/mcuboot-2.7.6/boot/cypress/platforms/PSOC_062_2M/CM4/GCC_ARM/ |
D | startup_psoc6_02_cm4.S | 96 .long ioss_interrupts_gpio_1_IRQHandler /* GPIO Port Interrupt #1 */ 119 …ong cpuss_interrupts_ipc_1_IRQHandler /* CPUSS Inter Process Communication Interrupt #1 */ 135 .long scb_1_interrupt_IRQHandler /* Serial Communication Block #1 */ 148 .long cpuss_interrupts_dmac_1_IRQHandler /* CPUSS DMAC, Channel #1 */ 152 .long cpuss_interrupts_dw0_1_IRQHandler /* CPUSS DataWire #0, Channel #1 */ 180 .long cpuss_interrupts_dw1_0_IRQHandler /* CPUSS DataWire #1, Channel #0 */ 181 .long cpuss_interrupts_dw1_1_IRQHandler /* CPUSS DataWire #1, Channel #1 */ 182 .long cpuss_interrupts_dw1_2_IRQHandler /* CPUSS DataWire #1, Channel #2 */ 183 .long cpuss_interrupts_dw1_3_IRQHandler /* CPUSS DataWire #1, Channel #3 */ 184 .long cpuss_interrupts_dw1_4_IRQHandler /* CPUSS DataWire #1, Channel #4 */ [all …]
|
/mcuboot-2.7.6/docs/ |
D | Gemfile.lock | 12 coffee-script (2.4.1) 15 coffee-script-source (1.11.1) 33 faraday-net_http (1.0.1) 36 gemoji (3.0.1) 41 jekyll-coffeescript (= 1.1.1) 44 jekyll-feed (= 0.15.1) 52 jekyll-relative-links (= 0.6.1) 55 jekyll-seo-tag (= 2.7.1) 58 jekyll-theme-architect (= 0.1.1) 59 jekyll-theme-cayman (= 0.1.1) [all …]
|
D | testplan-mynewt.md | 22 * `newt create-image k64f_blinky 1.0.1 key_<sign-algo>.pem` 28 `newt create-image k64f_blinky 1.0.1 key_rsa.pem --rsa-pss` 30 Build and load image in slot 1 with no signing, signed with 38 * `newtmgr image test <hash of slot 1>` 51 * `newt create-image k64f_blinky 1.0.1 key_rsa.pem` 54 Build and load image in slot 1 with no signing, signed with 67 * `newtmgr image test <hash of slot 1>` 78 * `newt create-image k64f_blinky 1.0.1 key_rsa.pem` 87 * `newtmgr image confirm <hash of slot 1>` 89 This should not swap and delete the image in slot 1 when signed with the wrong [all …]
|
/mcuboot-2.7.6/sim/src/ |
D | caps.rs | 13 RSA2048 = (1 << 0), 14 EcdsaP224 = (1 << 1), 15 EcdsaP256 = (1 << 2), 16 SwapUsingScratch = (1 << 3), 17 OverwriteUpgrade = (1 << 4), 18 EncRsa = (1 << 5), 19 EncKw = (1 << 6), 20 ValidatePrimarySlot = (1 << 7), 21 RSA3072 = (1 << 8), 22 Ed25519 = (1 << 9), [all …]
|
D | image.rs | 113 1 => FlashId::Image2, in new() 122 1 => FlashId::Image3, in new() 147 index: 1, in new() 180 let dep: Box<dyn Depender> = if num_images > 1 { in make_no_upgrade_image() 188 _ => install_image(&mut flash, &slots[1], 46928, &*dep, false) in make_no_upgrade_image() 207 mark_upgrade(&mut images.flash, &image.slots[1]); in make_image() 230 let upgrades = install_image(&mut bad_flash, &slots[1], 41928, &dep, true); in make_bad_secondary_slot_image() 268 let upgrades = install_image(&mut flash, &slots[1], 32784, &dep, false); in make_bootstrap_image() 370 areadesc.add_flash_sectors(1, &dev1); in make_device() 373 areadesc.add_image(0x000000, 0x068000, FlashId::Image1, 1); in make_device() [all …]
|
/mcuboot-2.7.6/boot/cypress/platforms/ |
D | cycfg_system.h | 41 #define cpuss_0_dap_0_ENABLED 1U 42 #define srss_0_clock_0_ENABLED 1U 43 #define srss_0_clock_0_altsystickclk_0_ENABLED 1U 44 #define srss_0_clock_0_bakclk_0_ENABLED 1U 45 #define srss_0_clock_0_fastclk_0_ENABLED 1U 46 #define srss_0_clock_0_fll_0_ENABLED 1U 47 #define srss_0_clock_0_hfclk_0_ENABLED 1U 49 #define srss_0_clock_0_hfclk_2_ENABLED 1U 51 #define srss_0_clock_0_hfclk_3_ENABLED 1U 53 #define srss_0_clock_0_hfclk_4_ENABLED 1U [all …]
|
D | cycfg_system.c | 29 #define CY_CFG_SYSCLK_ECO_ERROR 1 34 #define CY_CFG_SYSCLK_CLKALTSYSTICK_ENABLED 1 35 #define CY_CFG_SYSCLK_CLKBAK_ENABLED 1 36 #define CY_CFG_SYSCLK_CLKFAST_ENABLED 1 37 #define CY_CFG_SYSCLK_FLL_ENABLED 1 38 #define CY_CFG_SYSCLK_CLKHF0_ENABLED 1 41 #define CY_CFG_SYSCLK_CLKHF2_ENABLED 1 44 #define CY_CFG_SYSCLK_CLKHF3_ENABLED 1 47 #define CY_CFG_SYSCLK_CLKHF4_ENABLED 1 50 #define CY_CFG_SYSCLK_ILO_ENABLED 1 [all …]
|
/mcuboot-2.7.6/boot/mynewt/mcuboot_config/include/mcuboot_config/ |
D | mcuboot_config.h | 27 #define MCUBOOT_IMAGE_NUMBER 1 30 #define MCUBOOT_SERIAL 1 33 #define MCUBOOT_VALIDATE_PRIMARY_SLOT 1 36 #define MCUBOOT_USE_MBED_TLS 1 39 #define MCUBOOT_USE_TINYCRYPT 1 42 #define MCUBOOT_SIGN_EC256 1 48 #define MCUBOOT_SIGN_RSA 1 52 #define MCUBOOT_SIGN_ED25519 1 55 #define MCUBOOT_SIGN_EC 1 58 #define MCUBOOT_ENCRYPT_RSA 1 [all …]
|
/mcuboot-2.7.6/boot/bootutil/include/bootutil/ |
D | caps.h | 36 #define BOOTUTIL_CAP_RSA2048 (1<<0) 37 #define BOOTUTIL_CAP_ECDSA_P224 (1<<1) 38 #define BOOTUTIL_CAP_ECDSA_P256 (1<<2) 39 #define BOOTUTIL_CAP_SWAP_USING_SCRATCH (1<<3) 40 #define BOOTUTIL_CAP_OVERWRITE_UPGRADE (1<<4) 41 #define BOOTUTIL_CAP_ENC_RSA (1<<5) 42 #define BOOTUTIL_CAP_ENC_KW (1<<6) 43 #define BOOTUTIL_CAP_VALIDATE_PRIMARY_SLOT (1<<7) 44 #define BOOTUTIL_CAP_RSA3072 (1<<8) 45 #define BOOTUTIL_CAP_ED25519 (1<<9) [all …]
|
/mcuboot-2.7.6/ext/mbedtls-asn1/include/mbedtls/ |
D | oid.h | 55 #define MBEDTLS_OID_ISO_MEMBER_BODIES "\x2a" /* {iso(1) member-body(2)} */ 56 #define MBEDTLS_OID_ISO_IDENTIFIED_ORG "\x2b" /* {iso(1) identified-organization(… 66 … MBEDTLS_OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */ 87 #define MBEDTLS_OID_ORGANIZATION "\x01" /* {organization(1)} */ 88 …_COUNTRY_US MBEDTLS_OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */ 91 …_US_ORG MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */ 94 …TSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */ 101 * { iso(1) identified-organization(3) dod(6) internet(1) 128 …e:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)… 176 …TH MBEDTLS_OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */ [all …]
|
D | asn1.h | 4 * \brief Generic ASN.1 parsing 57 …F_TOO_SMALL -0x006C /**< Buffer too small when writing ASN.1 data structure. */ 63 * These constants comply with the DER encoded ASN.1 type tags. 93 * Bit masks for each of the components of an ASN.1 tag as specified in 97 * Bit 8 7 6 5 1 110 #define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1) 127 * \name Functions to parse ASN.1 data structures 154 * Container for a sequence of ASN.1 items 158 mbedtls_asn1_buf buf; /**< Buffer containing the given ASN.1 item. */ 164 * Container for a sequence or list of 'named' ASN.1 data items [all …]
|
/mcuboot-2.7.6/ext/tinycrypt/lib/source/ |
D | ctr_prng.c | 38 * NIST SP 800-90A Rev. 1. 40 * Annotations to particular steps (e.g. 10.2.1.2 Step 1) refer to the steps 58 if (++arr[i-1] != 0U) { in arrInc() 77 /* 10.2.1.2 step 1 */ in tc_ctr_prng_update() 130 /* 10.2.1.3.1 step 1 */ in tc_ctr_prng_init() 136 /* 10.2.1.3.1 step 2 */ in tc_ctr_prng_init() 141 /* 10.2.1.3.1 step 3 */ in tc_ctr_prng_init() 147 /* 10.2.1.3.1 step 4 */ in tc_ctr_prng_init() 150 /* 10.2.1.3.1 step 5 */ in tc_ctr_prng_init() 153 /* 10.2.1.3.1 step 6 */ in tc_ctr_prng_init() [all …]
|
D | ecc.c | 108 ((uECC_word_t)1 << (bit & uECC_WORD_BITS_MASK))); in uECC_vli_testBit() 119 for (i = max_words - 1; i >= 0 && vli[i] == 0; --i) { in vli_numDigits() 122 return (i + 1); in vli_numDigits() 137 digit = vli[num_digits - 1]; in uECC_vli_numBits() 139 digit >>= 1; in uECC_vli_numBits() 142 return (((bitcount_t)(num_digits - 1) << uECC_WORD_BITS_SHIFT) + i); in uECC_vli_numBits() 161 for (i = num_words - 1; i >= 0; --i) { in uECC_vli_cmp_unsafe() 163 return 1; in uECC_vli_cmp_unsafe() 165 return -1; in uECC_vli_cmp_unsafe() 178 for (i = num_words - 1; i >= 0; --i) { in uECC_vli_equal() [all …]
|
D | ecc_dsa.c | 94 if (uECC_vli_cmp_unsafe(curve->n, native, num_n_words) != 1) { in bits2int() 115 uECC_vli_cmp(curve->n, k, num_n_words) != 1) { in uECC_sign_with_k() 120 EccPoint_mult(p, curve->G, k2[!carry], 0, num_n_bits + 1, curve); in uECC_sign_with_k() 129 tmp[0] = 1; in uECC_sign_with_k() 138 uECC_vli_modInv(k, k, curve->n, num_n_words); /* k = 1 / k' */ in uECC_sign_with_k() 139 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k() 146 s[num_n_words - 1] = 0; in uECC_sign_with_k() 158 return 1; in uECC_sign_with_k() 181 return 1; in uECC_sign() 215 rx[num_n_words - 1] = 0; in uECC_verify() [all …]
|
D | ccm_mode.c | 50 } else if ((mlen < 4) || (mlen > 16) || (mlen & 1)) { in tc_ccm_config() 72 T[1] ^= (uint8_t)(dlen); in ccm_cbc_mac() 161 b[0] = ((alen > 0) ? 0x40:0) | (((c->mlen - 2) / 2 << 3)) | (1); in tc_ccm_generation_encryption() 162 for (i = 1; i <= 13; ++i) { in tc_ccm_generation_encryption() 163 b[i] = c->nonce[i - 1]; in tc_ccm_generation_encryption() 171 ccm_cbc_mac(tag, associated_data, alen, 1, c->sched); in tc_ccm_generation_encryption() 180 b[0] = 1; /* q - 1 = 2 - 1 = 1 */ in tc_ccm_generation_encryption() 222 b[0] = 1; /* q - 1 = 2 - 1 = 1 */ in tc_ccm_decryption_verification() 223 for (i = 1; i < 14; ++i) { in tc_ccm_decryption_verification() 224 b[i] = c->nonce[i - 1]; in tc_ccm_decryption_verification() [all …]
|
/mcuboot-2.7.6/testplan/mynewt/apps/slinky/ |
D | syscfg.yml | 21 value: 1 24 SHELL_TASK: 1 25 STATS_NAMES: 1 26 REBOOT_LOG_FCB: 1 27 LOG_FCB: 1 28 CONFIG_FCB: 1 29 STATS_CLI: 1 30 LOG_CLI: 1 31 CONFIG_CLI: 1 32 STATS_MGMT: 1 [all …]
|
/mcuboot-2.7.6/boot/bootutil/src/ |
D | image_rsa.c | 59 /* The length of the mask: emLen - hLen - 1. */ 60 #define PSS_MASK_LEN (PSS_EMLEN - PSS_HLEN - 1) 65 #define PSS_MASK_ZERO_COUNT (PSS_MASK_LEN - PSS_SLEN - 1) 69 #define PSS_MASK_SALT_POS (PSS_MASK_ONE_POS + 1) 84 return -1; in bootutil_parse_rsakey() 102 /* The mbedtls version is more than 2.6.1 */ in bootutil_parse_rsakey() 126 * This is described in PKCS#1, B.2.1. 158 * Validate an RSA signature, using RSA-PSS, as described in PKCS #1 175 rc = -1; in bootutil_cmp_rsasig() 180 rc = -1; in bootutil_cmp_rsasig() [all …]
|
D | swap_move.c | 62 #if (BOOT_IMAGE_NUMBER == 1) in boot_read_image_header() 75 if (bs->idx > 1 && bs->idx <= g_last_idx) { in boot_read_image_header() 77 slot = 1; in boot_read_image_header() 81 } else if (bs->idx == 1) { in boot_read_image_header() 85 if (slot == 1 && bs->state == 2) { in boot_read_image_header() 107 rc = -1; in boot_read_image_header() 139 found_idx = -1; in swap_read_status_bytes() 141 last_rc = 1; in swap_read_status_bytes() 145 rc = flash_area_read(fap, off + (i - 1) * write_sz, &status, 1); in swap_read_status_bytes() 150 if (bootutil_buffer_is_erased(fap, &status, 1)) { in swap_read_status_bytes() [all …]
|
D | tlv.c | 36 * -1 on errors 46 return -1; in bootutil_tlv_iter_begin() 51 return -1; in bootutil_tlv_iter_begin() 56 return -1; in bootutil_tlv_iter_begin() 61 return -1; in bootutil_tlv_iter_begin() 64 return -1; in bootutil_tlv_iter_begin() 68 return -1; in bootutil_tlv_iter_begin() 91 * 1 if no more TLVs with matching type are available 92 * -1 on errors 102 return -1; in bootutil_tlv_iter_next() [all …]
|
D | encrypted.c | 99 return -1; in parse_rsa_enckey() 129 if ( /* d mod (p-1) and d mod (q-1) */ in parse_rsa_enckey() 132 /* q ^ (-1) mod p */ in parse_rsa_enckey() 177 return -1; in parse_ec256_enckey() 193 if (alg.len != sizeof(ec_pubkey_oid) - 1 || in parse_ec256_enckey() 194 memcmp(alg.p, ec_pubkey_oid, sizeof(ec_pubkey_oid) - 1)) { in parse_ec256_enckey() 197 if (param.len != sizeof(ec_secp256r1_oid) - 1 || in parse_ec256_enckey() 198 memcmp(param.p, ec_secp256r1_oid, sizeof(ec_secp256r1_oid) - 1)) { in parse_ec256_enckey() 214 if (mbedtls_asn1_get_int(p, end, &version) || version != 1) { in parse_ec256_enckey() 254 return -1; in parse_x25519_enckey() [all …]
|
D | image_ec256.c | 64 return -1; in bootutil_parse_eckey() 71 if (alg.len != sizeof(ec_pubkey_oid) - 1 || in bootutil_parse_eckey() 72 memcmp(alg.p, ec_pubkey_oid, sizeof(ec_pubkey_oid) - 1)) { in bootutil_parse_eckey() 75 if (param.len != sizeof(ec_secp256r1_oid) - 1|| in bootutil_parse_eckey() 76 memcmp(param.p, ec_secp256r1_oid, sizeof(ec_secp256r1_oid) - 1)) { in bootutil_parse_eckey() 110 return -1; in bootutil_import_key() 119 if (alg.len != sizeof(ec_pubkey_oid) - 1 || in bootutil_import_key() 120 memcmp(alg.p, ec_pubkey_oid, sizeof(ec_pubkey_oid) - 1)) { in bootutil_import_key() 124 if (param.len != sizeof(ec_secp256r1_oid) - 1 || in bootutil_import_key() 125 memcmp(param.p, ec_secp256r1_oid, sizeof(ec_secp256r1_oid) - 1)) { in bootutil_import_key() [all …]
|
/mcuboot-2.7.6/boot/boot_serial/src/ |
D | regenerate_serial_recovery_cbor.sh | 3 if [ "$1" == "--help" ] || [ "$1" == "" ]; then 7 exit -1 16 ' "$2" "$(git -C ../../../ext/cddl-gen rev-parse HEAD)"; cat $1;)" > $1 21 cp $1 $2 42 ' "$2"; cat $1;)" > $1 45 add_copyright serial_recovery_cbor.c "$1" 46 add_copyright serial_recovery_cbor.h "$1"
|
D | serial_recovery_cbor.c | 38 tmp_str.len = sizeof("image") - 1, &tmp_str))))) in decode_Member() 39 …2_decode(state, (&(*result)._Member_image)))) && (((*result)._Member_choice = _Member_image) || 1)) in decode_Member() 41 tmp_str.len = sizeof("data") - 1, &tmp_str))))) in decode_Member() 42 …rx_decode(state, (&(*result)._Member_data)))) && (((*result)._Member_choice = _Member_data) || 1))) in decode_Member() 44 tmp_str.len = sizeof("len") - 1, &tmp_str))))) in decode_Member() 45 …tx32_decode(state, (&(*result)._Member_len)))) && (((*result)._Member_choice = _Member_len) || 1))) in decode_Member() 47 tmp_str.len = sizeof("off") - 1, &tmp_str))))) in decode_Member() 48 …tx32_decode(state, (&(*result)._Member_off)))) && (((*result)._Member_choice = _Member_off) || 1))) in decode_Member() 50 tmp_str.len = sizeof("sha") - 1, &tmp_str))))) in decode_Member() 51 …(&(*result)._Member_sha)))) && (((*result)._Member_choice = _Member_sha) || 1)))), union_end_code(… in decode_Member() [all …]
|
/mcuboot-2.7.6/ci/fih_test_docker/ |
D | fi_tester_gdb.sh | 19 local SKIP_ADDRESS=$1 23 … --batch -ex "disassemble $SKIP_ADDRESS" | grep "^ *$SKIP_ADDRESS" | sed "s/.*:[ \t]*\(.*\)$/\1/g") 25 …B $AXF_FILE --batch -ex "info line *$SKIP_ADDRESS" | sed "s/Line \([0-9]*\).*\"\(.*\)\".*/\2:\1/g") 61 echo -n '.' 1>&2 97 echo "" 1>&2 98 echo "Boot success: address: $SKIP_ADDRESS skipped: $SKIP_SIZE" 1>&2 99 …-eabi-objdump -d $IMAGE_DIR/bl2.axf --start-address=$SKIP_ADDRESS -S | tail -n +7 | head -n 14 1>&2 100 echo "" 1>&2 101 echo "" 1>&2 103 LAST_LINE=`tail -n 1 $QEMU_LOG_FILE | tr -dc '[:print:]'` [all …]
|
/mcuboot-2.7.6/ext/fiat/src/ |
D | curve25519.c | 56 result |= ((uint64_t)in[1]) << 8; in load_3() 64 result |= ((uint64_t)in[1]) << 8; in load_4() 90 ((_assert_fe_i & 1) ? 0x2333333u : 0x4666666u)); \ 108 ((_assert_fe_i & 1) ? 0x6999999u : 0xd333332u)); \ 144 // h = 1 151 h->v[0] = 1; in fe_1() 246 for (i = 1; i < 2; ++i) { in fe_loose_invert() 254 for (i = 1; i < 5; ++i) { in fe_loose_invert() 259 for (i = 1; i < 10; ++i) { in fe_loose_invert() 264 for (i = 1; i < 20; ++i) { in fe_loose_invert() [all …]
|