-
Notifications
You must be signed in to change notification settings - Fork 7.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'bugfix/fix_condition_to_verify_when_no_SB' into 'master'
fix(bootloader_support): Fix condition for checking signature in the application See merge request espressif/esp-idf!26026
- Loading branch information
Showing
9 changed files
with
68 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
7 changes: 7 additions & 0 deletions
7
tools/test_apps/security/signed_app_no_secure_boot/CMakeLists.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
# The following lines of boilerplate have to be in your project's | ||
# CMakeLists in this exact order for cmake to work correctly | ||
cmake_minimum_required(VERSION 3.16) | ||
|
||
# Secure Boot not currently supported for ESP32-S2 | ||
include($ENV{IDF_PATH}/tools/cmake/project.cmake) | ||
project(secure_boot) |
11 changes: 11 additions & 0 deletions
11
tools/test_apps/security/signed_app_no_secure_boot/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
| Supported Targets | ESP32-C2 | ESP32-C3 | | ||
| ----------------- | -------- | -------- | | ||
|
||
# Secure Signed On Update No Secure Boot | ||
|
||
This examples verifies the case when CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT is selected and application is not signed. The application should abort its execution with the logs: | ||
|
||
``` | ||
secure_boot_v2: No signatures were found for the running app | ||
secure_boot: This app is not signed, but check signature on update is enabled in config. It won't be possible to verify any update. | ||
``` |
2 changes: 2 additions & 0 deletions
2
tools/test_apps/security/signed_app_no_secure_boot/main/CMakeLists.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
idf_component_register(SRCS "main.c" | ||
INCLUDE_DIRS ".") |
15 changes: 15 additions & 0 deletions
15
tools/test_apps/security/signed_app_no_secure_boot/main/main.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
/* | ||
* SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD | ||
* | ||
* SPDX-License-Identifier: Unlicense OR CC0-1.0 | ||
*/ | ||
#include <stdio.h> | ||
#include "freertos/FreeRTOS.h" | ||
#include "freertos/task.h" | ||
|
||
#define TAG "example_secure_boot" | ||
|
||
void app_main(void) | ||
{ | ||
printf("\nExample for secured signed with no secure boot\n"); | ||
} |
12 changes: 12 additions & 0 deletions
12
tools/test_apps/security/signed_app_no_secure_boot/pytest_signed_app_no_secure_boot.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
# SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD | ||
# SPDX-License-Identifier: Unlicense OR CC0-1.0 | ||
|
||
import pytest | ||
from pytest_embedded import Dut | ||
|
||
|
||
@pytest.mark.esp32c2 | ||
@pytest.mark.esp32c3 | ||
@pytest.mark.generic | ||
def test_examples_security_on_update_no_secure_boot(dut: Dut) -> None: | ||
dut.expect("This app is not signed, but check signature on update is enabled in config. It won't be possible to verify any update.", timeout=10) |
8 changes: 8 additions & 0 deletions
8
tools/test_apps/security/signed_app_no_secure_boot/sdkconfig.defaults
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
CONFIG_SECURE_SIGNED_ON_UPDATE=y | ||
CONFIG_SECURE_SIGNED_APPS=y | ||
CONFIG_SECURE_BOOT_V2_PREFERRED=y | ||
CONFIG_SECURE_SIGNED_APPS_NO_SECURE_BOOT=y | ||
CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT=y | ||
# CONFIG_SECURE_BOOT is not set | ||
# CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES is not set | ||
# CONFIG_SECURE_FLASH_ENC_ENABLED is not set |