Received: by 2002:a89:2c3:0:b0:1ed:23cc:44d1 with SMTP id d3csp39350lqs; Mon, 4 Mar 2024 14:16:31 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCX0P59P95L17iv4hqq2/ixOhmYOtM9J8FwhTGXn9FA49xw7MNVqr6+bmHhKBnV9lsQUGVt+U39jU4Ur1bgG6BN5BnngOAi3L50A19lXIg== X-Google-Smtp-Source: AGHT+IHT0t2PIpMBvZpo6PmuBzjLCy/qqsRfg920ejkIBdkuRW+7rNjsX+ip3uj5skIirwiL62wu X-Received: by 2002:a2e:b6ca:0:b0:2d3:aed:59cc with SMTP id m10-20020a2eb6ca000000b002d30aed59ccmr103691ljo.26.1709590591310; Mon, 04 Mar 2024 14:16:31 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709590591; cv=pass; d=google.com; s=arc-20160816; b=ky40JrB1PmDzzccVxGVURu1mkbaVwsgql+FCX0+bYwQWcj6VKi7uh0HUISeFgxJ0mS CztpP6ruL3YyaFps+IxjYaLR6Sp3ZxK2oEGY9AtZt7m/IJisUs8AYzQC2l9Jwiq4Zn2V tx6dCGj+lNd1QdNdkei63rMKep0HYjMbTCSrTAQac2Q0VhdD2OBgg/UfGFHedaqLRqRk mCObSyitzv+63gvcQ65lXirrR+Es1Q4u3vQRYaCDterDPvP29vnchBjRjydNfY7jSnxg BO3yNPbRnrXzfXtEbYAdP+RnqnqydNuVC9z8A3oNkreaue9IqUBwYY9kzoB2Yd/nt1ld fXZQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:to:from:subject:cc:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=B+/HnwLCpt/nEMTn4HJHKj5QZDdRYTH3xkzZZRrm/f4=; fh=nKAep/XDSMl8dj3CYRaqsln016/c4yXm8P0CkNLe6Pk=; b=Dyogy1+zFIihE8wZBlucC+LEQRpeKPLF8jvg+uoz7BnXdZieJN/HLudAYJK1NiRDph t0/V3qan5xjnLSlm/EaO8NPSWNyjch+RnCcGqszj264sm8N5MKW9TvvPBOV/ywpkFHG9 ODbKKGUR/FT3pwwvv4gofO96no1wIfb8TYxSF8knwTBimEHPNzJE3qHN23UJDNwXiUg0 8iVcQbVpQg/BvOd/V9qQkmNL19ox+7NA5RwlnqFqL/zGgrmFkme/jSayU0Re6BZ8YzBv Rh1e1SS5Ev4+M0j5wSwt87boHheIz46ZVs3MhtrAzqa2R7TOOw10NwClR3HGxCS4+9jt HCmw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="CBO/PZrh"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-2492-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-2492-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id z5-20020aa7c645000000b005667ca5a1e2si4257099edr.389.2024.03.04.14.16.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Mar 2024 14:16:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-2492-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="CBO/PZrh"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-2492-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-2492-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 039FB1F232DF for ; Mon, 4 Mar 2024 22:16:31 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 12EFF7B3E7; Mon, 4 Mar 2024 22:16:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CBO/PZrh" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ABC767868F; Mon, 4 Mar 2024 22:16:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709590564; cv=none; b=dP4usFVXo1up3TTZ5/TgH96gpZ0+tbgwNLKKDtYvBWrF/I2mBcT2itkbW2Pclro0hDNwnvAz2T81PNU23MDmWU/I1XfMYu883xJZCwGW2ctazWlnou4RHFoqvkMuxukmd1w4J3m67OOgsPmhue1e+e2oB6la9UlsosH/nSltfZk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709590564; c=relaxed/simple; bh=B+/HnwLCpt/nEMTn4HJHKj5QZDdRYTH3xkzZZRrm/f4=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To: References:In-Reply-To; b=jbyKdr1GfD8fU49/KYdc8axTXi8lrg6T2Ny1Ej72GtMTg4V1LRwkZTEwLBBDujVZQRHz+z6rkPr+a3W5flae5YumsxAJ6yq0aZ0dXtnrcrf4Z3IeHgSAwozGpKTVJCeuLdFNKrL6bK5byC/TVYkXxXkTnxOvhFZRb/8HT1BI4fI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=CBO/PZrh; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8818CC433F1; Mon, 4 Mar 2024 22:15:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1709590564; bh=B+/HnwLCpt/nEMTn4HJHKj5QZDdRYTH3xkzZZRrm/f4=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=CBO/PZrhwSGAEynPUUI7ML6hnhaCbGTiiTHzoHmr+9ec0e5SmimPveLrvY4LQv0me TB2ANRLYFVCnP1MvwrCsp+mQDJo7QhAJrPc4hxwn1sU+PoR7uGdJM4qOf32KyIcpNa GpI9yQrlW0wk4KF7FwpoaQQrgEvr+j+y8l50ThTjH9InyidHtNRu7R5CglByl39ihI Q+YumRMidl3W5wFHOEAE2k0WzHfjhjPGIPnEW1yrIeY+qYTpVM7R2Wrf/motGoaWvj UoYDMRCq/G+kMZ5bjeEEvwaCxFwJSnsmihpqBYVNLd3H/H9+Nwajp4Ly/63l4detSQ ww8WPT8KJ9qXg== Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Tue, 05 Mar 2024 00:15:55 +0200 Message-Id: Cc: "Shawn Guo" , "Jonathan Corbet" , "Sascha Hauer" , "Pengutronix Kernel Team" , "Fabio Estevam" , "NXP Linux Team" , "Ahmad Fatoum" , "sigma star Kernel Team" , "David Howells" , "Li Yang" , "Paul Moore" , "James Morris" , "Serge E. Hallyn" , "Paul E. McKenney" , "Randy Dunlap" , "Catalin Marinas" , "Rafael J. Wysocki" , "Tejun Heo" , "Steven Rostedt (Google)" , , , , , , , , , "Richard Weinberger" , "David Oberhollenzer" Subject: Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys From: "Jarkko Sakkinen" To: "David Gstir" , "Mimi Zohar" , "James Bottomley" , "Herbert Xu" , "David S. Miller" X-Mailer: aerc 0.15.2 References: <20231215110639.45522-1-david@sigma-star.at> <20231215110639.45522-2-david@sigma-star.at> In-Reply-To: <20231215110639.45522-2-david@sigma-star.at> On Fri Dec 15, 2023 at 1:06 PM EET, David Gstir wrote: > DCP is capable of performing AES with two hardware-bound keys: > > - The one-time programmable (OTP) key which is burnt via on-chip fuses > - The unique key (UK) which is derived from the OTP key This is somewhat cryptic explanation for the commmon and reoccuring theme of having a fused random seed and a key derivation function. I'd just write it is all about. "DCP is able to derive private keys for a fused random seed, which can be referenced by handle but not accessed by the CPU. These keys can be used to perform AES encryption." My explanation neither includes acronyms OTP and UK and still delivers the message so much better. That actually further makes it better because less crappy standard consortium terminology is always better :-) BR, Jarkko