Searched full:for (Results 1 – 25 of 494) sorted by relevance
12345678910>>...20
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 1 ### Blinking LED test application for MCUboot bootloader 13 * Can be built for BOOT slot or UPGRADE slot of bootloader. 25 …P5_0` and `P5_1` used to configure serial port for debug prints. These pins are the most commonly … 26 …7U` used to define user connection LED. This pin is the most commonly used for USER_LED connection… 30 Pre-build action is implemented for defining start address and size of flash, as well as RAM start … 33 Pre-build action calls GCC preprocessor which intantiates defines for particular values in `BlinkyA… 35 Default values set for currently supported targets: 43 Root directory for build is **boot/cypress.** 45 The following command will build regular HEX file of a BlinkyApp for BOOT slot. Substitute `PLATFOR… 60 Example command-line for single-image: [all …]
|
/mcuboot-latest/docs/ |
D | release-notes.md | 12 - Added support for using builtin keys for image validation 13 (available with the PSA Crypto API based crypto backend for ECDSA signatures). 16 - bootutil: Fixed issue with comparing sector sizes for 21 and details on sectors including if slot sizes are not optimal for 31 - Zephyr: Fixes support for disabling instruction/data caches prior 39 - Added firmware loader configuration type support for Zephyr, this 40 allows for a single application slot and firmware loader image in 53 improves support a bit for some configurations of external flash. 78 - Fixed issue with serial recovery not showing image details for 92 - imgtool: add 'dumpinfo' command for signed image parsing. [all …]
|
D | readme-nuttx.md | 1 # MCUboot port for NuttX 6 - `CONFIG_MCUBOOT_PRIMARY_SLOT_PATH`: MTD partition for the application firmware image PRIMARY slot; 7 - `CONFIG_MCUBOOT_SECONDARY_SLOT_PATH`: MTD partition for the application firmware image SECONDARY … 8 - `CONFIG_MCUBOOT_SCRATCH_PATH`: MTD partition for the Scratch area; 15 - `<flash_map_backend/flash_map_backend.h>`, for enabling MCUboot to manage the application firmwar… 16 - `<mcuboot_config/mcuboot_config.h>`, for configuration of MCUboot's features. 17 - `<mcuboot_config/mcuboot_logging.h>`, for providing logging capabilities. 18 - `<os/os_malloc.h>`, for providing MCUboot access to the OS memory management interfaces. 19 - `<sysflash/sysflash.h>`, for configuration of the system's flash area organization. 25 …for MCUboot is to integrate it to a firmware update agent, which is an important component of a se… [all …]
|
D | readme-zephyr.md | 3 MCUboot began its life as the bootloader for Mynewt. It has since 4 acquired the ability to be used as a bootloader for Zephyr as well. 6 for Zephyr, and these are documented here. 8 Please see the [design document](design.md) for documentation on the design 12 The first step required for Zephyr is making sure your board has flash 15 - `boot_partition`: for MCUboot itself 21 needed (see end of this help file for details on creating a scratch partition 29 then the corresponding primary and secondary partitions must be defined for 30 the rest of the images too (for example, `slot2_partition` and 31 `slot3_partition` for Image 1). [all …]
|
D | encrypted_images.md | 5 - distributed with this work for additional information 16 - KIND, either express or implied. See the License for the 28 for encrypting/decrypting images on-the-fly while upgrading. 39 The encrypted image support is supposed to allow for confidentiality 41 storage, eg a SPI flash being used for the secondary slot. 63 that starts from zero (over the payload blocks) and increments by 1 for each 64 16-byte block. AES-CTR was chosen for speed/simplicity and allowing for any 66 block (allowing for simple resume operations on swap interruptions). 69 `newt`. This key should never be reused and no checks are done for this, 77 For RSA-OAEP a new TLV with value `0x30` is added to the image, for [all …]
|
D | imgtool.md | 8 This program is written for Python3, and has several dependencies on 16 You can generate a keypair for one of these types using the 'keygen' command: 20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used 27 prompt for a password. You will need to enter this password in every 33 for testing. Since this private key is widely distributed, it should 34 never be used for production. Once you have generated a production 38 For Zephyr, the keys live in the file `boot/zephyr/keys.c`. For 51 Image signing takes an image in binary or Intel Hex format intended for the 71 (for MCUboot <1.5) 80 -M, --max-sectors INTEGER When padding allow for this amount of [all …]
