David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 1 | [package] |
| 2 | name = "mcuboot-sys" |
| 3 | version = "0.1.0" |
| 4 | authors = ["David Brown <david.brown@linaro.org>"] |
| 5 | description = "A simple wrapper around the mcuboot code." |
| 6 | build = "build.rs" |
| 7 | publish = false |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 8 | edition = "2018" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 9 | |
| 10 | [features] |
| 11 | # By default, build with simplistic signature verification. |
| 12 | default = [] |
| 13 | |
| 14 | # Verify RSA signatures. Note that at this time, the C code will not |
| 15 | # compile with both sig-rsa and sig-ecdsa enabled. |
| 16 | sig-rsa = [] |
| 17 | |
Fabio Utzig | 3929743 | 2019-05-08 18:51:10 -0300 | [diff] [blame] | 18 | # Verify RSA-3072 signatures. |
| 19 | sig-rsa3072 = [] |
| 20 | |
Fabio Utzig | 8b619bd | 2017-12-05 08:48:34 -0200 | [diff] [blame] | 21 | # Verify ECDSA (secp256r1) signatures. |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 22 | sig-ecdsa = [] |
| 23 | |
David Brown | 641af45 | 2021-02-19 12:16:48 -0700 | [diff] [blame] | 24 | # Verify ECDSA (secp256r1) signatures using mbed TLS |
| 25 | sig-ecdsa-mbedtls = [] |
| 26 | |
Fabio Utzig | 9771028 | 2019-05-24 17:44:49 -0300 | [diff] [blame] | 27 | # Verify ED25519 signatures. |
| 28 | sig-ed25519 = [] |
| 29 | |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 30 | # Overwrite only upgrade |
| 31 | overwrite-only = [] |
| 32 | |
Fabio Utzig | 031eb7d | 2019-11-28 10:13:14 -0300 | [diff] [blame] | 33 | swap-move = [] |
| 34 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 35 | swap-status = [] |
| 36 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 37 | # Disable validation of the primary slot |
| 38 | validate-primary-slot = [] |
Fabio Utzig | ebdc969 | 2017-11-23 16:28:25 -0200 | [diff] [blame] | 39 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 40 | # Encrypt image in the secondary slot using RSA-OAEP-2048 |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 41 | enc-rsa = [] |
| 42 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 43 | # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048 |
| 44 | enc-aes256-rsa = [] |
| 45 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 46 | # Encrypt image in the secondary slot using AES-KW-128 |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 47 | enc-kw = [] |
| 48 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 49 | # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256 |
| 50 | enc-aes256-kw = [] |
| 51 | |
Fabio Utzig | 90f449e | 2019-10-24 07:43:53 -0300 | [diff] [blame] | 52 | # Encrypt image in the secondary slot using ECIES-P256 |
| 53 | enc-ec256 = [] |
| 54 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 55 | # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256 |
| 56 | enc-aes256-ec256 = [] |
| 57 | |
| 58 | # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS |
| 59 | enc-ec256-mbedtls = [] |
| 60 | |
Fabio Utzig | 3fa72ca | 2020-04-02 11:20:37 -0300 | [diff] [blame] | 61 | # Encrypt image in the secondary slot using ECIES-X25519 |
| 62 | enc-x25519 = [] |
| 63 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 64 | # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519 |
| 65 | enc-aes256-x25519 = [] |
| 66 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 67 | # Allow bootstrapping an empty/invalid primary slot from a valid secondary slot |
Fabio Utzig | 9b97b13 | 2018-12-18 17:21:51 -0200 | [diff] [blame] | 68 | bootstrap = [] |
| 69 | |
David Brown | 5e6f5e0 | 2019-04-04 10:50:05 +0700 | [diff] [blame] | 70 | # Support multiple images (currently 2 instead of 1). |
| 71 | multiimage = [] |
| 72 | |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 73 | # Support simulation of ram-loading. No swaps are performed, and the |
| 74 | # image is copied to RAM before loading it. |
| 75 | ram-load = [] |
| 76 | |
| 77 | # Support simulation of direct XIP. No swaps are performed, the image |
| 78 | # is directly executed out of whichever partition contains the most |
| 79 | # appropriate image. |
| 80 | direct-xip = [] |
| 81 | |
David Brown | 2ee5f7f | 2020-01-13 14:04:01 -0700 | [diff] [blame] | 82 | # Check (in software) against version downgrades. |
| 83 | downgrade-prevention = [] |
| 84 | |
Roman Okhrimenko | dc0ca08 | 2023-06-21 20:49:51 +0300 | [diff] [blame] | 85 | # Support images with 32-byte maximum write alignment value. |
| 86 | max-align-32 = [] |
Roman Okhrimenko | 977b375 | 2022-03-31 14:40:48 +0300 | [diff] [blame] | 87 | |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 88 | [build-dependencies] |
Fabio Utzig | 455cad5 | 2018-10-15 14:36:33 -0700 | [diff] [blame] | 89 | cc = "1.0.25" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 90 | |
| 91 | [dependencies] |
Fabio Utzig | 03cce47 | 2020-02-11 18:55:14 -0300 | [diff] [blame] | 92 | libc = "0.2" |
David Brown | 2821564 | 2019-01-02 11:42:39 -0700 | [diff] [blame] | 93 | log = "0.4" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 94 | simflash = { path = "../simflash" } |