We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It is possible to protect your PEM file with AES encryption and a password, with something like:
openssl ec -in keys.pem -out keys_encrypted.pem -aes256
but picotool does not have a mechanism for requesting the password and decrypting the file when the firmware is being signed:
ERROR: Failed to read key file /some/path/keys_encrypted.pem, error PK - Private key password can't be empty
It might be worth adding this level of protection. What do you think?
The text was updated successfully, but these errors were encountered:
No branches or pull requests
It is possible to protect your PEM file with AES encryption and a password, with something like:
but picotool does not have a mechanism for requesting the password and decrypting the file when the firmware is being signed:
It might be worth adding this level of protection. What do you think?
The text was updated successfully, but these errors were encountered: