You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If the ATA disk has no password set, the disk will be locked with the password provided at the first boot.
22
22
23
23
## Unlocking the Disk with a TPM-Sealed Secret
24
-
wolfBoot allows to seal secret safely in the TPM in a way that it can be unsealed only under specific conditions. Please refer to files TPM.md and measured_boot.mdfor more information.
24
+
wolfBoot allows to seal secret safely in the TPM in a way that it can be unsealed only under specific conditions. Please refer to [Appendix M](appendix13.md) and [Appendix G](appendix07.md)for more information.
25
25
If the options `WOLFBOOT_TPM_SEAL` and `DISK_LOCK` are enabled, wolfBoot will use a TPM sealed secret as the password to unlock the disk. The following options controls the sealing and unsealing of the secret:
Copy file name to clipboardExpand all lines: wolfBoot/src/chapter02.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -222,7 +222,7 @@ Note: if you are using an external FLASH (e.g. SPI) in combination with a flash
222
222
### Using One-time programmable (OTP) flash as keystore
223
223
224
224
By default, keys are directly incorporated in the firmware image. To store the keys in a separate, one-time programmable (OTP) flash memory, use the `FLASH_OTP_KEYSTORE=1` option.
225
-
For more information, see [/docs/OTP-keystore.md](@@@need to change here@@@).
225
+
For more information, see [Appendix C](appendix03.md).
Copy file name to clipboardExpand all lines: wolfBoot/src/chapter03.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -168,7 +168,7 @@ non-secure callables (NSC).
168
168
169
169
The example configuration for this scenario is available in `/config/examples/stm32l5-wolfcrypt-tz.config`.
170
170
171
-
For more information, see [/docs/STM32-TZ.md](@@@need to change here@@@).
171
+
For more information, see [Appendix L](appendix12.md).
172
172
173
173
174
174
### Scenario 3: Trustzone Disabled, using DUAL BANK
@@ -316,9 +316,9 @@ This option can be enabled with the `WOLFCRYPT_TZ=1` and `WOLFCRYPT_TZ_PKCS11=1`
316
316
options in your configuration. This enables a PKCS11 accessible from NS domain via
317
317
non-secure callables (NSC).
318
318
319
-
The example configuration for this scenario is available in [/config/examples/stm32u5-wolfcrypt-tz.config](/config/examples/stm32u5-wolfcrypt-tz.config).
319
+
The example configuration for this scenario is available in `/config/examples/stm32u5-wolfcrypt-tz.config`.
320
320
321
-
For more information, see [/docs/STM32-TZ.md](/docs/STM32-TZ.md).
321
+
For more information, see [Appendix L](appendix12.md).
322
322
323
323
324
324
### Scenario 3: TrustZone Disabled (DUAL BANK mode)
@@ -535,9 +535,9 @@ with RSA2048:
535
535
536
536
### Building STM32C0
537
537
538
-
Reference configuration files (see [config/examples/stm32c0.config](/config/examples/stm32c0.config),
539
-
[config/examples/stm32c0-rsa2048.config](/config/examples/stm32c0-rsa2048.config) and
TSIP: To enable TSIP use `make PKA=1`. See [docs/Renesas.md](docs/Renesas.md) for details.
2169
+
TSIP: To enable TSIP use `make PKA=1`. See [Appendix J](appendix10.md) for details.
2170
2170
2171
2171
### Flashing Renesas RX65N
2172
2172
@@ -2202,7 +2202,7 @@ Create a new "Renesas Debug" project. Choose the "E2 Lite" emulator and the buil
2202
2202
2203
2203
Tested on the RX72N ENVISION KIT (HMI development kit for IoT systems). This includes an onboard E2 Lite emulator.
2204
2204
2205
-
The Renesas RX72N is supported either natively with "make" or through e2Studio. If using e2Studio see [Readme.md](../IDE/Renesas/e2studio/RX72N/Readme.md).
2205
+
The Renesas RX72N is supported either natively with "make" or through e2Studio. If using e2Studio see `/IDE/Renesas/e2studio/RX72N/Readme.md`.
2206
2206
2207
2207
Default UART Serial on SCI2 at P12-RXD2 P13-TXD2. Use USB on CN8 to attach a Virtual USB COM port. This feaure is enabled with `DEBUG_UART=1`.
Copy file name to clipboardExpand all lines: wolfBoot/src/chapter06.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -440,7 +440,7 @@ The custom fields are identified by a 16-bit tag, and their size is indicated by
440
440
441
441
At runtime, the values stored in the manifest header can be accessed using the `wolfBoot_find_header` function.
442
442
443
-
The syntax for `--custom-tlv` option is also documented in [docs/Signing.md](@@@need to change here@@@/docs/Signing.md#adding-custom-fields-to-the-manifest-header).
443
+
The syntax for `--custom-tlv` option is also documented in [Appendix H](appendix08.md).
444
444
445
445
#### Image header: Example
446
446
@@ -635,7 +635,7 @@ Consider implementing these three functions based on the provided examples if yo
635
635
636
636
On the remote system hosting the external partition image for the target, a simple protocol can be implemented on top of UART messages to serve flash-access specific calls.
637
637
638
-
An example uart-flash-server daemon, designed to run on a GNU/Linux host and emulate the external partition with a local file on the filesystem, is available in [tools/uart-flash-server](tools/uart-flash-server).
638
+
An example uart-flash-server daemon, designed to run on a GNU/Linux host and emulate the external partition with a local file on the filesystem, is available in `tools/uart-flash-server`.
Copy file name to clipboardExpand all lines: wolfBoot/src/chapter07.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@
9
9
- Equip the application with the [wolfBoot library](chapter06.md#application-interface-for-interactions-with-the-bootloader) to interact with the bootloader
10
10
-[Configure and compile](chapter02.md#compiling-wolfboot) a bootable image with a single "make" command
11
11
- For help signing firmware see [wolfBoot Signing](chapter06.md#signing)
12
-
- For enabling measured boot see [wolfBoot measured boot](chapter06.md#measured-boot)
12
+
- For enabling measured boot see [wolfBoot measured boot](chapter06.md)
13
13
14
14
## Examples provided
15
15
@@ -28,7 +28,7 @@ The factory image can be flashed to the target device. It contains the bootloade
28
28
29
29
The `sign.py` tool transforms a bootable firmware image to comply with the firmware image format required by the bootloader.
30
30
31
-
For detailed information about the firmware image format, see [Firmware image](chapter06.md#firmware-image)
31
+
For detailed information about the firmware image format, see [Firmware image](chapter06.md)
32
32
33
33
For detailed information about the configuration options for the target system, see [Compiling wolfBoot](chapter02.md#compiling-wolfboot)
0 commit comments