commit | e90b13f9a997eb5f8369aa79e17c5899d17979d8 | [log] [tgz] |
---|---|---|
author | David Brown <david.brown@linaro.org> | Fri Dec 06 15:04:00 2019 -0700 |
committer | David Brown <davidb@davidb.org> | Mon Dec 09 09:54:15 2019 -0700 |
tree | b6d53b8a2f9be6e8dcb6112814a67fb48bb2aa84 | |
parent | 4fae8b87437a8698d568c5d5fc3b5604383c2b5f [diff] |
sim: Actually test invalid signatures Currently, the tests that appear to be testing for invalid signatures are actually just testing that images aren't used if the entire TLV block is missing. Fix this by being more subtle about our corruptions. If there is no signature, corrupt that data being used to generate the hash. Otherwise, modify the data before it goes into the signature, but generate a valid SHA256 in the TLV. This way, we exercise the signature itself being corrupt. Signed-off-by: David Brown <david.brown@linaro.org>
This is mcuboot version 1.4.0
MCUboot is a secure bootloader for 32-bit MCUs. The goal of MCUboot is to define a common infrastructure for the bootloader, system flash layout on microcontroller systems, and to provide a secure bootloader that enables simple software upgrades.
MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating. Currently, mcuboot works with both the Apache Mynewt and Zephyr operating systems, but more ports are planned in the future. RIOT is currently supported as a boot target with a complete port planned.
Instructions for different operating systems can be found here:
The issues being planned and worked on are tracked using GitHub issues. To participate please visit:
Issues were previously tracked on MCUboot JIRA , but it is now deprecated.
Information and documentation on the bootloader are stored within the source.
It was previously also documented on confluence: MCUBoot Confluence however, it is now deprecated and not currently maintained
For more information in the source, here are some pointers:
Developers welcome!