Linux kernel version: 4.19
LS1043/LS1023
Hello,
I’m looking into adding support for RFS integrity validation. This would be the last part for securing our products (SecureBoot already working).
I’ve got a POC using dm-verity. The last piece I’m stuck on is protecting the private key used to sign the root hash file.
1. What support is there in linux kernel for creating and storing the private key in a protected manner? I was looking into blob support provided by CAAM/SEC, but currently am stuck. I see the supported features in SEC Reference manual, but no drivers or examples for protecting data across power cycles using blobs.
2. When setting up secureboot and OTPMK, SRK, ITS, etc are programmed but no reset occurred yet, is SEC going to use the proper BKEK derived from SecMon master key derivation key? Or would SEC still be using non-volatile test key as input to BKEK?
3. Are there better options for protecting this private key? This key pair is used to sign a digest (private key in Linux/userspace) and subsequently validate (public key used in uboot) digest upon reset.