Home
last modified time | relevance | path

Searched full:are (Results 1 – 25 of 195) sorted by relevance

12345678

/mcuboot-3.6.0/docs/
Decdsa.md7 TLS) are fairly strict about the formatting of the ECDSA signature.
9 There are two ways to fix this:
21 generated. These tools are usually written in higher-level
34 Without this argument, the images are padded with the
66 ECDSA signatures are encoded as ASN.1, notably with the signature
76 Both `r` and `s` are 256-bit numbers. Because these are
77 unsigned numbers that are being encoded in ASN.1 as signed values, if
89 The correct approach here is to accept that ECDSA signatures are of
Dencrypted_images.md33 decrypted (after validation). If swap upgrades are enabled, the image
55 TLVs are still sent as plain data.
69 `newt`. This key should never be reused and no checks are done for this,
81 are the results of applying the given operations over the AES-CTR key.
85 ECIES follows a well defined protocol to generate an encryption key. There are
86 multiple standards which differ only on which building blocks are used; for
87 MCUboot we settled on some primitives that are easily found on our crypto
96 are not using a `salt` and using an `info` of `MCUBoot_ECIES_v1`, generating
118 the TLV containing the key. Given that no errors are found, it will then
131 presence of the `ENCRYPTED` flag and the key TLV. If those are present the
[all …]
Dreadme-zephyr.md5 There are some pretty significant differences in how apps are built
6 for Zephyr, and these are documented here.
13 partitions defined in its device tree. These partitions are:
26 Currently, the two image slots must be contiguous. If you are running
28 so your SoC runs it out of reset. If there are multiple updateable images
33 The flash partitions are typically defined in the Zephyr boards folder, in a
53 the `CMakeLists.txt` file in boot/zephyr. There are comments there for
131 The signing keys used by MCUboot are represented in standard formats,
174 4KB, 8KB, 12KB, 16KB are allowed, 7KB, 7.5KB are not. This scratch partition
DPORTING.md16 OS must already have it bundled. The supported libraries at the moment are
64 Kconfig; these configuration systems are converted to MCUBOOT_ options
73 for MCUboot and images of applications are stored, in system-agnostic way.
76 Such flash regions are served by object of `const struct flash_area` type while
81 This way systems are free to implement internal logic of flash map or define
118 specific header files and are used to identify destination of flash area by ID:
136 The numbers, given above, are provided as an example and depend on system
184 To configure the what functions are called when allocating/deallocating
Drelease-notes.md59 are no longer in the code, a pem file must be supplied to extract
89 - Upgrade fault-injection hardening, improving cases injections are detected.
96 There are no security vulnerabilities reported on the MCUboot code for this
168 the development keys in the repo are never used in a production
177 There are bug fixes, and associated imgtool updates as well.
217 later boot stages. There are bug fixes, and associated imgtool
255 scratch partition. There are also lots of bug fixes, extra simulator
289 If multiple images and dependencies are not used, the images will be
312 There are no breaking changes in functionality. This release should work with
324 multi-images, and a new name for slot0/slot1 which are now called
[all …]
Dreadme-mbed.md15 * `"mcuboot.slot-size"`: size of an image slot (only one image, two slots are currently supported)
19 …boot/tree/main/boot/mbed/mbed_lib.json). Please note that certain features are not currently suppo…
25 …ted read and write sizes (granularities) are _no larger than_ 16 byte, which MCUboot's read/write …
Ddesign.md67 /** Image header. All fields are in little endian byte order. */
123 Optional type-length-value records (TLVs) containing image metadata are placed
127 If protected TLVs are present then a TLV info header with magic equal to
162 The bootloader area contains the bootloader image itself. The other areas are
164 images therefore the flash area IDs of primary and secondary areas are mapped
195 scratch for your use case the following parameters are relevant:
201 that are actually used for storing the image are copied. The image/scratch ratio
227 slot areas sizes are equal.
250 4. Repeats steps 2. and 3. until all the slots' sectors are swapped.
255 larger than the secondary slot, although same-sized slots are allowed as well.
[all …]
Drelease.md11 1. MAJOR version when there are incompatible API changes.
14 3. PATCH version when there are backward-compatible bug fixes.
35 Before each release, tags are made (see below) for at least one
41 that should be merged into the main branch are those to fix bugs found
55 under test, while numbers are accepted only for the final releases.
/mcuboot-3.6.0/boot/cypress/
DREADME.md5are created per MCUboot library maintainers requirements. Implemetation differs from conventional …
7 Examples provided to use with **ModusToolbox® Software Environment** are a recommended reference po…
16 There are two applications implemented:
42 Those are represented as submodules.
61 …d and upload MCUBootApp bootloader application and sample user applocation are located in `Readme.…
71 Following CLI / IDE are supported for project build:
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/
Decc_platform_specific.h7 * modification, are permitted provided that the following conditions are met:
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
30 * modification, are permitted provided that the following conditions are met:
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
Decc_dh.h8 * modification, are permitted provided that the following conditions are met:
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
33 * modification, are permitted provided that the following conditions are met:
49 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
Dcbc_mode.h7 * modification, are permitted provided that the following conditions are met:
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
39 * cipher to provide confidentiality of strings whose lengths are
52 * methods for generating IVs are acceptable, provided that the
128 * @note Assumes:- in == iv + ciphertext, i.e. the iv and the ciphertext are
Decc_dsa.h8 * modification, are permitted provided that the following conditions are met:
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
34 * modification, are permitted provided that the following conditions are met:
50 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
Dutils.h7 * modification, are permitted provided that the following conditions are met:
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
82 * @brief Constant-time algorithm to compare if two sequences of bytes are equal
/mcuboot-3.6.0/ext/tinycrypt/
DLICENSE11 are permitted provided that the following conditions are met:
27 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
43 are permitted provided that the following conditions are met:
52 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
/mcuboot-3.6.0/ext/tinycrypt/lib/source/
Decc_platform_specific.c7 * modification, are permitted provided that the following conditions are met:
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
30 * modification, are permitted provided that the following conditions are met:
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
/mcuboot-3.6.0/ext/tinycrypt/tests/include/
Dtest_ecc_utils.h7 * modification, are permitted provided that the following conditions are met:
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
30 * modification, are permitted provided that the following conditions are met:
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
/mcuboot-3.6.0/boot/cypress/BlinkyApp/
DReadme.md23 …o demonstrate MCUboot library features and not as reference examples some considerations are taken.
25 1. Port/pin `P5_0` and `P5_1` used to configure serial port for debug prints. These pins are the mo…
31 These values are set by specifing following macros: `-DUSER_APP_SIZE`, `-DUSER_APP_START`, `-DRAM_S…
82 *Note:* only 2 images are supported at the moment.
110 …ready placed corresponing `*.pem` key in `\keys` folder. The key variables are defined in root `Ma…
116 Flags passed to `imgtool` for signature are defined in `SIGN_ARGS` variable in BlinkyApp.mk.
126 …ot` directory and `BlinkyApp_upgrade.hex` in `upgrade` folder. These files are ready to be flashed…
130 Files to use for programming are:
/mcuboot-3.6.0/boot/mynewt/mcuboot_config/
Dsyscfg.yml29 description: 'Images are signed using RSA.'
35 description: 'Images are signed using ECDSA NIST P-256.'
38 description: 'Images are signed using ED25519.'
74 description: 'Maximum number of sectors that are swapped.'
79 - none downgrades are allowed
124 Default console log level. Valid values are:
/mcuboot-3.6.0/ext/tinycrypt/documentation/
Dtinycrypt.rst16 security and technicalities of each cryptographic primitive are found in the
92 peculiarities would increase the code size and thus are not considered here.
104 Some of these limitations are inherent to the cryptographic primitives
105 themselves, while others are specific to TinyCrypt. These limitations were accepted
108 limitations are discussed in-depth below.
140 be changed in future versions of the library as there are applications
177 * TinyCrypt CBC decryption assumes that the iv and the ciphertext are
195 * There are a few tradeoffs for the selection of the parameters of CCM mode.
198 invocations. Both things are related to the parameter 'q' of CCM mode. The
205 implications of this choice are:
[all …]
/mcuboot-3.6.0/boot/bootutil/include/bootutil/
Dbench.h35 * These are simple barrier-type benchmarks. If a platform has
36 * benchmarks that are enabled, calling `boot_bench_start()` before a
39 * The details of what is measured and how it is printed are specific
57 /* Without benchmarking enabled, these are just empty. */
/mcuboot-3.6.0/docs/release-notes.d/
D00readme.md12 Release notes are generally not needed for:
20 Release notes are included in files under this `docs/release-notes.d`
27 are not used for anything in particular, but to keep the files
/mcuboot-3.6.0/boot/zcbor/include/
Dzcbor_common.h105 and this keeps count of how many elements are
122 current map are being counted. */
129 map should not be searched. These are manipulated
236 #define ZCBOR_VALUE_IN_HEADER 23 ///! Values below this are encoded directly in the header.
313 * If there is no struct zcbor_state_constant (n_states == 1), error codes are
316 * payload, payload_len, elem_count, and elem_state are used to initialize the first state.
402 /** Check that the provided fragments are complete and in the right order.
411 * @retval true If the fragments are in the right order, and there are no
413 * @retval false If not all fragments have the same total_len, or gaps are
421 * The fragments are copied in the order they appear, without regard for
[all …]
/mcuboot-3.6.0/boot/cypress/MCUBootApp/
DREADME.md7 There are two applications implemented:
31 **Important**: make sure primary, secondary slot and bootloader app sizes are appropriate and corre…
89 In multi-image operation (two images are considered for simplicity) MCUboot Bootloader application …
95 * Boots Primary_1 only if both - Primary_1 and Primary_2 are present and valid;
97 This ensures two dependent applications can be accepted by device only in case both images are vali…
120 …o demonstrate MCUboot library features and not as reference examples some considerations are taken.
142 …er. Same approach used in sample BlinkyLedApp application. Example command are provided below for …
172 There are couple ways of programming hex of MCUBootApp and BlinkyApp. Following instructions assume…
/mcuboot-3.6.0/boot/cypress/MCUBootApp/config/
Dmcuboot_crypto_config.h126 * The time does not need to be correct, only time differences are used,
188 * This makes sure there are no linking errors on platforms that do not support
271 * values are fully controlled by the application (such as pointers).
274 * parameters that are fully controlled by the application, and should always
331 * This section sets support for features that are or are not needed
332 * within the modules that are enabled.
368 * \warning MD2, MD4, MD5, ARC4, DES and SHA-1 are considered weak and their
426 * \note Because of a signature change, the core AES encryption and decryption routines are
439 * \warning MD2, MD4, MD5, DES and SHA-1 are considered weak and their use
488 * The functions mbedtls_internal_ecp_init and mbedtls_internal_ecp_free are
[all …]

12345678