mirror of https://github.com/wolfSSL/wolfTPM.git
Merge pull request #182 from dgarske/cred_fread
Fix for compiler warning for file read in make_credential.cpull/183/head
commit
1a7865038a
|
@ -52,8 +52,10 @@ TPM2.0 Key generation example
|
|||
Loading SRK: Storage 0x81000200 (282 bytes)
|
||||
RSA AIK template
|
||||
Creating new RSA key...
|
||||
Created new key (pub 280, priv 222 bytes)
|
||||
New key created and loaded (pub 280, priv 222 bytes)
|
||||
Wrote 508 bytes to keyblob.bin
|
||||
Wrote 288 bytes to srk.pub
|
||||
Wrote AK Name digest
|
||||
```
|
||||
|
||||
### Make Credential Example Usage
|
||||
|
@ -62,15 +64,16 @@ Using the `make_credential` example an attestation server can generate remote at
|
|||
|
||||
```
|
||||
$ ./examples/attestation/make_credential
|
||||
Using default values
|
||||
Demo how to create a credential blob for remote attestation
|
||||
wolfTPM2_Init: success
|
||||
Using public key from SRK to create the challenge
|
||||
Demo how to create a credential challenge for remote attestation
|
||||
Credential will be stored in cred.blob
|
||||
Reading 508 bytes from keyblob.bin
|
||||
wolfTPM2_Init: success
|
||||
Reading 288 bytes from srk.pub
|
||||
Reading the private part of the key
|
||||
AK loaded at 0x80000001
|
||||
Public key for encryption loaded
|
||||
Read AK Name digest success
|
||||
TPM2_MakeCredential success
|
||||
Wrote credential blob and secret to cred.blob, 514 bytes
|
||||
Wrote credential blob and secret to cred.blob, 648 bytes
|
||||
```
|
||||
|
||||
The transfer of the PAK and AK public parts between the client and attestation server is not part of the `make_credential` example, because the exchange is implementation specific.
|
||||
|
@ -90,9 +93,7 @@ SRK loaded
|
|||
Reading 508 bytes from keyblob.bin
|
||||
Reading the private part of the key
|
||||
AK loaded at 0x80000001
|
||||
TPM2_StartAuthSession: sessionHandle 0x3000000
|
||||
TPM2_policyCommandCode success
|
||||
Read credential blob and secret from cred.blob, 514 bytes
|
||||
Read credential blob and secret from cred.blob, 648 bytes
|
||||
TPM2_ActivateCredential success
|
||||
```
|
||||
|
||||
|
|
|
@ -145,8 +145,9 @@ int TPM2_MakeCredential_Example(void* userCtx, int argc, char *argv[])
|
|||
/* Load AK Name digest */
|
||||
fp = XFOPEN("ak.name", "rb");
|
||||
if (fp != XBADFILE) {
|
||||
XFREAD((BYTE*)&name, 1, sizeof(name), fp);
|
||||
printf("Read AK Name digest\n");
|
||||
size_t nameReadSz = XFREAD((BYTE*)&name, 1, sizeof(name), fp);
|
||||
printf("Read AK Name digest %s\n",
|
||||
nameReadSz == sizeof(name) ? "success" : "failed");
|
||||
XFCLOSE(fp);
|
||||
}
|
||||
#endif
|
||||
|
|
|
@ -733,7 +733,7 @@ int TPM2_Native_TestArgs(void* userCtx, int argc, char *argv[])
|
|||
XMEMCPY(session[0].auth.buffer, storagePwd, session[0].auth.size);
|
||||
|
||||
/* Create a loaded new TPM 2.0 key and then unload it */
|
||||
XMEMSET(&cmdIn.createLoaded, 0, sizeof(cmdOut.createLoaded));
|
||||
XMEMSET(&cmdIn.createLoaded, 0, sizeof(cmdIn.createLoaded));
|
||||
cmdIn.createLoaded.parentHandle = storage.handle;
|
||||
cmdIn.createLoaded.inSensitive.sensitive.userAuth.size = sizeof(usageAuth)-1;
|
||||
XMEMCPY(cmdIn.createLoaded.inSensitive.sensitive.userAuth.buffer, usageAuth,
|
||||
|
|
Loading…
Reference in New Issue