Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add TPM2_PolicySigned and Signature encoding #237

Merged
merged 3 commits into from
Sep 3, 2021

Conversation

alexmwu
Copy link
Contributor

@alexmwu alexmwu commented Mar 19, 2021

In this PR:

Split out ComputeAuthTimeout bug reproducer in #261

@alexmwu alexmwu requested a review from a team as a code owner March 19, 2021 21:53
@alexmwu alexmwu force-pushed the policySigned branch 3 times, most recently from 3a5410f to 0b15e0b Compare April 7, 2021 02:01
@josephlr
Copy link
Member

josephlr commented Apr 8, 2021

Some of the test failures you're seeing should be fixed by #241

if err != nil {
t.Fatalf("GetCapability failed: %v", err)
}
if props[2].(TaggedProperty).Value <= 116 {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should use revision here

Some functions in tpm2 expect an encoded TPMT_SIGNATURE.
Here, we add an Encode method on the Signature type
to support these functions.
Add the ability to call TPM2_PolicySigned, and add PolicySigned
test to verify correct behavior given different expiration values.

Change TPM2_PolicySecret's signature to add the timeout, as described in Part
3 of the spec.
Copy link
Contributor

@jkl73 jkl73 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, just one question about the PolicySecret test.

tpm2/test/tpm2_test.go Outdated Show resolved Hide resolved
@alexmwu alexmwu merged commit 90fb624 into google:master Sep 3, 2021
@alexmwu alexmwu deleted the policySigned branch September 3, 2021 22:23
josephlr added a commit to josephlr/go-tpm-tools that referenced this pull request Feb 15, 2022
PolicySecret now returns three values (google/go-tpm#237)

We never read the encoded value from Certify, so we are not affected by:
google/go-tpm#235

Signed-off-by: Joe Richey <[email protected]>
jessieqliu pushed a commit to google/go-tpm-tools that referenced this pull request Mar 2, 2022
PolicySecret now returns three values (google/go-tpm#237)

We never read the encoded value from Certify, so we are not affected by:
google/go-tpm#235

Signed-off-by: Joe Richey <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants