From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9F5F3C4338F for ; Wed, 11 Aug 2021 10:43:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 881F260E52 for ; Wed, 11 Aug 2021 10:43:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237068AbhHKKnf convert rfc822-to-8bit (ORCPT ); Wed, 11 Aug 2021 06:43:35 -0400 Received: from mail-4322.protonmail.ch ([185.70.43.22]:39731 "EHLO mail-4322.protonmail.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236830AbhHKKnc (ORCPT ); Wed, 11 Aug 2021 06:43:32 -0400 X-Greylist: delayed 83667 seconds by postgrey-1.27 at vger.kernel.org; Wed, 11 Aug 2021 06:43:32 EDT Date: Wed, 11 Aug 2021 10:43:01 +0000 Authentication-Results: mail-4316.protonmail.ch; dkim=none To: Ahmad Fatoum From: David Gstir Cc: =?utf-8?Q?Horia_Geant=C4=83?= , Aymen Sghaier , Herbert Xu , "David S. Miller" , kernel@pengutronix.de, James Bottomley , Jarkko Sakkinen , Mimi Zohar , David Howells , James Morris , Eric Biggers , "Serge E. Hallyn" , Udit Agarwal , Jan Luebbe , Richard Weinberger , Franck LENORMAND , Sumit Garg , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Reply-To: David Gstir Subject: Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator Message-ID: <85A1078F-B8E1-4E5F-A59A-23BDFB750C83@sigma-star.at> In-Reply-To: <7cc83edd-dc39-ee7e-d18c-30b2492247ea@pengutronix.de> References: <4078060ab2e44114af8204b4defea4f3d4b9e285.1626885907.git-series.a.fatoum@pengutronix.de> <796E18E6-1329-40D6-B12F-4CE6C90DD988@sigma-star.at> <7cc83edd-dc39-ee7e-d18c-30b2492247ea@pengutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ahmad, > On 11.08.2021, at 12:22, Ahmad Fatoum wrote: > >> Since you already assert that MAX_BLOB_SIZE <= CAAM_BLOB_MAX_LEN >> in security/keys/trusted-keys/trusted_caam.c, this will never >> be an issue for CAAM-based trusted-keys though. > I omitted checks in code, which are verified at compile-time. > Would you prefer a runtime check to be added as well? I’d say the compile-time check suffices, unless this is intended to be used outside of trusted-keys. But I don’t think this is very likely… Cheers, David