mirror of
https://github.com/espressif/esp-idf.git
synced 2026-04-27 19:13:21 +00:00
fix: added reference to example security/security_features_app in docs
This commit is contained in:
@@ -519,6 +519,7 @@ How To Enable Secure Boot v2
|
||||
|
||||
11. On subsequent boots, the Secure Boot hardware will verify that the second stage bootloader has not changed, and the second stage bootloader will verify the signed app image using the validated public key portion of its appended signature block.
|
||||
|
||||
For a comprehensive example that enables Secure Boot v2 along with other security features such as flash encryption and NVS encryption, see :example:`security/security_features_app`.
|
||||
|
||||
Restrictions After Secure Boot Is Enabled
|
||||
-----------------------------------------
|
||||
|
||||
@@ -788,3 +788,5 @@ In this case we generate NVS Encryption keys on a host. This key is then flashed
|
||||
The NVS partition (``nvs_encr_partition.bin``) and NVS encryption key (``nvs_encr_key.bin``) can then be flashed to their respective offset using ``esptool``. To see all of the command line options recommended for ``esptool``, check the output print when ``idf.py build`` succeeds.
|
||||
|
||||
If Flash Encryption is enabled for the chip, then please encrypt the NVS key partition first before flashing. You may refer the flashing related steps of `Flash Encryption workflow <enable-flash-encryption-externally_>`_.
|
||||
|
||||
For a complete example demonstrating the enablement of all security features (Secure Boot v2, flash encryption, NVS encryption, and JTAG with HMAC), see :example:`security/security_features_app`.
|
||||
|
||||
Reference in New Issue
Block a user