/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | hmac_prng.c | 1 /* hmac_prng.c - TinyCrypt implementation of HMAC-PRNG */ 9 * - Redistributions of source code must retain the above copyright notice, 12 * - Redistributions in binary form must reproduce the above copyright 16 * - Neither the name of Intel Corporation nor the names of its contributors 46 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes). 52 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes). 58 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes). 63 * max number of generates between re-seeds; 64 * TinyCrypt accepts up to (2^32 - 1) which is the maximal value of 65 * a 32-bit unsigned int variable, while SP800-90A specifies a maximum of 2^48. [all …]
|
D | sha256.c | 1 /* sha256.c - TinyCrypt SHA-256 crypto hash algorithm implementation */ 9 * - Redistributions of source code must retain the above copyright notice, 12 * - Redistributions in binary form must reproduce the above copyright 16 * - Neither the name of Intel Corporation nor the names of its contributors 53 s->iv[0] = 0x6a09e667; in tc_sha256_init() 54 s->iv[1] = 0xbb67ae85; in tc_sha256_init() 55 s->iv[2] = 0x3c6ef372; in tc_sha256_init() 56 s->iv[3] = 0xa54ff53a; in tc_sha256_init() 57 s->iv[4] = 0x510e527f; in tc_sha256_init() 58 s->iv[5] = 0x9b05688c; in tc_sha256_init() [all …]
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/ |
D | sha512.c | 1 /* sha512.c - TinyCrypt SHA-512 crypto hash algorithm implementation */ 9 * - Redistributions of source code must retain the above copyright notice, 12 * - Redistributions in binary form must reproduce the above copyright 16 * - Neither the name of Intel Corporation nor the names of its contributors 53 s->iv[0] = 0x6a09e667f3bcc908; in tc_sha512_init() 54 s->iv[1] = 0xbb67ae8584caa73b; in tc_sha512_init() 55 s->iv[2] = 0x3c6ef372fe94f82b; in tc_sha512_init() 56 s->iv[3] = 0xa54ff53a5f1d36f1; in tc_sha512_init() 57 s->iv[4] = 0x510e527fade682d1; in tc_sha512_init() 58 s->iv[5] = 0x9b05688c2b3e6c1f; in tc_sha512_init() [all …]
|
/mcuboot-latest/sim/src/ |
D | lib.rs | 1 // Copyright (c) 2017-2019 Linaro LTD 2 // Copyright (c) 2017-2019 JUUL Labs 3 // Copyright (c) 2019-2023 Arm Limited 5 // SPDX-License-Identifier: Apache-2.0 43 bootsim run --device TYPE [--align SIZE] 45 bootsim (--help | --version) 48 -h, --help Show this message 49 --version Version 50 --device TYPE MCU to simulate 52 --align SIZE Flash write alignment [all …]
|
/mcuboot-latest/ci/ |
D | check-signed-off-by.sh | 7 # http://www.apache.org/licenses/LICENSE-2.0 18 if [[ -n "$1" ]]; then 19 commits=$(git show -s --format=%h ${1}~..HEAD) 21 parents=(`git log -n 1 --format=%p HEAD`) 22 if [[ "${#parents[@]}" -ne 2 ]]; then 26 commits=$(git show -s --format=%h ${parents[0]}..${parents[1]}) 29 if [[ -z "${commits}" ]]; then 35 author="$(git show -s --format="%an <%ae>" ${sha})" 36 committer="$(git show -s --format="%cn <%ce>" ${sha})" 43 author="Signed-off-by: ${author}" [all …]
|
/mcuboot-latest/samples/zephyr/ |
D | run-tests.go | 8 // go run run-tests.go [flags] 10 // Add -help as a flag to get help. See comment below for logIn on 28 "github.com/mcu-tools/mcuboot/samples/zephyr/mcutests" 37 // picocom -b 115200 /dev/ttyACM0 | tee /tmp/zephyr.out 72 // If there are pre-built images, open them. 82 fmt.Fprintf(lg, "-------------------------------------\n") 83 fmt.Fprintf(lg, "---- Running %q\n", group.Name) 112 fmt.Fprintf(lg, "---- Passed\n") 124 fmt.Fprintf(lg, "---- Run: %s\n", cmd) 143 func expect(lg io.Writer, lines <-chan string, exp string) error { [all …]
