-
Notifications
You must be signed in to change notification settings - Fork 779
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[silicon_creator/sw] refactor the otbn_boot_attestation_keygen
function
#22622
Labels
Component:Software
Issue related to Software
Manufacturing
Issues related to manufacturing tasks (hw or sw)
Priority:P1
Priority: high
SW:ROM_EXT
ROM_EXT related issues
Type:Task
Tasks, to-do list.
Milestone
Comments
timothytrippel
added
SW:ROM_EXT
ROM_EXT related issues
Manufacturing
Issues related to manufacturing tasks (hw or sw)
Component:Software
Issue related to Software
Priority:P1
Priority: high
Type:Task
Tasks, to-do list.
labels
Apr 17, 2024
timothytrippel
changed the title
We will need to refactor the
[silicon_creator/sw] refactor the Apr 17, 2024
otbn_boot_attestation_keygen
function to:otbn_boot_attestation_keygen
function to:
timothytrippel
changed the title
[silicon_creator/sw] refactor the
[silicon_creator/sw] refactor the Apr 17, 2024
otbn_boot_attestation_keygen
function to:otbn_boot_attestation_keygen
function to
timothytrippel
changed the title
[silicon_creator/sw] refactor the
[silicon_creator/sw] refactor the Apr 17, 2024
otbn_boot_attestation_keygen
function tootbn_boot_attestation_keygen
function
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 24, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 24, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 25, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 27, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 29, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
that referenced
this issue
Apr 30, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes #22622. Signed-off-by: Tim Trippel <[email protected]>
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
Apr 30, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]> (cherry picked from commit 641d4e0)
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
May 1, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]> (cherry picked from commit 641d4e0)
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
May 3, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]> (cherry picked from commit 641d4e0)
timothytrippel
added a commit
to timothytrippel/opentitan
that referenced
this issue
May 3, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes lowRISC#22622. Signed-off-by: Tim Trippel <[email protected]> (cherry picked from commit 641d4e0)
timothytrippel
added a commit
that referenced
this issue
May 4, 2024
This refactors the OTBN boot services library, and silicon_creator keymgr driver to enable generating two types attestation keys: 1. DICE keys, that are based on the attestation side of the key ladder, and 2. TPM keys, that are based on the sealing side of the key ladder. This fixes #22622. Signed-off-by: Tim Trippel <[email protected]> (cherry picked from commit 641d4e0)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Component:Software
Issue related to Software
Manufacturing
Issues related to manufacturing tasks (hw or sw)
Priority:P1
Priority: high
SW:ROM_EXT
ROM_EXT related issues
Type:Task
Tasks, to-do list.
To enable #22573, we need to refactor the
otbn_boot_attestation_keygen
function to: allow selecting which side of the key ladder we are generating a key from. For the TPM key case we want to generate from thesealing
side, but as is currently written, theotbn_boot_attestation_keygen
function callssc_keymgr_generate_attestation_key_otbn
here, which under the hood, selects theattestation
side of the key ladder here.Originally posted by @timothytrippel in #22573 (comment)
The text was updated successfully, but these errors were encountered: