> -Original Message-
> From: Paul Moore (pmoore2)
> Sent: Friday, November 8, 2019 11:19
> To: lukasz.hawry...@linux.intel.com; Gilbert, Travis
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern
> system with TXT+TPM2
>
> -Original Message-
> From: Paul Moore (pmoore2)
> Sent: Tuesday, November 5, 2019 19:28
> To: Gilbert, Travis
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: Creating a TXT/tboot policy suitable for a modern system with
> TXT+TPM2
>
> On Tue, 2019-11-05 at 23:02 +,
> -Original Message-
> From: Sant Y [mailto:satish.va...@gmail.com]
> Sent: Thursday, August 2, 2018 10:59
> To: Gilbert, Travis
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control
> policy
>
> On Thu, Aug 2, 2018 at 3:35 AM,
> -Original Message-
> From: Sant Y [mailto:satish.va...@gmail.com]
> Sent: Monday, July 30, 2018 07:41
> To: Gilbert, Travis
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control
> policy
>
> On Sat, Jul 21, 2018 at 6:54 PM, Sant Y
>From: Sant Y [mailto:satish.va...@gmail.com]
>Sent: Friday, July 20, 2018 05:03
>To: tboot-devel@lists.sourceforge.net
>Subject: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control policy
>
>Hello tboot devs!
>
>I wish to revive this old discussion, on generating LCP for TPM2. There were
Dell - Internal Use - Confidential
> -Original Message-
> From: Xiao Li [mailto:xiao.li@gmail.com]
> Sent: Sunday, July 23, 2017 19:53
> To: Gilbert, Travis
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch
> -Original Message-
> From: Gilbert, Travis
> Sent: Wednesday, July 19, 2017 12:02
> To: tboot-devel@lists.sourceforge.net
> Subject: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch
>
> This is a significant patch that corrects omissions I found in the lcptools-v2
> utilities. It adds
Dell - Internal Use - Confidential
This is a significant patch that corrects omissions I found in the lcptools-v2
utilities. It adds definitions based on the Intel TXT Software Development
Guide
I found during my investigations that the TPM 2.0 versions of the LCP tools (in
lcptools-v2) aren’t writing fully valid policies. One of the first things I
encountered is that with a newer Intel ACM, it noticed that my generated
policies had their algorithm set (SHA-256 = 0xB), but the allowed
This patch adds a check for the grub2 location of grub-mkconfig_lib. I'm not
sure this is the best place to be patching this based on my perusing of grub2's
files, but I couldn't see a better way. At least for a default Xen SLES 12 SP2
this fixes errors with grub2-mkconfig after a "make
Housekeeping patch to ignore TPM 2.0 LCP tool binaries.
Signed-off-by: Travis Gilbert
--- a/.hgignore Tue Jun 20 10:03:48 2017 -0700
+++ b/.hgignore Mon Jul 03 14:17:19 2017 -0500
@@ -44,6 +44,11 @@
^lcptools/lcp_crtpolelt$
^lcptools/lcp_crtpollist$
Okay new update. I tracked the issue down to the ACM saying the PO hash
algorithm mask is 0. Here is the script I'm running to create and write the
policy.
I'm passing the algorithm in to the lcp2_crtpol command. Why isn't it writing
that to the algorithm mask?
I'm currently analyzing the
Dell - Internal Use - Confidential
> -Original Message-
> From: Dr. Greg Wettstein [mailto:g...@wind.enjellic.com]
> Sent: Friday, December 9, 2016 02:33
> To: Gilbert, Travis ; tboot-
> de...@lists.sourceforge.net
> Cc: bluc...@sgi.com
> Subject: Re:
13 matches
Mail list logo