Slight documentation tweak
Specify that DICE-based RKP implementations may also allow a ROM extension to manage the UDS public key. Test: The words are semantically parseable Change-Id: I8f9c6efb01fc76318220cf1bc4a0eb3a3ad42f87
This commit is contained in:
parent
2f5e431e3f
commit
5c0f7234b6
1 changed files with 1 additions and 1 deletions
|
@ -52,7 +52,7 @@ binding between the device and the backend. To briefly describe them:
|
|||
* Degenerate DICE (Phase 1): A TEE root of trust key pair is used to sign
|
||||
certificate requests; a single self-signed certificate signifies this phase.
|
||||
* DICE (Phase 2): A hardware root of trust key pair is only accessible to ROM
|
||||
code; the boot process follows the [Android Profile for
|
||||
or ROM extension code; the boot process follows the [Android Profile for
|
||||
DICE](#android-profile-for-dice).
|
||||
* SoC vendor certified DICE (Phase 3): This is identical to Phase 2, except the
|
||||
SoC vendor also does the UDS\_pub extraction or certification in their
|
||||
|
|
Loading…
Reference in a new issue