Skip to content
This repository was archived by the owner on Sep 16, 2024. It is now read-only.

Commit 42cd2ea

Browse files
johandseIslam Wahdan
authored andcommitted
Update README.md (#248)
1 parent 1b9eb52 commit 42cd2ea

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ Hold valid keys for Flash Encryption and Secure Boot; they can be generated rand
167167

168168
The Secure Boot key `secure_boot_signing_key.pem` has to be transformed into `secure-bootloader-key.bin`, to be burnt into efuses. This can be done in 2 ways:
169169

170-
python $IDF_PATH/components/esptool_py/esptool/espefuse.py extract_public_key --keyfile secure_boot_signing_key.pem signature_verification_key.bin
170+
python $IDF_PATH/components/esptool_py/esptool/espsecure.py extract_public_key --keyfile secure_boot_signing_key.pem signature_verification_key.bin
171171

172172
# or, as an artifact of the make build process, on the same directory level as Makefile
173173
make BOARD=GPY SECURE=on TARGET=boot

0 commit comments

Comments
 (0)