mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
ba2ff1876f
This prevents a device from being bricked in case when both secure boot & flash encryption are enabled and encryption gets interrupted during first boot. After interruption, all partitions on the device need to be reflashed (including the bootloader). List of changes: * Secure boot key generation and bootloader digest generation logic, implemented inside function esp_secure_boot_permanently_enable(), has been pulled out into new API esp_secure_boot_generate_digest(). The enabling of R/W protection of secure boot key on EFUSE still happens inside esp_secure_boot_permanently_enable() * Now esp_secure_boot_permanently_enable() is called only after flash encryption process completes * esp_secure_boot_generate_digest() is called before flash encryption process starts |
||
---|---|---|
.. | ||
bootloader_clock.h | ||
bootloader_common.h | ||
bootloader_random.h | ||
bootloader_util.h | ||
esp_flash_encrypt.h | ||
esp_flash_partitions.h | ||
esp_image_format.h | ||
esp_secure_boot.h |