Commit Graph

33 Commits (1fa15951eb91a8fe89b3326077b9be6fb105edeb)

Author SHA1 Message Date
David Garske c98ee9a71e Update copyright date. 2024-04-24 10:42:27 -07:00
David Garske b395b65287 Fix for config.h, which should only be included from .c files, not headers. ZD 17473 2024-02-07 14:28:33 -08:00
David Garske 9cad7f4e24 Fix some of the example TODO's. Fixes for seal/unseal example. Fixes for TLS with param enc. Fix signed_timestamp with ECC. 2023-10-30 12:00:37 -07:00
David Garske 0ceeebeaf7 Fix for building with no PEM to DER. Fix for building with static library and no debug, due to missing stdio in examples. Fix for TLS examples missing WOLFCRYPT_ONLY check. Fix for building with WC_NO_RNG. Fix for RSA salt with RNG using crypto cb. 2023-05-02 16:18:21 -07:00
David Garske c05bf659c2 Fix broken paths with HAL refactor. Update TLS examples to use latest TLS version (allowing downgrade). 2023-01-20 08:29:53 -08:00
David Garske 41e5750ff2 Peer review fixes. Cleanups for return code checking, stdlib functions, unknown args and coding standards. 2022-10-04 13:19:51 -07:00
David Garske d491437e08 Use `strcmp` since `argv` is guaranteed to be NULL terminated. Fix keygen example whitespace alignment. 2022-10-04 11:44:16 -07:00
David Garske 3f84b2efbc wolfTPM v2.5.0 release prep 2022-07-22 09:32:57 -07:00
David Garske 2b8cfb8692 wolfTPM Release v2.1.0 preparation.
* Updated copyright
* Fixed minor cast warning.
* Fixed minor scan-build warnings.
* Cleanup print public and fix possible print of uninitialized field.
2021-03-17 10:13:50 -07:00
Dimitar Tomov 4f6e35f7fd Minor change for attestation examples, EK is not needed
* EK is not needed for Quote or GetTime
* Only Endorsement Hierarchy is needed for GetTime

Signed-off-by: Dimitar Tomov <dimi@wolfssl.com>
2021-03-12 23:47:12 +02:00
David Garske 845b3d1da2 Release fixes and cleanups. Fixes for init of `WOLFTPM2_HASH` in `wolfTPM2_HashStart`. Fix for for various build configurations (--disable-wrapper). Fix for Microchip "sign" bit on symmetric keys. Fix for scan-build warnings. Cleanup whitespace. 2020-12-07 11:01:02 -08:00
David Garske d044360e38 Fixes for scan-build and g++ warnings. 2020-12-01 10:38:39 -08:00
David Garske 4b0b70861c Added parameter encryption support to more examples. Fix to not set "encrypt" or "decrypt" if command doesn't allow it. Updated documentation. 2020-11-30 12:00:54 -08:00
David Garske 409fd96502 Fixes for response decryption. Nonce from TPM captured correctly now. Added support for args to all examples. 2020-11-24 16:44:20 -08:00
David Garske 5abeea75a9 Added object names to the command hash calculation (cpHash). Added HMAC key creation. Fixed outstanding TODO items. 2020-11-23 14:54:39 -08:00
David Garske dbd8e41b47 Refactor of the session authentication. Added "-e" option to some examples to enable parameter encryption and removed the _paramenc.c files. Fixup for the `getPrimaryStoragekey` to allow persisting if not `WOLFTPM_WINAPI`. Improve command line options. Added calculation of command hash and HMAC for sessions. 2020-11-20 16:47:14 -08:00
Elms efa2464496 winapi: cleanup debug and signed_timestamp example 2020-10-13 11:58:29 -07:00
David Garske ebfbd4dd2d Moved the new clock_set example into the existing timestamp examples directory. Minor cleanups and fix for printf warning. 2020-09-02 11:46:12 -07:00
Eric Blankenhorn 72464dc621 Release v1.9 preparation 2020-08-24 12:12:11 -05:00
David Garske 8eb67b5bcf Improvements to the signed timestamp example. Cleanup of the key template API's. 2020-07-21 15:24:10 -07:00
Dimitar Tomov 1a88cbad56 Add print for TPM uptime since last power-up and modify message for TPM clock
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-07-11 01:05:59 +03:00
David Garske 07594ec30a Fix for attestation parsing. Elements must be parsed to handle endianness swap. Fixes #104. 2020-07-10 13:19:22 -07:00
Dimitar Tomov 8b9e5edd9f Printing the correct TPM attested time value from the GetTime response
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-07-10 10:11:48 +03:00
Dimitar Tomov 4d4a0a8d3b Cleanups and fixes based on peer review.
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:58:22 +03:00
Dimitar Tomov a7d607424a Updated the printf messages for the signed_timestamp example
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:35:48 +03:00
Dimitar Tomov 5ffdd5a176 Add wolfTPM2 wrapper for creating signed timestamps and update example
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:21:10 +03:00
Dimitar Tomov b1292f67a1 Make the signed_timestamp example use the new wolfTPM2 wrappers for AIK
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:19:48 +03:00
David Garske bd7a01779a Minor spelling fixes. 2020-05-27 08:24:35 -07:00
Dimitar Tomov b13da37edf Minor fix from peer review of signed_timestamp example
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 17:38:34 +03:00
Dimitar Tomov 255cc9d87a Add prints of the attested structured in the new signed_timestamp example
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 17:31:13 +03:00
Dimitar Tomov ed4d43c94a Quick fix to set the correct handle for flushing the SRK at exit
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 05:32:13 +03:00
Dimitar Tomov 4539ad3750 AIK is generated using the Endorsement Hierarchy but created under Owner's SRK
Generating AIK happens by using the Endorsement Hierarchy, but still
the only Hierarchy that can allow loading the key is the Owner Hierarchy
through a Storage Key. Using NULL Password Auth Sessions for EK & EH.

Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 02:29:39 +03:00
Dimitar Tomov f96217ead7 Add timestamp example source code
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 01:35:42 +03:00