Home
last modified time | relevance | path

Searched full:boot (Results 1 – 25 of 153) sorted by relevance

1234567

/mcuboot-latest/
D.gitmodules4 [submodule "boot/cypress/libs/mtb-pdl-cat1"]
5 path = boot/cypress/libs/mtb-pdl-cat1
7 [submodule "boot/cypress/libs/pdl/psoc6pdl"]
8 path = boot/cypress/libs/pdl/psoc6pdl
10 [submodule "boot/cypress/libs/retarget-io"]
11 path = boot/cypress/libs/retarget-io
13 [submodule "boot/cypress/libs/core-lib"]
14 path = boot/cypress/libs/core-lib
16 [submodule "boot/cypress/libs/psoc6hal"]
17 path = boot/cypress/libs/psoc6hal
[all …]
DREADME.md39 RIOT is supported only as a boot target. We will accept any new
52 - [Cypress/Infineon](boot/cypress/README.md)
66 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b…
67 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo…
68 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade…
69 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio…
70 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application …
71 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to…
72 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl…
73 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
D.mbedignore1 boot/boot_serial/*
2 boot/mynewt/*
3 boot/zephyr/*
4 boot/cypress/*
5 boot/espressif/*
6 boot/nuttx/*
/mcuboot-latest/testplan/mynewt/
DMakefile47 build-boot-rsa:
52 build-boot-rsa-pss:
57 build-boot-ec:
62 build-boot-ec256:
68 build-boot-rsa-ec:
73 build-boot-rsa-validate0:
78 build-boot-rsa-noswap:
85 build-mcuboot: build-boot-rsa build-boot-rsa-pss build-boot-ec \
86 build-boot-ec256 build-boot-rsa-validate0 build-boot-rsa-noswap
/mcuboot-latest/docs/
Dindex.md22 RIOT is supported only as a boot target. We will accept any new port
49 - [Cypress/Infineon](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress/README.md)
72 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b…
73 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo…
74 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade…
75 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio…
76 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application …
77 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to…
78 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl…
79 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
Dreadme-espressif.md230 signature verification, the hardware-assisted Secure Boot and Flash Encryption were made available
297 ## [Secure Boot](#secure-boot)
299 The Secure Boot implementation is based on
300 [IDF's Secure Boot V2](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-
308 ### [Building bootloader with Secure Boot](#building-bootloader-with-secure-boot) argument
369 *Once the device makes its first full boot, these configurations cannot be reverted*
391 *Once the bootloader is flashed and the device resets, the **first boot will enable Secure Boot**
404 ### [Secure Boot Process](#secure-boot-process) argument
406 Secure boot uses a signature block appended to the bootloader image in order to verify the
410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor
[all …]
Drelease-notes.md8 - Boot serial: Add response to echo command if support is not
58 will revert back to the default zephyr boot banner.
90 - espressif: adjustments after IDF v5.1 compatibility, secure boot build and memory map organization
105 - Reworked boot serial extensions so that they can be used by modules
107 - Removed Zephyr custom img list boot serial extension support.
108 - (Zephyr) Adds support for sharing boot information with
129 - Various fixes to boot serial.
141 - Various general fixes to the boot code.
183 - Implement the mcumgr echo command in serial boot mode
207 - Allow to boot primary image if secondary one is unreachable.
[all …]
Dreadme-mynewt.md25 - "@mcuboot/boot/bootutil"
28 Also remove any dependency on `boot/bootutil` (mynewt's bundled bootloader)
32 `boot/mynewt/mcuboot_config/syscfg.yml`.
40 # Boot serial functionality with Mynewt
Ddesign.md34 * The bootutil library (boot/bootutil)
35 * The boot application (each port has its own at boot/<port>)
39 the main image. This last step is instead implemented by the boot application.
147 /* Independent from multiple image boot */
290 built to be executed from the corresponding slot. At boot time the bootloader
354 ## [Boot swap types](#boot-swap-types)
366 then still choose to run it during the next boot. When this happens, the swap is
368 during the next boot by swapping the image(s) back into its original location(s)
369 , and attempting to boot the old image(s).
387 - `BOOT_SWAP_TYPE_NONE`: The "usual" or "no upgrade" case; attempt to boot the
[all …]
Dreadme-nuttx.md5 The NuttX port of MCUboot secure boot library expects that the platform provides a Flash storage wi…
27 …er, installing it and triggering the firmware update process for the next boot after a system rese…
29 ## Using MCUboot on NuttX as a secure boot solution
31boot is performed at application-level by the MCUboot library. Once MCUboot validates the applicat…
/mcuboot-latest/boot/cypress/BlinkyApp/
DReadme.md5 … CM4 application to demonstrate MCUboot Application operation in terms of BOOT and UPGRADE process.
11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE.
13 * Can be built for BOOT slot or UPGRADE slot of bootloader.
43 Root directory for build is **boot/cypress.**
