You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -304,9 +304,7 @@ The EnvelopeSignedCSRdata shall adhere to the following requirements:
304
304
- An array of OIDs representing the key's derivation attributes (see @sec:defined-oids for defined OIDs)
305
305
- The CSR included in the EAT SHALL be DER-encoded and may be either self-signed or non-self-signed depending on device capabilities. For non-self-signed CSRs, the signature field SHALL contain all zeroes and be the same size as would be required for a valid signature using the subject key's algorithm.
306
306
- The nonce claim SHALL match the nonce value provided in the GET_ENVELOPE_SIGNED_CSR request to ensure freshness.
307
-
- If SignerSlotIDParam indicates a signed envelope, the CWT SHALL be signed by an Attestation Key endorsed by the certificate chain corresponding to the specified SlotID. In addition, the unprotected header of the CWT SHALL contain the Attestation Key's certificate chain, including at least all certificates from the Attestation Key up to the identity certificate issued by the slot's PKI owner.
308
-
- E.g., Slot 0's certificate chain would extend at least to the vendor-endorsed certificate over IDevID. A separate slot's certificate chain would extend at least to the certificate issued by the slot's configured PKI owner.
309
-
- A device may report intermediate certificates for the slot's PKI owner if it is configured to do so.
307
+
- The CWT SHALL be signed by an Attestation Key. The EAT's protected header contains a key identifier (kid) that indicates which key signed the EAT, allowing verifiers to locate the appropriate certificate for verification.
310
308
311
309
[^private-claims]: RFC 8392 [@{ietf-cwt}] defines a private claim as one whose key value has an integer value < -65536.
312
310
@@ -356,6 +354,7 @@ The EAT SHALL be encoded as a signed CWT using COSE_Sign1. The signature provide
356
354
**Key Identification:**
357
355
358
356
The COSE_Sign1 protected header SHALL include:
357
+
359
358
- **Algorithm identifier (alg: 1)** - Integer identifying the signature algorithm used
360
359
- **Content type (content-type: 3)** - Text string or integer indicating the content type (for EAT, this is typically "application/eat+cwt")
361
360
- **Key ID (issuer-key-id: 4)** - Binary string that MUST match the subject name of the certificate containing the public key that can verify the EAT signature
0 commit comments