/mcuboot-latest/ |
D | .gitmodules | 4 [submodule "boot/cypress/libs/mtb-pdl-cat1"] 5 path = boot/cypress/libs/mtb-pdl-cat1 7 [submodule "boot/cypress/libs/pdl/psoc6pdl"] 8 path = boot/cypress/libs/pdl/psoc6pdl 10 [submodule "boot/cypress/libs/retarget-io"] 11 path = boot/cypress/libs/retarget-io 13 [submodule "boot/cypress/libs/core-lib"] 14 path = boot/cypress/libs/core-lib 16 [submodule "boot/cypress/libs/psoc6hal"] 17 path = boot/cypress/libs/psoc6hal [all …]
|
D | README.md | 39 RIOT is supported only as a boot target. We will accept any new 52 - [Cypress/Infineon](boot/cypress/README.md) 66 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b… 67 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo… 68 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade… 69 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 70 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … 71 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to… 72 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl… 73 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
|
D | .mbedignore | 1 boot/boot_serial/* 2 boot/mynewt/* 3 boot/zephyr/* 4 boot/cypress/* 5 boot/espressif/* 6 boot/nuttx/*
|
/mcuboot-latest/testplan/mynewt/ |
D | Makefile | 47 build-boot-rsa: 52 build-boot-rsa-pss: 57 build-boot-ec: 62 build-boot-ec256: 68 build-boot-rsa-ec: 73 build-boot-rsa-validate0: 78 build-boot-rsa-noswap: 85 build-mcuboot: build-boot-rsa build-boot-rsa-pss build-boot-ec \ 86 build-boot-ec256 build-boot-rsa-validate0 build-boot-rsa-noswap
|
/mcuboot-latest/docs/ |
D | index.md | 22 RIOT is supported only as a boot target. We will accept any new port 49 - [Cypress/Infineon](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress/README.md) 72 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b… 73 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo… 74 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade… 75 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 76 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … 77 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to… 78 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl… 79 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
|
D | readme-espressif.md | 230 signature verification, the hardware-assisted Secure Boot and Flash Encryption were made available 297 ## [Secure Boot](#secure-boot) 299 The Secure Boot implementation is based on 300 [IDF's Secure Boot V2](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-… 308 ### [Building bootloader with Secure Boot](#building-bootloader-with-secure-boot) argument 369 *Once the device makes its first full boot, these configurations cannot be reverted* 391 *Once the bootloader is flashed and the device resets, the **first boot will enable Secure Boot** 404 ### [Secure Boot Process](#secure-boot-process) argument 406 Secure boot uses a signature block appended to the bootloader image in order to verify the 410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor [all …]
|
D | release-notes.md | 8 - Boot serial: Add response to echo command if support is not 58 will revert back to the default zephyr boot banner. 90 - espressif: adjustments after IDF v5.1 compatibility, secure boot build and memory map organization 105 - Reworked boot serial extensions so that they can be used by modules 107 - Removed Zephyr custom img list boot serial extension support. 108 - (Zephyr) Adds support for sharing boot information with 129 - Various fixes to boot serial. 141 - Various general fixes to the boot code. 183 - Implement the mcumgr echo command in serial boot mode 207 - Allow to boot primary image if secondary one is unreachable. [all …]
|
D | readme-mynewt.md | 25 - "@mcuboot/boot/bootutil" 28 Also remove any dependency on `boot/bootutil` (mynewt's bundled bootloader) 32 `boot/mynewt/mcuboot_config/syscfg.yml`. 40 # Boot serial functionality with Mynewt
|
D | design.md | 34 * The bootutil library (boot/bootutil) 35 * The boot application (each port has its own at boot/<port>) 39 the main image. This last step is instead implemented by the boot application. 147 /* Independent from multiple image boot */ 290 built to be executed from the corresponding slot. At boot time the bootloader 354 ## [Boot swap types](#boot-swap-types) 366 then still choose to run it during the next boot. When this happens, the swap is 368 during the next boot by swapping the image(s) back into its original location(s) 369 , and attempting to boot the old image(s). 387 - `BOOT_SWAP_TYPE_NONE`: The "usual" or "no upgrade" case; attempt to boot the [all …]
|
D | readme-nuttx.md | 5 The NuttX port of MCUboot secure boot library expects that the platform provides a Flash storage wi… 27 …er, installing it and triggering the firmware update process for the next boot after a system rese… 29 ## Using MCUboot on NuttX as a secure boot solution 31 …boot is performed at application-level by the MCUboot library. Once MCUboot validates the applicat…
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 5 … CM4 application to demonstrate MCUboot Application operation in terms of BOOT and UPGRADE process. 11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE. 13 * Can be built for BOOT slot or UPGRADE slot of bootloader. 43 Root directory for build is **boot/cypress.** 45 The following command will build regular HEX file of a BlinkyApp for BOOT slot. Substitute `PLATFOR… 47 make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=BOOT 52 IMG_TYPE=BOOT 62 make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=BOOT 74 * first image BOOT (PRIMARY) slot start `0x10018000` 76 * second image BOOT (PRIMARY) slot start `0x10038000` [all …]
|
D | BlinkyApp.mk | 32 # - image type to BOOT 34 IMG_TYPE ?= BOOT 39 # image type can be BOOT or UPGRADE 40 IMG_TYPES = BOOT UPGRADE 57 ifeq ($(IMG_TYPE), BOOT) 112 # Set build directory for BOOT and UPGRADE images 121 OUT_CFG := $(OUT_CFG)/boot
|
/mcuboot-latest/boot/boot_serial/ |
D | syscfg.yml | 22 Start the serial boot loader if this pin is asserted at boot time. 31 GPIO configuration for the serial boot loader detect pin. 36 The value the detect pin must be set to for the serial boot loader 44 string is detected during this period, the serial boot loader is 46 received, the boot loader runs in the normal (non-serial) mode. 58 detected during the timeout period, the serial boot loader is 60 the boot loader runs in the normal (non-serial) mode. This setting 66 The GPIO to toggle while the serial boot loader is running. Set to 72 The toggle rate, in Hz, of the serial boot loader report pin.
