~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/keys/trusted-keys/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/keys/trusted-keys/Kconfig (Version linux-6.12-rc7) and /security/keys/trusted-keys/Kconfig (Version linux-6.7.12)


  1 config HAVE_TRUSTED_KEYS                       << 
  2         bool                                   << 
  3                                                << 
  4 config TRUSTED_KEYS_TPM                             1 config TRUSTED_KEYS_TPM
  5         bool "TPM-based trusted keys"               2         bool "TPM-based trusted keys"
  6         depends on TCG_TPM >= TRUSTED_KEYS          3         depends on TCG_TPM >= TRUSTED_KEYS
  7         default y                                   4         default y
  8         select CRYPTO                               5         select CRYPTO
  9         select CRYPTO_HMAC                          6         select CRYPTO_HMAC
 10         select CRYPTO_SHA1                          7         select CRYPTO_SHA1
 11         select CRYPTO_HASH_INFO                     8         select CRYPTO_HASH_INFO
 12         select ASN1_ENCODER                         9         select ASN1_ENCODER
 13         select OID_REGISTRY                        10         select OID_REGISTRY
 14         select ASN1                                11         select ASN1
 15         select HAVE_TRUSTED_KEYS               << 
 16         help                                       12         help
 17           Enable use of the Trusted Platform M     13           Enable use of the Trusted Platform Module (TPM) as trusted key
 18           backend. Trusted keys are random num     14           backend. Trusted keys are random number symmetric keys,
 19           which will be generated and RSA-seal     15           which will be generated and RSA-sealed by the TPM.
 20           The TPM only unseals the keys, if th     16           The TPM only unseals the keys, if the boot PCRs and other
 21           criteria match.                          17           criteria match.
 22                                                    18 
 23 config TRUSTED_KEYS_TEE                            19 config TRUSTED_KEYS_TEE
 24         bool "TEE-based trusted keys"              20         bool "TEE-based trusted keys"
 25         depends on TEE >= TRUSTED_KEYS             21         depends on TEE >= TRUSTED_KEYS
 26         default y                                  22         default y
 27         select HAVE_TRUSTED_KEYS               << 
 28         help                                       23         help
 29           Enable use of the Trusted Execution      24           Enable use of the Trusted Execution Environment (TEE) as trusted
 30           key backend.                             25           key backend.
 31                                                    26 
 32 config TRUSTED_KEYS_CAAM                           27 config TRUSTED_KEYS_CAAM
 33         bool "CAAM-based trusted keys"             28         bool "CAAM-based trusted keys"
 34         depends on CRYPTO_DEV_FSL_CAAM_JR >= T     29         depends on CRYPTO_DEV_FSL_CAAM_JR >= TRUSTED_KEYS
 35         select CRYPTO_DEV_FSL_CAAM_BLOB_GEN        30         select CRYPTO_DEV_FSL_CAAM_BLOB_GEN
 36         default y                                  31         default y
 37         select HAVE_TRUSTED_KEYS               << 
 38         help                                       32         help
 39           Enable use of NXP's Cryptographic Ac     33           Enable use of NXP's Cryptographic Accelerator and Assurance Module
 40           (CAAM) as trusted key backend.           34           (CAAM) as trusted key backend.
 41                                                    35 
 42 config TRUSTED_KEYS_DCP                        !!  36 if !TRUSTED_KEYS_TPM && !TRUSTED_KEYS_TEE && !TRUSTED_KEYS_CAAM
 43         bool "DCP-based trusted keys"          !!  37 comment "No trust source selected!"
 44         depends on CRYPTO_DEV_MXS_DCP >= TRUST << 
 45         default y                              << 
 46         select HAVE_TRUSTED_KEYS               << 
 47         help                                   << 
 48           Enable use of NXP's DCP (Data Co-Pro << 
 49                                                << 
 50 if !HAVE_TRUSTED_KEYS                          << 
 51         comment "No trust source selected!"    << 
 52 endif                                              38 endif
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php