-
Notifications
You must be signed in to change notification settings - Fork 28
WIP: port MCUboot #86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Reviewer's Guide by SourceryThis pull request ports MCUboot to the project. It includes the addition of MCUboot and Tinycrypt source files, updates to the Makefile for build configuration, implementation of flash area operations, creation of a boot entry point, and addition of linker scripts. The changes enable secure boot functionality using MCUboot. No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Assessment against linked issues
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
dc091c4
to
f0c2f3e
Compare
tested with AuTerm - slow cannot work with `mcumgr` or `smpmgr` due to small MTU
I have completed porting MCUboot for CH582. In this PR, I wired the existing USB ACM to MCUboot's boot_serial and use AuTerm to transfer the firmware binary. At the moment, it works with AuTerm with MTU set at 247, but getting slow. It takes about an hour to complete the uploading. I tried changing the MTU in the code, but it didn't have any effect. Since the MTU value is fixed somewhere in the code, trying smpmgr or mcumgr-client gave an error requiring a higher MTU. From my observation, AuTerm just waited about 2 seconds after receiving an ACK from smp server (MCUboot), then sent a new packet. This slows down progress. I don't know what is missing here to trigger AuTerm to send new packets after receiving ACKs immediately. |
This will resolve #37, and #38
Summary by Sourcery
Port MCUboot bootloader to the project, enabling firmware update capabilities with signed image support
New Features:
Enhancements:
Build:
Deployment:
Tests: