-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Design Documents #8
Comments
Would be good to have more information on the objects, TPM keys and their types and attributes. |
Fixed in #265, however it needs an update to remove secondary object and wrapping object. |
so docs/ARCHITECTURE.md is gone, so now we have @idesai doc: Which is very close to correct. @idesai the wrapping object is gone, we just use a sealed AES key. So all wrapping/unwrapping occurs within library, not TPM. Since we release a secret, that is either the key or a password to a key, might as well just release a key, it doesn't change the attack. @idesai can you update your doc when you get a chance? |
Added back the ARCHITECTURE.md doc to breifly describe whats going on: |
Fix free'ing an already free'd cache pointer by reseating the pointer to NULL. This indicates that the cache needs to be recreated. Fixes: ==29549==ERROR: AddressSanitizer: attempting double-free on 0x61900002cb80 in thread T0: #0 0x55e4a0ee56fd in free (/home/wcrobert/workspace/tpm2-pkcs11/test/integration/.libs/pkcs-initialize-finalize.int+0xb16fd) tpm2-software#1 0x7f6acc0922c2 in Esys_Free /home/wcrobert/workspace/tpm2-tss/src/tss2-esys/esys_free.c:16 tpm2-software#2 0x55e4a0f4c590 in tpm_destroy /home/wcrobert/workspace/tpm2-pkcs11/src/lib/tpm.c:3261:5 tpm2-software#3 0x55e4a0f2b6a4 in general_finalize /home/wcrobert/workspace/tpm2-pkcs11/src/lib/general.c:272:5 tpm2-software#4 0x55e4a0f1a0ca in C_Finalize /home/wcrobert/workspace/tpm2-pkcs11/src/pkcs11.c:379:5 tpm2-software#5 0x55e4a0f15d7a in test_double_calls /home/wcrobert/workspace/tpm2-pkcs11/test/integration/pkcs-initialize-finalize.int.c:260:10 tpm2-software#6 0x55e4a0f15d7a in main /home/wcrobert/workspace/tpm2-pkcs11/test/integration/pkcs-initialize-finalize.int.c:269:5 tpm2-software#7 0x7f6aca001b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 tpm2-software#8 0x55e4a0e6da79 in _start (/home/wcrobert/workspace/tpm2-pkcs11/test/integration/.libs/pkcs-initialize-finalize.int+0x39a79) Signed-off-by: William Roberts <william.c.roberts@intel.com>
Fix free'ing an already free'd cache pointer by reseating the pointer to NULL. This indicates that the cache needs to be recreated. Fixes: ==29549==ERROR: AddressSanitizer: attempting double-free on 0x61900002cb80 in thread T0: #0 0x55e4a0ee56fd in free (/home/wcrobert/workspace/tpm2-pkcs11/test/integration/.libs/pkcs-initialize-finalize.int+0xb16fd) #1 0x7f6acc0922c2 in Esys_Free /home/wcrobert/workspace/tpm2-tss/src/tss2-esys/esys_free.c:16 #2 0x55e4a0f4c590 in tpm_destroy /home/wcrobert/workspace/tpm2-pkcs11/src/lib/tpm.c:3261:5 #3 0x55e4a0f2b6a4 in general_finalize /home/wcrobert/workspace/tpm2-pkcs11/src/lib/general.c:272:5 #4 0x55e4a0f1a0ca in C_Finalize /home/wcrobert/workspace/tpm2-pkcs11/src/pkcs11.c:379:5 #5 0x55e4a0f15d7a in test_double_calls /home/wcrobert/workspace/tpm2-pkcs11/test/integration/pkcs-initialize-finalize.int.c:260:10 #6 0x55e4a0f15d7a in main /home/wcrobert/workspace/tpm2-pkcs11/test/integration/pkcs-initialize-finalize.int.c:269:5 #7 0x7f6aca001b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 #8 0x55e4a0e6da79 in _start (/home/wcrobert/workspace/tpm2-pkcs11/test/integration/.libs/pkcs-initialize-finalize.int+0x39a79) Signed-off-by: William Roberts <william.c.roberts@intel.com>
Add design documents and diagrams.
The text was updated successfully, but these errors were encountered: