You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Docs/README.md
+21-23Lines changed: 21 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,15 @@
3
3
## Documentation Overview
4
4
5
5
*[Graphic](stm32-secure-patching-bootloader-MultiSegment_rev1_Dec2021.pdf) describing MultiSegment feature in more detail.
6
-
*[Quick Start Guide](stm32-secure-patching-bootloader-QSG_rev1_Dec2021.pdf) in PDF form with screenshots.
6
+
*[Quick Start Guide](stm32-secure-patching-bootloader-QSG_rev2_May2022.pdf) in PDF form with screenshots.
7
7
8
8
## Quick Start Guide
9
9
10
10
Integrating the stm32-secure-patching-bootloader is a simple four step process: adding bootloader files to your project repository, configuring STM32CubeIDE, adjusting your project's linker script .ld file and adjusting your project's system_stm32xxxx.c file.
11
11
12
12
Please refer to [stm32-secure-patching-bootloader-demoapp](https://github.com/firmwaremodules/stm32-secure-patching-bootloader-demoapp) repository for working projects already implementing these steps.
13
13
14
-
Also refer to this [Quick Start Guide](stm32-secure-patching-bootloader-QSG_rev1_Dec2021.pdf) PDF document for more details including images and screenshots.
14
+
Also refer to this [Quick Start Guide](stm32-secure-patching-bootloader-QSG_rev2_May2022.pdf) PDF document for more details including images and screenshots.
15
15
16
16
1. Adding bootloader files to your project repository
17
17
@@ -27,33 +27,31 @@ We need to add the postbuild command line, update the include and linker paths,
/*! Set the delay type to IMMEDIATE to specify rebooting and installing immediately.
@@ -157,17 +173,17 @@ typedef enum
157
173
#defineSE_PATCH_RebootDelay_NEXT ((uint32_t)1)
158
174
159
175
/*!
160
-
* Patching Engine setup data structure.
176
+
* Update start setup data structure.
161
177
*
162
178
* @field(type) Target update location of firmware image presented to Update module.
163
179
* This field may be set if known, or may be omitted (set to NONE) to use the firmware update image's
164
180
* embedded type determined on-the-fly.
165
181
* @field(rebootDelay) Specify the reboot delay that is to occur after a completed firmware update.
166
182
* @p(blist)
167
183
* - RebootDelay_IMMEDIATE reboot immediately upon successful written image verification.
168
-
* - 1 to 0xFFFE random delay, in seconds, selected from within this window before rebooting as if RebootDelay_IMMEDIATE was selected [currently unsupported].
184
+
* - 1 to 0xFFFE random delay, in seconds, selected from within this window before rebooting as if RebootDelay_IMMEDIATE was selected.
169
185
* - RebootDelay_COMMAND wait indefinately upon successful written image verification.
170
-
* The user is responsible for rebooting the system, e.g. by calling NVIC_SystemReset().
186
+
* The user is responsible for rebooting the system, e.g. by calling {@link fm.driver.System#reset}.
171
187
* @p
172
188
* @field(totalLength) Provide if the image length is known - only used to initially reject an update if it is too large
173
189
* for the device before examining the actual header. Set to 0 to ignore this first check and use the
0 commit comments