With the release of tooling by the VirTEE organization, this tool is now considered deprecated. Consult the following table for replacement tooling:
Technologies | Replacement |
---|---|
Complete Library Support | sev |
Legacy SEV and SEV-ES | sevctl |
SEV-SNP Guest Tooling | snpguest |
SEV-SNP Host Tooling | snphost |
 Version: v20 Updated: 2021-09-17  Â
- The SEV API can be found here: https://developer.amd.com/sev/
- SEV-Tool may be used by either a Guest Owner or a Platform Owner. Guest Owner commands will not talk to the SEV firmware and therefore are not required to be running on a Platform that supports SEV. Platform Owner commands talk directly to the SEV firmware and therefore must be running on an OS and Platform that supports SEV.
- All Linux distros are supported. Communication with the SEV firmware through the Linux ccp kernel driver is not required.
- Your Kernel must support SEV.
- SME/SEV OS Support
SEV Guest SEV Host (VM) (Hypervisor) Linux® 4.15 Y Linux® 4.16 Y Y RHEL 7.6 Y RHEL 8 Y Y Fedora 28 Y Y SLES 15 Y Y Ubuntu 18.04 Y Ubuntu 10.10, 19.04 Y Y Oracle Linux UEK 5 Y Y VMWare - Support in Upcoming version of vSphere OpenStack - Support Upstream
- If running Linux, the ccp Kernel driver must be running and supported, as that is how the SEV-Tool communicates to the firmware. To tell if your Kernel supports SEV and the ccp driver is working correctly, run a dmesg and look for the following line:
For example, in Ubuntu 18.10, Kernel 4.18.0-15-generic, you will see something similar to
$ ccp [xxxx:xx:xx.x]: SEV API:x.xx build:x
This means that the ccp driver was able to run the Init command against the SEV firmware. Note: You might also see a dmesg line noting that "Direct firmware load for amd/sev.fw failed with error -2". This just means that the firmware file is not there for the ccp driver to run the Download_Firmware command on startup, and you will be running with the SEV firmware that is provided in the BIOS. This is totally normal.$ ccp [0000:01:00.2]: SEV API:0.17 build:5
- Note if running Linux, it is recommended that your OS come with a Kernel that supports SEV by default (Ubuntu 18.10 or later, etc) to have the latest Kernel headers and libc. If you start with an older Kernel and use a Kernel upgrade utility (ex: ukuu in Ubuntu) to update the Kernel manually, this will give you the newest Kernel headers, but you will have an old version of libc, which processed the older Kernel headers, not the new ones. It’s (probably) possible to update libc and have it process the new Kernel Headers, but it’s a lot of work.
- OpenSSL 1.1.1 or newer is required to compile the SEV-Tool. Note that OpenSSL 3.x changed the way RSA is handled and is not currently supported.
- Ubuntu 16.04's user space only officially supports OpenSSL 1.0.x. It is possible to manually download and install the OpenSSL libraries to work around this issue. Go to the following links to download the packages and run the following command to install them.
- https://packages.ubuntu.com/bionic-updates/amd64/libssl-dev/download
- https://packages.ubuntu.com/bionic-updates/amd64/libssl1.1/download
- sudo dpkg -i [DEB_PACKAGE]
- OR you may run the
deps-install.sh
script to meet this requirement (see below).
- Ubuntu 18.04 might not come with OpenSSL 1.1.x pre-installed, so it will need to updated through apt-get
- Boot into a Kernel that supports SEV (see above to confirm your Kernel supports SEV)
- Install git, make, gcc, g++, and openssl dependencies
- In most cases, you can run
deps-install.sh
.$ bash deps-install.sh
- If you would like to manually install dependencies, and are running Debian, Ubuntu
$ sudo apt install git make gcc g++ -y --allow-unauthenticated
- Otherwise, use the method that is supported by your OS
- In most cases, you can run
- The Github is located at: SEV-Tool Github. Do a git clone with SSH
$ git clone git@github.com:AMDESE/sev-tool.git
- Compile the SEV-Tool.
- Running the build script does the following things:
- Downloads, configs, and builds the OpenSSL Git code (submodule init/update)
- Cleans and builds the SEV-Tool
- To run the build script
$ cd sev-tool $ autoreconf -vif && ./configure && make && cp src/sevtool .
- Running the build script does the following things:
- Pull latest changes from Git for any new added/modified tests
$ cd sev-tool $ git pull $ autoreconf -vif && ./configure && make && mv src/sevtool .
- Run the tool with the help flag (-h or --help):
$ sudo ./sevtool -h
- The help menu (and also the documentation below) will provide you with instructions on input parameters, etc
- The input flag format for every command is as follows and will be explained further in the coming sections
$ sudo ./sevtool [optional_input_flags] [command_flag] [required_command_arguments]
- The -h or --help flag will display the help menu to the user
$ sudo ./sevtool -h
- The --sys_info flag will display the system information to the user such as: BIOS version, BIOS release date, SMT status, processor frequency, OS, Kernel version, Git commit number of the SEV-Tool, etc
$ sudo ./sevtool --sys_info --get_id
- The --verbose and --brief flags will turn on/off displaying the out certs/IDs/etc to the screen on commands such as pek_csr, pdh_cert_export, get_id, etc
$ sudo ./sevtool --verbose --sys_info --get_id $ sudo ./sevtool --brief --pek_csr
- Certain commands support the --ofolder flag which will allow the user to select the output folder for the certs exported by the command. See specific command for details
- Generate your OCA. Please see the API spec for key/certificate specifications.
$ openssl ecparam -genkey -name secp384r1 -noout -out ec384-key-pair.pem $ openssl ec -in ec384-key-pair.pem -pubout -out ec384pub.pem
- Get Platform and connect to Internet
- Install SEV-supported operating system
- Confirm that SEV is supported (using steps in OS Requirements)
- Make a folder for the SEV-Tool to import/export certs/IDs from/to (pass into commands with the --ofolder flag)
- Run the get_id command. As a simple check if running when 2 processors, make sure the returned IDs are different by using the --verbose flag
- Get the CEK_ASK from the AMD KDS server by running the generate_cek_ask command
- Note: the CEK certificate will be different every time you pull it from the KDS sever. The server re-generates/re-signs the cert every time instead of storing a static cert
- Run the pek_csr command to generate a certificate signing request for your PEK. This will allow you to take ownership of the platform.
- Run the sign_pek_csr command to sign the CSR with the provided OCA private key (can be performed on OCA platform).
- Run the pek_cert_import command
- Run the pdh_cert_export command
- Run the get_ask_ark command
- Run the export_cert_chain command to export the PDH down to the ARK (AMD root) and zip it up
- Save the complete cert chain to send to the Guest Owners (GO's)
- Make available UEFI image for guests
- Make a folder for the SEV-Tool to import/export certs/IDs from/to (pass into commands with the --ofolder flag)
- Get UEFI image from the Platform Owner
- (Out of scope) Confirm the UEFI image is trustable.
- Get cert chain (PDH through ARK) from the Platform Owner (PO) and unzip them into a local folder
- Run the validate_cert_chain command to verify the cert chain from the PDH down to the ARK (AMD root)
- Download certificate and extract the respective ARK and ASK and use these for the verification process, not the ones provided by the PO. Example below:
# Example for naples and rome processors
device_type=naples
if [[ $device_type == naples ]]; ask_size=832; else device_type=rome; ask_size=1600; fi
wget https://developer.amd.com/wp-content/resources/ask_ark_$device_type.cert
head -c $ask_size ask_ark_$device_type.cert > ask.cert
dd < /dev/zero bs=$ask_size count=1 > ark.cert
dd conv=notrunc if=ask_ark_$device_type.cert of=ark.cert skip=$ask_size iflag=skip_bytes
- (Out of scope) Verify OCA cert chain from the Platform Owner
- Run the generate_launch_blob command
- Reads in Platform Diffie-Hellman key (PDH cert from Platform) and generates new public/private Guest Owner Diffie-Hellman keypair. The DH key exchange is completed when the PO calls Launch_Start using the GODH public key.
- Send the blob and the Guest Owner's DH public key to the Platform Owner so it can launch your Guests
- Get the measurement from the Platform Owner
- Run the calc_measurement command and verify the measurement from the Platform owner matches what you calculated/expected
- The UEFI image is the digest param that we hash, so we know the Platform Owner isn't modifying that
- Run the package_secret command
- Send the secret(s) to the Platform Owner
- Give "ready to run" approval to the Platform Owner
This is the flow that the Hypervisor will take to prepare the guest
- After receiving the launch blob and the GO Diffie-Hellman public key from the Guest Owner, the Hypervisor can launch (call Launch_Start on) the guest
- Call Launch_Update_Data and Activate, etc
- Call Launch_Measure and send the measurement received from the PSP to the Guest Owner so it can verify against its expected result
- Call Launch_Finish, etc
- After receiving the packaged secrets from the Guest Owner (this step is optional), call Launch_Secret to pass the Guest Owner's secrets into the guest
- The Guest Owner should now give the Hypervisor approval to run its Guest
The following commands are supported by the SEV-Tool. Please see the SEV-API for info on each specific command - Note: All input and output cert's mentioned below are SEV (special format) Certs. See SEV API for details
- factory_reset
- Input args: none
- Files read in: none
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Note: in the current SEV API, this command was renamed to PLATFORM_RESET
- Example
$ sudo ./sevtool --factory_reset
- platform_status
- Input args: none
- Files read in: none
- Outputs: The current platform status will be printed to the screen
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --platform_status
- pek_gen
- Input args: none
- Files read in: none
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --pek_gen
- pek_csr
- This command exports a CSR for the PEK of the platform. Signed CSR can only be re-imported successfully after the platform has been configured as self-owned. Changing ownership voids any existing CSR. As a result, this CSR export only works if the platform is self-owned to begin with.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the certificate signing request
- Files read in: none
- Outputs:
- If --[verbose] flag used: The pek_csr will be printed out to the screen as a hex dump and as a readable format
- If --[ofolder] flag used: The pek_csr will be written as files to the specified folder as a hex dump and as a readable format. Files: pek_csr_out.cert and pek_csr_out_readable.cert
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --pek_csr
- pdh_gen
- Input args: none
- Files read in: none
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --pdh_gen
- pdh_cert_export
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the PDH cert and the Cert Chain (PEK, OCA, CEK)
- Files read in: none
- Outputs:
- If --[verbose] flag used: The PDH cert and Cert Chain will be printed out to the screen as hex dumps and as readable formats
- If --[ofolder] flag used: The PDH cert and Cert Chain will be written as files to the specified folder as hex dumps and as readable formats. Files: pdh_out.cert, pdh_readable_out.cert, cert_chain_out.cert, cert_chain_readable_out.cert
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --pdh_cert_export
- Optional input args: --ofolder [folder_path]
- pek_cert_import
- This command imports a signed PEK CSR together with the corresponding OCA certificate. Import will not be successful if the platform is not self-owned at this stage.
- Required input args:
- The signed PEK CSR
- The OCA certificate that signed the CSR (in AMD certificate format)
- Files read in: [signed PEK CSR] [oca_cert_file]
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --pek_cert_import pek_csr.signed.cert oca.cert
- get_id
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the IDs for Socket0 and Socket1
- Files read in: none
- Outputs:
- If --[verbose] flag used: The IDs for Socket0 and Socket1 will be printed out to the screen
- If --[ofolder] flag used: The IDs for Socket0 and Socket1 will be written as files to the specified folder.
- Files: getid_s0_out.txt and getid_s1_out.txt
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --get_id
- Optional input args: --ofolder [folder_path]
- set_self_owned
- Input args: none
- Files read in: none
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --set_self_owned
- set_externally_owned
- This function sets the platform as self-owned, exports a PEK CSR, signs it and re-imports it in one go. A Private key file (.pem) is a required argument.
- Required input args: The private key of the OCA (.pem format)
- Files read in: [oca_priv_key_file]
- Outputs: none
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --set_externally_owned [oca_priv_key_file] $ sudo ./sevtool --set_externally_owned ../psp-sev-assets/oca_key_in.pem
- generate_cek_ask
This command calls the get_id command and passes that ID into the AMD KDS server to retrieve the cek_ask. If the command returns an error while connecting to the KDS server, please try the command again.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the cek_ark.cert to
- Files read in: none
- Outputs:
- If --[ofolder] flag used: The cek_ask.cert file for your specific platform (processor in socket0) will be exported to the folder specified. Otherwise, it will be exported to the same directory as the SEV-Tool executable. File: cek_ask.cert
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --generate_cek_ask
- Optional input args: --ofolder [folder_path]
- get_ask_ark
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the ask_ark certificate to
- Files read in: none
- Outputs:
- If --[ofolder] flag used: The ark_ark certificate will be exported to the folder specified. Otherwise, it will be exported to the same directory as the SEV-Tool executable. File: ask_ark.cert
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --get_ask_ark
- Optional input args: --ofolder [folder_path]
- export_cert_chain
- This command exports all of the certs (PDH, PEK, OCA, CEK, ASK, ARK) and zips them up so that the Platform Owner can send them to the Guest Owner to allow the Guest Owner to validate the cert chain. The tool gets the CEK from the AMD KDS server and gets the ASK_ARK certificate from the SEV Developer website.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export all of the certificates to and the zip folder in
- Files read in: none
- Outputs:
- If --[ofolder] flag used: The certificates will be exported to and zipped up in the folder specified. Otherwise, they will be exported to and zipped up in the same directory as the SEV-Tool executable. Files: pdh.cert, pek.cert, oca.cert, cek.cert, ask.cert, ark.cert, certs_export.zip
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --export_cert_chain
- calc_measurement
- The purpose of the calc_measurement command is for the user to be able to validate that they are calculating the HMAC/measurement correctly when they would be calling Launch_Measure during the normal API flow. The user can input all of the parameters used to calculate the HMAC and an output will be generated that the user can compare to their calculated measurement.
- The digest parameter is the SHA256 (Naples) or SHA384 (Rome) output digest of the data passed into LaunchUpdateData and LaunchUpdateVMSA
- Required input args: Note the format of the input parameters are ascii-encoded hex bytes.
- [Context]: 0x04 (Does not change)
- [Api Major]: Can be obtained from PO or provided pek.cert (see example below)
- [Api Minor]: Can be obtained from PO or provided pek.cert
API=$(dd if=pek.cert ibs=1 skip=4 count=2 2>/dev/null | xxd -p) API_MAJOR=$(echo $API | cut -c1-2) API_MINOR=$(echo $API | cut -c3-4)
- [Build ID]: Must be provided by PO to GO in some way. Note that command
platform_status
returns value in decimal format, not hex. - [Policy]: Defined by guest. See API Chapter 3 Guest Policy.
- [Digest]: Sha256 output digest over UEFI used during VM launch, e.g. OVMF_CODE.fd (for Naples, Sha384 for Rome)
- [MNonce]: Provided by PO in some way. During VM launch, Launch_measure creates the nonce and appends it to the measure it calculated, see command description in the API. Obtain MNonce by separating measure from nonce
- [TIK]: Created during launch_blob creation and stored tmp_tk.bin. Retrieve by splitting into TEK and TIK (last 32 bytes)
TIK=$(xxd -p tmp_tk.bin | tr -d '\n' | tail -c 32)
- Files read in: none
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the calculated measurement
- Outputs:
- The calculated measurement above matches the measure of the launch_measure SEV-command if the same/expected settings were used.
