Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[provisioning] fix bugs in FT personalization binary to prepare for certificate generation #20923

Merged
merged 3 commits into from
Jan 23, 2024

Conversation

timothytrippel
Copy link
Contributor

This fixes several bugs in the FT personalization binary and certificate template generation infrastructure.

@timothytrippel timothytrippel self-assigned this Jan 23, 2024
@timothytrippel timothytrippel requested review from cfrantz and a team as code owners January 23, 2024 00:53
@timothytrippel timothytrippel removed the request for review from a team January 23, 2024 00:53
rules/certificates.bzl Outdated Show resolved Hide resolved
Copy link
Contributor

@pamaury pamaury left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me, although I would like to like to understand why we need the CcInfo.

KMAC must be configured properly for the keymgr to advance.
Additionally, this erases the flash info pages that store
certificitates before they are written to (to ensure we always start
from a clean slate).

Signed-off-by: Tim Trippel <[email protected]>
The bazel rule must add the basename of the autogenerated files, not the
pathname.

Signed-off-by: Tim Trippel <[email protected]>
A SHA256 hash is 32 bytes, not 20.

Signed-off-by: Tim Trippel <[email protected]>
@timothytrippel timothytrippel merged commit 7203583 into lowRISC:master Jan 23, 2024
32 checks passed
@timothytrippel timothytrippel deleted the ft-perso-certgen branch January 23, 2024 21:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants