Morten Linderud
Morten Linderud
Right, I see now you want them for policy objects. The above examples might be a bit useless. For an example parsing the data you can look at my little...
I'm contemplating hacking a bit on this as I need the signer interface. Is there any preferred ways to approach this?
I'm trying to seal private RSA key material in the TPM to create a x509 cert from it. Having PCR support and password support would make things better since the...
>Sealing the key with the PCR/password ensure that you can sign new EFI binaries iff the machine is in a good know state/you have the correct password. Is that what...
```diff func NewKey(rw io.ReadWriter, parent tpmutil.Handle, template tpm2.Public) (k *Key, err error) { + return NewKeyWithPcr(rw, parent, template, tpm2.PCRSelection{}) +} + +func NewKeyWithPcr(rw io.ReadWriter, parent tpmutil.Handle, template tpm2.Public, pcr tpm2.PCRSelection)...
I took another look at the situation and it hasn't really changed. The library has gotten a new name and some work. But still depends on V3 signatures for signature...
@SantiagoTorres Lol, I just realized I did this 5 years ago with PGP signatures in Go. https://github.com/Foxboron/clave This implements a tool to generate the PGP checksum remotely and completes the...
> is there a reason why the full public key of the pusher cannot be submitted at the same time with the rest of the fields? It's not present on...
I think there should be two views on the tracker for this data. * One view that parses the recent/modified list and contains the following data * CVE * pkgname...
It's unclear to me if we can license anything at all really. We usually re-purpose information from external trackers (Redhat, SUSE, MITRE and so on) and I don't think we...