Francesco Servidio | 5bc9832 | 2021-11-03 13:19:22 +0100 | [diff] [blame^] | 1 | # MCUboot release notes |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 2 | |
| 3 | - Table of Contents |
| 4 | {:toc} |
| 5 | |
David Brown | ae35510 | 2021-08-27 13:15:16 -0600 | [diff] [blame] | 6 | ## Version 1.8.0 |
| 7 | |
| 8 | The 1.8.0 release of MCUboot contains numerous fixes, and adds support |
| 9 | for the NuttX RTOS, and the Espressif ESP32 SDK. |
| 10 | |
| 11 | ### About this release |
| 12 | |
| 13 | - Add support for the NuttX RTOS. |
| 14 | - Add support for the Espressif ESP32 SDK. |
| 15 | - `boot_serial` changed to use cddl-gen, which removes the dependency |
| 16 | on tinycbor. |
| 17 | - Add various hooks to be able to change how image data is accessed. |
| 18 | - Cypress supports Mbed TLS for encryption. |
| 19 | - Support using Mbed TLS for ECDSA. This can be useful if Mbed TLS is |
| 20 | brought in for another reason. |
| 21 | - Add simulator support for testing direct-XIP and ramload. |
| 22 | - Support Mbed TLS 3.0. Updates the submodule for Mbed TLS to 3.0. |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 23 | - Enable direct-xip mode in Mbed-OS port. |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 24 | - extract `bootutil_public` library, a common interface for MCUboot |
David Brown | ae35510 | 2021-08-27 13:15:16 -0600 | [diff] [blame] | 25 | and the application. |
| 26 | - Allow to boot primary image if secondary one is unreachable. |
| 27 | - Add AES256 image encryption support. |
| 28 | - Add Multiimage boot for direct-xip and ram-load mode. |
David Brown | 0779f4f | 2021-08-27 13:15:16 -0600 | [diff] [blame] | 29 | - Cargo files moved to top level, now `cargo test` can be run from the |
| 30 | top level directory. |
| 31 | - Fault injection tests use updated TF-M. |
| 32 | - Thingy:53 now supports multi-image DFU. |
David Brown | 29099e1 | 2021-10-12 09:52:18 -0600 | [diff] [blame] | 33 | - ram load and image encryption can be used together, allowing the |
| 34 | entire contents of flash to always remain encrypted. |
David Brown | ae35510 | 2021-08-27 13:15:16 -0600 | [diff] [blame] | 35 | |
| 36 | ### Security fixes |
| 37 | |
| 38 | - [GHSA-gcxh-546h-phg4](https://github.com/mcu-tools/mcuboot/security/advisories/GHSA-gcxh-546h-phg4) |
| 39 | has been published. There is not a fix at this time, but a caution |
| 40 | to be sure to follow the instructions carefully, and make sure that |
| 41 | the development keys in the repo are never used in a production |
| 42 | system. |
| 43 | |
Andrzej Puzdrowski | 6934463 | 2020-10-30 15:36:49 +0100 | [diff] [blame] | 44 | ## Version 1.7.0 |
| 45 | |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 46 | The 1.7.0 release of MCUboot adds support for the Mbed-OS platform, |
Andrzej Puzdrowski | e759661 | 2020-11-10 14:54:41 +0100 | [diff] [blame] | 47 | Equal slots (direct-xip) upgrade mode, RAM loading upgrade mode, |
| 48 | hardening against hardware level fault injection and timing attacks |
| 49 | and single image mode. |
Andrzej Puzdrowski | 6934463 | 2020-10-30 15:36:49 +0100 | [diff] [blame] | 50 | There are bug fixes, and associated imgtool updates as well. |
| 51 | |
| 52 | ### About this release |
| 53 | |
Andrzej Puzdrowski | e759661 | 2020-11-10 14:54:41 +0100 | [diff] [blame] | 54 | - Initial support for the Mbed-OS platform. |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 55 | - Added possibility to enter deep sleep mode after MCUboot app execution |
Andrzej Puzdrowski | 6934463 | 2020-10-30 15:36:49 +0100 | [diff] [blame] | 56 | for cypress platform. |
| 57 | - Added hardening against hardware level fault injection and timing attacks. |
| 58 | - Introduced Abstract crypto primitives to simplify porting. |
| 59 | - Added RAM-load upgrade mode. |
| 60 | - Renamed single-image mode to single-slot mode. |
