Skip to content

Commit 522208e

Browse files
committed
Add notes about unique AES keys, and not losing keys/salts
1 parent d933765 commit 522208e

File tree

2 files changed

+8
-4
lines changed

2 files changed

+8
-4
lines changed

bootloaders/encrypted/README.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
For security you **must** replace private.pem and privateaes.bin with your own keys, and ivsalt.bin with your own per-device salt. Your signing key must be for the _secp256k1_ curve, in PEM format. You can create a .PEM file with:
1+
For security you **must** replace private.pem and privateaes.bin with your own keys, and ivsalt.bin with your own per-device salt. The AES key should also be different for each device. Make sure you **don't lose your keys and salts**, else you may not be able to boot code on your device.
2+
3+
Your signing key must be for the _secp256k1_ curve, in PEM format. You can create a .PEM file with:
24

35
```bash
46
openssl ecparam -name secp256k1 -genkey -out private.pem
@@ -23,7 +25,7 @@ NOTE: This will enable secure boot on your device, so only correctly signed bina
2325
picotool otp load otp.json
2426
```
2527

26-
> For more information on security see chapter 10 of the [RP2350 datasheet](https://datasheets.raspberrypi.com/rp2350/rp2350-datasheet.pdf), and for information on how to sign other binaries to run on a secure chip see chapter 5.10
28+
> For more information on security see chapter 10 of the [RP2350 datasheet](https://datasheets.raspberrypi.com/rp2350/rp2350-datasheet.pdf), and for information on how to sign other binaries to run on a secure chip see section 5.10
2729
2830
Then either drag & drop the UF2 files to the device in order (enc_bootloader first, then hello_serial_enc) waiting for a reboot in-between, or run
2931
```bash

encrypted/hello_encrypted/README.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
For security you **must** replace private.pem and privateaes.bin with your own keys, and ivsalt.bin with your own per-device salt. Your signing key must be for the _secp256k1_ curve, in PEM format. You can create a .PEM file with:
1+
For security you **must** replace private.pem and privateaes.bin with your own keys, and ivsalt.bin with your own per-device salt. The AES key should also be different for each device. Make sure you **don't lose your keys and salts**, else you may not be able to boot code on your device.
2+
3+
Your signing key must be for the _secp256k1_ curve, in PEM format. You can create a .PEM file with:
24

35
```bash
46
openssl ecparam -name secp256k1 -genkey -out private.pem
@@ -23,4 +25,4 @@ NOTE: This will enable secure boot on your device, so only correctly signed bina
2325
picotool otp load otp.json
2426
```
2527

26-
> For more information on security see chapter 10 of the [RP2350 datasheet](https://datasheets.raspberrypi.com/rp2350/rp2350-datasheet.pdf), and for information on how to sign other binaries to run on a secure chip see chapter 5.10
28+
> For more information on security see chapter 10 of the [RP2350 datasheet](https://datasheets.raspberrypi.com/rp2350/rp2350-datasheet.pdf), and for information on how to sign other binaries to run on a secure chip see section 5.10

0 commit comments

Comments
 (0)