Secure boot for 32-bit Microcontrollers!
Go to file
Fabio Utzig 0be390e08e ci: update workflows names and add more badges
Fix workflows names on yaml root to be able to use them to refer to the
workflow. Add badges for pypi, workflows and license.

Signed-off-by: Fabio Utzig <fabio.utzig@nordicsemi.no>
2020-11-12 12:39:03 -03:00
.github/workflows ci: update workflows names and add more badges 2020-11-12 12:39:03 -03:00
boot doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
ci ci: add wheel dependency to imgtool publishing 2020-11-12 08:52:20 -03:00
docs Preps for 1.7.0-rc2 2020-11-12 11:14:28 +01:00
ext boot: Support for nrf52840 with ecc keys and cryptocell 2020-08-04 07:09:33 -03:00
ptest Update Cargo.lock files 2019-07-25 16:24:20 -05:00
samples samples: zephyr: Fix URL in test compilation 2020-11-10 17:04:20 -07:00
scripts Preps for 1.7.0-rc2 2020-11-12 11:14:28 +01:00
sim boot: bootutil: drop flash_area_read_is_empty 2020-10-08 20:47:56 -03:00
testplan/mynewt doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
zephyr zephyr: Add module.yml for Zephyr module integration 2019-12-16 18:40:34 +01:00
.gitignore Add imgtool publishing support 2019-01-08 07:29:24 -02:00
.gitmodules serial_recovery: Replace CBOR decoding code with generated code 2020-03-24 13:10:17 -06:00
.mbedignore Temporarily disable use of TinyCrypt with Mbed-OS 2020-11-06 09:18:27 -03:00
.travis.yml travis: Add FIH test cases to .travis.yml 2020-11-12 09:27:10 +01:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE imgtool: Add security counter to image manifest 2020-02-25 23:43:12 +01:00
README.md ci: update workflows names and add more badges 2020-11-12 12:39:03 -03:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-x25519-priv.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
enc-x25519-pub.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
go.mod doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Preps for 1.7.0-rc2 2020-11-12 11:14:28 +01:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00

README.md

mcuboot

Package on PyPI Coverity Scan Build Status Build Status (Sim) Build Status (Mynewt) Publishing Status (imgtool) Build Status (Travis CI) Apache 2.0

This is mcuboot version 1.7.0-rc2

MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables simple software upgrades.

MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating. Currently, mcuboot works with both the Apache Mynewt and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.

Using MCUboot

Instructions for different operating systems can be found here:

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To participate please visit:

MCUBoot GitHub Issues

Issues were previously tracked on MCUboot JIRA , but it is now deprecated.

Browsing

Information and documentation on the bootloader are stored within the source.

It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained

For more information in the source, here are some pointers:

  • boot/bootutil: The core of the bootloader itself.
  • boot/boot_serial: Support for serial upgrade within the bootloader itself.
  • boot/zephyr: Port of the bootloader to Zephyr
  • boot/mynewt: Mynewt bootloader app
  • imgtool: A tool to securely sign firmware images for booting by mcuboot.
  • sim: A bootloader simulator for testing and regression

Joining

Developers welcome!