Searched refs:boot (Results 1 – 25 of 34) sorted by relevance
12
/mcuboot-latest/ |
D | .gitmodules | 4 [submodule "boot/cypress/libs/mtb-pdl-cat1"] 5 path = boot/cypress/libs/mtb-pdl-cat1 7 [submodule "boot/cypress/libs/pdl/psoc6pdl"] 8 path = boot/cypress/libs/pdl/psoc6pdl 10 [submodule "boot/cypress/libs/retarget-io"] 11 path = boot/cypress/libs/retarget-io 13 [submodule "boot/cypress/libs/core-lib"] 14 path = boot/cypress/libs/core-lib 16 [submodule "boot/cypress/libs/psoc6hal"] 17 path = boot/cypress/libs/psoc6hal [all …]
|
D | .mbedignore | 1 boot/boot_serial/* 2 boot/mynewt/* 3 boot/zephyr/* 4 boot/cypress/* 5 boot/espressif/* 6 boot/nuttx/*
|
D | README.md | 39 RIOT is supported only as a boot target. We will accept any new 52 - [Cypress/Infineon](boot/cypress/README.md) 66 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b… 67 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo… 68 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade… 69 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 70 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … 71 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to… 72 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl… 73 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
|
/mcuboot-latest/testplan/mynewt/ |
D | Makefile | 47 build-boot-rsa: 52 build-boot-rsa-pss: 57 build-boot-ec: 62 build-boot-ec256: 68 build-boot-rsa-ec: 73 build-boot-rsa-validate0: 78 build-boot-rsa-noswap: 85 build-mcuboot: build-boot-rsa build-boot-rsa-pss build-boot-ec \ 86 build-boot-ec256 build-boot-rsa-validate0 build-boot-rsa-noswap
|
/mcuboot-latest/docs/ |
D | index.md | 22 RIOT is supported only as a boot target. We will accept any new port 49 - [Cypress/Infineon](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress/README.md) 72 - [boot/bootutil](https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the b… 73 - [boot/boot\_serial](https://github.com/mcu-tools/mcuboot/tree/main/boot/boot_serial) - Support fo… 74 - [boot/zephyr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloade… 75 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 76 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … 77 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to… 78 - [boot/espressif](https://github.com/mcu-tools/mcuboot/tree/main/boot/espressif) - Bootloader appl… 79 - [boot/cypress](https://github.com/mcu-tools/mcuboot/tree/main/boot/cypress) - Bootloader applicat…
|
D | readme-mynewt.md | 25 - "@mcuboot/boot/bootutil" 28 Also remove any dependency on `boot/bootutil` (mynewt's bundled bootloader) 32 `boot/mynewt/mcuboot_config/syscfg.yml`.
|
D | readme-espressif.md | 297 ## [Secure Boot](#secure-boot) 300 …Boot V2](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-boot-v2.html), 308 ### [Building bootloader with Secure Boot](#building-bootloader-with-secure-boot) argument 369 *Once the device makes its first full boot, these configurations cannot be reverted* 391 *Once the bootloader is flashed and the device resets, the **first boot will enable Secure Boot** 404 ### [Secure Boot Process](#secure-boot-process) argument 406 Secure boot uses a signature block appended to the bootloader image in order to verify the 410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor 411 digests. So the first boot will have the following process: 413 1. On startup, since it is the first boot, the ROM bootloader will not verify the bootloader image [all …]
|
D | readme-nuttx.md | 5 The NuttX port of MCUboot secure boot library expects that the platform provides a Flash storage wi… 27 …er, installing it and triggering the firmware update process for the next boot after a system rese… 29 ## Using MCUboot on NuttX as a secure boot solution 31 …boot is performed at application-level by the MCUboot library. Once MCUboot validates the applicat…
|
D | release-notes.md | 58 will revert back to the default zephyr boot banner. 90 - espressif: adjustments after IDF v5.1 compatibility, secure boot build and memory map organization 105 - Reworked boot serial extensions so that they can be used by modules 107 - Removed Zephyr custom img list boot serial extension support. 108 - (Zephyr) Adds support for sharing boot information with 129 - Various fixes to boot serial. 141 - Various general fixes to the boot code. 183 - Implement the mcumgr echo command in serial boot mode 207 - Allow to boot primary image if secondary one is unreachable. 209 - Add Multiimage boot for direct-xip and ram-load mode. [all …]
|
D | readme-zephyr.md | 53 the `CMakeLists.txt` file in boot/zephyr. There are comments there for 55 if the primary slot should be validated on every boot. 57 To build MCUboot, create a build directory in boot/zephyr, and build 61 cd boot/zephyr 68 `boot/zephyr/include/target.h`. Depending on the board, this information 103 In order to upgrade to an image (or even boot it, if 157 by the `boot/zephyr/keys.c`.
