Home
last modified time | relevance | path

Searched full:image (Results 1 – 25 of 161) sorted by relevance

1234567

/mcuboot-latest/docs/
Dtestplan-mynewt.md8 with wrong key images are not swapped to, and image signed with correct key
20 Build and load good image in slot 0:
22 * `newt create-image k64f_blinky 1.0.1 key_<sign-algo>.pem`
28 *If testing RSA/PSS `newt create-image` needs to be passed in the extra*
31 `newt create-image k64f_blinky 1.0.1 key_rsa.pem --rsa-pss`
35 Build and load image in slot 1 with no signing, signed with
37 test image and check that swap only happens for image signed with
40 * `newt create-image k64f_blinky2 1.0.2 <one-of-the-sign-keys-or-none>`
41 * `newtmgr image upload k64f_blinky2`
42 * `newtmgr image list`
[all …]
Ddesign.md39 the main image. This last step is instead implemented by the boot application.
51 ## [Image format](#image-format)
53 The following definitions describe the image format.
67 /** Image header. All fields are in little endian byte order. */
71 uint16_t ih_hdr_size; /* Size of image header (bytes). */
82 /** Image TLV header. All fields in little endian. */
88 /** Image trailer TLV format. All fields in little endian. */
96 * Image header flags.
101 #define IMAGE_F_NON_BOOTABLE 0x00000010 /* Split image app. */
105 * Image trailer TLV types.
[all …]
Dimgtool.md1 # Image tool
51 Image signing takes an image in binary or Intel Hex format intended for the
56 Create a signed or unsigned image
68 it from the image version.
74 beginning of the image
75 -S, --slot-size INTEGER Size of the slot where the image will be
77 --pad Pad image to --slot-size bytes, adding
79 --confirm When padding the image, mark it as confirmed
88 -E, --encrypt filename Encrypt image using the provided public key
92 -L, --load-addr INTEGER Load address for image when it should run
[all …]
Dreadme-nuttx.md6 - `CONFIG_MCUBOOT_PRIMARY_SLOT_PATH`: MTD partition for the application firmware image PRIMARY slot;
7 - `CONFIG_MCUBOOT_SECONDARY_SLOT_PATH`: MTD partition for the application firmware image SECONDARY …
15 …_map_backend.h>`, for enabling MCUboot to manage the application firmware image slots in the devic…
25image and, once this application firmware image is assured to be valid, the application may confir…
27image from a webserver, installing it and triggering the firmware update process for the next boot…
31image, it delegates the loading and execution of the application firmware image to a platform-spec…
39 …map_backend/flash_map_backend.h>` expects that the MTD driver for a given image partition handles …
Dreadme-zephyr.md16 - `slot0_partition`: the primary slot of Image 0
17 - `slot1_partition`: the secondary slot of Image 0
26 Currently, the two image slots must be contiguous. If you are running
31 `slot3_partition` for Image 1).
78 programming the bootloader image itself.
96 provides additional details regarding the changes it makes to the image
103 In order to upgrade to an image (or even boot it, if
126 the image to mark the primary slot as "image ok" before the next reboot,
185 label = "image-0";
189 label = "image-1";
[all …]
Drelease-notes.md12 - Added support for using builtin keys for image validation
36 recovery and encryption whereby an encrypted image is loaded
38 - Zephyr: Add estimated image footer size to cache in sysbuild.
40 allows for a single application slot and firmware loader image in
41 the secondary slot which is used to update the primary image
78 - Fixed issue with serial recovery not showing image details for
81 iterating over 2 image slots.
91 - Serial recovery image state and image set state optional commands added
92 - imgtool: add 'dumpinfo' command for signed image parsing.
