mirror of
https://github.com/espressif/esp-idf
synced 2025-03-09 09:09:10 -04:00
secure_boot_v2(doc): secure_boot_v2 key/s must be readable
This commit is contained in:
parent
93c639872b
commit
75e099129e
@ -1 +1 @@
|
||||
Subproject commit 4698b396730b23fb4aab023c5fb1744db957fc4c
|
||||
Subproject commit 258301731780493365bb249553ae7855a3e753ea
|
@ -36,11 +36,11 @@ Advantages
|
||||
|
||||
- The RSA public key is stored on the device. The corresponding RSA private key is kept secret on a server and is never accessed by the device.
|
||||
|
||||
.. only:: esp32
|
||||
.. only:: esp32
|
||||
|
||||
- Only one public key can be generated and stored in ESP32 ECO3 during manufacturing.
|
||||
|
||||
.. only:: esp32s2 or esp32c3
|
||||
.. only:: esp32s2 or esp32c3
|
||||
|
||||
- Up to three public keys can be generated and stored in the chip during manufacturing.
|
||||
|
||||
@ -152,20 +152,22 @@ eFuse usage
|
||||
|
||||
- ABS_DONE_1 - Enables secure boot protection on boot.
|
||||
|
||||
- BLK2 - Stores the SHA-256 digest of the public key. SHA-256 hash of public key modulus, exponent, precalculated R & M’ values (represented as 776 bytes – offsets 36 to 812 - as per the :ref:`signature-block-format`) is written to an eFuse key block.
|
||||
- BLK2 - Stores the SHA-256 digest of the public key. SHA-256 hash of public key modulus, exponent, precalculated R & M’ values (represented as 776 bytes – offsets 36 to 812 - as per the :ref:`signature-block-format`) is written to an eFuse key block. The write-protection bit must be set, but the read-protection bit must not.
|
||||
|
||||
.. only:: esp32s2 or esp32c3
|
||||
|
||||
- SECURE_BOOT_EN - Enables secure boot protection on boot.
|
||||
|
||||
- KEY_PURPOSE_X - Set the purpose of the key block on {IDF_TARGET_NAME} by programming SECURE_BOOT_DIGESTX (X = 0, 1, 2) into KEY_PURPOSE_X (X = 0, 1, 2, 3, 4, 5). Example: If KEY_PURPOSE_2 is set to SECURE_BOOT_DIGEST1, then BLOCK_KEY2 will have the Secure Boot V2 public key digest.
|
||||
- KEY_PURPOSE_X - Set the purpose of the key block on {IDF_TARGET_NAME} by programming SECURE_BOOT_DIGESTX (X = 0, 1, 2) into KEY_PURPOSE_X (X = 0, 1, 2, 3, 4, 5). Example: If KEY_PURPOSE_2 is set to SECURE_BOOT_DIGEST1, then BLOCK_KEY2 will have the Secure Boot V2 public key digest. The write-protection bit must be set (this field does not have a read-protection bit).
|
||||
|
||||
- BLOCK_KEYX - The block contains the data corresponding to its purpose programmed in KEY_PURPOSE_X. Stores the SHA-256 digest of the public key. SHA-256 hash of public key modulus, exponent, precalculated R & M’ values (represented as 776 bytes – offsets 36 to 812 - as per the :ref:`signature-block-format`) is written to an eFuse key block.
|
||||
- BLOCK_KEYX - The block contains the data corresponding to its purpose programmed in KEY_PURPOSE_X. Stores the SHA-256 digest of the public key. SHA-256 hash of public key modulus, exponent, precalculated R & M’ values (represented as 776 bytes – offsets 36 to 812 - as per the :ref:`signature-block-format`) is written to an eFuse key block. The write-protection bit must be set, but the read-protection bit must not.
|
||||
|
||||
- KEY_REVOKEX - The revocation bits corresponding to each of the 3 key block. Ex. Setting KEY_REVOKE2 revokes the key block whose key purpose is SECURE_BOOT_DIGEST2.
|
||||
|
||||
- SECURE_BOOT_AGGRESSIVE_REVOKE - Enables aggressive revocation of keys. The key is revoked as soon as verification with this key fails.
|
||||
|
||||
The key(s) must be readable in order to give software access to it. If the key(s) is read-protected then the software reads the key(s) as all zeros and the signature verification process occurs with error, bootloader and app can not be run.
|
||||
|
||||
.. _secure-boot-v2-howto:
|
||||
|
||||
How To Enable Secure Boot V2
|
||||
|
Loading…
x
Reference in New Issue
Block a user