Skip to content

Commit b40574f

Browse files
committed
Fix for keyload broken with PR 174. Added GPIO note about no input support for Nuvoton.
1 parent d05e503 commit b40574f

2 files changed

Lines changed: 2 additions & 4 deletions

File tree

examples/README.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -401,7 +401,6 @@ Using the `seal` example we store securely our data in a newly generated TPM 2.0
401401
Please find example output from sealing and unsealing a secret message:
402402

403403
```
404-
405404
$ ./examples/seal/seal keyblob.bin mySecretMessage
406405
TPM2.0 Simple Seal example
407406
Key Blob: keyblob.bin
@@ -431,7 +430,6 @@ Stored unsealed data to file = message.raw
431430
432431
$ cat message.raw
433432
mySecretMessage
434-
435433
```
436434

437435
After a successful unsealing, the data is stored into a new file. If no filename is provided, the `unseal` tool stores the data in `unseal.bin`.
@@ -497,7 +495,7 @@ NV Index for GPIO access created
497495

498496
### GPIO Config (NPCT75xx)
499497

500-
NPCT75x supports 3 output modes, information from `gpio/gpio_nuvoton` below:
498+
NPCT75x supports 3 output modes (no input modes), information from `gpio/gpio_nuvoton` below:
501499

502500
```
503501
$ ./examples/gpio/gpio_nuvoton -h

examples/keygen/keyload.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ int TPM2_Keyload_Example(void* userCtx, int argc, char *argv[])
119119
primary = &endorse;
120120
}
121121
else { /* SRK */
122-
rc = getPrimaryStoragekey(&dev, primary, TPM_ALG_RSA);
122+
rc = getPrimaryStoragekey(&dev, &storage, TPM_ALG_RSA);
123123
if (rc != 0) goto exit;
124124
primary = &storage;
125125
}

0 commit comments

Comments
 (0)