Harshit Malpani 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren
..
main 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren
CMakeLists.txt 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren
README.md 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren
pytest_signed_app_no_secure_boot.py 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren
sdkconfig.defaults 7d98bdd495 feat: Add test app to verify SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT vor 2 Jahren

README.md

Supported Targets ESP32-C2 ESP32-C3

Secure Signed On Update No Secure Boot

This examples verifies the case when CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT is selected and application is not signed. The application should abort its execution with the logs:

secure_boot_v2: No signatures were found for the running app
secure_boot: This app is not signed, but check signature on update is enabled in config. It won't be possible to verify any update.