[PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
ebiggers at kernel.org
Tue Mar 30 21:47:18 UTC 2021
On Sun, Mar 28, 2021 at 11:37:23PM +0300, Jarkko Sakkinen wrote:
> Unfortunately, TPM trusted keys started this bad security practice, and
> obviously it cannot be fixed without breaking uapi backwards compatibility.
The whole point of a randomness source is that it is random. So userspace can't
be depending on any particular output, and the randomness source can be changed
without breaking backwards compatibility.
So IMO, trusted keys should simply be fixed to use get_random_bytes().
More information about the Linux-security-module-archive