-
Notifications
You must be signed in to change notification settings - Fork 221
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ASN.1 Decoding bypass that allows to reduce size of flash when ED25519 is used #347
base: main
Are you sure you want to change the base?
Commits on Jun 28, 2024
-
[nrf noup] github: Add a commit tags check workflow
Use the generic commit-tags action to provide sauce tag checks. Signed-off-by: Carles Cufi <[email protected]> (cherry picked from commit 786e351)
Configuration menu - View commit details
-
Copy full SHA for 195145b - Browse repository at this point
Copy the full SHA 195145bView commit details -
[nrf noup] zephyr: Remove duplication from cmake
Removes the `add_subdirectory` of nrfxlib it will still check that the nrfxlib is located outside the mcuboot directory. Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 5c94965)
Configuration menu - View commit details
-
Copy full SHA for 312ba86 - Browse repository at this point
Copy the full SHA 312ba86View commit details -
[nrf noup] zephyr: add 'minimal' configuration files
Add prj_minimal.conf, a Kconfig fragment to be used for minimally sized image production. The minimal fragment has been simplified for only external crypto. Move partition sizing into Kconfig to be consistent with the method used by b0. Using this fragment with prj_minimal.conf makes MCUboot < 16kB for all nRF devices (9160 still needs 32kB partition). Ref: NCSDK-6704 Signed-off-by: Stephen Stauts <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Sebastian Bøe <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 64740f7)
Configuration menu - View commit details
-
Copy full SHA for cd1c995 - Browse repository at this point
Copy the full SHA cd1c995View commit details -
[nrf noup] boards: add support for Thingy:91
Adds project configurations for the two systems on the Thingy:91 (PCA-20035) board. The bootloader that is factory-programmed on thing91 does not support ECDSA signature type. Hence this commit also sets the signature type to RSA for applications built for Thingy:91. Signed-off-by: Bernt Johan Damslora <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Jon Helge Nistad <[email protected]> Signed-off-by: Balaji Srinivasan <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Marek Pieta <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit de32681)
Configuration menu - View commit details
-
Copy full SHA for a53f78d - Browse repository at this point
Copy the full SHA a53f78dView commit details -
[nrf noup] boot: Add shared crypto for ECDSA and SHA
* Add functions for ecdsa_verify_secp256r1 and sha256 to use the shared crypto API * Add Kconfig and CMake variables for selecting shared crypto when using ecdsa * Add custom section to project for placing the API section in the correct location in flash * Add kconfig fragment for using external crypto Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 55683e3)
Configuration menu - View commit details
-
Copy full SHA for 0faa8b2 - Browse repository at this point
Copy the full SHA 0faa8b2View commit details -
[nrf noup] crypto: ecdsa: Add required signature decoding
The CC310 and bl_crypto require decoded signature instead of raw ASN.1 Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit ba55561)
Configuration menu - View commit details
-
Copy full SHA for a42e9cc - Browse repository at this point
Copy the full SHA a42e9ccView commit details -
[nrf noup] crypto: ecdsa: Fix shared crypto MCUBoot EXT_ABI
After the upmerge using external crypto from NSIB in MCUBoot resulted in build failures. This commit fixes the build failures but also fixes a change in the API call which resulted in `-102` error when calling the verify function. Ref. NCSDK-23994 Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit a0c21e2)
Configuration menu - View commit details
-
Copy full SHA for 895c76b - Browse repository at this point
Copy the full SHA 895c76bView commit details -
[nrf noup] zephyr: Set at least provide EXT_API
-This sets the provide EXT_API to be at least optional when the external_crypto is being used. Ref: NCSDK-12021 Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit fcd7281)
Configuration menu - View commit details
-
Copy full SHA for ff53382 - Browse repository at this point
Copy the full SHA ff53382View commit details -
[nrf noup] zephyr: Restore default RTC user channel count
The default value of CONFIG_NRF_RTC_TIMER_USER_CHAN_COUNT for nRF52 SOCs has been changed from 0 to 3, but it makes MCUBoot get stuck on erasing flash pages when swapping two images. Restore the previous value until the RTC issue is resolved (see NCSDK-14427) Signed-off-by: Damian Krolik <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit a01d30a)
Configuration menu - View commit details
-
Copy full SHA for cffdc52 - Browse repository at this point
Copy the full SHA cffdc52View commit details -
[nrf noup] boards: thingy91x: add board config
This patch adds board configuration for the Thingy:91 X. Signed-off-by: Maximilian Deubel <[email protected]> (cherry picked from commit 3c2f2ff)
Configuration menu - View commit details
-
Copy full SHA for 916a9dc - Browse repository at this point
Copy the full SHA 916a9dcView commit details -
[nrf noup] treewide: add NCS partition manager support
Partition Manager is an nRF Connect SDK component which uses yaml files to resolve flash partition placement with a holistic view of the device. This component's MCUboot portions began life as upstream mcuboot PR#430. This added support for being built as a sub image from the downstream Nordic patch set for a zephyr multi image build system (mcuboot 430 was combined with effor submitted to upstream zephyr as PR#13672, which was ultimately reworked after being rejected for mainline at the ELCE 2019 conference in Lyon). It has since evolved over time. This is the version that will go into NCS v1.3. It features: - page size aligned partitions for all partitions used by mcuboot. - image swaps without scratch partitions Add support for configurations where there exists two primary slots but only one secondary slot, which is shared. These two primary slots are the regular application and B1. B1 can be either S0 or S1 depending on the state of the device. Decide where an upgrade should be stored by looking at the vector table. Provide update candidates for both s0 and s1. These candidates must be signed with mcuboot after being signed by b0. Additional notes: - we make update.hex without trailer data This is needed for serial recovery to work using hex files. Prior to this the update.hex got TLV data at the end of the partition, which caused many blank pages to be included, which made it hard to use in a serial recovery scheme. Instead, make update.hex without TLV data at the end, and provide a new file test_update.hex which contains the TLV data, and can be directly flashed to test the upgrade procedure. - we use a function for signing the application as future-proofing for when other components must be signed as well - this includes an update to single image applications that enables support for partition manager; when single image DFU is used, a scratch partition is not needed. - In NCS, image 1 primary slot is the upgrade bank for mcuboot (IE S0 or S1 depending on the active slot). It is not required that this slot contains any valid data. - The nRF boards all have a single flash page size, and partition manager deals with the size of the update partitions and so on, so we must skip a boot_slots_compatible() check to avoid getting an error. - There is no need to verify the target when using partition manager. - We lock mcuboot using fprotect before jumping, to enable the secure boot property of the system. - Call fw_info_ext_api_provide() before booting if EXT_API_PROVIDE EXT_API is enabled. This is relevant only when the immutable bootloader has booted mcuboot. Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Øyvind Rønningstad <[email protected]> Signed-off-by: Sebastian Bøe <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Andrzej Głąbek <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Pawel Dunaj <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Vidar Berg <[email protected]> Signed-off-by: Draus, Sebastian <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Joakim Andersson <[email protected]> Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 518617a)
Configuration menu - View commit details
-
Copy full SHA for 9555ca7 - Browse repository at this point
Copy the full SHA 9555ca7View commit details -
[nrf noup] boot: nrf53-specific customizations
- Add network core bootloader implementation Enables network core updates of nrf53 using MCUBoot by identifying images through their start addresses. Also implements the control and transfer using the PCD module. - Add support for multi image DFU using partition manager. - Add check for netcore addr if NSIB is enabled so netcore updates works - boot: zephyr: move thingy53_nrf5340_cpuapp.conf downstream Moved the board configuration for Thingy:53 Application Core to the nRF Connect SDK MCUboot downstream repository. The configuration file contains references to the Kconfig modules that are only available in the nRF Connect SDK. The current configuration is set up to work in the nRF Connect SDK environment and cannot be used upstream. - pm: enable ram flash partition using common flag This patch makes mcuboot_primary_1 ram-flash partition selectable using CONFIG_NRF53_MCUBOOT_PRIMARY_1_RAM_FLASH property. This is needed since CONFIG_NRF53_MULTI_IMAGE_UPDATE become not only configuration which requires that partition. - MCUBoot configures USB CDC by its own. There is no need for BOARD_SERIAL_BACKEND_CDC_ACM option to configure anything which is later overwritten anyway. Jira: NCSDK-18596 Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Kamil Piszczek <[email protected]> Signed-off-by: Ole Sæther <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Simon Iversen <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Mateusz Kapala <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 42e43d0)
Configuration menu - View commit details
-
Copy full SHA for cab8ef9 - Browse repository at this point
Copy the full SHA cab8ef9View commit details -
[nrf noup] zephyr: clean peripherals state before boot
Do some cleanup of nRF peripherals. This is necessary since Zephyr doesn't have any driver deinitialization functionality, and we'd like to leave peripherals in a more predictable state before booting the Zephyr image. This should be re-worked when the zephyr driver model allows us to deinitialize devices cleanly before jumping to the chain-loaded image. Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Øyvind Rønningstad <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 3b2a5ba)
Configuration menu - View commit details
-
Copy full SHA for c033da0 - Browse repository at this point
Copy the full SHA c033da0View commit details -
[nrf noup] zephyr: Clean up non-secure RAM if enabled
To ensure that MCUBoot does not leak keys or other material through memory to non-secure side we clear the memory before jumping to the next image. Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> Signed-off-by: Ole Sæther <[email protected]> (cherry picked from commit 047d463)
Configuration menu - View commit details
-
Copy full SHA for cc6103b - Browse repository at this point
Copy the full SHA cc6103bView commit details -
[nrf noup] loader: Fix reading reset addr to support ext flash
When mcuboot_secondary is on external flash, the image header cannot dircetly be accessed via secondary_fa->fa_off. Instead the provided function boot_img_hdr() is used now. Additionally a similar issue is present when trying to read the address of the reset handler. For this flash_area_read() is used now. With this patch is possible to have the update partiton mcuboot_secondary on external flash and update a updatable bootloader (mcuboot) in s0 and/or s1. Signed-off-by: Christian Taedcke <[email protected]> Signed-off-by: Ole Sæther <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 2dac63a)
Configuration menu - View commit details
-
Copy full SHA for a3d0772 - Browse repository at this point
Copy the full SHA a3d0772View commit details -
[nrf noup] zephyr: Fix path variables
Fixes path variables to use the proper Zephyr module variables Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit c28fa1d)
Configuration menu - View commit details
-
Copy full SHA for 6f1ba91 - Browse repository at this point
Copy the full SHA 6f1ba91View commit details -
[nrf noup] loader: Do not check reset vector for XIP image
The XIP image, 2, does not have reset vector. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit d798de3)
Configuration menu - View commit details
-
Copy full SHA for 5fe56c9 - Browse repository at this point
Copy the full SHA 5fe56c9View commit details -
[nrf noup] zephyr: Add RAM flash configuration to cache for sysbuild
Puts the flash simulation configurtion into cache variables that can be used by other applications and CMake code to know specifics on the simulated flash details Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit af27205)
Configuration menu - View commit details
-
Copy full SHA for 33effae - Browse repository at this point
Copy the full SHA 33effaeView commit details -
[nrf noup] zephyr: Boot even if EXT_ABI is not provided
This removes the `return;` to ensure that the application is booted even if EXT_ABI is not provided to the application because it does not include `FW_INFO`. Added a bit more description to the error messages when FW_INFO is not found and EXT_ABI is not able to be provided to the next image. Ref. NCSDK-24132 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 41cc274)
Configuration menu - View commit details
-
Copy full SHA for 62b5dc1 - Browse repository at this point
Copy the full SHA 62b5dc1View commit details -
[nrf noup] loader: Add firmware version check downgrade prevention
For nRF53, the only existing version number metadata is stored in the `firmware_info` structure in the network core. This utilizes PCD to read out the version number and compares it against the version number found in the secondary slot for the network core. Ref. NCSDK-21379 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 8e91ec1)
Configuration menu - View commit details
-
Copy full SHA for b045778 - Browse repository at this point
Copy the full SHA b045778View commit details -
[nrf noup] boards: thingy53: disable GPIO ISR support
Change disables GPIO interrupt support in Zephyr GPIO driver, which is not obligatory for MCUboot. This is needed to reduce memory footprint. Signed-off-by: Nikodem Kastelik <[email protected]> (cherry picked from commit 86af2de)
Configuration menu - View commit details
-
Copy full SHA for 7377421 - Browse repository at this point
Copy the full SHA 7377421View commit details -
[nrf noup] boot/zephyr/boards: nRF54l15pdk ext flash cfg
Added configuration which allows to build MCUboot for nrf54l15pdk_nrf54l15_cpuapp with external flash used for the secondary slot. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 78bc87c)
Configuration menu - View commit details
-
Copy full SHA for 0fcc1f8 - Browse repository at this point
Copy the full SHA 0fcc1f8View commit details -
[nrf noup] loader: work-around for multi-image builds
Seems multi-image dependencies are not supported for multi-image in NCS yet. This is a workaround which reverts some lines to restore previous MCUboot behavior, so that Immutable bootloader + MCUBoot type builds will work. Ref. NCSDK-8681 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 4ce3844)
Configuration menu - View commit details
-
Copy full SHA for 843ee8e - Browse repository at this point
Copy the full SHA 843ee8eView commit details -
[nrf noup] loader: Fix missing PCD define check
Fixes a missing PCD define check, an image might have the network core partition layout set but if PCD support is not enabled then it should not assume that PCD support is part of mcuboot. Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 150a1d4)
Configuration menu - View commit details
-
Copy full SHA for f15d384 - Browse repository at this point
Copy the full SHA f15d384View commit details -
[nrf noup] boot: Add support for NSIB and multi-image
This adds support for using both NSIB and the multi-image configuration in MCUboot. Before this was not possible due to upgradable bootloader support through NSIB was using the `UPDATEABLE_IMAGE_NUMBER` configuration to update the updateable bootloader. In this commit we change from using `FLASH_AREA_IMAGE_PRIMARY` to get the flash area ID to using the bootloader state where we set the flash area ID of the free updatable bootloader slot if the image is intended for this slot. Ref. NCSDK-19223 Ref. NCSDK-23305 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 3ec5084)
Configuration menu - View commit details
-
Copy full SHA for ce42cac - Browse repository at this point
Copy the full SHA ce42cacView commit details -
[nrf noup] sysflash: Move partition manager definitions to pm_sysflash.h
Making sysflash.h and pm_sysflash.h more readable. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 51b7a3f)
Configuration menu - View commit details
-
Copy full SHA for 6cecb1c - Browse repository at this point
Copy the full SHA 6cecb1cView commit details -
[nrf noup] sysflash: Add support for three images
The commit modifies pm_sysflash.h to add support for three application images. Ref. NCSDK-19223 Signed-off-by: Dominik Ermel <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 9c67351)
Configuration menu - View commit details
-
Copy full SHA for d2d11bf - Browse repository at this point
Copy the full SHA d2d11bfView commit details -
[nrf noup] loader: introduced cleanup of unusable secondary slot
Added procedure which clean-up content of all the secondary slot which contains valid header but couldn't be assigned to any of supported primary images. This behavior is needed when configuration allows to use one secondary slot for collecting image for multiple primary slots. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 8f4b472)
Configuration menu - View commit details
-
Copy full SHA for ee67c04 - Browse repository at this point
Copy the full SHA ee67c04View commit details -
[nrf noup] boards: nrf54l15: Disable FPROTECT
FPROTECT is not suppored yet for nrf54l15. Signed-off-by: Grzegorz Chwierut <[email protected]> Signed-off-by: Gerard Marull-Paretas <[email protected]> (cherry picked from commit 0b5810d)
Configuration menu - View commit details
-
Copy full SHA for ec59c38 - Browse repository at this point
Copy the full SHA ec59c38View commit details -
[nrf noup] loader: remove cleanup for direct xip mode
Move ifdefs just to not add code for cleanup unusable slot when direct xip mode is enabled to avoid warnings. Signed-off-by: Grzegorz Chwierut <[email protected]> (cherry picked from commit 650d11c)
Configuration menu - View commit details
-
Copy full SHA for 3853d26 - Browse repository at this point
Copy the full SHA 3853d26View commit details -
[nrf noup] zephyr: Clean up non-secure RAM if enabled
fixup! [nrf noup] zephyr: Clean up non-secure RAM if enabled Add support for nrf54l15 UARTE20 and UARTE30. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 0611b4c)
Configuration menu - View commit details
-
Copy full SHA for b305c3d - Browse repository at this point
Copy the full SHA b305c3dView commit details -
[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash partition
Added DTS with partitioning which involves external flash as place for slo1_partition. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit efe6681)
Configuration menu - View commit details
-
Copy full SHA for 826a407 - Browse repository at this point
Copy the full SHA 826a407View commit details -
[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash update
This patch supplements the configuration for external flash so MCUboot can be build with FILE_SUFFIX="ext_flash" for the nrf54l15pdk instead of explicitly configuration specification. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 3131c92)
Configuration menu - View commit details
-
Copy full SHA for 0656a67 - Browse repository at this point
Copy the full SHA 0656a67View commit details -
[nrf noup] boards: thingy91x: enable serial recovery
This patch disbales MCUBoot logging and enables serial recovery for the Thingy:91. Signed-off-by: Maximilian Deubel <[email protected]> Signed-off-by: Bernt Johan Damslora <[email protected]> (cherry picked from commit f67a11a)
Configuration menu - View commit details
-
Copy full SHA for 152f641 - Browse repository at this point
Copy the full SHA 152f641View commit details -
[nrf noup] boot: zephyr: Disable boot banner if NCS_BOOT_BANNER is used
Mcuboot's boot banner should not be used if NCS boot banner is enabled. Signed-off-by: Robert Lubos <[email protected]> (cherry picked from commit 7b018cb)
Configuration menu - View commit details
-
Copy full SHA for f0a0c50 - Browse repository at this point
Copy the full SHA f0a0c50View commit details -
[nrf noup] boot/zephyr: fix fw_info search
By the upstream patch the vt get now the pointer to the copy of the arm_vector instead of original. This patch fixes address of the firmware which is to be taken by the fw_info_find. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 3be724f)
Configuration menu - View commit details
-
Copy full SHA for f3ae1af - Browse repository at this point
Copy the full SHA f3ae1afView commit details -
[nrf noup] Revert of zephyr: arm: Update reading the flash image rese…
…t vector This is revert of upstream commit 453096b which was supposed to allow picking interrupt vector table from flash area but the whole modification unfortunately misunderstood difference between flash device ID and flash area ID. The commit is not important for sdk-nrf and requires re-design and fixing upstream. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit f1e1675)
Configuration menu - View commit details
-
Copy full SHA for 0f317a2 - Browse repository at this point
Copy the full SHA 0f317a2View commit details -
[nrf noup] zephyr: disabled EXT_API_ATLEAST_OPTIONAL
Disabled at last optional EXT_API when external-crypto is enabled. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 1d02303)
Configuration menu - View commit details
-
Copy full SHA for cc42516 - Browse repository at this point
Copy the full SHA cc42516View commit details -
[nrf noup] zephyr/boards: fix nrf54l15pdk ext flash dts overlay
Align to changes in DTS: renamed: rram0 -> cpuapp_rram sized up cpauapp_rram region szie as part of it was reserved for cpuflpr_rram (which is not used by this config). Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit f1c2b8c)
Configuration menu - View commit details
-
Copy full SHA for 4f84ba9 - Browse repository at this point
Copy the full SHA 4f84ba9View commit details -
[nrf noup] boot: zephyr: Add NCS boot banner
Adds a boot banner which shows as MCUboot Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 6869a65)
Configuration menu - View commit details
-
Copy full SHA for d639f90 - Browse repository at this point
Copy the full SHA d639f90View commit details -
[nrf noup] boot/../loader: skip downgrade prevention for s1/s0
This patch introduces skip on checking downgrade for s1/s0 upgrade image (chain-loaded by NSIB). which is used for upgrade MCUboot instance itself. Reason is that sdk-mcuboot has not access to semantic version of its own image. I also shouldn't touch HW counter used for hardware downgrade prevention for the application image (which was the case). HW counters for s0/s1 image are owned by NSIB because its role is to prevnt dongrades of s0/s1 MCUboot. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 776ee26)
Configuration menu - View commit details
-
Copy full SHA for d9fe011 - Browse repository at this point
Copy the full SHA d9fe011View commit details -
[nrf noup] boot/../loader: reboot after updating s0/s1
As this is MCUboot updating itself, it should reboot the device so NSIB will chainload the update MCUboot Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 8541955)
Configuration menu - View commit details
-
Copy full SHA for daf2946 - Browse repository at this point
Copy the full SHA daf2946View commit details
Commits on Sep 11, 2024
-
[nrf noup] Remove secure boot debug Kconfig
fixup! [nrf noup] zephyr: add 'minimal' configuration files Removes setting a now removed Kconfig option Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e66169a - Browse repository at this point
Copy the full SHA e66169aView commit details
Commits on Sep 17, 2024
-
[nrf noup] bootutil: loader: Fix netcore address checking
Fixes an issues with wrongly checking the network core reset address Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5db1981 - Browse repository at this point
Copy the full SHA 5db1981View commit details
Commits on Sep 18, 2024
-
[nrf fromtree] boot: zephyr: boards: Add nrf54l15dk configuration
Adds the configuration for this board Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 242db1a)
Configuration menu - View commit details
-
Copy full SHA for 9ac6f76 - Browse repository at this point
Copy the full SHA 9ac6f76View commit details -
[nrf noup] boards: nrf54l15dk: Disable FPROTECT
FPROTECT is not suppored for nrf54l15dk. Signed-off-by: Andrzej Puzdrowski <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f30dce1 - Browse repository at this point
Copy the full SHA f30dce1View commit details
Commits on Sep 24, 2024
-
[nrf fromtree] bootutil: loader: Add state to boot_is_header_valid() …
…function Adds the state object to this function so it can be referenced Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit dbb5c78)
Configuration menu - View commit details
-
Copy full SHA for 0c07689 - Browse repository at this point
Copy the full SHA 0c07689View commit details -
[nrf fromtree] bootutil: loader: Verify image header before checking …
…image Changes the order of operations to validate the image header before checking the image, it does not make sense to check the image if the header itself is invalid Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 2939d30)
Configuration menu - View commit details
-
Copy full SHA for 4e81dcd - Browse repository at this point
Copy the full SHA 4e81dcdView commit details -
[nrf fromtree] docs: release-notes: Add note on bootutil changes
Adds notes on the changed bootutil features Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit bf13555)
Configuration menu - View commit details
-
Copy full SHA for 4e74426 - Browse repository at this point
Copy the full SHA 4e74426View commit details -
[nrf fromtree] bootutil: Add compressed image flags and TLV
Adds some flags to indicate if the data of an image is compressed (lzma1 and lzma2) and adds new TLVs for compressed images relating to the hash, signature and size of the decompressed image data, this allows the image to be validated before decompressing, then validated after decompression to ensure an image is always valid for a device Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 91d86b8)
Configuration menu - View commit details
-
Copy full SHA for da14989 - Browse repository at this point
Copy the full SHA da14989View commit details -
[nrf fromtree] zephyr: Add Kconfig for decompression
Adds a Kconfig allowing the decompression option to be selected Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 0c1ddf7)
Configuration menu - View commit details
-
Copy full SHA for 53722da - Browse repository at this point
Copy the full SHA 53722daView commit details -
[nrf fromtree] bootutil: loader: Remove encrypted/compressed images w…
…ithout support Checks if images have compressed or encrypted image flags and, if so, and those options are not enabled in that MCUboot build, will class the images as invalid and delete them (these images cannot be used without support anyway) Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 206c7e7)
Configuration menu - View commit details
-
Copy full SHA for 16e15ce - Browse repository at this point
Copy the full SHA 16e15ceView commit details -
[nrf fromtree] bootutil: loader: Remove images with conflicting flags
Marks images as invalid if they have conflicting flags, e.g. more than one type of LZMA compression or more than one type of encryption Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 4d85e29)
Configuration menu - View commit details
-
Copy full SHA for cd557e1 - Browse repository at this point
Copy the full SHA cd557e1View commit details -
[nrf fromtree] bootutil: loader: Add protected TLV size to image size…
… check The protected TLV section was not included in the size check of if an image could fit into a slot, which means that it was possible for file to be deemed as OK for storing but then failing due to insufficient flash space during the update Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit feb9265)
Configuration menu - View commit details
-
Copy full SHA for 7d67371 - Browse repository at this point
Copy the full SHA 7d67371View commit details -
[nrf fromtree] booutil: swap_scratch: Do not check sectors with compr…
…ession When compression is used, it allows for the secondary slot to be smaller than the primary slot, therefore do not ensure that the number of sectors in each slot are the same Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 2931f9d)
Configuration menu - View commit details
-
Copy full SHA for 21bac2b - Browse repository at this point
Copy the full SHA 21bac2bView commit details -
[nrf fromtree] docs: release-notes: Add note on changes
Adds release notes based on these changes Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit ebf60e0)
Configuration menu - View commit details
-
Copy full SHA for 5eaeac3 - Browse repository at this point
Copy the full SHA 5eaeac3View commit details -
[nrf noup] zephyr: Add support for compressed image updates
Adds support for LZMA-compressed firmware updates Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 92121b1 - Browse repository at this point
Copy the full SHA 92121b1View commit details
Commits on Sep 26, 2024
-
Revert "[nrf noup] crypto: ecdsa: Fix shared crypto MCUBoot EXT_ABI"
This reverts commit 895c76b. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c92b293 - Browse repository at this point
Copy the full SHA c92b293View commit details -
Revert "[nrf noup] crypto: ecdsa: Add required signature decoding"
This reverts commit a42e9cc. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3f541bf - Browse repository at this point
Copy the full SHA 3f541bfView commit details -
Revert "[nrf noup] zephyr: disabled EXT_API_ATLEAST_OPTIONAL"
This reverts commit cc42516. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2b1a6a4 - Browse repository at this point
Copy the full SHA 2b1a6a4View commit details -
Revert "[nrf noup] zephyr: Set at least provide EXT_API"
This reverts commit ff53382. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 48bf175 - Browse repository at this point
Copy the full SHA 48bf175View commit details -
Revert "[nrf noup] boot: Add shared crypto for ECDSA and SHA"
This reverts commit 0faa8b2. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0cdbc88 - Browse repository at this point
Copy the full SHA 0cdbc88View commit details -
[nrf fromtree] boot: SHA512 verification
adds TLV and Kconfig to decouple verification from other options. Signed-off-by: Mateusz Michalek <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 41df52e)
Configuration menu - View commit details
-
Copy full SHA for 2d66e66 - Browse repository at this point
Copy the full SHA 2d66e66View commit details -
[nrf noup] boot: Add shared crypto for ECDSA and SHA
* Add functions for ecdsa_verify_secp256r1 and sha256 to use the shared crypto API * Add Kconfig and CMake variables for selecting shared crypto when using ecdsa * Add custom section to project for placing the API section in the correct location in flash * Add kconfig fragment for using external crypto Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 55683e3) (cherry picked from commit 0faa8b2) (cherry picked from commit a42e9cc) (cherry picked from commit 895c76b) (cherry picked from commit ff53382) (cherry picked from commit cc42516)
Configuration menu - View commit details
-
Copy full SHA for c2ff45b - Browse repository at this point
Copy the full SHA c2ff45bView commit details -
[nrf fromtree] imgtool: Fix verify command for edcsa-p384 signed images
Fixed hash algorithm defaults to SHA256 in case no key provided. Verification improved by adding check for key - tlv mismatch, VerifyResult.KEY_MISMATCH added to indicate this case. Multiple styling fixes and import optimisation, exception handling. Signed-off-by: Rustam Ismayilov <[email protected]> Change-Id: I61a588de5b39678707c0179f4edaa411ceb67c8e (cherry picked from commit 36f8bf3) Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5e33dac - Browse repository at this point
Copy the full SHA 5e33dacView commit details -
[nrf fromtree] imgtool: Add --non-bootable flag
Defaults to false. Signed-off-by: Mateusz Wielgos <[email protected]> (cherry picked from commit dc03055) Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 300c41c - Browse repository at this point
Copy the full SHA 300c41cView commit details -
[nrf fromlist] imgtool: Add support for calculating SHA512
The adds support for hashing image with SHA512, to allow SHA512-ED25519-SHA512 signature. To support above --sha parameter has been added that can take value: auto, 256, 384, 512 to select sha, where auto brings the default behaviour, or current, behaviour. The sha provided here is tested against key so not all combinations are supported. Upstream PR: mcu-tools/mcuboot#2048 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7aaeb63 - Browse repository at this point
Copy the full SHA 7aaeb63View commit details
Commits on Sep 27, 2024
-
[nrf fromtree] boot: Fix ASN.1 for mbedtls >= 3.1
In Mbed TLS 3.1, the private fields in the ASN.1 structure were made private. This breaks code that accesses these private macros. Fix this by changing the ASN.1 specific code to use a new field accessor `ASN1_CONTEXT_MEMBER` that will be conditionally defined based on the version of Mbed TLS that is present. Signed-off-by: David Brown <[email protected]> (cherry picked from commit 1d79ef3) Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 647a928 - Browse repository at this point
Copy the full SHA 647a928View commit details -
[nrf fromtree] bootutil: Keep image encrypted in scratch area
Currently, when swap using scratch is used with encrypted images, MCUboot is decrypting the images during the copy from the secondary slot to the scratch area. This means the scratch area contains plaintext image data and therefore that the scratch area must be placed in the MCU's internal flash memory. This commit makes the necessary changes to perform the decryption when copying from the scratch area to the primary slot instead, making possible to place the scratch area in an external flash memory since the scratch area is now encrypted. Note that BOOT_SWAP_SAVE_ENCTLV must be enabled if the scratch area is placed in external flash memory. Signed-off-by: Thomas Altenbach <[email protected]> (cherry picked from commit 08d2d94) Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3a8716b - Browse repository at this point
Copy the full SHA 3a8716bView commit details -
[nrf fromtree] boot: Remove pointless slot identification
In the boot_image_validate_encrypted there was call to flash_area_id_to_multi_image_slot, which tries to figure out slot index from flash area and image index, and the result of the call was not used for anything as slot index is hardcoded in the next call to be 1 (secondary). Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 4da4a72)
Configuration menu - View commit details
-
Copy full SHA for eb5042b - Browse repository at this point
Copy the full SHA eb5042bView commit details -
[nrf fromtree] boot: Rename boot_enc_decrypt to boot_decrypt_key
All of boot_enc_ function follow the same pattern where they take encryption context as the first parameter, and the boot_enc_decrypt stands out here as it does not work around the encryption context, but is rather single-part decryption function only used for decrypting of the image encryption key. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 2371c0a)
Configuration menu - View commit details
-
Copy full SHA for dd38c00 - Browse repository at this point
Copy the full SHA dd38c00View commit details -
[nrf fromtree] boot: Move encryption context invalidation to boot_enc…
…_drop. The enc_key_data.valid had been set to true when key has been added to the encryption context, but in case when boot_enc_drop was called, on the same context, the flag remained true, even though the context may no longer hold any valid context nor key. The commit moves the enc_key_data invalidation to enc_key_drop. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 3355735)
Configuration menu - View commit details
-
Copy full SHA for 8d04aa0 - Browse repository at this point
Copy the full SHA 8d04aa0View commit details -
[nrf fromtree] boot: Change boot_enc_load to take slot number instead…
… of image In all cases where boot_enc_load is called it is known what slot is addressed, so it is better to just pass the slot number instead of making the boot_enc_load figure out slot number from image index and provided flash area object. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 7f9ac97)
Configuration menu - View commit details
-
Copy full SHA for 852f9af - Browse repository at this point
Copy the full SHA 852f9afView commit details -
[nrf fromtree] boot: Reduce repeating code in boot_decrypt_and_copy_i…
…mage_to_sram There was not really needed repetition of code in if-else block; common code has been moved out and the block has been reduced. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit d09112a)
Configuration menu - View commit details
-
Copy full SHA for c77f411 - Browse repository at this point
