]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
keys/trusted_keys: fix handle passed to tpm_buf_append_name during unseal
authorSrish Srinivasan <ssrish@linux.ibm.com>
Fri, 23 Jan 2026 16:55:03 +0000 (22:25 +0530)
committerJarkko Sakkinen <jarkko@kernel.org>
Sun, 25 Jan 2026 17:03:45 +0000 (19:03 +0200)
TPM2_Unseal[1] expects the handle of a loaded data object, and not the
handle of the parent key. But the tpm2_unseal_cmd provides the parent
keyhandle instead of blob_handle for the session HMAC calculation. This
causes unseal to fail.

Fix this by passing blob_handle to tpm_buf_append_name().

References:

[1] trustedcomputinggroup.org/wp-content/uploads/
    Trusted-Platform-Module-2.0-Library-Part-3-Version-184_pub.pdf

Fixes: 6e9722e9a7bf ("tpm2-sessions: Fix out of range indexing in name_size")
Signed-off-by: Srish Srinivasan <ssrish@linux.ibm.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
security/keys/trusted-keys/trusted_tpm2.c

index a7ea4a1c3bed28a424bbee4e452e31f94923f45c..6340823f8b53c70b409be01ee487c5ded55ca5b3 100644 (file)
@@ -465,7 +465,7 @@ out:
 }
 
 /**
- * tpm2_unseal_cmd() - execute a TPM2_Unload command
+ * tpm2_unseal_cmd() - execute a TPM2_Unseal command
  *
  * @chip: TPM chip to use
  * @payload: the key data in clear and encrypted form
@@ -498,7 +498,7 @@ static int tpm2_unseal_cmd(struct tpm_chip *chip,
                return rc;
        }
 
-       rc = tpm_buf_append_name(chip, &buf, options->keyhandle, NULL);
+       rc = tpm_buf_append_name(chip, &buf, blob_handle, NULL);
        if (rc)
                goto out;