From patchwork Tue Sep 12 11:11:11 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Gstir X-Patchwork-Id: 13381464 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D2E1DCA0EC3 for ; Tue, 12 Sep 2023 11:12:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=00T0z0EOWRO/V7Bn8jQElqbqG7DOGwNrjLnyP0P2Ghc=; b=uzHOxqpXjS35Kb 7TUEQwBOQuA0iCEx+wda+WQDn+dj7VyVdKNEuDbGKeaoH35VrAGIcPd3R7xQE36/pbtWLnxVSi8E2 5HMTEY9OcvLCMCYIffFTHmKq4GuytuVJHlq3BMYzKwA4ByhVyjcvSZwqkdndMqA4Sl4FDQkqtced3 5w1vkHOHrr7p16AADnErC1ekoFTAon8slNi1zxdWWnJo2bBUgyuN7/gtGtPLo8B+xzHPSYZYmtMnS yPsxjK9h75q/qGceDf/TcnjmYP6yTKttWtBNj7IIyVgXmFdzjVff/t4Dqju+AEouY8BuV4/n9mHiM +Oq9fMlLYf9RmEAoyTOQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1qg1J5-003AzP-1E; Tue, 12 Sep 2023 11:11:47 +0000 Received: from mail-ej1-x635.google.com ([2a00:1450:4864:20::635]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1qg1J1-003Axk-2b for linux-arm-kernel@lists.infradead.org; Tue, 12 Sep 2023 11:11:45 +0000 Received: by mail-ej1-x635.google.com with SMTP id a640c23a62f3a-99c3d3c3db9so727350566b.3 for ; Tue, 12 Sep 2023 04:11:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sigma-star.at; s=google; t=1694517101; x=1695121901; darn=lists.infradead.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=WMxyxYMtu219LMB4VQwtAfAzEA7xWrv4p6+B3IeeMCg=; b=CD4mQeZACJ3WYfKq1zaHdl8Fltz+O+PY7DpweiKXJz8TjXo/rvi+b9FntHZj4DQz3Z p9UinwMoSpdYq10CiCjuOOiuiHU/sB0lYq8Kb5Wj/v+v2DpSN2LqmP1NHeTe5OxhB72H wxQii9oSzmdYnntTZeIrrZcL6eaSuS3c/hAoETDjNea+2DnHrF+jGH5KJjsN45rvUnhF PETye8uRxYDlvaTOlFENwLQi9an4v8iVUWXHE4iZ4/U+WV7/F8EIkCgKmYmtLcnu8KiQ EBPvdc8TBR0b+PAp18XJCGwMF8RqZiZEjTfDSt0Zlal0ofATEPNqsW17HGPljJnkBdbm TBHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694517101; x=1695121901; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=WMxyxYMtu219LMB4VQwtAfAzEA7xWrv4p6+B3IeeMCg=; b=Rq+RY3M3+xgZbJXaY94s8BamIOf9mIFmxrwRGRTjideL0spQmn/n8e1qqggdsLg4JR LsKJh0VN48aUQFi9n8rFvpVNrSbJQsAKZtnzrd9CLICNcTLn195Y8dTE5GjrtcsPL4g9 T83AJ97QB1kQxLHRy5tbfS5aw3q87Gyy8UdS1roMarPVZbmtNGfRAxYusjXrqi7UJyZb /lqk+iYsyQw16JzXA5fnEqvQVmrbXiQIvk/obYMIqSre0Q4PkIwhrdTUaHqu9nQqmFlU GMitTGhzZUTab9UelvO5vEipLKpcfGcZUtMps9BPoGbSwsScd49BAt0HWFQLtVfR6B0d R4qQ== X-Gm-Message-State: AOJu0Yw5WL/bt29ZqY1yuT6+Dv48AUo1tNM8rwKcs3iAefftSt/I1gde uBIBIel1izILe3CGl5bkylvFIg== X-Google-Smtp-Source: AGHT+IGVIXpipGIV3RcKzH1lIoBGyC+f3uy72Hr8eeCBPxmUGKKb6/6xig/ZZuHGDB1u6QZuTruK9g== X-Received: by 2002:a17:906:2895:b0:9a1:b967:aca9 with SMTP id o21-20020a170906289500b009a1b967aca9mr9945956ejd.63.1694517100748; Tue, 12 Sep 2023 04:11:40 -0700 (PDT) Received: from localhost ([82.150.214.1]) by smtp.gmail.com with UTF8SMTPSA id rp6-20020a170907888600b009a9fbeb15f2sm6393915ejc.62.2023.09.12.04.11.38 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 12 Sep 2023 04:11:40 -0700 (PDT) From: David Gstir To: Mimi Zohar , James Bottomley , Jarkko Sakkinen , Herbert Xu , "David S. Miller" Cc: David Gstir , Shawn Guo , Jonathan Corbet , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , NXP Linux Team , Ahmad Fatoum , sigma star Kernel Team , David Howells , Li Yang , Paul Moore , James Morris , "Serge E. Hallyn" , "Paul E. McKenney" , Randy Dunlap , Catalin Marinas , "Rafael J. Wysocki" , Tejun Heo , "Steven