Skip to content

Commit a0d3fb1

Browse files
committed
Small fix in the GetEnvelopeSignedCSR
Signed-off-by: Fabrizio Damato <fabrizio.damato@amd.com>
1 parent 7ec11f4 commit a0d3fb1

File tree

1 file changed

+2
-4
lines changed
  • specifications/device-identity-provisioning

1 file changed

+2
-4
lines changed

specifications/device-identity-provisioning/spec.ocp

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ The following fields should be treated identically as in GET_CSR from SPDM 1.3:
266266

267267
The following fields present in this command are not present in GET_CSR:
268268

269-
- **SignerSlotIDParam** - defines which key signs the CSR envelope.
269+
- **SignerSlotIDParam** - defines which key signs the CSR envelope (for SPDM Implementation).
270270
- **Nonce** - provides freshness.
271271

272272
Table: ENVELOPE_SIGNED_CSR VendorDefinedRespPayload {#tbl:ecsr-resp}
@@ -304,9 +304,7 @@ The EnvelopeSignedCSRdata shall adhere to the following requirements:
304304
- An array of OIDs representing the key's derivation attributes (see @sec:defined-oids for defined OIDs)
305305
- The CSR included in the EAT SHALL be DER-encoded and may be either self-signed or non-self-signed depending on device capabilities. For non-self-signed CSRs, the signature field SHALL contain all zeroes and be the same size as would be required for a valid signature using the subject key's algorithm.
306306
- The nonce claim SHALL match the nonce value provided in the GET_ENVELOPE_SIGNED_CSR request to ensure freshness.
307-
- If SignerSlotIDParam indicates a signed envelope, the CWT SHALL be signed by an Attestation Key endorsed by the certificate chain corresponding to the specified SlotID. In addition, the unprotected header of the CWT SHALL contain the Attestation Key's certificate chain, including at least all certificates from the Attestation Key up to the identity certificate issued by the slot's PKI owner.
308-
- E.g., Slot 0's certificate chain would extend at least to the vendor-endorsed certificate over IDevID. A separate slot's certificate chain would extend at least to the certificate issued by the slot's configured PKI owner.
309-
- A device may report intermediate certificates for the slot's PKI owner if it is configured to do so.
307+
- The CWT SHALL be signed by an Attestation Key. The EAT's protected header contains a key identifier (kid) that indicates which key signed the EAT, allowing verifiers to locate the appropriate certificate for verification.
310308

311309
[^private-claims]: RFC 8392 [@{ietf-cwt}] defines a private claim as one whose key value has an integer value < -65536.
312310

0 commit comments

Comments
 (0)