Skip to content

Commit 38d1441

Browse files
committed
copilot review feedback
1 parent 7660bf6 commit 38d1441

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

docs/Signing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ wolfBoot also supports verifying firmware images using certificate chains instea
125125

126126
To generate an image for use with this mode, pass the `--cert-chain CERT_CHAIN.der` option to the sign tool, where `CERT_CHAIN.der` is a der encoded certificate chain containing one or more certificates in SSL order (leaf/signer cert last). Note that the sign tool still expects a signing private key to be provided as described above, and assumes that the public key of the signer cert in the chain corresponds to the signing private key.
127127

128-
Certificate chain verification of images is currently limited to use in conjuction with wolfHSM. See [wolfHSM.md](wolfHSM.md) for more details.
128+
Certificate chain verification of images is currently limited to use in conjunction with wolfHSM. See [wolfHSM.md](wolfHSM.md) for more details.
129129

130130
#### Target partition id (Multiple partition images, "self-update" feature)
131131

hal/sim.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ const int hsmClientDevIdCrypt = WH_DEV_ID;
101101
const int hsmClientKeyIdCrypt = 0xFF;
102102
#endif
103103
#ifdef WOLFBOOT_CERT_CHAIN_VERIFY
104-
const int hsmClientNvmIdCertRootCA = 1;
104+
const whNvmId hsmClientNvmIdCertRootCA = 1;
105105
#endif
106106

107107
int hal_hsm_init_connect(void);

0 commit comments

Comments
 (0)