nuttxpr commented on PR #15470: URL: https://github.com/apache/nuttx/pull/15470#issuecomment-2577464980
[**\[Experimental Bot, please feedback here\]**](https://github.com/search?q=repo%3Aapache%2Fnuttx+13552&type=issues) This PR appears to mostly meet the NuttX requirements, but is missing some key information. **Missing/Needs Improvement:** * **Summary:** While the summary provides a title of the change, it lacks crucial details. It needs to explicitly state *why* this change is necessary. Is it fixing a bug, adding a new feature, or an optimization? What problem does it solve? The summary should also mention the functional part of the code being changed (e.g., the OTA update mechanism). * **Impact:** While it mentions adding a new interface, it lacks specifics. * **User Impact:** Does this change the way users interact with OTA updates? If so, how? * **Build Impact:** Are there any build system changes required (e.g., new Kconfig options)? * **Hardware Impact:** It mentions esp32s3, but is it *only* for esp32s3? Are any specific peripherals involved? * **Documentation:** Does this require documentation updates? If so, have they been included in the PR? If not, why not? * **Security:** Decryption is mentioned. *This is crucial*. The PR *must* explain the security implications thoroughly. What encryption algorithm is used? How are keys managed? What are the potential vulnerabilities? * **Compatibility:** Does this break any existing functionality? * **Testing:** The provided logs only show the "after" scenario. Logs from *before* the change are needed to demonstrate the difference and prove the fix/feature works. The testing also needs more detail: * **Build Host:** Specify the OS, CPU architecture, and compiler version used for building NuttX. * **Target:** More details are needed. "sim, RISC-V, ARM" isn't sufficient. Specify the *specific* board and configuration used (e.g., `esp32s3-devkitc:default`). Was the test performed on real hardware or a simulator (QEMU)? **Example of Improved Summary and Impact Sections:** **Summary:** This PR adds support for reading encrypted OTA partitions on the esp32s3. Previously, reading OTA partitions with decryption was not possible, preventing secure OTA updates. This change adds a new interface to the MTD subsystem specifically for the esp32s3, enabling secure access to firmware updates. This addresses [NuttX Issue #XXXX] (if applicable). **Impact:** * **New Feature:** Adds support for reading encrypted OTA partitions on esp32s3. * **User Impact:** YES. Users can now perform secure OTA updates. They will need to use the new `tc_ota_test --read_partion_decrypt` command to validate the decrypted data. * **Build Impact:** NO. * **Hardware Impact:** YES. Only affects esp32s3. Uses the SPI flash peripheral and the esp32s3's hardware encryption engine. * **Documentation Impact:** YES. Documentation updates included in this PR explaining the new interface and its usage. * **Security Impact:** YES. This change implements AES-256 decryption for OTA partitions. Keys are stored in efuse and are provisioned during manufacturing. (Expand on key management and potential vulnerabilities). * **Compatibility Impact:** NO. This is a new feature and does not break existing functionality. By adding this missing information, the PR will be much clearer and easier to review. This will significantly improve the chances of it being merged. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@nuttx.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org