/mcuboot-3.6.0/sim/src/ |
D | tlv.rs | 193 TlvFlags::ENCRYPTED_AES256 as u32 in new_enc_rsa() 195 TlvFlags::ENCRYPTED_AES128 as u32 in new_enc_rsa() 207 TlvFlags::ENCRYPTED_AES256 as u32 in new_sig_enc_rsa() 209 TlvFlags::ENCRYPTED_AES128 as u32 in new_sig_enc_rsa() 221 TlvFlags::ENCRYPTED_AES256 as u32 in new_enc_kw() 223 TlvFlags::ENCRYPTED_AES128 as u32 in new_enc_kw() 235 TlvFlags::ENCRYPTED_AES256 as u32 in new_rsa_kw() 237 TlvFlags::ENCRYPTED_AES128 as u32 in new_rsa_kw() 249 TlvFlags::ENCRYPTED_AES256 as u32 in new_ecdsa_kw() 251 TlvFlags::ENCRYPTED_AES128 as u32 in new_ecdsa_kw() [all …]
|
D | depends.rs | 46 ImageVersion::new_synthetic(self.number as u8, slot as u8, 0) in my_version() 108 /// A "test" with no dependency information, and the images marked as a 144 ImageVersion::new_synthetic(self.number as u8, slot as u8, 0) in my_version() 157 ImageVersion::new_synthetic(self.other_id(), slot as u8, 0) in my_deps() 163 ImageVersion::new_synthetic(self.other_id(), slot as u8, 1) in my_deps() 170 (1 - self.number) as u8 in other_id() 184 build_num: slot as u32, in new_synthetic()
|
D | image.rs | 181 base_off: primary_base as usize, in new() 183 len: primary_len as usize, in new() 190 base_off: secondary_base as usize, in new() 192 len: secondary_len as usize, in new() 440 // The flash layout as described is not present in any real STM32F4 device, but it in make_device() 442 // as long as they are compatible in both slots and all fit in the scratch. in make_device() 447 align as usize, erased_val); in make_device() 461 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device() 477 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device() 493 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device() [all …]
|
/mcuboot-3.6.0/sim/mcuboot-sys/src/ |
D | c.rs | 80 Some(ref c) => **c as libc::c_int in boot_go() 94 None => raw::invoke_boot_go(&mut sim_ctx as *mut _, in boot_go() 95 &areadesc.get_c() as *const _, in boot_go() 96 &mut rsp as *mut _, -1) as i32, in boot_go() 97 Some(i) => raw::invoke_boot_go(&mut sim_ctx as *mut _, in boot_go() 98 &areadesc.get_c() as *const _, in boot_go() 99 &mut rsp as *mut _, in boot_go() 100 i as i32) as i32 in boot_go() 126 unsafe { raw::boot_magic_sz() as usize } in boot_magic_sz() 130 unsafe { raw::boot_max_align() as usize } in boot_max_align() [all …]
|
D | area.rs | 38 let nid = id as usize; in add_image() 70 off: sector.base as u32, in add_image() 71 size: sector.size as u32, in add_image() 87 off: orig_base as u32, in add_image() 88 size: orig_len as u32, in add_image() 92 // Add a simple slot to the image. This ignores the device layout, and just adds the area as a 101 off: base as u32, in add_simple_image() 102 size: len as u32, in add_simple_image() 110 off: base as u32, in add_simple_image() 111 size: len as u32, in add_simple_image() [all …]
|
D | lib.rs | 25 ram: vec![0; size as usize], in new() 45 size: self.ram.len() as u32, in invoke() 46 base: &self.ram[0] as *const u8 as usize - self.offset as usize, in invoke()
|
D | api.rs | 172 align: dev.align() as u32, in set_flash() 178 dev_id, FlashPtr{ptr: dev as *mut dyn Flash}); in set_flash() 265 rc = map_err(dev.erase(offset as usize, size as usize)); in sim_flash_erase() 276 let mut buf: &mut[u8] = unsafe { slice::from_raw_parts_mut(dest, size as usize) }; in sim_flash_read() 278 rc = map_err(dev.read(offset as usize, &mut buf)); in sim_flash_read() 289 let buf: &[u8] = unsafe { slice::from_raw_parts(src, size as usize) }; in sim_flash_write() 291 rc = map_err(dev.write(offset as usize, &buf)); in sim_flash_write() 349 if image_index as usize >= counter_storage.storage.len() { in sim_set_nv_counter_for_image() 353 if counter_storage.storage[image_index as usize] > security_counter_value { in sim_set_nv_counter_for_image() 359 counter_storage.storage[image_index as usize] = security_counter_value; in sim_set_nv_counter_for_image() [all …]
|
/mcuboot-3.6.0/ |
