esp-idf/tools/test_apps/security/signed_app_no_secure_boot
Harshit Malpani 7d98bdd495
feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT
Add a test app to verify the working of the application when
SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT is selected in the menuconfig
and the application is not signed
2023-09-25 12:02:58 +05:30
..
main feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT 2023-09-25 12:02:58 +05:30
CMakeLists.txt feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT 2023-09-25 12:02:58 +05:30
README.md feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT 2023-09-25 12:02:58 +05:30
pytest_signed_app_no_secure_boot.py feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT 2023-09-25 12:02:58 +05:30
sdkconfig.defaults feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT 2023-09-25 12:02:58 +05:30

README.md

Supported Targets ESP32-C2 ESP32-C3

Secure Signed On Update No Secure Boot

This examples verifies the case when CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT is selected and application is not signed. The application should abort its execution with the logs:

secure_boot_v2: No signatures were found for the running app
secure_boot: This app is not signed, but check signature on update is enabled in config. It won't be possible to verify any update.