Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp261477pxf; Wed, 24 Mar 2021 04:41:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwAfWeIKdn2l5oC2KylUFc05t+B1Mv66/03cjTyFGaaGyGpdNsZLIKMyFNQ8Nw6airWzaLO X-Received: by 2002:a17:906:5918:: with SMTP id h24mr3227739ejq.501.1616586088038; Wed, 24 Mar 2021 04:41:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616586088; cv=none; d=google.com; s=arc-20160816; b=eNIK7Np2/YHQ8WzqgUsi5YZthw8YAJYQRF8z+W9wLKZNJ2DdUow+kgV8xsA1OqXqfr ZzVUXvpZLqDXsGesDUt1r2+IMsx1R0wQ/dbgN9KjMQvuia2gyf1NrMfpj9Ol5EFyOoux vOwgOfi9n2KtukdqK/Fib5i/rdgBMAlbOPTvXE3XGaMGXiCdoE91QFE6KaRP/jKa0TI2 M7fNwWHHgrwoZlZXh0n0r1qqTB32Te5vnZACgGkQUTI4ZjZLRjjSCT5SloBDzlSDOOhW rIo2bYPI5o6N54uG4g6k/nuE1PvGtU6/KUwQYURDJT7poK+7fU7Khd76gafnB0giSeBW UlmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=Ey+2292BkH6x041fX3yRwofo+kD7iZk7X6ckEEcQYiM=; b=wB0FNoRlD/yVd4rZHZK1ZTSxFS335rp0ZO0eGdphyHgQyOhtBCfGNPUdT0W7oZK0/2 BgSsS8IkBpbN5iumsrp3EiiARr9N68pP4Z0LEwKDshlQpK38g2XBoSHQ6zuuJ39Ahnf0 2VqCe4vNauNb9KMmOlYiwLDVzw5HQKckUuFA56ZcL6Yp2eHfPg3KtlY8Y3A5myS/Pkad WVEcr2j0Em5qdpqwwttCpovdD7ORQqo8NLOvep1fBYoj71Z2gjbIjD6jmVQAW4n9UCPc UDT/apWLFemf6AuRMIwtcTZcyg4AIrcCtC7F92R5t+0yg59Hy2tewG4SiIP85bhM+Phe 1KxQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wOpDYenT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z21si1403554eji.701.2021.03.24.04.40.56; Wed, 24 Mar 2021 04:41:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wOpDYenT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231842AbhCXKsO (ORCPT + 99 others); Wed, 24 Mar 2021 06:48:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58042 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232376AbhCXKrq (ORCPT ); Wed, 24 Mar 2021 06:47:46 -0400 Received: from mail-lf1-x134.google.com (mail-lf1-x134.google.com [IPv6:2a00:1450:4864:20::134]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF8C5C0613DE for ; Wed, 24 Mar 2021 03:47:34 -0700 (PDT) Received: by mail-lf1-x134.google.com with SMTP id w37so31195740lfu.13 for ; Wed, 24 Mar 2021 03:47:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Ey+2292BkH6x041fX3yRwofo+kD7iZk7X6ckEEcQYiM=; b=wOpDYenTLNC5o8Rarb2OFmUczdkjNuWqZymzj6lBygep5Yd7GB2gh5V4iK5s09JlP6 yrGBhqkmBeK5d1pbDMSFFgsrPAZy3mE0skMAgab3K7copJacg2MO/0lfbvDl9pLGn5rr 5BkjddszhsrZCY3P2ZyhvTQ+//m8JOKbckvDK71Eu14aDkiGUgwPFlFcornRoc+Ut2sS IBrxfX8eCVRlKa3D+BsNyrmFNi03KIH29UMMMiW0maebcG2AFLrpZ0LZPWWclW6Act8s pyXZxz3WbZAIogJ0uMjCxkqr5kHcJOrQ6xsvKobcwu0WDXurBq/B0FmwrxLO73e2b0Nh HeYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Ey+2292BkH6x041fX3yRwofo+kD7iZk7X6ckEEcQYiM=; b=SalnIUMPl0hsot/pUxRPb3+vt3BIHNH03L3HnnjoSEzfsTlMx2zmbrISR+Bn3+PA31 a4930WEvOhDrxUtxSx6N1+xnsvB1vHESCuA1ZR539cVPCDWnMp4QOXDP/FEe+cEAGe3p tGgvrcWVJPGe5Thr3hKS8a5ZAXHWmNJkn3PQU0SX7DDFbJRGjP8yFsioYJSXc39aUcsZ VRO7qWkt+jvy9injdCh0KS2cpX2c+2+hhyDxySvk/J+lS4nzVoT95W5vYLS/P7qa9ABY A36HVp6/oYYgFSf9f/P8MypuMRjRq7HaMtcBX7LKJp0q/dF6VAWrOGplaJtcrnb+XhlT gXKQ== X-Gm-Message-State: AOAM531Eh24Mx21zvg3XVA/sa3F7jb+hTjuXf/0qHzNo1ckoXZ++DA5E d/8CQvu3OTLcbVYRh2NUgnl4t5OS4Tnb7dPdkWT+oA== X-Received: by 2002:a19:6109:: with SMTP id v9mr1632879lfb.546.1616582853107; Wed, 24 Mar 2021 03:47:33 -0700 (PDT) MIME-Version: 1.0 References: <319e558e1bd19b80ad6447c167a2c3942bdafea2.1615914058.git-series.a.fatoum@pengutronix.de> <01e6e13d-2968-0aa5-c4c8-7458b7bde462@nxp.com> <45a9e159-2dcb-85bf-02bd-2993d50b5748@pengutronix.de> <63dd7d4b-4729-9e03-cd8f-956b94eab0d9@pengutronix.de> In-Reply-To: <63dd7d4b-4729-9e03-cd8f-956b94eab0d9@pengutronix.de> From: Sumit Garg Date: Wed, 24 Mar 2021 16:17:21 +0530 Message-ID: Subject: Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys To: Ahmad Fatoum Cc: Mimi Zohar , =?UTF-8?Q?Horia_Geant=C4=83?= , Jonathan Corbet , David Howells , Jarkko Sakkinen , James Bottomley , "kernel@pengutronix.de" , James Morris , "Serge E. Hallyn" , Aymen Sghaier , Herbert Xu , "David S. Miller" , Udit Agarwal , Jan Luebbe , David Gstir , Franck Lenormand , "keyrings@vger.kernel.org" , "linux-crypto@vger.kernel.org" , "linux-doc@vger.kernel.org" , "linux-integrity@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-security-module@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, 24 Mar 2021 at 14:56, Ahmad Fatoum wrote: > > Hello Mimi, > > On 23.03.21 19:07, Mimi Zohar wrote: > > On Tue, 2021-03-23 at 17:35 +0100, Ahmad Fatoum wrote: > >> On 21.03.21 21:48, Horia Geant=C4=83 wrote: > >>> caam has random number generation capabilities, so it's worth using t= hat > >>> by implementing .get_random. > >> > >> If the CAAM HWRNG is already seeding the kernel RNG, why not use the k= ernel's? > >> > >> Makes for less code duplication IMO. > > > > Using kernel RNG, in general, for trusted keys has been discussed > > before. Please refer to Dave Safford's detailed explanation for not > > using it [1]. > > The argument seems to boil down to: > > - TPM RNG are known to be of good quality > - Trusted keys always used it so far > > Both are fine by me for TPMs, but the CAAM backend is new code and neithe= r point > really applies. > > get_random_bytes_wait is already used for generating key material elsewhe= re. > Why shouldn't new trusted key backends be able to do the same thing? > Please refer to documented trusted keys behaviour here [1]. New trusted key backends should align to this behaviour and in your case CAAM offers HWRNG so we should be better using that. Also, do update documentation corresponding to CAAM as a trusted keys backe= nd. [1] https://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/= tree/Documentation/security/keys/trusted-encrypted.rst#n87 -Sumit > Cheers, > Ahmad > > > > > thanks, > > > > Mimi > > > > [1] > > https://lore.kernel.org/linux-integrity/BCA04D5D9A3B764C9B7405BBA4D4A3C= 035F2A38B@ALPMBAPA12.e2k.ad.ge.com/ > > > > > > > > -- > Pengutronix e.K. | = | > Steuerwalder Str. 21 | http://www.pengutronix.de/ = | > 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 = | > Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 = |