本文整理匯總了Golang中github.com/coreos/go-tspi/tspi.Context.LoadKeyByUUID方法的典型用法代碼示例。如果您正苦於以下問題:Golang Context.LoadKeyByUUID方法的具體用法?Golang Context.LoadKeyByUUID怎麽用?Golang Context.LoadKeyByUUID使用的例子?那麽, 這裏精選的方法代碼示例或許可以為您提供幫助。您也可以進一步了解該方法所在類github.com/coreos/go-tspi/tspi.Context
的用法示例。
在下文中一共展示了Context.LoadKeyByUUID方法的3個代碼示例,這些例子默認根據受歡迎程度排序。您可以為喜歡或者感覺有用的代碼點讚,您的評價將有助於係統推薦出更棒的Golang代碼示例。
示例1: AIKChallengeResponse
// AIKChallengeResponse takes the output from GenerateChallenge along with the
// encrypted AIK key blob. The TPM then decrypts the asymmetric challenge with
// its EK in order to obtain the AES key, and uses the AES key to decrypt the
// symmetrically encrypted data. It verifies that this data blob corresponds
// to the AIK it was given, and if so hands back the secret contained within
// the symmetrically encrypted data.
func AIKChallengeResponse(context *tspi.Context, aikblob []byte, asymchallenge []byte, symchallenge []byte) (secret []byte, err error) {
var wellKnown [20]byte
srk, err := context.LoadKeyByUUID(tspi.TSS_PS_TYPE_SYSTEM, tspi.TSS_UUID_SRK)
if err != nil {
return nil, err
}
srkpolicy, err := srk.GetPolicy(tspi.TSS_POLICY_USAGE)
if err != nil {
return nil, err
}
srkpolicy.SetSecret(tspi.TSS_SECRET_MODE_SHA1, wellKnown[:])
tpm := context.GetTPM()
tpmpolicy, err := context.CreatePolicy(tspi.TSS_POLICY_USAGE)
if err != nil {
return nil, err
}
tpm.AssignPolicy(tpmpolicy)
tpmpolicy.SetSecret(tspi.TSS_SECRET_MODE_SHA1, wellKnown[:])
aik, err := context.LoadKeyByBlob(srk, aikblob)
if err != nil {
return nil, err
}
secret, err = tpm.ActivateIdentity(aik, asymchallenge, symchallenge)
return secret, err
}
示例2: loadSRK
func loadSRK(context *tspi.Context) (*tspi.Key, error) {
srk, err := context.LoadKeyByUUID(tspiconst.TSS_PS_TYPE_SYSTEM, tspi.TSS_UUID_SRK)
if err != nil {
return nil, err
}
srkpolicy, err := srk.GetPolicy(tspiconst.TSS_POLICY_USAGE)
if err != nil {
return nil, err
}
srkpolicy.SetSecret(tspiconst.TSS_SECRET_MODE_SHA1, wellKnown[:])
return srk, nil
}
示例3: CreateAIK
// CreateAIK asks the TPM to generate an Attestation Identity Key. It returns
// the unencrypted public half of the AIK along with an encrypted blob
// containing both halves of the key, and any error.
func CreateAIK(context *tspi.Context) ([]byte, []byte, error) {
var wellKnown [20]byte
n := make([]byte, 2048/8)
for i := 0; i < 2048/8; i++ {
n[i] = 0xff
}
srk, err := context.LoadKeyByUUID(tspi.TSS_PS_TYPE_SYSTEM, tspi.TSS_UUID_SRK)
if err != nil {
return nil, nil, err
}
keypolicy, err := srk.GetPolicy(tspi.TSS_POLICY_USAGE)
if err != nil {
return nil, nil, err
}
err = keypolicy.SetSecret(tspi.TSS_SECRET_MODE_SHA1, wellKnown[:])
if err != nil {
return nil, nil, err
}
tpm := context.GetTPM()
tpmpolicy, err := tpm.GetPolicy(tspi.TSS_POLICY_USAGE)
if err != nil {
return nil, nil, err
}
err = tpm.AssignPolicy(tpmpolicy)
if err != nil {
return nil, nil, err
}
err = tpmpolicy.SetSecret(tspi.TSS_SECRET_MODE_SHA1, wellKnown[:])
if err != nil {
return nil, nil, err
}
pcakey, err := context.CreateKey(tspi.TSS_KEY_TYPE_LEGACY | tspi.TSS_KEY_SIZE_2048)
if err != nil {
return nil, nil, err
}
err = pcakey.SetModulus(n)
if err != nil {
return nil, nil, err
}
aik, err := context.CreateKey(tspi.TSS_KEY_TYPE_IDENTITY | tspi.TSS_KEY_SIZE_2048)
if err != nil {
return nil, nil, err
}
_, err = tpm.CollateIdentityRequest(srk, pcakey, aik)
if err != nil {
return nil, nil, err
}
pubkey, err := aik.GetPubKeyBlob()
if err != nil {
return nil, nil, err
}
blob, err := aik.GetKeyBlob()
if err != nil {
return nil, nil, err
}
_, err = aik.GetModulus()
return pubkey, blob, nil
}