- If --[verbose] flag used: The input data and calculated measurement will be printed out to the screen
- If --[ofolder] flag used: The calculated measurement will be written to the specified folder as both binary and readable hex data. File: calc_measurement_out.bin, calc_measurement_out.txt
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --calc_measurement [Context] [Api Major] [Api Minor] [Build ID] [Policy] [Digest] [MNonce] [TIK] $ sudo ./sevtool --ofolder ./certs --calc_measurement 04 00 12 0f 00 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 4fbe0bedbad6c86ae8f68971d103e554 66320db73158a35a255d051758e95ed4 You have entered 10 arguments Command: calc_measurement Input Arguments: Context: 04 Api Major: 00 Api Minor: 12 Build ID: 0f Policy: 00 Digest: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 MNonce: 4fbe0bedbad6c86ae8f68971d103e554 TIK: 66320db73158a35a255d051758e95ed4 Output Measurement: 6faab2daae389bcd3405a05d6cafe33c0414f7bedd0bae19ba5f38b7fd1664ea Command Successful
- Note that, for security reasons, the TIK will not be shown when the user runs the tool
- validate_cert_chain
- This function imports the entire cert chain as separate cert files and validates it.
- When calling this command, please unzip the certs into the folder you expect the tool to use.
- The steps are as follows:
- Imports the PDH, PEK, OCA, CEK, ASK, and ARK certs
- Validates the ARK using the ARK (self-signed)
- Validates the ASK using the ARK
- Validates the CEK using the ASK
- Validates the PEK using the CEK and the OCA
- Validates the PDH using the PEK
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will import the certs from, otherwise it will use the same folder as the SEV-Tool executable
- Files read in: ask.cert, ask.cert, cek.cert, oca.cert, pek.cert, pdh.cert
- Outputs: none
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --validate_cert_chain
- generate_launch_blob
- This function imports the PDH certificate from the Platform and builds the Launch_Start session buffer (blob) and the Guest Owner Diffie-Hellman public key certificate. As part of the session buffer, a new public/private Diffie-Hellman keypair for the Guest Owner is generated, which is then used with the Platform's public DH key to calculate a shared secret, and then a master secret, which then is then used generate a new TEK and TIK. The session buffer (launch blob) and Guest Owner DH public key cert will be used as inputs to LaunchStart.
- Required input args: Guest policy in hex format
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the blob file to
- Files read in: pdh.cert
- Outputs:
- If --[ofolder] flag used: The blob file and Guest Owner DH public key certificate will be exported to the folder specified. The Guest Owner DH public and private keys are also exported during the process and are only to be used by the SEV-Tool. Otherwise, all files will be exported to the same directory as the SEV-Tool executable. Files: launch_blob.bin, godh.cert, (ignore these: godh_pubkey.pem, godh_privkey.pem). Note that the output blob file is a binary file; to import to qemu, the file needs to be manually converted to base64.
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --generate_launch_blob [guest policy] $ sudo ./sevtool --ofolder ./certs --generate_launch_blob 39
- package_secret
- This command reads in the pek.cert for API information, the file generated by generate_launch_blob (tmp_tk.bin) for the TEK, the calc_measurement_out.txt and the secret file (secret.txt) which is to be encrypted/wrapped by the TEK. It then outputs a file (packaged_secret.txt) which is then passed into Launch_Secret as part of the normal API flow
- Required input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will look for the launch blob file and the secrets file, and where it will export the packaged secret file to
- Files read in: secret.txt, launch_blob.bin, tmp_tk.bin, calc_measurement_out.bin
- Outputs:
- If --[ofolder] flag used: The blob file will be exported to the folder specified. Otherwise, it will be exported to the same directory as the SEV-Tool executable. File: packaged_secret.txt
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --package_secret
- sign_pek_csr
- This command reads the CSR and signs it with the provided OCA private key. Additionally, the oca.cert is created, which specifies the public key in AMD certificate format.
- Required input args:
- The CSR to be signed (pek_csr.cert)
- The private key of the OCA in pem format [oca_priv_key].pem
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export the signed CSR and OCA certificate to
- Outputs:
- oca.cert: The public certificate belonging to the private key, in AMD certificate format
- pek_csr.signed.cert: The signed CSR containing the OCA signature but still missing the PEK signature.
- Platform/Guest Owner: Platform Owner (Owner Certificate Authority)
- Example
$ sudo ./sevtool --sign_pek_csr [pek_csr.cert] [oca_priv_key] $ sudo ./sevtool --sign_pek_csr pek_csr.cert oca_priv.pem
- validate_attestation
- This command imports the attestation report (attestation_report.bin) sent by the ATTESTATION command and the PEK certificate (pek.cert)(exported during generate_all_certs) and validates that the attestion report was signed by the PEK.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will look for the attestation report and the pek cert file
- Files read in: attestation_report.bin, pek.cert
- Outputs: none
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --validate_attestation
- validate_guest_report
- This command imports the attestation report (guest_report.bin) generated from the Attestation guest message, sent through SNP_GUEST_REQUEST along with the current VCEK (vcek.pem)(exported during export_cert_chain_vcek) of the Platform and validates that the attestation report was signed by the VCEK.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will look for the attestation report and the vcek cert file
- Files read in: guest_report.bin, vcek.pem
- Outputs: none
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --validate_guest_report
- validate_cert_chain_vcek
- This function imports the entire cert chain as separate pem cert files and validates it.
- When calling this command, please unzip the certs into the folder you expect the tool to use.
- The steps are as follows:
- Imports the VCEK, ASK, and ARK .pem certs
- Validates the ARK using the ARK (self-signed)
- Validates the ASK using the ARK
- Validates the VCEK using the ASK
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will import the certs from, otherwise it will use the same folder as the SEV-Tool executable
- Files read in: vcek.pem, ask.pem, ark.pem
- Outputs: none
- Platform/Guest Owner: Guest Owner
- Example
$ sudo ./sevtool --ofolder ./certs --validate_cert_chain_vcek
- export_cert_chain_vcek
- This command exports all of the certs (VCEK, ASK, ARK) as .pem files and zips them up so that the Platform Owner can send them to the Guest Owner to allow the Guest Owner to validate the vcek cert chain and the SNP guest message's Attestation report from SNP_GUEST_REQUEST. The tool gets the VCEK and ASK_ARK certificates from the AMD KDS server.
- Optional input args: --ofolder [folder_path]
- This allows the user to specify the folder where the tool will export all of the certificates to and the zip folder in
- Files read in: none
- Outputs:
- If --[ofolder] flag used: The certificates will be exported to and zipped up in the folder specified. Otherwise, they will be exported to and zipped up in the same directory as the SEV-Tool executable. Files: vcek.der, vcek.pem, cert_chain.pem, ask.pem, ark.pem, certs_export_vcek.zip
- Platform/Guest Owner: Platform Owner
- Example
$ sudo ./sevtool --ofolder ./certs --export_cert_chain_vcek
To run tests to check that each command is functioning correctly, run the test_all command and check that the entire thing returns success.
- test_all
- Required input args: --ofolder [folder_path]
- Make a directory that the tests can use to store certs/data in during the test. Note that the tool will clear this directory before the tests are run.
- Example
$ sudo ./sevtool --ofolder ./tests --test_all
- Required input args: --ofolder [folder_path]
- For any issues with the tool itself, please create a ticket at https://github.com/AMDESE/sev-tool/issues
- For any questions/concerns with the SEV API spec, please create a ticket at https://github.com/AMDESE/AMDSEV/issues