Skip to content

Commit d9ada91

Browse files
miyazakhdanielinux
authored andcommitted
addressed review comments
1 parent 5ed7390 commit d9ada91

3 files changed

Lines changed: 69 additions & 10 deletions

File tree

IDE/Renesas/e2studio/RA6M4/Readme.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## 1. Overview
44

5-
It demonstrates simple secure firmware update by wolfBoot. A sample application v1 is
5+
This example demonstrates simple secure firmware update by wolfBoot. A sample application v1 is
66
securely updated to v2. Both versions behave the same except displaying its version of v1 or v2.
77
They are compiled by e2Studio and running on the target board.
88

@@ -176,7 +176,7 @@ $ aarch64-none-elf-objcopy.exe -I binary -O srec --change-addresses=0x00010000 a
176176
177177
Now, you can download and start wolfBoot program by e2Studio debugger.
178178
After starting the program, you can see the partition information as follows.
179-
If the boot program succeeds integlity and authenticity check, it initiate the
179+
If the boot program succeeds integrity and authenticity check, it initiate the
180180
application V1.
181181
182182
```
@@ -246,7 +246,7 @@ $ aarch64-none-elf-objcopy.exe -I binary -O srec --change-addresses=0x00080000 a
246246
247247
### 8) Re-boot and secure update to V2
248248
249-
The boot program checks integlity and authenticity of V2, swap the partition
249+
The boot program checks integrity and authenticity of V2, swap the partition
250250
safely and initiates V2. You will see following message after the partition
251251
information.
252252

IDE/Renesas/e2studio/RX72N/Readme.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## 1. Overview
44

5-
It demonstrates simple secure firmware update by wolfBoot. A sample application v1 is
5+
This example demonstrates simple secure firmware update by wolfBoot. A sample application v1 is
66
securely updated to v2. Both versions behave the same except displaying its version of v1 or v2.
77
They are compiled by e2Studio and running on the target board.
88

@@ -188,7 +188,7 @@ $ rx-elf-objcopy.exe -I binary -O srec --change-addresses=0xffc10000 app_Renesas
188188

189189
Now, you can download and start wolfBoot program by e2Studio debugger.
190190
After starting the program, you can see the partition information as follows.
191-
If the boot program succeeds integlity and authenticity check, it initiate the
191+
If the boot program succeeds integrity and authenticity check, it initiate the
192192
application V1.
193193

194194

@@ -218,7 +218,7 @@ After hitting any key, the application calls wolfBoot_success() to set boot part
218218
state and wait for any key again.
219219

220220
if you re-start the boot program at this moment,
221-
after checking the integlity and authenticity, it jumps to the application.
221+
after checking the integrity and authenticity, it jumps to the application.
222222
You can see the state is Success("00").
223223

224224
```
@@ -252,7 +252,7 @@ rx-elf-objcopy.exe -I binary -O srec --change-addresses=0xffdf0000 app_RenesasRx
252252
### 3-9 Re-boot and secure update to V2
253253

254254
Now the image is downloaded but note that the partition status is not changed yet.
255-
When it is re-boot, it checks integlity and authenticity of V1 and initiate V1 as in
255+
When it is re-boot, it checks integrity and authenticity of V1 and initiate V1 as in
256256
step 6.
257257

258258
```
@@ -271,10 +271,10 @@ updating the firmware.
271271

272272
Since this is just a trigger, the application can continue the process.
273273
In the demo application it outputs a message "Firmware Update is triggered" and enters
274-
a infinit loop of nop.
274+
a infinite loop of nop.
275275

276-
Now you can re-boot it by start wolfBoot by e2Studion debugger. The boot
277-
program checks integlity and authenticity of V2 now, swap the partition
276+
Now you can reboot it by start wolfBoot by e2studio debugger. The boot
277+
program checks integrity and authenticity of V2 now, swap the partition
278278
safely and initiates V2. You will see following message after the partition
279279
information.
280280

docs/Targets.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ This README describes configuration of supported targets.
2525
* [STM32WB55](#stm32wb55)
2626
* [TI Hercules TMS570LC435](#ti-hercules-tms570lc435)
2727
* [Xilinx Zynq UltraScale](#xilinx-zynq-ultrascale)
28+
* [Renesas RX72N](#renesas-rx72n)
29+
* [Renesas RA6M4](#renesas-ra6m4)
2830

2931

3032
## STM32F4
@@ -1528,3 +1530,60 @@ make test-sim-internal-flash-with-update
15281530
# it should print 2
15291531
./wolfboot.elf success get_version
15301532
```
1533+
## renesas-rx72n
1534+
1535+
This example for `Renesas RX72N` demonstrates simple secure firmware update by wolfBoot. A sample application v1 is
1536+
securely updated to v2. Both versions behave the same except displaying its version of v1 or v2.
1537+
They are compiled by e2Studio and running on the target board.
1538+
1539+
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
1540+
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1541+
board for the debugger and flash programmer.
1542+
1543+
Flash Allocation:
1544+
```
1545+
+---------------------------+------------------------+-----+
1546+
| B |H| |H| | |
1547+
| o |e| Primary |e| Update |Swap |
1548+
| o |a| Partition |a| Partition |Sect |
1549+
| t |d| |d| | |
1550+
+---------------------------+------------------------+-----+
1551+
0xffc00000: wolfBoot
1552+
0xffc10000: Primary partition (Header)
1553+
0xffc10100: Primary partition (Application image) /* When it uses IMAGE_HEADER_SIZE 256, e.g. ED25519, EC256, EC384 or EC512 */
1554+
0xffc10200: Primary partition (Application image) /* When it uses IMAGE_HEADER_SIZE 512, e.g. RSA2048, RSA3072 */
1555+
0xffdf0000: Update partition (Header)
1556+
0xffdf0100: Update partition (Application image)
1557+
0xfffd0000: Swap sector
1558+
1559+
```
1560+
1561+
Detail steps can be found at [Readme](../IDE/Renesas/e2studio/RX72N/Readme.md).
1562+
1563+
## renesas-ra6m4
1564+
1565+
This example for `Renesas RA6M4` demonstrates a simple secure firmware update by wolfBoot. A sample application v1 is
1566+
securely updated to v2. Both versions behave the same except displaying its version of v1 or v2.
1567+
They are compiled by e2Studio and running on the target board.
1568+
1569+
In this demo, you may download two versions of application binary file by Renesas Flash Programmer.
1570+
You can download and excute wolfBoot by e2Studio debugger. Use a USB connection between PC and the
1571+
board for the debugger and flash programmer.
1572+
1573+
Flash Allocation:
1574+
```
1575+
+---------------------------+------------------------+-----+
1576+
| B |H| |H| | |
1577+
| o |e| Primary |e| Update |Swap |
1578+
| o |a| Partition |a| Partition |Sect |
1579+
| t |d| |d| | |
1580+
+---------------------------+------------------------+-----+
1581+
0x00000000: wolfBoot
1582+
0x00010000: Primary partition (Header)
1583+
0x00010200: Primary partition (Application image)
1584+
0x00080000: Update partition (Header)
1585+
0x00080200: Update partition (Application image)
1586+
0x000F0000: Swap sector
1587+
```
1588+
1589+
Detail steps can be found at [Readme](../IDE/Renesas/e2studio/RA6M4/Readme.md).

0 commit comments

Comments
 (0)