This is an automated email from the ASF dual-hosted git repository.

mssun pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/incubator-teaclave.git


The following commit(s) were added to refs/heads/develop by this push:
     new beaf879  [keys] Update readme
beaf879 is described below

commit beaf879cbfc16816760bd9dfe8651a12e9788fec
Author: Mingshen Sun <[email protected]>
AuthorDate: Mon Feb 10 11:36:23 2020 -0800

    [keys] Update readme
---
 config/build.config.toml | 2 +-
 keys/README.md           | 6 ++----
 2 files changed, 3 insertions(+), 5 deletions(-)

diff --git a/config/build.config.toml b/config/build.config.toml
index 29bdeb6..f23ce43 100644
--- a/config/build.config.toml
+++ b/config/build.config.toml
@@ -3,7 +3,7 @@
 # Intel Attestation Service root CA certificate to verify attestation report
 as_root_ca_cert = { path = "../keys/ias_root_ca_cert.pem" }
 # For DCAP, use the following cert
-#as_root_ca_cert = { path = "../keys/dcap_root_ca_cert.pem" }
+# as_root_ca_cert = { path = "../keys/dcap_root_ca_cert.pem" }
 
 # Auditors' public keys to verify their endorsement signatures
 auditor_public_keys = [
diff --git a/keys/README.md b/keys/README.md
index 03c4050..006dbea 100644
--- a/keys/README.md
+++ b/keys/README.md
@@ -7,10 +7,8 @@ Note that these are only for demonstration. *DO NOT use them 
in production.*
 - `ias_root_ca_cert.pem`: attestation report root CA certificate for Intel SGX
   Attestation Service, obtained from the
   [service 
website](https://api.portal.trustedservices.intel.com/EPID-attestation)
-- `dcap_root_ca_cert.pem` and `dcap_root_ca_cert.der`: Root CA certificate (in 
PEM
-  and DER formats, respectively) used for conntecting to the reference DCAP
-  attestation server and verifying ECDSA attestation reports. Examples. Should
-  NOT be used in production.
+- `dcap_root_ca_cert.pem`: root CA certificate used for connecting to the
+  reference DCAP attestation server and verifying ECDSA attestation reports.
 - `dcap_server_cert.pem` and `dcap_server_key.pem`: DCAP attestation server
   end-entity certificate and private key. Certificate is signed by DCAP root 
CA.
 - `auditors`: contains auditors' keys to sign the *enclave info* for mutual


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to