| 61 | - Allow larger primary slot in swap-move |
| 62 | - Fixed boostrapping in swap-move mode. |
| 63 | - Fixed issue causing that interrupted swap-move operation might brick device |
| 64 | if the primary image was padded. |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 65 | - Abstracting MCUboot crypto functions for cleaner porting |
Andrzej Puzdrowski | 6934463 | 2020-10-30 15:36:49 +0100 | [diff] [blame] | 66 | - Droped flash_area_read_is_empty() porting API. |
| 67 | - boot/zephyr: Added watchdog feed on nRF devices. |
| 68 | See `CONFIG_BOOT_WATCHDOG_FEED` option. |
| 69 | - boot/zephyr: Added patch for turning off cache for Cortex M7 before |
| 70 | chain-loading. |
| 71 | - boot/zephyr: added option to relocate interrupts to application |
| 72 | - boot/zephyr: clean ARM core configuration only when selected by user |
| 73 | - boot/boot_serial: allow nonaligned last image data chunk |
| 74 | - imgtool: added custom TLV support. |
| 75 | - imgtool: added possibility to set confirm flag for hex files as well. |
| 76 | - imgtool: Print image digest during verify. |
| 77 | |
Francesco Servidio | 5bc9832 | 2021-11-03 13:19:22 +0100 | [diff] [blame^] | 78 | ### Zephyr-RTOS compatibility |
Andrzej Puzdrowski | a8e12da | 2020-11-25 15:59:22 +0100 | [diff] [blame] | 79 | |
David Brown | fe0bfcf | 2021-05-14 10:12:10 -0600 | [diff] [blame] | 80 | This release of MCUboot works with the Zephyr "main" at the time of the |
Andrzej Puzdrowski | a8e12da | 2020-11-25 15:59:22 +0100 | [diff] [blame] | 81 | release. It was tested as of has 7a3b253ce. This version of MCUboot also |
| 82 | works with the Zephyr v2.4.0, however it is recommended to enable |
| 83 | `CONFIG_MCUBOOT_CLEANUP_ARM_CORE` while using that version. |
| 84 | |
David Brown | 342e875 | 2020-04-15 10:57:28 -0600 | [diff] [blame] | 85 | ## Version 1.6.0 |
| 86 | |
| 87 | The 1.6.0 release of MCUboot adds support for the PSOC6 platform, |
| 88 | X25519 encrypted images, rollback protection, hardware keys, and a |
| 89 | shared boot record to communicate boot attestation information to |
| 90 | later boot stages. There are bug fixes, and associated imgtool |
| 91 | updates as well. |
| 92 | |
| 93 | ### About this release |
| 94 | |
| 95 | - Initial support for the Cypress PSOC6 plaformt. This platform |
| 96 | builds using the Cypress SDK, which has been added as submodules. |
| 97 | - CBOR decoding in serial recovery replaced by code generated from a |
| 98 | CDDL description. |
| 99 | - Add support for X25519 encrypted images. |
| 100 | - Add rollback protection. There is support for a HW rollback counter |
| 101 | (which must be provided as part of the platform), as well as a SW |
| 102 | solution that protects against some types of rollback. |
| 103 | - Add an optional boot record in shared memory to communicate boot |
| 104 | attributes to later-run code. |
| 105 | - Add support for hardware keys. |
| 106 | - Various fixes to work with the latest Zephyr version. |
| 107 | |
| 108 | ### Security issues addressed |
| 109 | |
| 110 | - CVE-2020-7595 "xmlStringLenDecodeEntities in parser.c in libxml2 |
| 111 | 2.9.10 has an infinite loop in a certain end-of-file situation." Fix |
| 112 | by updating a dependency in documentation generation. |
| 113 | |
Francesco Servidio | 5bc9832 | 2021-11-03 13:19:22 +0100 | [diff] [blame^] | 114 | ### Zephyr-RTOS compatibility |
David Brown | 82c5f7c | 2020-05-05 15:47:30 -0600 | [diff] [blame] | 115 | |
David Brown | fe0bfcf | 2021-05-14 10:12:10 -0600 | [diff] [blame] | 116 | This release of MCUboot works the Zephyr "main" at the time of the |
David Brown | 50d24a5 | 2020-05-22 10:23:42 -0600 | [diff] [blame] | 117 | release. It was tested as of has 1a89ca1238. When Zephyr v2.3.0 is |
| 118 | released, there will be a possible 1.6.1 or similar release of Zephyr |
