Skip to content

Commit 57dd2b0

Browse files
dgarskedanielinux
authored andcommittedAug 26, 2024
Spelling and git submodule command fix.
1 parent 3e16aa2 commit 57dd2b0

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed
 

‎riotOS-samr21/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ More information about wolfBoot upgrade mechanism can be found in the [wolfBoot]
3535

3636
## Firmware update
3737

38-
The directory [fw-update-server](fw-update-server) contains a small exaple DTLS v1.2 server that can be used to transfer a (signed) image to any client requesting a firmware upgrade.
38+
The directory [fw-update-server](fw-update-server) contains a small example DTLS v1.2 server that can be used to transfer a (signed) image to any client requesting a firmware upgrade.
3939
To compile fw-update-server for the host system, simply run `make` within the directory.
4040

4141
To run the fw-update-server, simply run `./server` followed by the path of the signed firmware to transfer. The firmware previously compiled and signed with `make` can be found in `fw-update/bin/samr21-xpro/fw-update.bin.v5.signed`.

‎test-app-STM32F4-measured-boot/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following diagram is a big picture overview of the different guarantee Secur
2929

3030
## Details
3131

32-
Secure Boot is a way for the system owner to guarantee that the device started with a geniune software. However, this information is not available to the system later on. Therefore, the application runtime must assume any and all software that was run before it is geniune. Measured Boot eliminates the guessing element and provides a way for the application to know the state of the system before it took control.
32+
Secure Boot is a way for the system owner to guarantee that the device started with a genuine software. However, this information is not available to the system later on. Therefore, the application runtime must assume any and all software that was run before it is genuine. Measured Boot eliminates the guessing element and provides a way for the application to know the state of the system before it took control.
3333

3434
Measured Boot could evaluate a single component like firmware or application image, or can evaluate multiple components like system settings and user configuration. Additionally, the golden value could be stored within the system for the application to self-evaluate its state without the need of a remote server.
3535

@@ -55,7 +55,7 @@ Hardware connections must be made between the TPM2.0 module and the STM32F4 boar
5555
| GND | Ground | Pin 6 |
5656

5757

58-
UART1 on the STM32F4 is used by default. The default baud rate is 115200.
58+
UART1 on the STM32F4 is used by default. The default baud rate is 115200.
5959

6060
The UART Pinout can be found below:
6161

@@ -74,11 +74,11 @@ Note: Make sure the Ground connection between your USB-UART converter is connect
7474

7575
Before compiling make sure the git submodules are initialized and updated correctly. Use the following commands to make sure:
7676

77-
`wolfboot-examples/$ git submodule --init --update`
77+
`wolfboot-examples/$ git submodule update --init --recursive`
7878

7979
`wolfboot-examples/$ cd wolfBoot`
8080

81-
`wolfboot-examples/wolfBoot$ git submodule --init --update`
81+
`wolfboot-examples/wolfBoot$ git submodule update --init --recursive`
8282

8383
Enter the project folder for this example:
8484

@@ -159,7 +159,7 @@ App started
159159
Measured Boot PCR is = 0x01020304050607080910
160160
```
161161

162-
This value is the one created by wolfBoot during start of the device. This value is the result of PCR Extend operation and depends on the firmware image loaded. Using the same firmware image should produce the same PCR measurement. By using different firmware images a change in the PCR value can be obsereved, simulating tampering.
162+
This value is the one created by wolfBoot during start of the device. This value is the result of PCR Extend operation and depends on the firmware image loaded. Using the same firmware image should produce the same PCR measurement. By using different firmware images a change in the PCR value can be observed, simulating tampering.
163163

164164
For more information about measured boot contact us at facts@wolfssl.com
165165

‎test-app-STM32F4-measured-boot/src/app_stm32f4.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ void main(void)
322322
led_pwm_setup();
323323
pwm_init(CPU_FREQ, 0);
324324

325-
/* Dim the led by altering the PWM duty-cicle
325+
/* Dim the led by altering the PWM duty-cycle
326326
* in isr_tim2 (timer.c)
327327
*
328328
* Every 50ms, the duty cycle of the PWM connected

0 commit comments

Comments
 (0)
Please sign in to comment.