diff mbox series

[isar-cip-core] doc/README.secureboot.md: Fix incorrect secure boot user generated keys path

Message ID 20240621110310.2335906-1-Shivanand.Kunijadar@toshiba-tsip.com (mailing list archive)
State Accepted
Headers show
Series [isar-cip-core] doc/README.secureboot.md: Fix incorrect secure boot user generated keys path | expand

Commit Message

Shivanand Kunijadar June 21, 2024, 11:03 a.m. UTC
From: Shivanand Kunijadar <Shivanand.Kunijadar@toshiba-tsip.com>

Signed-off-by: Shivanand Kunijadar <Shivanand.Kunijadar@toshiba-tsip.com>
---
 doc/README.secureboot.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Comments

Jan Kiszka June 21, 2024, 11:11 a.m. UTC | #1
On 21.06.24 13:03, Shivanand wrote:
> From: Shivanand Kunijadar <Shivanand.Kunijadar@toshiba-tsip.com>
> 
> Signed-off-by: Shivanand Kunijadar <Shivanand.Kunijadar@toshiba-tsip.com>
> ---
>  doc/README.secureboot.md | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md
> index 509de97..e6c8b0f 100644
> --- a/doc/README.secureboot.md
> +++ b/doc/README.secureboot.md
> @@ -181,7 +181,7 @@ local_conf_header:
>  ```
>  
>  Replace `demo` with the name of the user-generated certificates. The user-generated certificates
> -need to stored in the folder `recipes-devtools/ebg-secure-boot-secrets/files`.
> +need to stored in the folder `recipes-devtools/secure-boot-secrets/files`.
>  
>  Build the image with user-generated keys by executing the command:
>  

Thanks, applied.

Jan
diff mbox series

Patch

diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md
index 509de97..e6c8b0f 100644
--- a/doc/README.secureboot.md
+++ b/doc/README.secureboot.md
@@ -181,7 +181,7 @@  local_conf_header:
 ```
 
 Replace `demo` with the name of the user-generated certificates. The user-generated certificates
-need to stored in the folder `recipes-devtools/ebg-secure-boot-secrets/files`.
+need to stored in the folder `recipes-devtools/secure-boot-secrets/files`.
 
 Build the image with user-generated keys by executing the command: