/mcuboot-latest/sim/ |
D | Cargo.toml | 10 sig-rsa = ["mcuboot-sys/sig-rsa"] 11 sig-rsa3072 = ["mcuboot-sys/sig-rsa3072"] 12 sig-ecdsa = ["mcuboot-sys/sig-ecdsa"] 13 sig-ecdsa-mbedtls = ["mcuboot-sys/sig-ecdsa-mbedtls"] 14 sig-ecdsa-psa = ["mcuboot-sys/sig-ecdsa-psa", "mcuboot-sys/psa-crypto-api"] 15 sig-p384 = ["mcuboot-sys/sig-p384"] 16 sig-ed25519 = ["mcuboot-sys/sig-ed25519"] 17 overwrite-only = ["mcuboot-sys/overwrite-only"] 18 swap-move = ["mcuboot-sys/swap-move"] 19 validate-primary-slot = ["mcuboot-sys/validate-primary-slot"] [all …]
|
/mcuboot-latest/ |
D | README.md | 1 # [MCUboot](http://mcuboot.com/) 5 [![Build Status (Sim)](https://github.com/mcu-tools/mcuboot/workflows/Sim/badge.svg)][sim] 6 [![Build Status (Mynewt)](https://github.com/mcu-tools/mcuboot/workflows/Mynewt/badge.svg)][mynewt] 7 [![Build Status (Espressif)](https://github.com/mcu-tools/mcuboot/workflows/Espressif/badge.svg)][e… 8 [![Publishing Status (imgtool)](https://github.com/mcu-tools/mcuboot/workflows/imgtool/badge.svg)][… 9 [![Build Status (Travis CI)](https://img.shields.io/travis/mcu-tools/mcuboot/main.svg?label=travis-… 13 [coverity]: https://scan.coverity.com/projects/mcuboot 14 [sim]: https://github.com/mcu-tools/mcuboot/actions?query=workflow:Sim 15 [mynewt]: https://github.com/mcu-tools/mcuboot/actions?query=workflow:Mynewt 16 [espressif]: https://github.com/mcu-tools/mcuboot/actions?query=workflow:Espressif [all …]
|
/mcuboot-latest/docs/ |
D | readme-mbed.md | 1 # MCUboot port for Mbed OS 3 This is an MCUboot port for Mbed OS. 5 ## Using MCUboot 7 Note: The following is a general overview. It does not cover MCUboot or Mbed OS basics. 9 See https://github.com/AGlass0fMilk/mbed-mcuboot-demo as a detailed example. 13 To use MCUboot, you need to create an Mbed OS project with the following configurations: 14 * `"mcuboot.primary-slot-address"`: address of the primary slot in the internal flash 15 * `"mcuboot.slot-size"`: size of an image slot (only one image, two slots are currently supported) 16 * `"mcuboot.max-img-sectors"`: maximum number of sectors, should be at least the number of sectors … 19 …pping, etc. can be found in [mbed_lib.json](https://github.com/mcu-tools/mcuboot/tree/main/boot/mb… [all …]
|
D | index.md | 1 # MCUboot chapter 3 MCUboot is a secure bootloader for 32-bits microcontrollers. 7 MCUboot defines a common infrastructure for the bootloader and the system flash 11 MCUboot is not dependent on any specific operating system and hardware and 13 Currently MCUboot works with the following operating systems and SoCs: 25 MCUboot is an open governance project. See the [membership 26 list](https://github.com/mcu-tools/mcuboot/wiki/Members) for current 28 [project charter](https://github.com/mcu-tools/mcuboot/wiki/MCUboot-Project-Charter) 33 The MCUboot documentation is composed of the following pages: 49 - [Cypress/Infineon](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress/README.md) [all …]
|
