Secure boot for 32-bit Microcontrollers!
Go to file
Andrzej Puzdrowski 160303c202 imgtool: Added support for providing the signature by 3rd party
The sign command was extended so it now allow to provide the signature
as base64 formatted RAW file using --fix-sig along with the relevant
public key --fix-sig-pubkey.

This patch is added for support the case where the party which produces
the image dose not have access to the signing image key but must request
third party for the signature.

Signed-off-by: Andrzej Puzdrowski <andrzej.puzdrowski@nordicsemi.no>
2022-04-18 16:31:15 -06:00
.github/workflows workflow: Add workflow verifing integration with the upstream Zephyr 2022-03-14 16:38:09 -06:00
boot zephyr: fix booting address incorrect in ram-load mode 2022-04-18 16:28:54 -06:00
ci espressif: Improve CI script for targetting multiple chips at once 2021-12-29 09:19:02 -03:00
docs espressif:esp32: Add multi image support 2022-03-16 03:58:01 -03:00
ext boot_serial: Upgrade from cddl-gen 0.1.0 to zcbor 0.4.0 2022-04-06 17:46:15 -06:00
ptest ptest: Some simple cleanups from clippy 2021-03-11 07:25:43 -07:00
samples samples/zephyr: Remove the body of the shell test runner 2022-02-07 15:57:22 -07:00
scripts imgtool: Added support for providing the signature by 3rd party 2022-04-18 16:31:15 -06:00
sim sim: Trivial dependency updates 2022-04-12 08:11:57 +02:00
testplan/mynewt doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
zephyr bootutil: extracted app common library from bootutil_misc 2021-01-13 17:49:49 +01:00
.gitignore sim: Move Cargo package to top level 2021-09-17 10:45:53 -06:00
.gitmodules boot_serial: Upgrade from cddl-gen 0.1.0 to zcbor 0.4.0 2022-04-06 17:46:15 -06:00
.mbedignore boot_serial: Upgrade from cddl-gen 0.1.0 to zcbor 0.4.0 2022-04-06 17:46:15 -06:00
.travis.yml-disabled ci: disable Travis 2021-09-27 14:23:19 -03:00
CODE_OF_CONDUCT.md Create template code of conduct 2021-06-08 10:14:29 -06:00
Cargo.lock sim: Trivial dependency updates 2022-04-12 08:11:57 +02:00
Cargo.toml sim: Move Cargo package to top level 2021-09-17 10:45:53 -06:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE boot: Add AES256 support for image encryption 2021-05-18 07:25:12 -03:00
README.md Bump to 1.10.0-dev for development of next release 2022-03-08 11:32:24 -07:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-aes256kw.b64 boot: Add AES256 support for image encryption 2021-05-18 07:25:12 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-x25519-priv.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
enc-x25519-pub.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
go.mod doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Update Mynewt repository.yaml for 1.9 release 2022-03-08 11:32:24 -07:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00

README.md

MCUboot

Package on PyPI Coverity Scan Build Status Build Status (Sim) Build Status (Mynewt) Publishing Status (imgtool) Build Status (Travis CI) Apache 2.0

This is MCUboot version 1.10.0-dev

MCUboot is a secure bootloader for 32-bits microcontrollers. It defines a common infrastructure for the bootloader and the system flash layout on microcontroller systems, and provides a secure bootloader that enables easy software upgrade.

MCUboot is not dependent on any specific operating system and hardware and relies on hardware porting layers from the operating system it works with. Currently, MCUboot works with the following operating systems and SoCs:

RIOT is supported only as a boot target. We will accept any new port contributed by the community once it is good enough.

MCUboot How-tos

See the following pages for instructions on using MCUboot with different operating systems and SoCs:

There are also instructions for the Simulator.

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To give your input, visit MCUboot GitHub Issues.

Source files

You can find additional documentation on the bootloader in the source files. For more information, use the following links:

  • boot/bootutil - The core of the bootloader itself.
  • boot/boot_serial - Support for serial upgrade within the bootloader itself.
  • boot/zephyr - Port of the bootloader to Zephyr.
  • boot/mynewt - Bootloader application for Apache Mynewt.
  • boot/nuttx - Bootloader application and port of MCUboot interfaces for Apache NuttX.
  • boot/mbed - Port of the bootloader to Mbed OS.
  • boot/espressif - Bootloader application and MCUboot port for Espressif SoCs.
  • boot/cypress - Bootloader application and MCUboot port for Cypress/Infineon SoCs.
  • imgtool - A tool to securely sign firmware images for booting by MCUboot.
  • sim - A bootloader simulator for testing and regression.

Joining the project

Developers are welcome!

Use the following links to join or see more about the project: