This website requires JavaScript.
Explore
Help
Sign In
OrgZephyr
/
mcuboot
mirror of
https://github.com/zephyrproject-rtos/mcuboot.git
Watch
1
Star
0
Fork
You've already forked mcuboot
0
Code
Issues
Releases
Wiki
Activity
91de33d9f7
mcuboot
/
scripts
/
requirements.txt
5 lines
45 B
Plaintext
Raw
Normal View
History
Unescape
Escape
requirements.txt: bump cryptography Py package version Since Ed25519 curve primitives are available since cryptography package version 2.6 need to bump its version. Signed-off-by: Andrzej Puzdrowski <andrzej.puzdrowski@nordicsemi.no>
2019-06-18 17:22:50 +08:00
cryptography>=2.6
imgtool: Add support for Intel Hex images Some platforms prefer images in the Intel Hex (.hex) format. Implement support for signing images in this format in imgtool. Signed-off-by: Carles Cufi <carles.cufi@nordicsemi.no>
2018-01-30 23:40:10 +08:00
intelhex
Add click handling of cli options Signed-off-by: Fabio Utzig <utzig@apache.org>
2018-03-27 18:25:07 +08:00
click
imgtool: Add CBOR encoded boot record to TLV area Add new '--boot-record' option for imgtool to add a new type of TLV to the image manifest called BOOT_RECORD. This TLV contains CBOR encoded data with some basic information about the image (SW component) it belongs to, these are the following: - SW type (role of the software component) - SW version - Signer ID (identifies the signing authority) - Measurement value (hash of the image) - Measurement type (algorithm used to calculate the measurement value) The boot_record.py file and most of the modifications in image.py are coming from the Trusted Firmware-M project (https://www.trustedfirmware.org/about/). Hash of the source commit: 08d5572b4bcee306d8cf709c2200359a22d5b72c. This patch is based on the recommendations of Arm's Platform Security Architecture (PSA) and its purpose is to support compliance with it. Change-Id: I379ccc57b48ad2311837cb3fd90f5f9d1c9b5bac Signed-off-by: David Vincze <david.vincze@linaro.org>
2020-03-18 02:08:12 +08:00
cbor>=1.0.0