Secure boot for 32-bit Microcontrollers!
Go to file
Dominik Ermel 35bf48c5b7 boot: Change boot_enc_load to take slot number instead of image
In all cases where boot_enc_load is called it is known what slot
is addressed, so it is better to just pass the slot number
instead of making the boot_enc_load figure out slot number from
image index and provided flash area object.

Signed-off-by: Dominik Ermel <dominik.ermel@nordicsemi.no>
(cherry picked from commit 7f9ac97951)
2024-11-04 14:27:23 +00:00
.github/workflows ci: add imgtool test to workflows 2024-05-23 14:39:17 +02:00
boot boot: Change boot_enc_load to take slot number instead of image 2024-11-04 14:27:23 +00:00
ci Revert "boot: Add MCUBOOT_HW_KEY support for image encryption" 2024-07-09 09:19:43 -06:00
docs docs: release-notes: Add note on fixed zephyr RAM load address 2024-11-04 14:27:17 +00:00
ext ext: fiat: Use user-defined assert macro 2024-06-26 16:52:20 -06:00
ptest ptest: Use 1-based indices for tests 2024-04-19 11:50:52 -06:00
samples bootutil: Allow the usage of builtin keys in verification 2024-04-10 12:05:08 -06:00
scripts imgtool: Bump cryptography library version 2024-11-04 14:24:00 +00:00
sim sim: Fix MCUBOOT_SWAP_USING_SCRATCH defined in direct-xip and ram-load 2024-11-04 14:23:28 +00:00
testplan/mynewt bootutil: Remove P224 curve 2023-04-11 07:05:38 +02:00
zephyr zephyr: Add estimated image footer size to cache in sysbuild 2023-12-12 10:41:26 +00:00
.gitignore sim: Move Cargo package to top level 2021-09-17 10:45:53 -06:00
.gitmodules espressif: remove IDF git submodule and add its reference by param 2023-07-24 10:03:18 -03:00
.mbedignore boot_serial: Upgrade from cddl-gen 0.1.0 to zcbor 0.4.0 2022-04-06 17:46:15 -06:00
.travis.yml-disabled ci: disable Travis 2021-09-27 14:23:19 -03:00
CODE_OF_CONDUCT.md Create template code of conduct 2021-06-08 10:14:29 -06:00
Cargo.lock build(deps): bump bumpalo from 3.9.1 to 3.12.0 2023-02-25 09:39:31 -03:00
Cargo.toml sim: Fix resolver warning from cargo 2024-06-26 16:43:56 -06:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE boot: Add AES256 support for image encryption 2021-05-18 07:25:12 -03:00
README.md docs: Replace Slack channel links with Discord 2024-06-14 15:31:51 +02:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-aes256kw.b64 boot: Add AES256 support for image encryption 2021-05-18 07:25:12 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-x25519-priv.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
enc-x25519-pub.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
go.mod doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Preps for 2.1.0 release 2024-05-09 08:03:52 -06:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ec-p384-pkcs8.pem sim: PSA Crypto ECDSA enablement 2023-09-12 16:29:11 +02:00
root-ec-p384.pem sim: PSA Crypto ECDSA enablement 2023-09-12 16:29:11 +02:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00

README.md

MCUboot

Package on PyPI Coverity Scan Build Status Build Status (Sim) Build Status (Mynewt) Build Status (Espressif) Publishing Status (imgtool) Build Status (Travis CI) Apache 2.0

This is MCUboot version 2.1.0

MCUboot is a secure bootloader for 32-bits microcontrollers. It defines a common infrastructure for the bootloader and the system flash layout on microcontroller systems, and provides a secure bootloader that enables easy software upgrade.

MCUboot is not dependent on any specific operating system and hardware and relies on hardware porting layers from the operating system it works with. Currently, MCUboot works with the following operating systems and SoCs:

RIOT is supported only as a boot target. We will accept any new port contributed by the community once it is good enough.

MCUboot How-tos

See the following pages for instructions on using MCUboot with different operating systems and SoCs:

There are also instructions for the Simulator.

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To give your input, visit MCUboot GitHub Issues.

Source files

You can find additional documentation on the bootloader in the source files. For more information, use the following links:

  • boot/bootutil - The core of the bootloader itself.
  • boot/boot_serial - Support for serial upgrade within the bootloader itself.
  • boot/zephyr - Port of the bootloader to Zephyr.
  • boot/mynewt - Bootloader application for Apache Mynewt.
  • boot/nuttx - Bootloader application and port of MCUboot interfaces for Apache NuttX.
  • boot/mbed - Port of the bootloader to Mbed OS.
  • boot/espressif - Bootloader application and MCUboot port for Espressif SoCs.
  • boot/cypress - Bootloader application and MCUboot port for Cypress/Infineon SoCs.
  • imgtool - A tool to securely sign firmware images for booting by MCUboot.
  • sim - A bootloader simulator for testing and regression.

Joining the project

Developers are welcome!

Use the following links to join or see more about the project: