diff options
| author | Ulrich Ölmann <u.oelmann@pengutronix.de> | 2024-03-05 21:07:53 +0100 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2024-03-05 15:09:24 -0800 |
| commit | 123c58693ac786c3cef8a74b03c1557a66dc0142 (patch) | |
| tree | f32066d7d1bef9edaab282b90cc78ba6d48f8a5c | |
| parent | 4213fb939fb62c10ff46226ed0918537a9c452ec (diff) | |
| download | meta-openembedded-123c58693ac786c3cef8a74b03c1557a66dc0142.tar.gz | |
signing.bbclass: fix typos
Signed-off-by: Ulrich Ölmann <u.oelmann@pengutronix.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
| -rw-r--r-- | meta-oe/classes/signing.bbclass | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/meta-oe/classes/signing.bbclass b/meta-oe/classes/signing.bbclass index ec076d9685..f52d861b76 100644 --- a/meta-oe/classes/signing.bbclass +++ b/meta-oe/classes/signing.bbclass | |||
| @@ -6,9 +6,9 @@ | |||
| 6 | 6 | ||
| 7 | # This class provides a common workflow to use asymmetric (i.e. RSA) keys to | 7 | # This class provides a common workflow to use asymmetric (i.e. RSA) keys to |
| 8 | # sign artifacts. Usually, the keys are either stored as simple files in the | 8 | # sign artifacts. Usually, the keys are either stored as simple files in the |
| 9 | # file system or on a HSM (Hardware Security Module). While files are easy to | 9 | # file system or on an HSM (Hardware Security Module). While files are easy to |
| 10 | # use, it's hard to verify that no copies of the private have been made and | 10 | # use, it's hard to verify that no copies of the private key have been made |
| 11 | # only authorized persons are able to use the key. Use of an HSM addresses | 11 | # and only authorized persons are able to use the key. Use of an HSM addresses |
| 12 | # these risks by only allowing use of the key via an API (often PKCS #11). The | 12 | # these risks by only allowing use of the key via an API (often PKCS #11). The |
| 13 | # standard way of referring to a specific key in an HSM are PKCS #11 URIs (RFC | 13 | # standard way of referring to a specific key in an HSM are PKCS #11 URIs (RFC |
| 14 | # 7512). | 14 | # 7512). |
