Reset 'ret' to 0 when a test case fails so that the other test cases
could continue.
Signed-off-by: Gary Lin
---
tests/tpm2_key_protector_test.in | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tests/tpm2_key_protector_test.in b/tests/tpm2_key_protector_test.in
index 07477ba2a..0d1115e02 1
Extract the logic to handle the file buffer from the SRK recover
function to prepare to load the sealed key from the NV index handle,
so the NV index mode can share the same code path in the later patch.
The SRK recover function now only reads the file and sends the file
buffer to the new function.
Previously, NV index mode only supported persistent handles which are
only for TPM objects.
On the other hand, the "NV index" handle allows the user-defined data,
so it can be an alternative to the key file and support TPM 2.0 Key
File format immediately.
The following tpm2-tools commands store t
git: https://github.com/lcp/grub2/tree/tpm2-follow-up-v4
This patchset is the collection of several enhancements for TPM2 key
protector.
* Patch 1 introduces the PCR dump to help debugging policy fail.
* Patch 2 adds the new command to dump PCRs in GRUB shell and the
* documentation of the comman
grub_tpm2_readpublic() and grub_tpm2_testparms() didn't check
'authCommand' when marshaling the input data buffer. Currently, there is
no caller using non-NULL 'authCommand'. However, to avoid the potential
issue, the conditional check is added to insert 'authCommand' into the
input buffer if neces
The user may need to inspect the TPM 2.0 PCR values with the GRUB shell,
so the new 'tpm2_dump_pcr' command is added to print all PCRs of the
specified bank.
Also update the document for the new command.
Signed-off-by: Gary Lin
Tested-by: Stefan Berger
Reviewed-by: Daniel Kiper
---
docs/grub.
The following TPM 2.0 commands are introduced to tss2 to access the
TPM non-volatile memory associated with the NV index handles.
- TPM2_NV_DefineSpace
- TPM2_NV_UndefineSpace
- TPM2_NV_ReadPublic
- TPM2_NV_Read
- TPM2_NV_Write
The related marshal/unmarshal functions are also introduced.
Signed-
On Fri, Mar 14, 2025 at 02:58:48PM +0100, Yann Diorcet wrote:
> For the moment only the system-tpm2 token type is supported.
>
Hi Yann,
Could you consider creating a cover letter for this patch set?
A cover letter is useful for the reviewer to have the overview of the
patches before diving into th
Hello, I was playing with adding Rust embedded in GRUB. I’ve pushed results
to 2 repos:
Module goes to https://github.com/phcoder/grub-rust-hello/tree/master
Changes in GRUB are found at https://github.com/phcoder/GRUB/tree/rust
Notes on implementation:
Only i386-pc is implemented right now but it’
On Wed, Mar 19, 2025 at 01:47:57PM +0100, Renaud Métrich via Grub-devel wrote:
> When network booting is used, trying to chainload to the local disk
> (which is used in deployment tools such as Red Hat Satellite) may fail
> when searching for the boot loader, e.g. /EFI/redhat/shimx64.efi:
> the boo
On 3/21/25 5:19 PM, Andrew Hamilton wrote:
Hello,
Personally, I really like this idea.
I second that. One of the areas I think (I am not a Rust programmer)
Rust could really help GRUB is in the many large and imposing parsing
routines in modules. From what I have read and heard, Rust could i
Hello,
Personally, I really like this idea.
I'm not yet a Rust programmer but I am happy to learn... and perhaps
there are others like me that would take this as an opportunity to
learn while doing something like porting a Grub module from C to Rust
if we had that framework in place.
It seems li
12 matches
Mail list logo