D | readme-nuttx.md | 1 # MCUboot port for NuttX 5 The NuttX port of MCUboot secure boot library expects that the platform provides a Flash storage wi… 12 - `CONFIG_MCUBOOT_WATCHDOG`: If `CONFIG_WATCHDOG` is enabled, MCUboot shall reset the watchdog time… 14 The porting layer of MCUboot library consists of the following interfaces: 15 - `<flash_map_backend/flash_map_backend.h>`, for enabling MCUboot to manage the application firmwar… 16 - `<mcuboot_config/mcuboot_config.h>`, for configuration of MCUboot's features. 18 - `<os/os_malloc.h>`, for providing MCUboot access to the OS memory management interfaces. 21 …MCUboot is implemented at application-level and requires minimal knowledge about characteristics o… 23 ## Creating MCUboot-compatible application firmware images 25 …MCUboot is to integrate it to a firmware update agent, which is an important component of a secure… [all …]
|
D | readme-mynewt.md | 1 # Running mynewt apps with MCUboot 3 Due to small differences between Mynewt's bundled bootloader and MCUboot, 4 when building an app that will be run with MCUboot as the bootloader and 5 which at the same time requires to use `newtmgr` to manage images, MCUboot 12 - mcuboot 14 repository.mcuboot: 18 repo: mcuboot 25 - "@mcuboot/boot/bootutil" 31 To configure MCUboot check all the options available in 34 Also, MCUboot uses a different image header struct as well as slightly
|
D | readme-zephyr.md | 1 # Building and using MCUboot with Zephyr 3 MCUboot began its life as the bootloader for Mynewt. It has since 15 - `boot_partition`: for MCUboot itself 19 It is not recommended to use the swap-using-scratch algorithm of MCUboot, but 27 MCUboot as your stage 1 bootloader, `boot_partition` must be configured 41 Install additional packages required for development with MCUboot: 44 cd ~/mcuboot # or to your directory where MCUboot is cloned 57 To build MCUboot, create a build directory in boot/zephyr, and build 67 MCUboot itself. All the needed configuration is collected in 70 MCUboot on a per-SoC family basis. [all …]
|
D | PORTING.md | 4 `MCUboot` to a new target `OS`. 8 * `MCUboot` requires a configuration file, which can be included as 12 * `MCUboot` requires that the target provides a `flash` API with ability to 15 * `MCUboot` doesn't bundle a cryptographic library, which means the target 56 included by several files in the "library" portion of MCUboot; it 63 by MCUboot. For example, Mynewt uses MYNEWT_VAL() and Zephyr uses 73 for MCUboot and images of applications are stored, in system-agnostic way. 74 For that purpose the MCUboot uses ID, which is integer (uint8_t) number 78 The common code of MCUboot, that is non-system specific, does not directly 85 Changes to common MCUboot code should not affect system specific internals [all …]
|
D | release-notes.md | 1 # MCUboot release notes 55 - Zephyr: Added a MCUboot banner which displays the version of 56 MCUboot being used and the version of zephyr. This can be 63 change in the interface between mcuboot and the platform. All platforms 64 contained within the MCUboot tree have been updated, but any external platforms 125 The 1.10.0 release of MCUboot contains... 146 up the flash API used by MCUboot. 150 There are no security vulnerabilities reported on the MCUboot code for this 157 The 1.9.0 release of MCUboot contains various bug fixes, improves 165 number value. These targets were previously unsupported in MCUboot, [all …]
|
D | readme-riot.md | 1 # Building and using MCUboot with RIOT 3 MCUboot began its life as the bootloader for Mynewt. It has since 15 In the next version, it is planned to compile MCUboot using RIOT, 20 A compatible MCUboot image can be compiled by typing: `make mcuboot`. 28 `BOOTLOADER_OFFSET` offset rather than the beginning of ROM. MCUboot 46 The application can be flashed by typing: `make flash-mcuboot`.
|
D | SECURITY.md | 3 The MCUboot team takes security, vulnerabilities, and weaknesses 8 The preferred way to report security issues with MCUboot is via the "Report a 10 page](https://github.com/mcu-tools/mcuboot/security). 37 Please include the word "SECURITY" as well as "MCUboot" in the subject 48 - Issues will be entered into MCUboot's [security advisory 49 system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with
|
D | ecdsa.md | 3 When the ECDSA SECP256R1 (EC256) signature support was added to MCUboot, a 14 EC256 would work, while newer MCUboot code would reject old 26 work with older versions of MCUboot. 39 2. MCUboot will be modified to allow unpadded signatures right away. 49 After one or more MCUboot release cycles and announcements in the 61 always run out of the same tree as the MCUboot code, so there should 83 Originally, MCUboot added padding to the entire signature and just 86 signature ended in a zero, MCUboot would remove too many bytes and render the
|
D | serial_recovery.md | 28 MCUboot implements a Simple Management Protocol (SMP) server. 32 MCUboot supports the following subset of the MCUmgr commands: 38 It can also support system-specific MCUmgr commands depending on the given mcuboot-port 49 MCUboot supports progressive erasing of a slot to which an image is uploaded to if the ``MCUBOOT_ER… 54 How to enable and configure the serial recovery feature depends on the given mcuboot-port implement… 60 Refer to the given mcuboot-port details to get information on how to enter the serial recovery mode. 75 …de in the device and use an SMP client application for communication with the MCUboot's SMP server.
|
D | release.md | 3 This page describes the release process used with MCUboot. 7 MCUboot uses [semantic versioning][semver], where version numbers 18 In the documentation, we mark an MCUBoot development version using the 53 This version should match the current release number of MCUboot. The 62 On Mynewt, `newt` always fetches a versioned MCUboot release, so after 71 of MCUboot being used which needs to be updated at 122 Mark the MCUboot version as a development version.
|
/mcuboot-latest/boot/cypress/ |
D | README.md | 1 ### Port of MCUBoot library for evaluation with Cypress PSoC 6 chips 5 …MCUboot` repository with purpose to demonstrate basic consepts and features of MCUboot library on … 7 … Environment** are a recommended reference point to start development of MCUboot based bootloaders… 11 1. MCUboot-Based Basic Bootloader [mtb-example-psoc6-mcuboot-basic](https://github.com/cypresssemic… 12 …MCUboot-Based Bootloader with Rollback to Factory App in External Flash [mtb-example-anycloud-mcub… 17 * MCUBootApp - PSoC6 MCUboot-based bootloading application; 46 git clone --recursive https://github.com/mcu-tools/mcuboot.git 50 cd mcuboot 59 This folder contains make files infrastructure for building both MCUboot Bootloader and sample Blin… 63 Supported platforms for `MCUboot`, `BlinkyApp`:
|
/mcuboot-latest/boot/bootutil/ |
D | pkg.yml | 38 - "@mcuboot/boot/mynewt/mcuboot_config" 42 - "@mcuboot/boot/mynewt/flash_map_backend" 52 - "@mcuboot/ext/tinycrypt/lib" 53 - "@mcuboot/ext/mbedtls-asn1" 56 - "@mcuboot/ext/tinycrypt/lib" 57 - "@mcuboot/ext/tinycrypt-sha512/lib" 58 - "@mcuboot/ext/mbedtls-asn1" 59 - "@mcuboot/ext/fiat" 62 - "@mcuboot/ext/tinycrypt/lib" 63 - "@mcuboot/ext/tinycrypt-sha512/lib" [all …]
|
/mcuboot-latest/boot/zephyr/ |
D | sample.yaml | 2 description: mcuboot test build sample 3 name: mcuboot 6 sample.bootloader.mcuboot: 13 sample.bootloader.mcuboot.serial_recovery: 19 sample.bootloader.mcuboot.usb_cdc_acm_recovery: 25 sample.bootloader.mcuboot.usb_cdc_acm_recovery_log: 32 sample.bootloader.mcuboot.single_slot: 39 sample.bootloader.mcuboot.qspi_nor_slot: 46 sample.bootloader.mcuboot.hooks_multi: 54 sample.bootloader.mcuboot.ram_load:
|
D | Kconfig | 8 mainmenu "MCUboot configuration" 10 comment "MCUboot-specific configuration options" 12 # Hidden option to mark a project as MCUboot 13 config MCUBOOT config 66 menu "MCUBoot settings" 199 from the directory where the MCUBoot KConfig configuration file is 201 path that starts from the MCUBoot repository root directory. 204 MCUboot. 211 This option instructs MCUboot to perform a clean-up of a set of 223 default "mcuboot-mbedtls-cfg.h" [all …]
|
/mcuboot-latest/testplan/mynewt/ |
D | Makefile | 25 all: build-apps build-mcuboot 48 @echo "* Building mcuboot with RSA... \c" 53 @echo "* Building mcuboot with RSA/PSS... \c" 58 @echo "* Building mcuboot with EC... \c" 63 @echo "* Building mcuboot with EC256... \c" 69 @echo "* Building mcuboot with RSA + EC... \c" 74 @echo "* Building mcuboot with primary slot validation... \c" 79 @echo "* Building mcuboot with overwrite only upgrade... \c" 85 build-mcuboot: build-boot-rsa build-boot-rsa-pss build-boot-ec \
|
D | project.yml | 20 project.name: "mcuboot-test" 24 - mcuboot 32 repository.mcuboot: 36 repo: mcuboot
|
/mcuboot-latest/boot/zephyr/sysbuild/ |
D | CMakeLists.txt | 9 if(NOT "${PRE_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT) 16 ${CMAKE_BINARY_DIR}/mcuboot/CMakeCache.txt 17 ${CMAKE_BINARY_DIR}/mcuboot/zephyr/.config 24 if(NOT "${POST_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT) 33 sysbuild_get(mcuboot_image_footer_size IMAGE mcuboot CACHE) 34 sysbuild_get(mcuboot_image_upgrade_footer_size IMAGE mcuboot CACHE)
|
/mcuboot-latest/boot/mynewt/ |
D | pkg.yml | 22 pkg.description: "Mynewt port of mcuboot" 32 - "@mcuboot/boot/mynewt/mcuboot_config" 33 - "@mcuboot/boot/bootutil" 34 - "@mcuboot/boot/mynewt/flash_map_backend" 50 - "@mcuboot/boot/boot_serial" 51 - "@mcuboot/boot/mynewt/boot_uart"
|
/mcuboot-latest/.github/workflows/ |
D | zephyr_build.yaml | 17 # When triggered manually, ask for Zephyr and MCUBoot versions to check out 25 description: 'Which MCUBoot version to checkout?' 75 - name: Checkout MCUBoot 78 repository: 'mcu-tools/mcuboot' 80 path: 'repos/bootloader/mcuboot' 86 -T ../bootloader/mcuboot/boot/zephyr 93 echo "Using Mcuboot version: ${{ env.MCUBOOT_VERSION }}"
|
/mcuboot-latest/scripts/ |
D | setup.py | 10 author="The MCUboot committers", 11 author_email="mcuboot@groups.io", 12 description=("MCUboot's image signing and key management"), 14 url="http://github.com/mcu-tools/mcuboot",
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 1 ### Blinking LED test application for MCUboot bootloader 5 Implements simple Blinky LED CM4 application to demonstrate MCUboot Application operation in terms … 7 It is started by MCUboot Application which is running on CM0p. 23 Since this application is created to demonstrate MCUboot library features and not as reference exam… 114 …p`. In case of build for `PSOC_062_2M` platform it calls `imgtool` from `MCUboot` scripts and adds… 138 …file, 0x%VALUE% - offset for output hex file. Value 0x10000 is slot size MCUboot Bootloader in thi… 139 …(default) - build image for BOOT slot of MCUboot Bootloader, `UPGRADE` - build image for UPGRADE s… 142 **NOTE**: In case of `UPGRADE` image `HEADER_OFFSET` should be set to MCUboot Bootloader slot size.
|