Searched +full:- +full:l (Results 1 – 12 of 12) sorted by relevance
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_cmac_mode.c | 1 /* test_cmac_mode.c - TinyCrypt AES-CMAC tests (including SP 800-38B tests) */ 9 * - Redistributions of source code must retain the above copyright notice, 12 * - Redistributions in binary form must reproduce the above copyright 16 * - Neither the name of Intel Corporation nor the names of its contributors 34 * This module tests the following AES-CMAC test (including SP 800-38B): 37 * - CMAC test #1 (GF(2^128) double)) 38 * - CMAC test #2 null msg (SP 800-38B test vector #1) 39 * - CMAC test #3 1 block msg (SP 800-38B test vector #2) 40 * - CMAC test #4 320 bit msg (SP 800-38B test vector #3) 41 * - CMAC test #5 512 bit msg (SP 800-38B test vector #4) [all …]
|
/mcuboot-latest/ext/mbedtls-asn1/src/ |
D | platform_util.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 22 * Ensure gmtime_r is available even with -std=c99; must be defined before 26 #define _POSIX_C_SOURCE 200112L 45 * http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html 52 * (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for 85 #if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ 87 _POSIX_THREAD_SAFE_FUNCTIONS >= 200112L ) ) 99 #endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ 101 _POSIX_THREAD_SAFE_FUNCTIONS >= 200112L ) ) */
|
/mcuboot-latest/ |
D | enc-rsa2048-priv.pem | 1 -----BEGIN RSA PRIVATE KEY----- 26 l+wkots9AzMJsiwDBUDeUvKb+gCNS/5bm5xzrft6AEJinqCVVVAyhw== 27 -----END RSA PRIVATE KEY-----
|
D | root-rsa-3072.pem | 1 -----BEGIN RSA PRIVATE KEY----- 3 qqaKYyKLLU6Bc79uFWiMGvTvKo+MIp5xV0veD35y03q4px1ErYcAg1z9cwVyRj+L 39 -----END RSA PRIVATE KEY-----
|
/mcuboot-latest/boot/cypress/ |
D | toolchains.mk | 10 # Copyright 2018-2019 Cypress Semiconductor Corporation 11 # SPDX-License-Identifier: Apache-2.0 17 # http://www.apache.org/licenses/LICENSE-2.0 38 UNAME_S := $(shell uname -s) 58 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc" 63 TOOLCHAIN_PATH ?= /opt/gcc-arm-none-eabi 66 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc" 70 TOOLCHAIN_PATH ?= /opt/gcc-arm-none-eabi 73 CC := "$(GCC_PATH)/bin/arm-none-eabi-gcc" 79 OBJDUMP := "$(GCC_PATH)/bin/arm-none-eabi-objdump" [all …]
|
/mcuboot-latest/boot/bootutil/include/bootutil/ |
D | fault_injection_hardening.h | 2 * SPDX-License-Identifier: Apache-2.0 90 /* Non-zero success value to defend against register resets. Zero is the most 91 * common value for a corrupted register so complex bit-patterns are used 100 #define FIH_NEGATIVE_VALUE -1 105 /* A volatile mask is used to prevent compiler optimization - the mask is xored 114 /* All ints are replaced with two int - the normal one and a backup which is 137 /* Global failure handler - more resistant to unlooping. noinline and used are 290 * First perform the precall step - this gets the current value of the CFI 305 #define FIH_CALL2(f, ret, l, c, ...) \ argument 307 FIH_LABEL("FIH_CALL_START", l, c); \ [all …]
|
/mcuboot-latest/.github/workflows/ |
D | zephyr_build.yaml | 1 # Copyright (c) 2022-2023 Nordic Semiconductor ASA 2 # SPDX-License-Identifier: Apache-2.0 11 - main 14 - main 16 - cron: 0 0 * * * 35 group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} 36 cancel-in-progress: true 40 runs-on: ubuntu-latest 44 options: '--entrypoint /bin/bash' 46 - /home/runners/zephyrproject:/github/cache/zephyrproject [all …]
|
/mcuboot-latest/scripts/imgtool/ |
D | main.py | 3 # Copyright 2017-2020 Linaro Limited 4 # Copyright 2019-2023 Arm Limited 6 # SPDX-License-Identifier: Apache-2.0 12 # http://www.apache.org/licenses/LICENSE-2.0 75 valid_hash_encodings = ['lang-c', 'raw'] 76 valid_encodings = ['lang-c', 'lang-rust', 'pem', 'raw'] 78 'rsa-2048': gen_rsa2048, 79 'rsa-3072': gen_rsa3072, 80 'ecdsa-p256': gen_ecdsa_p256, 81 'ecdsa-p384': gen_ecdsa_p384, [all …]
|
/mcuboot-latest/ext/fiat/src/ |
D | curve25519.c | 3 // Copyright (c) 2015-2016 the fiat-crypto authors (see the AUTHORS file). 26 // (https://github.com/mit-plv/fiat-crypto), which is MIT licensed. 40 #include <mbedtls/compat-2.x.h> 49 // Various pre-computed constants. 54 // Low-level intrinsic operations 120 // |fiat_25519_from_bytes| requires the top-most bit be clear. in fe_frombytes_strict() 122 fiat_25519_from_bytes(h->v, s); in fe_frombytes_strict() 123 assert_fe(h->v); in fe_frombytes_strict() 134 assert_fe(f->v); in fe_tobytes() 135 fiat_25519_to_bytes(s, f->v); in fe_tobytes() [all …]
|
/mcuboot-latest/docs/ |
D | imgtool.md | 11 pip3 install --user -r scripts/requirements.txt 13 ## [Managing keys](#managing-keys) 15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys. 18 ./scripts/imgtool.py keygen -k filename.pem -t rsa-2048 20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used 26 You can add the `-p` argument to `keygen`, which will cause it to 30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code) 42 ./scripts/imgtool.py getpub -k filename.pem 49 ## [Signing images](#signing-images) 62 -k, --key filename [all …]
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | ecdsa.h | 9 * The use of ECDSA for TLS is defined in <em>RFC-4492: Elliptic Curve 15 * SPDX-License-Identifier: Apache-2.0 21 * http://www.apache.org/licenses/LICENSE-2.0 45 * \note This macro returns a compile-time constant if its argument 49 * Ecdsa-Sig-Value ::= SEQUENCE { 57 ( /*T,L of SEQUENCE*/ ( ( bits ) >= 61 * 8 ? 3 : 2 ) + \ 58 /*T,L of r,s*/ 2 * ( ( ( bits ) >= 127 * 8 ? 3 : 2 ) + \ 109 mbedtls_ecdsa_restart_ver_ctx *MBEDTLS_PRIVATE(ver); /*!< ecdsa_verify() sub-context */ 110 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */ 112 mbedtls_ecdsa_restart_det_ctx *MBEDTLS_PRIVATE(det); /*!< ecdsa_sign_det() sub-context */ [all …]
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | ccm_mode.h | 1 /* ccm_mode.h - TinyCrypt interface to a CCM mode implementation */ 9 * - Redistributions of source code must retain the above copyright notice, 12 * - Redistributions in binary form must reproduce the above copyright 16 * - Neither the name of Intel Corporation nor the names of its contributors 37 * Overview: CCM (for "Counter with CBC-MAC") mode is a NIST approved mode of 38 * operation defined in SP 800-38C. 42 * 1) Both non-empty payload and associated data (it encrypts and 45 * 2) Non-empty payload and empty associated data (it encrypts and 47 * 3) Non-empty associated data and empty payload (it degenerates to 51 * between 0 and (2^16 - 2^8) bytes. [all …]
|