|
|
@@ -737,6 +737,23 @@ menu "Security features"
|
|
|
This can lead to permanent bricking of the device, in case all keys are revoked
|
|
|
because of signature verification failure.
|
|
|
|
|
|
+ config SECURE_BOOT_FLASH_BOOTLOADER_DEFAULT
|
|
|
+ bool "Flash bootloader along with other artifacts when using the default flash command"
|
|
|
+ depends on SECURE_BOOT_V2_ENABLED && SECURE_BOOT_BUILD_SIGNED_BINARIES
|
|
|
+ default N
|
|
|
+ help
|
|
|
+ When Secure Boot V2 is enabled, by default the bootloader is not flashed along with other artifacts
|
|
|
+ like the application and the partition table images, i.e. bootloader has to be seperately flashed
|
|
|
+ using the command `idf.py bootloader flash`, whereas, the application and partition table can be flashed
|
|
|
+ using the command `idf.py flash` itself.
|
|
|
+ Enabling this option allows flashing the bootloader along with the other artifacts
|
|
|
+ by invocation of the command `idf.py flash`.
|
|
|
+
|
|
|
+ If this option is enabled make sure that even the bootloader is signed using the correct secure boot key,
|
|
|
+ otherwise the bootloader signature verification would fail, as hash of the public key which is present in
|
|
|
+ the bootloader signature would not match with the digest stored into the efuses
|
|
|
+ and thus the device will not be able to boot up.
|
|
|
+
|
|
|
choice SECURE_BOOTLOADER_KEY_ENCODING
|
|
|
bool "Hardware Key Encoding"
|
|
|
depends on SECURE_BOOTLOADER_REFLASHABLE
|