You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/firmware_image.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ application. This corresponds to the first partition in the flash memory.
9
9
Multiple firmware images can be created this way, and stored in two different partitions. The bootloader
10
10
will take care of moving the selected firmware to the first (BOOT) partition before chain-loading the image.
11
11
12
-
Due to the presence of an image header, the entry point of the application has a fixed additional offset
12
+
Due to the presence of an image header, the entry point of the application has a fixed additional offset
13
13
of 256B from the beginning of the flash partition.
14
14
15
15
## Firmware image header
@@ -26,7 +26,7 @@ chain-loading the firmware the interrupt continue to work properly after the boo
26
26
27
27
### Image header: Tags
28
28
29
-
The **image header** is prepended with a single 4-byte magic number, followed by a 4-byte field indicating the
29
+
The **image header** is prepended with a single 4-byte magic number, followed by a 4-byte field indicating the
30
30
firmware image size (excluding the header). All numbers in the header are stored in Little-endian format.
31
31
32
32
The two fixed fields are followed by one or more tags. Each TAG is structured as follows:
@@ -46,7 +46,7 @@ Each **Type** has a different meaning, and integrate information about the firmw
46
46
- A 'firmware signature' Tag (type: 0x0020, size: 64 Bytes) used to validate the signature stored with the firmware against a known public key
47
47
- A 'firmware type' Tag (type: 0x0030, size: 2 Bytes) used to identify the type of firmware, and the authentication mechanism in use.
48
48
49
-
A 'public key hint digest' tag is transmitted in the header (type: 0x10, size:32 Bytes). This tag contains the SHA digest of the public key used
49
+
A 'public key hint digest' tag is transmitted in the header (type: 0x10, size:32 Bytes). This tag contains the SHA digest of the public key used
50
50
by the signing tool. The bootloader may use this field to locate the correct public key in case of multiple keys available.
51
51
52
52
wolfBoot will, in all cases, refuse to boot an image that cannot be verified and authenticated using the built-in digital signature authentication mechanism.
@@ -77,17 +77,18 @@ The output image `test-app/image_v4_signed.bin` will contain the custom field wi
77
77
From the bootloader code, we can then retrieve the value of the custom field using the `wolfBoot_find_header` function:
0 commit comments