Searched full:bootloader (Results 1 – 25 of 102) sorted by relevance
12345
/mcuboot-latest/boot/zephyr/ |
D | sample.yaml | 6 sample.bootloader.mcuboot: 13 sample.bootloader.mcuboot.serial_recovery: 19 sample.bootloader.mcuboot.usb_cdc_acm_recovery: 25 sample.bootloader.mcuboot.usb_cdc_acm_recovery_log: 32 sample.bootloader.mcuboot.single_slot: 39 sample.bootloader.mcuboot.qspi_nor_slot: 46 sample.bootloader.mcuboot.hooks_multi: 54 sample.bootloader.mcuboot.ram_load:
|
D | Kconfig.firmware_loader | 20 Used to prevent the bootloader from loading on button press. 22 the one used to place the device in bootloader mode. 33 bool "Stay in bootloader if no application" 36 application that the bootloader can jump to. 43 remain in bootloader firmware loader mode if it was.
|
D | Kconfig.serial_recovery | 150 Used to prevent the bootloader from loading on button press. 152 the one used to place the device in bootloader mode. 178 bool "Stay in bootloader if no application" 181 application that the bootloader can jump to. 188 remain in bootloader serial recovery mode if it was.
|
D | Kconfig | 69 bool "Single slot bootloader" 238 If y, the bootloader attempts to validate the signature of the 248 If y, the bootloader attempts to validate the signature of the 350 bootloader considers the image faulty and erases it. After this it will 466 DT_CHOSEN_BOOTLOADER_INFO := zephyr,bootloader-info 492 - Chosen node "zephyr,bootloader-info" to be set to the retention 528 If enabled, the bootloader will store certain boot measurements such as 625 Used to prevent the bootloader from loading on button press. 627 the one used to place the device in bootloader mode. 632 bool "Stay in bootloader if no application" [all …]
|
/mcuboot-latest/docs/ |
D | index.md | 3 MCUboot is a secure bootloader for 32-bits microcontrollers. 7 MCUboot defines a common infrastructure for the bootloader and the system flash 8 layout on microcontroller systems, and provides a secure bootloader that 37 - [Bootloader design](design.md) 70 You can find additional documentation on the bootloader in the source files. 72 …(https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the bootloader itself. 73 …ools/mcuboot/tree/main/boot/boot_serial) - Support for serial upgrade within the bootloader itself. 74 …yr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloader to Zephyr. 75 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 76 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … [all …]
|
D | readme-riot.md | 3 MCUboot began its life as the bootloader for Mynewt. It has since 4 acquired the ability to be used as a bootloader for RIOT as well. 7 ## Building the bootloader itself 11 not a signature check. In order to configure the bootloader for 18 ## Building applications for the bootloader 40 In order to use your provided key, you need to recompile the bootloader 47 This will flash both the bootloader and the application.
|
D | readme-espressif.md | 10 Documentation about the MCUboot bootloader design, operation and features can be found in the 23 the bootloader own memory layout to avoid overlapping. More information on the section 69 from NuttX RTOS environments also can be used for the bootloader standalone build, however as 81 ## [Building the bootloader itself](#building-the-bootloader-itself) 83 The MCUboot Espressif port bootloader is built using the toolchain and tools provided by Espressif. 85 `port/<TARGET>/bootloader.conf` file or passing a custom config file using the 236 ED25519. In order to enable the feature, the **bootloader** must be compiled with the following 282 Notice that the public key will be embedded in the bootloader code, since the hardware key storage 303 bootloader signature checking by the ROM bootloader. 305 ***Note***: ROM bootloader is the First Stage Bootloader, while the Espressif MCUboot port is the [all …]
|
D | readme-mbed.md | 17 * `"target.restrict_size"`: the maximum size of the bootloader, such that it does not overlap with … 33 ### Building the bootloader 35 To build a bootloader based on MCUboot, make sure `"mcuboot.bootloader-build"` is `true` (already t… 39 …ser application, set `"mcuboot.bootloader-build"` to `false` so MCUboot is built as a _library onl… 41 … to `"mcuboot.primary-slot-address"` + `"mcuboot.header-size"` of your bootloader. And its size (`…
|
D | readme-zephyr.md | 3 MCUboot began its life as the bootloader for Mynewt. It has since 4 acquired the ability to be used as a bootloader for Zephyr as well. 9 and operation of the bootloader itself. This functionality should be the same 27 MCUboot as your stage 1 bootloader, `boot_partition` must be configured 48 ## Building the bootloader itself 50 The bootloader is an ordinary Zephyr application, at least from 72 After building the bootloader, the binaries should reside in 77 memory (mass erase) or only the sectors where the bootloader resides prior to 78 programming the bootloader image itself. 80 ## Building applications for the bootloader [all …]
|
D | signed_images.md | 28 The public key of this keypair must be included in the bootloader, 37 included in the bootloader, see the [design](design.md) document. 49 in the bootloader. Bootloader need to keep key parsing minimal, 89 ## Building the bootloader 98 for bootloader. So modify the pkg.yml for apps/boot to include it.
