-
Notifications
You must be signed in to change notification settings - Fork 71
Enable different key sizes and curves for EK and AK #846
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Note that this now outputs in the quote Edit: decided to make the string encoding for RSA 2024 just |
cde261e to
fdbdb4a
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
|
This is now mostly blocked on a new stable release of the tss-esapi create. There is also the issue that the parsing of the EK TPM structure goes somewhere wrong, as the verifier says that the EK public key in the TSS structure and the one in the EK certificate don't match. I'll investigate where this goes wrong. |
|
This PR is also blocked on parallaxsecond/rust-tss-esapi#552 being backported, otherwise the EK verification will always fail. |
|
@ansasaki this is now fully working. We still need to wait for a new release of tss-esapi bindings to actually use it. |
9a9506e to
5219bae
Compare
|
Registration and EK verification using swtpm with the Nist384 curve works. Unfortunatly something with is broken when trying to verify the actual quote: Might be an padding issue or something else that we missed. |
|
This code is tested against latest Keylime version + keylime/keylime#1746 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am quite newbie regarding this, so, in general, changes LGTM.
If possible, Code Coverage should be extended to avoid CI failing scenarios.
Signed-off-by: Thore Sommer <[email protected]> Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
This fixes a warning generated by clippy. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Add the missing argument when calling create_ak() to the push model prototype Signed-off-by: Thore Sommer <[email protected]> Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Signed-off-by: Thore Sommer <[email protected]> Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Signed-off-by: Thore Sommer <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I had to rebase and adjust the original patchset to cleanly merge into master.
The only failing test is about the code coverage, I guess we need to extend the test cases to include ECC keys with various curves
This implements a selection of the different key sizes for RSA and curves for ECC for EK and AK using the backported changes in rust-tss-esapi.
Further this then also enables us to use EK certs for non default key types.
Note this is currently blocked until parallaxsecond/rust-tss-esapi#546 gets merged and we have a new release.