Andreas Fuchs
Andreas Fuchs
The problem is within the TPM spec. The max size for input buffers on the TPM command is restricted by the maximum hash size of TPM supported hash algorithms. Kind...
LGTM. Still need to ameth for RSA though, so leaving this open.
Yes, nice idea. For anyone interested in implementing this, the file can be parsed using `Esys_TR_Deserialize()` But be aware that this would also need an extension of the PEM format...
Awesome...
One more quick note: This repo does not contain meta-security/meta-tpm/recipes-tpm/tpm2.0-tss/tpm2.0-tss_1.3.0.bb as your log but only a https://github.com/jiazhang0/meta-secure-core/blob/master/meta-tpm2/recipes-tpm/tpm2-tss/tpm2-tss_2.0.0.bb which looks correct. Are you sure you added the correct layer and config...
+1 on this feature. I've hacked around TCG Platform Certificates in the past but it was no fun due to lack of broader support. Platform Certs as such are a...
Assuming this is closed now, since no updates for a long time
@williamcroberts Since this is a Behavioral change, should we include this in 4.0 ?
@williamcroberts what shall we do with this one ? Candidate for 4.0 ?
I hope everything is working now. I close this now since no update for a long time.