nilesh.kale
849726a3b7
feat: enable secure boot feature for esp32c61
2024-08-05 09:23:27 +05:30
igor.udot
d817841cea
ci(secure_boot): replace subprocess with esptool
2024-06-05 09:45:05 +08:00
nilesh.kale
f5dd1074b6
feat: enable secure boot for c5
...
This MR added suppport for secure boot in ESP32-C5.
2024-05-30 11:43:17 +05:30
Ivan Grokhotkov
545203f1c8
change(ci): split test_apps build-test-rules, add missing code owners
2024-04-17 11:54:33 +02:00
harshal.patil
f46a93e565
feat(secure_boot): add secure boot support for esp32p4
2023-10-12 10:12:54 +05:30
Harshit Malpani
7d98bdd495
feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT
...
Add a test app to verify the working of the application when
SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT is selected in the menuconfig
and the application is not signed
2023-09-25 12:02:58 +05:30
harshal.patil
66bbe8c156
fix: Fix esptool usage in the secure boot test application
2023-09-13 10:29:51 +05:30
Fu Hanxi
01fd87bd05
ci: remove ttfw related info in tools/test_apps
2023-04-07 12:29:30 +08:00
Aditya Patwardhan
780f7f2669
secure_boot_test_app: Update the test_app to use pytest framework
...
* Added custom class IdfFpgaDut in pytest from ttfw_idf.IDFFPGADUT
2023-03-28 16:10:00 +05:30
Cao Sen Miao
94120b82c2
esp32h2: add build test
2023-01-17 10:29:04 +08:00
KonstantinKondrashov
1f9260d790
all: Apply new version logic (major * 100 + minor)
2022-11-03 08:36:23 +00:00
Song Ruo Jing
2557e24a28
ci: Enable esp32c6 example, test_apps, and unit tests CI build stage
2022-11-01 11:23:21 +08:00
Alexey Lapshin
03ce915668
build system: re-add -Wno-format as private flag for some test_apps
2022-08-03 16:42:47 +04:00
Fu Hanxi
c0568611dd
docs: changes docs supported targets tables
2022-07-14 08:26:32 +08:00
Jakob Hasse
33a3616635
refactor (bootloader_support, efuse)!: remove target-specific rom includes
...
The following two functions in bootloader_support are private now:
* esp_secure_boot_verify_sbv2_signature_block()
* esp_secure_boot_verify_rsa_signature_block()
They have been moved into private header files
inside bootloader_private/
* Removed bootloader_reset_reason.h and
bootloader_common_get_reset_reason() completely.
Alternative in ROM component is available.
* made esp_efuse.h independent of target-specific rom header
2022-07-13 10:29:02 +08:00
Cao Sen Miao
a690a87829
spi_flash: Remove legacy spi_flash drivers
2022-07-01 11:01:34 +08:00
Djordje Nedic
facab8c5a7
tools: Increase the minimal supported CMake version to 3.16
...
This updates the minimal supported version of CMake to 3.16, which in turn enables us to use more CMake features and have a cleaner build system.
This is the version that provides most new features and also the one we use in our latest docker image for CI.
2022-06-01 06:35:02 +00:00
Sudeep Mohanty
a9fda54d39
esp_hw_support/esp_system: Re-evaluate header inclusions and include directories
...
This commit updates the visibility of various header files and cleans up
some unnecessary inclusions. Also, this commit removes certain header
include paths which were maintained for backward compatibility.
2022-03-07 11:18:08 +05:30
KonstantinKondrashov
9605f3eb1a
soc: Adds efuse hal
...
Replaced eFuse ROM funcs with hal layer
2022-02-24 22:20:09 +08:00
Roland Dobai
766aa57084
Build & config: Remove leftover files from the unsupported "make" build system
2021-11-11 15:32:36 +01:00
Sachin Parekh
cfcb893289
ttfw_idf: Added ESP32-S3 FPGA support
...
Provision to burn and reset efuses of ESP32S3 on FPGA
test_app: Enabled automated test cases for ESP32S3
2021-08-27 10:41:31 +05:30
Sachin Parekh
3f7fed7872
test_app: Added automated test cases for secure_boot
2021-08-27 10:41:31 +05:30
Angus Gratton
e92c4106b9
ci: Enable ESP32-S2 and later support for Secure Boot test app
2021-07-13 14:03:45 +10:00
Angus Gratton
e3ca61a200
secure boot: Fix incorrect handling of mbedtls_ctr_drbg_seed() failure in signature verification
...
Increase the test app optimization level to one that would find this issue.
2021-07-08 19:17:04 +10:00
Konstantin Kondrashov
f339b3fc96
efuse(esp32): Deprecate esp_efuse_burn_new_values() & esp_efuse_write_random_key()
...
These functions were used only for esp32 in secure_boot and flash encryption.
Use idf efuse APIs instead of efuse regs.
2021-06-17 07:21:36 +08:00
Angus Gratton
e1ebe3d7ac
ci: Move partition table offset in secure boot test app
2021-04-16 16:40:47 +10:00
Angus Gratton
66fb5a29bb
Whitespace: Automated whitespace fixes (large commit)
...
Apply the pre-commit hook whitespace fixes to all files in the repo.
(Line endings, blank lines at end of file, trailing whitespace)
2020-11-11 07:36:35 +00:00
Angus Gratton
b9a1d82ea3
ci: Add test apps for ESP32-S2 Secure Boot
2020-07-27 00:01:10 +00:00
Fu Hanxi
5b2fa1a5ad
build_app: make multi target support readable
2020-04-09 16:40:57 +08:00
Renz Bagaporo
4d9c573fb6
test, examples: use new component registration function
2020-03-23 10:58:48 +08:00
Supreet Deshpande
b79606ca37
feat/secure_boot_v2: Adding tools support for secure boot v2 ECO3
2020-02-25 01:28:22 +05:30