|
D | readme-mynewt.md | 3 Due to small differences between Mynewt's bundled bootloader and MCUboot, 4 when building an app that will be run with MCUboot as the bootloader and 28 Also remove any dependency on `boot/bootutil` (mynewt's bundled bootloader) 43 like listing images and uploading a new image to `slot0`. The serial bootloader
|
D | design.md | 28 # Bootloader 37 The bootutil library performs most of the functions of a bootloader. In 40 Bootloader functionality is separated in this manner to enable unit testing of 41 the bootloader. A library can be unit tested, but an application can't. 46 The bootloader currently only supports images with the following 145 The bootloader uses the following flash area IDs: 152 /* If the bootloader is working with the first image */ 157 /* If the bootloader is working with the second image */ 162 The bootloader area contains the bootloader image itself. The other areas are 165 based on the number of the active image (on which the bootloader is currently [all …]
|
D | imgtool.md | 36 bootloader with the generated one. 52 primary slot and adds a header and trailer that the bootloader is expecting: 121 in the secondary slot will then cause the bootloader to upgrade to it. 132 public key is incorporated into the bootloader). When the `full` option is used 133 instead, the TLV area will contain the whole public key and thus the bootloader
|
D | PORTING.md | 22 ## Main app and calling the bootloader 24 From the perspective of the target OS, the bootloader can be seen as a library, 26 target OS, and it must call the following function to run the bootloader: 49 After running the management functions of the bootloader, `boot_go` returns 72 The bootloader requires to be able to address flash regions where the code
|
/mcuboot-latest/ |
D | README.md | 23 MCUboot is a secure bootloader for 32-bits microcontrollers. It defines a 24 common infrastructure for the bootloader and the system flash layout on 25 microcontroller systems, and provides a secure bootloader that enables easy 64 You can find additional documentation on the bootloader in the source files. 66 …(https://github.com/mcu-tools/mcuboot/tree/main/boot/bootutil) - The core of the bootloader itself. 67 …ools/mcuboot/tree/main/boot/boot_serial) - Support for serial upgrade within the bootloader itself. 68 …yr](https://github.com/mcu-tools/mcuboot/tree/main/boot/zephyr) - Port of the bootloader to Zephyr. 69 - [boot/mynewt](https://github.com/mcu-tools/mcuboot/tree/main/boot/mynewt) - Bootloader applicatio… 70 - [boot/nuttx](https://github.com/mcu-tools/mcuboot/tree/main/boot/nuttx) - Bootloader application … 71 - [boot/mbed](https://github.com/mcu-tools/mcuboot/tree/main/boot/mbed) - Port of the bootloader to… [all …]
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | README.md | 19 `[0x10000000, 0x10018000]` - MCUBootApp (bootloader) area; 31 **Important**: make sure primary, secondary slot and bootloader app sizes are appropriate and corre… 33 **Important**: make sure RAM areas of CM0p-based MCUBootApp bootloader and CM4-based BlinkyApp do n… 89 In multi-image operation (two images are considered for simplicity) MCUboot Bootloader application … 101 `0x10000000 - 0x10018000` - MCUboot Bootloader 103 `0x10018000 - 0x10028000` - Primary_1 (BOOT) slot of Bootloader 105 `0x10028000 - 0x10038000` - Secondary_1 (UPGRADE) slot of Bootloader 107 `0x10038000 - 0x10048000` - Primary_2 (BOOT) slot of Bootloader 109 `0x10048000 - 0x10058000` - Secondary_2 (UPGRADE) slot of Bootloader 111 `0x10058000 - 0x10059000` - Scratch of Bootloader [all …]
|
/mcuboot-latest/boot/cypress/ |
D | README.md | 11 1. MCUboot-Based Basic Bootloader [mtb-example-psoc6-mcuboot-basic](https://github.com/cypresssemic… 12 2. MCUboot-Based Bootloader with Rollback to Factory App in External Flash [mtb-example-anycloud-mc… 22 * [0x10000000, 0x10018000] - MCUBootApp (bootloader) area; 59 …les infrastructure for building both MCUboot Bootloader and sample BlinkyApp application used for … 61 Instructions on how to build and upload MCUBootApp bootloader application and sample user applocati…
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 1 ### Blinking LED test application for MCUboot bootloader 13 * Can be built for BOOT slot or UPGRADE slot of bootloader. 38 **Important**: make sure RAM areas of CM4-based BlinkyApp and CM0p-based MCUBootApp bootloader do n… 66 `BlinkyApp` can be built to use in multi-image bootloader configuration. 138 …VALUE% - offset for output hex file. Value 0x10000 is slot size MCUboot Bootloader in this example. 139 …- build image for BOOT slot of MCUboot Bootloader, `UPGRADE` - build image for UPGRADE slot of MCU… 142 **NOTE**: In case of `UPGRADE` image `HEADER_OFFSET` should be set to MCUboot Bootloader slot size.