Copy the full SHA c77f411View commit details -
[nrf fromtree] Fix style issues
Convert tab to spaces; fix opening brace position. Signed-off-by: Fabio Utzig <[email protected]> (cherry picked from commit d5e0e89)
Configuration menu - View commit details
-
Copy full SHA for a923568 - Browse repository at this point
Copy the full SHA a923568View commit details -
[nrf fromtree] boot: Remove image_index from boot_encrypt
boot_encrypt required the image_index paired with flash area pointer to be able to figure out which slot it will operate on. Since in most calls the slot is known in advance it can be just passed to the function directly. The commit replaces both parameters with slot number. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 3f11286)
Configuration menu - View commit details
-
Copy full SHA for 8b0d958 - Browse repository at this point
Copy the full SHA 8b0d958View commit details -
[nrf fromtree] boot: Simplify copy loop in boot_copy_region
Move checking of conditions, which remain the same for the whole loop run, outside of the loop. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 6fe259b)
Configuration menu - View commit details
-
Copy full SHA for c04fb82 - Browse repository at this point
Copy the full SHA c04fb82View commit details -
[nrf fromtree] boot: Make boot_enc_valid take slot instead of image i…
…ndex There is no point for boot_enc_valid to take image index and flash area and use these to figure out slot number. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 956311d)
Configuration menu - View commit details
-
Copy full SHA for 3d1c64b - Browse repository at this point
Copy the full SHA 3d1c64bView commit details -
[nrf fromlist] boot: Replace boot_encrypt by boot_enc_encrypt and boo…
…t_enc_decrypt To be able to implement encryption with API that requires different calls for encryption and encryption, the boot_encrypt needs to be replaced with encryption/decryption specific functions. Upstream PR: mcu-tools/mcuboot#2017 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b1b4ec3 - Browse repository at this point
Copy the full SHA b1b4ec3View commit details -
[nrf noup] PSA configuration required changes
Set of changes to Kconfig, CMakeLists.txt and some of headers that are required for the PSA support to compile. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for be3637e - Browse repository at this point
Copy the full SHA be3637eView commit details -
[nrf noup] PSA implementation of x25519 and ed25519 verification
The commit provides implementation of image verification with ed25519 and encryption/decryption support where random key is encrypted using x25519. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5f95fec - Browse repository at this point
Copy the full SHA 5f95fecView commit details
Commits on Oct 1, 2024
-
[nrf noup] Exclude PSA source on non-PSA crypto configuration
fixup! [nrf noup] PSA configuration required changes Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5721744 - Browse repository at this point
Copy the full SHA 5721744View commit details -
[nrf noup] bootutil: Provide support for SHA512 with ED25519
Use SHA512 directly calculated over image with the ED25519 signature. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 273c106 - Browse repository at this point
Copy the full SHA 273c106View commit details -
[nrf noup] bootutil: Enable hash calculation directly on storage
The commit add support for passing storage device address space to hash calculation functions, which allows to use hardware accelerated hash calculation on storage. This feature only works when image encryption is not enabled and all slots are defined within internal storage of device. The feature is enabled using Kconfig option CONFIG_BOOT_IMG_HASH_DIRECTLY_ON_STORAGE Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e1591c0 - Browse repository at this point
Copy the full SHA e1591c0View commit details -
[nrf noup] bootutil: PureEdDSA using ED25519
The commit adds support for PureEdDSA, which validates signature of image rather than hash. This is most secure, available, ED25519 usage in MCUboot, but due to requirement of PureEdDSA to be able to calculate signature at whole message at once, here image, it only works on setups where entire image can be mapped to device address space, so that PSA functions calculating the signature can see the whole image at once. This option is enabled with Kconfig option: CONFIG_BOOT_SIGNATURE_TYPE_PURE when the ED25519 signature type is already selected. Note that the option will enable SHA512 for calculating public key hash. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for de524e9 - Browse repository at this point
Copy the full SHA de524e9View commit details
Commits on Oct 3, 2024
-
[nrf noup] There is only one SHA supported at once
fixup! [nrf noup] PSA implementation of x25519 and ed25519 verification And fixing typos. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f79e6db - Browse repository at this point
Copy the full SHA f79e6dbView commit details -
[nrf noup] bootutil: Fix typo in identifier
fixup! [nrf noup] bootutil: PureEdDSA using ED25519 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 763edd6 - Browse repository at this point
Copy the full SHA 763edd6View commit details
Commits on Oct 4, 2024
-
[nrf fromlist] scripts: imgtool: compression
Adds LZMA2 compression to imgtool. Python lzma library is unable to compress with proper parameters while using "ALONE" container, therefore 2 header bytes are calculated and added to payload by imgtool. Upstream PR: mcu-tools/mcuboot#2038 Signed-off-by: Mateusz Michalek <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4927e39 - Browse repository at this point
Copy the full SHA 4927e39View commit details -
[nrf noup] boot: zephyr: kconfig: Select PM_USE_CONFIG_SRAM_SIZE when…
… needed fixup! [nrf noup] zephyr: Add support for compressed image updates Selects this Kconfig when compression is enabled for nrf54l15 Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3909498 - Browse repository at this point
Copy the full SHA 3909498View commit details -
[nrf noup] Add missing selection of MBEDTLS_PSA_CRYPTO_C
fixup! [nrf noup] PSA configuration required changes Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9101a24 - Browse repository at this point
Copy the full SHA 9101a24View commit details -
Revert "[nrf noup] Add missing selection of MBEDTLS_PSA_CRYPTO_C"
This reverts commit 9101a24.
Configuration menu - View commit details
-
Copy full SHA for 112b13c - Browse repository at this point
Copy the full SHA 112b13cView commit details -
Revert "[nrf noup] boot: zephyr: kconfig: Select PM_USE_CONFIG_SRAM_S…
…IZE when needed" This reverts commit 3909498.
Configuration menu - View commit details
-
Copy full SHA for ecba253 - Browse repository at this point
Copy the full SHA ecba253View commit details -
Revert "[nrf fromlist] scripts: imgtool: compression"
This reverts commit 4927e39.
Configuration menu - View commit details
-
Copy full SHA for d406289 - Browse repository at this point
Copy the full SHA d406289View commit details -
Revert "[nrf noup] bootutil: Fix typo in identifier"
This reverts commit 763edd6.
Configuration menu - View commit details
-
Copy full SHA for 6309d08 - Browse repository at this point
Copy the full SHA 6309d08View commit details -
Revert "[nrf noup] There is only one SHA supported at once"
This reverts commit f79e6db.
Configuration menu - View commit details
-
Copy full SHA for b9ac2e0 - Browse repository at this point
Copy the full SHA b9ac2e0View commit details -
Revert "[nrf noup] bootutil: PureEdDSA using ED25519"
This reverts commit de524e9.
Configuration menu - View commit details
-
Copy full SHA for 821fa3e - Browse repository at this point
Copy the full SHA 821fa3eView commit details -
Revert "[nrf noup] bootutil: Enable hash calculation directly on stor…
…age" This reverts commit e1591c0.
Configuration menu - View commit details
-
Copy full SHA for 979469c - Browse repository at this point
Copy the full SHA 979469cView commit details -
Revert "[nrf noup] bootutil: Provide support for SHA512 with ED25519"
This reverts commit 273c106.
Configuration menu - View commit details
-
Copy full SHA for 5ed9f8a - Browse repository at this point
Copy the full SHA 5ed9f8aView commit details -
Revert "[nrf noup] Exclude PSA source on non-PSA crypto configuration"
This reverts commit 5721744.
Configuration menu - View commit details
-
Copy full SHA for 161a140 - Browse repository at this point
Copy the full SHA 161a140View commit details -
Revert "[nrf noup] PSA implementation of x25519 and ed25519 verificat…
…ion" This reverts commit 5f95fec.
Configuration menu - View commit details
-
Copy full SHA for 54397f6 - Browse repository at this point
Copy the full SHA 54397f6View commit details -
Revert "[nrf noup] PSA configuration required changes"
This reverts commit be3637e.
Configuration menu - View commit details
-
Copy full SHA for 65979ce - Browse repository at this point
Copy the full SHA 65979ceView commit details -
Revert "[nrf fromlist] boot: Replace boot_encrypt by boot_enc_encrypt…
… and boot_enc_decrypt" This reverts commit b1b4ec3.
Configuration menu - View commit details
-
Copy full SHA for fa52384 - Browse repository at this point
Copy the full SHA fa52384View commit details -
Revert "[nrf fromtree] boot: Make boot_enc_valid take slot instead of…
… image index" This reverts commit 3d1c64b.
Configuration menu - View commit details
-
Copy full SHA for ab0e70c - Browse repository at this point
Copy the full SHA ab0e70cView commit details -
Revert "[nrf fromtree] boot: Simplify copy loop in boot_copy_region"
This reverts commit c04fb82.
Configuration menu - View commit details
-
Copy full SHA for 302b002 - Browse repository at this point
Copy the full SHA 302b002View commit details -
Revert "[nrf fromtree] boot: Remove image_index from boot_encrypt"
This reverts commit 8b0d958.
Configuration menu - View commit details
-
Copy full SHA for 7e2f568 - Browse repository at this point
Copy the full SHA 7e2f568View commit details -
Revert "[nrf fromtree] Fix style issues"
This reverts commit a923568.
Configuration menu - View commit details
-
Copy full SHA for 8d87b78 - Browse repository at this point
Copy the full SHA 8d87b78View commit details -
Revert "[nrf fromtree] boot: Reduce repeating code in boot_decrypt_an…
…d_copy_image_to_sram" This reverts commit c77f411.
Configuration menu - View commit details
-
Copy full SHA for 98f83a1 - Browse repository at this point
Copy the full SHA 98f83a1View commit details -
Revert "[nrf fromtree] boot: Change boot_enc_load to take slot number…
… instead of image" This reverts commit 852f9af.
Configuration menu - View commit details
-
Copy full SHA for 499864b - Browse repository at this point
Copy the full SHA 499864bView commit details -
Revert "[nrf fromtree] boot: Move encryption context invalidation to …
…boot_enc_drop." This reverts commit 8d04aa0.
Configuration menu - View commit details
-
Copy full SHA for d2e060b - Browse repository at this point
Copy the full SHA d2e060bView commit details -
Revert "[nrf fromtree] boot: Rename boot_enc_decrypt to boot_decrypt_…
…key" This reverts commit dd38c00.
Configuration menu - View commit details
-
Copy full SHA for 9553f40 - Browse repository at this point
Copy the full SHA 9553f40View commit details -
Revert "[nrf fromtree] boot: Remove pointless slot identification"
This reverts commit eb5042b.
Configuration menu - View commit details
-
Copy full SHA for 30e5e62 - Browse repository at this point
Copy the full SHA 30e5e62View commit details -
Revert "[nrf fromtree] bootutil: Keep image encrypted in scratch area"
This reverts commit 3a8716b.
Configuration menu - View commit details
-
Copy full SHA for 69a1d52 - Browse repository at this point
Copy the full SHA 69a1d52View commit details -
Revert "[nrf fromtree] boot: Fix ASN.1 for mbedtls >= 3.1"
This reverts commit 647a928.
Configuration menu - View commit details
-
Copy full SHA for 174d00b - Browse repository at this point
Copy the full SHA 174d00bView commit details -
Revert "[nrf fromlist] imgtool: Add support for calculating SHA512"
This reverts commit 7aaeb63.
Configuration menu - View commit details
-
Copy full SHA for 520a6c6 - Browse repository at this point
Copy the full SHA 520a6c6View commit details -
Revert "[nrf fromtree] imgtool: Add --non-bootable flag"
This reverts commit 300c41c.
Configuration menu - View commit details
-
Copy full SHA for ae6870f - Browse repository at this point
Copy the full SHA ae6870fView commit details -
Revert "[nrf fromtree] imgtool: Fix verify command for edcsa-p384 sig…
…ned images" This reverts commit 5e33dac.
