-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Store LUKS passphrase in TPM NVRAM #3498
base: master
Are you sure you want to change the base?
Commits on Nov 28, 2024
-
Configuration menu - View commit details
-
Copy full SHA for bc3ab7b - Browse repository at this point
Copy the full SHA bc3ab7bView commit details -
os-helpers-tpm2: add tpm_nvram_retrieve_passphrase
Add function to tpm2 helpers to retrieve a passphrase stored in the TPM's nvram. Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for d135b72 - Browse repository at this point
Copy the full SHA d135b72View commit details -
cryptsetup-efi-tpm: retrieve passphrase from TPM
Attempt to retrieve the LUKS passphrase from TPM nvram during boot. Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 6e12845 - Browse repository at this point
Copy the full SHA 6e12845View commit details -
os-helpers-tpm2: add size param to hw_gen_passphrase
Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 92ddc37 - Browse repository at this point
Copy the full SHA 92ddc37View commit details -
os-helpers-tpm2: add tpm_nvram_store_passphrase
Add function to tpm2 helpers to store a LUKS passphrase in the TPM's NVRAM, protected by a policy. Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 1c3773c - Browse repository at this point
Copy the full SHA 1c3773cView commit details -
os-helpers-tpm2: add generate_pcr_digests
In several places currently, a PCR digest value binary is generated to create a PCR policy from, either to secure a secret using the TPM, or update an existing policy. Add a function to os-helpers-tpm2 to unify this. Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 5d52b26 - Browse repository at this point
Copy the full SHA 5d52b26View commit details -
balena-init-flasher-tpm: write LUKS passphrase to TPM nvram
Change-type: minor Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for aca3ddd - Browse repository at this point
Copy the full SHA aca3dddView commit details -
balena-init-flasher-tpm: use generate_pcr_digests
Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 0a8b8d1 - Browse repository at this point
Copy the full SHA 0a8b8d1View commit details -
hostapp-update-hooks: use generate_pcr_digests
Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for 33a2ea6 - Browse repository at this point
Copy the full SHA 33a2ea6View commit details -
hup: signed-update: store passphrase in TPM
Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for e6c8daf - Browse repository at this point
Copy the full SHA e6c8dafView commit details -
os-helpers-tpm2: lowercase vars in print_pcr_val_bin
Rename vars in print_pcr_val_bin to prevent conflicts and accidental changes to globals. Change-type: patch Signed-off-by: Joseph Kogut <joseph@balena.io>
Configuration menu - View commit details
-
Copy full SHA for e96f042 - Browse repository at this point
Copy the full SHA e96f042View commit details