Files
.github
.vscode
docs
embassy-boot
embassy-cortex-m
embassy-embedded-hal
embassy-executor
embassy-futures
embassy-hal-common
embassy-lora
embassy-macros
embassy-net
embassy-net-driver
embassy-net-driver-channel
embassy-nrf
embassy-rp
embassy-stm32
embassy-sync
embassy-time
embassy-usb
embassy-usb-driver
embassy-usb-logger
examples
boot
.cargo
application
bootloader
nrf-rtos-trace
nrf52840
nrf5340
rp
std
stm32c0
stm32f0
stm32f1
stm32f2
stm32f3
stm32f4
stm32f7
stm32g0
stm32g4
stm32h7
stm32l0
stm32l1
stm32l4
stm32l5
stm32u5
stm32wb
stm32wl
wasm
stm32-data
stm32-gen-features
stm32-metapac
stm32-metapac-gen
tests
xtask
.gitignore
.gitmodules
LICENSE-APACHE
LICENSE-MIT
NOTICE.md
README.md
ci.sh
ci_stable.sh
rust-toolchain.toml
rustfmt.toml
embassy/examples/boot
huntc b0529bc943 Support codesigning in the firmware updater
This commit provides a method to verify that firmware has been signed with a private key given its public key. The implementation uses ed25519-dalek as the signature verifier. An "ed25519" feature is required to enable the functionality. When disabled (the default), calling the firmware updater's verify method will return a failure.
2023-01-12 13:30:58 +11:00
..
2023-01-04 07:44:23 +00:00