esp-idf/components/bootloader_support/src
Angus Gratton ede477ea65 paritition_table: Verify the partition table md5sum when loading the app
Additionally, always enable the partition MD5 check if flash encryption is on in
Release mode. This ensures the partition table ciphertext has not been modified
(CVE-2021-27926).

The exception is pre-V3.1 ESP-IDF bootloaders and partition tables, which
don't have support for the MD5 entry.
2021-05-18 01:32:59 +00:00
..
esp32 gpio: Disable USB JTAG when setting pins 18 and 19 as GPIOs on ESP32C3 2021-04-08 14:01:18 +08:00
esp32c3 ESP32C3: auto adjust voltage dbias storing in efuse and open glitch reset for ECO3 2021-05-08 17:56:54 +08:00
esp32s2 secure_boot: Secure Boot V2 verify app signature on update (without Secure boot) 2021-03-15 12:30:20 +00:00
esp32s3 Support ESP32S3 Beta 3 target 2021-03-18 10:24:22 +08:00
idf secure_boot: Secure Boot V2 verify app signature on update (without Secure boot) 2021-03-15 12:30:20 +00:00
secure_boot_v1 secure_boot_v1: Adds a help message in case when sig_block.version is not valid 2021-03-25 20:01:52 +08:00
secure_boot_v2 secure_boot/SIGNED_ON_UPDATE_NO_SECURE_BOOT: Only the first position of signature blocks is used to verify any update 2021-03-25 12:27:05 +00:00
bootloader_clock_init.c ulp: clear rtc int at initialization 2021-03-31 17:15:55 +08:00
bootloader_clock_loader.c bootloader: fix section placement issues found by the check script 2020-09-03 18:14:17 +02:00
bootloader_common_loader.c bootloader: fix print related to min. chip revision 2021-04-20 14:19:17 +05:30
bootloader_common.c bootloader_support: Used esp_image_get_metadata() instead of esp_image_verify() 2021-05-05 11:53:57 +00:00
bootloader_console_loader.c Support ESP32S3 Beta 3 target 2021-03-18 10:24:22 +08:00
bootloader_console.c usb_serial_jtag: fix the bug that cannot write with usb_jtag 2021-05-13 13:40:01 +08:00
bootloader_efuse_esp32.c efuse/esp32: Expands PKG_VER from 3 bit to 4 bits 2020-09-17 07:44:37 +00:00
bootloader_efuse_esp32c3.c efuse(esp32c3): Adds getting chip_revision and chip_pkg 2021-01-25 19:37:40 +08:00
bootloader_efuse_esp32s2.c efuse/esp32: Expands PKG_VER from 3 bit to 4 bits 2020-09-17 07:44:37 +00:00
bootloader_efuse_esp32s3.c Whitespace: Automated whitespace fixes (large commit) 2020-11-11 07:36:35 +00:00
bootloader_flash_config_esp32.c gpio: Disable USB JTAG when setting pins 18 and 19 as GPIOs on ESP32C3 2021-04-08 14:01:18 +08:00
bootloader_flash_config_esp32c3.c soc: merge C3 caps into a single soc_caps.h 2021-04-28 14:42:35 +08:00
bootloader_flash_config_esp32s2.c soc: combine xxx_caps.h into one soc_caps.h 2020-10-17 16:10:15 +08:00
bootloader_flash_config_esp32s3.c Support ESP32S3 Beta 3 target 2021-03-18 10:24:22 +08:00
bootloader_flash.c global: fix sign-compare warnings 2021-01-12 14:05:08 +08:00
bootloader_init.c bootloader: create public bootloader_flash.h header 2020-09-19 10:52:02 +08:00
bootloader_mem.c Updates for riscv support 2020-11-13 07:49:11 +11:00
bootloader_panic.c Updates for riscv support 2020-11-13 07:49:11 +11:00
bootloader_random_esp32.c esp32s2: Support bootloader_random_enable() 2020-10-16 18:48:26 +11:00
bootloader_random_esp32c3.c fix: support bootloader random enable for esp32c3 2021-01-11 14:41:09 +08:00
bootloader_random_esp32s2.c esp32s2: Use regi2c registers to enable bootloader RNG 2020-10-22 14:39:59 +11:00
bootloader_random_esp32s3.c ci: add more build test for esp32-s3 2020-10-27 17:22:17 +08:00
bootloader_random.c global: fix sign-compare warnings 2021-01-12 14:05:08 +08:00
bootloader_utility.c bootloader_support: Fix min size of OTA partition in error log 2021-04-22 14:00:42 +05:30
esp_image_format.c bootloader_support: Used esp_image_get_metadata() instead of esp_image_verify() 2021-05-05 11:53:57 +00:00
flash_encrypt.c bootloader: Adds a check that app is run under FE 2021-02-15 20:33:50 +08:00
flash_partitions.c paritition_table: Verify the partition table md5sum when loading the app 2021-05-18 01:32:59 +00:00
flash_qio_mode.c flash: check boya chip support 2021-02-04 14:44:50 +08:00
secure_boot.c secure_boot/SIGNED_ON_UPDATE_NO_SECURE_BOOT: Only the first position of signature blocks is used to verify any update 2021-03-25 12:27:05 +00:00