chenjianqiang
42039cde0a
add flash and PSRAM CS IO acquire function
2021-09-17 16:28:47 +08:00
Konstantin Kondrashov
0d16e61d96
efuse: Fix len of SOFT_DIS_JTAG for esp32c3(v4.3)
2021-09-14 13:22:08 +08:00
Zim Kalinowski
1f0d8585ca
Merge branch 'feature/update_efuses_for_esp32s2_v4.3' into 'release/v4.3'
...
efuse(esp32s2): Added flash_ver, psram_ver, pkg_ver efuses (v4.3)
See merge request espressif/esp-idf!14770
2021-09-10 04:21:54 +00:00
Mahavir Jain
9ac4c49553
Merge branch 'fixes/secure_boot_v4.3' into 'release/v4.3'
...
secure_boot/esp32(s2,c3): Disable read protecting of efuses (v4.3)
See merge request espressif/esp-idf!14960
2021-09-09 07:16:54 +00:00
Sachin Parekh
c2f015ace1
secure_boot/esp32(s2,c3): Disable read protecting of efuses
...
When secure boot is enabled, disable the ability to read protect
efuses that contain the digest.
2021-09-08 16:42:54 +08:00
KonstantinKondrashov
b7237ff0e6
efuse(esp32s2): Added flash_ver, psram_ver, pkg_ver efuses
2021-08-12 18:25:07 +05:00
Marius Vikhammer
ee54dbfaab
bootloader: fix verify_load_addresses wrongly reporting "bad load address range"
...
verify_load_addresses would check if load_end was in a certain member range,
but should verify (load_end - 1) which is the actual last byte.
2021-07-31 14:10:57 +08:00
Angus Gratton
07465563c5
secure boot: Fix incorrect handling of mbedtls_ctr_drbg_seed() failure in signature verification
...
Increase the test app optimization level to one that would find this issue.
2021-07-16 11:03:21 +05:30
KonstantinKondrashov
6a50197246
bootloader: Fix a wrong offset in image_load after refactoring
2021-06-22 08:30:43 +08:00
KonstantinKondrashov
54ae758b77
bootloader_support: Used esp_image_get_metadata() instead of esp_image_verify()
...
- bootloader_common_get_sha256_of_partition will not do any unnecessery verifies.
- Used esp_image_get_metadata() instead of esp_image_verify().
2021-06-22 08:30:43 +08:00
KonstantinKondrashov
99af5e9a71
bootloader: Fixed a case when signed OTA updates fail when debugger is attached due to the wrong image_len.
...
And it fixed another case for bootloader_common_get_sha256_of_partition() when CHECK_SIGNATURE is on
- If RSA signature check is on in Kconfig then sha256 was 0xFFFFF...
because image_load gave image_len which pointed to the end of sign blocks.
And image_digest was filled from a wrong position.
Closes https://github.com/espressif/esp-idf/issues/6873
2021-06-22 08:30:41 +08:00
Angus Gratton
e9fd883f50
Merge branch 'bugfix/esp32_u4wdh_quad_io_v4.3' into 'release/v4.3'
...
bootloader: Fix selection of Quad I/O modes on ESP32-U4WDH chip (v4.3)
See merge request espressif/esp-idf!13876
2021-06-18 07:16:50 +00:00
Angus Gratton
94f447f599
Merge branch 'bugfix/partition_table_integrity_check_v4.3' into 'release/v4.3'
...
paritition_table: Verify the partition table md5sum when loading in the app (v4.3)
See merge request espressif/esp-idf!13582
2021-06-16 08:49:55 +00:00
Angus Gratton
a45fa929c2
Merge branch 'bugfix/ulp_riscv_unintended_wake_v4.3' into 'release/v4.3'
...
ulp: unintended wakeup in ulp_riscv (v4.3)
See merge request espressif/esp-idf!13630
2021-06-16 04:25:29 +00:00
Angus Gratton
22a02656b7
bootloader: Fix selection of Quad I/O modes on ESP32-U4WDH chip
...
Closes https://github.com/espressif/esp-idf/issues/6191
2021-06-07 14:53:43 +10:00
Renz Bagaporo
0e904b3f7e
ulp: clear rtc int at initialization
...
