Skip to content

Commit 10361d7

Browse files
authored
Update README.md
1 parent 86936fc commit 10361d7

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

bootloaders/encrypted/README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,15 @@ Replace private.pem and privateaes.bin with your own keys - your signing key mus
44
openssl ecparam -name secp256k1 -genkey -out private.pem
55
```
66

7-
The AES key is just a 32 byte binary file - you can create one with
7+
The AES key is just a 32 byte binary file - you can create one with:
88

99
```bash
1010
dd if=/dev/urandom of=privateaes.bin bs=1 count=32
1111
```
1212

13-
You will need to program your OTP using the generated `otp.json` file in the build folder. Note that this will enable secure boot on your device, so only signed binaries can run, and will also lock down the OTP page the AES key is stored in. If you wish to test without enabling secure boot then you can load the `otp.json` file in the source folder, which will just program the AES key and lock down that OTP page.
13+
You will need to program your OTP using the generated `otp.json` file generated by the build in your build folder
14+
NOTE: This will enable secure boot on your device, so only correctly signed binaries can then run, and will also lock down the OTP page the AES key is stored in.
15+
If you wish to test without enabling secure boot, you can load the `otp.json` file in the source folder ([otp.json](otp.json)) instead which will just program the AES key and lock down that OTP page.
1416
```bash
1517
picotool otp load otp.json
1618
```

0 commit comments

Comments
 (0)