|
D | README.md | 13 installed on most systems using the system package manager, e.g., for 14 a Debian-based distro: 17 $ sudo apt-get install ninja
|
/mcuboot-latest/scripts/imgtool/ |
D | main.py | 3 # Copyright 2017-2020 Linaro Limited 4 # Copyright 2019-2023 Arm Limited 6 # SPDX-License-Identifier: Apache-2.0 12 # http://www.apache.org/licenses/LICENSE-2.0 75 valid_hash_encodings = ['lang-c', 'raw'] 76 valid_encodings = ['lang-c', 'lang-rust', 'pem', 'raw'] 78 'rsa-2048': gen_rsa2048, 79 'rsa-3072': gen_rsa3072, 80 'ecdsa-p256': gen_ecdsa_p256, 81 'ecdsa-p384': gen_ecdsa_p384, [all …]
|
D | image.py | 2 # Copyright 2017-2020 Linaro Limited 3 # Copyright 2019-2024 Arm Limited 5 # SPDX-License-Identifier: Apache-2.0 11 # http://www.apache.org/licenses/LICENSE-2.0 118 assert (align & (align - 1) == 0) and align != 0 119 return (num + (align - 1)) & ~(align - 1) 135 e = STRUCT_ENDIAN_DICT[self.endian] 142 buf = struct.pack(e + 'HH', kind, len(payload)) 144 buf = struct.pack(e + 'BBH', TLV_VALUES[kind], 0, len(payload)) 151 e = STRUCT_ENDIAN_DICT[self.endian] [all …]
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | __init__.py | 4 # SPDX-License-Identifier: Apache-2.0 10 # http://www.apache.org/licenses/LICENSE-2.0 58 except TypeError as e: 59 msg = str(e) 62 raise e
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | rsa.h | 4 * \brief This file provides an API for the RSA public-key cryptosystem. 6 * The RSA public-key cryptosystem is defined in <em>Public-Key 8 * and <em>Public-Key Cryptography Standards (PKCS) #1 v2.1: 14 * SPDX-License-Identifier: Apache-2.0 20 * http://www.apache.org/licenses/LICENSE-2.0 44 #define MBEDTLS_ERR_RSA_BAD_INPUT_DATA -0x4080 /**< Bad input parameters to fun… 45 #define MBEDTLS_ERR_RSA_INVALID_PADDING -0x4100 /**< Input data contains invalid… 46 #define MBEDTLS_ERR_RSA_KEY_GEN_FAILED -0x4180 /**< Something failed during gen… 47 #define MBEDTLS_ERR_RSA_KEY_CHECK_FAILED -0x4200 /**< Key failed to pass the vali… 48 #define MBEDTLS_ERR_RSA_PUBLIC_FAILED -0x4280 /**< The public key operation fa… [all …]
|
D | asn1.h | 8 * SPDX-License-Identifier: Apache-2.0 14 * http://www.apache.org/licenses/LICENSE-2.0 46 #define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060 /**< Out of data when parsing an… 47 #define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062 /**< ASN1 tag was of an unexpect… 48 #define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064 /**< Error when trying to determ… 49 #define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066 /**< Actual length differs from … 50 #define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068 /**< Data is invalid. */ 51 #define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A /**< Memory allocation failed */ 52 #define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C /**< Buffer too small when writi… 61 * - 0x02 -- tag indicating INTEGER [all …]
|
/mcuboot-latest/docs/ |