Closes https://github.com/espressif/esp-idf/issues/6654
2021-06-01 21:41:12 +08:00
Angus Gratton
1967e53f4a
bootloader: Fix "skip validate in deep sleep" on ESP32 & ESP32-S2
...
Regression in 83bf2e1ac1
, this memory region was shifted from fast to slow RTC
memory (no change on ESP32-C3 as no RTC fast memory on this chip.)
2021-06-01 19:05:09 +10:00
Angus Gratton
58a3e08895
paritition_table: Verify the partition table md5sum when loading the app
...
Additionally, always enable the partition MD5 check if flash encryption is on in
Release mode. This ensures the partition table ciphertext has not been modified
(CVE-2021-27926).
The exception is pre-V3.1 ESP-IDF bootloaders and partition tables, which
don't have support for the MD5 entry.
2021-05-30 23:21:14 +00:00
Jiang Jiang Jian
ed76cc4dd4
Merge branch 'feature/support_adjust_voltage_storingInEfuse_open_glitch_rst_v4.3' into 'release/v4.3'
...
ESP32c3: auto adjust voltage dbias storing in efuse and open glitch reset for ECO3 (backport v4.3)
See merge request espressif/esp-idf!13388
2021-05-13 04:08:56 +00:00
Marius Vikhammer
38aa99d63d
soc: merge C3 caps into a single soc_caps.h
2021-05-11 15:20:54 +08:00
chaijie
6d2bdfc5f5
1. open glitch reset for c3 ECO3;
...
2. set digital & rtc voltage to about 1.15v which storing in efuse.
2021-05-08 17:38:24 +08:00
Mahavir Jain
d41781099a
bootloader_support: fix min. revision error print for < C3-ECO3 revisions
2021-04-21 10:16:46 +05:30
Mahavir Jain
6403a229eb
bootloader: fix print related to min. chip revision
...
Closes https://github.com/espressif/esp-idf/issues/6890
Closes IDFGH-5106
2021-04-21 10:16:46 +05:30
Omar Chebib
84dc42c4b0
gpio: Disable USB JTAG when setting pins 18 and 19 as GPIOs on ESP32C3
...
When `DIS_USB_JTAG` eFuse is NOT burned (`False`), it is not possible
to set pins 18 and 19 as GPIOs. This commit solves this by manually
disabling USB JTAG when using pins 18 or 19.
The functions shall use `gpio_hal_iomux_func_sel` instead of
`PIN_FUNC_SELELECT`.
2021-04-12 17:45:06 +08:00
Angus Gratton
00cfcde385
bootloader: Fix "skip validate on exit deep sleep" when "Use RTC fast memory as heap" is enabled
...
RTC region used to store boot partition needs to remain reserved in the app.
2021-04-09 19:15:43 +10:00
chaijie
0c7f286a87
fix c3 hardware bug before ECO3 and optimizate bbpll config:
...
1. deepsleep poweron reset bug in high temperature before ECO3;
2. brownout reset bug before ECO2;
3. bbpll voltage low bug before ECO3;
4. need xpd iph for xtal before ECO3;
2021-03-31 20:17:54 +08:00
KonstantinKondrashov
26d362040e
secure_boot/SIGNED_ON_UPDATE_NO_SECURE_BOOT: Only the first position of signature blocks is used to verify any update
2021-03-25 15:40:24 +08:00
Angus Gratton
502a819757
secure boot v2: Fix issue checking multiple signature blocks on OTA update
2021-03-17 17:08:59 +08:00
Angus Gratton
a479ee30c9
secure boot: Add boot check for SBV2 "check app signature on update"
...
As this mode uses the public keys attached to the existing app's signatures to
verify the next app, checking that a signature block is found on boot prevents
the possibility of deploying a non-updatable device from the factory.
2021-03-17 17:08:59 +08:00
KonstantinKondrashov
46e85ed021
secure_boot: Secure Boot V2 verify app signature on update (without Secure boot)
...
- ESP32 ECO3, ESP32-S2/C3/S3
2021-03-17 17:08:59 +08:00
KonstantinKondrashov
0862fe815b
secure_boot: Adds empty esp_secure_boot_init_checks
...