|
/mcuboot-latest/boot/espressif/hal/src/ |
D | secure_boot.c | 21 * from the bootloader code. 162 /* Verify the bootloader */ in check_and_generate_secure_boot_keys() 166 ESP_LOGE(TAG, "bootloader image appears invalid! error %d", ret); in check_and_generate_secure_boot_keys() 186 /* Generate the bootloader public key digests */ in check_and_generate_secure_boot_keys() 189 ESP_LOGE(TAG, "Bootloader signature block is invalid"); in check_and_generate_secure_boot_keys() 194 ESP_LOGE(TAG, "No valid bootloader signature blocks found."); in check_and_generate_secure_boot_keys() 197 …ESP_LOGI(TAG, "%d signature block(s) found appended to the bootloader.", boot_key_digests.num_dige… in check_and_generate_secure_boot_keys() 203 …ESP_LOGE(TAG, "Bootloader signatures(%d) more than available key slots.", boot_key_digests.num_dig… in check_and_generate_secure_boot_keys() 256 /* The revocation index can be 0, 1, 2. Bootloader count can be 1,2,3. */ in check_and_generate_secure_boot_keys()
|
/mcuboot-latest/boot/mbed/ |
D | mbed_lib.json | 4 "bootloader-build": { 5 "help": "Build the bootloader, in addition to the MCUboot library.", 84 "log-bootloader-only": { 85 "help": "Exclude non-bootloader logs from Mbed OS (e.g. underlying storage).", 170 … "help": "Start of reserved RAM region for data shared between bootloader and application", 175 … "help": "Size of reserved RAM region for data shared between bootloader and application",
|
/mcuboot-latest/boot/bootutil/include/bootutil/ |
D | caps.h | 28 * The bootloader can be compile with different capabilities selected 32 * running within the bootloader. 58 * Query the number of images this bootloader is configured for. This
|
D | boot_record.h | 40 * @brief Add a data item to the shared data area between bootloader and 57 * between the bootloader and runtime SW. 71 * bootloader and runtime SW.
|
/mcuboot-latest/boot/espressif/port/esp32c2/ld/ |
D | bootloader.ld | 7 /** Simplified memory map for the bootloader. 8 * Make sure the bootloader can load into main memory without overwriting itself. 15 * The 2nd stage bootloader can take space up to the end of ROM shared 22 /* We consider 0x3fcdcb70 to be the last usable address for 2nd stage bootloader stack overhead, dr… 28 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu…
|
/mcuboot-latest/boot/espressif/port/esp32c6/ld/ |
D | bootloader.ld | 7 /** Simplified memory map for the bootloader. 8 * Make sure the bootloader can load into main memory without overwriting itself. 15 * The 2nd stage bootloader can take space up to the end of ROM shared 19 /* We consider 0x4087c610 to be the last usable address for 2nd stage bootloader stack overhead, dr… 25 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu…
|
/mcuboot-latest/boot/espressif/port/esp32h2/ld/ |
D | bootloader.ld | 7 /** Simplified memory map for the bootloader. 8 * Make sure the bootloader can load into main memory without overwriting itself. 16 * The 2nd stage bootloader can take space up to the end of ROM shared 20 /* We consider 0x3fcdc710 to be the last usable address for 2nd stage bootloader stack overhead, dr… 26 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu…
|
12345