Secure boot for 32-bit Microcontrollers!
Go to file
David Brown 91de33d9f7 ptest: Some simple cleanups from clippy
Run the clippy Rust linter, and apply the simple cleanups it suggests.

Signed-off-by: David Brown <david.brown@linaro.org>
2021-03-11 07:25:43 -07:00
.github/workflows workflow: Test the Mbed TLS ECDSA configuration 2021-02-23 10:29:31 -07:00
boot boot: zephyr: Fix compilation warnings with ZEPHYR_LOG_MODE_MINIMAL 2021-03-01 09:32:15 +01:00
ci ci: update imgtool script to to use python/pip 2021-02-12 09:28:47 -03:00
docs doc: update release process with branching 2021-01-13 16:53:07 -03:00
ext ext: tinycrypt: update ctr mode to stream 2020-11-25 12:37:29 -03:00
ptest ptest: Some simple cleanups from clippy 2021-03-11 07:25:43 -07:00
samples samples: zephyr: Fix URL in test compilation 2020-11-10 17:04:20 -07:00
scripts imgtool: rollback to 1.7.0 release 2021-02-12 09:28:47 -03:00
sim sim: Update Cargo lock file 2021-02-26 10:13:57 -07:00
testplan/mynewt doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
zephyr bootutil: extracted app common library from bootutil_misc 2021-01-13 17:49:49 +01:00
.gitignore Add imgtool publishing support 2019-01-08 07:29:24 -02:00
.gitmodules serial_recovery: Replace CBOR decoding code with generated code 2020-03-24 13:10:17 -06:00
.mbedignore Temporarily disable use of TinyCrypt with Mbed-OS 2020-11-06 09:18:27 -03:00
.travis.yml ci: pull fih-test docker image on install 2021-01-06 14:13:44 -03:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE imgtool: Add security counter to image manifest 2020-02-25 23:43:12 +01:00
README.md Post v1.7.0 action 2020-11-25 18:01:44 +01:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-ec256-priv.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-ec256-pub.pem sim: add EC256 encryption key 2019-11-06 06:55:25 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-x25519-priv.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
enc-x25519-pub.pem keys: Add sample x25519 priv/pub keys 2020-04-10 17:56:14 -03:00
go.mod doc: fix github urls to use the new org 2020-11-10 14:19:19 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Preps for 1.7.0 release 2020-11-25 16:26:11 +01:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00

README.md

mcuboot

Package on PyPI Coverity Scan Build Status Build Status (Sim) Build Status (Mynewt) Publishing Status (imgtool) Build Status (Travis CI) Apache 2.0

This is mcuboot version 1.8.0-dev

MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables simple software upgrades.

MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating. Currently, mcuboot works with both the Apache Mynewt and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.

Using MCUboot

Instructions for different operating systems can be found here:

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To participate please visit:

MCUBoot GitHub Issues

Issues were previously tracked on MCUboot JIRA , but it is now deprecated.

Browsing

Information and documentation on the bootloader are stored within the source.

It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained

For more information in the source, here are some pointers:

  • boot/bootutil: The core of the bootloader itself.
  • boot/boot_serial: Support for serial upgrade within the bootloader itself.
  • boot/zephyr: Port of the bootloader to Zephyr
  • boot/mynewt: Mynewt bootloader app
  • imgtool: A tool to securely sign firmware images for booting by mcuboot.
  • sim: A bootloader simulator for testing and regression

Joining

Developers welcome!