|
D | PORTING.md | 32 This function is located at `boot/bootutil/loader.c` and receives a `struct 67 - boot/zephyr/include/mcuboot_config/mcuboot_config.h 68 - boot/mynewt/mcuboot_config/include/mcuboot_config/mcuboot_config.h 121 /* Independent from multiple image boot */
|
D | ecdsa.md | 45 the `--no-pad-sig` signature to be able to boot all generated 60 time the boot code begins to accept unpadded signatures. The simulator is
|
D | imgtool.md | 38 For Zephyr, the keys live in the file `boot/zephyr/keys.c`. For 82 --boot-record sw_type Create CBOR encoded boot record TLV. The
|
D | readme-riot.md | 16 which should be able to boot any of the supported OS images.
|
/mcuboot-latest/samples/zephyr/ |
D | Makefile | 61 .PHONY: check boot hello1 clean_boot clean_hello1 \ 95 all: boot hello1 hello2 97 full.bin: boot hello1 hello2 109 boot: check target 116 $(SOURCE_DIRECTORY)/../../boot/zephyr && \ 230 boot hello1 246 boot hello1 272 boot hello1 287 boot hello1
|
D | build-boot.sh | 22 make BOARD=${BOARD} -j$(nproc) boot || die "Build mcuboot"
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig.firmware_loader | 25 bool "Check boot mode via retention subsystem" 28 Allows for entering firmware loader mode by using Zephyr's boot mode 29 retention system (i.e. an application must set the boot mode to stay
|
D | Kconfig | 235 bool "Validate image in the primary slot on every boot" 239 primary slot every boot. This adds the signature check time to 240 every boot, but can mitigate against some changes that are 251 method. This option is usefull for lowering the boot up time for 320 loading firmware via Bluetooth). The main application will boot by 321 default unless there is an error with it or the boot mode has been 351 attempt to boot the previous image. The images can also be made permanent 516 bool "Save boot information data" 524 bool "Store the boot state/measurements in shared memory area" 528 If enabled, the bootloader will store certain boot measurements such as [all …]
|
D | Kconfig.serial_recovery | 170 bool "Check boot mode via retention subsystem" 173 Allows for entering serial recovery mode by using Zephyr's boot mode 174 retention system (i.e. an application must set the boot mode to stay
|
/mcuboot-latest/ci/ |
D | mynewt_run.sh | 30 newt test boot/boot_serial
|
/mcuboot-latest/boot/mynewt/ |
D | README.md | 1 # MCUboot - apps/boot
|
/mcuboot-latest/ext/nrf/ |
D | README.md | 9 …E_TYPE_ECDSA_P256` is selected not `CONFIG_BOOT_SIGNATURE_TYPE_RSA` in `prj.conf` of `boot/zephyr`.
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 43 Root directory for build is **boot/cypress.** 92 `HEADER_OFFSET` defines the offset from original boot image address. This one in line above suggest… 124 `BlinkyApp` always produce build artifacts in 2 separate folders - `boot` and `upgrade`. 126 `BlinkyApp` built to run with `MCUBootApp` produces files with name BlinkyApp.hex in `boot` directo… 132 `BOOT` - boot/BlinkyApp.hex
|
D | BlinkyApp.mk | 121 OUT_CFG := $(OUT_CFG)/boot
|
/mcuboot-latest/boot/espressif/ |
D | CMakeLists.txt | 120 set(BOOTUTIL_DIR ${MCUBOOT_ROOT_DIR}/boot/bootutil) 121 set(BOOT_SERIAL_DIR ${MCUBOOT_ROOT_DIR}/boot/boot_serial) 122 set(ZCBOR_DIR ${MCUBOOT_ROOT_DIR}/boot/zcbor)
|
12