Searched refs:secure_boot_v2 (Results 1 – 4 of 4) sorted by relevance
201 …bool secure_boot_v2 = (chip_supports_sbv2) ? esp_efuse_read_field_bit(ESP_EFUSE_ABS_DONE_1) : fals… in esp_secure_boot_cfg_verify_release_mode() local202 result = secure_boot_v1 || secure_boot_v2; in esp_secure_boot_cfg_verify_release_mode()203 if (secure_boot_v1 && secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()206 } else if (!secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()214 if (secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()240 if (secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
73 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_bootloader.c"74 "src/secure_boot_v2/secure_boot.c"85 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_app.c")86 list(APPEND srcs "src/secure_boot_v2/secure_boot_rsa_signature.c")89 list(APPEND srcs "src/secure_boot_v2/secure_boot_signatures_app.c")90 list(APPEND srcs "src/secure_boot_v2/secure_boot_ecdsa_signature.c")
47 …* Secure boot key. Use ``secure_boot_v1`` or ``secure_boot_v2`` as block name. The key is placed i…52 …Key for ``secure_boot_v2`` will be burned only as write protected. The key must be readable becaus…
1828 secure_boot_v2 {IMAGES_DIR}/256bit_1 --no-protect-key"1841 secure_boot_v2 {IMAGES_DIR}/256bit_1"