Rostedt (Google)" , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, linux-security-module@vger.kernel.org Subject: [PATCH v2 0/3] DCP as trusted keys backend Date: Tue, 12 Sep 2023 13:11:11 +0200 Message-ID: <20230912111115.24274-1-david@sigma-star.at> X-Mailer: git-send-email 2.42.0 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230912_041144_149222_FE25085B X-CRM114-Status: GOOD ( 20.39 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This is a revival of the previous patch set submitted by Richard Weinberger: https://lore.kernel.org/linux-integrity/20210614201620.30451-1-richard@nod.at/ v1 -> v2: - Revive and rebase to latest version - Include review comments from Ahmad Fatoum The Data CoProcessor (DCP) is an IP core built into many NXP SoCs such as i.mx6ull. Similar to the CAAM engine used in more powerful SoCs, DCP can AES- encrypt/decrypt user data using a unique, never-disclosed, device-specific key. Unlike CAAM though, it cannot directly wrap and unwrap blobs in hardware. As DCP offers only the bare minimum feature set and a blob mechanism needs aid from software. A blob in this case is a piece of sensitive data (e.g. a key) that is encrypted and authenticated using the device-specific key so that unwrapping can only be done on the hardware where the blob was wrapped. This patch series adds a DCP based, trusted-key backend and is similar in spirit to the one by Ahmad Fatoum [0] that does the same for CAAM. It is of interest for similar use cases as the CAAM patch set, but for lower end devices, where CAAM is not available. Because constructing and parsing the blob has to happen in software, we needed to decide on a blob format and chose the following: struct dcp_blob_fmt { __u8 fmt_version; __u8 blob_key[AES_KEYSIZE_128]; __u8 nonce[AES_KEYSIZE_128]; __le32 payload_len; __u8 payload[]; } __packed; The `fmt_version` is currently 1. The encrypted key is stored in the payload area. It is AES-128-GCM encrypted using `blob_key` and `nonce`, GCM auth tag is attached at the end of the payload (`payload_len` does not include the size of the auth tag). The `blob_key` itself is encrypted in AES-128-ECB mode by DCP using the OTP or UNIQUE device key. A new `blob_key` and `nonce` are generated randomly, when sealing/exporting the DCP blob. This patchset was tested with dm-crypt on an i.MX6ULL board. [0] https://lore.kernel.org/keyrings/20220513145705.2080323-1-a.fatoum@pengutronix.de/ David Gstir (3): crypto: mxs-dcp: Add support for hardware provided keys KEYS: trusted: Introduce support for NXP DCP-based trusted keys doc: trusted-encrypted: add DCP as new trust source .../admin-guide/kernel-parameters.txt | 13 + .../security/keys/trusted-encrypted.rst | 85 +++++ MAINTAINERS | 9 + drivers/crypto/mxs-dcp.c | 107 +++++- include/keys/trusted_dcp.h | 13 + include/soc/fsl/dcp.h | 19 ++ security/keys/trusted-keys/Kconfig | 9 +- security/keys/trusted-keys/Makefile | 2 + security/keys/trusted-keys/trusted_core.c | 6 +- security/keys/trusted-keys/trusted_dcp.c | 313 ++++++++++++++++++ 10 files changed, 563 insertions(+), 13 deletions(-) create mode 100644 include/keys/trusted_dcp.h create mode 100644 include/soc/fsl/dcp.h create mode 100644 security/keys/trusted-keys/trusted_dcp.c