embassy/embassy-boot/boot
huntc b0529bc943 Support codesigning in the firmware updater
This commit provides a method to verify that firmware has been signed with a private key given its public key. The implementation uses ed25519-dalek as the signature verifier. An "ed25519" feature is required to enable the functionality. When disabled (the default), calling the firmware updater's verify method will return a failure.
2023-01-12 13:30:58 +11:00
..
src Support codesigning in the firmware updater 2023-01-12 13:30:58 +11:00
Cargo.toml Support codesigning in the firmware updater 2023-01-12 13:30:58 +11:00
README.md fix: add required metadata for embassy-boot 2022-11-25 11:43:12 +01:00

embassy-boot

An Embassy project.

A lightweight bootloader supporting firmware updates in a power-fail-safe way, with trial boots and rollbacks.

The bootloader can be used either as a library or be flashed directly with the default configuration derived from linker scripts.

By design, the bootloader does not provide any network capabilities. Networking capabilities for fetching new firmware can be provided by the user application, using the bootloader as a library for updating the firmware, or by using the bootloader as a library and adding this capability yourself.

Hardware support

The bootloader supports different hardware in separate crates:

  • embassy-boot-nrf - for the nRF microcontrollers.
  • embassy-boot-stm32 - for the STM32 microcontrollers.

Minimum supported Rust version (MSRV)

embassy-boot requires Rust nightly to compile as it relies on async traits for interacting with the flash peripherals.

License

This work is licensed under either of

at your option.