There is no checks
2021-03-17 17:09:00 +08:00
Angus Gratton
0305d13467
bootloader: Add config options to skip validation of app for minimum boot time
2021-03-10 19:08:47 +11:00
Angus Gratton
2c39010b3b
Merge branch 'bugfix/anti_rollback_without_test_app' into 'master'
...
bootloader: Anti-rollback mode doesn't run test_app
See merge request espressif/esp-idf!12225
2021-02-09 14:16:51 +08:00
Michael (XIAO Xufeng)
423a5458dc
Merge branch 'bugfix/support_new_BYflash_chip_boot' into 'master'
...
spi_flash: add external flash support on esp32c3
Closes IDF-2650, IDF-2651, and IDF-2399
See merge request espressif/esp-idf!12121
2021-02-05 20:03:24 +08:00
Cao Sen Miao
cc1c6c30be
flash: check boya chip support
2021-02-04 14:44:50 +08:00
KonstantinKondrashov
25ac1d4d28
bootloader: Anti-rollback mode doesn't run test_app
...
- Cmake shows an error if the partition table has a test app.
- BOOTLOADER_APP_TEST depends on !BOOTLOADER_APP_ANTI_ROLLBACK.
- Bootloader does not boot the test app if secure version is low.
Closes: https://www.esp32.com/viewtopic.php?f=13&t=19164&p=71302#p71302
2021-02-01 23:24:23 +08:00
KonstantinKondrashov
3ed226c362
efuse(esp32c3): Adds getting chip_revision and chip_pkg
2021-01-25 19:37:40 +08:00
Cao Sen Miao
9905da46e0
spi_flash: Add auto suspend mode on esp32c3
2021-01-25 11:14:02 +08:00
Angus Gratton
a7da0c894b
Merge branch 'feature/c3_master_flash_enc_support' into 'master'
...
flash encryption: merge C3 flash encryption changes to master
See merge request espressif/esp-idf!12040
2021-01-22 12:58:38 +08:00
Angus Gratton
fe8a891de9
Merge branch 'feature/support_esp32c3_master_cmake_secure_boot' into 'master'
...
bootloader/esp32c3: Support secure boot
Closes IDF-2115
See merge request espressif/esp-idf!11797
2021-01-21 08:42:49 +08:00
KonstantinKondrashov
88c5fe49b8
soc: Adds a soc_caps define for all chips to define the number of boot key digests
2021-01-19 20:51:13 +08:00
KonstantinKondrashov
98f726fa4b
bootloader/esp32c3: Adds secure boot (not yet supported)
2021-01-19 20:51:13 +08:00
Marius Vikhammer
03fa63b0c9
bootloader: add flash encryption support for C3
...
Adds flash encryption support for C3 and updates docs for S2 & C3
2021-01-18 14:10:54 +08:00
morris
753a929525
global: fix sign-compare warnings
2021-01-12 14:05:08 +08:00
fuzhibo
312a0ad6c1
fix: support bootloader random enable for esp32c3
2021-01-11 14:41:09 +08:00
Angus Gratton
c535d569aa
Merge branch 'bugfix/secure_boot_sig_failed_crash' into 'master'
...
secure boot: Fix crash if signature verification fails in app
Closes IDFGH-4376
See merge request espressif/esp-idf!11846
2021-01-08 16:23:29 +08:00
Angus Gratton
7069736c2a
Merge branch 'feature/bootloader_uses_efuse_keys_api' into 'master'
...
bootloader: Add using of efuse APIs for keys, purposes, wr/rd-protection bits
See merge request espressif/esp-idf!11110
2021-01-08 11:29:50 +08:00
Konstantin Kondrashov
fbba2cb356
bootloader/esp32s2: Add using of efuse APIs for keys, purposes, wr/rd-protection bits for flash encryption, secure boot
2021-01-08 11:29:46 +08:00
Morozov-5F
a8837aa378
secure boot v2: Fix crash if signature verification fails in app
...
sha_handle is "finished" when verify_secure_boot_signature() returns and
should be nulled out.
Alternative version of fix submitted in https://github.com/espressif/esp-idf/pull/6210
Closes https://github.com/espressif/esp-idf/pull/6210
Signed-off-by: Angus Gratton <angus@espressif.com>
2020-12-31 14:43:47 +05:30
Marius Vikhammer
68608f804c
esp32c3: Misc fixes needed to build & run
2020-12-31 15:20:05 +11:00