mcuboot/sim/mcuboot-sys/Cargo.toml

105 lines
2.6 KiB
TOML

[package]
name = "mcuboot-sys"
version = "0.1.0"
authors = ["David Brown <david.brown@linaro.org>"]
description = "A simple wrapper around the mcuboot code."
build = "build.rs"
publish = false
edition = "2021"
[features]
# By default, build with simplistic signature verification.
default = []
# Verify RSA signatures. Note that at this time, the C code will not
# compile with both sig-rsa and sig-ecdsa enabled.
sig-rsa = []
# Verify RSA-3072 signatures.
sig-rsa3072 = []
# Verify ECDSA (secp256r1) signatures.
sig-ecdsa = []
# Verify ECDSA (secp256r1) signatures using mbed TLS
sig-ecdsa-mbedtls = []
# Verify ECDSA (p256 or p384) signatures using PSA Crypto API
sig-ecdsa-psa = []
# Enable P384 Curve support (instead of P256) for PSA Crypto
sig-p384 = []
# Verify ED25519 signatures.
sig-ed25519 = []
# Overwrite only upgrade
overwrite-only = []
swap-move = []
# Disable validation of the primary slot
validate-primary-slot = []
# Encrypt image in the secondary slot using RSA-OAEP-2048
enc-rsa = []
# Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048
enc-aes256-rsa = []
# Encrypt image in the secondary slot using AES-KW-128
enc-kw = []
# Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256
enc-aes256-kw = []
# Encrypt image in the secondary slot using ECIES-P256
enc-ec256 = []
# Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256
enc-aes256-ec256 = []
# Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS
enc-ec256-mbedtls = []
# Encrypt image in the secondary slot using ECIES-X25519
enc-x25519 = []
# Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519
enc-aes256-x25519 = []
# Allow bootstrapping an empty/invalid primary slot from a valid secondary slot
bootstrap = []
# Support multiple images (currently 2 instead of 1).
multiimage = []
# Support simulation of ram-loading. No swaps are performed, and the
# image is copied to RAM before loading it.
ram-load = []
# Support simulation of direct XIP. No swaps are performed, the image
# is directly executed out of whichever partition contains the most
# appropriate image.
direct-xip = []
# Check (in software) against version downgrades.
downgrade-prevention = []
# Support images with 32-byte maximum write alignment value.
max-align-32 = []
# Enable hardware rollback protection
hw-rollback-protection = []
# Enable the PSA Crypto APIs where supported for cryptography related operations.
psa-crypto-api = []
[build-dependencies]
cc = "1.0.25"
[dependencies]
libc = "0.2"
log = "0.4"
simflash = { path = "../simflash" }