aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/security
diff options
context:
space:
mode:
authorJarkko Sakkinen <jarkko.sakkinen@linux.intel.com>2015-10-31 11:53:44 -0400
committerJarkko Sakkinen <jarkko.sakkinen@linux.intel.com>2015-12-20 08:27:13 -0500
commit5beb0c435bdde35a09376566b0e28f7df87c9f68 (patch)
tree3f8c2bc84de7a77c3fed187f3bd15011e2b33e5b /Documentation/security
parent5ca4c20cfd37bac6486de040e9951b3b34755238 (diff)
keys, trusted: seal with a TPM2 authorization policy
TPM2 supports authorization policies, which are essentially combinational logic statements repsenting the conditions where the data can be unsealed based on the TPM state. This patch enables to use authorization policies to seal trusted keys. Two following new options have been added for trusted keys: * 'policydigest=': provide an auth policy digest for sealing. * 'policyhandle=': provide a policy session handle for unsealing. If 'hash=' option is supplied after 'policydigest=' option, this will result an error because the state of the option would become mixed. Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Tested-by: Colin Ian King <colin.king@canonical.com> Reviewed-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Acked-by: Peter Huewe <peterhuewe@gmx.de>
Diffstat (limited to 'Documentation/security')
-rw-r--r--Documentation/security/keys-trusted-encrypted.txt34
1 files changed, 20 insertions, 14 deletions
diff --git a/Documentation/security/keys-trusted-encrypted.txt b/Documentation/security/keys-trusted-encrypted.txt
index fd2565b301e8..324ddf5223b3 100644
--- a/Documentation/security/keys-trusted-encrypted.txt
+++ b/Documentation/security/keys-trusted-encrypted.txt
@@ -27,20 +27,26 @@ Usage:
27 keyctl print keyid 27 keyctl print keyid
28 28
29 options: 29 options:
30 keyhandle= ascii hex value of sealing key default 0x40000000 (SRK) 30 keyhandle= ascii hex value of sealing key default 0x40000000 (SRK)
31 keyauth= ascii hex auth for sealing key default 0x00...i 31 keyauth= ascii hex auth for sealing key default 0x00...i
32 (40 ascii zeros) 32 (40 ascii zeros)
33 blobauth= ascii hex auth for sealed data default 0x00... 33 blobauth= ascii hex auth for sealed data default 0x00...
34 (40 ascii zeros) 34 (40 ascii zeros)
35 blobauth= ascii hex auth for sealed data default 0x00... 35 blobauth= ascii hex auth for sealed data default 0x00...
36 (40 ascii zeros) 36 (40 ascii zeros)
37 pcrinfo= ascii hex of PCR_INFO or PCR_INFO_LONG (no default) 37 pcrinfo= ascii hex of PCR_INFO or PCR_INFO_LONG (no default)
38 pcrlock= pcr number to be extended to "lock" blob 38 pcrlock= pcr number to be extended to "lock" blob
39 migratable= 0|1 indicating permission to reseal to new PCR values, 39 migratable= 0|1 indicating permission to reseal to new PCR values,
40 default 1 (resealing allowed) 40 default 1 (resealing allowed)
41 hash= hash algorithm name as a string. For TPM 1.x the only 41 hash= hash algorithm name as a string. For TPM 1.x the only
42 allowed value is sha1. For TPM 2.x the allowed values 42 allowed value is sha1. For TPM 2.x the allowed values
43 are sha1, sha256, sha384, sha512 and sm3-256. 43 are sha1, sha256, sha384, sha512 and sm3-256.
44 policydigest= digest for the authorization policy. must be calculated
45 with the same hash algorithm as specified by the 'hash='
46 option.
47 policyhandle= handle to an authorization policy session that defines the
48 same policy and with the same hash algorithm as was used to
49 seal the key.
44 50
45"keyctl print" returns an ascii hex copy of the sealed key, which is in standard 51"keyctl print" returns an ascii hex copy of the sealed key, which is in standard
46TPM_STORED_DATA format. The key length for new keys are always in bytes. 52TPM_STORED_DATA format. The key length for new keys are always in bytes.