|
D | pkg.yml | 20 pkg.name: boot/boot_serial 25 - boot 32 - "@mcuboot/boot/mynewt/flash_map_backend" 33 - "@mcuboot/boot/mynewt/boot_uart" 34 - "@mcuboot/boot/zcbor"
|
/mcuboot-latest/boot/espressif/ |
D | main.c | 105 …/* Rough steps for a first boot when Secure Boot and/or Flash Encryption are still disabled on dev… in main() 106 * Secure Boot: in main() 109 * 3) Burn EFUSE to enable Secure Boot V2 (ABS_DONE_0). in main() 118 …BOOT_LOG_WRN("eFuse virtual mode is enabled. If Secure boot or Flash encryption is enabled then it… in main() 128 …BOOT_LOG_ERR("Secure Boot and Flash Encryption cannot be enabled separately, only together (their … in main() 142 BOOT_LOG_INF("enabling secure boot v2..."); in main() 147 BOOT_LOG_INF("secure boot v2 is already enabled, continuing.."); in main() 191 * 3) Burn EFUSE to enable Secure Boot V2. in main() 195 BOOT_LOG_INF("blowing secure boot efuse..."); in main() 214 BOOT_LOG_INF("Secure boot permanently enabled"); in main() [all …]
|
/mcuboot-latest/boot/zephyr/include/io/ |
D | io.h | 45 * @retval false for normal boot, true for serial recovery boot 53 * @retval false for normal boot, true for serial recovery boot 58 * Checks board boot mode via retention subsystem and if device should stay in 61 * @retval false for normal boot, true for serial recovery boot
|
/mcuboot-latest/boot/mynewt/ |
D | pkg.yml | 20 pkg.name: boot/mynewt 32 - "@mcuboot/boot/mynewt/mcuboot_config" 33 - "@mcuboot/boot/bootutil" 34 - "@mcuboot/boot/mynewt/flash_map_backend" 50 - "@mcuboot/boot/boot_serial" 51 - "@mcuboot/boot/mynewt/boot_uart"
|
/mcuboot-latest/samples/zephyr/ |
D | Makefile | 43 # "primary slot". This should boot into this app, print a small message, and 61 .PHONY: check boot hello1 clean_boot clean_hello1 \ 92 @echo "<target>: all, boot, hello1, full.bin" 95 all: boot hello1 hello2 97 full.bin: boot hello1 hello2 109 boot: check target 116 $(SOURCE_DIRECTORY)/../../boot/zephyr && \ 210 # Test (with RSA) that overwrite-only works. This should boot, 230 boot hello1 246 boot hello1 [all …]
|
/mcuboot-latest/boot/bootutil/ |
D | pkg.yml | 20 pkg.name: boot/bootutil 21 pkg.description: The bootutil library performs most of the functions of a boot loader. 25 - boot 38 - "@mcuboot/boot/mynewt/mcuboot_config" 42 - "@mcuboot/boot/mynewt/flash_map_backend"
|
/mcuboot-latest/zephyr/ |
D | module.yml | 2 - boot/zephyr 4 cmake: ./boot/bootutil/zephyr 5 sysbuild-cmake: boot/zephyr/sysbuild
|
/mcuboot-latest/boot/boot_serial/test/ |
D | pkg.yml | 18 pkg.name: boot/boot_serial/test 20 pkg.description: "Boot serial unit tests." 26 - "@mcuboot/boot/boot_serial" 27 - "@mcuboot/boot/bootutil"
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig | 235 bool "Validate image in the primary slot on every boot" 239 primary slot every boot. This adds the signature check time to 240 every boot, but can mitigate against some changes that are 251 method. This option is usefull for lowering the boot up time for 320 loading firmware via Bluetooth). The main application will boot by 321 default unless there is an error with it or the boot mode has been 334 hex "Boot image executable ram start" 338 int "Boot image executable base size" 351 attempt to boot the previous image. The images can also be made permanent 516 bool "Save boot information data" [all …]
|
D | Kconfig.firmware_loader | 25 bool "Check boot mode via retention subsystem" 28 Allows for entering firmware loader mode by using Zephyr's boot mode 29 retention system (i.e. an application must set the boot mode to stay
|
/mcuboot-latest/boot/mynewt/mcuboot_config/ |
D | syscfg.yml | 19 # Package: boot/mynewt/mcuboot_config 26 description: 'Validate image at slot 0 on each boot.' 143 Store the boot state/measurements in shared memory. 144 If enabled, the bootloader will store certain boot measurements such as 149 description: the maximum size of the CBOR encoded boot record in bytes.
|
/mcuboot-latest/boot/mbed/ |
D | mbed_lib.json | 34 …ore booting, even if no upgrade was performed. This is recommended if the boot time penalty is acc… 106 "boot-swap-move": { 107 "help": "Boot swap using move (NOT TESTED)", 159 "measured-boot": { 160 "help": "Measured boot (NOT TESTED)", 180 "help": "Enable ability to boot update candidates in-place.",
|