Commit Graph

1104 Commits

Author SHA1 Message Date
armando 0cb42beabf fix(spm): rename scp (scratchpad) to spm (scratchpad memory) 2026-03-31 09:24:53 +08:00
armando 55c462ccab change(mem): deprecated tcm and added scp memory utils 2026-03-31 09:22:11 +08:00
Mahavir Jain c0fb1667de Merge branch 'fix/add_ecdsa_curve_validation_during_secure_boot_v5.5' into 'release/v5.5'
fix(bootloader_support): added ecdsa curve validation during secure boot (v5.5)

See merge request espressif/esp-idf!46298
2026-03-30 10:21:33 +05:30
Song Ruo Jing 5698be672b feat(mspi): support 120MHz flash and psram for esp32c61 2026-03-13 16:27:17 +08:00
armando 453660968b feat(mspi): supported psram & flash 120MHz timing tuning 2026-03-13 11:12:45 +08:00
Jiang Jiang Jian fef58c3c20 Merge branch 'fix/min_rev_usage_v5.5' into 'release/v5.5'
fix: fix wrong REV_MIN usage for security, bt, efuse (v5.5)

See merge request espressif/esp-idf!45652
2026-03-07 15:40:42 +08:00
Jiang Jiang Jian fdfcae24e3 Merge branch 'feat/support_esp32p4_rev3.1_lowpower_v5.5' into 'release/v5.5'
feat: esp32p4 eco6 lowpower support and leakage optimization (v5.5)

See merge request espressif/esp-idf!45532
2026-03-06 19:54:06 +08:00
Xiao Xufeng 1e60df4c8c fix(tee): fix failed to configure flash on C6 v0.1 and above when REV_MIN_0 configured 2026-03-06 19:49:06 +08:00
nilesh.kale 7ff9f65a24 fix(bootloader_support): added ecdsa curve validation during secure boot
This commit added ECDSA key curve validation between
curve selected in menuconfig and key provided.
2026-03-05 10:31:22 +05:30
wuzhenghui 1187afe516 feat(esp_hw_support): hold MSPI pins in pd_top lightsleep 2026-02-10 16:19:36 +08:00
wuzhenghui 39d107fd24 fix(bootloader): fix bootloader bad spi pin drv config and clear all wpu/wpd by default 2026-02-10 16:18:36 +08:00
nilesh.kale 6584b5adad feat: enabled ECDSA peripheral support for ESSP32-P4 2026-02-09 20:05:46 +08:00
Michael (XIAO Xufeng) f4ad576689 Merge branch 'feature/support_chip912_eco5_pvt_auto_dbias_400m_backport_v5.5' into 'release/v5.5'
feat(p4): support chip912 pvt auto dbias 400m from eco5 (v5.5)

See merge request espressif/esp-idf!45210
2026-01-22 13:07:26 +08:00
armando 6c000e04f6 change(flash): improve bootloader_flash_read log 2026-01-22 02:12:55 +08:00
Xiao Xufeng 85f30c2665 fix: fix DCDC patch on P4 rev3.1 2026-01-19 22:34:23 +08:00
Xiao Xufeng bb79e6f246 fix(esp32p4): fix efuse, encryption and other rev_min usage 2026-01-19 17:53:51 +08:00
Jiang Jiang Jian 781963c538 Merge branch 'fix/fix_c5_rng_to_lp_peri_dependency_v5.5' into 'release/v5.5'
fix(esp_hw_support): new solution to fix RNG to LP Peri domain dependency on C5 (v5.5)

See merge request espressif/esp-idf!44953
2026-01-18 23:05:33 +08:00
Mahavir Jain 79048b8aac Merge branch 'feat/enable_pseudo_round_support_for_xts_aes_esp32p4_eco5_v5.5' into 'release/v5.5'
feat: added support for pseudo round xts aes in esp32p4 eco5 (v5.5)

See merge request espressif/esp-idf!45172
2026-01-18 18:17:41 +05:30
nilesh.kale d8885101cd feat: added support for pseudo round xts aes in esp32p4 eco5 2026-01-16 11:18:38 +05:30
wuzhenghui 67a62f45ce fix(esp_system): fix rom secure boot fast wake feature for c5/c6/h2/h21 2026-01-12 18:11:59 +08:00
wuzhenghui 670029c4da fix(esp_hw_support): fix RNG to LP peri domain dependency on C5 2026-01-09 15:05:55 +08:00
Jiang Jiang Jian b259c45528 Merge branch 'esp32p4_fix_bootloader_flash_read_allow_decrypt_v5.5' into 'release/v5.5'
fix(bootloader_flash): always invalidate FLASH_READ_VADDR before read (v5.5)

See merge request espressif/esp-idf!43957
2025-12-30 10:33:27 +08:00
Mahavir Jain f8fe1ce0ea Merge branch 'fix/secure_boot_verify_app_api_support_ecdsa_p384_v5.5' into 'release/v5.5'
Application's Secure Boot verify API support ECDSA-P384 (v5.5)

See merge request espressif/esp-idf!44181
2025-12-29 13:53:00 +05:30
Mahavir Jain 0f474752c7 Merge branch 'fix/fix_bootloader_skip_validate_in_deep_sleep_v5.5' into 'release/v5.5'
fix(bootloader): fix signature verification skip in deep sleep scenarios (v5.5)

See merge request espressif/esp-idf!43696
2025-12-26 09:53:51 +05:30
harshal.patil cb9acbdd21 fix(secure_boot): Application's Secure Boot verify API support ECDSA-P384 2025-12-24 10:42:15 +05:30
Jiang Jiang Jian ddb9f5d9dc Merge branch 'fix/fix_mspi_write_stuck_after_reset_v5.5' into 'release/v5.5'
fix(esp_system): fix mspi write stuck after cpu/digital reset on c5/c61 (v5.5)

See merge request espressif/esp-idf!43732
2025-12-04 10:34:56 +08:00
Samuel Obuch 3d2dda8e72 fix(bootloader_flash): invalidate FLASH_READ_VADDR before read
Fixed address to match corresponding mmu_hal_map_region call.
FLASH_MMAP_VADDR was invalidated by mistake in commit
ea38a2e9a4
2025-12-03 10:00:57 +01:00
wuzhenghui 104145de7f fix(esp_system): fix mspi write stuck after cpu/digital reset on c5/c61 2025-12-02 13:34:17 +08:00
gaoxu dfef29c007 feat(rng): support P4 ECO5 TRNG 2025-12-01 15:31:44 +08:00
gaoxu 94679d0b0e refactor(rng): refactor to use hal/ll apis for P4 2025-12-01 15:31:44 +08:00
Mahavir Jain ac8b73bda1 fix(bootloader): fix signature verification skip in deep sleep scenario
For CONFIG_BOOTLOADER_SKIP_VALIDATE_IN_DEEP_SLEEP enabled and exit from
deep sleep case the secure boot signature verification must be skipped
to improve the wakeup performance.

Closes https://github.com/espressif/esp-idf/issues/15590
2025-11-25 10:11:58 +05:30
Song Ruo Jing fb20e147d5 fix(console): release default console UART pins if console is switched in bootloader
Also print out console UART pin number in app cpu_startup stage

Closes https://github.com/espressif/esp-idf/issues/16764
Closes https://github.com/espressif/esp-idf/issues/17459
2025-11-21 22:11:25 +08:00
wuzhenghui 3ee348fe52 fix(esp_hw_support): add p4 rev3.0 MSPI workaround for deepsleep 2025-10-30 19:09:44 +08:00
Laukik Hase e54ebe08a4 fix(esp_tee): Handle the SPI1 WB mode incompatibility in TEE flash APIs on ESP32-C5
- When `esp_flash_read()` is invoked from REE, it internally enables WB mode
  via `spi_flash_ll_wb_mode_enable()`. However, the ROM flash APIs used by TEE
  do not support WB mode, resulting in failures when TEE attempts to access
  flash after this call.
- This commit adds a workaround in the TEE flash layer by saving WB mode state,
  temporarily disabling it for ROM API calls, and restoring it afterward.
2025-10-27 11:17:06 +05:30
morris 695f8e46d6 Merge branch 'fix/make_bootloader_flash_size_correct_v5.5' into 'release/v5.5'
fix(bootloader_flash): Make bootloader flash size accurate , etc. (backport v5.5)

See merge request espressif/esp-idf!41706
2025-10-20 14:21:40 +08:00
Mahavir Jain ea36c4f609 Merge branch 'feature/esp_tee_c5_v5.5' into 'release/v5.5'
feat(esp_tee): Initial support for ESP32-C5 and related changes (v5.5)

See merge request espressif/esp-idf!42357
2025-10-16 09:39:23 +05:30
Mahavir Jain 042f29dd66 Merge branch 'fix/change_write_protection_bit_of_shared_security_efuses_v5.5' into 'release/v5.5'
Reorder write protection bits of some shared security efuses (v5.5)

See merge request espressif/esp-idf!42033
2025-10-15 09:38:59 +05:30
C.S.M 018d7c5c79 fix(bootloader_flash): Make bootloader flash size accurate 2025-10-14 17:45:29 +08:00
Laukik Hase 73d0dadd6b fix(esp_tee): Correct flash operation bound checks to handle all overlap cases
- Ensure bound checks correctly handle all scenarios, including
  when a requested operation's (SPI0/1) range fully contains the
  TEE-protected region.
- Disable delegation of INTWDT timeout and Cache error interrupts as they reset
  the device after the panic handler
2025-10-14 10:12:28 +05:30
armando e6d4eec507 feat(p4): p4 rev3 real chip support 2025-10-13 15:25:23 +08:00
harshal.patil 175a6510f5 fix(bootloader_support): Allow pre-programmed XTS-AES psuedo round level efuses
- The API esp_flash_encryption_set_release_mode() by defualt programs
the XTS-AES pseudo round level efuse to level low but did not considered
any existing value that would have been programmed in the efuse bit.
2025-10-13 10:40:16 +05:30
harshal.patil 70a8b4d842 fix(bootloader_support): Reorder write disabling ECDSA_CURVE_MODE 2025-10-13 10:40:16 +05:30
harshal.patil d902072d80 fix(bootloader_support): Reorder write protection bits of some shared security efuses 2025-10-13 10:40:16 +05:30
Mahavir Jain fa08f239c0 Merge branch 'bugfix/encrypt_len_for_sb_update_case_v5.5' into 'release/v5.5'
fix(bootloader): correct encryption length for secure update without secure boot (v5.5)

See merge request espressif/esp-idf!41923
2025-09-21 18:37:43 +05:30
Mahavir Jain b0713ffe08 fix(bootloader): correct encryption length for secure update without secure boot
For secure update without secure boot case, the encryption length for
app image must consider signature block length as well. This was
correctly handled for secure boot case but not for secure update without
secure boot.
2025-09-16 10:16:37 +05:30
Marius Vikhammer 590cb66669 ci(system): enabled and cleanup misc system test-apps build-test-rules 2025-08-18 14:22:13 +08:00
harshal.patil 476f8f6f51 feat(bootloader_support): Support Secure Boot using ECDSA-P384 curve 2025-07-25 14:25:31 +05:30
harshal.patil 55f693d4dd change(bootloader_support/secure_boot): Allow NULL as verified_digest for app build
The esp_secure_boot_verify_sbv2_signature_block() and esp_secure_boot_verify_rsa_signature_block()
APIs need and use the verified_digest argument only for BOOTLOADER_BUILD, but the argument is
not used in the application code, and the value present in verified_digest is considered invalid.
Thus, allow passing NULL as the verified_digest parameter to help some save space.
2025-07-25 14:23:02 +05:30
harshal.patil 1b3eb8f93e fix(bootloader_support/secure_boot): Fix incorrect usage of ESP_SECURE_BOOT_KEY_DIGEST_LEN 2025-07-25 14:23:02 +05:30
Aditya Patwardhan a002a04332 feat(soc): Added soc capabilities related to RNG 2025-07-23 18:24:46 +05:30