David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 1 | [package] |
| 2 | name = "mcuboot-sys" |
| 3 | version = "0.1.0" |
| 4 | authors = ["David Brown <david.brown@linaro.org>"] |
| 5 | description = "A simple wrapper around the mcuboot code." |
| 6 | build = "build.rs" |
| 7 | publish = false |
David Brown | 42a7e54 | 2022-04-08 17:20:22 -0600 | [diff] [blame] | 8 | edition = "2021" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 9 | |
| 10 | [features] |
| 11 | # By default, build with simplistic signature verification. |
| 12 | default = [] |
| 13 | |
| 14 | # Verify RSA signatures. Note that at this time, the C code will not |
| 15 | # compile with both sig-rsa and sig-ecdsa enabled. |
| 16 | sig-rsa = [] |
| 17 | |
Fabio Utzig | 3929743 | 2019-05-08 18:51:10 -0300 | [diff] [blame] | 18 | # Verify RSA-3072 signatures. |
| 19 | sig-rsa3072 = [] |
| 20 | |
Fabio Utzig | 8b619bd | 2017-12-05 08:48:34 -0200 | [diff] [blame] | 21 | # Verify ECDSA (secp256r1) signatures. |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 22 | sig-ecdsa = [] |
| 23 | |
David Brown | 641af45 | 2021-02-19 12:16:48 -0700 | [diff] [blame] | 24 | # Verify ECDSA (secp256r1) signatures using mbed TLS |
| 25 | sig-ecdsa-mbedtls = [] |
| 26 | |
Fabio Utzig | 9771028 | 2019-05-24 17:44:49 -0300 | [diff] [blame] | 27 | # Verify ED25519 signatures. |
| 28 | sig-ed25519 = [] |
| 29 | |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 30 | # Overwrite only upgrade |
| 31 | overwrite-only = [] |
| 32 | |
Fabio Utzig | 031eb7d | 2019-11-28 10:13:14 -0300 | [diff] [blame] | 33 | swap-move = [] |
| 34 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 35 | # Disable validation of the primary slot |
| 36 | validate-primary-slot = [] |
Fabio Utzig | ebdc969 | 2017-11-23 16:28:25 -0200 | [diff] [blame] | 37 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 38 | # Encrypt image in the secondary slot using RSA-OAEP-2048 |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 39 | enc-rsa = [] |
| 40 | |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 41 | # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048 |
| 42 | enc-aes256-rsa = [] |
| 43 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 44 | # Encrypt image in the secondary slot using AES-KW-128 |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 45 | enc-kw = [] |
| 46 | |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 47 | # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256 |
| 48 | enc-aes256-kw = [] |
| 49 | |
Fabio Utzig | 90f449e | 2019-10-24 07:43:53 -0300 | [diff] [blame] | 50 | # Encrypt image in the secondary slot using ECIES-P256 |
| 51 | enc-ec256 = [] |
| 52 | |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 53 | # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256 |
| 54 | enc-aes256-ec256 = [] |
| 55 | |
Fabio Utzig | 6c553d6 | 2021-05-06 19:56:18 -0300 | [diff] [blame] | 56 | # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS |
| 57 | enc-ec256-mbedtls = [] |
| 58 | |
Fabio Utzig | 3fa72ca | 2020-04-02 11:20:37 -0300 | [diff] [blame] | 59 | # Encrypt image in the secondary slot using ECIES-X25519 |
| 60 | enc-x25519 = [] |
| 61 | |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 62 | # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519 |
| 63 | enc-aes256-x25519 = [] |
| 64 | |
David Vincze | 2d736ad | 2019-02-18 11:50:22 +0100 | [diff] [blame] | 65 | # Allow bootstrapping an empty/invalid primary slot from a valid secondary slot |
Fabio Utzig | 9b97b13 | 2018-12-18 17:21:51 -0200 | [diff] [blame] | 66 | bootstrap = [] |
| 67 | |
David Brown | 5e6f5e0 | 2019-04-04 10:50:05 +0700 | [diff] [blame] | 68 | # Support multiple images (currently 2 instead of 1). |
| 69 | multiimage = [] |
| 70 | |
David Brown | 7e377ab | 2021-05-26 16:33:39 -0600 | [diff] [blame] | 71 | # Support simulation of ram-loading. No swaps are performed, and the |
| 72 | # image is copied to RAM before loading it. |
| 73 | ram-load = [] |
| 74 | |
David Brown | 11ffa0a | 2021-05-26 17:10:47 -0600 | [diff] [blame] | 75 | # Support simulation of direct XIP. No swaps are performed, the image |
| 76 | # is directly executed out of whichever partition contains the most |
| 77 | # appropriate image. |
| 78 | direct-xip = [] |
| 79 | |
David Brown | 2ee5f7f | 2020-01-13 14:04:01 -0700 | [diff] [blame] | 80 | # Check (in software) against version downgrades. |
| 81 | downgrade-prevention = [] |
| 82 | |
Gustavo Henrique Nihei | 7bfd14b | 2021-11-24 23:27:22 -0300 | [diff] [blame] | 83 | # Support images with 32-byte maximum write alignment value. |
| 84 | max-align-32 = [] |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 85 | |
Roland Mikhel | d670352 | 2023-04-27 14:24:30 +0200 | [diff] [blame] | 86 | # Enable hardware rollback protection |
| 87 | hw-rollback-protection = [] |
| 88 | |
Antonio de Angelis | 65eb35c | 2022-11-22 14:11:47 +0000 | [diff] [blame] | 89 | # Enable the PSA Crypto APIs where supported for cryptography related operations. |
| 90 | psa-crypto-api = [] |
| 91 | |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 92 | [build-dependencies] |
Fabio Utzig | 455cad5 | 2018-10-15 14:36:33 -0700 | [diff] [blame] | 93 | cc = "1.0.25" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 94 | |
| 95 | [dependencies] |
Fabio Utzig | 03cce47 | 2020-02-11 18:55:14 -0300 | [diff] [blame] | 96 | libc = "0.2" |
David Brown | 2821564 | 2019-01-02 11:42:39 -0700 | [diff] [blame] | 97 | log = "0.4" |
David Brown | 6390277 | 2017-07-12 09:47:49 -0600 | [diff] [blame] | 98 | simflash = { path = "../simflash" } |