You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: riotOS-samr21/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ More information about wolfBoot upgrade mechanism can be found in the [wolfBoot]
35
35
36
36
## Firmware update
37
37
38
-
The directory [fw-update-server](fw-update-server) contains a small exaple DTLS v1.2 server that can be used to transfer a (signed) image to any client requesting a firmware upgrade.
38
+
The directory [fw-update-server](fw-update-server) contains a small example DTLS v1.2 server that can be used to transfer a (signed) image to any client requesting a firmware upgrade.
39
39
To compile fw-update-server for the host system, simply run `make` within the directory.
40
40
41
41
To run the fw-update-server, simply run `./server` followed by the path of the signed firmware to transfer. The firmware previously compiled and signed with `make` can be found in `fw-update/bin/samr21-xpro/fw-update.bin.v5.signed`.
Copy file name to clipboardexpand all lines: test-app-STM32F4-measured-boot/README.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The following diagram is a big picture overview of the different guarantee Secur
29
29
30
30
## Details
31
31
32
-
Secure Boot is a way for the system owner to guarantee that the device started with a geniune software. However, this information is not available to the system later on. Therefore, the application runtime must assume any and all software that was run before it is geniune. Measured Boot eliminates the guessing element and provides a way for the application to know the state of the system before it took control.
32
+
Secure Boot is a way for the system owner to guarantee that the device started with a genuine software. However, this information is not available to the system later on. Therefore, the application runtime must assume any and all software that was run before it is genuine. Measured Boot eliminates the guessing element and provides a way for the application to know the state of the system before it took control.
33
33
34
34
Measured Boot could evaluate a single component like firmware or application image, or can evaluate multiple components like system settings and user configuration. Additionally, the golden value could be stored within the system for the application to self-evaluate its state without the need of a remote server.
35
35
@@ -55,7 +55,7 @@ Hardware connections must be made between the TPM2.0 module and the STM32F4 boar
55
55
| GND | Ground | Pin 6 |
56
56
57
57
58
-
UART1 on the STM32F4 is used by default. The default baud rate is 115200.
58
+
UART1 on the STM32F4 is used by default. The default baud rate is 115200.
59
59
60
60
The UART Pinout can be found below:
61
61
@@ -74,11 +74,11 @@ Note: Make sure the Ground connection between your USB-UART converter is connect
74
74
75
75
Before compiling make sure the git submodules are initialized and updated correctly. Use the following commands to make sure:
This value is the one created by wolfBoot during start of the device. This value is the result of PCR Extend operation and depends on the firmware image loaded. Using the same firmware image should produce the same PCR measurement. By using different firmware images a change in the PCR value can be obsereved, simulating tampering.
162
+
This value is the one created by wolfBoot during start of the device. This value is the result of PCR Extend operation and depends on the firmware image loaded. Using the same firmware image should produce the same PCR measurement. By using different firmware images a change in the PCR value can be observed, simulating tampering.
163
163
164
164
For more information about measured boot contact us at facts@wolfssl.com
0 commit comments