Age | Commit message (Collapse) | Author | Files | Lines |
|
Using the given passphrase, encrypt the private key and copy out.
Use the public key from the mount for generating out files.
Change-Id: I5de42ad4c8a781201ed559b04b1457fe9e661e42
Issue-ID: AAF-376
Signed-off-by: Manjunath Ranganathaiah <manjunath.ranganathaiah@intel.com>
|
|
These are installed and present in the base container.
Change-Id: Ibf591476e1fb9e036398043614e2a92ac939f6ba
Issue-ID: AAF-342
Signed-off-by: Manjunath Ranganathaiah <manjunath.ranganathaiah@intel.com>
|
|
|
|
Private handle should not be mandatory
as it is not needed in no HW support case
Change-Id: I92158cb0b90f2b661ac091afc4131ad048887e17
Issue-ID: AAF-405
Signed-off-by: Ritu Sood <ritu.sood@intel.com>
|
|
Adding the dockerfile and required scripts
to implement CA service container functionality
Issue-ID: AAF-342
Change-Id: I8ea086008d0d8e50bfad3886c741ba21642ac974
Signed-off-by: Pramod Raghavendra Jayathirth <pramod.raghavendra.jayathirth@intel.com>
|
|
|
|
This container generates the ca key and
certificate and encrypts it using SRK public
key and stores the generated files on host
folder shared with this container. The public
key is built into the image for sample
known target host.
Change-Id: Ibcfdd10bca86a3e785a7ba6221e22fb78d8b706f
Signed-off-by: Manjunath Ranganathaiah <manjunath.ranganathaiah@intel.com>
Issue-ID: AAF-376
|
|
|
|
Including the ABRMD in a seperare directory for
better organization
Change-Id: I1097a2d7be5bc99b40b0bd59a4bdb939478d5129
Issue-ID: AAF-342
Signed-off-by: Pramod Raghavendra Jayathirth <pramod.raghavendra.jayathirth@intel.com>
|
|
the tools used are Init and duplicate
Change-Id: Ib3298f5cc1970d49834089ba969d4ddc1f41fe27
Issue-ID: AAF-342
Signed-off-by: Pramod Raghavendra Jayathirth <pramod.raghavendra.jayathirth@intel.com>
|
|
This can be considered as a sample for
shared voulume which holds application
content
Change-Id: Id46d33869402c22ae9902d1cdff4c1704e422362
Issue-ID: AAF-342
Signed-off-by: Pramod Raghavendra Jayathirth <pramod.raghavendra.jayathirth@intel.com>
|
|
changing the path from the user's home directory to
root's home directory for duplicate and import utlity
Change-Id: I1550492925fdd0e3096e7aab853c16896819d61c
Issue-ID: AAF-334
Signed-off-by: Pramod Raghavendra Jayathirth <pramod.raghavendra.jayathirth@intel.com>
|
|
|
|
|
|
|
|
Add INFO.yaml to list:
- Project description
- Properties
- PTL information
- Meeting information
- Committer information
Change-Id: I9e1a7b8db453fe1558a2f52a859d62c3767f115b
Issue-ID: CIMAN-134
Signed-off-by: Jessica Wagantall <jwagantall@linuxfoundation.org>
|
|
Added tpm2_plugin_rsa_sign_update(...), tpm2_plugin_rsa_sign_final(...),
tpm2_plugin_rsa_sign_cleanup(...) APIs.
Issue-ID: AAF-94
Change-Id: I104ff7b979329c03e91206d19371d3904f163993
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
|
|
Includes changes to detect existing instances of key and
also some bug fixes. Also added new functionality for
RSA_SignUpdate, RSA_SignFinal and RSA_Cleanup
Issue-ID: AAF-260
Change-Id: Ib064e86b8f112784ed6d352ab1557ab9a13c5978
Signed-off-by: Ritu Sood <ritu.sood@intel.com>
|
|
|
|
SoftHsm expects memory to be allocated by
the plugin
Issue-ID: AAF-260
Change-Id: I4ef93918a91971680f1f46517a46a29717a096b2
Signed-off-by: Ritu Sood <ritu.sood@intel.com>
|
|
Add reading public key modulus and exponent information function in this API.
Issue-ID: AAF-94
Change-Id: I9d1b54336842dfc89140e281cec2ee43f0bb13d3
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
Adding a dockerfile to build a container that has
tss, abrmd and tpm2-tools installed on it.
Issue-ID: AAF-275
Change-Id: I8bda86d36290785950cf3c23d6527e1245652f42
Signed-off-by: Kiran Kamineni <kiran.k.kamineni@intel.com>
|
|
Code not used by SoftHsm and has license issues
Issue-ID: AAF-279
Change-Id: Ie07eef82f9e7bcc445772dba474c1f0e7753542c
Signed-off-by: Ritu Sood <ritu.sood@intel.com>
|
|
Modify codes to use tpm2-tss version 1.2.0, tpm2-abrmd version 1.1.1
tpm2-tools version 2.1.0.
Issue-ID: AAF-94
Change-Id: I2feccbb8dbe718756a5fd363b8dc703562ccd5eb
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
Duplicate tool - Takes RSA private key in
pem format as input and generates
TPM structured buffers as expected by tpm Import
Import tool - Takes input buffers from
Duplicate tool and results in pub/priv blobs
which can be used to load the key in tpm
storage heirarchy's as child to primary key
Change-Id: I0af6676895ce0cc22c70e5546908e905b78bb71e
Issue-ID: AAF-207
Signed-off-by: Arun kumar Sekar <arunkumarsit@gmail.com>
|
|
Change-Id: Ica9eca7f32fac0757a9c1718c1e5ec7c922ca8cd
Issue-ID: AAF-207
Signed-off-by: Arun kumar sekar <arunkumarsit@gmail.com>
|
|
|
|
1.INIT(Script) - Establish connection with the
Actual TPM Hardware and loads the primary key
into the TPM hardware
2. Sign and verify(Script) - Loads the key and
does the sign and verify operation
Issue-ID: AAF-207
Change-Id: I015eb5fbc6f0e6f09ca454ed1bb55c5f5aadebae
Signed-off-by: Pramod <pramod.raghavendra.jayathirth@intel.com>
|
|
Remove unused and redundant codes.
Issue-ID: AAF-94
Change-Id: Icfdbf29e2d7caa339977e7d074f16e123cbff84f
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
This enables the support of multiple HSMs
Issue-ID: AAF-200
Change-Id: I825a72a0bf46827ff3be0c0311085cf970b970a6
Signed-off-by: Pramod <pramod.raghavendra.jayathirth@intel.com>
|
|
Implement tpm2_plugin_load_key() and tpm2_plugin_rsa_sign() APIs
Issue-ID: AAF-94
Change-Id: I5f4329fdf973e52264d9e0e8aabc864c5fbdeebf
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
Due to license issue, we have to remove win32 support in SoftHSMv2.
Issue-ID: AAF-151
Change-Id: I31dda45ed84065819e26be8205747dd096a37432
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
Add initial codes to build TPM2-plugin shared lib
Issue-ID: AAF-94
Change-Id: I96dee3699aa250b69350d6f01401f3831cf515f7
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
Issue-ID: AAF-94
Change-Id: I5e82fff418e7567b161acf9b98013a9b85ffc5b4
Signed-off-by: NingSun <ning.sun@intel.com>
|
|
|