037f8dfe77e077aca44226ef9c555094e52973cf |
|
26-Jan-2015 |
Kris Rambish <krisr@chromium.org> |
Move the TPM check into install_object. BUG=chromium:452164 TEST=None Change-Id: Ida18a502943f60b529c01c94e8c0bf8c5b7d5a65 Reviewed-on: https://chromium-review.googlesource.com/243320 Reviewed-by: Paul Stewart <pstew@chromium.org> Reviewed-by: Kris Rambish <krisr@chromium.org> Tested-by: Kris Rambish <krisr@chromium.org> Commit-Queue: Kris Rambish <krisr@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
088c75f64155b89255e9ebd324230f5c34eda74e |
|
11-Dec-2014 |
Kris Rambish <krisr@chromium.org> |
Add check if TPM is in defend mode. If the TPM is in defend mode, then the TPMStore will behave unreliably. This check aborts the test if the TPM is in defend mode. BUG=chromium:440241 TEST=Manual; Ran it DEPLOY=test_importer Change-Id: I47f3121a0872001d2dd5224fa745d0ebf370b856 Reviewed-on: https://chromium-review.googlesource.com/234692 Tested-by: Kris Rambish <krisr@chromium.org> Reviewed-by: Paul Stewart <pstew@chromium.org> Commit-Queue: Kris Rambish <krisr@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
13372b17e81e16243b50a4c73384a86f31fed802 |
|
11-Nov-2014 |
Peter Qiu <zqiu@chromium.org> |
Fix certificate/key id references for wifi services TPM maintains two slots for certficates/keys now, with slot 0 for system specific and slot 1 for user specific. This means slot ID is required in order to retrieve certificate/key from the TPM. Prepend TPM slot ID to the certificate/key ID "slot_id:key_id" when specifying certificate for WiFi services, so wpa_supplicant can retrieve the certificate from the TPM. BUG=chromium:431831 TEST=Run network_WiFi_SimpleConnect.wifi_check1x_WPA Change-Id: Iec3c53861e137a1f92e2f51ba7dc05f582120bfe Reviewed-on: https://chromium-review.googlesource.com/228955 Tested-by: Peter Qiu <zqiu@chromium.org> Reviewed-by: Christopher Wiley <wiley@chromium.org> Reviewed-by: Paul Stewart <pstew@chromium.org> Commit-Queue: Peter Qiu <zqiu@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
c4c2e2892de9360ce446bd1e5139bad35eec9a3b |
|
04-Nov-2014 |
Darren Krahn <dkrahn@chromium.org> |
Fix tpm_store to use the right PKCS #11 slot. The p11_replay tool by default uses slot 0 which is the system slot. The temporary token created by tpm_store will be loaded onto slot 1. We know it will always be 1 because chapsd is explicitly restarted in the reset() method. BUG=chromium:422673 TEST=repeated success of network_VPNConnect.l2tpipsec_cert on daisy Change-Id: Id44ff1b63d7347974e83ebac4201fb5110aa0af7 Reviewed-on: https://chromium-review.googlesource.com/227442 Reviewed-by: Paul Stewart <pstew@chromium.org> Commit-Queue: Darren Krahn <dkrahn@chromium.org> Tested-by: Darren Krahn <dkrahn@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
488616a9f5a96d8fc19684e4bc2bdfef607b0d32 |
|
31-Jan-2014 |
Richard Barnette <jrbarnette@chromium.org> |
Revert "Unload the chaps system token in TPMStore.reset()." This reverts commit b3239c0a30b2d0805e0cd690cf952bc2644bbfe8. This change is suspected in network_VPNConnect failures BUG=chromium:339743 Change-Id: Idd9a5a1cf98e89e7798dd116801ca1e215a7abff Reviewed-on: https://chromium-review.googlesource.com/184525 Reviewed-by: Richard Barnette <jrbarnette@chromium.org> Commit-Queue: Richard Barnette <jrbarnette@chromium.org> Tested-by: Richard Barnette <jrbarnette@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
b3239c0a30b2d0805e0cd690cf952bc2644bbfe8 |
|
29-Jan-2014 |
Darren Krahn <dkrahn@chromium.org> |
Unload the chaps system token in TPMStore.reset(). The chapsd daemon may load automatically load a system token from /var/lib/chaps. TPMStore assumes no other chaps tokens exist so this token is now explicitly unloaded. BUG=chromium:210525 TEST=Run VPNConnect.openvpn_cert_verify and check the client stderr to verify that test tokens are always allocated slot 0. Change-Id: I39054390552ec775899a79483ecc0709994c147b Reviewed-on: https://chromium-review.googlesource.com/184405 Reviewed-by: Paul Stewart <pstew@chromium.org> Tested-by: Darren Krahn <dkrahn@chromium.org> Commit-Queue: Darren Krahn <dkrahn@chromium.org>
/external/autotest/client/cros/tpm_store.py
|
ea00bc8fb56a93ebe34924b94cdea9019db0bf8b |
|
25-Jun-2013 |
Paul Stewart <pstew@chromium.org> |
Add TPM store object Add a context-manager for operations to the TPM. Add operations for adding certificates and private keys. BUG=chromium:251483 TEST=Incomplete OpenVPN test with intrumentation using p11_replay which confirmes that objects have been added to the store. Change-Id: I5f16fd0247ae199f0a1c8fcf774ef87c46bb628b Reviewed-on: https://gerrit.chromium.org/gerrit/59929 Commit-Queue: Paul Stewart <pstew@chromium.org> Reviewed-by: Paul Stewart <pstew@chromium.org> Tested-by: Paul Stewart <pstew@chromium.org>
/external/autotest/client/cros/tpm_store.py
|