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | rsa.h | 4 * \brief This file provides an API for the RSA public-key cryptosystem. 25 * See the License for the specific language governing permissions and 51 #define MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE -0x4400 /**< The output buffer for decry… 61 #define MBEDTLS_RSA_SIGN 1 /**< Identifier for RSA signature operations. */ 62 #define MBEDTLS_RSA_CRYPT 2 /**< Identifier for RSA encryption and decryption operations. */ 68 * eg for alternative (PKCS#11) RSA implemenations in the PK layers. 84 int MBEDTLS_PRIVATE(ver); /*!< Reserved for internal purposes. 110 #MBEDTLS_RSA_PKCS_V15 for 1.5 padding and 111 #MBEDTLS_RSA_PKCS_V21 for OAEP or PSS. */ 113 as specified in md.h for use in the MGF [all …]
|
D | ecp.h | 4 * \brief This file provides an API for Elliptic Curves over GF(P) (ECP). 7 * <em>Standards for Efficient Cryptography Group (SECG): SEC1 10 * for Transport Layer Security (TLS)</em>. 30 * See the License for the specific language governing permissions and 47 …ILABLE -0x4E80 /**< The requested feature is not available, for example, the reques… 56 * types of curves. These flags are for internal library use only. */ 90 * changing the numerical value for existing curves. 107 …MBEDTLS_ECP_DP_SECP192R1, /*!< Domain parameters for the 192-bit curve defined by FIPS 186-4 … 108 …MBEDTLS_ECP_DP_SECP224R1, /*!< Domain parameters for the 224-bit curve defined by FIPS 186-4 … 109 …MBEDTLS_ECP_DP_SECP256R1, /*!< Domain parameters for the 256-bit curve defined by FIPS 186-4 … [all …]
|
D | ecdsa.h | 7 * <em>Standards for Efficient Cryptography Group (SECG): 9 * The use of ECDSA for TLS is defined in <em>RFC-4492: Elliptic Curve 10 * Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</em>. 26 * See the License for the specific language governing permissions and 40 * \brief Maximum ECDSA signature size for a given curve bit size 54 * For each of r and s, the value (V) may include an extra initial "0" bit. 80 * \brief Internal restart context for ecdsa_verify() 87 * \brief Internal restart context for ecdsa_sign() 95 * \brief Internal restart context for ecdsa_sign_det() 103 * \brief General context for resuming ECDSA operations [all …]
|
D | pk.h | 19 * See the License for the specific language governing permissions and 60 …ASSWORD_MISMATCH -0x3B80 /**< Given private key password does not allow for correct decryption.… 64 #define MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980 /**< Unavailable feature, e.g. RSA disabled for… 87 * \brief Options for RSASSA-PSS signature verification. 102 * then incrementally increasing to be large enough for each supported 105 * The resulting value can be 0, for example if MBEDTLS_ECDH_C is enabled 113 /* For RSA, the signature can be as large as the bignum module allows. 114 * For RSA_ALT, the signature size is not necessarily tied to what the 123 /* For ECDSA, the ecdsa module exports a constant for the maximum 138 /* The Mbed TLS representation is different for ECDSA signatures: [all …]
|
/mcuboot-latest/boot/espressif/port/esp32c3/ |
D | bootloader.conf | 24 # Use Serial through USB JTAG Serial port for Serial Recovery 32 # GPIO input type (0 for Pull-down, 1 for Pull-up) 36 # Delay time for identify the GPIO signal 38 # UART port used for serial communication (not needed when using USB) 40 # GPIO for Serial RX signal 42 # GPIO for Serial TX signal 45 # Use UART0 for console printing (use either UART or USB alone) 48 # Configures alternative UART port for console printing 53 # Use USB JTAG Serial for console printing 61 # Use Tinycrypt lib for EC256 or ED25519 signing [all …]
|
/mcuboot-latest/boot/espressif/port/esp32c6/ |
D | bootloader.conf | 24 # Use Serial through USB JTAG Serial port for Serial Recovery 32 # GPIO input type (0 for Pull-down, 1 for Pull-up) 36 # Delay time for identify the GPIO signal 38 # UART port used for serial communication (not needed when using USB) 40 # GPIO for Serial RX signal 42 # GPIO for Serial TX signal 45 # Use UART0 for console printing (use either UART or USB alone) 48 # Configures alternative UART port for console printing 53 # Use USB JTAG Serial for console printing 61 # Use Tinycrypt lib for EC256 or ED25519 signing [all …]
