Skip to content

Commit 444ba38

Browse files
committed
Update readmes to talk about plain keys instead of key shares
1 parent 756364b commit 444ba38

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

bootloaders/encrypted/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,18 @@ Your signing key must be for the _secp256k1_ curve, in PEM format. You can creat
88
openssl ecparam -name secp256k1 -genkey -out private.pem
99
```
1010

11-
The AES key is stored as a 4-way share in a 128 byte binary file - you can create one with
11+
The AES key is stored in a 32 byte binary file - you can create one with
1212

1313
```bash
14-
dd if=/dev/urandom of=privateaes.bin bs=1 count=128
14+
dd if=/dev/urandom of=privateaes.bin bs=1 count=32
1515
```
1616

1717
or in Powershell 7
1818
```powershell
19-
[byte[]] $(Get-SecureRandom -Maximum 256 -Count 128) | Set-Content privateaes.bin -AsByteStream
19+
[byte[]] $(Get-SecureRandom -Maximum 256 -Count 32) | Set-Content privateaes.bin -AsByteStream
2020
```
2121

22-
The IV salt is just a 16 byte binary file - you can create it the same way, replacing `128` with `16` and `privateaes.bin` with `ivsalt.bin` in the commands above.
22+
The IV salt is just a 16 byte binary file - you can create it the same way, replacing `32` with `16` and `privateaes.bin` with `ivsalt.bin` in the commands above.
2323

2424
You will need to program your OTP using the `otp.json` file generated by the build in your build folder
2525
NOTE: This will enable secure boot on your device, so only correctly signed binaries can then run, and will also lock down the OTP pages the AES key and IV salt are stored in.

encrypted/hello_encrypted/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,18 @@ Your signing key must be for the _secp256k1_ curve, in PEM format. You can creat
66
openssl ecparam -name secp256k1 -genkey -out private.pem
77
```
88

9-
The AES key is stored as a 4-way share in a 128 byte binary file - you can create one with
9+
The AES key is stored in a 32 byte binary file - you can create one with
1010

1111
```bash
12-
dd if=/dev/urandom of=privateaes.bin bs=1 count=128
12+
dd if=/dev/urandom of=privateaes.bin bs=1 count=32
1313
```
1414

1515
or in Powershell 7
1616
```powershell
17-
[byte[]] $(Get-SecureRandom -Maximum 256 -Count 128) | Set-Content privateaes.bin -AsByteStream
17+
[byte[]] $(Get-SecureRandom -Maximum 256 -Count 32) | Set-Content privateaes.bin -AsByteStream
1818
```
1919

20-
The IV salt is just a 16 byte binary file - you can create it the same way, replacing `128` with `16` and `privateaes.bin` with `ivsalt.bin` in the commands above.
20+
The IV salt is just a 16 byte binary file - you can create it the same way, replacing `32` with `16` and `privateaes.bin` with `ivsalt.bin` in the commands above.
2121

2222
You will need to program your OTP using the `otp.json` file generated by the build in your build folder
2323
NOTE: This will enable secure boot on your device, so only correctly signed binaries can then run, and will also lock down the OTP pages the AES key and IV salt are stored in.

0 commit comments

Comments
 (0)