From 0541d73ef37e2bc8e4dca981067b26b9a8583d61 Mon Sep 17 00:00:00 2001 From: Rupert Swarbrick Date: Thu, 30 Jan 2025 17:37:21 +0000 Subject: [PATCH] [rom_ctrl,doc] Add an outbound link to theory_of_operation.md This document is actually linked a couple of sentences earlier but I just got a little surprised about things when reading the text. This should make things a bit clearer. Signed-off-by: Rupert Swarbrick --- hw/ip/rom_ctrl/doc/theory_of_operation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hw/ip/rom_ctrl/doc/theory_of_operation.md b/hw/ip/rom_ctrl/doc/theory_of_operation.md index ecf70f1a5b8c2..2e807b3f859fc 100644 --- a/hw/ip/rom_ctrl/doc/theory_of_operation.md +++ b/hw/ip/rom_ctrl/doc/theory_of_operation.md @@ -106,7 +106,7 @@ This 256-bit digest will be incorporated into the [`CreatorRootKey`](../../../.. The key manager should only allow one transaction (of 256 bits / 32 bits = 8 beats) after reset to pass this information across. On future messages, it should raise an alert, defeating an attacker that tries to trigger extra transactions before or after the real one. -`CreatorRootKey` forms the first key in the chain described in Identities and Root Keys. +`CreatorRootKey` forms the first key in the chain described in [Identities and Root Keys](../../../../doc/security/specs/identities_and_root_keys/README.md). An attacker who modifies the ROM will perturb `CreatorRootKey` (to avoid doing so would require a preimage attack on the ROM checksum calculation or the `KM_DERIVE` function). The result is that, while the chip will function, it will have the "wrong" root key and the chain of trust used for attestation will be broken.