ESP-Jumpstart Examples with Flash Encryption, Secure Boot and OTA

maveren
Posts: 1
Joined: Tue May 05, 2020 1:55 pm

ESP-Jumpstart Examples with Flash Encryption, Secure Boot and OTA

Postby maveren » Wed May 13, 2020 9:27 pm

IDF Version: v4.2-dev-1320-g1aebfdf6a
Hardware: DevkitC Wroom32u

Objective: Implement flash encryption, secure boot, and OTA with a forked version of ESP-Jumpstart: https://github.com/espressif/esp-jumpstart.

I have modified the ESP-Jumstart examples to use my own aws account and successfully tested OTA with remote app signing. Although, after I enable flash encryption and secure boot I get the following errors when the OTA update begins:

[Codebox]I (97084) esp_https_ota: Starting OTA...
I (97084) esp_https_ota: Writing to partition subtype 17 at offset 0x1f0000
Guru Meditation Error: Core 0 panic'ed (IllegalInstruction). Exception was unhandled.
Memory dump at 0x401a4898: a33020b4 be03e520 1d202aa0
0x401a4898: crypto_ec_point_cmp at C:/espm200505/esp/esp-idf/components/wpa_supplicant/src/crypto/crypto_mbedtls-ec.c:444

Core 0 register dump:
PC : 0x401a489c PS : 0x00060a30 A0 : 0x80090afa A1 : 0x3ffd4400
0x401a489c: crypto_ec_point_cmp at C:/espm200505/esp/esp-idf/components/wpa_supplicant/src/crypto/crypto_mbedtls-ec.c:444

A2 : 0x3ffb98a4 A3 : 0x00000033 A4 : 0x00000000 A5 : 0x000000a5
A6 : 0x000000a5 A7 : 0x00060023 A8 : 0x8009cbd4 A9 : 0x3ffd43d0
A10 : 0x00000001 A11 : 0x00000000 A12 : 0x3ffb98a4 A13 : 0x00000000
A14 : 0x00000000 A15 : 0x3ffc8c30 SAR : 0x0000001e EXCCAUSE: 0x00000000
EXCVADDR: 0x00000000 LBEG : 0x4000c2e0 LEND : 0x4000c2f6 LCOUNT : 0x00000000

Backtrace:0x401a4899:0x3ffd4400 0x40090af7:0x3ffd4420 0x400922d5:0x3ffd4450 0x40090f51:0x3ffd4510 0x4018db46:0x3ffd4550 0x4018dc74:0x3ffd4580 0x4009275a:0x3ffd45b0 0x40099ca1:0x3ffd45e0
0x401a4899: crypto_ec_point_cmp at C:/espm200505/esp/esp-idf/components/wpa_supplicant/src/crypto/crypto_mbedtls-ec.c:444

0x40090af7: lmacRecycleMPDU at ??:?

0x400922d5: ppResortTxAMPDU at ??:?

0x40090f51: lmacTxFrame at ??:?

0x4018db46: lmacProcessTxSuccess at ??:?

0x4018dc74: lmacProcessTxComplete at ??:?

0x4009275a: ppTask at ??:?

0x40099ca1: vPortTaskWrapper at C:/espm200505/esp/esp-idf/components/freertos/xtensa/port.c:143[/Codebox]

I have verified that flash encryption and secure boot (reflashable) are enabled correctly in DEV Mode.

Let me know if anyone has suggestions or if more information is needed.
Best regards

Who is online

Users browsing this forum: djixon and 154 guests