pvattest-create(1) | Attestation Manual | pvattest-create(1) |
NAME¶
pvattest create - Create an attestation measurement request
SYNOPSIS¶
pvattest create [OPTIONS] --host-key-document <FILE> --output <FILE> --arpk <FILE> <--no-verify|--cert <FILE>>
DESCRIPTION¶
Create attestation measurement requests to attest an IBM Secure Execution guest. Only build attestation requests in a trusted environment such as your Workstation. To avoid compromising the attestation do not publish the attestation request protection key and shred it after verification. Every
OPTIONS¶
-k, --host-key-document <FILE>
--no-verify
-C, --cert <FILE>
--crl <FILE>
--offline
--root-ca <ROOT_CA>
-o, --output <FILE>
-a, --arpk <FILE>
--add-data <FLAGS>
Possible values:
- phkh-att: Request the public host-key-hash of the key that decrypted the attestation request as additional-data.
- secret-store-hash: Request a hash over all successful Add-secret requests and the lock state as additional-data.
- firmware-state: Request the state of the firmware as additional-data.
-h, --help
EXAMPLES¶
Create an attestation request with the protection key 'arp.key', write the request to 'arcb.bin', and verify the host-key document using the CA-signed key 'DigiCertCA.crt' and the intermediate key 'IbmSigningKey.crt'.
Create an attestation request with the protection key 'arp.key', write the request to 'arcb.bin', verify the host-key document using the CA-signed key 'DigiCertCA.crt' and the intermediate key 'IbmSigningKey.crt', and instead of downloading the certificate revocation list use certificate revocation lists 'DigiCertCA.crl', 'IbmSigningKey.crl', and 'rootCA.crl'.
$ pvattest create -k hkd.crt --rpk arp.key -o attreq.bin --cert DigiCertCA.crt --cert IbmSigningKey.crt
$ pvattest create -k hkd.crt --arpk arp.key -o attreq.bin --cert DigiCertCA.crt --cert IbmSigningKey.crt --offline --crl DigiCertCA.crl --crl IbmSigningKey.crl --crl rootCA.crl
SEE ALSO¶
2024-12-05 | s390-tools |