Mahavir Jain
d638267741
Merge branch 'fix/fix_flash_encryption_esp32p4_v5.3' into 'release/v5.3'
...
fix(bootloader_support): Fix flash encryption for esp32p4 (v5.3)
See merge request espressif/esp-idf!30921
2024-05-20 12:29:18 +08:00
Aditya Patwardhan
3640c1ecba
fix(bootloader_support): Fix flash encryption for esp32p4
2024-05-17 21:19:14 +05:30
Xiao Xufeng
cbcd346171
feat(esp32p4): add eco1 revision config option
2024-05-11 11:46:08 +08:00
chaijie@espressif.com
f1d1dfd1ef
feat(esp32p4_eco1): modify cpll and spll config
2024-05-11 11:43:24 +08:00
Marius Vikhammer
c9efc9cc83
Merge branch 'bugfix/p4_reserved_rtc_mem' into 'master'
...
fix(rtc_memory): fix conflict between LP-ROM and RTC reserved
Closes IDF-9408
See merge request espressif/esp-idf!30012
2024-04-17 16:45:57 +08:00
Marius Vikhammer
4533f16c34
fix(rtc_memory): fix conflict between LP-ROM and RTC reserved
2024-04-17 13:37:56 +08:00
Jakob Hasse
2e64570975
refactor(esp_hw_support): removed unneccessary code
2024-04-15 12:33:08 +02:00
laokaiyao
65b1fd33d3
ci(esp32c5mp): disable the unsupported tests
2024-04-07 12:13:29 +08:00
Aditya Patwardhan
0dcd692d59
Merge branch 'fix/fix_esp32p4_flash_encryption' into 'master'
...
fix(bootloader_support): Fix default key usage for flash encryption
See merge request espressif/esp-idf!29968
2024-04-02 19:57:38 +08:00
Aditya Patwardhan
51a91259d7
fix(bootloader_support): Fix default key usage for flash encryption
2024-04-02 12:27:53 +05:30
wanlei
20c18ac52b
feat(esp32c61): final introduce helloworld support
2024-04-02 10:50:52 +08:00
Jakob Hasse
9c108f2da6
feat(esp_hw_support): brought up RNG on ESP32-P4
2024-04-01 07:09:11 +05:30
morris
8e64a59fac
refactor(periph_ctrl): remove orphaned clk_gate_ll.h
...
and deprecate the legacy periph_module_xxx functions for new targets
2024-03-29 10:53:05 +08:00
Michael (XIAO Xufeng)
5d6c56c20d
Merge branch 'fix/unused_mmap_include' into 'master'
...
fix(all): remove unused header includes
See merge request espressif/esp-idf!29816
2024-03-29 10:20:08 +08:00
Aditya Patwardhan
9be1c9f03e
fix(bootloader_support): Fix API not defined for application
2024-03-28 15:05:10 +05:30
Marius Vikhammer
1c73c657c9
Merge branch 'ci/console_test_coverage' into 'master'
...
ci(console): improve esp-system console test-coverage
Closes IDFCI-1856, IDF-9576, and IDF-9577
See merge request espressif/esp-idf!29748
2024-03-28 11:14:57 +08:00
Marius Vikhammer
9e62e32a5b
fix(system_console): fixed unity output not working with usb jtag serial
2024-03-26 14:25:36 +08:00
Xiao Xufeng
313c4f2cdc
fix(all): remove unused header includes
2024-03-25 13:58:40 +08:00
laokaiyao
c9d6a11d1d
feat(esp32c5mp): support to run hello world on esp32c5 mp
2024-03-21 16:18:03 +08:00
Darian
53e3833f44
Merge branch 'refactor/usb_fsls_phy_hal' into 'master'
...
refactor(hal/usb): Update USB PHY related HAL/LL API
See merge request espressif/esp-idf!29659
2024-03-20 06:07:29 +08:00
Darian Leung
6d40e191f8
refactor(hal/usb): Refactor usb_wrap_ll.h
...
This commit rewrite the 'usb_wrap_ll.h' API as follows:
- All APIs renamed from 'usb_fsls_phy_ll_...()' to 'usb_wrap_ll_...()'
- APIs now match their equivalent counter parts in 'usb_serial_jtag_ll.h'
2024-03-18 19:23:44 +08:00
Darian Leung
a77e5cc718
refactor(hal/usb): Remove usb_fsls_phy_ll.h
...
For targets that only contain a USJ peripheral (and not a DWC OTG), their
'usb_fsls_phy_ll.h' headers only contain a single function
('usb_fsls_phy_ll_int_jtag_enable()') whose feature is already covered by
functions in 'usb_serial_jtag_ll.h'. Thus, this header is redundant.
This commit does the following:
- Remove 'usb_fsls_phy_ll.h' for targets that only contain a USJ peripheral
- Rename 'usb_fsls_phy_[hal|ll].[h|c]' to `usb_wrap_[hal|ll].[h|c]` for targets
that contain a DWC OTG peripheral. This better reflects the underlying peripheral
that the LL header accesses.
2024-03-18 19:23:43 +08:00
laokaiyao
24d6dcb829
feat(esp32c5mp): add system related components
2024-03-18 17:34:56 +08:00
Wu Zheng Hui
5a682c3bbb
Merge branch 'feature/optimize_chips_active_power' into 'master'
...
feat(system): Optimize the power consumption of esp32h2 and esp32c6 in the active state
Closes IDF-5658
See merge request espressif/esp-idf!27798
2024-03-14 12:08:33 +08:00
Wan Lei
794eec3483
Merge branch 'feat/c6lite_c61_soc_part3_build' into 'master'
...
feat(esp32c61): add & modify soc header files to pass build (stage 2/8 part 3/3)
See merge request espressif/esp-idf!29482
2024-03-13 14:03:43 +08:00
wanlei
616c72b96c
feat(esp32c61): add & modify soc header files pass build (part 3/3)
2024-03-12 18:53:28 +08:00
Konstantin Kondrashov
3f89072af1
feat(all): Use PRIx macro in all logs
2024-03-12 11:15:53 +02:00
Marius Vikhammer
08d1460f15
Merge branch 'feature/c5_rom_bootloader' into 'master'
...
feat(c5): update bootloader component for C5
Closes IDF-8653
See merge request espressif/esp-idf!29458
2024-03-12 16:11:24 +08:00
wuzhenghui
0b920ec08a
change(esp_phy): close esp32h2 rf pll by default
2024-03-12 10:10:41 +08:00
Marius Vikhammer
c90681a167
feat(bootloader): check and update bootloader/bootloader support component for C5
2024-03-08 10:25:21 +08:00
Marius Vikhammer
503b917ca5
fix(bootloader): fixed P4 bootloader being able to boot with certain configs
...
Due to internal memory being behind a cache on P4 we need to make sure we do
cache write backs when manipulating IRAM over the dcache.
2024-03-08 09:40:32 +08:00
wanlei
ee02b71f1c
feat(esp32c61): introduce target esp32c61
2024-03-01 21:12:25 +08:00
Kevin (Lao Kaiyao)
31437c34a9
Merge branch 'refactor/support_esp32c5_beta3_mp_coexistence' into 'master'
...
refactor(esp32c5): support esp32c5 beta3 & mp coexistence
See merge request espressif/esp-idf!29248
2024-03-01 15:50:05 +08:00
Armando (Dou Yiwen)
7b414002f6
Merge branch 'change/psram_200m_update' into 'master'
...
change(psram): update voltage configurations
See merge request espressif/esp-idf!28933
2024-03-01 15:17:24 +08:00
laokaiyao
1b91e84544
feat(esp32c5): add esp32c5 mp target
2024-03-01 10:13:45 +08:00
Armando
62440e5b12
change(psram): update voltage configurations
2024-02-29 10:42:37 +08:00
Song Ruo Jing
98d9f04b00
feat(gdma): add GDMA support for ESP32C5
2024-02-28 12:38:02 +08:00
Konstantin Kondrashov
b8e2342bf8
Merge branch 'bugfix/bootloader_flash_update_size' into 'master'
...
fix(bootloader_support): Adds bootloader_flash_update_size() for the rest chips
Closes IDFGH-12123
See merge request espressif/esp-idf!29049
2024-02-22 15:49:22 +08:00
Marius Vikhammer
c3ecd6d1f7
Merge branch 'bugfix/reset_reasons' into 'master'
...
Update reset reasons for C6, H2, P4 and C5
Closes IDF-5719 and IDF-8660
See merge request espressif/esp-idf!28999
2024-02-22 11:02:29 +08:00
Marius Vikhammer
4ce4af61ad
fix(system): update reset reasons for P4 and C5
2024-02-21 11:59:28 +08:00
Jiang Jiang Jian
e1a5633e18
Merge branch 'bugfix/bootloader_custom_rtc_data_crc_master' into 'master'
...
fix(bootloader): add legacy retained memory CRC calculation
Closes IDFGH-11747
See merge request espressif/esp-idf!28934
2024-02-21 10:39:14 +08:00
Mahavir Jain
c33b9e1426
fix(bootloader_support): check the secure version only for app image
...
Secure version in the image header is only available for the application
image. However, for certain security workflows, bootloader verifies
itself (own image) and hence the secure version check during that must be
avoided.
Regression introduced in recent commit-id: 3305cb4d
Tested that both secure boot and flash-enc workflows work correctly
with the anti-rollback scenario.
2024-02-19 14:54:17 +05:30
Konstantin Kondrashov
9ffafd53b2
fix(bootloader_support): Adds bootloader_flash_update_size() for the rest chips
...
Closes https://github.com/espressif/esp-idf/issues/13179
2024-02-14 17:41:20 +02:00
Konstantin Kondrashov
9b0eefee73
feat(bootloader_support): Support SB-on app can do OTA on SB-off chip
...
Closes: https://github.com/espressif/esp-idf/issues/13139
2024-02-12 17:27:50 +02:00
Omar Chebib
75eb489105
fix(bootloader): add legacy retained memory CRC calculation
...
* Closes https://github.com/espressif/esp-idf/issues/12849
In former versions of ESP-IDF, the user custom memory data in the retained memory
was taken into account during the CRC calculation. This was changed in a later
commit, the custom memory was ignored, therefore this can seen as a breaking change.
This commit gives the possibility to choose between the former (legacy) or
new way of calculating the CRC.
2024-02-09 16:49:56 +08:00
Mahavir Jain
34723ad12c
Merge branch 'bugfix/ota_anti_rollback_checks_2' into 'master'
...
feat(bootloader_support): Read secure_version under sha256 protection
Closes IDF-9013
See merge request espressif/esp-idf!28740
2024-02-08 23:10:08 +08:00
Mahavir Jain
3305cb4d23
fix(ota): additional checks for secure version in anti-rollback case
...
Some additional checks related to secure version of the application in
anti-rollback case have been added to avoid any attempts to boot lower
security version but valid application (e.g., passive partition image).
- Read secure_version under sha256 protection
- First check has been added in the bootloader to ensure correct secure
version after application verification and loading stage. This check
happens before setting up the flash cache mapping and handling over
the final control to application. This check ensures that application
was not swapped (e.g., to lower security version but valid image) just
before the load stage in bootloader.
- Second check has been added in the application startup code to ensure
that currently booting app has higher security version than the one
programmed in the eFuse for anti-rollback scenario. This will ensure
that only the legit application boots-up on the device for
anti-rollback case.
2024-02-07 22:23:10 +08:00
Song Ruo Jing
95133c179f
feat(clk): preliminary clock tree support for ESP32C5
2024-02-07 14:38:15 +08:00
Konstantin Kondrashov
4daaa94593
Merge branch 'feature/cleanup_rom_efuse_header' into 'master'
...
change(all): Clearing unused efuse rom headers
See merge request espressif/esp-idf!27109
2024-01-26 20:30:44 +08:00
Aditya Patwardhan
4dc2ace0b7
fix(esp_hw_support): Update key manager support
...
1) Added new Key Manager APIs
2) Added crypto locking layer for Key Manager
3) Remove support for deploying known key
4) Format key manager support
5) Fix build header error
6) Updated the key_mgr_types.h file
7) Added key manager tests
2024-01-23 10:24:39 +05:30