OVMS3-idf/components/bootloader_support
Angus Gratton 904b85e365 secure boot: Ensure mbedTLS enables ECDSA if signatures are checked in app
and all ECDSA to be disabled if secure boot is not enabled

Previously if ECDSA disabled in config then secure_boot_signatures.c would
fail to build (whether or not secure boot was enabled).

To avoid breaking apps that might be using the signature scheme with custom OTA
without enabling secure boot signatures in config, this change just disables
this functionality if unavailable in mbedTLS config.

Possible fix for root cause of https://github.com/espressif/esp-idf/pull/3703

Closes https://github.com/espressif/esp-idf/issues/4758
2020-04-01 16:42:41 +11:00
..
include bootloader_support: fix logging prints around chip revision 2019-10-13 11:58:16 +05:30
include_bootloader Bugfix: ota fails with secure boot on for image size greater than 3.2MB 2019-07-01 20:04:15 +00:00
src secure boot: Ensure mbedTLS enables ECDSA if signatures are checked in app 2020-04-01 16:42:41 +11:00
test components: use new component registration api 2019-06-21 19:53:29 +08:00
CMakeLists.txt secure boot: Fix bug where verification key was not embedded in app 2019-11-08 11:39:01 +08:00
component.mk make bootloader_support depend on IDF_TARGET 2019-04-16 17:37:56 +08:00
Makefile.projbuild Secure boot: Correctly re-sign if signing key changes, better error if missing 2016-12-01 23:49:12 -08:00
README.rst Refactor existing bootloader common functionality into bootloader_support component 2016-11-02 17:58:41 +11:00

Bootloader Support Component
============================

Overview
--------

"Bootloader support" contains APIs which are used by the bootloader but are also needed for the main app.

Code in this component needs to be aware of being executed in a bootloader environment (no RTOS available, BOOTLOADER_BUILD macro set) or in an esp-idf app environment (RTOS running, need locking support.)