aboutsummaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorDavid Hu <david.hu@arm.com>2021-05-14 17:03:14 +0800
committerDavid Hu <david.hu@arm.com>2021-06-02 05:00:40 +0200
commit611610c1527a1d46569b2126eaa6a396986e4623 (patch)
tree3fea30ee1c49fe47e8ca612973949e7c15b23624 /docs
parent51546c2e8b6265838ccdc04053c528549592e804 (diff)
downloadtrusted-firmware-m-611610c1527a1d46569b2126eaa6a396986e4623.tar.gz
Attest: Remove initial attestation get public key API function
It is overkill to implement a dedicated secure function for NS to fetch initial attestation public key just for test purpose. Besides, this function to get public key can be confusing as it is not defined in PSA Initial Attestation API spec. Remove get public key secure function from NS and S sides to simplify TF-M initial attestation implementation and interface. Change-Id: I8d0967698e3d2f2c684194caa9a6234585026a71 Signed-off-by: David Hu <david.hu@arm.com>
Diffstat (limited to 'docs')
-rw-r--r--docs/integration_guide/services/tfm_attestation_integration_guide.rst12
1 files changed, 1 insertions, 11 deletions
diff --git a/docs/integration_guide/services/tfm_attestation_integration_guide.rst b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
index 2c43ea7bd..311e97a2b 100644
--- a/docs/integration_guide/services/tfm_attestation_integration_guide.rst
+++ b/docs/integration_guide/services/tfm_attestation_integration_guide.rst
@@ -237,12 +237,6 @@ interface:
psa_initial_attest_get_token_size(size_t challenge_size,
size_t *token_size);
- psa_status_t
- tfm_initial_attest_get_public_key(uint8_t *public_key,
- size_t public_key_buf_size,
- size_t *public_key_len,
- psa_ecc_family_t *elliptic_curve_type);
-
The caller must allocate a large enough buffer, where the token is going to be
created by Initial Attestation Service. The size of the created token is highly
dependent on the number of software components in the system and the provided
@@ -582,10 +576,6 @@ does not need to operate such a service.
+=========================+=========================================+=========================================+
| Authentication mode | HMAC over SHA256 | ECDSA P256 over SHA256 |
+-------------------------+-----------------------------------------+-----------------------------------------+
-| Supported APIs | - psa_initial_attest_get_token(..) | - psa_initial_attest_get_token(..) |
-| | - psa_initial_attest_get_token_size(..) | - psa_initial_attest_get_token_size(..) |
-| | | - tfm_initial_attest_get_public_key(..) |
-+-------------------------+-----------------------------------------+-----------------------------------------+
| Crypto key type in HW | Symmetric key | ECDSA private key (secp256r1) |
+-------------------------+-----------------------------------------+-----------------------------------------+
| Secrets are stored | Device and database | Device only |
@@ -668,4 +658,4 @@ that user has license for DS-5 and FVP models:
--------------
-*Copyright (c) 2018-2020, Arm Limited. All rights reserved.*
+*Copyright (c) 2018-2021, Arm Limited. All rights reserved.*