Configuration menu - View commit details
-
Copy full SHA for ffa22ae - Browse repository at this point
Copy the full SHA ffa22aeView commit details -
Revert "[nrf noup] boot: Add shared crypto for ECDSA and SHA"
This reverts commit c2ff45b.
Configuration menu - View commit details
-
Copy full SHA for c2b6231 - Browse repository at this point
Copy the full SHA c2b6231View commit details -
Revert "[nrf fromtree] boot: SHA512 verification"
This reverts commit 2d66e66.
Configuration menu - View commit details
-
Copy full SHA for 7308a08 - Browse repository at this point
Copy the full SHA 7308a08View commit details -
Revert "[nrf noup] zephyr: Add support for compressed image updates"
This reverts commit 92121b1.
Configuration menu - View commit details
-
Copy full SHA for 031671d - Browse repository at this point
Copy the full SHA 031671dView commit details -
Revert "[nrf fromtree] docs: release-notes: Add note on changes"
This reverts commit 5eaeac3.
Configuration menu - View commit details
-
Copy full SHA for 8682273 - Browse repository at this point
Copy the full SHA 8682273View commit details -
Revert "[nrf fromtree] booutil: swap_scratch: Do not check sectors wi…
…th compression" This reverts commit 21bac2b.
Configuration menu - View commit details
-
Copy full SHA for 2144256 - Browse repository at this point
Copy the full SHA 2144256View commit details -
Revert "[nrf fromtree] bootutil: loader: Add protected TLV size to im…
…age size check" This reverts commit 7d67371.
Configuration menu - View commit details
-
Copy full SHA for f30510b - Browse repository at this point
Copy the full SHA f30510bView commit details -
Revert "[nrf fromtree] bootutil: loader: Remove images with conflicti…
…ng flags" This reverts commit cd557e1.
Configuration menu - View commit details
-
Copy full SHA for 4b1c47d - Browse repository at this point
Copy the full SHA 4b1c47dView commit details -
Revert "[nrf fromtree] bootutil: loader: Remove encrypted/compressed …
…images without support" This reverts commit 16e15ce.
Configuration menu - View commit details
-
Copy full SHA for a9d9b88 - Browse repository at this point
Copy the full SHA a9d9b88View commit details -
Revert "[nrf fromtree] zephyr: Add Kconfig for decompression"
This reverts commit 53722da.
Configuration menu - View commit details
-
Copy full SHA for 89db1d5 - Browse repository at this point
Copy the full SHA 89db1d5View commit details -
Revert "[nrf fromtree] bootutil: Add compressed image flags and TLV"
This reverts commit da14989.
Configuration menu - View commit details
-
Copy full SHA for ded8b9c - Browse repository at this point
Copy the full SHA ded8b9cView commit details -
Revert "[nrf fromtree] docs: release-notes: Add note on bootutil chan…
…ges" This reverts commit 4e74426.
Configuration menu - View commit details
-
Copy full SHA for b6c79e1 - Browse repository at this point
Copy the full SHA b6c79e1View commit details -
Revert "[nrf fromtree] bootutil: loader: Verify image header before c…
…hecking image" This reverts commit 4e81dcd.
Configuration menu - View commit details
-
Copy full SHA for 9e0a3d5 - Browse repository at this point
Copy the full SHA 9e0a3d5View commit details -
Revert "[nrf fromtree] bootutil: loader: Add state to boot_is_header_…
…valid() function" This reverts commit 0c07689.
Configuration menu - View commit details
-
Copy full SHA for df974c8 - Browse repository at this point
Copy the full SHA df974c8View commit details -
Revert "[nrf noup] boards: nrf54l15dk: Disable FPROTECT"
This reverts commit f30dce1.
Configuration menu - View commit details
-
Copy full SHA for c414806 - Browse repository at this point
Copy the full SHA c414806View commit details -
Revert "[nrf fromtree] boot: zephyr: boards: Add nrf54l15dk configura…
…tion" This reverts commit 9ac6f76.
Configuration menu - View commit details
-
Copy full SHA for 5998c07 - Browse repository at this point
Copy the full SHA 5998c07View commit details -
Revert "[nrf noup] bootutil: loader: Fix netcore address checking"
This reverts commit 5db1981.
Configuration menu - View commit details
-
Copy full SHA for 92ae47f - Browse repository at this point
Copy the full SHA 92ae47fView commit details -
Revert "[nrf noup] Remove secure boot debug Kconfig"
This reverts commit e66169a.
Configuration menu - View commit details
-
Copy full SHA for 8166a7c - Browse repository at this point
Copy the full SHA 8166a7cView commit details -
Revert "[nrf noup] boot/../loader: reboot after updating s0/s1"
This reverts commit daf2946.
Configuration menu - View commit details
-
Copy full SHA for efc3998 - Browse repository at this point
Copy the full SHA efc3998View commit details -
Revert "[nrf noup] boot/../loader: skip downgrade prevention for s1/s0"
This reverts commit d9fe011.
Configuration menu - View commit details
-
Copy full SHA for 8cc9b03 - Browse repository at this point
Copy the full SHA 8cc9b03View commit details -
Revert "[nrf noup] boot: zephyr: Add NCS boot banner"
This reverts commit d639f90.
Configuration menu - View commit details
-
Copy full SHA for ab42bfc - Browse repository at this point
Copy the full SHA ab42bfcView commit details -
Revert "[nrf noup] zephyr/boards: fix nrf54l15pdk ext flash dts overlay"
This reverts commit 4f84ba9.
Configuration menu - View commit details
-
Copy full SHA for c44b097 - Browse repository at this point
Copy the full SHA c44b097View commit details -
Revert "[nrf noup] Revert of zephyr: arm: Update reading the flash im…
…age reset vector" This reverts commit 0f317a2.
Configuration menu - View commit details
-
Copy full SHA for c52da26 - Browse repository at this point
Copy the full SHA c52da26View commit details -
Revert "[nrf noup] boot/zephyr: fix fw_info search"
This reverts commit f3ae1af.
Configuration menu - View commit details
-
Copy full SHA for 27de2af - Browse repository at this point
Copy the full SHA 27de2afView commit details -
Revert "[nrf noup] boot: zephyr: Disable boot banner if NCS_BOOT_BANN…
…ER is used" This reverts commit f0a0c50.
Configuration menu - View commit details
-
Copy full SHA for 2fb1126 - Browse repository at this point
Copy the full SHA 2fb1126View commit details -
Revert "[nrf noup] boards: thingy91x: enable serial recovery"
This reverts commit 152f641.
Configuration menu - View commit details
-
Copy full SHA for 0a3f530 - Browse repository at this point
Copy the full SHA 0a3f530View commit details -
Revert "[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash update"
This reverts commit 0656a67.
Configuration menu - View commit details
-
Copy full SHA for 120c32c - Browse repository at this point
Copy the full SHA 120c32cView commit details -
Revert "[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash partition"
This reverts commit 826a407.
Configuration menu - View commit details
-
Copy full SHA for a419c13 - Browse repository at this point
Copy the full SHA a419c13View commit details -
Revert "[nrf noup] zephyr: Clean up non-secure RAM if enabled"
This reverts commit b305c3d.
Configuration menu - View commit details
-
Copy full SHA for 7e23c7c - Browse repository at this point
Copy the full SHA 7e23c7cView commit details -
Revert "[nrf noup] loader: remove cleanup for direct xip mode"
This reverts commit 3853d26.
Configuration menu - View commit details
-
Copy full SHA for fd15c7d - Browse repository at this point
Copy the full SHA fd15c7dView commit details -
Revert "[nrf noup] boards: nrf54l15: Disable FPROTECT"
This reverts commit ec59c38.
Configuration menu - View commit details
-
Copy full SHA for c8b99ac - Browse repository at this point
Copy the full SHA c8b99acView commit details -
Revert "[nrf noup] loader: introduced cleanup of unusable secondary s…
…lot" This reverts commit ee67c04.
Configuration menu - View commit details
-
Copy full SHA for 52152fd - Browse repository at this point
Copy the full SHA 52152fdView commit details -
Revert "[nrf noup] sysflash: Add support for three images"
This reverts commit d2d11bf.
Configuration menu - View commit details
-
Copy full SHA for 414b7f9 - Browse repository at this point
Copy the full SHA 414b7f9View commit details -
Revert "[nrf noup] sysflash: Move partition manager definitions to pm…
…_sysflash.h" This reverts commit 6cecb1c.
Configuration menu - View commit details
-
Copy full SHA for e648319 - Browse repository at this point
Copy the full SHA e648319View commit details -
Revert "[nrf noup] boot: Add support for NSIB and multi-image"
This reverts commit ce42cac.
Configuration menu - View commit details
-
Copy full SHA for 5161b82 - Browse repository at this point
Copy the full SHA 5161b82View commit details -
Revert "[nrf noup] loader: Fix missing PCD define check"
This reverts commit f15d384.
Configuration menu - View commit details
-
Copy full SHA for dab516b - Browse repository at this point
Copy the full SHA dab516bView commit details -
Revert "[nrf noup] loader: work-around for multi-image builds"
This reverts commit 843ee8e.
Configuration menu - View commit details
-
Copy full SHA for adc5521 - Browse repository at this point
Copy the full SHA adc5521View commit details -
Revert "[nrf noup] boot/zephyr/boards: nRF54l15pdk ext flash cfg"
This reverts commit 0fcc1f8.
Configuration menu - View commit details
-
Copy full SHA for 7ca5e89 - Browse repository at this point
Copy the full SHA 7ca5e89View commit details -
Revert "[nrf noup] boards: thingy53: disable GPIO ISR support"
This reverts commit 7377421.
Configuration menu - View commit details
-
Copy full SHA for 5d709c9 - Browse repository at this point
Copy the full SHA 5d709c9View commit details -
Revert "[nrf noup] loader: Add firmware version check downgrade preve…
…ntion" This reverts commit b045778.
Configuration menu - View commit details
-
Copy full SHA for 298973d - Browse repository at this point
Copy the full SHA 298973dView commit details -
Revert "[nrf noup] zephyr: Boot even if EXT_ABI is not provided"
This reverts commit 62b5dc1.
Configuration menu - View commit details
-
Copy full SHA for ad45a1c - Browse repository at this point
Copy the full SHA ad45a1cView commit details -
Revert "[nrf noup] zephyr: Add RAM flash configuration to cache for s…
…ysbuild" This reverts commit 33effae.
Configuration menu - View commit details
-
Copy full SHA for 9c3aaa2 - Browse repository at this point
Copy the full SHA 9c3aaa2View commit details -
Revert "[nrf noup] loader: Do not check reset vector for XIP image"
This reverts commit 5fe56c9.
Configuration menu - View commit details
-
Copy full SHA for aef3d0a - Browse repository at this point
Copy the full SHA aef3d0aView commit details -
Revert "[nrf noup] zephyr: Fix path variables"
This reverts commit 6f1ba91.
Configuration menu - View commit details
-
Copy full SHA for 1d60ea2 - Browse repository at this point
Copy the full SHA 1d60ea2View commit details -
Revert "[nrf noup] loader: Fix reading reset addr to support ext flash"
This reverts commit a3d0772.