112 - Reworked image encryption support for Zephyr, static dummy key files
[all …]
Dencrypted_images.md26 To provide confidentiality of image data while in transport to the
30 The image header needs to flag this image as `ENCRYPTED` (0x04) and
31 a TLV with the key must be present in the image. When upgrading the
32 image from the `secondary slot` to the `primary slot` it is automatically
33 decrypted (after validation). If swap upgrades are enabled, the image
39 The encrypted image support is supposed to allow for confidentiality
40 if the image is not residing on the device or is written to external
54 When encrypting an image, only the payload (FW) is encrypted. The header,
60 image block before sending the data to the hash routines.
62 The image is encrypted using AES-CTR-128 or AES-CTR-256, with a counter
[all …]
Dserial_recovery.md35 * image list (IMG group)
36 * image upload (IMG group)
43 ## Image uploading
45 Uploading an image is targeted to the primary slot by default.
47 An image can be loaded to other slots only when the ``MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD`` option i…
49 MCUboot supports progressive erasing of a slot to which an image is uploaded to if the ``MCUBOOT_ER…
89 ### Image management
91 The connection configuration must be established to perform the following image-related commands:
93 * Upload the image:
95 mcumgr image upload <path-to-signed-image-bin-file> -c serial_1
[all …]
/mcuboot-latest/boot/bootutil/include/bootutil/
Dbootutil_public.h46 #include <bootutil/image.h>
78 /** Swap failed because image to be run is not valid */
126 * Extract the swap type and image number from image trailers's swap_info
132 /* Construct the swap_info field from swap type and image number */
133 #define BOOT_SET_SWAP_INFO(swap_info, image, type) { \ argument
134 assert((image) < 0xF); \
136 (swap_info) = (image) << 4 \
153 uint8_t image_num; /* Boot status belongs to this image */
157 * @brief Determines the action, if any, that mcuboot will take on a image pair.
159 * @param image_index Image pair index.
[all …]
Dboot_hooks.h57 /** Hook for provide image header data.
59 * This Hook may be used to overide image header read implementation or doing
62 * @param img_index the index of the image pair
64 * @param img_head image header structure to be populated
73 /** Hook for Validate image hash/signature
75 * This Hook may be used to overide image validation procedure or doing
78 * @param img_index the index of the image pair
81 * @retval FIH_SUCCESS: image is valid, skip direct validation
82 * FIH_FAILURE: image is invalid, skip direct validation
87 /** Hook for implement image update
[all …]
Dimage.h55 * Image header flags.
60 #define IMAGE_F_NON_BOOTABLE 0x00000010 /* Split image app. */
62 * Indicates that this image should be loaded into RAM instead of run
70 * image has been built for.
75 * Flags that indicate if the image data is compressed
87 * Image trailer TLV types.
89 * Signature is generated by computing signature over the image hash.
97 #define IMAGE_TLV_SHA256 0x10 /* SHA256 of image hdr and body */
98 #define IMAGE_TLV_SHA384 0x11 /* SHA384 of image hdr and body */
99 #define IMAGE_TLV_SHA512 0x12 /* SHA512 of image hdr and body */
[all …]
/mcuboot-latest/boot/zephyr/
DKconfig72 Single image area is used for application which means that
92 prompt "Selected image hash algorithm"
97 Hash algorithm used for image verification. Selection
226 bool "Use HW key for image verification"
229 Use HW key for image verification, otherwise the public key is embedded
230 in MCUBoot. If enabled the public key is appended to the signed image
235 bool "Validate image in the primary slot on every boot"
241 able to modify the flash image itself.
244 bool "Validate image in the primary slot just once after after upgrade"
268 prompt "Image upgrade modes"
[all …]
DKconfig.serial_recovery51 bool "Allow to select image number for DFU"
55 respect the "image" field in mcumgr image update frame
57 The mapping of image number to partition is as follows:
59 1 -> image-0 (primary slot of the first image);
60 2 -> image-1 (secondary slot of the first image);
61 3 -> image-2;
62 4 -> image-3.
106 instead of erasing the whole image slot at once. This is necessary
193 bool "Image list hash support"
196 If y, image list responses will include the image hash (adds ~100
[all …]
/mcuboot-latest/boot/cypress/BlinkyApp/
DReadme.md11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE.
54 To build UPGRADE image use following command:
60 Example command-line for single-image:
64 **Building Multi-Image**
66 `BlinkyApp` can be built to use in multi-image bootloader configuration.
68 To get appropriate artifacts to use with multi image MCUBootApp, makefile flag `HEADER_OFFSET=` can…
74 * first image BOOT (PRIMARY) slot start `0x10018000`
76 * second image BOOT (PRIMARY) slot start `0x10038000`
78 To get appropriate artifact for second image PRIMARY slot run this command:
84 **How to build upgrade image for external memory:**
[all …]
/mcuboot-latest/scripts/imgtool/
Ddumpinfo.py18 Parse and print header, TLV area and trailer information of a signed image.
27 from imgtool import image
31 TLV_TYPES = dict((value, key) for key, value in image.TLV_VALUES.items())
56 return "Image not encrypted"
122 """Parse a signed image binary and print/save the available information."""
136 raise click.UsageError("Image file not found ({})".format(imgfile))
138 # Parsing the image header
140 # Image version consists of the last 4 item ('BBHI')
160 b[tlv_off:(tlv_off + image.TLV_INFO_SIZE)])
164 tlv_off += image.TLV_INFO_SIZE
[all …]
Dmain.py30 from imgtool import image, imgtool_version
226 @click.command(help="Check that signed image can be verified by given key")
229 ret, version, digest = image.Image.verify(imgfile, key)
230 if ret == image.VerifyResult.OK:
231 print("Image was correctly validated")
232 print("Image version: {}.{}.{}+{}".format(*version))
233 print("Image digest: {}".format(digest.hex()))
235 elif ret == image.VerifyResult.INVALID_MAGIC:
236 print("Invalid image magic; is this an MCUboot image?")
237 elif ret == image.VerifyResult.INVALID_TLV_INFO_MAGIC:
[all …]
/mcuboot-latest/boot/bootutil/src/
Dloader.c41 #include "bootutil/image.h"
148 * Saves boot status and shared data for current image.
151 * @param active_slot Index of the slot will be loaded for current image.
167 BOOT_LOG_ERR("Failed to add image data to shared area"); in boot_add_shared_data()
204 /* Always boot from the first enabled image. */ in fill_rsp()
211 /* At least one image must be active, otherwise skip the execution */ in fill_rsp()
258 * Compare image version numbers
263 * @param ver1 Pointer to the first image version to compare.
264 * @param ver2 Pointer to the second image version to compare.
267 * @retval 0 If the image version numbers are equal.
[all …]
Dboot_record.c32 #include "bootutil/image.h"
139 /* Manifest data is concatenated to the end of the image. in boot_save_boot_status()
149 * and image hash TLVs. in boot_save_boot_status()
172 /* Get the image's hash value from the manifest section. */ in boot_save_boot_status()
185 * image hash) so at this point it is okay to break the loop in boot_save_boot_status()
203 /* Update the measurement value (hash of the image) data item in the in boot_save_boot_status()
206 * The image hash is computed over the image header, the image itself and in boot_save_boot_status()
207 * the protected TLV area (which should already include the image hash as in boot_save_boot_status()
209 * filled with zeros during the image signing process. in boot_save_boot_status()
236 uint8_t image = 0; in boot_save_shared_data() local
[all …]
/mcuboot-latest/sim/src/
Ddepends.rs5 //! Support and tests related to the dependency management for multi-image
8 use crate::image::ImageVersion;
11 /// Generate a version for this particular image. The slot indicates
15 /// Return dependencies for this image/slot combination.
18 /// Return the image ID of the other version.
22 /// A boring image is used when we aren't testing dependencies. There will
23 /// be meaningful version numbers. The size field is the image number we
59 /// possibilities for the dependency information for each image, and what
63 /// What kinds of dependency should be installed in the image.
80 /// Provide dependency information that matches the other image.
[all …]
/mcuboot-latest/sim/tests/
Dcore.rs44 let image = r.$maker($($margs),*); localVariable
45 dump_image(&image, stringify!($name));
46 assert!(!image.$test($($targs),*));
92 let image = r.clone().make_image(&dep, true); localVariable
93 dump_image(&image, "dependency_combos");
94 assert!(!image.run_check_deps(&dep));
121 // If the first image is not met, we should hold back on the
123 // here, it could also be correct to upgrade only the second image).
137 // Test where only the first image is upgraded, and there are no
145 // Test one image with a valid dependency on the first image.
[all …]
/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml44 # Encrypt image in the secondary slot using RSA-OAEP-2048
47 # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048
50 # Encrypt image in the secondary slot using AES-KW-128
53 # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256
56 # Encrypt image in the secondary slot using ECIES-P256
59 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256
62 # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS
65 # Encrypt image in the secondary slot using ECIES-X25519
68 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519
78 # image is copied to RAM before loading it.
[all …]
/mcuboot-latest/boot/cypress/MCUBootApp/
DREADME.md17 Single-image mode.
29 MCUBootApp checks image integrity with SHA256, image authenticity with EC256 digital signature veri…
81 **Multi-Image Operation**
83 Multi-image operation considers upgrading and verification of more then one image on the device.
85 …enable multi-image operation define `MCUBOOT_IMAGE_NUMBER` in `MCUBootApp/config/mcuboot_config.h`…
87 Default value of `MCUBOOT_IMAGE_NUMBER` is 1, which corresponds to single image configuratios.
89 In multi-image operation (two images are considered for simplicity) MCUboot Bootloader application …
94 * Boots image from Primary_1 slot only;
99 **Default Flash map for Multi-Image operation:**
115 …to place secondary (upgrade) slots in external memory module so resulting image size can be double…
[all …]
/mcuboot-latest/scripts/
Dassemble.py20 Assemble multiple images into a single image that can be flashed on the device.
70 # We care about the mcuboot, image-0, and image-1 partitions.
74 if 'image-0' not in offsets:
75 raise Exception("Board partition table does not have image-0 partition")
77 if 'image-1' not in offsets:
78 raise Exception("Board partition table does not have image-1 partition")
95 raise Exception("Image {} is too large for partition".format(source))
112 help='Signed image file for primary image')
114 help='Signed image file for secondary image')
116 help='Filename to write full image to')
[all …]
/mcuboot-latest/boot/zephyr/sysbuild/
DCMakeLists.txt7 cmake_parse_arguments(PRE_IMAGE_CMAKE "" "IMAGE" "IMAGES" ${ARGN})
22 cmake_parse_arguments(POST_IMAGE_CMAKE "" "IMAGE" "IMAGES" ${ARGN})
28 foreach(image ${IMAGES})
30 get_property(app_type TARGET ${image} PROPERTY APP_TYPE)
33 sysbuild_get(mcuboot_image_footer_size IMAGE mcuboot CACHE)
34 sysbuild_get(mcuboot_image_upgrade_footer_size IMAGE mcuboot CACHE)
38 …set_property(TARGET ${image} APPEND_STRING PROPERTY CONFIG "CONFIG_ROM_END_OFFSET=${mcuboot_image_…
39 …set_property(TARGET ${image} APPEND_STRING PROPERTY CONFIG "CONFIG_MCUBOOT_UPDATE_FOOTER_SIZE=${mc…
/mcuboot-latest/boot/espressif/port/esp32/
Dbootloader.conf15 # When enabled, prevents updating image to an older version
18 # counter (defined using imgtool) instead of only image version
24 # Use sector erasing instead of entire image size erasing
49 # Enables multi image, if it is not defined, it is assumed
50 # only one updatable image
53 # Enables multi image boot on independent processors
54 # (main host OS is not responsible for booting the second image)
58 # Example of values to be used when multi image is enabled
76 # Use Mbed TLS lib for RSA image signing

1234567