mirror of
https://github.com/linuxboot/heads.git
synced 2024-12-18 20:47:55 +00:00
e6acaad215
When sealing/unsealing with a password, use a policy including both the specified PCRs and the object password. Fixes sealing and unsealing disk unlock key. tpm2 seems to have a bug in parameter decryption when using a policy session and password in this way, disable encryption in the policy session as a workaround. Flags still need to be set on the sealed object correctly, as the password is normally allowed on its own as an alternative to policy auth. Add -Q to some tpm2 invocations to silence diagnostics on stdout. Pass filename for unsealed secret rather than capturing from stdout for robustness against tpm2 diagnostics on stdout. Fix unseal result check in kexec-unseal-key. Signed-off-by: Jonathon Hall <jonathon.hall@puri.sm> |
||
---|---|---|
.. | ||
.gnupg | ||
bin | ||
etc | ||
run/cryptsetup | ||
sbin | ||
.ash_history | ||
init | ||
mount-boot |