Home
last modified time | relevance | path

Searched +full:non +full:- +full:serial (Results 1 – 7 of 7) sorted by relevance

/mcuboot-latest/boot/boot_serial/
Dsyscfg.yml9 # http://www.apache.org/licenses/LICENSE-2.0
22 Start the serial boot loader if this pin is asserted at boot time.
23 value: '-1'
25 - '(BOOT_SERIAL_DETECT_PIN != -1) ||
27 (BOOT_SERIAL_NVREG_INDEX != -1)'
31 GPIO configuration for the serial boot loader detect pin.
36 The value the detect pin must be set to for the serial boot loader
44 string is detected during this period, the serial boot loader is
46 received, the boot loader runs in the normal (non-serial) mode.
51 - '(BOOT_SERIAL_DETECT_PIN != -1) ||
[all …]
/mcuboot-latest/boot/mynewt/mcuboot_config/
Dsyscfg.yml9 # http://www.apache.org/licenses/LICENSE-2.0
23 description: 'Number of images for multi-image (0 and 1 mean single image).'
35 description: 'Images are signed using ECDSA NIST P-256.'
41 description: 'Support for encrypted images using RSA-2048-OAEP.'
44 description: 'Support for encrypted images using AES-128-Keywrap.'
47 description: 'Support for encrypted images using ECIES-P256.'
50 description: 'Support for encrypted images using ECIES-X25519.'
65 description: 'Non-swapping upgrades, copy from slot 1 to slot 0 only.'
82 - none downgrades are allowed
83 - version:
[all …]
/mcuboot-latest/boot/bootutil/include/bootutil/
Dboot_hooks.h2 * SPDX-License-Identifier: Apache-2.0
16 * http://www.apache.org/licenses/LICENSE-2.0
68 * otherwise an error-code value.
98 * otherwise an error-code value.
115 * non-zero: an error, mcuboot will return from
125 * copied to the primary slot. This hook is called in serial recovery upload
134 * non-zero: an error, will be transferred as part of comand response
154 * otherwise an error-code value. Error-code is ignored, but it is up to
/mcuboot-latest/boot/boot_serial/src/
Dboot_serial.c10 * http://www.apache.org/licenses/LICENSE-2.0
114 #define BOOT_SERIAL_FRAME_MTU 124 /* 127 - pkt start (2 bytes) and stop (1 byte) */
121 /* base64 lib encodes data to null-terminated string */
122 #define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
130 #define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
172 * serial implementation.
174 * @param[in] hdr -- the decoded header of mcumgr message;
175 * @param[in] buffer -- buffer with first mcumgr message;
176 * @param[in] len -- length of of data in buffer;
177 * @param[out] *cs -- object with encoded response.
[all …]
/mcuboot-latest/boot/zephyr/
DKconfig1 # Copyright (c) 2017-2020 Linaro Limited
5 # SPDX-License-Identifier: Apache-2.0
10 comment "MCUboot-specific configuration options"
145 bool "Elliptic curve digital signatures with curve P-256"
191 default "root-ec-p256.pem" if BOOT_SIGNATURE_TYPE_ECDSA_P256
192 default "root-ed25519.pem" if BOOT_SIGNATURE_TYPE_ED25519
193 default "root-rsa-3072.pem" if BOOT_SIGNATURE_TYPE_RSA && BOOT_SIGNATURE_TYPE_RSA_LEN=3072
194 default "root-rsa-2048.pem" if BOOT_SIGNATURE_TYPE_RSA && BOOT_SIGNATURE_TYPE_RSA_LEN=2048
207 bool "Perform core cleanup before chain-load the application"
211 This option instructs MCUboot to perform a clean-up of a set of
[all …]
/mcuboot-latest/docs/
Ddesign.md1 <!--
2 - SPDX-License-Identifier: Apache-2.0
4 - Copyright (c) 2017-2020 Linaro LTD
5 - Copyright (c) 2017-2019 JUUL Labs
6 - Copyright (c) 2019-2024 Arm Limited
8 - Original license:
10 - Licensed to the Apache Software Foundation (ASF) under one
11 - or more contributor license agreements. See the NOTICE file
12 - distributed with this work for additional information
13 - regarding copyright ownership. The ASF licenses this file
[all …]
/mcuboot-latest/boot/bootutil/src/
Dloader.c2 * SPDX-License-Identifier: Apache-2.0
4 * Copyright (c) 2016-2020 Linaro LTD
5 * Copyright (c) 2016-2019 JUUL Labs
6 * Copyright (c) 2019-2023 Arm Limited
19 * http://www.apache.org/licenses/LICENSE-2.0
207 if (!state->img_mask[BOOT_CURR_IMG(state)]) { in fill_rsp()
218 active_slot = state->slot_usage[BOOT_CURR_IMG(state)].active_slot; in fill_rsp()
223 rsp->br_flash_dev_id = flash_area_get_device_id(BOOT_IMG_AREA(state, active_slot)); in fill_rsp()
224 rsp->br_image_off = boot_img_slot_off(state, active_slot); in fill_rsp()
225 rsp->br_hdr = boot_img_hdr(state, active_slot); in fill_rsp()
[all …]