfBqzKmBNwwBlgq9WIp+SzVdBJDY vM+Jly84y/0qFneXC8wSU+mSobbnQlDVsc5pzzTJr41MVphZBO1vZ45gOS5EeNPTUl3A HHU3zkIFCoB6Zg23lNC4Cv/DSBpXmIMFW+wkuoHMiv1XViVvRrhObcYm5Pd8PR/ubeMk ewAZD3XmP31VDcRcwbVh4c0sP5GqU9ovQGMn2QeH+p1Q5PsPAouQpFAKQOpeb0SUJ8Mv rxog== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=41GOPkTc4lXAIZ+9zm1p6sZ+N7KmKdpT4tLVWCOmpjY=; fh=z4oKEW/AL9dOnu09iSHlwcxpdJ/XKcaNprY6vD69pHs=; b=PfLGUVeyMtp8JiWB3Wh4KRJOBZND0REWMhAxQhjbw2sWCVIm3+wHlVAvLFJfUi9BqG Q9Kxku51737qGqBpO4d2O9opCpgJdq3JQizhOmGCJtDtlFUs7/pQhe1nVKtKtkwpMCDQ nPU467LRbQDdugAS5oHlD/Yq/mE7x2ah+3SfwA6gK4L3sCsL0NhaSpBMNjQpKzIX1UHI q96+Z2m1/XaPmdmYVW8zA8aBwrPkn7F+41PU42N/+mPhrjVByuuPGS7AAShR7XBW3WIq IeVBI0bojlh3VdIP4Ggz7QqpWCWVpIKO5qErVxllEsFkSDswsaI4kqDeFbCssjVGvmAy gVIQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@sigma-star.at header.s=google header.b=JUuOLwHM; arc=pass (i=1 spf=pass spfdomain=sigma-star.at dkim=pass dkdomain=sigma-star.at dmarc=pass fromdomain=sigma-star.at); spf=pass (google.com: domain of linux-kernel+bounces-120532-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-120532-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=sigma-star.at Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id b6-20020a17090630c600b00a46930c8271si4385123ejb.564.2024.03.27.01.26.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Mar 2024 01:26:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-120532-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@sigma-star.at header.s=google header.b=JUuOLwHM; arc=pass (i=1 spf=pass spfdomain=sigma-star.at dkim=pass dkdomain=sigma-star.at dmarc=pass fromdomain=sigma-star.at); spf=pass (google.com: domain of linux-kernel+bounces-120532-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-120532-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=sigma-star.at Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 902511F2B97C for ; Wed, 27 Mar 2024 08:26:47 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2056A3EA7B; Wed, 27 Mar 2024 08:25:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sigma-star.at header.i=@sigma-star.at header.b="JUuOLwHM" Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9B0BB2E64B for ; Wed, 27 Mar 2024 08:25:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.54 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711527920; cv=none; b=U500BUeWj1pIixxzLAy0E+TyTnzEulDmIbeP0YjAtp/ZPUKDPpz3CLmAxwOOzi+wbdXYwZJo414WA641lylMvGV0yJqyq6WHCc4HX+mETD+lAbODAyr/QMzXfrKnJyv92Hw3QHDrbUWhH5ImAKnSXCLFWmUIcswRxX07zT49npk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711527920; c=relaxed/simple; bh=C4f+kFBy0hAQAYDAa01rmYY1nrmGyMmYFu2esSN4yes=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ptM1Z5dgd2peWa0FN9Q3eEjbg6bKNkuNizHgruQhqF+QcHJfcXpzORy3Gtuye17w+nR6huEtp7lzvghAKKJhBfuBcSFkKp8GzY3AxnRa6EdXPzNzPXmFmZLpjY8JOYgHIEJZvrE1SpRWvsveSmQFpt2P2jI2RQBhNitILzVWRiE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sigma-star.at; spf=pass smtp.mailfrom=sigma-star.at; dkim=pass (2048-bit key) header.d=sigma-star.at header.i=@sigma-star.at header.b=JUuOLwHM; arc=none smtp.client-ip=209.85.221.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sigma-star.at Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sigma-star.at Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-341e3682c78so75061f8f.0 for ; Wed, 27 Mar 2024 01:25:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sigma-star.at; s=google; t=1711527917; x=1712132717; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=41GOPkTc4lXAIZ+9zm1p6sZ+N7KmKdpT4tLVWCOmpjY=; b=JUuOLwHMx9zBO73wuvgAl5783kTwSoGx7XIDdNE/pKn/y4k5mYjOUDWZ5wGjJ1XfyU 777VqNNZZMCSv+lyy9lxlk5WHj0lhQYPFu309JuESmzW1IuX07qf64Bkx9/AF7KvUjdu qtoQ5UAUPnx26nUzyuYDzpc+MQrsmBWl0ZkpreVtKmfK3wTq4a9JNhYWuVg9/0DOC8rK /D0KJQmelwHXLc9mO9UWjdoYN/P2AlYqlSD9MKTUEvVZcB7ig3pQ0RRwQD0CRRwJuLeH os6FR4lA7gAwTT/uZ5NSUk/9gO/KTysc/6L5QGshtPCcxWsda6/qBuRZ4bozCMTGgmwG 65jA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711527917; x=1712132717; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=41GOPkTc4lXAIZ+9zm1p6sZ+N7KmKdpT4tLVWCOmpjY=; b=ry/4UMeYUTB81wD+LLo2xVYhxBrvwlMvpcyExadtwx3BPeBTqc0pUURDc9u4iS1aGz BvihsZvmzvYwp14WLayjTsMo1pXk6PuNbfp3o/QrLd3DH32Jfch7N2SG0S2Ctfk0+Ua2 moMw93uEjDVlppPWo135I3z8sR4/mClZC0lw8AOE48H3FOsNlWpK3vzQcoTS8nf72ykA KzsbthhYbOoqo7z2vMCFrFJ6l4guXMAEEw9p+DxE+JL1TcROo6LoXXJBHIYoYADoh5lW m5oVUsMxBYaXwSfPb/NUU2u0vKhBLMiUIiyhWE2mdx7iPjiFGazRwrXKkIJ+vjbdJ3Iy NQ0Q== X-Forwarded-Encrypted: i=1; AJvYcCX0jx8HK7HQpXBr+8dG/W0PUAeHP2rrGPrwi3mdktBfQvOrtbTgiXIhENsQ3RVdVf7nWEsL1ED9verm94x0Mg+9jxvpX2jAjP+e8M1H X-Gm-Message-State: AOJu0YwIcIT4JCnvt0IAGNZZcWHkXAiWpx2qtRd9QfOJyRGmDZNt6aZE QcDlE6oPMqDeUXv2SEXyfT5i0ZEWsxLqP8vrr7ByVC7X6SOIzoSx+xawOJPuY4A= X-Received: by 2002:adf:fd51:0:b0:33e:8c7e:608c with SMTP id h17-20020adffd51000000b0033e8c7e608cmr2580372wrs.13.1711527917000; Wed, 27 Mar 2024 01:25:17 -0700 (PDT) Received: from localhost ([82.150.214.1]) by smtp.gmail.com with UTF8SMTPSA id x4-20020a5d60c4000000b00341ce1b64f0sm6951265wrt.17.2024.03.27.01.25.15 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 27 Mar 2024 01:25:16 -0700 (PDT) From: David Gstir To: Mimi Zohar , James Bottomley , Jarkko Sakkinen , Herbert Xu , "David S. Miller" Cc: David Gstir , Shawn Guo , Jonathan Corbet , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , NXP Linux Team , Ahmad Fatoum , sigma star Kernel Team , David Howells , Li Yang , Paul Moore , James Morris , "Serge E. Hallyn" , "Paul E. McKenney" , Randy Dunlap , Catalin Marinas , "Rafael J. Wysocki" , Tejun Heo , "Steven Rostedt (Google)" , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, linux-security-module@vger.kernel.org Subject: [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config Date: Wed, 27 Mar 2024 09:24:48 +0100 Message-ID: <20240327082454.13729-3-david@sigma-star.at> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240327082454.13729-1-david@sigma-star.at> References: <20240327082454.13729-1-david@sigma-star.at> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Enabling trusted keys requires at least one trust source implementation (currently TPM, TEE or CAAM) to be enabled. Currently, this is done by checking each trust source's config option individually. This does not scale when more trust sources like the one for DCP are added, because the condition will get long and hard to read. Add config HAVE_TRUSTED_KEYS which is set to true by each trust source once its enabled and adapt the check for having at least one active trust source to use this option. Whenever a new trust source is added, it now needs to select HAVE_TRUSTED_KEYS. Signed-off-by: David Gstir --- security/keys/trusted-keys/Kconfig | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/security/keys/trusted-keys/Kconfig b/security/keys/trusted-keys/Kconfig index dbfdd8536468..553dc117f385 100644 --- a/security/keys/trusted-keys/Kconfig +++ b/security/keys/trusted-keys/Kconfig @@ -1,3 +1,6 @@ +config HAVE_TRUSTED_KEYS + bool + config TRUSTED_KEYS_TPM bool "TPM-based trusted keys" depends on TCG_TPM >= TRUSTED_KEYS @@ -9,6 +12,7 @@ config TRUSTED_KEYS_TPM select ASN1_ENCODER select OID_REGISTRY select ASN1 + select HAVE_TRUSTED_KEYS help Enable use of the Trusted Platform Module (TPM) as trusted key backend. Trusted keys are random number symmetric keys, @@ -20,6 +24,7 @@ config TRUSTED_KEYS_TEE bool "TEE-based trusted keys" depends on TEE >= TRUSTED_KEYS default y + select HAVE_TRUSTED_KEYS help Enable use of the Trusted Execution Environment (TEE) as trusted key backend. @@ -29,10 +34,11 @@ config TRUSTED_KEYS_CAAM depends on CRYPTO_DEV_FSL_CAAM_JR >= TRUSTED_KEYS select CRYPTO_DEV_FSL_CAAM_BLOB_GEN default y + select HAVE_TRUSTED_KEYS help Enable use of NXP's Cryptographic Accelerator and Assurance Module (CAAM) as trusted key backend. -if !TRUSTED_KEYS_TPM && !TRUSTED_KEYS_TEE && !TRUSTED_KEYS_CAAM -comment "No trust source selected!" +if !HAVE_TRUSTED_KEYS + comment "No trust source selected!" endif -- 2.35.3