GreenAddress
GreenAddress
@mahavirj so instead of blinding the trusted if we blind the untrusted app image sig blocks we get something like this which should be more efficient: ``` size_t validated_keys =...
Thanks @mahavirj I don't understand why we need t check the signatures are different when we check the public keys are different - the function ets_secure_boot_verify_signature will then make sure...
looks like I found a workaround to not have the bootloader_support twice: in idf_component.yml ``` + bootloader_support: + path: ../bootloader_components/bootloader_support + rules: + - if: "target in [esp32s3]" ``` actually...