mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-10-27 11:58:55 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			60 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			60 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * SPDX-FileCopyrightText: 2022-2024 Espressif Systems (Shanghai) CO LTD
 | |
|  *
 | |
|  * SPDX-License-Identifier: Apache-2.0
 | |
|  */
 | |
| #pragma once
 | |
| 
 | |
| #include "sdkconfig.h"
 | |
| #include <esp_err.h>
 | |
| #include <stdint.h>
 | |
| 
 | |
| #if CONFIG_IDF_TARGET_ESP32
 | |
| #include "esp32/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32S2
 | |
| #include "esp32s2/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32C3
 | |
| #include "esp32c3/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32S3
 | |
| #include "esp32s3/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32C2
 | |
| #include "esp32c2/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32C6
 | |
| #include "esp32c6/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32H2
 | |
| #include "esp32h2/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32P4
 | |
| #include "esp32p4/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32C5
 | |
| #include "esp32c5/rom/secure_boot.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32C61
 | |
| #include "esp32c61/rom/secure_boot.h"
 | |
| #endif
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| extern "C" {
 | |
| #endif
 | |
| 
 | |
| #if !CONFIG_IDF_TARGET_ESP32 || CONFIG_ESP32_REV_MIN_FULL >= 300
 | |
| 
 | |
| #if CONFIG_SECURE_BOOT_V2_ENABLED || CONFIG_SECURE_SIGNED_APPS_NO_SECURE_BOOT
 | |
| 
 | |
| /** @brief Legacy function to verify RSA secure boot signature block for Secure Boot V2.
 | |
|  *
 | |
|  * @note This is kept for backward compatibility. It internally calls esp_secure_boot_verify_sbv2_signature_block.
 | |
|  *
 | |
|  * @param sig_block Pointer to RSA signature block data
 | |
|  * @param image_digest Pointer to 32 byte buffer holding SHA-256 hash.
 | |
|  * @param verified_digest Pointer to 32 byte buffer that will receive verified digest if verification completes. (Used during bootloader implementation only, result is invalid otherwise.)
 | |
|  *
 | |
|  */
 | |
| esp_err_t esp_secure_boot_verify_rsa_signature_block(const ets_secure_boot_signature_t *sig_block, const uint8_t *image_digest, uint8_t *verified_digest);
 | |
| 
 | |
| #endif /* CONFIG_SECURE_BOOT_V2_ENABLED || CONFIG_SECURE_SIGNED_APPS_NO_SECURE_BOOT */
 | |
| 
 | |
| #endif
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| }
 | |
| #endif
 | 
