@jarkko
Thanks! Also supports tpm keys :)
Lacks policies though. Need to solve that soon in my TPM tooling.
@jarkko
There are some issues with the Policies in the specc, but we should solve that with the specc on the ML with Bottomley. Your tools currently do not follow the specc and uses new optional sections in place where I've proposed additions.
I can't make guarantees it will continue to work.
@jarkko
But generally, I've wanted to solve policies for `ssh-tpm-agent` as well. Both uses the same underlying libraries so any improvements to any of these tools improve both.
https://groups.io/g/openssl-tpm2-engine/topic/115384542
And the following thread for implementing support for creation data. The optional section conflicts with the `parent_pubkey` you introduced.
Yes, I read the LKML posts.
The rationale is that the TPM keyfile specc is the one hosted by Bottomley and what most of the tooling implements.
I think the policy stuff needs work. I believe Lennart has some opinions there as well that might be useful.
But generally I think we should follow one spec, it will be easier to standardize on.
@jarkko
Cool, thanks.
Feel free to write a patch to the mailing list if you want `parent_pubkey` in the specc though.
I intend to see if we could maybe get it properly standardized once the Creation data is part of the specc.
@jarkko
The mailing list works fine? I have submitted several patches to the spec at this point.
No, I meant the mailing list for the specc. Which I linked earlier.
openssl-tpm2-engine@groups.io
As for the IETF step, this is why I've submitted patches for creation data. Bottomley wanted that into the specc first.
See: https://github.com/tpm2-software/tpm2-openssl/issues/120#issuecomment-2405327343