[PATCH 0/2] Update PCR read code
Roberto Sassu
roberto.sassu at huawei.com
Fri Jun 23 13:41:55 UTC 2017
This patch set updates tpm2_pcr_read(), to build the PCR read command
buffer with tpm_buf functions, which offer protection against buffer
overflow.
It also removes duplicate code in tpm2_do_selftest(), and replaces it with
a call to tpm2_pcr_read().
The previous version of the patches can be found at the URLs:
https://sourceforge.net/p/tpmdd/mailman/message/35905413/
https://sourceforge.net/p/tpmdd/mailman/message/35905415/
The version number has not been incremented from 3 to 4, since this
is considered as a new patch set, not providing the same functionality
of the set the patches were originally part of.
Changelog
- PCR code changes are applied directly to tpm2_pcr_read()
- removed tpm2_pcr_read_in structure
- modified size of digest array in tpm2_pcr_read_out structure
Roberto Sassu (2):
tpm: use tpm_buf functions in tpm2_pcr_read()
tpm: use tpm2_pcr_read() in tpm2_do_selftest()
drivers/char/tpm/tpm2-cmd.c | 89 +++++++++++++++------------------------------
1 file changed, 30 insertions(+), 59 deletions(-)
--
2.9.3
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list