|
/mcuboot-latest/boot/espressif/port/esp32h2/ |
D | bootloader.conf | 24 # Use Serial through USB JTAG Serial port for Serial Recovery 32 # GPIO input type (0 for Pull-down, 1 for Pull-up) 36 # Delay time for identify the GPIO signal 38 # UART port used for serial communication (not needed when using USB) 40 # GPIO for Serial RX signal 42 # GPIO for Serial TX signal 45 # Use UART0 for console printing (use either UART or USB alone) 48 # Configures alternative UART port for console printing 53 # Use USB JTAG Serial for console printing 61 # Use Tinycrypt lib for EC256 or ED25519 signing [all …]
|
/mcuboot-latest/boot/espressif/port/esp32s3/ |
D | bootloader.conf | 26 # (main host OS is not responsible for booting the second image) 44 # Use Serial through USB JTAG Serial port for Serial Recovery 52 # GPIO input type (0 for Pull-down, 1 for Pull-up) 56 # Delay time for identify the GPIO signal 58 # UART port used for serial communication (not needed when using USB) 60 # GPIO for Serial RX signal 62 # GPIO for Serial TX signal 65 # Use UART0 for console printing (use either UART or USB alone) 68 # Configures alternative UART port for console printing 73 # Use USB JTAG Serial for console printing [all …]
|
/mcuboot-latest/boot/espressif/include/crypto_config/ |
D | mbedtls_custom_config.h | 23 * See the License for the specific language governing permissions and 48 * The compiler has support for asm(). 50 * Requires support for asm() in compiler. 67 * The platform lacks support for double-width integer division (64-bit 79 * and can be linked with an implementation of division for that type. 83 * Note that division for the native integer type is always required. 86 * cases it is also desirable to disable some double-width operations. For 95 * The platform lacks support for 32x32 -> 64-bit multiplication. 141 * System has time.h, time(), and an implementation for 151 * the documentation for mbedtls_platform_gmtime_r() for more information. [all …]
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig | 25 Use mbedTLS for crypto primitives. 31 Hidden option set if using PSA crypt for cryptography functionality 37 # When building for ECDSA, we use our own copy of mbedTLS, so the 42 Use TinyCrypt for crypto primitives. 48 # When building for ECDSA, we use our own copy of mbedTLS, so the 52 Use cc310 for crypto primitives. 72 Single image area is used for application which means that 97 Hash algorithm used for image verification. Selection 98 here may be limited by other configurations, like for 226 bool "Use HW key for image verification" [all …]
|
D | Kconfig.serial_recovery | 43 This setting will choose CDC ACM for serial recovery unless chosen 51 bool "Allow to select image number for DFU" 67 int "Stack buffer for unaligned memory writes" 73 Specifies the stack usage for a buffer which is used for unaligned 83 different value is used for the transport). 90 Number of receive buffers for data received via the serial port. 98 by the number of receive buffers, BOOT_LINE_BUFS to allow for 113 if enabled, support for the mcumgr echo command is being added. 151 Useful for powering on when using the same button as 158 If y, MCUboot waits for a prescribed duration of time to allow [all …]
|
/mcuboot-latest/boot/cypress/MCUBootApp/config/ |
D | mcuboot_crypto_config.h | 23 * See the License for the specific language governing permissions and 46 * The compiler has support for asm(). 48 * Requires support for asm() in compiler. 66 * The platform lacks support for double-width integer division (64-bit 78 * and can be linked with an implementation of division for that type. 82 * Note that division for the native integer type is always required. 85 * cases it is also desirable to disable some double-width operations. For 94 * The platform lacks support for 32x32 -> 64-bit multiplication. 140 * System has time.h, time(), and an implementation for 150 * the documentation for mbedtls_platform_gmtime_r() for more information. [all …]
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | ExternalMemory.md | 1 ### External Memory support for Secondary Slot 10 Using external memory for secondary slot allows to nearly double the size of Boot Image. 18 * There only one module is being used for secondary slot; 20 * The address for secondary slot should start from 0x18000000. 22 * The slot size for upgrade slot is even (or smaller) to erase size (0x40000) of given memory modul… 23 This requirement is accepted for code simplicity. 31 `[0x10018000, 0x10028000]` - primary slot for BlinkyApp; 33 `[0x18000000, 0x18010000]` - secondary slot for BlinkyApp; 41 `[0x10018000, 0x10028000]` - primary1 slot for BlinkyApp; 43 `[0x18000000, 0x18010000]` - secondary1 slot for BlinkyApp; [all …]
|
/mcuboot-latest/ |
D | LICENSE | 5 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 9 "License" shall mean the terms and conditions for use, reproduction, 17 control with that entity. For the purposes of this definition, 26 "Source" form shall mean the preferred form for making modifications, 41 form, that is based on (or derived from) the Work and for which the 43 represent, as a whole, an original work of authorship. For the purposes 51 submitted to Licensor for inclusion in the Work by the copyright owner 53 the copyright owner. For the purposes of this definition, "submitted" 58 Licensor for the purpose of discussing and improving the Work, but 86 granted to You under this License for that Work shall terminate [all …]
|
/mcuboot-latest/boot/espressif/port/esp32s2/ |
D | bootloader.conf | 30 # GPIO input type (0 for Pull-down, 1 for Pull-up) 34 # Delay time for identify the GPIO signal 36 # UART port used for serial communication (not needed when using USB) 38 # GPIO for Serial RX signal 40 # GPIO for Serial TX signal 43 # Use UART0 for console printing (use either UART or USB alone) 46 # Configures alternative UART port for console printing 57 # Use Tinycrypt lib for EC256 or ED25519 signing 59 # Use Mbed TLS lib for RSA image signing 82 # Options for enabling eFuse emulation in Flash
|
/mcuboot-latest/boot/cypress/ |
D | README.md | 1 ### Port of MCUBoot library for evaluation with Cypress PSoC 6 chips 5 …w for PSoC 6 devices. These applications are not recomended as a starting point for development an… 7 …a recommended reference point to start development of MCUboot based bootloaders for PSoC 6 devices. 20 The default flash map for MCUBootApp implemented is next: 23 * [0x10018000, 0x10028000] - primary slot for BlinkyApp; 24 * [0x10028000, 0x10038000] - secondary slot for BlinkyApp; 30 For more details about External Memory usage, please refer to separate guiding document `MCUBootApp… 57 Root directory for build is **boot/cypress.** 59 …r contains make files infrastructure for building both MCUboot Bootloader and sample BlinkyApp app… 63 Supported platforms for `MCUboot`, `BlinkyApp`: [all …]
|
/mcuboot-latest/boot/espressif/port/esp32c2/ |
D | bootloader.conf | 30 # GPIO input type (0 for Pull-down, 1 for Pull-up) 34 # Delay time for identify the GPIO signal 36 # UART port used for serial communication (not needed when using USB) 38 # GPIO for Serial RX signal 40 # GPIO for Serial TX signal 43 # Use UART0 for console printing (use either UART or USB alone) 46 # Configures alternative UART port for console printing 57 # Use Tinycrypt lib for EC256 or ED25519 signing 59 # Use Mbed TLS lib for RSA image signing 85 # Options for enabling eFuse emulation in Flash
|
/mcuboot-latest/boot/espressif/port/esp32/ |
D | bootloader.conf | 29 # GPIO input type (0 for Pull-down, 1 for Pull-up) 33 # Delay time for identify the GPIO signal 35 # UART port used for serial communication 37 # GPIO for Serial RX signal 39 # GPIO for Serial TX signal 44 # Configures alternative UART port for console printing 54 # (main host OS is not responsible for booting the second image) 74 # Use Tinycrypt lib for EC256 or ED25519 signing 76 # Use Mbed TLS lib for RSA image signing 99 # Options for enabling eFuse emulation in Flash
|
/mcuboot-latest/boot/mynewt/mcuboot_config/ |
D | syscfg.yml | 3 # distributed with this work for additional information 14 # KIND, either express or implied. See the License for the 23 description: 'Number of images for multi-image (0 and 1 mean single image).' 32 description: 'Key size for RSA keys (2048 or 3072).' 41 description: 'Support for encrypted images using RSA-2048-OAEP.' 44 description: 'Support for encrypted images using AES-128-Keywrap.' 47 description: 'Support for encrypted images using ECIES-P256.' 50 description: 'Support for encrypted images using ECIES-X25519.' 53 description: 'Use mbed TLS for crypto operations.' 56 description: 'Use tinycrypt for crypto operations.' [all …]
|
12345678910>>...20