David Brown | 82c5f7c | 2020-05-05 15:47:30 -0600 | [diff] [blame] | 119 | if needed to address any issues. There also may be branch releases of |
| 120 | MCUboot specifically for the current version of Zephyr, e.g. |
| 121 | v1.6.0-zephyr-2.2.1. |
| 122 | |
Fabio Utzig | ef7fbd7 | 2020-02-05 12:43:23 -0300 | [diff] [blame] | 123 | ## Version 1.5.0 |
| 124 | |
| 125 | The 1.5.0 release of MCUboot adds support for encrypted images using |
| 126 | ECIES with secp256r1 as an Elliptic Curve alternative to RSA-OAEP. A |
| 127 | new swap method was added which allows for upgrades without using a |
| 128 | scratch partition. There are also lots of bug fixes, extra simulator |
| 129 | testing coverage and some imgtool updates. |
| 130 | |
| 131 | ### About this release |
| 132 | |
| 133 | - TLVs were updated to use 16-bit lengths (from previous 8). This |
| 134 | should work with no changes for little-endian targets, but will |
| 135 | break compatibility with big-endian targets. |
| 136 | - A benchmark framework was added to Zephyr |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 137 | - ed25519 signature validation can now build without using Mbed TLS |
Fabio Utzig | ef7fbd7 | 2020-02-05 12:43:23 -0300 | [diff] [blame] | 138 | by relying on a bundled tinycrypt based sha-512 implementation. |
| 139 | - imgtool was updated to correctly detect trailer overruns by image. |
| 140 | - Encrypted image TLVs can be saved in swap metadata during a swap |
| 141 | upgrade instead of the plain AES key. |
| 142 | - imgtool can dump private keys in C format (getpriv command), which |
| 143 | can be added as decryption keys. Optionally can remove superfluous |
| 144 | fields from the ASN1 by passing it `--minimal`. |
| 145 | - Lots of other smaller bugs fixes. |
| 146 | - Added downgrade prevention feature (available when the overwrite-based |
| 147 | image update strategy is used) |
| 148 | |
| 149 | ### Known issues |
| 150 | |
| 151 | - TLV size change breaks compatibility with big-endian targets. |
| 152 | |
David Brown | 4d0c5fa | 2019-10-08 09:57:31 -0600 | [diff] [blame] | 153 | ## Version 1.4.0 |
| 154 | |
| 155 | The 1.4.0 release of MCUboot primarily adds support for multi-image |
| 156 | booting. With this release, MCUboot can manage two images that can be |
| 157 | updated independently. With this, it also supports additions to the |
| 158 | TLV that allow these dependencies to be specified. |
| 159 | |
| 160 | Multi-image support adds backward-incompatible changes to the format |
| 161 | of the images: specifically adding support for protected TLV entries. |
| 162 | If multiple images and dependencies are not used, the images will be |
| 163 | compatible with previous releases of MCUboot. |
| 164 | |
| 165 | ### About this release |
| 166 | |
David Brown | d758177 | 2019-10-15 12:00:25 -0600 | [diff] [blame] | 167 | - Fixed CVE-2019-5477, and CVE-2019-16892. These fix issue with |
| 168 | dependencies used in the generation of the documentation on github. |
David Brown | 4d0c5fa | 2019-10-08 09:57:31 -0600 | [diff] [blame] | 169 | - Numerous code cleanups and refactorings |
| 170 | - Documentation updates for multi-image features |
| 171 | - Update imgtool.py to support the new features |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 172 | - Updated the Mbed TLS submodule to current stable version 2.16.3 |
| 173 | - Moved the Mbed TLS submodule from within sim/mcuboot-sys to ext. |
David Brown | d758177 | 2019-10-15 12:00:25 -0600 | [diff] [blame] | 174 | This will make it easier for other board supports to use this code. |
| 175 | - Added some additional overflow and bound checks to data in the image |
| 176 | header, and TLV data. |
| 177 | - Add a `-x` (or `--hex_addr`) flag to imgtool to set the base address |
| 178 | written to a hex-format image. This allows the image to be flashed |
| 179 | at an offset, without having to use additional tools to modify the |
| 180 | image. |
David Brown | 4d0c5fa | 2019-10-08 09:57:31 -0600 | [diff] [blame] | 181 | |
Szymon Janc | 7fea846 | 2019-07-04 14:45:52 +0200 | [diff] [blame] | 182 | ## Version 1.3.1 |
| 183 | |
| 184 | The 1.3.1 release of MCUboot consists mostly of small bug fixes and updates. |
| 185 | There are no breaking changes in functionality. This release should work with |
David Brown | fe0bfcf | 2021-05-14 10:12:10 -0600 | [diff] [blame] | 186 | Mynewt 1.6.0 and up, and any Zephyr `main` after sha |
Szymon Janc | 7fea846 | 2019-07-04 14:45:52 +0200 | [diff] [blame] | 187 | f51e3c296040f73bca0e8fe1051d5ee63ce18e0d. |
| 188 | |
| 189 | ### About this release |
| 190 | |
| 191 | - Fixed a revert interruption bug |
| 192 | - Added ed25519 signing support |
| 193 | - Added RSA-3072 signing support |
| 194 | - Allow ec256 to run on CC310 interface |
| 195 | - Some preparation work was done to allow for multi image support, which |
| 196 | should land in 1.4.0. This includes a simulator update for testing |
| 197 | multi-images, and a new name for slot0/slot1 which are now called |
| 198 | "primary slot" and "secondary slot". |
| 199 | - Other minor bugfixes and improvements |
| 200 | |
David Brown | b1d15a7 | 2019-01-22 16:22:08 -0700 | [diff] [blame] | 201 | ## Version 1.3.0 |
| 202 | |
| 203 | The 1.3.0 release of MCUboot brings in many fixes and updates. There |
| 204 | are no breaking changes in functionality. Many of the changes are |
| 205 | refactorings that will make the code easier to maintain going forward. |
| 206 | In addition, support has been added for encrypted images. See [the |
| 207 | docs](encrypted_images.md) for more information. |
| 208 | |
| 209 | ### About this release |
| 210 | |
| 211 | - Modernize the Zephyr build scripts. |
| 212 | - Add a `ptest` utility to help run the simulator in different |
| 213 | configurations. |
| 214 | - Migrate the simulator to Rust 2018 edition. The sim now requires at |
| 215 | least Rust 1.32 to build. |
| 216 | - Simulator cleanups. The simulator code is now built the same way |
| 217 | for every configuration, and queries the MCUboot code for how it was |
| 218 | compiled. |
| 219 | - Abstract logging in MCUboot. This was needed to support the new |
| 220 | logging system used in Zephyr. |
| 221 | - Add multiple flash support. Allows slot1/scratch to be stored in an |
| 222 | external flash device. |
| 223 | - Add support for [encrypted images](encrypted_images.md). |
| 224 | - Add support for flash devices that read as '0' when erased. |
| 225 | - Add support to Zephyr for the `nrf52840_pca10059`. This board |
| 226 | supports serial recovery over USB with CDC ACM. |
| 227 | - imgtool is now also available as a python package on pypi.org. |
| 228 | - Add an option to erase flash pages progressively during recovery to |
| 229 | avoid possible timeouts (required especially by serial recovery |
| 230 | using USB with CDC ACM). |
| 231 | - imgtool: big-endian support |
| 232 | - imgtool: saves in intel-hex format when output filename has `.hex` |
| 233 | extension; otherwise saves in binary format. |
| 234 | |
Fabio Utzig | 3c93901 | 2018-06-25 13:26:32 -0300 | [diff] [blame] | 235 | ## Version 1.2.0 |
| 236 | |
| 237 | The 1.2.0 release of MCUboot brings a lot of fixes/updates, where much of the |
| 238 | changes were on the boot serial functionality and imgtool utility. There are |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 239 | no breaking changes in MCUboot functionality, but some of the CLI parameters |
Fabio Utzig | 3c93901 | 2018-06-25 13:26:32 -0300 | [diff] [blame] | 240 | in imgtool were changed (either removed or added or updated). |
| 241 | |
| 242 | ### About this release |
| 243 | |
| 244 | - imgtool accepts .hex formatted input |
