OVMS3-idf/components/bootloader
Angus Gratton abd6d40796 secure boot: Ensure mbedTLS enables ECDSA if signatures are checked in app
and all ECDSA to be disabled if secure boot is not enabled

Previously if ECDSA disabled in config then secure_boot_signatures.c would
fail to build (whether or not secure boot was enabled).

To avoid breaking apps that might be using the signature scheme with custom OTA
without enabling secure boot signatures in config, this change just disables
this functionality if unavailable in mbedTLS config.

Possible fix for root cause of https://github.com/espressif/esp-idf/pull/3703
2019-08-30 14:56:11 +10:00
..
subproject Merge branch 'bugfix/bootloader_factory_reset_with_wake_up_from_deep_sleep' into 'master' 2019-08-29 09:35:08 +08:00
CMakeLists.txt bootloader: fix secure boot issues 2019-06-28 10:54:21 +08:00
component.mk build system: Use component.mk for all components, refactor bootloader build 2017-07-19 09:10:48 +10:00
flash_bootloader_args.in esptool_py: use passed offset and image when template is given 2019-06-21 19:48:41 +08:00
Kconfig.projbuild secure boot: Ensure mbedTLS enables ECDSA if signatures are checked in app 2019-08-30 14:56:11 +10:00
Makefile.projbuild Secure Boot & Flash encryption: Support 3/4 Coding Scheme 2018-10-16 16:24:10 +11:00
project_include.cmake bootloader: fix secure boot issues 2019-06-28 10:54:21 +08:00
sdkconfig.rename Improve flash encryption documentation and add Development & Release modes 2019-06-25 23:41:18 +00:00