diff options
author | Denis Kenzior <denkenz@gmail.com> | 2018-10-09 17:48:17 +0100 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2018-10-26 09:30:46 +0100 |
commit | d5e72745ca121459f68c598dac7b374a76322b94 (patch) | |
tree | fbe5574be8ae84efcdf4a19f5c634b819b8e66ad /crypto/asymmetric_keys/tpm.asn1 | |
parent | f8c54e1ac4b82933dfcf88c37892da8ae35ccbe4 (diff) | |
download | linux-d5e72745ca121459f68c598dac7b374a76322b94.tar.gz linux-d5e72745ca121459f68c598dac7b374a76322b94.tar.bz2 linux-d5e72745ca121459f68c598dac7b374a76322b94.zip |
KEYS: Add parser for TPM-based keys [ver #2]
For TPM based keys, the only standard seems to be described here:
http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#rfc.section.4.4
Quote from the relevant section:
"Rather, a common form of storage for "wrapped" keys is to encode the
binary TCPA_KEY structure in a single ASN.1 OCTET-STRING, and store the
result in PEM format with the tag "-----BEGIN TSS KEY BLOB-----". "
This patch implements the above behavior. It is assumed that the PEM
encoding is stripped out by userspace and only the raw DER/BER format is
provided. This is similar to how PKCS7, PKCS8 and X.509 keys are
handled.
Signed-off-by: Denis Kenzior <denkenz@gmail.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Tested-by: Marcel Holtmann <marcel@holtmann.org>
Reviewed-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'crypto/asymmetric_keys/tpm.asn1')
-rw-r--r-- | crypto/asymmetric_keys/tpm.asn1 | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/crypto/asymmetric_keys/tpm.asn1 b/crypto/asymmetric_keys/tpm.asn1 new file mode 100644 index 000000000000..d7f194232f30 --- /dev/null +++ b/crypto/asymmetric_keys/tpm.asn1 @@ -0,0 +1,5 @@ +-- +-- Unencryted TPM Blob. For details of the format, see: +-- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri +-- +PrivateKeyInfo ::= OCTET STRING ({ tpm_note_key }) |