| 245 | - Logging system is now configurable |
| 246 | - Most Zephyr configuration has been switched to Kconfig |
| 247 | - Build system accepts .pem files in build system to autogenerate required |
| 248 | key arrays used internally |
| 249 | - Zephyr build switched to using built-in flash_map and TinyCBOR modules |
| 250 | - Serial boot has substantially decreased in space usage after refactorings |
| 251 | - Serial boot build doesn't require newlib-c anymore on Zephyr |
| 252 | - imgtool updates: |
| 253 | + "create" subcommand can be used as an alias for "sign" |
| 254 | + To allow imgtool to always perform the check that firmware does not |
| 255 | overflow the status area, `--slot-size` was added and `--pad` was updated |
| 256 | to act as a flag parameter. |
| 257 | + `--overwrite-only` can be passed if not using swap upgrades |
| 258 | + `--max-sectors` can be used to adjust the maximum amount of sectors that |
| 259 | a swap can handle; this value must also be configured for the bootloader |
| 260 | + `--pad-header` substitutes `--included-header` with reverted semantics, |
| 261 | so it's not required for firmware built by Zephyr build system |
| 262 | |
| 263 | ### Known issues |
| 264 | |
| 265 | None |
| 266 | |
Fabio Utzig | 49045cc | 2018-01-09 15:56:29 -0200 | [diff] [blame] | 267 | ## Version 1.1.0 |
| 268 | |
Carles Cufi | 90eda80 | 2018-01-29 18:33:20 +0100 | [diff] [blame] | 269 | The 1.1.0 release of MCUboot brings a lot of fixes/updates to its |
Fabio Utzig | 49045cc | 2018-01-09 15:56:29 -0200 | [diff] [blame] | 270 | inner workings, specially to its testing infrastructure which now |
| 271 | enables a more thorough quality assurance of many of the available |
| 272 | options. As expected of the 1.x.x release cycle, no breaking changes |
| 273 | were made. From the tooling perpective the main addition is |
| 274 | newt/imgtool support for password protected keys. |
| 275 | |
| 276 | ### About this release |
| 277 | |
| 278 | - serial recovery functionality support under Zephyr |
| 279 | - simulator: lots of refactors were applied, which result in the |
| 280 | simulator now leveraging the Rust testing infrastructure; testing |
| 281 | of ecdsa (secp256r1) was added |
| 282 | - imgtool: removed PKCS1.5 support, added support for password |
| 283 | protected keys |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 284 | - tinycrypt 0.2.8 and the Mbed TLS ASN1 parser are now bundled with |
Francesco Servidio | 4ff0c18 | 2021-10-20 15:27:16 +0200 | [diff] [blame] | 285 | MCUboot (eg secp256r1 is now free of external dependencies!) |
Fabio Utzig | 49045cc | 2018-01-09 15:56:29 -0200 | [diff] [blame] | 286 | - Overwrite-only mode was updated to erase/copy only sectors that |
| 287 | actually store firmware |
| 288 | - A lot of small code and documentation fixes and updates. |
| 289 | |
| 290 | ### Known issues |
| 291 | |
| 292 | None |
| 293 | |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 294 | ## Version 1.0.0 |
| 295 | |
Carles Cufi | 90eda80 | 2018-01-29 18:33:20 +0100 | [diff] [blame] | 296 | The 1.0.0 release of MCUboot introduces a format change. It is |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 297 | important to either use the `imgtool.py` also from this release, or |
| 298 | pass the `-2` to recent versions of the `newt` tool in order to |
| 299 | generate image headers with the new format. There should be no |
| 300 | incompatible format changes throughout the 1.x.y release series. |
| 301 | |
| 302 | ### About this release |
| 303 | |
| 304 | - Header format change. This change was made to move all of the |
| 305 | information about signatures out of the header and into the TLV |
| 306 | block appended to the image. This allows |
| 307 | - The signature to be replaced without changing the image. |
| 308 | - Multiple signatures to be applied. This can be used, for example, |
| 309 | to sign an image with two algorithms, to support different |
| 310 | bootloader configurations based on these image. |
| 311 | - The public key is referred to by its SHA1 hash (or a prefix of the |
| 312 | hash), instead of an index that has to be maintained with the |
| 313 | bootloader. |
| 314 | - Allow new types of signatures in the future. |
| 315 | - Support for PKCS#1 v1.5 signatures has been dropped. All RSA |
| 316 | signatures should be made with PSS. The tools have been changed to |
| 317 | reflect this. |
| 318 | - The source for Tinycrypt has been placed in the MCUboot tree. A |
| 319 | recent version of Tinycrypt introduced breaking API changes. To |
| 320 | allow MCUboot to work across various platforms, we stop using the |
| 321 | Tinycrypt bundled with the OS platform, and use our own version. A |
| 322 | future release of MCUboot will update the Tinycrypt version. |
| 323 | - Support for some new targets: |
| 324 | - Nordic nRF51 and nRF52832 dev kits |
| 325 | - Hexiwear K64 |
| 326 | - Clearer sample applications have been added under `samples`. |
Fabio Utzig | 4dce6aa | 2018-02-12 15:31:32 -0200 | [diff] [blame] | 327 | - Test plans for [zephyr](testplan-zephyr.md), and |
| 328 | [mynewt](testplan-mynewt.md). |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 329 | - The simulator is now able to test RSA signatures. |
| 330 | - There is an unimplemented `load_addr` header for future support for |
| 331 | RAM loading in the bootloader. |
| 332 | - Numerous documentation. |
| 333 | |
| 334 | ### Known issues |
| 335 | |
| 336 | None |
| 337 | |
| 338 | ## Version 0.9.0 |
| 339 | |
Carles Cufi | 90eda80 | 2018-01-29 18:33:20 +0100 | [diff] [blame] | 340 | This is the first release of MCUboot, a secure bootloader for 32-bit MCUs. |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 341 | It is designed to be operating system-agnostic and works over any transport - |
| 342 | wired or wireless. It is also hardware independent, and relies on hardware |
| 343 | porting layers from the operating system it works with. For the first release, |
| 344 | we have support for three open source operating systems: Apache Mynewt, Zephyr |
| 345 | and RIOT. |
| 346 | |
| 347 | ### About this release |
| 348 | |
| 349 | - This release supports building with and running Apache Mynewt and Zephyr |
| 350 | targets. |
| 351 | - RIOT is supported as a running target. |
| 352 | - Image integrity is provided with SHA256. |
| 353 | - Image originator authenticity is provided supporting the following |
| 354 | signature algorithms: |
| 355 | - RSA 2048 and RSA PKCS#1 v1.5 or v2.1 |
| 356 | - Elliptic curve DSA with secp224r1 and secp256r1 |
| 357 | - Two firmware upgrade algorithms are provided: |
| 358 | - An overwrite only which upgrades slot 0 with the image in slot 1. |
| 359 | - A swapping upgrade which enables image test, allowing for rollback to a |
| 360 | previous known good image. |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 361 | - Supports both Mbed TLS and tinycrypt as backend crypto libraries. One of them |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 362 | must be defined and the chosen signing algorithm will require a particular |
| 363 | library according to this list: |
Francesco Servidio | 582367c | 2021-10-20 15:36:45 +0200 | [diff] [blame] | 364 | - RSA 2048 needs Mbed TLS |
| 365 | - ECDSA secp224r1 needs Mbed TLS |
| 366 | - ECDSA secp256r1 needs tinycrypt as well as the ASN.1 code from Mbed TLS |
David Brown | 37f8afd | 2017-09-12 10:59:39 -0600 | [diff] [blame] | 367 | (so still needs that present). |
| 368 | |
| 369 | ### Known issues |
| 370 | |
| 371 | - The image header and TLV formats are planned to change with release 1.0: |
| 372 | https://runtimeco.atlassian.net/browse/MCUB-66 |