1. 10 Nov, 2020 4 commits
  2. 06 Nov, 2020 2 commits
  3. 04 Nov, 2020 1 commit
    • George Beckstein's avatar
      Remove mbed-os library · 30898fc0
      George Beckstein authored
      
      
      This commit reverts the addition of an mbed-os.lib file introduced with the Mbed-OS port. Mbed-OS build tools use .lib files to pull in additional dependencies automatically with a single command. The intended usage of mcuboot with mbed-os is to clone mcuboot *next to* mbed-os, rather than mbed-os inside mcuboot.
      
      Signed-off-by: default avatarGeorge Beckstein <becksteing@embeddedplanet.com>
      30898fc0
  4. 03 Nov, 2020 3 commits
    • George Beckstein's avatar
      Mbed-OS porting layer implementation for mcuboot · d82afbfa
      George Beckstein authored
      This PR provides a porting layer implementation and framework for building an mcuboot-based bootloader with Mbed-OS. Some symbols are not provided by the Mbed-OS port within mcuboot, namely:
      
      - The secondary storage device (see below)
      - The signing keys
      - The encryption keys, if used
      
      Use of this port is demonstrated by the following projects:
      - https://github.com/AGlass0fMilk/mbed-mcuboot-demo (a complete mcuboot/Mbed-OS-based bootloader)
      - https://github.com/AGlass0fMilk/mbed-mcuboot-blinky
      
       (example showing how to make an Mbed-OS application that is bootable by mcuboot)
      
      Memory porting implementation:
      
      The underlying implemenation uses Mbed's BlockDevice API as the storage backend for mcuboot's memory operations. This provides a very flexible way of configuring the location and layout of the secondary flash storage area. To build an mcuboot-based bootloader with Mbed-OS, the user must implement a hook function, mbed::BlockDevice* get_secondary_bd(), to provide the secondary BlockDevice that mcuboot will use.
      
      The signing and encryption keys must also be provided by the user. They can be generated using the existing imgtool utility in the same manner used by Zephyr. There are no automated build steps currently provided by Mbed-OS to sign/encrypt build artifacts.
      
      Known limitations:
      
      The update candidate encryption features have not yet been fully tested. A truly secure implementation will require integration with Mbed's TRNG API in the future to inhibit side-channel attacks on the decryption process.
      
      The TinyCrypt backend is currently only supported for Mbed-OS builds when building with the GCC toolchain. The new cmake-based Mbed-OS build system will fix the underlying issue (file name uniqueness).
      
      Signed-off-by: default avatarGeorge Beckstein <becksteing@embeddedplanet.com>
      Signed-off-by: default avatarEvelyne Donnaes <evelyne.donnaes@arm.com>
      Signed-off-by: default avatarLingkai Dong <lingkai.dong@arm.com>
      
      Co-authored-by: default avatarLingkai Dong <lingkai.dong@arm.com>
      Co-authored-by: default avatarFabio Utzig <fabio.utzig@nordicsemi.no>
      d82afbfa
    • Andy Gross's avatar
      boot: Add vendor defined TLV ranges · ea30ef3c
      Andy Gross authored
      
      
      This patch adds comments to reserve off a portion of the available TLV range
      for use by vendors for proprietary TLV types.
      
      Signed-off-by: default avatarAndy Gross <andy.gross@juul.com>
      ea30ef3c
    • David Vincze's avatar
      Boot: Add 'revert' support to direct-xip mode · 505fba25
      David Vincze authored
      
      
      The 'revert' mechanism in direct-xip is similar to the one in swap mode.
      It requires the trailer magic to be added to the signed image. When a
      reboot happens without the image being confirmed at runtime (without the
      image_ok flag being set), the bootloader considers the image faulty and
      erases it. After this it will attempt to boot the previous image
      instead. The images can also be made permanent (marked as confirmed in
      advance) just like in swap mode.
      
      Change-Id: Ibde9361d4a7302dd8efbb277b691b71eca0ca877
      Signed-off-by: default avatarDavid Vincze <david.vincze@linaro.org>
      505fba25
  5. 30 Oct, 2020 6 commits
  6. 29 Oct, 2020 2 commits
  7. 28 Oct, 2020 7 commits
  8. 27 Oct, 2020 1 commit
  9. 23 Oct, 2020 2 commits
  10. 22 Oct, 2020 1 commit
  11. 21 Oct, 2020 3 commits
  12. 13 Oct, 2020 3 commits
  13. 08 Oct, 2020 2 commits
  14. 07 Oct, 2020 3 commits