Skip to content

Conversation

@hslatman
Copy link
Member

@hslatman hslatman commented Dec 5, 2025

RSA 3072, RSA 4096, ECDSA P384 and ECDSA P521 EKs use a different AES key size for credential activation.

RSA 3072, RSA 4096, ECDSA P384 and ECDSA P512 EKs use a different
AES block size for credential activation.
@hslatman hslatman force-pushed the herman/rsa3072-aes256 branch from aa122c6 to 2c2b580 Compare December 5, 2025 16:13
@hslatman
Copy link
Member Author

hslatman commented Dec 5, 2025

Towards: DVC-212.

@hslatman hslatman changed the title Add support for 256 bit AES block size encryption Add support for 256 bit AES key encryption Dec 17, 2025
The `legacy/tpm2` package was using the length of the symmetric
key as the length for the IV. This is wrong, as AES256 has a 32
byte key, but the block size is 16.

By using `github.com/google/go-tpm@7d0adf0a5e3b`, we get the
correct IV size. The change was approved already, but it's waiting
to be merged.
@hslatman
Copy link
Member Author

Had to bump some CI config because of the go-tpm upgrade.

@hslatman hslatman force-pushed the herman/rsa3072-aes256 branch from e549f4f to d56b55d Compare December 19, 2025 13:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants