Enabling ESP32 Secure Boot V2 (SBV2): A Step-by-step Guide
idf.py monitor
now, you should be able to see the device
entering a boot loop showing log entries as below
shared/
directory, and inside the container, copy the application source folder to
/home/esp/app/
. We will use an ESP-IDF sample application as an example.
Inside container
void_app
firmware images from the container to host.
Inside the container, under /home/esp/
bootloader.bin
and
void_app.bin
that were put in the shared/
folder.
.patched_<timestamp>
to the
aforementioned shared/
folder.
apps/hello_world/build/hello_world.bin
and the partition table image
apps/hello_world/build/partition_table/partition-table.bin
to the shared/
folder.
void_app
got signed, and upload the development signed
application image to it (one can ignore the bootloader image if there’s no
change in the bootloader). Pick a meaningful name for the signed firmware
bundle, and choose “ESP32” and “ESP-IDF” as the hardware type and firmware
type, respectively.
Click the “Create” button to sign the application image using the production
signing key managed in a cloud key management system. Download the production
signed images suffixed with .patched_<timestamp>
to the shared/
folder.