forked from espressif/esp-idf
fix(bootloader): Update kconfig option
This commit is contained in:
@@ -691,14 +691,12 @@ menu "Security features"
|
|||||||
|
|
||||||
config SECURE_BOOT_VERIFICATION_KEY
|
config SECURE_BOOT_VERIFICATION_KEY
|
||||||
string "Secure boot public signature verification key"
|
string "Secure boot public signature verification key"
|
||||||
depends on SECURE_SIGNED_APPS && !SECURE_BOOT_BUILD_SIGNED_BINARIES && !SECURE_SIGNED_APPS_RSA_SCHEME
|
depends on SECURE_SIGNED_APPS && SECURE_SIGNED_APPS_ECDSA_SCHEME && !SECURE_BOOT_BUILD_SIGNED_BINARIES
|
||||||
default "signature_verification_key.bin"
|
default "signature_verification_key.bin"
|
||||||
help
|
help
|
||||||
Path to a public key file used to verify signed images.
|
Path to a public key file used to verify signed images.
|
||||||
Secure Boot V1: This ECDSA public key is compiled into the bootloader and/or
|
Secure Boot V1: This ECDSA public key is compiled into the bootloader and/or
|
||||||
app, to verify app images.
|
app, to verify app images.
|
||||||
Secure Boot V2: This RSA public key is compiled into the signature block at
|
|
||||||
the end of the bootloader/app.
|
|
||||||
|
|
||||||
Key file is in raw binary format, and can be extracted from a
|
Key file is in raw binary format, and can be extracted from a
|
||||||
PEM formatted private key using the espsecure.py
|
PEM formatted private key using the espsecure.py
|
||||||
|
Reference in New Issue
Block a user