Skip to content

Commit f081d82

Browse files
author
Amanda Butler
authored
Update phrasing in Devicekey.md
Update phrasing as requested in comments for accuracy.
1 parent ea4fe5c commit f081d82

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/api/security/Devicekey.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ DeviceKey class needs root of trust ready to use before the derivation API's fir
3636

3737
Both cases requires injecting this key data to the KVStore reserved area.
3838

39-
Use this first method when the device supports a random number generator - when ` DEVICE_TRNG` is defined. Then, call `generate_root_of_trust` only once.
39+
When `DEVICE_TRNG` is defined, the device supports a random number generator, and you may generate the key by calling `generate_root_of_trust()`. The call succeeds only if the key does not already exist. Subsequent calls will fail if you don't modify the existing key.
4040

4141
```c++ NOCI
4242
int status = DeviceKey::get_instance().generate_root_of_trust();
@@ -47,7 +47,7 @@ if(status == DEVICEKEY_SUCCESS) {
4747
}
4848
```
4949

50-
If `DEVICE_TRNG` is not defined, the key buffer must be filled manually and followed by `device_inject_root_of_trust` call. The example below shows an injection of a dummy key:
50+
If `DEVICE_TRNG` is not defined, the key buffer must be filled manually by calling `device_inject_root_of_trust()`. The example below shows an injection of a dummy key:
5151

5252
```c++ NOCI
5353
uint32_t key[DEVICE_KEY_32BYTE / sizeof(uint32_t)];

0 commit comments

Comments
 (0)