Jamie

Results 160 comments of Jamie

The problem with this is that it introduces the inability to clear flags e.g. if a firmware update is marked for confirmation or test, once a flag is set it...

User uploads image, they mark it for test/swap (which writes the flag to the **primary** image, not the secondary), then they delete the secondary image without rebooting, the update image...

It is actually linked, in a very obscure place on https://docs.mcuboot.com/design.html in `MCUBOOT_BUILTIN_KEY: With this option the whole public key(s) used for signature verification must be provisioned to the target...

https://github.com/zephyrproject-rtos/zephyr/pull/85254 needs a rebase and this could do with one too. Have given this a try on an nrf52840dk and it does not work using the sample from the zephyr...

Seems to be `./smp_svr/zephyr/zephyr.signed.confirmed.hex` that is faulty, the `./smp_svr/zephyr/zephyr.slot1.signed.confirmed.hex` build file works

Right I see the issue, the nrf52840dk overlay here would need to be changed to delete slot0 and slot1 then re-create them with the same slot sizes

> First force-push is a capitalize first letter in the comment fix that I previously missed; second force-push are your suggestions. > > Do you mean it's ok to add...

@m-braunschweig seemingly this branch has conflicts that must be resolved? Not sure what those are but can you check and fix?

> > this should delete it as it currently does because the what has been uploaded is invalid, no different than if you upload a corrupt image to a slot...