You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- **Purpose:** Requests a freshness-protected (replay-resistant) Certificate Signing Request that is envelope-signed by an attestation key to establish trust in a device's identity keypair
624
-
- **Reference:** See Device Identity Provisioning specification for full command definition
625
-
626
-
#### GET_EAT (0x02)
627
-
- **Defined in:** OCP Profile for IETF Entity Attestation Token
628
-
- **Purpose:** Retrieves attestation evidence in OCP EAT format
629
-
- **Reference:** See OCP EAT Profile specification for full command definition
630
-
631
-
632
578
# Measurement collection and storage
633
579
634
580
## REQUIREMENTS - What to measure and what not to measure {#sec:requirements-what-to-measure-and-what-not-to-measure}
Copy file name to clipboardExpand all lines: specifications/ietf-eat-profile/spec.ocp
+7-33Lines changed: 7 additions & 33 deletions
Original file line number
Diff line number
Diff line change
@@ -288,7 +288,7 @@ TODO: fill in with a diag
288
288
289
289
## Overview
290
290
291
-
The GET_EAT command enables requesters to obtain attestation evidence from a device in the form of an Entity Attestation Token (EAT) that conforms to this OCP Profile. This command is designed to be transport-agnostic while providing a standardized interface for attestation requests.
291
+
The GET_EAT command enables verifiers to obtain attestation evidence from a device in the form of an Entity Attestation Token (EAT) that conforms to this OCP Profile. This command is designed to be transport-agnostic while providing a standardized interface for attestation requests.
292
292
293
293
## Command Definition
294
294
@@ -304,10 +304,13 @@ The GET_EAT command enables requesters to obtain attestation evidence from a dev
0 commit comments