Secure boot for 32-bit Microcontrollers!
Go to file
Fabio Utzig edbabcf623 imgtool: allow address adjustment in output hex
Add a new flag `-x` (or `--hex_addr`) which adjusts the memory address
where this file has to be written to. This is useful when generating
upgrade images that will go to the secondary slot, in cases where the
user is not using mcumgr or some other delivery mechanism, and has to
manually adjust the addresses using `objcopy`.

Also when using hex files, image padding now only adds a segment with
the magic at the end instead of filling the whole output with `0xff`.

Signed-off-by: Fabio Utzig <utzig@apache.org>
2019-10-15 12:32:33 -03:00
boot Rename ext/mbedtls to ext/mbedtls-asn1 2019-10-15 09:29:20 -06:00
ci Add pkgpath to Mynewt key_files 2019-04-17 18:12:23 -03:00
docs Fix CVE-2019-16892 2019-10-15 12:28:34 -03:00
ext Upgrade mbedtls submodule to 2.16.3 2019-10-15 09:29:20 -06:00
ptest Update Cargo.lock files 2019-07-25 16:24:20 -05:00
samples Use Ninja instead of Makefiles for Zephyr 2019-07-29 11:29:21 -05:00
scripts imgtool: allow address adjustment in output hex 2019-10-15 12:32:33 -03:00
sim Move mbedtls submodule from sim to ext 2019-10-15 09:29:20 -06:00
testplan/mynewt apps: update dependencies & syscfgs as per mcumgr 2019-10-10 18:03:59 -03:00
.gitignore Add imgtool publishing support 2019-01-08 07:29:24 -02:00
.gitmodules Move mbedtls submodule from sim to ext 2019-10-15 09:29:20 -06:00
.travis.yml Enable already fixed test in Travis-CI 2019-09-09 10:00:09 -03:00
LICENSE Add mention to tinycrypt LICENSE in main LICENSE 2017-09-12 10:15:24 -06:00
NOTICE Boot: Extend flash layout for multiple images 2019-07-23 09:11:34 -05:00
README.md Release notes for 1.4.0-rc1 2019-10-08 10:45:14 -07:00
enc-aes128kw.b64 Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-priv.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
enc-rsa2048-pub.pem Add sample encryption keys 2018-10-12 13:36:13 -03:00
project.yml Update mynewt-core repo name 2018-08-03 15:31:39 -07:00
repository.yml Release notes for 1.4.0-rc1 2019-10-08 10:45:14 -07:00
root-ec-p256-pkcs8.pem Add ECDSA-P256 key in PKCS#8 format 2019-01-18 09:44:48 -07:00
root-ec-p256.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-ed25519.pem Add bootutil support for ed25519 validation 2019-06-13 19:21:05 -03:00
root-rsa-2048.pem zephyr: Support RSA, and ECDSA P-256 signing 2017-02-02 08:39:18 -07:00
root-rsa-3072.pem Add simulator support for RSA-3072 sigs 2019-05-16 14:01:19 -03:00
version.yml Revert Mynewt version metadata 2019-07-12 07:58:43 -03:00

README.md

mcuboot

Coverity Scan Build Status Build/Test

This is mcuboot, version 1.4.0-rc1

MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables easy software upgrade.

MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating system it works with. Currently, mcuboot works with both the Apache Mynewt, and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.

Using MCUboot

Instructions for different operating systems can be found here:

Roadmap

The issues being planned and worked on are tracked using GitHub issues. To participate please visit:

MCUBoot GitHub Issues

Issues were previously tracked on MCUboot JIRA , but it is now deprecated.

Browsing

Information and documentation on the bootloader are stored within the source.

It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained

For more information in the source, here are some pointers:

  • boot/bootutil: The core of the bootloader itself.
  • boot/boot_serial: Support for serial upgrade within the bootloader itself.
  • boot/zephyr: Port of the bootloader to Zephyr
  • boot/mynewt: Mynewt bootloader app
  • imgtool: A tool to securely sign firmware images for booting by mcuboot.
  • sim: A bootloader simulator for testing and regression

Joining

Developers welcome!