D | LICENSE | 10 and distribution as defined by Sections 1 through 9 of this document. 36 Object form, made available under the License, as indicated by a 43 represent, as a whole, an original work of authorship. For the purposes 60 designated in writing by the copyright owner as "Not a Contribution." 76 (except as stated in this section) patent license to make, have made, 87 as of the date such litigation is filed. 106 (d) If the Work includes a "NOTICE" text file as part of its 112 as part of the Derivative Works; within the Source form or 119 or as an addendum to the NOTICE text from the Work, provided 121 as modifying the License. [all …]
|
D | CODE_OF_CONDUCT.md | 6 We as members, contributors, and leaders pledge to make participation in our 26 * Focusing on what is best not just for us as individuals, but for the 35 * Publishing others' private information, such as a physical or email 57 posting via an official social media account, or acting as an appointed 92 includes avoiding interactions in community spaces as well as external channels
|
/mcuboot-3.6.0/docs/ |
D | readme-mynewt.md | 4 when building an app that will be run with MCUboot as the bootloader and 6 must be added as a new dependency for this app. 34 Also, MCUboot uses a different image header struct as well as slightly 36 in this new format. That is done by passing the extra parameter `-2` as in: 46 for the connection profile, or specifying you connection string manually as in:
|
D | readme-mbed.md | 9 See https://github.com/AGlass0fMilk/mbed-mcuboot-demo as a detailed example. 19 More configurations such as signing algorithm, slot swapping, etc. can be found in [mbed_lib.json](… 23 You need to provide an instance of `mbed::BlockDevice` as the secondary slot. It can be any types o… 35 … default) and you have provided configurations and a secondary slot BlockDevice as explained above. 39 …as a _library only_ without a bootloader application. This is useful if your user application need… 41 As your application starts in the primary slots (instead of the beginning of the whole flash), you …
|
D | readme-zephyr.md | 3 MCUboot began its life as the bootloader for Mynewt. It has since 4 acquired the ability to be used as a bootloader for Zephyr as well. 27 MCUboot as your stage 1 bootloader, `boot_partition` must be configured 52 be made before building it. Most of this can be done as documented in 58 it as usual: 99 With this, build the application as your normally would. 126 the image to mark the primary slot as "image ok" before the next reboot, 169 from both slots, this section must be at least as big as the largest sector 208 and marked it as test/confirmed but MCUboot will not swap the images and 240 The mapping of image number to partition is as follows:
|
D | release-notes.md | 177 There are bug fixes, and associated imgtool updates as well. 202 - imgtool: added possibility to set confirm flag for hex files as well. 208 release. It was tested as of has 7a3b253ce. This version of MCUboot also 218 updates as well. 223 builds using the Cypress SDK, which has been added as submodules. 228 (which must be provided as part of the platform), as well as a SW 244 release. It was tested as of has 1a89ca1238. When Zephyr v2.3.0 is 253 ECIES with secp256r1 as an Elliptic Curve alternative to RSA-OAEP. A 270 can be added as decryption keys. Optionally can remove superfluous 351 - Add support for flash devices that read as '0' when erased. [all …]
|
D | PORTING.md | 8 * `MCUboot` requires a configuration file, which can be included as 24 From the perspective of the target OS, the bootloader can be seen as a library, 33 boot_rsp` pointer. The `struct boot_rsp` is defined as: 82 `struct flash_area` as they wish; the only restriction is that ID should be 136 The numbers, given above, are provided as an example and depend on system 140 flash characterized by `struct flash_area` objects is as follows: 174 …As of writing, it is possible that MCUboot will open a flash area multiple times simultaneously (t…
|
D | SECURITY.md | 37 Please include the word "SECURITY" as well as "MCUboot" in the subject 46 Vulnerability reports and published fixes will be reported as follows: 50 the interested parties (including the reporter) added as viewers.
|
D | readme-espressif.md | 4 or 3rd party frameworks as such as Zephyr-RTOS (`zephyrproject-rtos/hal_espressif/`) or NuttX RTOS 7 standalone build version means that ESP-IDF and its toolchain are used as source. For 3rd parties 46 3. If ESP-IDF is the chosen option for use as HAL layer and the system already have ESP-IDF 69 from NuttX RTOS environments also can be used for the bootloader standalone build, however as 108 *If using ESP-IDF as HAL layer source, `ESP_HAL_PATH` can be ommited.* 174 Default slot0 size is `0x100000`, but it can change as per application flash partitions. 176 For Zephyr images, `--pad-header` is not needed as it already has the padding for MCUboot 293 If signing a Zephyr image, the `--pad-header` is not needed, as it already have the padding for 397 Flash the bootloader as following, with `--after no_reset` flag, so you can reset the device only 425 the boot will proceed as following. [all …]
|
D | ecdsa.md | 61 always run out of the same tree as the MCUboot code, so there should 66 ECDSA signatures are encoded as ASN.1, notably with the signature 67 itself encoded as follows: 77 unsigned numbers that are being encoded in ASN.1 as signed values, if 90 variable length, and to make sure that we can handle them as such.
|
/mcuboot-3.6.0/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 9 with a minimal set of standard cryptography primitives, as listed below. To better 13 primitives, as mentioned in the list below. 89 the size of a platform-independent implementation, as presented in TinyCrypt. 116 side-channel countermeasures such as increasing the overall code size, 132 Note that conventional memory-comparison methods (such as memcmp function) 134 memory comparison function (such as compare_constant_time 140 be changed in future versions of the library as there are applications 150 * NIST SP 800-90A requires three items as seed material in the initialization 157 * The current implementation does not support other key-lengths (such as 256 158 bits). Note that if you need AES-256, it doesn't sound as though your [all …]
|
/mcuboot-3.6.0/boot/cypress/MCUBootApp/ |
D | README.md | 38 … Mbed TLS Library via shim layer. Implementation of this layer is supplied as separate submodule `… 73 As an example in a makefile it should look like following: 85 …. This could also be done on build time by passing `MCUBOOT_IMAGE_NUMBER=2` as parameter to `make`. 89 …on (two images are considered for simplicity) MCUboot Bootloader application operates as following: 120 Since this application is created to demonstrate MCUboot library features and not as reference exam… 124 2. `CY_SMIF_SLAVE_SELECT_0` is used as definition SMIF driver API. This configuration is used on ev… 158 …ied. The ECDH/HKDF with EC256 scheme is used in a given solution as well as Mbed TLS as a crypto p… 220 This will iherit system's PATH so should find `python3.7` installed in regular way as well as imgto…
|
/mcuboot-3.6.0/boot/zephyr/ |
D | Kconfig.serial_recovery | 36 the "zephyr,uart-mcumgr" points to the same device as 57 The mapping of image number to partition is as follows: 58 0 -> default behaviour, same as 1; 103 If enabled, flash is erased as necessary when receiving new firmware, 118 and above, as defined within mcumgr library. 149 Useful for powering on when using the same button as 203 state command can be used to mark an image as test/confirmed.
|
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/ |
D | ccm_mode.h | 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 56 * implementation accepts any even integer between 4 and 16, as 60 * security suggestions, such as: it is recommended for most 136 * @note: The sequence b for encryption is formatted as follows: 145 * @note: The sequence b for authentication is formatted as follows: 152 * 3-5 bits: mac length (encoded as: (mlen-2)/2) 182 * @note: The sequence b for encryption is formatted as follows: 191 * @note: The sequence b for authentication is formatted as follows: 198 * 3-5 bits: mac length (encoded as: (mlen-2)/2)
|
D | ecc_dh.h | 17 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 46 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 86 * @param p_private_key OUT -- Will be filled in with the private key. Must be as 87 * long as the curve order (for secp256r1, p_private_key must be 32 bytes long). 115 * the same size as the curve size (for curve secp256r1, secret must be 32 bytes 120 * @warning It is recommended to use the output of uECC_shared_secret() as the
|
/mcuboot-3.6.0/boot/bootutil/include/bootutil/ |
D | bench.h | 13 * distributed under the License is distributed on an "AS IS" BASIS, 28 * benchmark. This is generally something small, such as an integer 53 /* The type needs to take space. As long as it remains unused, the C
|
/mcuboot-3.6.0/boot/cypress/ |
D | README.md | 5 …ces. These applications are not recomended as a starting point for development and should not be c… 42 Those are represented as submodules. 83 This will inherit system's PATH so should find `python3.7` installed in regular way as well as imgt…
|
/mcuboot-3.6.0/scripts/ |
D | assemble.py | 14 # distributed under the License is distributed on an "AS IS" BASIS, 50 except OSError as e: 84 with open(self.output, 'ab') as ofd: 92 with open(source, 'rb') as rfd: 100 with open(dot_config, "r") as f: 136 with open(edt_pickle, 'rb') as f:
|