esp-idf/components/bootloader_support/include
Mahavir Jain 3305cb4d23 fix(ota): additional checks for secure version in anti-rollback case
Some additional checks related to secure version of the application in
anti-rollback case have been added to avoid any attempts to boot lower
security version but valid application (e.g., passive partition image).

- Read secure_version under sha256 protection

- First check has been added in the bootloader to ensure correct secure
  version after application verification and loading stage. This check
  happens before setting up the flash cache mapping and handling over
  the final control to application. This check ensures that application
  was not swapped (e.g., to lower security version but valid image) just
  before the load stage in bootloader.

- Second check has been added in the application startup code to ensure
  that currently booting app has higher security version than the one
  programmed in the eFuse for anti-rollback scenario. This will ensure
  that only the legit application boots-up on the device for
  anti-rollback case.
2024-02-07 22:23:10 +08:00
..
bootloader_clock.h soc: Adds efuse hal 2022-02-24 22:20:09 +08:00
bootloader_common.h feat: Made read_otadata() API public 2023-07-06 11:40:49 +05:30
bootloader_mem.h bootloader: update copyright notice 2021-05-10 04:58:34 +02:00
bootloader_memory_utils.h Use configuration option instead of in components not related to FreeRTOS 2023-11-28 07:49:20 +00:00
bootloader_random.h refactor (docs, rng): Clarify RNG usage 2022-04-11 10:55:28 +08:00
bootloader_util.h driver: fix public header exceptions for driver 2022-07-22 00:12:36 +00:00
esp_app_format.h feat(esp32c5): support esptool on esp32c5 beta3 2024-01-09 13:11:11 +08:00
esp_flash_data_types.h bootloader: update copyright notice 2021-05-10 04:58:34 +02:00
esp_flash_encrypt.h security: Adds new APIs to check that all eFuse security features are enabled correctly 2023-01-10 23:35:13 +08:00
esp_flash_partitions.h feat(partition_table): Add read-only partition flag and functionality 2023-10-11 00:01:05 +02:00
esp_image_format.h fix(ota): additional checks for secure version in anti-rollback case 2024-02-07 22:23:10 +08:00
esp_secure_boot.h feat(bootloader_support): Make esp_secure_boot_verify_sbv2_signature_block() function public 2023-12-11 18:50:55 +05:30