Lines Matching full:if

32     if (block->magic_byte != ETS_SECURE_BOOT_V2_SIGNATURE_MAGIC) {  in validate_signature_block()
37 if (block->block_crc != esp_rom_crc32_le(0, (uint8_t *)block, CRC_SIGN_BLOCK_LEN)) { in validate_signature_block()
41 if (memcmp(image_digest, block->image_digest, ESP_SECURE_BOOT_DIGEST_LEN)) { in validate_signature_block()
60 Note that this function doesn't read any eFuses, so it doesn't know if the
63 …@return - ESP_OK if no signatures failed to verify, or if no valid signature blocks are found at a…
64 …- ESP_FAIL if there's a valid signature block that doesn't verify using the included public key (u…
78 if (ret != ESP_OK) { in s_calculate_image_public_key_digests()
85 if (signatures == NULL) { in s_calculate_image_public_key_digests()
95 if (ret != ESP_OK) { in s_calculate_image_public_key_digests()
103 #if CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME in s_calculate_image_public_key_digests()
112 #if CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME in s_calculate_image_public_key_digests()
118 if (!verified) { in s_calculate_image_public_key_digests()
132 if (ret == ESP_OK && public_key_digests->num_digests > 0) { in s_calculate_image_public_key_digests()
146 if (coding_scheme != EFUSE_CODING_SCHEME_NONE) { in check_and_generate_secure_boot_keys()
153 #if SECURE_BOOT_NUM_BLOCKS == 1 in check_and_generate_secure_boot_keys()
165 if (ret != ESP_OK) { in check_and_generate_secure_boot_keys()
172 /* Check if secure boot digests are present */ in check_and_generate_secure_boot_keys()
176if (tmp_has_key) { // For ESP32: esp_efuse_find_purpose() always returns True, need to check wheth… in check_and_generate_secure_boot_keys()
185 if (!has_secure_boot_digest) { in check_and_generate_secure_boot_keys()
188 if (ret != ESP_OK) { in check_and_generate_secure_boot_keys()
193 if (boot_key_digests.num_digests == 0) { in check_and_generate_secure_boot_keys()
201 if (ret != ESP_OK) { in check_and_generate_secure_boot_keys()
202 if (ret == ESP_ERR_NOT_ENOUGH_UNUSED_KEY_BLOCKS) { in check_and_generate_secure_boot_keys()
211 /* Check if corresponding digest slot is used or not */ in check_and_generate_secure_boot_keys()
212 if (blocks[i] == EFUSE_BLK_KEY_MAX) { in check_and_generate_secure_boot_keys()
217 #if SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS in check_and_generate_secure_boot_keys()
218 if (esp_efuse_get_digest_revoke(i)) { in check_and_generate_secure_boot_keys()
223 if (esp_efuse_get_key_dis_read(blocks[i])) { in check_and_generate_secure_boot_keys()
228 if (esp_efuse_block_is_empty(blocks[i])) { in check_and_generate_secure_boot_keys()
240 if (ret) { in check_and_generate_secure_boot_keys()
246 if (boot_key_digests.num_digests == 0) { in check_and_generate_secure_boot_keys()
253 #if SOC_EFUSE_REVOKE_BOOT_KEY_DIGESTS in check_and_generate_secure_boot_keys()
255 if (boot_key_digests.num_digests < SECURE_BOOT_NUM_BLOCKS) { in check_and_generate_secure_boot_keys()