D | SECURITY.md | 10 page](https://github.com/mcu-tools/mcuboot/security). 14 - David Brown: davidb@davidb.org or david.brown@linaro.org 15 - Fabio Utzig: utzig@apache.org 20 pub rsa4096 2011-10-14 [SC] 24 sub rsa4096 2011-10-14 [E] 30 pub rsa4096 2017-07-28 [SC] 34 sub rsa4096 2017-07-28 [E] 48 - Issues will be entered into MCUboot's [security advisory 49 system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with 52 - The release notes will contain a reference to any allocated CVE(s). [all …]
|
D | imgtool.md | 11 pip3 install --user -r scripts/requirements.txt 13 ## [Managing keys](#managing-keys) 15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys. 18 ./scripts/imgtool.py keygen -k filename.pem -t rsa-2048 20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used 26 You can add the `-p` argument to `keygen`, which will cause it to 30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code) 42 ./scripts/imgtool.py getpub -k filename.pem 49 ## [Signing images](#signing-images) 62 -k, --key filename [all …]
|
D | readme-zephyr.md | 15 - `boot_partition`: for MCUboot itself 16 - `slot0_partition`: the primary slot of Image 0 17 - `slot1_partition`: the secondary slot of Image 0 19 It is not recommended to use the swap-using-scratch algorithm of MCUboot, but 22 and how to use the swap-using-scratch algorithm): 24 - `scratch_partition`: the scratch slot 45 pip3 install --user -r scripts/requirements.txt 62 west build -b <board> 69 may come from board-specific headers, Device Tree, or be configured by 70 MCUboot on a per-SoC family basis. [all …]
|
D | readme-nuttx.md | 6 - `CONFIG_MCUBOOT_PRIMARY_SLOT_PATH`: MTD partition for the application firmware image PRIMARY slot; 7 - `CONFIG_MCUBOOT_SECONDARY_SLOT_PATH`: MTD partition for the application firmware image SECONDARY … 8 - `CONFIG_MCUBOOT_SCRATCH_PATH`: MTD partition for the Scratch area; 12 - `CONFIG_MCUBOOT_WATCHDOG`: If `CONFIG_WATCHDOG` is enabled, MCUboot shall reset the watchdog time… 15 - `<flash_map_backend/flash_map_backend.h>`, for enabling MCUboot to manage the application firmwar… 16 - `<mcuboot_config/mcuboot_config.h>`, for configuration of MCUboot's features. 17 - `<mcuboot_config/mcuboot_logging.h>`, for providing logging capabilities. 18 - `<os/os_malloc.h>`, for providing MCUboot access to the OS memory management interfaces. 19 - `<sysflash/sysflash.h>`, for configuration of the system's flash area organization. 21 …-level and requires minimal knowledge about characteristics of the underlying storage device. This… [all …]
|
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/ |
D | rsa.h | 2 * SPDX-License-Identifier: Apache-2.0 74 ctx->key_id = PSA_KEY_ID_NULL; in bootutil_rsa_init() 79 if (ctx->key_id != PSA_KEY_ID_NULL) { in bootutil_rsa_drop() 80 (void)psa_destroy_key(ctx->key_id); in bootutil_rsa_drop() 95 * key to the expected input of the decryption function, i.e. TLV_ENC_RSA_SZ in bootutil_rsa_oaep_decrypt() 98 status = psa_get_key_attributes(ctx->key_id, &key_attr); in bootutil_rsa_oaep_decrypt() 100 return -1; in bootutil_rsa_oaep_decrypt() 104 return -1; in bootutil_rsa_oaep_decrypt() 107 status = psa_asymmetric_decrypt(ctx->key_id, PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256), in bootutil_rsa_oaep_decrypt() 129 status = psa_import_key(&key_attributes, *p, (end - *p), &ctx->key_id); in bootutil_rsa_parse_private_key() [all …]
|
/mcuboot-latest/ci/fih_test_docker/ |
D | fi_tester_gdb.sh | 3 # Copyright (c) 2020-2022 Arm Limited 9 # http://www.apache.org/licenses/LICENSE-2.0 25 …INSTR=$($GDB $AXF_FILE --batch -ex "disassemble $SKIP_ADDRESS" | grep "^ *$SKIP_ADDRESS" | sed "s/… 27 …LINE=$($GDB $AXF_FILE --batch -ex "info line *$SKIP_ADDRESS" | sed "s/Line \([0-9]*\).*\"\(.*\)\".… 35 # Print out the meta-info about the test, in YAML 36 echo "- skip_test:" 41 # echo -ne "$SKIP_ADDRESS | $INSTR...\t" 67 echo -n '.' 1>&2 72 rm -f $QEMU_PID_FILE $QEMU_LOG_FILE 73 /usr/bin/qemu-system-arm \ [all …]
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | ecc.h | 1 /* ecc.h - TinyCrypt interface to common ECC functions */ 35 * - Redistributions of source code must retain the above copyright notice, 38 * - Redistributions in binary form must reproduce the above copyright 42 * - Neither the name of Intel Corporation nor the names of its contributors 61 * @brief -- Interface to common ECC functions. 65 * curve NIST p-256. 67 * Security: The curve NIST p-256 provides approximately 128 bits of security. 80 /* Word size (4 bytes considering 32-bits architectures) */ 104 /* Number of words of 32 bits to represent an element of the the curve p-256: */ 106 /* Number of bytes to represent an element of the the curve p-256: */ [all …]
|
/mcuboot-latest/docs/release-notes.d/ |
D | fix-zephyr-sysbuild-name.md | 1 - Fixed clash when using sysbuild with other 2 applications (i.e. tests) using the name sysbuild
|
/mcuboot-latest/boot/zcbor/include/ |
D | zcbor_decode.h | 9 * SPDX-License-Identifier: Apache-2.0 48 * I.e. the largest number of elements expected in an unordered map, 164 * The CBOR spec allows elements (key-value pairs) in maps to appear in any order. 189 * or integers, i.e. the @p key_decoder is typically a _pexpect() function. 207 * @retval true If the key was found, i.e. @p key_decoder returned true. 219 * Refer to the docs for zcbor_(t|b)str_expect_* (e.g. @ref zcbor_bstr_expect_ptr) 226 #define zcbor_search_key_bstr_lit(state, str) zcbor_search_key_bstr_ptr(state, str, sizeof(str) - 1) 227 #define zcbor_search_key_tstr_lit(state, str) zcbor_search_key_tstr_ptr(state, str, sizeof(str) - 1) 234 * By default, i.e. when @ref manually_process_elem is not set, this function is 240 * element (key-value pair) that is currently being processed, or that has just been [all …]
|
/mcuboot-latest/samples/zephyr/bad-keys/ |
D | bad-rsa-2048.pem | 1 -----BEGIN RSA PRIVATE KEY----- 24 ZYhcMQKBgEHN3ZYe7gOfxR4rqk+OIsAUN9P3zyu6kQzUL1BQ7t7Gwi1dv6+E+BGQ 27 -----END RSA PRIVATE KEY-----
|
/mcuboot-latest/testplan/mynewt/ |
D | key_rsa_2.pem | 1 -----BEGIN RSA PRIVATE KEY----- 14 QJXCnJ1OfL1lhtegndP36Sb/mGwdK6IWDLH2+E/eLcWzcUXNvI0H02pbvzq/Vbh+ 27 -----END RSA PRIVATE KEY-----
|
/mcuboot-latest/scripts/ |
D | assemble.py | 5 # SPDX-License-Identifier: Apache-2.0 11 # http://www.apache.org/licenses/LICENSE-2.0 42 offset_re = re.compile(r"^#define DT_FLASH_AREA_([0-9A-Z_]+)_OFFSET(_0)?\s+(0x[0-9a-fA-F]+|[0-9]+)$… 43 size_re = re.compile(r"^#define DT_FLASH_AREA_([0-9A-Z_]+)_SIZE(_0)?\s+(0x[0-9a-fA-F]+|[0-9]+)$") 50 except OSError as e: 51 if e.errno != errno.ENOENT: 59 part_nodes = edt.compat2nodes["fixed-partitions"] 70 # We care about the mcuboot, image-0, and image-1 partitions. 74 if 'image-0' not in offsets: 75 raise Exception("Board partition table does not have image-0 partition") [all …]
|
/mcuboot-latest/ci/fih_test_docker/docker-build/ |
D | build.sh | 9 # http://www.apache.org/licenses/LICENSE-2.0 17 set -e 23 rm -f *.list *.key 28 image=mcuboot/fih-test 29 docker build --pull --tag=$image .
|