Home
last modified time | relevance | path

Searched refs:secure_boot_v2 (Results 1 – 4 of 4) sorted by relevance

/hal_espressif-latest/components/bootloader_support/src/
Dsecure_boot.c201 …bool secure_boot_v2 = (chip_supports_sbv2) ? esp_efuse_read_field_bit(ESP_EFUSE_ABS_DONE_1) : fals… in esp_secure_boot_cfg_verify_release_mode() local
202 result = secure_boot_v1 || secure_boot_v2; in esp_secure_boot_cfg_verify_release_mode()
203 if (secure_boot_v1 && secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
206 } else if (!secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
214 if (secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
240 if (secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
/hal_espressif-latest/components/bootloader_support/
DCMakeLists.txt73 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_bootloader.c"
74 "src/secure_boot_v2/secure_boot.c"
85 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_app.c")
86 list(APPEND srcs "src/secure_boot_v2/secure_boot_rsa_signature.c")
89 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_app.c")
90 list(APPEND srcs "src/secure_boot_v2/secure_boot_ecdsa_signature.c")
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dburn-key-cmd.rst47 …* Secure boot key. Use ``secure_boot_v1`` or ``secure_boot_v2`` as block name. The key is placed i…
52 …Key for ``secure_boot_v2`` will be burned only as write protected. The key must be readable becaus…
/hal_espressif-latest/tools/esptool_py/test/
Dtest_espefuse.py1828 secure_boot_v2 {IMAGES_DIR}/256bit_1 --no-protect-key"
1841 secure_boot_v2 {IMAGES_DIR}/256bit_1"