From b16c6f42e166cabf34e554d792feca918e6060f3 Mon Sep 17 00:00:00 2001 From: Aditya Patwardhan Date: Thu, 3 Oct 2024 11:46:47 +0530 Subject: [PATCH] fix(security): Fix host based security workflow doc Fix the secure boot digest burning command in the secure boot enablement workflow --- docs/en/security/host-based-security-workflows.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/en/security/host-based-security-workflows.rst b/docs/en/security/host-based-security-workflows.rst index 29d7a01f9c..8b4e480cc9 100644 --- a/docs/en/security/host-based-security-workflows.rst +++ b/docs/en/security/host-based-security-workflows.rst @@ -428,13 +428,13 @@ In this workflow, we shall use ``espsecure`` tool to generate signing keys and u .. code:: bash - espefuse.py --port PORT --chip esp32c2 burn_key KEY_BLOCK0 SECURE_BOOT_DIGEST digest.bin + espefuse.py --port PORT --chip esp32c2 burn_key KEY_BLOCK0 digest.bin SECURE_BOOT_DIGEST .. only:: SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS .. code:: bash - espefuse.py --port PORT --chip {IDF_TARGET_PATH_NAME} burn_key BLOCK SECURE_BOOT_DIGEST0 digest.bin + espefuse.py --port PORT --chip {IDF_TARGET_PATH_NAME} burn_key digest.bin BLOCK SECURE_BOOT_DIGEST0 where ``BLOCK`` is a free keyblock between ``BLOCK_KEY0`` and ``BLOCK_KEY5``.