Skip to content

Commit

Permalink
Merge pull request wolfSSL#396 from dgarske/tpm_doc
Browse files Browse the repository at this point in the history
Fix link in TPM docs.
  • Loading branch information
lealem47 authored Dec 5, 2023
2 parents 3eb41af + cd9370b commit 7708dea
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/TPM.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ The wolfBoot image is hashed and extended to the indicated PCR. This can be used

## Sealing and Unsealing a secret

See the wolfTPM Sealing/Unsealing example [here](https://github.com/wolfSSL/wolfTPM/tree/secret_seal/examples/boot#secure-boot-encryption-key-storage)
See the wolfTPM Sealing/Unsealing example [here](https://github.com/wolfSSL/wolfTPM/tree/master/examples/boot#secure-boot-encryption-key-storage)

Known PCR values must be signed to seal/unseal a secret. The signature for the authorization policy resides in the signed header using the `--policy` argument.
If a signed policy is not in the header then a value cannot be sealed. Instead the PCR(s) values and a PCR policy digest will be printed to sign. You can use `./tools/keytools/sign` or `./tools/tpm/policy_sign` to sign the policy externally.
Expand Down

0 comments on commit 7708dea

Please sign in to comment.