forked from espressif/esp-idf
fix(bootloader_support): Fix API not defined for application
This commit is contained in:
@@ -86,6 +86,10 @@ if(BOOTLOADER_BUILD)
|
|||||||
endif()
|
endif()
|
||||||
endif()
|
endif()
|
||||||
else()
|
else()
|
||||||
|
if(CONFIG_SOC_SECURE_BOOT_SUPPORTED)
|
||||||
|
list(APPEND srcs "src/${IDF_TARGET}/secure_boot_secure_features.c")
|
||||||
|
endif()
|
||||||
|
|
||||||
if(CONFIG_SECURE_SIGNED_ON_UPDATE)
|
if(CONFIG_SECURE_SIGNED_ON_UPDATE)
|
||||||
if(CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME)
|
if(CONFIG_SECURE_SIGNED_APPS_ECDSA_SCHEME)
|
||||||
list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_app.c")
|
list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_app.c")
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2015-2022 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2015-2024 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@@ -82,7 +82,7 @@ bool esp_flash_encryption_enabled(void);
|
|||||||
* @note RTC_WDT will reset while encryption operations will be performed (if RTC_WDT is configured).
|
* @note RTC_WDT will reset while encryption operations will be performed (if RTC_WDT is configured).
|
||||||
*
|
*
|
||||||
* @return ESP_OK if all operations succeeded, ESP_ERR_INVALID_STATE
|
* @return ESP_OK if all operations succeeded, ESP_ERR_INVALID_STATE
|
||||||
* if a fatal error occured during encryption of all partitions.
|
* if a fatal error occurred during encryption of all partitions.
|
||||||
*/
|
*/
|
||||||
esp_err_t esp_flash_encrypt_check_and_update(void);
|
esp_err_t esp_flash_encrypt_check_and_update(void);
|
||||||
|
|
||||||
@@ -178,12 +178,15 @@ esp_flash_enc_mode_t esp_get_flash_encryption_mode(void);
|
|||||||
*/
|
*/
|
||||||
void esp_flash_encryption_init_checks(void);
|
void esp_flash_encryption_init_checks(void);
|
||||||
|
|
||||||
|
|
||||||
|
#if BOOTLOADER_BUILD && CONFIG_SECURE_FLASH_ENC_ENABLED
|
||||||
/** @brief Set all secure eFuse features related to flash encryption
|
/** @brief Set all secure eFuse features related to flash encryption
|
||||||
*
|
*
|
||||||
* @return
|
* @return
|
||||||
* - ESP_OK - Successfully
|
* - ESP_OK - Successfully
|
||||||
*/
|
*/
|
||||||
esp_err_t esp_flash_encryption_enable_secure_features(void);
|
esp_err_t esp_flash_encryption_enable_secure_features(void);
|
||||||
|
#endif /* BOOTLOADER_BUILD && CONFIG_SECURE_FLASH_ENC_ENABLED */
|
||||||
|
|
||||||
/** @brief Returns the verification status for all physical security features of flash encryption in release mode
|
/** @brief Returns the verification status for all physical security features of flash encryption in release mode
|
||||||
*
|
*
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2015-2023 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2015-2024 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@@ -292,7 +292,7 @@ void esp_secure_boot_init_checks(void);
|
|||||||
* @return
|
* @return
|
||||||
* - ESP_OK - At least one signature was found
|
* - ESP_OK - At least one signature was found
|
||||||
* - ESP_ERR_NOT_FOUND - No signatures were found, num_digests value will be zero
|
* - ESP_ERR_NOT_FOUND - No signatures were found, num_digests value will be zero
|
||||||
* - ESP_FAIL - An error occured trying to read the signature blocks from flash
|
* - ESP_FAIL - An error occurred trying to read the signature blocks from flash
|
||||||
*/
|
*/
|
||||||
esp_err_t esp_secure_boot_get_signature_blocks_for_running_app(bool digest_public_keys, esp_image_sig_public_key_digests_t *public_key_digests);
|
esp_err_t esp_secure_boot_get_signature_blocks_for_running_app(bool digest_public_keys, esp_image_sig_public_key_digests_t *public_key_digests);
|
||||||
|
|
||||||
@@ -300,6 +300,11 @@ esp_err_t esp_secure_boot_get_signature_blocks_for_running_app(bool digest_publi
|
|||||||
|
|
||||||
/** @brief Set all secure eFuse features related to secure_boot
|
/** @brief Set all secure eFuse features related to secure_boot
|
||||||
*
|
*
|
||||||
|
* @note
|
||||||
|
* This API needs to be called in the eFuse batch mode.
|
||||||
|
* i.e. A call to esp_efuse_batch_write_begin() should be made prior to calling this API to start the batch mode
|
||||||
|
* After the API has been executed a call to esp_efuse_batch_write_commit()/esp_efuse_batch_write_cancel()
|
||||||
|
* should be made accordingly.
|
||||||
* @return
|
* @return
|
||||||
* - ESP_OK - Successfully
|
* - ESP_OK - Successfully
|
||||||
*/
|
*/
|
||||||
|
Reference in New Issue
Block a user