45 The following command will build regular HEX file of a BlinkyApp for BOOT slot. Substitute `PLATFOR…
47 make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=BOOT
52 IMG_TYPE=BOOT
62 make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=BOOT
74 * first image BOOT (PRIMARY) slot start `0x10018000`
76 * second image BOOT (PRIMARY) slot start `0x10038000`
[all …]
DBlinkyApp.mk32 # - image type to BOOT
34 IMG_TYPE ?= BOOT
39 # image type can be BOOT or UPGRADE
40 IMG_TYPES = BOOT UPGRADE
57 ifeq ($(IMG_TYPE), BOOT)
112 # Set build directory for BOOT and UPGRADE images
121 OUT_CFG := $(OUT_CFG)/boot
/mcuboot-latest/boot/boot_serial/
Dsyscfg.yml22 Start the serial boot loader if this pin is asserted at boot time.
31 GPIO configuration for the serial boot loader detect pin.
36 The value the detect pin must be set to for the serial boot loader
44 string is detected during this period, the serial boot loader is
46 received, the boot loader runs in the normal (non-serial) mode.
58 detected during the timeout period, the serial boot loader is
60 the boot loader runs in the normal (non-serial) mode. This setting
66 The GPIO to toggle while the serial boot loader is running. Set to
72 The toggle rate, in Hz, of the serial boot loader report pin.
Dpkg.yml20 pkg.name: boot/boot_serial
25 - boot
32 - "@mcuboot/boot/mynewt/flash_map_backend"
33 - "@mcuboot/boot/mynewt/boot_uart"
34 - "@mcuboot/boot/zcbor"
/mcuboot-latest/boot/espressif/
Dmain.c105 …/* Rough steps for a first boot when Secure Boot and/or Flash Encryption are still disabled on dev… in main()
106 * Secure Boot: in main()
109 * 3) Burn EFUSE to enable Secure Boot V2 (ABS_DONE_0). in main()
118 …BOOT_LOG_WRN("eFuse virtual mode is enabled. If Secure boot or Flash encryption is enabled then it… in main()
128 …BOOT_LOG_ERR("Secure Boot and Flash Encryption cannot be enabled separately, only together (their … in main()
142 BOOT_LOG_INF("enabling secure boot v2..."); in main()
147 BOOT_LOG_INF("secure boot v2 is already enabled, continuing.."); in main()
191 * 3) Burn EFUSE to enable Secure Boot V2. in main()
195 BOOT_LOG_INF("blowing secure boot efuse..."); in main()
214 BOOT_LOG_INF("Secure boot permanently enabled"); in main()
[all …]
/mcuboot-latest/boot/zephyr/include/io/
Dio.h45 * @retval false for normal boot, true for serial recovery boot
53 * @retval false for normal boot, true for serial recovery boot
58 * Checks board boot mode via retention subsystem and if device should stay in
61 * @retval false for normal boot, true for serial recovery boot
/mcuboot-latest/boot/mynewt/
Dpkg.yml20 pkg.name: boot/mynewt
32 - "@mcuboot/boot/mynewt/mcuboot_config"
33 - "@mcuboot/boot/bootutil"
34 - "@mcuboot/boot/mynewt/flash_map_backend"
50 - "@mcuboot/boot/boot_serial"
51 - "@mcuboot/boot/mynewt/boot_uart"
/mcuboot-latest/samples/zephyr/
DMakefile43 # "primary slot". This should boot into this app, print a small message, and
61 .PHONY: check boot hello1 clean_boot clean_hello1 \
92 @echo "<target>: all, boot, hello1, full.bin"
95 all: boot hello1 hello2
97 full.bin: boot hello1 hello2
109 boot: check target
116 $(SOURCE_DIRECTORY)/../../boot/zephyr && \
210 # Test (with RSA) that overwrite-only works. This should boot,
230 boot hello1
246 boot hello1
[all …]
/mcuboot-latest/boot/bootutil/
Dpkg.yml20 pkg.name: boot/bootutil
21 pkg.description: The bootutil library performs most of the functions of a boot loader.
25 - boot
38 - "@mcuboot/boot/mynewt/mcuboot_config"
42 - "@mcuboot/boot/mynewt/flash_map_backend"
/mcuboot-latest/zephyr/
Dmodule.yml2 - boot/zephyr
4 cmake: ./boot/bootutil/zephyr
5 sysbuild-cmake: boot/zephyr/sysbuild
/mcuboot-latest/boot/boot_serial/test/
Dpkg.yml18 pkg.name: boot/boot_serial/test
20 pkg.description: "Boot serial unit tests."
26 - "@mcuboot/boot/boot_serial"
27 - "@mcuboot/boot/bootutil"
/mcuboot-latest/boot/zephyr/
DKconfig235 bool "Validate image in the primary slot on every boot"
239 primary slot every boot. This adds the signature check time to
240 every boot, but can mitigate against some changes that are
251 method. This option is usefull for lowering the boot up time for
320 loading firmware via Bluetooth). The main application will boot by
321 default unless there is an error with it or the boot mode has been
334 hex "Boot image executable ram start"
338 int "Boot image executable base size"
351 attempt to boot the previous image. The images can also be made permanent
516 bool "Save boot information data"
[all …]
DKconfig.firmware_loader25 bool "Check boot mode via retention subsystem"
28 Allows for entering firmware loader mode by using Zephyr's boot mode
29 retention system (i.e. an application must set the boot mode to stay
/mcuboot-latest/boot/mynewt/mcuboot_config/
Dsyscfg.yml19 # Package: boot/mynewt/mcuboot_config
26 description: 'Validate image at slot 0 on each boot.'
143 Store the boot state/measurements in shared memory.
144 If enabled, the bootloader will store certain boot measurements such as
149 description: the maximum size of the CBOR encoded boot record in bytes.
/mcuboot-latest/boot/mbed/
Dmbed_lib.json34 …ore booting, even if no upgrade was performed. This is recommended if the boot time penalty is acc…
106 "boot-swap-move": {
107 "help": "Boot swap using move (NOT TESTED)",
159 "measured-boot": {
160 "help": "Measured boot (NOT TESTED)",
180 "help": "Enable ability to boot update candidates in-place.",

1234567