You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/README.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,8 @@ The examples create RSA and ECC keys in NV for testing using handles defined in
6
6
7
7
The PKCS #7 and TLS examples require generating CSR's and signing them using a test script. See CSR and Certificate Signing below.
8
8
9
+
To enable parameter encryption use `-aes` for AES-CFB mode or `-xor` for XOR mode. Only some TPM commands / responses support parameter encryption. If the TPM2_ API has .flags `CMD_FLAG_ENC2` or `CMD_FLAG_DEC2` set then the command will use parameter encryption / decryption.
10
+
9
11
## Native API Test
10
12
11
13
Demonstrates calling native TPM2_* API's.
@@ -110,8 +112,8 @@ To use symmetric AES/Hashing/HMAC with the TPM define `WOLFTPM_USE_SYMMETRIC`.
110
112
Generation of the Client and Server Certificates requires running:
@@ -179,7 +181,7 @@ This way the user can keep track of relative and current time using the TPM cloc
179
181
180
182
Note: If the new time value makes a change bigger than the TPM clock update interval, then the TPM will first update its volatile register for time and then the non-volatile register for time. This may cause a narrow delay before the commands returns execution to the user. Depending on the TPM manufacturer, the delay can vary from us to few ms.
181
183
182
-
Note: This example can take an optional argument, the time value in miliseconds used for incrementing the TPM clock. Default value is 50000ms (50 seconds).
184
+
Note: This example can take an optional argument, the time value in milliseconds used for incrementing the TPM clock. Default value is 50000ms (50 seconds).
183
185
184
186
`./examples/timestamp/clock_set`
185
187
@@ -194,7 +196,7 @@ Performance benchmarks.
194
196
Examples for generating a TPM key blob and storing to disk, then loading from disk and loading into temporary TPM handle.
195
197
196
198
```
197
-
$ ./examples/keygen/keygen keyblob.bin RSA
199
+
$ ./examples/keygen/keygen keyblob.bin -rsa
198
200
TPM2.0 Key generation example
199
201
Loading SRK: Storage 0x81000200 (282 bytes)
200
202
Creating new RSA key...
@@ -208,7 +210,7 @@ Reading 840 bytes from keyblob.bin
208
210
Loaded key to 0x80000001
209
211
210
212
211
-
$ ./examples/keygen/keygen keyblob.bin ECC
213
+
$ ./examples/keygen/keygen keyblob.bin -ecc
212
214
TPM2.0 Key generation example
213
215
Loading SRK: Storage 0x81000200 (282 bytes)
214
216
Creating new ECC key...
@@ -225,7 +227,7 @@ Loaded key to 0x80000001
225
227
Example for importing a private key as TPM key blob and storing to disk, then loading from disk and loading into temporary TPM handle.
226
228
227
229
```
228
-
$ ./examples/keygen/keyimport keyblob.bin RSA
230
+
$ ./examples/keygen/keyimport keyblob.bin -rsa
229
231
TPM2.0 Key import example
230
232
Loading SRK: Storage 0x81000200 (282 bytes)
231
233
Imported key (pub 278, priv 222 bytes)
@@ -238,7 +240,7 @@ Reading 840 bytes from keyblob.bin
0 commit comments