Home
last modified time | relevance | path

Searched +full:- +full:e (Results 1 – 25 of 92) sorted by relevance

1234

/mcuboot-latest/ext/tinycrypt/lib/source/
Dhmac_prng.c1 /* hmac_prng.c - TinyCrypt implementation of HMAC-PRNG */
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright
16 * - Neither the name of Intel Corporation nor the names of its contributors
46 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
52 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
58 * SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
63 * max number of generates between re-seeds;
64 * TinyCrypt accepts up to (2^32 - 1) which is the maximal value of
65 * a 32-bit unsigned int variable, while SP800-90A specifies a maximum of 2^48.
[all …]
Dsha256.c1 /* sha256.c - TinyCrypt SHA-256 crypto hash algorithm implementation */
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright
16 * - Neither the name of Intel Corporation nor the names of its contributors
53 s->iv[0] = 0x6a09e667; in tc_sha256_init()
54 s->iv[1] = 0xbb67ae85; in tc_sha256_init()
55 s->iv[2] = 0x3c6ef372; in tc_sha256_init()
56 s->iv[3] = 0xa54ff53a; in tc_sha256_init()
57 s->iv[4] = 0x510e527f; in tc_sha256_init()
58 s->iv[5] = 0x9b05688c; in tc_sha256_init()
[all …]
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/
Dsha512.c1 /* sha512.c - TinyCrypt SHA-512 crypto hash algorithm implementation */
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright
16 * - Neither the name of Intel Corporation nor the names of its contributors
53 s->iv[0] = 0x6a09e667f3bcc908; in tc_sha512_init()
54 s->iv[1] = 0xbb67ae8584caa73b; in tc_sha512_init()
55 s->iv[2] = 0x3c6ef372fe94f82b; in tc_sha512_init()
56 s->iv[3] = 0xa54ff53a5f1d36f1; in tc_sha512_init()
57 s->iv[4] = 0x510e527fade682d1; in tc_sha512_init()
58 s->iv[5] = 0x9b05688c2b3e6c1f; in tc_sha512_init()
[all …]
/mcuboot-latest/sim/src/
Dlib.rs1 // Copyright (c) 2017-2019 Linaro LTD
2 // Copyright (c) 2017-2019 JUUL Labs
3 // Copyright (c) 2019-2023 Arm Limited
5 // SPDX-License-Identifier: Apache-2.0
43 bootsim run --device TYPE [--align SIZE]
45 bootsim (--help | --version)
48 -h, --help Show this message
49 --version Version
50 --device TYPE MCU to simulate
52 --align SIZE Flash write alignment
[all …]
/mcuboot-latest/ci/
Dcheck-signed-off-by.sh7 # http://www.apache.org/licenses/LICENSE-2.0
18 if [[ -n "$1" ]]; then
19 commits=$(git show -s --format=%h ${1}~..HEAD)
21 parents=(`git log -n 1 --format=%p HEAD`)
22 if [[ "${#parents[@]}" -ne 2 ]]; then
26 commits=$(git show -s --format=%h ${parents[0]}..${parents[1]})
29 if [[ -z "${commits}" ]]; then
35 author="$(git show -s --format="%an <%ae>" ${sha})"
36 committer="$(git show -s --format="%cn <%ce>" ${sha})"
43 author="Signed-off-by: ${author}"
[all …]
/mcuboot-latest/samples/zephyr/
Drun-tests.go8 // go run run-tests.go [flags]
10 // Add -help as a flag to get help. See comment below for logIn on
28 "github.com/mcu-tools/mcuboot/samples/zephyr/mcutests"
37 // picocom -b 115200 /dev/ttyACM0 | tee /tmp/zephyr.out
72 // If there are pre-built images, open them.
82 fmt.Fprintf(lg, "-------------------------------------\n")
83 fmt.Fprintf(lg, "---- Running %q\n", group.Name)
112 fmt.Fprintf(lg, "---- Passed\n")
124 fmt.Fprintf(lg, "---- Run: %s\n", cmd)
143 func expect(lg io.Writer, lines <-chan string, exp string) error {
[all …]
DREADME.md13 installed on most systems using the system package manager, e.g., for
14 a Debian-based distro:
17 $ sudo apt-get install ninja
/mcuboot-latest/scripts/imgtool/
Dmain.py3 # Copyright 2017-2020 Linaro Limited
4 # Copyright 2019-2023 Arm Limited
6 # SPDX-License-Identifier: Apache-2.0
12 # http://www.apache.org/licenses/LICENSE-2.0
75 valid_hash_encodings = ['lang-c', 'raw']
76 valid_encodings = ['lang-c', 'lang-rust', 'pem', 'raw']
78 'rsa-2048': gen_rsa2048,
79 'rsa-3072': gen_rsa3072,
80 'ecdsa-p256': gen_ecdsa_p256,
81 'ecdsa-p384': gen_ecdsa_p384,
[all …]
Dimage.py2 # Copyright 2017-2020 Linaro Limited
3 # Copyright 2019-2024 Arm Limited
5 # SPDX-License-Identifier: Apache-2.0
11 # http://www.apache.org/licenses/LICENSE-2.0
118 assert (align & (align - 1) == 0) and align != 0
119 return (num + (align - 1)) & ~(align - 1)
135 e = STRUCT_ENDIAN_DICT[self.endian]
142 buf = struct.pack(e + 'HH', kind, len(payload))
144 buf = struct.pack(e + 'BBH', TLV_VALUES[kind], 0, len(payload))
151 e = STRUCT_ENDIAN_DICT[self.endian]
[all …]
/mcuboot-latest/scripts/imgtool/keys/
D__init__.py4 # SPDX-License-Identifier: Apache-2.0
10 # http://www.apache.org/licenses/LICENSE-2.0
58 except TypeError as e:
59 msg = str(e)
62 raise e
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Drsa.h4 * \brief This file provides an API for the RSA public-key cryptosystem.
6 * The RSA public-key cryptosystem is defined in <em>Public-Key
8 * and <em>Public-Key Cryptography Standards (PKCS) #1 v2.1:
14 * SPDX-License-Identifier: Apache-2.0
20 * http://www.apache.org/licenses/LICENSE-2.0
44 #define MBEDTLS_ERR_RSA_BAD_INPUT_DATA -0x4080 /**< Bad input parameters to fun…
45 #define MBEDTLS_ERR_RSA_INVALID_PADDING -0x4100 /**< Input data contains invalid…
46 #define MBEDTLS_ERR_RSA_KEY_GEN_FAILED -0x4180 /**< Something failed during gen…
47 #define MBEDTLS_ERR_RSA_KEY_CHECK_FAILED -0x4200 /**< Key failed to pass the vali…
48 #define MBEDTLS_ERR_RSA_PUBLIC_FAILED -0x4280 /**< The public key operation fa…
[all …]
Dasn1.h8 * SPDX-License-Identifier: Apache-2.0
14 * http://www.apache.org/licenses/LICENSE-2.0
46 #define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060 /**< Out of data when parsing an…
47 #define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062 /**< ASN1 tag was of an unexpect…
48 #define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064 /**< Error when trying to determ…
49 #define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066 /**< Actual length differs from …
50 #define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068 /**< Data is invalid. */
51 #define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A /**< Memory allocation failed */
52 #define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C /**< Buffer too small when writi…
61 * - 0x02 -- tag indicating INTEGER
[all …]
/mcuboot-latest/docs/
DSECURITY.md10 page](https://github.com/mcu-tools/mcuboot/security).
14 - David Brown: davidb@davidb.org or david.brown@linaro.org
15 - Fabio Utzig: utzig@apache.org
20 pub rsa4096 2011-10-14 [SC]
24 sub rsa4096 2011-10-14 [E]
30 pub rsa4096 2017-07-28 [SC]
34 sub rsa4096 2017-07-28 [E]
48 - Issues will be entered into MCUboot's [security advisory
49 system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with
52 - The release notes will contain a reference to any allocated CVE(s).
[all …]
Dimgtool.md11 pip3 install --user -r scripts/requirements.txt
13 ## [Managing keys](#managing-keys)
15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys.
18 ./scripts/imgtool.py keygen -k filename.pem -t rsa-2048
20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used
26 You can add the `-p` argument to `keygen`, which will cause it to
30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code)
42 ./scripts/imgtool.py getpub -k filename.pem
49 ## [Signing images](#signing-images)
62 -k, --key filename
[all …]
Dreadme-zephyr.md15 - `boot_partition`: for MCUboot itself
16 - `slot0_partition`: the primary slot of Image 0
17 - `slot1_partition`: the secondary slot of Image 0
19 It is not recommended to use the swap-using-scratch algorithm of MCUboot, but
22 and how to use the swap-using-scratch algorithm):
24 - `scratch_partition`: the scratch slot
45 pip3 install --user -r scripts/requirements.txt
62 west build -b <board>
69 may come from board-specific headers, Device Tree, or be configured by
70 MCUboot on a per-SoC family basis.
[all …]
Dreadme-nuttx.md6 - `CONFIG_MCUBOOT_PRIMARY_SLOT_PATH`: MTD partition for the application firmware image PRIMARY slot;
7 - `CONFIG_MCUBOOT_SECONDARY_SLOT_PATH`: MTD partition for the application firmware image SECONDARY …
8 - `CONFIG_MCUBOOT_SCRATCH_PATH`: MTD partition for the Scratch area;
12 - `CONFIG_MCUBOOT_WATCHDOG`: If `CONFIG_WATCHDOG` is enabled, MCUboot shall reset the watchdog time…
15 - `<flash_map_backend/flash_map_backend.h>`, for enabling MCUboot to manage the application firmwar…
16 - `<mcuboot_config/mcuboot_config.h>`, for configuration of MCUboot's features.
17 - `<mcuboot_config/mcuboot_logging.h>`, for providing logging capabilities.
18 - `<os/os_malloc.h>`, for providing MCUboot access to the OS memory management interfaces.
19 - `<sysflash/sysflash.h>`, for configuration of the system's flash area organization.
21-level and requires minimal knowledge about characteristics of the underlying storage device. This…
[all …]
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Drsa.h2 * SPDX-License-Identifier: Apache-2.0
74 ctx->key_id = PSA_KEY_ID_NULL; in bootutil_rsa_init()
79 if (ctx->key_id != PSA_KEY_ID_NULL) { in bootutil_rsa_drop()
80 (void)psa_destroy_key(ctx->key_id); in bootutil_rsa_drop()
95 * key to the expected input of the decryption function, i.e. TLV_ENC_RSA_SZ in bootutil_rsa_oaep_decrypt()
98 status = psa_get_key_attributes(ctx->key_id, &key_attr); in bootutil_rsa_oaep_decrypt()
100 return -1; in bootutil_rsa_oaep_decrypt()
104 return -1; in bootutil_rsa_oaep_decrypt()
107 status = psa_asymmetric_decrypt(ctx->key_id, PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256), in bootutil_rsa_oaep_decrypt()
129 status = psa_import_key(&key_attributes, *p, (end - *p), &ctx->key_id); in bootutil_rsa_parse_private_key()
[all …]
/mcuboot-latest/ci/fih_test_docker/
Dfi_tester_gdb.sh3 # Copyright (c) 2020-2022 Arm Limited
9 # http://www.apache.org/licenses/LICENSE-2.0
25 …INSTR=$($GDB $AXF_FILE --batch -ex "disassemble $SKIP_ADDRESS" | grep "^ *$SKIP_ADDRESS" | sed "s/…
27 …LINE=$($GDB $AXF_FILE --batch -ex "info line *$SKIP_ADDRESS" | sed "s/Line \([0-9]*\).*\"\(.*\)\".…
35 # Print out the meta-info about the test, in YAML
36 echo "- skip_test:"
41 # echo -ne "$SKIP_ADDRESS | $INSTR...\t"
67 echo -n '.' 1>&2
72 rm -f $QEMU_PID_FILE $QEMU_LOG_FILE
73 /usr/bin/qemu-system-arm \
[all …]
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Decc.h1 /* ecc.h - TinyCrypt interface to common ECC functions */
35 * - Redistributions of source code must retain the above copyright notice,
38 * - Redistributions in binary form must reproduce the above copyright
42 * - Neither the name of Intel Corporation nor the names of its contributors
61 * @brief -- Interface to common ECC functions.
65 * curve NIST p-256.
67 * Security: The curve NIST p-256 provides approximately 128 bits of security.
80 /* Word size (4 bytes considering 32-bits architectures) */
104 /* Number of words of 32 bits to represent an element of the the curve p-256: */
106 /* Number of bytes to represent an element of the the curve p-256: */
[all …]
/mcuboot-latest/docs/release-notes.d/
Dfix-zephyr-sysbuild-name.md1 - Fixed clash when using sysbuild with other
2 applications (i.e. tests) using the name sysbuild
/mcuboot-latest/boot/zcbor/include/
Dzcbor_decode.h9 * SPDX-License-Identifier: Apache-2.0
48 * I.e. the largest number of elements expected in an unordered map,
164 * The CBOR spec allows elements (key-value pairs) in maps to appear in any order.
189 * or integers, i.e. the @p key_decoder is typically a _pexpect() function.
207 * @retval true If the key was found, i.e. @p key_decoder returned true.
219 * Refer to the docs for zcbor_(t|b)str_expect_* (e.g. @ref zcbor_bstr_expect_ptr)
226 #define zcbor_search_key_bstr_lit(state, str) zcbor_search_key_bstr_ptr(state, str, sizeof(str) - 1)
227 #define zcbor_search_key_tstr_lit(state, str) zcbor_search_key_tstr_ptr(state, str, sizeof(str) - 1)
234 * By default, i.e. when @ref manually_process_elem is not set, this function is
240 * element (key-value pair) that is currently being processed, or that has just been
[all …]
/mcuboot-latest/samples/zephyr/bad-keys/
Dbad-rsa-2048.pem1 -----BEGIN RSA PRIVATE KEY-----
24 ZYhcMQKBgEHN3ZYe7gOfxR4rqk+OIsAUN9P3zyu6kQzUL1BQ7t7Gwi1dv6+E+BGQ
27 -----END RSA PRIVATE KEY-----
/mcuboot-latest/testplan/mynewt/
Dkey_rsa_2.pem1 -----BEGIN RSA PRIVATE KEY-----
14 QJXCnJ1OfL1lhtegndP36Sb/mGwdK6IWDLH2+E/eLcWzcUXNvI0H02pbvzq/Vbh+
27 -----END RSA PRIVATE KEY-----
/mcuboot-latest/scripts/
Dassemble.py5 # SPDX-License-Identifier: Apache-2.0
11 # http://www.apache.org/licenses/LICENSE-2.0
42 offset_re = re.compile(r"^#define DT_FLASH_AREA_([0-9A-Z_]+)_OFFSET(_0)?\s+(0x[0-9a-fA-F]+|[0-9]+)$…
43 size_re = re.compile(r"^#define DT_FLASH_AREA_([0-9A-Z_]+)_SIZE(_0)?\s+(0x[0-9a-fA-F]+|[0-9]+)$")
50 except OSError as e:
51 if e.errno != errno.ENOENT:
59 part_nodes = edt.compat2nodes["fixed-partitions"]
70 # We care about the mcuboot, image-0, and image-1 partitions.
74 if 'image-0' not in offsets:
75 raise Exception("Board partition table does not have image-0 partition")
[all …]
/mcuboot-latest/ci/fih_test_docker/docker-build/
Dbuild.sh9 # http://www.apache.org/licenses/LICENSE-2.0
17 set -e
23 rm -f *.list *.key
28 image=mcuboot/fih-test
29 docker build --pull --tag=$image .

1234