OVMS3-idf/components/bootloader/subproject/components/micro-ecc
Angus Gratton d40c69375c bootloader: Add fault injection resistance to Secure Boot bootloader verification
Goal is that multiple faults would be required to bypass a boot-time signature check.

- Also strengthens some address range checks for safe app memory addresses
- Change pre-enable logic to also check the bootloader signature before enabling SBV2 on ESP32

Add some additional checks for invalid sections:

- Sections only partially in DRAM or IRAM are invalid
- If a section is in D/IRAM, allow the possibility only some is in D/IRAM
- Only pass sections that are entirely in the same type of RTC memory region
2020-02-27 14:37:19 +05:30
..
micro-ecc@d037ec8954 micro-ecc: move into booloader directory 2019-04-01 15:45:26 +05:30
CMakeLists.txt bootloader: Add fault injection resistance to Secure Boot bootloader verification 2020-02-27 14:37:19 +05:30
component.mk bootloader: Add fault injection resistance to Secure Boot bootloader verification 2020-02-27 14:37:19 +05:30
uECC_verify_antifault.c bootloader: Add fault injection resistance to Secure Boot bootloader verification 2020-02-27 14:37:19 +05:30
uECC_verify_antifault.h bootloader: Add fault injection resistance to Secure Boot bootloader verification 2020-02-27 14:37:19 +05:30