OVMS3-idf/tools/ci/config
Angus Gratton d40c69375c bootloader: Add fault injection resistance to Secure Boot bootloader verification
Goal is that multiple faults would be required to bypass a boot-time signature check.

- Also strengthens some address range checks for safe app memory addresses
- Change pre-enable logic to also check the bootloader signature before enabling SBV2 on ESP32

Add some additional checks for invalid sections:

- Sections only partially in DRAM or IRAM are invalid
- If a section is in D/IRAM, allow the possibility only some is in D/IRAM
- Only pass sections that are entirely in the same type of RTC memory region
2020-02-27 14:37:19 +05:30
..
assign-test.yml CI: assign and target-test stages updated to run test-apps in the ci 2020-02-06 16:46:41 +00:00
build.yml docs ci: Use the final version of the esp-idf-doc-env image 2020-02-10 19:55:46 +11:00
deploy.yml docs ci: Ensure deploy directory exists 2020-02-10 19:55:15 +11:00
host-test.yml ci: remove using IDF_XTENSA_TOOLCHAIN_URL because there are idf_tools.json and multi-target support 2020-02-10 18:05:21 +07:00
post_check.yml ci: fix job "check_wifi_lib_md5" 2019-12-11 13:10:23 +08:00
post_deploy.yml docs ci: Use the final version of the esp-idf-doc-env image 2020-02-10 19:55:46 +11:00
pre_check.yml docs: Move to Python 3.5+ and Sphinx 2.3 2020-02-07 16:47:50 +11:00
target-test.yml bootloader: Add fault injection resistance to Secure Boot bootloader verification 2020-02-27 14:37:19 +05:30