Configuration menu - View commit details
-
Copy full SHA for 1e6838c - Browse repository at this point
Copy the full SHA 1e6838cView commit details -
Revert "[nrf noup] zephyr: Clean up non-secure RAM if enabled"
This reverts commit cc6103b.
Configuration menu - View commit details
-
Copy full SHA for 984cacc - Browse repository at this point
Copy the full SHA 984caccView commit details -
Revert "[nrf noup] zephyr: clean peripherals state before boot"
This reverts commit c033da0.
Configuration menu - View commit details
-
Copy full SHA for a02c59d - Browse repository at this point
Copy the full SHA a02c59dView commit details -
Revert "[nrf noup] boot: nrf53-specific customizations"
This reverts commit cab8ef9.
Configuration menu - View commit details
-
Copy full SHA for a8b9934 - Browse repository at this point
Copy the full SHA a8b9934View commit details -
Revert "[nrf noup] treewide: add NCS partition manager support"
This reverts commit 9555ca7.
Configuration menu - View commit details
-
Copy full SHA for 9b95757 - Browse repository at this point
Copy the full SHA 9b95757View commit details -
Revert "[nrf noup] boards: thingy91x: add board config"
This reverts commit 916a9dc.
Configuration menu - View commit details
-
Copy full SHA for bfe238c - Browse repository at this point
Copy the full SHA bfe238cView commit details -
Revert "[nrf noup] zephyr: Restore default RTC user channel count"
This reverts commit cffdc52.
Configuration menu - View commit details
-
Copy full SHA for dd75051 - Browse repository at this point
Copy the full SHA dd75051View commit details -
Revert "[nrf noup] boards: add support for Thingy:91"
This reverts commit a53f78d.
Configuration menu - View commit details
-
Copy full SHA for 7ea58be - Browse repository at this point
Copy the full SHA 7ea58beView commit details -
Revert "[nrf noup] zephyr: add 'minimal' configuration files"
This reverts commit cd1c995.
Configuration menu - View commit details
-
Copy full SHA for ae0e3ea - Browse repository at this point
Copy the full SHA ae0e3eaView commit details -
Revert "[nrf noup] zephyr: Remove duplication from cmake"
This reverts commit 312ba86.
Configuration menu - View commit details
-
Copy full SHA for 28859c1 - Browse repository at this point
Copy the full SHA 28859c1View commit details -
Revert "[nrf noup] github: Add a commit tags check workflow"
This reverts commit 195145b.
Configuration menu - View commit details
-
Copy full SHA for a539a78 - Browse repository at this point
Copy the full SHA a539a78View commit details -
[nrf mergeup] Merge upstream up to commit 84b56b6
Signed-off-by: Bjarki Arge Andreasen <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ae23763 - Browse repository at this point
Copy the full SHA ae23763View commit details -
[nrf noup] github: Add a commit tags check workflow
Use the generic commit-tags action to provide sauce tag checks. Signed-off-by: Carles Cufi <[email protected]> (cherry picked from commit 786e351)
Configuration menu - View commit details
-
Copy full SHA for 00f5860 - Browse repository at this point
Copy the full SHA 00f5860View commit details -
[nrf noup] zephyr: Remove duplication from cmake
Removes the `add_subdirectory` of nrfxlib it will still check that the nrfxlib is located outside the mcuboot directory. Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 5c94965)
Configuration menu - View commit details
-
Copy full SHA for 6bc65a9 - Browse repository at this point
Copy the full SHA 6bc65a9View commit details -
[nrf noup] zephyr: add 'minimal' configuration files
Add prj_minimal.conf, a Kconfig fragment to be used for minimally sized image production. The minimal fragment has been simplified for only external crypto. Move partition sizing into Kconfig to be consistent with the method used by b0. Using this fragment with prj_minimal.conf makes MCUboot < 16kB for all nRF devices (9160 still needs 32kB partition). Ref: NCSDK-6704 Signed-off-by: Stephen Stauts <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Sebastian Bøe <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 64740f7)
Configuration menu - View commit details
-
Copy full SHA for bee9475 - Browse repository at this point
Copy the full SHA bee9475View commit details -
[nrf noup] boards: add support for Thingy:91
Adds project configurations for the two systems on the Thingy:91 (PCA-20035) board. The bootloader that is factory-programmed on thing91 does not support ECDSA signature type. Hence this commit also sets the signature type to RSA for applications built for Thingy:91. Signed-off-by: Bernt Johan Damslora <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Jon Helge Nistad <[email protected]> Signed-off-by: Balaji Srinivasan <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Marek Pieta <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit de32681)
Configuration menu - View commit details
-
Copy full SHA for 49e2872 - Browse repository at this point
Copy the full SHA 49e2872View commit details -
[nrf noup] zephyr: Restore default RTC user channel count
The default value of CONFIG_NRF_RTC_TIMER_USER_CHAN_COUNT for nRF52 SOCs has been changed from 0 to 3, but it makes MCUBoot get stuck on erasing flash pages when swapping two images. Restore the previous value until the RTC issue is resolved (see NCSDK-14427) Signed-off-by: Damian Krolik <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit a01d30a)
Configuration menu - View commit details
-
Copy full SHA for 93bb567 - Browse repository at this point
Copy the full SHA 93bb567View commit details -
[nrf noup] boards: thingy91x: add board config
This patch adds board configuration for the Thingy:91 X. Signed-off-by: Maximilian Deubel <[email protected]> (cherry picked from commit 3c2f2ff)
Configuration menu - View commit details
-
Copy full SHA for c473f8e - Browse repository at this point
Copy the full SHA c473f8eView commit details -
[nrf noup] treewide: add NCS partition manager support
Partition Manager is an nRF Connect SDK component which uses yaml files to resolve flash partition placement with a holistic view of the device. This component's MCUboot portions began life as upstream mcuboot PR#430. This added support for being built as a sub image from the downstream Nordic patch set for a zephyr multi image build system (mcuboot 430 was combined with effor submitted to upstream zephyr as PR#13672, which was ultimately reworked after being rejected for mainline at the ELCE 2019 conference in Lyon). It has since evolved over time. This is the version that will go into NCS v1.3. It features: - page size aligned partitions for all partitions used by mcuboot. - image swaps without scratch partitions Add support for configurations where there exists two primary slots but only one secondary slot, which is shared. These two primary slots are the regular application and B1. B1 can be either S0 or S1 depending on the state of the device. Decide where an upgrade should be stored by looking at the vector table. Provide update candidates for both s0 and s1. These candidates must be signed with mcuboot after being signed by b0. Additional notes: - we make update.hex without trailer data This is needed for serial recovery to work using hex files. Prior to this the update.hex got TLV data at the end of the partition, which caused many blank pages to be included, which made it hard to use in a serial recovery scheme. Instead, make update.hex without TLV data at the end, and provide a new file test_update.hex which contains the TLV data, and can be directly flashed to test the upgrade procedure. - we use a function for signing the application as future-proofing for when other components must be signed as well - this includes an update to single image applications that enables support for partition manager; when single image DFU is used, a scratch partition is not needed. - In NCS, image 1 primary slot is the upgrade bank for mcuboot (IE S0 or S1 depending on the active slot). It is not required that this slot contains any valid data. - The nRF boards all have a single flash page size, and partition manager deals with the size of the update partitions and so on, so we must skip a boot_slots_compatible() check to avoid getting an error. - There is no need to verify the target when using partition manager. - We lock mcuboot using fprotect before jumping, to enable the secure boot property of the system. - Call fw_info_ext_api_provide() before booting if EXT_API_PROVIDE EXT_API is enabled. This is relevant only when the immutable bootloader has booted mcuboot. Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Øyvind Rønningstad <[email protected]> Signed-off-by: Sebastian Bøe <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Andrzej Głąbek <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Pawel Dunaj <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Vidar Berg <[email protected]> Signed-off-by: Draus, Sebastian <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Joakim Andersson <[email protected]> Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 518617a)
Configuration menu - View commit details
-
Copy full SHA for 6facec9 - Browse repository at this point
Copy the full SHA 6facec9View commit details -
[nrf noup] boot: nrf53-specific customizations
- Add network core bootloader implementation Enables network core updates of nrf53 using MCUBoot by identifying images through their start addresses. Also implements the control and transfer using the PCD module. - Add support for multi image DFU using partition manager. - Add check for netcore addr if NSIB is enabled so netcore updates works - boot: zephyr: move thingy53_nrf5340_cpuapp.conf downstream Moved the board configuration for Thingy:53 Application Core to the nRF Connect SDK MCUboot downstream repository. The configuration file contains references to the Kconfig modules that are only available in the nRF Connect SDK. The current configuration is set up to work in the nRF Connect SDK environment and cannot be used upstream. - pm: enable ram flash partition using common flag This patch makes mcuboot_primary_1 ram-flash partition selectable using CONFIG_NRF53_MCUBOOT_PRIMARY_1_RAM_FLASH property. This is needed since CONFIG_NRF53_MULTI_IMAGE_UPDATE become not only configuration which requires that partition. - MCUBoot configures USB CDC by its own. There is no need for BOARD_SERIAL_BACKEND_CDC_ACM option to configure anything which is later overwritten anyway. Jira: NCSDK-18596 Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Kamil Piszczek <[email protected]> Signed-off-by: Ole Sæther <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Simon Iversen <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Mateusz Kapala <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 42e43d0)
Configuration menu - View commit details
-
Copy full SHA for 56934f9 - Browse repository at this point
Copy the full SHA 56934f9View commit details -
[nrf noup] zephyr: clean peripherals state before boot
Do some cleanup of nRF peripherals. This is necessary since Zephyr doesn't have any driver deinitialization functionality, and we'd like to leave peripherals in a more predictable state before booting the Zephyr image. This should be re-worked when the zephyr driver model allows us to deinitialize devices cleanly before jumping to the chain-loaded image. Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Robert Lubos <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Øyvind Rønningstad <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 3b2a5ba)
Configuration menu - View commit details
-
Copy full SHA for 50c5cdb - Browse repository at this point
Copy the full SHA 50c5cdbView commit details -
[nrf noup] zephyr: Clean up non-secure RAM if enabled
To ensure that MCUBoot does not leak keys or other material through memory to non-secure side we clear the memory before jumping to the next image. Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> Signed-off-by: Ole Sæther <[email protected]> (cherry picked from commit 047d463)
Configuration menu - View commit details
-
Copy full SHA for d04dd27 - Browse repository at this point
Copy the full SHA d04dd27View commit details -
[nrf noup] loader: Fix reading reset addr to support ext flash
When mcuboot_secondary is on external flash, the image header cannot dircetly be accessed via secondary_fa->fa_off. Instead the provided function boot_img_hdr() is used now. Additionally a similar issue is present when trying to read the address of the reset handler. For this flash_area_read() is used now. With this patch is possible to have the update partiton mcuboot_secondary on external flash and update a updatable bootloader (mcuboot) in s0 and/or s1. Signed-off-by: Christian Taedcke <[email protected]> Signed-off-by: Ole Sæther <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 2dac63a)
Configuration menu - View commit details
-
Copy full SHA for a3a50e7 - Browse repository at this point
Copy the full SHA a3a50e7View commit details -
[nrf noup] zephyr: Fix path variables
Fixes path variables to use the proper Zephyr module variables Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit c28fa1d)
Configuration menu - View commit details
-
Copy full SHA for 76d0d9a - Browse repository at this point
Copy the full SHA 76d0d9aView commit details -
[nrf noup] loader: Do not check reset vector for XIP image
The XIP image, 2, does not have reset vector. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit d798de3)
Configuration menu - View commit details
-
Copy full SHA for 5a8e708 - Browse repository at this point
Copy the full SHA 5a8e708View commit details -
[nrf noup] zephyr: Add RAM flash configuration to cache for sysbuild
Puts the flash simulation configurtion into cache variables that can be used by other applications and CMake code to know specifics on the simulated flash details Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit af27205)
Configuration menu - View commit details
-
Copy full SHA for 9599724 - Browse repository at this point
Copy the full SHA 9599724View commit details -
[nrf noup] zephyr: Boot even if EXT_ABI is not provided
This removes the `return;` to ensure that the application is booted even if EXT_ABI is not provided to the application because it does not include `FW_INFO`. Added a bit more description to the error messages when FW_INFO is not found and EXT_ABI is not able to be provided to the next image. Ref. NCSDK-24132 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 41cc274)
Configuration menu - View commit details
-
Copy full SHA for 5b37400 - Browse repository at this point
Copy the full SHA 5b37400View commit details -
[nrf noup] loader: Add firmware version check downgrade prevention
For nRF53, the only existing version number metadata is stored in the `firmware_info` structure in the network core. This utilizes PCD to read out the version number and compares it against the version number found in the secondary slot for the network core. Ref. NCSDK-21379 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 8e91ec1)
Configuration menu - View commit details
-
Copy full SHA for 2011395 - Browse repository at this point
Copy the full SHA 2011395View commit details -
[nrf noup] boards: thingy53: disable GPIO ISR support
Change disables GPIO interrupt support in Zephyr GPIO driver, which is not obligatory for MCUboot. This is needed to reduce memory footprint. Signed-off-by: Nikodem Kastelik <[email protected]> (cherry picked from commit 86af2de)
Configuration menu - View commit details
-
Copy full SHA for 39bbebf - Browse repository at this point
Copy the full SHA 39bbebfView commit details -
[nrf noup] boot/zephyr/boards: nRF54l15pdk ext flash cfg
Added configuration which allows to build MCUboot for nrf54l15pdk_nrf54l15_cpuapp with external flash used for the secondary slot. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 78bc87c)
Configuration menu - View commit details
-
Copy full SHA for 6f3eb68 - Browse repository at this point
Copy the full SHA 6f3eb68View commit details -
[nrf noup] loader: work-around for multi-image builds
Seems multi-image dependencies are not supported for multi-image in NCS yet. This is a workaround which reverts some lines to restore previous MCUboot behavior, so that Immutable bootloader + MCUBoot type builds will work. Ref. NCSDK-8681 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 4ce3844)
Configuration menu - View commit details
-
Copy full SHA for 6f9c198 - Browse repository at this point
Copy the full SHA 6f9c198View commit details -
[nrf noup] loader: Fix missing PCD define check
Fixes a missing PCD define check, an image might have the network core partition layout set but if PCD support is not enabled then it should not assume that PCD support is part of mcuboot. Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 150a1d4)
Configuration menu - View commit details
-
Copy full SHA for dced866 - Browse repository at this point
Copy the full SHA dced866View commit details -
[nrf noup] boot: Add support for NSIB and multi-image
This adds support for using both NSIB and the multi-image configuration in MCUboot. Before this was not possible due to upgradable bootloader support through NSIB was using the `UPDATEABLE_IMAGE_NUMBER` configuration to update the updateable bootloader. In this commit we change from using `FLASH_AREA_IMAGE_PRIMARY` to get the flash area ID to using the bootloader state where we set the flash area ID of the free updatable bootloader slot if the image is intended for this slot. Ref. NCSDK-19223 Ref. NCSDK-23305 Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 3ec5084)
Configuration menu - View commit details
-
Copy full SHA for a7cea4e - Browse repository at this point
Copy the full SHA a7cea4eView commit details -
[nrf noup] sysflash: Move partition manager definitions to pm_sysflash.h
Making sysflash.h and pm_sysflash.h more readable. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 51b7a3f)
Configuration menu - View commit details
-
Copy full SHA for fbe4075 - Browse repository at this point
Copy the full SHA fbe4075View commit details -
[nrf noup] sysflash: Add support for three images
The commit modifies pm_sysflash.h to add support for three application images. Ref. NCSDK-19223 Signed-off-by: Dominik Ermel <[email protected]> Signed-off-by: Sigvart Hovland <[email protected]> (cherry picked from commit 9c67351)
Configuration menu - View commit details
-
Copy full SHA for e80e793 - Browse repository at this point
Copy the full SHA e80e793View commit details -
[nrf noup] loader: introduced cleanup of unusable secondary slot
Added procedure which clean-up content of all the secondary slot which contains valid header but couldn't be assigned to any of supported primary images. This behavior is needed when configuration allows to use one secondary slot for collecting image for multiple primary slots. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 8f4b472)
Configuration menu - View commit details
-
Copy full SHA for 51e36d8 - Browse repository at this point
Copy the full SHA 51e36d8View commit details -
[nrf noup] boards: nrf54l15: Disable FPROTECT
FPROTECT is not suppored yet for nrf54l15. Signed-off-by: Grzegorz Chwierut <[email protected]> Signed-off-by: Gerard Marull-Paretas <[email protected]> (cherry picked from commit 0b5810d)
Configuration menu - View commit details
-
Copy full SHA for 592a0f1 - Browse repository at this point
Copy the full SHA 592a0f1View commit details -
[nrf noup] loader: remove cleanup for direct xip mode
Move ifdefs just to not add code for cleanup unusable slot when direct xip mode is enabled to avoid warnings. Signed-off-by: Grzegorz Chwierut <[email protected]> (cherry picked from commit 650d11c)
Configuration menu - View commit details
-
Copy full SHA for 948c3ad - Browse repository at this point
Copy the full SHA 948c3adView commit details -
[nrf noup] zephyr: Clean up non-secure RAM if enabled
fixup! [nrf noup] zephyr: Clean up non-secure RAM if enabled Add support for nrf54l15 UARTE20 and UARTE30. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 0611b4c)
Configuration menu - View commit details
-
Copy full SHA for a3545cd - Browse repository at this point
Copy the full SHA a3545cdView commit details -
[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash partition
Added DTS with partitioning which involves external flash as place for slo1_partition. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit efe6681)
Configuration menu - View commit details
-
Copy full SHA for 1347dfb - Browse repository at this point
Copy the full SHA 1347dfbView commit details -
[nrf noup] boot/zephyr/boards: nrf54l15pdk ext-flash update
This patch supplements the configuration for external flash so MCUboot can be build with FILE_SUFFIX="ext_flash" for the nrf54l15pdk instead of explicitly configuration specification. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 3131c92)
Configuration menu - View commit details
-
Copy full SHA for 8b7d37f - Browse repository at this point
Copy the full SHA 8b7d37fView commit details -
[nrf noup] boards: thingy91x: enable serial recovery
This patch disbales MCUBoot logging and enables serial recovery for the Thingy:91. Signed-off-by: Maximilian Deubel <[email protected]> Signed-off-by: Bernt Johan Damslora <[email protected]> (cherry picked from commit f67a11a)
Configuration menu - View commit details
-
Copy full SHA for 6b95cd6 - Browse repository at this point
Copy the full SHA 6b95cd6View commit details -
[nrf noup] boot: zephyr: Disable boot banner if NCS_BOOT_BANNER is used
Mcuboot's boot banner should not be used if NCS boot banner is enabled. Signed-off-by: Robert Lubos <[email protected]> (cherry picked from commit 7b018cb)
Configuration menu - View commit details
-
Copy full SHA for 220096b - Browse repository at this point
Copy the full SHA 220096bView commit details -
[nrf noup] boot/zephyr: fix fw_info search
By the upstream patch the vt get now the pointer to the copy of the arm_vector instead of original. This patch fixes address of the firmware which is to be taken by the fw_info_find. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 3be724f)
Configuration menu - View commit details
-
Copy full SHA for 592f636 - Browse repository at this point
Copy the full SHA 592f636View commit details -
[nrf noup] Revert of zephyr: arm: Update reading the flash image rese…
…t vector This is revert of upstream commit 453096b which was supposed to allow picking interrupt vector table from flash area but the whole modification unfortunately misunderstood difference between flash device ID and flash area ID. The commit is not important for sdk-nrf and requires re-design and fixing upstream. Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit f1e1675)
Configuration menu - View commit details
-
Copy full SHA for ad75809 - Browse repository at this point
Copy the full SHA ad75809View commit details -
[nrf noup] zephyr/boards: fix nrf54l15pdk ext flash dts overlay
Align to changes in DTS: renamed: rram0 -> cpuapp_rram sized up cpauapp_rram region szie as part of it was reserved for cpuflpr_rram (which is not used by this config). Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit f1c2b8c)
Configuration menu - View commit details
-
Copy full SHA for 48e6e27 - Browse repository at this point
Copy the full SHA 48e6e27View commit details -
[nrf noup] boot: zephyr: Add NCS boot banner
Adds a boot banner which shows as MCUboot Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 6869a65)
Configuration menu - View commit details
-
Copy full SHA for 0148f96 - Browse repository at this point
Copy the full SHA 0148f96View commit details -
[nrf noup] boot/../loader: skip downgrade prevention for s1/s0
This patch introduces skip on checking downgrade for s1/s0 upgrade image (chain-loaded by NSIB). which is used for upgrade MCUboot instance itself. Reason is that sdk-mcuboot has not access to semantic version of its own image. I also shouldn't touch HW counter used for hardware downgrade prevention for the application image (which was the case). HW counters for s0/s1 image are owned by NSIB because its role is to prevnt dongrades of s0/s1 MCUboot. Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 776ee26)
Configuration menu - View commit details
-
Copy full SHA for cc78118 - Browse repository at this point
Copy the full SHA cc78118View commit details -
[nrf noup] boot/../loader: reboot after updating s0/s1
As this is MCUboot updating itself, it should reboot the device so NSIB will chainload the update MCUboot Signed-off-by: Andrzej Puzdrowski <[email protected]> (cherry picked from commit 8541955)
Configuration menu - View commit details
-
Copy full SHA for 29fdb63 - Browse repository at this point
Copy the full SHA 29fdb63View commit details -
[nrf noup] Remove secure boot debug Kconfig
fixup! [nrf noup] zephyr: add 'minimal' configuration files Removes setting a now removed Kconfig option Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 28fdae8 - Browse repository at this point
Copy the full SHA 28fdae8View commit details -
[nrf noup] bootutil: loader: Fix netcore address checking
Fixes an issues with wrongly checking the network core reset address Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fcf0a31 - Browse repository at this point
Copy the full SHA fcf0a31View commit details -
[nrf noup] boards: nrf54l15dk: Disable FPROTECT
FPROTECT is not suppored for nrf54l15dk. Signed-off-by: Andrzej Puzdrowski <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 123454f - Browse repository at this point
Copy the full SHA 123454fView commit details -
[nrf noup] zephyr: Add support for compressed image updates
Adds support for LZMA-compressed firmware updates Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a242e91 - Browse repository at this point
Copy the full SHA a242e91View commit details -
[nrf fromtree] boot: SHA512 verification
adds TLV and Kconfig to decouple verification from other options. Signed-off-by: Mateusz Michalek <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 41df52e)
Configuration menu - View commit details
-
Copy full SHA for 756c5bf - Browse repository at this point
Copy the full SHA 756c5bfView commit details -
[nrf noup] boot: Add shared crypto for ECDSA and SHA
* Add functions for ecdsa_verify_secp256r1 and sha256 to use the shared crypto API * Add Kconfig and CMake variables for selecting shared crypto when using ecdsa * Add custom section to project for placing the API section in the correct location in flash * Add kconfig fragment for using external crypto Signed-off-by: Sigvart Hovland <[email protected]> Signed-off-by: Martí Bolívar <[email protected]> Signed-off-by: Emil Obalski <[email protected]> Signed-off-by: Andrzej Puzdrowski <[email protected]> Signed-off-by: Håkon Øye Amundsen <[email protected]> Signed-off-by: Ioannis Glaropoulos <[email protected]> Signed-off-by: Trond Einar Snekvik <[email protected]> Signed-off-by: Georgios Vasilakis <[email protected]> Signed-off-by: Johann Fischer <[email protected]> Signed-off-by: Torsten Rasmussen <[email protected]> Signed-off-by: Jamie McCrae <[email protected]> Signed-off-by: Dominik Ermel <[email protected]> (cherry picked from commit 55683e3) (cherry picked from commit 0faa8b2) (cherry picked from commit a42e9cc) (cherry picked from commit 895c76b) (cherry picked from commit ff53382) (cherry picked from commit cc42516)
Configuration menu - View commit details
-
Copy full SHA for 4e0dee6 - Browse repository at this point
Copy the full SHA 4e0dee6View commit details -
[nrf fromlist] imgtool: Add support for calculating SHA512
The adds support for hashing image with SHA512, to allow SHA512-ED25519-SHA512 signature. To support above --sha parameter has been added that can take value: auto, 256, 384, 512 to select sha, where auto brings the default behaviour, or current, behaviour. The sha provided here is tested against key so not all combinations are supported. Upstream PR: mcu-tools/mcuboot#2048 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3a28585 - Browse repository at this point
Copy the full SHA 3a28585View commit details -
[nrf fromlist] boot: Replace boot_encrypt by boot_enc_encrypt and boo…
…t_enc_decrypt To be able to implement encryption with API that requires different calls for encryption and encryption, the boot_encrypt needs to be replaced with encryption/decryption specific functions. Upstream PR: mcu-tools/mcuboot#2017 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 18781c5 - Browse repository at this point
Copy the full SHA 18781c5View commit details -
[nrf noup] PSA configuration required changes
Set of changes to Kconfig, CMakeLists.txt and some of headers that are required for the PSA support to compile. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6400cc8 - Browse repository at this point
Copy the full SHA 6400cc8View commit details -
[nrf noup] PSA implementation of x25519 and ed25519 verification
The commit provides implementation of image verification with ed25519 and encryption/decryption support where random key is encrypted using x25519. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e874cf8 - Browse repository at this point
Copy the full SHA e874cf8View commit details -
[nrf noup] Exclude PSA source on non-PSA crypto configuration
fixup! [nrf noup] PSA configuration required changes Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2d7b4a6 - Browse repository at this point
Copy the full SHA 2d7b4a6View commit details -
[nrf noup] bootutil: Provide support for SHA512 with ED25519
Use SHA512 directly calculated over image with the ED25519 signature. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ccb9552 - Browse repository at this point
Copy the full SHA ccb9552View commit details -
[nrf noup] bootutil: Enable hash calculation directly on storage
The commit add support for passing storage device address space to hash calculation functions, which allows to use hardware accelerated hash calculation on storage. This feature only works when image encryption is not enabled and all slots are defined within internal storage of device. The feature is enabled using Kconfig option CONFIG_BOOT_IMG_HASH_DIRECTLY_ON_STORAGE Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 258b369 - Browse repository at this point
Copy the full SHA 258b369View commit details -
[nrf noup] bootutil: PureEdDSA using ED25519
The commit adds support for PureEdDSA, which validates signature of image rather than hash. This is most secure, available, ED25519 usage in MCUboot, but due to requirement of PureEdDSA to be able to calculate signature at whole message at once, here image, it only works on setups where entire image can be mapped to device address space, so that PSA functions calculating the signature can see the whole image at once. This option is enabled with Kconfig option: CONFIG_BOOT_SIGNATURE_TYPE_PURE when the ED25519 signature type is already selected. Note that the option will enable SHA512 for calculating public key hash. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d1b85af - Browse repository at this point
Copy the full SHA d1b85afView commit details -
[nrf noup] There is only one SHA supported at once
fixup! [nrf noup] PSA implementation of x25519 and ed25519 verification And fixing typos. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 910045d - Browse repository at this point
Copy the full SHA 910045dView commit details -
[nrf noup] bootutil: Fix typo in identifier
fixup! [nrf noup] bootutil: PureEdDSA using ED25519 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4a5d2ae - Browse repository at this point
Copy the full SHA 4a5d2aeView commit details -
[nrf fromlist] scripts: imgtool: compression
Adds LZMA2 compression to imgtool. Python lzma library is unable to compress with proper parameters while using "ALONE" container, therefore 2 header bytes are calculated and added to payload by imgtool. Upstream PR: mcu-tools/mcuboot#2038 Signed-off-by: Mateusz Michalek <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 237b8b9 - Browse repository at this point
Copy the full SHA 237b8b9View commit details -
[nrf noup] boot: zephyr: kconfig: Select PM_USE_CONFIG_SRAM_SIZE when…
… needed fixup! [nrf noup] zephyr: Add support for compressed image updates Selects this Kconfig when compression is enabled for nrf54l15 Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f3a288d - Browse repository at this point
Copy the full SHA f3a288dView commit details -
[nrf noup] Add missing selection of MBEDTLS_PSA_CRYPTO_C
fixup! [nrf noup] PSA configuration required changes Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c020cd0 - Browse repository at this point
Copy the full SHA c020cd0View commit details -
[nrf noup] boot/zephyr/Kconfig: conditionally disable BOOT_MAX_IMG_SE…
…CTORS_AUTO Automatic calculation are based on DTS data which are no the right source on partition layout in case Partition manager does the partitioning. Signed-off-by: Andrzej Puzdrowski <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 12e9928 - Browse repository at this point
Copy the full SHA 12e9928View commit details -
[nrf fromlist] zephyr/Kconfig.serial_recovery: limit Slot info command
BOOT_SERIAL_IMG_GRP_SLOT_INFO should be not available for direct-xip and ram-load modes. Upstream PR: mcu-tools/mcuboot#2073 Signed-off-by: Andrzej Puzdrowski <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e295db1 - Browse repository at this point
Copy the full SHA e295db1View commit details -
[nrf fromtree] boot: bootutil: loader: Fix slot info for directXIP/RA…
…M load Fixes an issue when either of these modes is used with serial recovery slot info enabled Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 30109df)
Configuration menu - View commit details
-
Copy full SHA for d44d7bc - Browse repository at this point
Copy the full SHA d44d7bcView commit details -
[nrf fromtree] boot: bootutil: loader: Fix issue with using pointers
Fixes an issue whereby static buffers were changed into pointers, whereby they are then assumed to be the size of a pointer rather than the size of the actual buffers Signed-off-by: Jamie McCrae <[email protected]> (cherry picked from commit 3a195f2) Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 22adc04 - Browse repository at this point
Copy the full SHA 22adc04View commit details
Commits on Oct 7, 2024
-
[nrf fromtree] scripts: imgtool: compression
Adds LZMA2 compression to imgtool. Python lzma library is unable to compress with proper parameters while using "ALONE" container, therefore 2 header bytes are calculated and added to payload by imgtool. Signed-off-by: Mateusz Michalek <[email protected]> (cherry picked from commit 35c9291fcafafe8608722e0ec3c801178884f0ef)
Configuration menu - View commit details
-
Copy full SHA for 10f3dbe - Browse repository at this point
Copy the full SHA 10f3dbeView commit details -
[nrf noup] zephyr: Fix compressed image support
fixup! [nrf noup] zephyr: Add support for compressed image updates Fixes some issues with compressed image update support Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b245ccd - Browse repository at this point
Copy the full SHA b245ccdView commit details -
[nrf fromlist] boot: bootutil: swap_scratch: Fix compressed image sec…
…tor size check Fixes an issue with compressed update support whereby it would wrong continue to check all sector sizes and error due to the sector sizes of the secondary slot being 0 until overflow Upstream PR: mcu-tools/mcuboot#2085 Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8c814cb - Browse repository at this point
Copy the full SHA 8c814cbView commit details -
[nrf noup] zephyr: Add support for ARM thumb filter
Adds support for ARM thumb filter usage for compressed firmware updates Signed-off-by: Jamie McCrae <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0ea935a - Browse repository at this point
Copy the full SHA 0ea935aView commit details -
[nrf fromlist] scripts: imgtool: compression ARM thumb filter
Adds ARM thumb filter to imgtool's LZMA2 compression. Upstream PR: mcu-tools/mcuboot#2084 Signed-off-by: Mateusz Michalek <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 94212b4 - Browse repository at this point
Copy the full SHA 94212b4View commit details
Commits on Oct 9, 2024
-
[nrf fromlist] bootutil: Allow bypassing ASN.1 encoding for ED25519 k…
…ey import The commit adds MCUBOOT_KEY_IMPORT_BYPASS_ASN configuration option that allows bypassing ASN.1 decoding of ED25519 public key, compiled into MCUboot. When the option is enabled the key will be accessed directly and ASN.1 processing is not compiled in, resulting in smaller footprint of MCUboot, at a cost of reduced detection of invalid key, i.e. public key designated for different method than compiled in. Upstream PR: mcu-tools/mcuboot#2089 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 54b6307 - Browse repository at this point
Copy the full SHA 54b6307View commit details -
[nrf fromlist] zephyr: Add Kconfig option CONFIG_BOOT_KEY_IMPORT_BYPA…
…SS_ASN The option enables MCUboot configuration option MCUBOOT_KEY_IMPORT_BYPASS_ASN. Upstream PR: mcu-tools/mcuboot#2089 Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 36fc9d3 - Browse repository at this point
Copy the full SHA 36fc9d3View commit details -
[nrf noup] Add ASN.1 bypass to bootutil_verify_img
Allow ASN.1 bypass for image verification. Signed-off-by: Dominik Ermel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8c99a50 - Browse repository at this point
Copy the full SHA 8c99a50View commit details