Vikram Dattu
eb99b27f2e
Bugfix: ota fails with secure boot on for image size greater than 3.2MB
...
When an OTA image size is larger than 50 MMU pages (approx. 3.2 MB), secure_boot_generate fails while trying to map it into memory:
https://gitlab.espressif.cn:6688/idf/esp-idf/blob/master/components/bootloader_support/src/esp32/secure_boot.c#L72
Instead of trying to map the whole image, secure boot code should split the image into chunks and map them one by one, like it is done in esp_image_format.c:
https://gitlab.espressif.cn:6688/idf/esp-idf/blob/master/components/bootloader_support/src/esp_image_format.c#L372
Closes https://jira.espressif.com:8443/browse/IDF-709
Signed-off-by: Vikram Dattu <vikram.dattu@espressif.com>
2019-07-01 20:04:15 +00:00
morris
c159984264
separate rom from esp32 component to esp_rom
...
1. separate rom include files and linkscript to esp_rom
2. modefiy "include rom/xxx.h" to "include esp32/rom/xxx.h"
3. Forward compatible
4. update mqtt
2019-03-21 18:51:45 +08:00
Ivan Grokhotkov
96d0f7f5e2
bootloader: account for load address when mapping cache pages
...
Bootloader used to calculate the number of cache pages assuming that
load address was aligned, while in reality load address for DROM and
IROM was offset by 0x20 bytes from the start of 64kB page. This
caused the bootloader to map one less page if the size of the image
was 0x4..0x1c less than a multiple of 64kB.
Reported in https://esp32.com/viewtopic.php?f=13&t=6952 .
2019-01-19 14:44:55 +08:00
Mahavir Jain
62746e414e
bootloader: add API for erasing flash region
...
Signed-off-by: Mahavir Jain <mahavir@espressif.com>
2018-08-29 12:04:32 +00:00
Tian Zhong Xing
7555031553
add api get valid mmu table pages number
2018-03-16 10:40:55 +08:00
Angus Gratton
43b99edf2b
bootloader: Calculate SHA-256 of image while loading/verifying
2017-07-19 18:25:17 +10:00
Angus Gratton
0c8888d68f
bootloader: Combine loading from flash & verifying to save boot time
...
Still needs updating to account for secure boot.
2017-07-19 18:25:17 +10:00
Ivan Grokhotkov
8a9516a973
Merge branch 'bugfix/bootloader_error_handling_code' into 'master'
...
Add error handling code in bootloader
Forgotten error handling
See merge request !650
2017-04-13 15:28:49 +08:00
Anton Maklakov
e4353f2119
bootloader: Add error handling code
2017-04-11 18:15:36 +08:00
Alexey Gerenkov
0860f46220
spi_flash: Fixed bug in SPI flash ROM driver to work with embedded flash chip
...
1) fixed SPI_read_status: added check for flash busy flag in matrix mode
2) fixed SPI_page_program: enable write before writing data to SPI FIFO
3) SPI flash ROM funcs replacement is controlled via menuconfig option
2017-04-11 10:51:19 +08:00
Angus Gratton
eea2788f5a
OTA: Fix issues with encrypted OTA
...
- OTA source can write non-16-byte multiples of data
- Assumption that empty ota_data is 0xFFFFFFFF untrue when encrypted
2017-01-26 18:52:35 +11:00
Angus Gratton
9eb135fd73
Flash encryption: Support enabling flash encryption in bootloader, app support
...
* App access functions are all flash encryption-aware
* Documentation for flash encryption
* Partition read/write is flash aware
* New encrypted write function
2016-12-01 23:49:12 -08:00
Angus Gratton
e459f803da
secure boot: Functional partition table & app signature verification
2016-11-14 11:08:42 +11:00
Angus Gratton
7402a1b973
partition_table: Move from 0x4000 to 0x8000
...
Also fix a bug with correctly padding bootloader image when length is
already a multiple of 16.
2016-11-14 11:08:42 +11:00
Angus Gratton
aceb6517c0
Refactor existing bootloader common functionality into bootloader_support component
2016-11-02 17:58:41 +11:00