History log of /external/autotest/client/cros/tpm_store.py
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
037f8dfe77e077aca44226ef9c555094e52973cf 26-Jan-2015 Kris Rambish <krisr@chromium.org> Move the TPM check into install_object.

BUG=chromium:452164
TEST=None

Change-Id: Ida18a502943f60b529c01c94e8c0bf8c5b7d5a65
Reviewed-on: https://chromium-review.googlesource.com/243320
Reviewed-by: Paul Stewart <pstew@chromium.org>
Reviewed-by: Kris Rambish <krisr@chromium.org>
Tested-by: Kris Rambish <krisr@chromium.org>
Commit-Queue: Kris Rambish <krisr@chromium.org>
/external/autotest/client/cros/tpm_store.py
088c75f64155b89255e9ebd324230f5c34eda74e 11-Dec-2014 Kris Rambish <krisr@chromium.org> Add check if TPM is in defend mode.

If the TPM is in defend mode, then the TPMStore will behave
unreliably. This check aborts the test if the TPM is in
defend mode.

BUG=chromium:440241
TEST=Manual; Ran it
DEPLOY=test_importer

Change-Id: I47f3121a0872001d2dd5224fa745d0ebf370b856
Reviewed-on: https://chromium-review.googlesource.com/234692
Tested-by: Kris Rambish <krisr@chromium.org>
Reviewed-by: Paul Stewart <pstew@chromium.org>
Commit-Queue: Kris Rambish <krisr@chromium.org>
/external/autotest/client/cros/tpm_store.py
13372b17e81e16243b50a4c73384a86f31fed802 11-Nov-2014 Peter Qiu <zqiu@chromium.org> Fix certificate/key id references for wifi services

TPM maintains two slots for certficates/keys now, with slot 0 for system
specific and slot 1 for user specific. This means slot ID is required in
order to retrieve certificate/key from the TPM.

Prepend TPM slot ID to the certificate/key ID "slot_id:key_id" when specifying
certificate for WiFi services, so wpa_supplicant can retrieve the certificate
from the TPM.

BUG=chromium:431831
TEST=Run network_WiFi_SimpleConnect.wifi_check1x_WPA

Change-Id: Iec3c53861e137a1f92e2f51ba7dc05f582120bfe
Reviewed-on: https://chromium-review.googlesource.com/228955
Tested-by: Peter Qiu <zqiu@chromium.org>
Reviewed-by: Christopher Wiley <wiley@chromium.org>
Reviewed-by: Paul Stewart <pstew@chromium.org>
Commit-Queue: Peter Qiu <zqiu@chromium.org>
/external/autotest/client/cros/tpm_store.py
c4c2e2892de9360ce446bd1e5139bad35eec9a3b 04-Nov-2014 Darren Krahn <dkrahn@chromium.org> Fix tpm_store to use the right PKCS #11 slot.

The p11_replay tool by default uses slot 0 which is the system slot. The
temporary token created by tpm_store will be loaded onto slot 1. We know
it will always be 1 because chapsd is explicitly restarted in the
reset() method.

BUG=chromium:422673
TEST=repeated success of network_VPNConnect.l2tpipsec_cert on daisy

Change-Id: Id44ff1b63d7347974e83ebac4201fb5110aa0af7
Reviewed-on: https://chromium-review.googlesource.com/227442
Reviewed-by: Paul Stewart <pstew@chromium.org>
Commit-Queue: Darren Krahn <dkrahn@chromium.org>
Tested-by: Darren Krahn <dkrahn@chromium.org>
/external/autotest/client/cros/tpm_store.py
488616a9f5a96d8fc19684e4bc2bdfef607b0d32 31-Jan-2014 Richard Barnette <jrbarnette@chromium.org> Revert "Unload the chaps system token in TPMStore.reset()."

This reverts commit b3239c0a30b2d0805e0cd690cf952bc2644bbfe8.

This change is suspected in network_VPNConnect failures

BUG=chromium:339743

Change-Id: Idd9a5a1cf98e89e7798dd116801ca1e215a7abff
Reviewed-on: https://chromium-review.googlesource.com/184525
Reviewed-by: Richard Barnette <jrbarnette@chromium.org>
Commit-Queue: Richard Barnette <jrbarnette@chromium.org>
Tested-by: Richard Barnette <jrbarnette@chromium.org>
/external/autotest/client/cros/tpm_store.py
b3239c0a30b2d0805e0cd690cf952bc2644bbfe8 29-Jan-2014 Darren Krahn <dkrahn@chromium.org> Unload the chaps system token in TPMStore.reset().

The chapsd daemon may load automatically load a system token from
/var/lib/chaps. TPMStore assumes no other chaps tokens exist so this
token is now explicitly unloaded.

BUG=chromium:210525
TEST=Run VPNConnect.openvpn_cert_verify and check the client stderr
to verify that test tokens are always allocated slot 0.

Change-Id: I39054390552ec775899a79483ecc0709994c147b
Reviewed-on: https://chromium-review.googlesource.com/184405
Reviewed-by: Paul Stewart <pstew@chromium.org>
Tested-by: Darren Krahn <dkrahn@chromium.org>
Commit-Queue: Darren Krahn <dkrahn@chromium.org>
/external/autotest/client/cros/tpm_store.py
ea00bc8fb56a93ebe34924b94cdea9019db0bf8b 25-Jun-2013 Paul Stewart <pstew@chromium.org> Add TPM store object

Add a context-manager for operations to the TPM. Add operations
for adding certificates and private keys.

BUG=chromium:251483
TEST=Incomplete OpenVPN test with intrumentation using p11_replay which
confirmes that objects have been added to the store.

Change-Id: I5f16fd0247ae199f0a1c8fcf774ef87c46bb628b
Reviewed-on: https://gerrit.chromium.org/gerrit/59929
Commit-Queue: Paul Stewart <pstew@chromium.org>
Reviewed-by: Paul Stewart <pstew@chromium.org>
Tested-by: Paul Stewart <pstew@chromium.org>
/external/autotest/client/cros/tpm_store.py