This is an automated email from the ASF dual-hosted git repository.
mssun pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/incubator-teaclave.git
The following commit(s) were added to refs/heads/develop by this push:
new beaf879 [keys] Update readme
beaf879 is described below
commit beaf879cbfc16816760bd9dfe8651a12e9788fec
Author: Mingshen Sun <[email protected]>
AuthorDate: Mon Feb 10 11:36:23 2020 -0800
[keys] Update readme
---
config/build.config.toml | 2 +-
keys/README.md | 6 ++----
2 files changed, 3 insertions(+), 5 deletions(-)
diff --git a/config/build.config.toml b/config/build.config.toml
index 29bdeb6..f23ce43 100644
--- a/config/build.config.toml
+++ b/config/build.config.toml
@@ -3,7 +3,7 @@
# Intel Attestation Service root CA certificate to verify attestation report
as_root_ca_cert = { path = "../keys/ias_root_ca_cert.pem" }
# For DCAP, use the following cert
-#as_root_ca_cert = { path = "../keys/dcap_root_ca_cert.pem" }
+# as_root_ca_cert = { path = "../keys/dcap_root_ca_cert.pem" }
# Auditors' public keys to verify their endorsement signatures
auditor_public_keys = [
diff --git a/keys/README.md b/keys/README.md
index 03c4050..006dbea 100644
--- a/keys/README.md
+++ b/keys/README.md
@@ -7,10 +7,8 @@ Note that these are only for demonstration. *DO NOT use them
in production.*
- `ias_root_ca_cert.pem`: attestation report root CA certificate for Intel SGX
Attestation Service, obtained from the
[service
website](https://api.portal.trustedservices.intel.com/EPID-attestation)
-- `dcap_root_ca_cert.pem` and `dcap_root_ca_cert.der`: Root CA certificate (in
PEM
- and DER formats, respectively) used for conntecting to the reference DCAP
- attestation server and verifying ECDSA attestation reports. Examples. Should
- NOT be used in production.
+- `dcap_root_ca_cert.pem`: root CA certificate used for connecting to the
+ reference DCAP attestation server and verifying ECDSA attestation reports.
- `dcap_server_cert.pem` and `dcap_server_key.pem`: DCAP attestation server
end-entity certificate and private key. Certificate is signed by DCAP root
CA.
- `auditors`: contains auditors' keys to sign the *enclave info* for mutual
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]