Secure boot for 32-bit Microcontrollers!
Go to file
David Brown 3cabd927a7 sim: Fix ecdsa padding
For some reason, the ECDSA signature generation code attempted to adjust
the length of the ASN.1 of the actual signature.  It wasn't doing this
right, and was creating ASN.1 expecting many more entries than were
present.  The half-run parser in the tinycrypt ECDSA signature check
didn't care about this, but mbed TLS's signature check does care.

The intent of the padding was to be able to predict the size of the TLV
before writing it out.  Keep the padding for now, even though there is
no simple way of knowing how many pad bytes to remove (just removing
them will remove extra if there is a zero in the last byte of the
signature.

A future change will eliminate the padding, as it should no longer be
needed.

Signed-off-by: David Brown <david.brown@linaro.org>
2019-12-10 07:40:47 -07:00
boot boot: zephyr: add config for swap without scratch 2019-12-09 14:21:09 -03:00
ci Fix up typos 2019-10-30 06:24:10 -03:00
docs Add html anchors to design and imgtool documents 2019-12-03 16:35:58 -03:00
ext Bugfix: nRF Cryptocell not being disabled 2019-11-06 18:35:00 -03:00
ptest Update Cargo.lock files 2019-07-25 16:24:20 -05:00
samples samples: zephyr: Remove redundant extra chip erase 2019-12-05 11:32:26 -07:00
scripts imgtool: add creation of ECIES-P256 encrypted images 2019-11-06 06:55:25 -03:00
sim sim: Fix ecdsa padding 2019-12-10 07:40:47 -07:00
testplan/mynewt apps: update dependencies & syscfgs as per mcumgr 2019-10-10 18:03:59 -03:00
.gitignore Add imgtool publishing support 2019-01-08 07:29:24 -02:00
.gitmodules Move mbedtls submodule from sim to ext 2019-10-15 09:29:20 -06:00
.travis.yml ci: add "swap-move enc-rsa sig-rsa" 2019-12-09 14:21:09 -03:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE Boot: Extend flash layout for multiple images 2019-07-23 09:11:34 -05:00
README.md README.md: Minor typographical and grammar fixes 2019-12-03 10:37:46 -07:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Prepare for v1.4.0 release 2019-10-17 15:47:38 -06:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00
version.yml Revert version.yml after release 2019-10-17 15:47:38 -06:00

README.md

mcuboot

Coverity Scan Build Status Build/Test

This is mcuboot version 1.4.0

MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables simple software upgrades.

MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating. Currently, mcuboot works with both the Apache Mynewt and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.

Using MCUboot

Instructions for different operating systems can be found here:

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To participate please visit:

MCUBoot GitHub Issues

Issues were previously tracked on MCUboot JIRA , but it is now deprecated.

Browsing

Information and documentation on the bootloader are stored within the source.

It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained

For more information in the source, here are some pointers:

  • boot/bootutil: The core of the bootloader itself.
  • boot/boot_serial: Support for serial upgrade within the bootloader itself.
  • boot/zephyr: Port of the bootloader to Zephyr
  • boot/mynewt: Mynewt bootloader app
  • imgtool: A tool to securely sign firmware images for booting by mcuboot.
  • sim: A bootloader simulator for testing and regression

Joining

Developers welcome!