OPTIGA™ Trust M
Host Library Documentation
ecc_key_object_confidentiality.h
Go to the documentation of this file.
1 
38 #include <stdint.h>
39 
43 const uint8_t manifest_ecc_key[] =
44 {
45  // COSE Sign1 Trust
46  0x84,
47  // Protected signed header trust
48  0x43,
49  // Trust Sign Algorithm
50  0xA1,
51  // ECDSA
52  0x01, 0x26,
53  // Unprotected signed header trust
54  0xA1,
55  // Root of trust
56  0x04, 0x42,
57  // Trust Anchor OID
58  0xE0, 0xE3,
59  // Payload info Byte string of single byte length
60  0x58,
61  // Byte string length of manifest
62  0x9C,
63  // Trust manifest, array of 6 entries
64  0x86,
65  // Version(Major Type 0)
66  0x01,
67  // NULL
68  0xF6,
69  // NULL
70  0xF6,
71  // Resources, array of 4 entries
72  0x84,
73  // Trust Payload Type
74  0x22,
75  // Payload Length
76  0x18, 0x66,
77  // Trust Payload version
78  0x03,
79  // Trust Add info data
80  0x82,
81  // key algorithm
82  0x03,
83  // key usage
84  0x10,
85  // Trust Processors, array of 2 entries
86  0x82,
87  // Processing step integrity, array of 2 entries
88  0x82,
89  // Process( Major Type 1)
90  0x20,
91  // Parameters, byte string with single byte length
92  0x58,
93  // Byte string length
94  0x25,
95  // IFX Digest info, array of 2 entries
96  0x82,
97  // Digest Algorithm
98  0x18,
99  // SHA-256
100  0x29,
101  // Digest
102  0x58,
103  // Byte string length
104  0x20,
105  // Digest data
106  0x6B, 0x58, 0x06, 0x91, 0xE2, 0x8D, 0xDE, 0xC5,
107  0x86, 0x89, 0x89, 0x28, 0xF8, 0xA1, 0xA3, 0xFE,
108  0xA9, 0xBE, 0x51, 0xC9, 0x4D, 0x6C, 0x34, 0xD6,
109  0x72, 0x05, 0x9E, 0x86, 0x2B, 0xA9, 0x40, 0x39,
110  // Processing step decrypt, array of 2 entries
111  0x82,
112  // Process( Major Type 0)
113  0x01,
114  // COSE_Encrypt_Trust array of 3 entries
115  0x83,
116  // protected-encrypt-header-Trust
117  0x43,
118  // Map
119  0xA1,
120  // Key
121  0x01,
122  // AES-CCM-16-64-128, 128-bit key, 64-bit Authentication(MAC) tag, 13-byte nonce
123  0x0A,
124  // recipients array of 1
125  0x81,
126  // COSE_Recipient_Trust array of 2
127  0x82,
128  // protected-recipient-header-Trust
129  0x58,
130  // byte str
131  0x54,
132  // Map of 3
133  0xA3,
134  // Key
135  0x04,
136  // Value
137  0x42,
138  // Shared secret OID
139  0xF1, 0xD1,
140  // Key
141  0x01,
142  // Value (KeyDerivationAlgorithms)
143  0x3A, 0x00, 0x01, 0x00, 0xB7,
144  // Key
145  0x05,
146  // Value array of 2
147  0x82,
148  0x44,
149  // label(4)
150  0x74, 0x65, 0x73, 0x74,
151  0x58,
152  0x40,
153  // seed(64)
154  0x24, 0xC3, 0xDE, 0x7B, 0x3E, 0xFB, 0x6F, 0x67,
155  0x9E, 0x40, 0xA4, 0xD7, 0x79, 0xAB, 0x9D, 0x19,
156  0x5F, 0x9B, 0xE1, 0xDC, 0x05, 0xD1, 0x5F, 0x93,
157  0xEB, 0xD7, 0x1A, 0xA3, 0x6D, 0xDB, 0xA9, 0x80,
158  0x05, 0xFF, 0x23, 0x26, 0xA7, 0x94, 0x06, 0xE3,
159  0xC7, 0x0D, 0x0A, 0xFF, 0x88, 0xA6, 0x9B, 0xC4,
160  0x87, 0x03, 0x53, 0x7C, 0x24, 0xAB, 0x3A, 0x55,
161  0x87, 0x90, 0x0E, 0x33, 0xE3, 0x0B, 0x54, 0x7D,
162  // ciphertext-recipient-header-Trust
163  0xF6,
164  // AdditionalInfo
165  0xF6,
166  // Trust Target
167  0x82,
168  // Component identifier(0)
169  0x40,
170  // Storage identifier
171  0x42,
172  // Optiga target OID
173  0xE0, 0xF1,
174  // Signature info, byte string of single byte length
175  0x58,
176  // Byte string length for ECC 256
177  0x40,
178  // Signature data
179  0xC1, 0x12, 0x3B, 0xCD, 0x23, 0x25, 0xB0, 0x04, 0xF2, 0x23, 0xA8, 0xF7, 0xE5, 0x26, 0x40, 0xD4,
180  0x1A, 0x60, 0x4D, 0x64, 0x82, 0xA5, 0x84, 0xFF, 0xF2, 0x36, 0x2E, 0x6A, 0x6B, 0x17, 0x0F, 0xD8,
181  0xCF, 0xD4, 0xDB, 0x8B, 0xA6, 0x01, 0x8D, 0x45, 0xA3, 0xFD, 0x23, 0x43, 0xAE, 0xBF, 0x2A, 0x9D,
182  0xC2, 0x9F, 0xD5, 0xB8, 0xDA, 0x47, 0x7E, 0x85, 0xC7, 0x53, 0x6D, 0xFD, 0xE8, 0xE3, 0x32, 0xAF,
183 };
184 
185 
190 {
191  0x6E, 0x8A, 0x12, 0xAF, 0x01, 0x4F, 0xDC, 0xD4, 0x1E, 0x0D, 0xFB, 0xD3, 0xD2, 0xE2, 0xF8, 0xF3,
192  0x7B, 0xC6, 0xF9, 0xE1, 0xFC, 0xA2, 0xF5, 0xC1, 0x62, 0x15, 0x67, 0xE7, 0xFA, 0xA1, 0x24, 0xEE,
193  0x85, 0xEC, 0x6C, 0x31, 0xE8, 0xD1, 0x4A, 0x67, 0xB7, 0x76, 0x40, 0xFD, 0xBB, 0x51, 0x37, 0xF6,
194  0x58, 0xBF, 0xBB, 0xE1, 0x79, 0xA7, 0xCD, 0xD8, 0x29, 0xCC, 0xC8, 0xA1, 0x10, 0x4B, 0x9A, 0x98,
195  0x33, 0xEE, 0xB0, 0x68, 0xB7, 0xD5, 0x1F, 0xAD, 0xAF, 0x1A, 0x8A, 0xF6, 0x14, 0x40, 0xB0, 0x85,
196  0x2F, 0xE6, 0xFF, 0x31, 0xB1, 0x12, 0x51, 0xB2, 0x9C, 0x10, 0xFC, 0xBA, 0x25, 0xF3, 0x43, 0x28,
197  0xA1, 0x99, 0x56, 0xD1, 0xD2, 0xF8, 0xDE, 0xE7, 0xE2, 0xBC, 0x08, 0xF2, 0x67, 0xE7,
198 };
199 
ecc_key_final_fragment_array
const uint8_t ecc_key_final_fragment_array[]
Definition: ecc_key_object_confidentiality.h:189
manifest_ecc_key
const uint8_t manifest_ecc_key[]
Definition: ecc_key_object_confidentiality.h:43