Security User Guide: Intel® FPGA Programmable Acceleration Card D5005
ID
683877
Date
8/25/2020
Public
3.1. Installing PACSign
3.2. PACSign Tool
3.3. Creating Unsigned Images
3.4. Using an HSM Manager
3.5. Creating Keys
3.6. Root Entry Hash Bitstream Creation
3.7. Signing Images
3.8. Creating a CSK ID Cancellation Bitstream
3.9. PACSign PKCS11 Manager *.json Reference
3.10. Creating a Custom HSM Manager
3.11. PACSign Man Page
3.10.1.2. PUBLIC_KEY.get_permission()
Intel FPGA PAC keys have associated permissions. This function returns an integer that corresponds to the assigned key permissions. For Intel® FPGA PACs, all root key permissions must be the constant 0xFFFFFFFF. For code signing keys, the permissions are described below.
Value | Name | Permission |
---|---|---|
1 | SIGN_SR | Sign the FIM or Static Region |
2 | SIGN_BMC | Sign the card BMC Nios® firmware and/or the Intel® MAX® 10 image |
4 | SIGN_PR | Sign the PR Region or AFU |