Secure boot for 32-bit Microcontrollers!
Go to file
Andrzej Puzdrowski 137d797177 sim: emits *_SWAP_USING_SCRATCH macros
Emits either MCUBOOT_SWAP_USING_SCRATCH and
CONFIG_BOOT_SWAP_USING_SCRATCH when swap using scratch
algorithm is expected.

Signed-off-by: Andrzej Puzdrowski <andrzej.puzdrowski@nordicsemi.no>
2021-05-14 14:19:56 +02:00
.github/workflows workflows: enable Mbed TLS based EC backend tests 2021-05-06 21:05:47 -03:00
boot zephyr: allow to not defined scratch area in upgrade-only mode 2021-05-14 14:19:56 +02:00
ci ci: update imgtool script to to use python/pip 2021-02-12 09:28:47 -03:00
docs Create CNAME 2021-05-04 15:47:49 +01:00
ext ext: tinycrypt: update ctr mode to stream 2020-11-25 12:37:29 -03:00
ptest ptest: Some simple cleanups from clippy 2021-03-11 07:25:43 -07:00
samples samples: zephyr: Fix URL in test compilation 2020-11-10 17:04:20 -07:00
scripts sim: Remove extraneous static 2021-03-11 07:25:43 -07:00
sim sim: emits *_SWAP_USING_SCRATCH macros 2021-05-14 14:19:56 +02:00
testplan/mynewt doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
zephyr bootutil: extracted app common library from bootutil_misc 2021-01-13 17:49:49 +01:00
.gitignore Add imgtool publishing support 2019-01-08 07:29:24 -02:00
.gitmodules cypress: Update core-lib, mob-pdl-cat1 submodules revision 2021-03-25 13:47:01 +02:00
.mbedignore Temporarily disable use of TinyCrypt with Mbed-OS 2020-11-06 09:18:27 -03:00
.travis.yml ci: pull fih-test docker image on install 2021-01-06 14:13:44 -03:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE imgtool: Add security counter to image manifest 2020-02-25 23:43:12 +01:00
README.md Post v1.7.0 action 2020-11-25 18:01:44 +01:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-x25519-priv.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
enc-x25519-pub.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
go.mod doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml mynewt: Update repository.yml with latest release 2021-03-24 13:01:48 -03:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00

README.md

mcuboot

Package on PyPI Coverity Scan Build Status Build Status (Sim) Build Status (Mynewt) Publishing Status (imgtool) Build Status (Travis CI) Apache 2.0

This is mcuboot version 1.8.0-dev

MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables simple software upgrades.

MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating. Currently, mcuboot works with both the Apache Mynewt and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.

Using MCUboot

Instructions for different operating systems can be found here:

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To participate please visit:

MCUBoot GitHub Issues

Issues were previously tracked on MCUboot JIRA , but it is now deprecated.

Browsing

Information and documentation on the bootloader are stored within the source.

It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained

For more information in the source, here are some pointers:

  • boot/bootutil: The core of the bootloader itself.
  • boot/boot_serial: Support for serial upgrade within the bootloader itself.
  • boot/zephyr: Port of the bootloader to Zephyr
  • boot/mynewt: Mynewt bootloader app
  • imgtool: A tool to securely sign firmware images for booting by mcuboot.
  • sim: A bootloader simulator for testing and regression

Joining

Developers welcome!