/mcuboot-3.6.0/boot/cypress/BlinkyApp/ |
D | Readme.md | 5 … CM4 application to demonstrate MCUboot Application operation in terms of BOOT and UPGRADE process. 11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE. 13 * Can be built for BOOT slot or UPGRADE slot of bootloader. 54 To build UPGRADE image use following command: 56 make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=UPGRADE HEADER_OFFSET=0x10000 84 **How to build upgrade image for external memory:** 88 For build BlinkyApp upgrade image for external memory use command: 90 …make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=UPGRADE HEADER_OFFSET=0x7FE8000 ERASED_V… 96 In case of using muti-image configuration, upgrade image for second application can be built using … 98 …make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=UPGRADE HEADER_OFFSET=0x8028000 ERASED_V… [all …]
|
D | BlinkyApp.mk | 39 # image type can be BOOT or UPGRADE 40 IMG_TYPES = BOOT UPGRADE 112 # Set build directory for BOOT and UPGRADE images 113 ifeq ($(IMG_TYPE), UPGRADE) 119 OUT_CFG := $(OUT_CFG)/upgrade
|
/mcuboot-3.6.0/samples/zephyr/ |
D | Makefile | 21 # deploy and upgrade images. The image building should work on any 34 # signed-hello2.bin: An upgrade image, signed and marked for 35 # upgrade. 47 # reset should upgrade and run the new image. Resetting again should 147 # this image is intended to be an upgrade. It should be flashed into 189 # Test a good image, with a good upgrade, using RSA signatures. 199 # Test a good image, with a good upgrade, using ECDSA signatures. 211 # upgrade correctly, but not revert once the upgrade has been done. 218 BOOTLOADER_OVERLAY_CONFIG=$(PWD)/overlay-upgrade-only.conf \ 221 # Test that when configured for RSA, a wrong signature in the upgrade [all …]
|
D | overlay-upgrade-only.conf | 1 # Kconfig overlay for building in upgrade-only mode.
|
/mcuboot-3.6.0/boot/cypress/MCUBootApp/ |
D | ExternalMemory.md | 5 Given document describes the use of external memory module as a secondary (upgrade) slot with Cypre… 22 * The slot size for upgrade slot is even (or smaller) to erase size (0x40000) of given memory modul… 59 After that MCUBootApp is ready to accept upgrade image from external memory module. 61 Once valid upgrade image was accepted the image in external memory will be erased. 72 **How to build upgrade image for external memory:** 74 …make app APP_NAME=BlinkyApp PLATFORM=PSOC_062_2M IMG_TYPE=UPGRADE HEADER_OFFSET=0x7FE8000 ERASED_V… 97 2. Once DAP Link removable disk appeared drop (copy) the upgrade image HEX file to it.
|
D | README.md | 9 * BlinkyApp - simple PSoC6 blinking LED application which is a target of BOOT/UPGRADE; 105 `0x10028000 - 0x10038000` - Secondary_1 (UPGRADE) slot of Bootloader 109 `0x10048000 - 0x10058000` - Secondary_2 (UPGRADE) slot of Bootloader 115 __Note:__ It is also possible to place secondary (upgrade) slots in external memory module so resul… 152 …EXTERNAL_FLASH=1` flag to `make` command in examples above. In this case UPGRADE image will be loc… 158 To protect user image from unwanted read - Upgrade Image Encryption can be applied. The ECDH/HKDF w… 162 …c`). The public part will be used by imgtool when signing and encrypting upgrade image. Signing im… 164 … with these settings unencrypted and encrypted images will be accepted in secondary (upgrade) slot.
|
/mcuboot-3.6.0/boot/mynewt/mcuboot_config/ |
D | syscfg.yml | 68 description: 'Use faster copy only upgrade.' 82 When this option is set, any upgrade must have greater major version 88 version. When this option is set, any upgrade must have greater or 108 set, any upgrade must have greater or equal security counter value. 135 description: 'Enable watchdog feeding while performing a swap upgrade'
|
/mcuboot-3.6.0/docs/ |
D | encrypted_images.md | 113 ## [Upgrade process](#upgrade-process) 115 When starting a new upgrade process, `MCUboot` checks that the image in the 120 image being determined, the upgrade consists in reading the blocks from 123 If swap is used for the upgrade process, the encryption happens when 127 flash of the MCU to avoid attacks that could interrupt the upgrade and 144 the status area just before starting the upgrade process, because it
|
D | testplan-zephyr.md | 37 intended behavior for each of these steps. Sometimes an upgrade will 66 This step doesn't make sense on the tests where the upgrade doesn't
|
D | readme-zephyr.md | 103 In order to upgrade to an image (or even boot it, if 124 These images can also be marked for upgrade, and loaded into the secondary slot, 125 at which point the bootloader should perform an upgrade. It is up to 202 times per image upgrade/revert). To configure MCUboot to work in 210 because the slot is marked for upgrade.
|
D | release-notes.md | 89 - Upgrade fault-injection hardening, improving cases injections are detected. 174 Equal slots (direct-xip) upgrade mode, RAM loading upgrade mode, 186 - Added RAM-load upgrade mode. 268 upgrade instead of the plain AES key. 484 - Two firmware upgrade algorithms are provided: 486 - A swapping upgrade which enables image test, allowing for rollback to a
|
D | Gemfile | 13 # uncomment the line below. To upgrade, run `bundle update github-pages`.
|
/mcuboot-3.6.0/samples/mcuboot_config/ |
D | mcuboot_config.template.h | 38 * Upgrade mode 46 * the default upgrade mode. 81 * even if no upgrade was performed. This is recommended if the boot 141 * doing a swap upgrade and the time it takes for a swapping is long enough
|
/mcuboot-3.6.0/boot/espressif/hal/include/mcuboot_config/ |
D | mcuboot_config.h | 37 * Upgrade mode 45 * the default upgrade mode. 82 * even if no upgrade was performed. This is recommended if the boot 179 * doing a swap upgrade and the time it takes for a swapping is long enough
|
/mcuboot-3.6.0/sim/src/ |
D | image.rs | 188 // And an upgrade image. in new() 225 /// Construct an `Images` that doesn't expect an upgrade to happen. 291 panic!("Unable to perform basic upgrade"); in make_image() 564 /// A simple upgrade without forced failures. 568 /// count the operations in a basic upgrade. 646 /// Test a simple upgrade, with dependencies given, and verify that the 765 error!("Error testing perm upgrade with {} fails", total_fails); in run_perm_with_random_fails() 801 // First do a normal upgrade... in run_norevert() 851 error!("Error running upgrade without revert"); in run_norevert() 857 // Test taht too big upgrade image will be rejected [all …]
|
D | depends.rs | 66 /// What is the expected outcome of the upgrade. 88 /// Don't provide an upgrade image at all for this image 92 /// Describes what our expectation is for an upgrade.
|
/mcuboot-3.6.0/boot/bootutil/src/ |
D | swap_priv.h | 35 * swap upgrade. 62 * the given boot_status with the calculated index where a swap upgrade was 80 * image installed on the primary slot and the new image to be upgrade to has a
|
D | swap_move.c | 276 BOOT_LOG_WRN("Cannot upgrade: not a compatible amount of sectors"); in boot_slots_compatible() 282 BOOT_LOG_WRN("Cannot upgrade: more sectors than allowed"); in boot_slots_compatible() 296 BOOT_LOG_WRN("Cannot upgrade: not same sector layout"); in boot_slots_compatible() 303 BOOT_LOG_WRN("Cannot upgrade: not same sector layout"); in boot_slots_compatible() 457 * upgrade (by initializing the secondary slot). 518 * When starting a new swap upgrade, check that there is enough space. in swap_run() 534 BOOT_LOG_WRN("Not enough free space to run swap upgrade"); in swap_run()
|
D | swap_scratch.c | 187 BOOT_LOG_WRN("Cannot upgrade: more sectors than allowed"); in boot_slots_compatible() 217 BOOT_LOG_WRN("Cannot upgrade: slots have non-compatible sectors"); in boot_slots_compatible() 228 BOOT_LOG_WRN("Cannot upgrade: slots have non-compatible sectors"); in boot_slots_compatible() 242 BOOT_LOG_WRN("Cannot upgrade: not all sectors fit inside scratch"); in boot_slots_compatible() 253 BOOT_LOG_WRN("Cannot upgrade: slots are not compatible"); in boot_slots_compatible() 787 BOOT_LOG_WRN("Cannot upgrade: slots have non-compatible sectors"); in app_max_size() 798 BOOT_LOG_WRN("Cannot upgrade: slots have non-compatible sectors"); in app_max_size() 812 BOOT_LOG_WRN("Cannot upgrade: not all sectors fit inside scratch"); in app_max_size()
|
/mcuboot-3.6.0/boot/zephyr/ |
D | Kconfig | 189 bool "Validate image in the primary slot just once after after upgrade" 194 primary slot only once after an upgrade of the main slot. 213 prompt "Image upgrade modes" 226 If y, overwrite the primary slot with the upgrade image instead 233 If y, the swap upgrade is done in two steps, where first every 238 This allows a swap upgrade without using a scratch partition, 635 When this option is set, any upgrade must have greater major version 646 version. When this option is set, any upgrade must have greater or 655 set, any upgrade must have greater or equal security counter value.
|
/mcuboot-3.6.0/samples/zephyr/mcutests/ |
D | mcutests.go | 112 ShortName: "bad-rsa-upgrade", 116 {"make", "test-bad-rsa-upgrade"}, 145 ShortName: "bad-ecdsa-upgrade", 149 {"make", "test-bad-ecdsa-upgrade"},
|
/mcuboot-3.6.0/boot/nuttx/include/mcuboot_config/ |
D | mcuboot_config.h | 50 /* Upgrade mode 58 * the default upgrade mode. 121 * booting, even if no upgrade was performed. This is recommended if the boot 184 * doing a swap upgrade and the time it takes for a swapping is long enough
|
/mcuboot-3.6.0/boot/cypress/MCUBootApp/config/mcuboot_config/ |
D | mcuboot_config.h | 41 * Upgrade mode 72 * even if no upgrade was performed. This is recommended if the boot 152 /* Uncomment these if support of encrypted upgrade image is needed */
|
/mcuboot-3.6.0/boot/cypress/ |
D | README.md | 18 * BlinkyApp - simple PSoC6 blinking LED application which is a target of BOOT/UPGRADE; 29 It is also possible to place secondary (upgrade) slots in external memory module. In this case prim…
|
/mcuboot-3.6.0/sim/tests/ |
D | core.rs | 100 // A sanity test, no dependencies should upgrade. 107 // If all of the dependencies are met, we should also upgrade. 123 // here, it could also be correct to upgrade only the second image).
|