Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 60) sorted by relevance

123

/mcuboot-latest/docs/
Dtestplan-mynewt.md8 with wrong key images are not swapped to, and image signed with correct key
20 Build and load good image in slot 0:
22 * `newt create-image k64f_blinky 1.0.1 key_<sign-algo>.pem`
28 *If testing RSA/PSS `newt create-image` needs to be passed in the extra*
31 `newt create-image k64f_blinky 1.0.1 key_rsa.pem --rsa-pss`
35 Build and load image in slot 1 with no signing, signed with
37 test image and check that swap only happens for image signed with
40 * `newt create-image k64f_blinky2 1.0.2 <one-of-the-sign-keys-or-none>`
41 * `newtmgr image upload k64f_blinky2`
42 * `newtmgr image list`
[all …]
Dimgtool.md51 Image signing takes an image in binary or Intel Hex format intended for the
56 Create a signed or unsigned image
64 digest instead of complied image. These data
65 can be used for external image signing
71 written. The image signature will be encoded
75 over an image rather than hash of that
76 image.
78 --fix-sig filename fixed signature for the image. It will be
84 image manifest: full key or hash of the key.
92 it from the image version.
[all …]
Dreadme-nuttx.md6 - `CONFIG_MCUBOOT_PRIMARY_SLOT_PATH`: MTD partition for the application firmware image PRIMARY slot;
7 - `CONFIG_MCUBOOT_SECONDARY_SLOT_PATH`: MTD partition for the application firmware image SECONDARY …
15 …_map_backend.h>`, for enabling MCUboot to manage the application firmware image slots in the devic…
25image and, once this application firmware image is assured to be valid, the application may confir…
27image from a webserver, installing it and triggering the firmware update process for the next boot…
31image, it delegates the loading and execution of the application firmware image to a platform-spec…
39 …map_backend/flash_map_backend.h>` expects that the MTD driver for a given image partition handles …
Dcompression_format.md4 `zephyr.signed.bin` file when image
6 image compression subsystem, but they can be beneficial if you want to
120 ## [Extracting LZMA stream from image](#Extracting-LZMA-stream-from-image)
122 To extract and decompress the LZMA stream from the image, follow these
147 image before compression.
154 - `DECOMP_SIZE (0x70)`: Specifies the size of the decompressed image.
155 - `DECOMP_SHA (0x71)`: Contains the hash of the decompressed image.
157 the entire image.
162 signature and hash algorithm used for securing the image is the same,
163 regardless of whether the image has undergone compression.
[all …]
Dreadme-espressif.md188 For signing with a crypto key and guarantee the authenticity of the image being booted, see the
189 section [MCUboot image signature verification](#mcuboot-image-signature-verification) below.*
208 MCUboot will then verify and compare the new image version number with the current one before
211 Version number is added to the image when signing it with `imgtool` (`-v` parameter, e.g.
216 It is also possible to rely on a security counter, also added to the image when signing with
217 `imgtool` (`-s` parameter), apart from version number. This allows image downgrade at some extent,
225 E.g.: if the current image was signed using `-s 1` parameter, an eventual update image must have
232 MCUboot design the image in Primary Slot, from where the image is executed, is stored plaintext.
233 Espressif chips have off-chip flash memory, so to ensure a security chain along with MCUboot image
237 ## [MCUboot image signature verification](#mcuboot-image-signature-verification)
[all …]
Dtestplan-zephyr.md27 messages, and lastly: "main: Unable to find bootable image".
33 This should print "main: Jumping to the first image slot", and you
34 should get an image "hello1".
53 Repeat this, to make sure we can mark the image as OK, and that a
64 And make sure this stays in the "hello2" image.
/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml48 # Encrypt image in the secondary slot using RSA-OAEP-2048
51 # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048
54 # Encrypt image in the secondary slot using AES-KW-128
57 # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256
60 # Encrypt image in the secondary slot using ECIES-P256
63 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256
66 # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS
69 # Encrypt image in the secondary slot using ECIES-X25519
72 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519
82 # image is copied to RAM before loading it.
[all …]
/mcuboot-latest/scripts/imgtool/
Ddumpinfo.py27 from imgtool import image
31 TLV_TYPES = dict((value, key) for key, value in image.TLV_VALUES.items())
160 b[tlv_off:(tlv_off + image.TLV_INFO_SIZE)])
164 tlv_off += image.TLV_INFO_SIZE
170 b[tlv_off:(tlv_off + image.TLV_INFO_SIZE)])
171 tlv_off += image.TLV_INFO_SIZE
177 _tlv_head = struct.unpack('HH', b[tlv_off:(tlv_off + image.TLV_INFO_SIZE)])
182 tlv_off += image.TLV_INFO_SIZE
188 b[tlv_off:(tlv_off + image.TLV_INFO_SIZE)])
189 tlv_off += image.TLV_INFO_SIZE
[all …]
/mcuboot-latest/boot/zephyr/boards/
Dnrf52840dk_ram_multi.overlay18 label = "image-0";
22 label = "image-1";
26 label = "image-3";
55 label = "image-2";
Dnrf52840dk_qspi_nor_secondary.overlay18 label = "image-0";
31 label = "image-1";
Dnrf52840_big.overlay22 label = "image-0";
26 label = "image-1";
/mcuboot-latest/ci/fih_test_docker/docker-build/
Dbuild.sh28 image=mcuboot/fih-test
29 docker build --pull --tag=$image .
/mcuboot-latest/boot/cypress/BlinkyApp/
DReadme.md11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE.
54 To build UPGRADE image use following command:
60 Example command-line for single-image:
66 `BlinkyApp` can be built to use in multi-image bootloader configuration.
68 To get appropriate artifacts to use with multi image MCUBootApp, makefile flag `HEADER_OFFSET=` can…
74 * first image BOOT (PRIMARY) slot start `0x10018000`
76 * second image BOOT (PRIMARY) slot start `0x10038000`
78 To get appropriate artifact for second image PRIMARY slot run this command:
84 **How to build upgrade image for external memory:**
88 For build BlinkyApp upgrade image for external memory use command:
[all …]
/mcuboot-latest/docs/release-notes.d/
Dbootutil-image-verification.md1 - Changed bootutil's order of events to verify the image header
2 before checking the image.
Dserial-recovery-list.md1 - Fixed issue with serial recovery image list wrongly using
3 complete information for 1 updateable image
Dzephyr-compression.md1 - Added protected TLV size to image size check in bootutil
3 - Added compressed image flags and TLV to bootutil
/mcuboot-latest/boot/zephyr/sysbuild/
DCMakeLists.txt28 foreach(image ${IMAGES})
30 get_property(app_type TARGET ${image} PROPERTY APP_TYPE)
38 …set_property(TARGET ${image} APPEND_STRING PROPERTY CONFIG "CONFIG_ROM_END_OFFSET=${mcuboot_image_…
39 …set_property(TARGET ${image} APPEND_STRING PROPERTY CONFIG "CONFIG_MCUBOOT_UPDATE_FOOTER_SIZE=${mc…
/mcuboot-latest/boot/mbed/
Dmcuboot_imgtool.cmake31 …message(FATAL_ERROR "Must specify path to valid image signing key via MCUBOOT_SIGNING_KEY CMake op…
43 …ince mcuboot.encrypt-rsa is enabled, you must specify the path to a valid image encryption key via…
50 # Generate a signed image hex file for the given executable target.
81 # If encryption is enabled, generate unencrypted initial image which supports encryption.
114 COMMENT "Generating mcuboot ${IMAGE_TYPE} image for ${TARGET}..."
121 # Generate an initial image hex file for the given executable target.
122 # This initial image is what should be flashed to a blank device (along with the bootloader).
123 # A flash target (ninja flash-${TARGET}-initial-image) will also be created.
127 # If you wish to specify the base name of the initial image, pass that as the second argument to
128 # this function. Otherwise, it will default to $<target name>-initial-image
[all …]
/mcuboot-latest/sim/tests/
Dcore.rs44 let image = r.$maker($($margs),*); localVariable
45 dump_image(&image, stringify!($name));
46 assert!(!image.$test($($targs),*));
92 let image = r.clone().make_image(&dep, true); localVariable
93 dump_image(&image, "dependency_combos");
94 assert!(!image.run_check_deps(&dep));
190 fn dump_image(image: &Images, name: &str) { in dump_image()
198 image.debug_dump(&full_name); in dump_image()
/mcuboot-latest/boot/zephyr/
DKconfig81 Single image area is used for application which means that
111 SHA requires image to be decrypted first, which is done in RAM.
114 either of the image slots.
117 prompt "Selected image hash algorithm"
122 Hash algorithm used for image verification. Selection
150 for example ed25519. The pure variant means that image
151 signature is calculated over entire image instead of hash
152 of an image.
212 image.
213 To check signature over entire image directly, rather than hash,
[all …]
DKconfig.serial_recovery51 bool "Allow to select image number for DFU"
55 respect the "image" field in mcumgr image update frame
57 The mapping of image number to partition is as follows:
59 1 -> image-0 (primary slot of the first image);
60 2 -> image-1 (secondary slot of the first image);
61 3 -> image-2;
62 4 -> image-3.
106 instead of erasing the whole image slot at once. This is necessary
196 If y, image list responses will include the image hash (adds ~100
204 If y, image states will be included with image lists and the set
[all …]
/mcuboot-latest/boot/bootutil/src/
Dboot_record.c244 uint8_t image = 0; in boot_save_shared_data() local
350 while (image < BOOT_IMAGE_NUMBER && !rc) { in boot_save_shared_data()
351 if (max_app_sizes[image].calculated == true) { in boot_save_shared_data()
353 (BLINFO_MAX_APPLICATION_SIZE + image), in boot_save_shared_data()
354 sizeof(max_app_sizes[image].max_size), in boot_save_shared_data()
355 (void *)&max_app_sizes[image].max_size); in boot_save_shared_data()
359 ++image; in boot_save_shared_data()
/mcuboot-latest/samples/runtime-source/zephyr/
DREADME.md1 # Runtime chosen image sample application
3 This sample demonstrates how to use a non flash storage to retrieve the image
5 different images. The image to be booted is selected based on a button press.
54 image on slot0 by default. By keeping the SW2 button pressed during reset, the
/mcuboot-latest/boot/bootutil/include/bootutil/
Dbootutil_public.h133 #define BOOT_SET_SWAP_INFO(swap_info, image, type) { \ argument
134 assert((image) < 0xF); \
136 (swap_info) = (image) << 4 \
/mcuboot-latest/boot/cypress/MCUBootApp/
DREADME.md17 Single-image mode.
29 MCUBootApp checks image integrity with SHA256, image authenticity with EC256 digital signature veri…
83 Multi-image operation considers upgrading and verification of more then one image on the device.
85 …enable multi-image operation define `MCUBOOT_IMAGE_NUMBER` in `MCUBootApp/config/mcuboot_config.h`…
87 Default value of `MCUBOOT_IMAGE_NUMBER` is 1, which corresponds to single image configuratios.
89 In multi-image operation (two images are considered for simplicity) MCUboot Bootloader application …
94 * Boots image from Primary_1 slot only;
115 …to place secondary (upgrade) slots in external memory module so resulting image size can be double…
144 * Build MCUBootApp in `Debug` for signle image use case.
148 * Build MCUBootApp in `Release` for multi image use case.
[all …]

123