From cd9370bd95ce7b87be7f94269ab4ed4d5bdfb7a2 Mon Sep 17 00:00:00 2001 From: David Garske Date: Tue, 5 Dec 2023 15:14:51 -0800 Subject: [PATCH] Fix link in TPM docs. --- docs/TPM.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/TPM.md b/docs/TPM.md index e8439c65e..bd45537c1 100644 --- a/docs/TPM.md +++ b/docs/TPM.md @@ -34,7 +34,7 @@ The wolfBoot image is hashed and extended to the indicated PCR. This can be used ## Sealing and Unsealing a secret -See the wolfTPM Sealing/Unsealing example [here](https://github.com/wolfSSL/wolfTPM/tree/secret_seal/examples/boot#secure-boot-encryption-key-storage) +See the wolfTPM Sealing/Unsealing example [here](https://github.com/wolfSSL/wolfTPM/tree/master/examples/boot#secure-boot-encryption-key-storage) Known PCR values must be signed to seal/unseal a secret. The signature for the authorization policy resides in the signed header using the `--policy` argument. If a signed policy is not in the header then a value cannot be sealed. Instead the PCR(s) values and a PCR policy digest will be printed to sign. You can use `./tools/keytools/sign` or `./tools/tpm/policy_sign` to sign the policy externally.