You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/attestation/README.md
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,6 @@ Note:
43
43
Using the `keygen` example we can create the necessary TPM 2.0 Attestation Key and TPM 2.0 Primary Storage Key that will be used as a Primary Attestation Key(PAK).
44
44
45
45
```
46
-
47
46
$ ./examples/keygen/keygen -rsa
48
47
TPM2.0 Key generation example
49
48
Key Blob: keyblob.bin
@@ -55,15 +54,13 @@ RSA AIK template
55
54
Creating new RSA key...
56
55
Created new key (pub 280, priv 222 bytes)
57
56
Wrote 508 bytes to keyblob.bin
58
-
59
57
```
60
58
61
59
### Make Credential Example Usage
62
60
63
61
Using the `make_credential` example an attestation server can generate remote attestation challenge. The secret is 32 bytes of randomly generated seed that could be used for a symmetric key in some remote attestation schemes.
64
62
65
63
```
66
-
67
64
$ ./examples/attestation/make_credential
68
65
Using default values
69
66
Demo how to create a credential blob for remote attestation
@@ -74,7 +71,6 @@ Reading the private part of the key
74
71
AK loaded at 0x80000001
75
72
TPM2_MakeCredential success
76
73
Wrote credential blob and secret to cred.blob, 514 bytes
77
-
78
74
```
79
75
80
76
The transfer of the PAK and AK public parts between the client and attestation server is not part of the `make_credential` example, because the exchange is implementation specific.
@@ -84,7 +80,6 @@ The transfer of the PAK and AK public parts between the client and attestation s
84
80
Using the `activate_credential` example a client can decrypt the remote attestation challenge. The secret will be exposed in plain and can be exchanged with the attestation server.
85
81
86
82
```
87
-
88
83
$ ./examples/attestation/activate_credential
89
84
Using default values
90
85
Demo how to create a credential blob for remote attestation
Read credential blob and secret from cred.blob, 514 bytes
101
96
TPM2_ActivateCredential success
102
-
103
97
```
104
98
105
99
The transfer of the challenge response containing the secret in plain (or used as a symmetric key seed) is not part of the `activate_credential` example, because the exchange is also implementation specific.
0 commit comments