What is the chip/platform you are using?
WICED Studio already comes with a secure boot option for CYW4390x based devices? Appnote: https://www.cypress.com/file/298286/download
Does that serve your purpose or you need ECC specifically?
We are using. CYW907 wiced devices
As our is embedded device, expecting small foot print secure bootloader.
I am talking about micro ecc.
We are using wiced version 6.0
Please clarify availability of micr ecc in wiced stack for secure bootloader purpose.
If it is available how to enable and use it from application layer? And how to test/verify this feature?
Expecting your valuable suggestions here.
Let me know your free time will discuss.
Subramanya H R
1 of 1 people found this helpful
We have not tested micro-ecc for secure bootloader; since as mentioned earlier we already have a secure boot option which utilizes the hw crypto present in 90x. I have not done footprint analysis though but my guess would be the default secure boot option will have less memory footprint since the crypto functions are present in the ROM.
If you still intend to use micro ecc, you can do so. The porting should not take significant effort. I will just try to provide a brief outline on how to do so (we haven't tried this though)
- Migrate to 43xxx_Wi-Fi/apps/waf/bootloader/bootloader.mk, and add $(NAME)_COMPONENTS += BESL/crypto_internal/micro-ecc in the .mk
- Include uECC.h in the bootloader.c and use uECC as you need it. Also, it is worth checking out the way mbedTLS uses micro-ecc functions inside WICED (Refer: 43xxx_Wi-Fi/WICED/security/BESL/mbedtls_open/library/ecp_alt.c). If your intention is already taken care of by the mbedTLS library, you can compile that as well as a part of bootloader (might need linker script adjustment though)