Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

External TDB Requires Device ROT #52

Closed
ghost opened this issue Aug 27, 2020 · 12 comments
Closed

External TDB Requires Device ROT #52

ghost opened this issue Aug 27, 2020 · 12 comments

Comments

@ghost
Copy link

ghost commented Aug 27, 2020

Description of defect

Initially posted here: ARMmbed/mbed-os#13327

After testing, it seems that it is necessary to call DeviceKey::get_instance().device_inject_root_of_trust() before using kv store in external TBD mode (either with RBP or without). It would be helpful to update this example to include that.

Target(s) affected by this defect ?

N/A

Toolchain(s) (name and version) displaying this defect ?

N/A

What version of Mbed-os are you using (tag or sha) ?

N/A

What version(s) of tools are you using. List all that apply (E.g. mbed-cli)

N/A

How is this defect reproduced ?

Using kv store in external TBD mode

@0xc0170
Copy link
Contributor

0xc0170 commented Aug 31, 2020

@ARMmbed/mbed-os-core

@ciarmcom
Copy link
Member

@DMCEngineering thank you for raising this issue.Please take a look at the following comments:

Could you add some more detail to the description? A good description should be at least 25 words.
What target(s) are you using?
What toolchain(s) are you using?
What version of Mbed OS are you using (tag or sha)?
It would help if you could also specify the versions of any tools you are using?
How can we reproduce your issue?

NOTE: If there are fields which are not applicable then please just add 'n/a' or 'None'.This indicates to us that at least all the fields have been considered.
Please update the issue header with the missing information, the issue will not be mirroredto our internal defect tracking system or investigated until this has been fully resolved.

@ciarmcom
Copy link
Member

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

5 similar comments
@ciarmcom
Copy link
Member

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

@ciarmcom
Copy link
Member

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

@ciarmcom
Copy link
Member

ciarmcom commented Nov 4, 2020

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

@ciarmcom
Copy link
Member

ciarmcom commented Nov 9, 2020

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

@ciarmcom
Copy link
Member

@DMCEngineering it has been 5 days since the last reminder. Could you please update the issue header as previously requested?

@evedon
Copy link
Contributor

evedon commented Nov 19, 2020

@DMCEngineering Thank you for reporting the issue. Since you were testing this use case, could you consider providing a fix? We appreciate your help to keep this example up to date.

@ciarmcom
Copy link
Member

Thank you for raising this detailed GitHub issue. I am now notifying our internal issue triagers.
Internal Jira reference: https://jira.arm.com/browse/IOTOSM-2832

@LDong-Arm
Copy link
Contributor

Hi @DMCEngineering, I've created #66 to fix this, thanks.

@LDong-Arm
Copy link
Contributor

Hi @evedon, would you please close this as it wasn't automatically closed by the PR?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants