Home
last modified time | relevance | path

Searched +full:- +full:l (Results 1 – 12 of 12) sorted by relevance

/mcuboot-latest/ext/tinycrypt/tests/
Dtest_cmac_mode.c1 /* test_cmac_mode.c - TinyCrypt AES-CMAC tests (including SP 800-38B tests) */
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright
16 * - Neither the name of Intel Corporation nor the names of its contributors
34 * This module tests the following AES-CMAC test (including SP 800-38B):
37 * - CMAC test #1 (GF(2^128) double))
38 * - CMAC test #2 null msg (SP 800-38B test vector #1)
39 * - CMAC test #3 1 block msg (SP 800-38B test vector #2)
40 * - CMAC test #4 320 bit msg (SP 800-38B test vector #3)
41 * - CMAC test #5 512 bit msg (SP 800-38B test vector #4)
[all …]
/mcuboot-latest/ext/mbedtls-asn1/src/
Dplatform_util.c6 * SPDX-License-Identifier: Apache-2.0
12 * http://www.apache.org/licenses/LICENSE-2.0
22 * Ensure gmtime_r is available even with -std=c99; must be defined before
26 #define _POSIX_C_SOURCE 200112L
45 * http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html
52 * (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for
85 #if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
87 _POSIX_THREAD_SAFE_FUNCTIONS >= 200112L ) )
99 #endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
101 _POSIX_THREAD_SAFE_FUNCTIONS >= 200112L ) ) */
/mcuboot-latest/
Denc-rsa2048-priv.pem1 -----BEGIN RSA PRIVATE KEY-----
26 l+wkots9AzMJsiwDBUDeUvKb+gCNS/5bm5xzrft6AEJinqCVVVAyhw==
27 -----END RSA PRIVATE KEY-----
Droot-rsa-3072.pem1 -----BEGIN RSA PRIVATE KEY-----
3 qqaKYyKLLU6Bc79uFWiMGvTvKo+MIp5xV0veD35y03q4px1ErYcAg1z9cwVyRj+L
39 -----END RSA PRIVATE KEY-----
/mcuboot-latest/boot/cypress/
Dtoolchains.mk10 # Copyright 2018-2019 Cypress Semiconductor Corporation
11 # SPDX-License-Identifier: Apache-2.0
17 # http://www.apache.org/licenses/LICENSE-2.0
38 UNAME_S := $(shell uname -s)
58 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc"
63 TOOLCHAIN_PATH ?= /opt/gcc-arm-none-eabi
66 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc"
70 TOOLCHAIN_PATH ?= /opt/gcc-arm-none-eabi
73 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc"
79 OBJDUMP := "$(GCC_PATH)/bin/arm-none-eabi-objdump"
[all …]
/mcuboot-latest/boot/bootutil/include/bootutil/
Dfault_injection_hardening.h2 * SPDX-License-Identifier: Apache-2.0
90 /* Non-zero success value to defend against register resets. Zero is the most
91 * common value for a corrupted register so complex bit-patterns are used
100 #define FIH_NEGATIVE_VALUE -1
105 /* A volatile mask is used to prevent compiler optimization - the mask is xored
114 /* All ints are replaced with two int - the normal one and a backup which is
137 /* Global failure handler - more resistant to unlooping. noinline and used are
290 * First perform the precall step - this gets the current value of the CFI
305 #define FIH_CALL2(f, ret, l, c, ...) \ argument
307 FIH_LABEL("FIH_CALL_START", l, c); \
[all …]
/mcuboot-latest/.github/workflows/
Dzephyr_build.yaml1 # Copyright (c) 2022-2023 Nordic Semiconductor ASA
2 # SPDX-License-Identifier: Apache-2.0
11 - main
14 - main
16 - cron: 0 0 * * *
35 group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }}
36 cancel-in-progress: true
40 runs-on: ubuntu-latest
44 options: '--entrypoint /bin/bash'
46 - /home/runners/zephyrproject:/github/cache/zephyrproject
[all …]
/mcuboot-latest/scripts/imgtool/
Dmain.py3 # Copyright 2017-2020 Linaro Limited
4 # Copyright 2019-2023 Arm Limited
6 # SPDX-License-Identifier: Apache-2.0
12 # http://www.apache.org/licenses/LICENSE-2.0
75 valid_hash_encodings = ['lang-c', 'raw']
76 valid_encodings = ['lang-c', 'lang-rust', 'pem', 'raw']
78 'rsa-2048': gen_rsa2048,
79 'rsa-3072': gen_rsa3072,
80 'ecdsa-p256': gen_ecdsa_p256,
81 'ecdsa-p384': gen_ecdsa_p384,
[all …]
/mcuboot-latest/ext/fiat/src/
Dcurve25519.c3 // Copyright (c) 2015-2016 the fiat-crypto authors (see the AUTHORS file).
26 // (https://github.com/mit-plv/fiat-crypto), which is MIT licensed.
40 #include <mbedtls/compat-2.x.h>
49 // Various pre-computed constants.
54 // Low-level intrinsic operations
120 // |fiat_25519_from_bytes| requires the top-most bit be clear. in fe_frombytes_strict()
122 fiat_25519_from_bytes(h->v, s); in fe_frombytes_strict()
123 assert_fe(h->v); in fe_frombytes_strict()
134 assert_fe(f->v); in fe_tobytes()
135 fiat_25519_to_bytes(s, f->v); in fe_tobytes()
[all …]
/mcuboot-latest/docs/
Dimgtool.md11 pip3 install --user -r scripts/requirements.txt
13 ## [Managing keys](#managing-keys)
15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys.
18 ./scripts/imgtool.py keygen -k filename.pem -t rsa-2048
20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used
26 You can add the `-p` argument to `keygen`, which will cause it to
30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code)
42 ./scripts/imgtool.py getpub -k filename.pem
49 ## [Signing images](#signing-images)
62 -k, --key filename
[all …]
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Decdsa.h9 * The use of ECDSA for TLS is defined in <em>RFC-4492: Elliptic Curve
15 * SPDX-License-Identifier: Apache-2.0
21 * http://www.apache.org/licenses/LICENSE-2.0
45 * \note This macro returns a compile-time constant if its argument
49 * Ecdsa-Sig-Value ::= SEQUENCE {
57 ( /*T,L of SEQUENCE*/ ( ( bits ) >= 61 * 8 ? 3 : 2 ) + \
58 /*T,L of r,s*/ 2 * ( ( ( bits ) >= 127 * 8 ? 3 : 2 ) + \
109 mbedtls_ecdsa_restart_ver_ctx *MBEDTLS_PRIVATE(ver); /*!< ecdsa_verify() sub-context */
110 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */
112 mbedtls_ecdsa_restart_det_ctx *MBEDTLS_PRIVATE(det); /*!< ecdsa_sign_det() sub-context */
[all …]
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Dccm_mode.h1 /* ccm_mode.h - TinyCrypt interface to a CCM mode implementation */
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright
16 * - Neither the name of Intel Corporation nor the names of its contributors
37 * Overview: CCM (for "Counter with CBC-MAC") mode is a NIST approved mode of
38 * operation defined in SP 800-38C.
42 * 1) Both non-empty payload and associated data (it encrypts and
45 * 2) Non-empty payload and empty associated data (it encrypts and
47 * 3) Non-empty associated data and empty payload (it degenerates to
51 * between 0 and (2^16 - 2^8) bytes.
[all …]