Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[provisioning] enable benchtop SIVAL cert endorsement with Nitrokeys #25502

Merged

Conversation

timothytrippel
Copy link
Contributor

The DICE CA key may be stored on a Nitrokey, which can be used in a benchtop provisioning flow to endorse DICE certificates. This enables such flows by simply setting an envar (PKCS11_MODULE_PATH) and plugging in a Nitrokey to the host machine.

@timothytrippel timothytrippel force-pushed the enable-nk-cert-endorse branch 3 times, most recently from 4300c8f to df5848b Compare December 4, 2024 01:39
"key_type": "Token",
"key": "sv00-earlgrey-a1-ca-dice-0"
},
"ext": {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TODO: make ext optional for skus that don't have extra certs.

Copy link
Contributor

@moidx moidx left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: You may have to add the keys/sival data dependencies to orchestrator if you are planning to use it without bazel.

@timothytrippel timothytrippel requested a review from a team as a code owner December 4, 2024 02:58
@timothytrippel timothytrippel requested review from HU90m and removed request for a team December 4, 2024 02:58
@timothytrippel timothytrippel removed the request for review from HU90m December 4, 2024 04:04
@timothytrippel
Copy link
Contributor Author

nit: You may have to add the keys/sival data dependencies to orchestrator if you are planning to use it without bazel.

Ah right, fixed. Thanks.

@timothytrippel timothytrippel force-pushed the enable-nk-cert-endorse branch 4 times, most recently from 94375f7 to 1d960d5 Compare December 4, 2024 08:18
The DICE CA key is stored on a Nitrokey, which can be used in a benchtop
provisioning flow to endorse DICE certificates.

Signed-off-by: Tim Trippel <[email protected]>
This pubkey is used to encrypt RMA unlock tokens during FT before saving
them to the registry.

Signed-off-by: Tim Trippel <[email protected]>
The DIN portion of the device ID contains fields that are in BCD format,
as was updated in lowRISC#25493. However, the test was not updated accordingly.
Moreover, lowRISC#25493 only added parsing BCD formated DINs, but not
generating them from the internal DIN object representation. This has
also been fixed.

Signed-off-by: Tim Trippel <[email protected]>
@timothytrippel timothytrippel force-pushed the enable-nk-cert-endorse branch 2 times, most recently from 473f2cb to b966c9e Compare December 4, 2024 23:55
The ujson payload containing the device ID was sent to the FT
individualize in the wrong order.

Signed-off-by: Tim Trippel <[email protected]>
The personalization binaries of non-emulation SKUs are checked into the
the repo, and therefore have a different path. Fix the orchestrator
script to use the correct path for these binaries.

Signed-off-by: Tim Trippel <[email protected]>
@timothytrippel timothytrippel merged commit df426c3 into lowRISC:earlgrey_1.0.0 Dec 5, 2024
30 of 31 checks passed
@timothytrippel timothytrippel deleted the enable-nk-cert-endorse branch December 5, 2024 04:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants