-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need help to configure optiga trustM as HSM during aws device tester(device qualification process) #18
Comments
Hi @Darsh-Dev if I recall corectly the IDT doesn't require from you to have the corresponding certificate, only the corresponding private key stored on the chip (referenced inthe pkcs11 config file) and the public key stored externally (in the file which you should feed to the IDT). For the key generation you can follow the steps here (Option #2), the resulting output; e.g.
should be stored in the file Alternativly we do have a managmenet UI tool for OPTIGA Trust device which can help to manage access conditions for objects. You can ask you contact at Infineon to get it. |
Hi @ayushev On other note while working with optiga's pre-provisioned credentials (not performing onBoard key genration) and using But then it doesn't come out of the while loop here, I also tried disabling pkcs11configPAL_DESTROY_SUPPORTED but not helping. Below are other configs which works with pre-provisoned configs while running the aws_demo and can communicate
Any thoughts on this ? Thanks |
Hello @Darsh-Dev |
After May be I am missing something ?! |
Hi @ayushev, On changing E2/F2 credentials with onBoard key generation process, AWS communication is not working, server closes socket at TLS handshake stage -
Now if i change pkcs11 configs to work with per-privisioned certifications communication is working fine. I am currently performing this on aws_demo not on aws_test. Below are my mbedtls logs for E0/F0 - working as well as ,E2/F2 - Non-working logs Non-working-logs-debug-OnBoardKey.txt And here is my pkcs11 configs (bit messy) So, any guidance on what could be configured wrong for OnBoard certification exchanges ? |
Hi @Darsh-Dev great that you have provided the log, that make it way easier. The certificate you have installed in the slot is RSA based,
whereas the default certificate is EC256 based
mbedtls wrapper doesn't have a function to handle the RSA private key installed in optiga |
@ayushev, Appreciate your help. |
Hi @Darsh-Dev and @ayushev , Can you help @ayushev ? -- |
Hi @ayushev and @Darsh-Dev , To provide an update, if I followed below link and added
Tests are passing. Any thoughts ? -- |
Hello @Rutvij-dev , I believe the problem of @Darsh-Dev might be already resolved and if I understand this correctly it was in the setup he had. Thanks in advance |
Hello @ayushev, Certainly We both the different setup for the hardware, but from the top level of debugging I found that these both are the different repos.
Where In Infineon's repo I found After applying that snippt from Infineon's repo, I could pass my result,I believe this is more of a implementation differences rather then setup. Kindly correct me if i m wrong. -- |
Hello @Rutvij-dev |
Hi,
I am porting the OPTIGA TrustM and AWS FreeRTOS in stm32wb55.
I also port the pkcs11 for OPTIGA trusm and run the aws_test code with testrunnerFULL_PKCS11_ENABLED config set to 1 and it passes all the test cases.
Now, I want to qualify our kit(STM32WB55 + OPTIGA trustM) with HSM(OPTIGA trustM) into the AWS FreeRTOS catalog.
I follow this qualification steps.
I set the below parameter in device.json for pkcs11
Now I need help to configure secureElementConfig
Query:
How to extract and provide a PublicKey path into the above parameter(secureElementConfig).
As the "XMC4800 IoT Connectivity Kit with OPTIGA Trust X" was qualified for AWS FreeRTOS, It really helps if possible to share device.json file of XMC4800 IoT Connectivity Kit with OPTIGA Trust X for reference or give proper guidance on secureElementConfig parameter for OPTIGA trustM.
The text was updated successfully, but these errors were encountered: