Home
last modified time | relevance | path

Searched full:as (Results 1 – 25 of 406) sorted by relevance

12345678910>>...17

/mcuboot-3.6.0/sim/src/
Dtlv.rs193 TlvFlags::ENCRYPTED_AES256 as u32 in new_enc_rsa()
195 TlvFlags::ENCRYPTED_AES128 as u32 in new_enc_rsa()
207 TlvFlags::ENCRYPTED_AES256 as u32 in new_sig_enc_rsa()
209 TlvFlags::ENCRYPTED_AES128 as u32 in new_sig_enc_rsa()
221 TlvFlags::ENCRYPTED_AES256 as u32 in new_enc_kw()
223 TlvFlags::ENCRYPTED_AES128 as u32 in new_enc_kw()
235 TlvFlags::ENCRYPTED_AES256 as u32 in new_rsa_kw()
237 TlvFlags::ENCRYPTED_AES128 as u32 in new_rsa_kw()
249 TlvFlags::ENCRYPTED_AES256 as u32 in new_ecdsa_kw()
251 TlvFlags::ENCRYPTED_AES128 as u32 in new_ecdsa_kw()
[all …]
Ddepends.rs46 ImageVersion::new_synthetic(self.number as u8, slot as u8, 0) in my_version()
108 /// A "test" with no dependency information, and the images marked as a
144 ImageVersion::new_synthetic(self.number as u8, slot as u8, 0) in my_version()
157 ImageVersion::new_synthetic(self.other_id(), slot as u8, 0) in my_deps()
163 ImageVersion::new_synthetic(self.other_id(), slot as u8, 1) in my_deps()
170 (1 - self.number) as u8 in other_id()
184 build_num: slot as u32, in new_synthetic()
Dimage.rs181 base_off: primary_base as usize, in new()
183 len: primary_len as usize, in new()
190 base_off: secondary_base as usize, in new()
192 len: secondary_len as usize, in new()
440 // The flash layout as described is not present in any real STM32F4 device, but it in make_device()
442 // as long as they are compatible in both slots and all fit in the scratch. in make_device()
447 align as usize, erased_val); in make_device()
461 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device()
477 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device()
493 let dev = SimFlash::new(vec![4096; 128], align as usize, erased_val); in make_device()
[all …]
/mcuboot-3.6.0/sim/mcuboot-sys/src/
Dc.rs80 Some(ref c) => **c as libc::c_int in boot_go()
94 None => raw::invoke_boot_go(&mut sim_ctx as *mut _, in boot_go()
95 &areadesc.get_c() as *const _, in boot_go()
96 &mut rsp as *mut _, -1) as i32, in boot_go()
97 Some(i) => raw::invoke_boot_go(&mut sim_ctx as *mut _, in boot_go()
98 &areadesc.get_c() as *const _, in boot_go()
99 &mut rsp as *mut _, in boot_go()
100 i as i32) as i32 in boot_go()
126 unsafe { raw::boot_magic_sz() as usize } in boot_magic_sz()
130 unsafe { raw::boot_max_align() as usize } in boot_max_align()
[all …]
Darea.rs38 let nid = id as usize; in add_image()
70 off: sector.base as u32, in add_image()
71 size: sector.size as u32, in add_image()
87 off: orig_base as u32, in add_image()
88 size: orig_len as u32, in add_image()
92 // Add a simple slot to the image. This ignores the device layout, and just adds the area as a
101 off: base as u32, in add_simple_image()
102 size: len as u32, in add_simple_image()
110 off: base as u32, in add_simple_image()
111 size: len as u32, in add_simple_image()
[all …]
Dlib.rs25 ram: vec![0; size as usize], in new()
45 size: self.ram.len() as u32, in invoke()
46 base: &self.ram[0] as *const u8 as usize - self.offset as usize, in invoke()
Dapi.rs172 align: dev.align() as u32, in set_flash()
178 dev_id, FlashPtr{ptr: dev as *mut dyn Flash}); in set_flash()
265 rc = map_err(dev.erase(offset as usize, size as usize)); in sim_flash_erase()
276 let mut buf: &mut[u8] = unsafe { slice::from_raw_parts_mut(dest, size as usize) }; in sim_flash_read()
278 rc = map_err(dev.read(offset as usize, &mut buf)); in sim_flash_read()
289 let buf: &[u8] = unsafe { slice::from_raw_parts(src, size as usize) }; in sim_flash_write()
291 rc = map_err(dev.write(offset as usize, &buf)); in sim_flash_write()
349 if image_index as usize >= counter_storage.storage.len() { in sim_set_nv_counter_for_image()
353 if counter_storage.storage[image_index as usize] > security_counter_value { in sim_set_nv_counter_for_image()
359 counter_storage.storage[image_index as usize] = security_counter_value; in sim_set_nv_counter_for_image()
[all …]
/mcuboot-3.6.0/
DLICENSE10 and distribution as defined by Sections 1 through 9 of this document.
36 Object form, made available under the License, as indicated by a
43 represent, as a whole, an original work of authorship. For the purposes
60 designated in writing by the copyright owner as "Not a Contribution."
76 (except as stated in this section) patent license to make, have made,
87 as of the date such litigation is filed.
106 (d) If the Work includes a "NOTICE" text file as part of its
112 as part of the Derivative Works; within the Source form or
119 or as an addendum to the NOTICE text from the Work, provided
121 as modifying the License.
[all …]
DCODE_OF_CONDUCT.md6 We as members, contributors, and leaders pledge to make participation in our
26 * Focusing on what is best not just for us as individuals, but for the
35 * Publishing others' private information, such as a physical or email
57 posting via an official social media account, or acting as an appointed
92 includes avoiding interactions in community spaces as well as external channels
/mcuboot-3.6.0/docs/
Dreadme-mynewt.md4 when building an app that will be run with MCUboot as the bootloader and
6 must be added as a new dependency for this app.
34 Also, MCUboot uses a different image header struct as well as slightly
36 in this new format. That is done by passing the extra parameter `-2` as in:
46 for the connection profile, or specifying you connection string manually as in:
Dreadme-mbed.md9 See https://github.com/AGlass0fMilk/mbed-mcuboot-demo as a detailed example.
19 More configurations such as signing algorithm, slot swapping, etc. can be found in [mbed_lib.json](…
23 You need to provide an instance of `mbed::BlockDevice` as the secondary slot. It can be any types o…
35 … default) and you have provided configurations and a secondary slot BlockDevice as explained above.
39as a _library only_ without a bootloader application. This is useful if your user application need…
41 As your application starts in the primary slots (instead of the beginning of the whole flash), you …
Dreadme-zephyr.md3 MCUboot began its life as the bootloader for Mynewt. It has since
4 acquired the ability to be used as a bootloader for Zephyr as well.
27 MCUboot as your stage 1 bootloader, `boot_partition` must be configured
52 be made before building it. Most of this can be done as documented in
58 it as usual:
99 With this, build the application as your normally would.
126 the image to mark the primary slot as "image ok" before the next reboot,
169 from both slots, this section must be at least as big as the largest sector
208 and marked it as test/confirmed but MCUboot will not swap the images and
240 The mapping of image number to partition is as follows:
Drelease-notes.md177 There are bug fixes, and associated imgtool updates as well.
202 - imgtool: added possibility to set confirm flag for hex files as well.
208 release. It was tested as of has 7a3b253ce. This version of MCUboot also
218 updates as well.
223 builds using the Cypress SDK, which has been added as submodules.
228 (which must be provided as part of the platform), as well as a SW
244 release. It was tested as of has 1a89ca1238. When Zephyr v2.3.0 is
253 ECIES with secp256r1 as an Elliptic Curve alternative to RSA-OAEP. A
270 can be added as decryption keys. Optionally can remove superfluous
351 - Add support for flash devices that read as '0' when erased.
[all …]
DPORTING.md8 * `MCUboot` requires a configuration file, which can be included as
24 From the perspective of the target OS, the bootloader can be seen as a library,
33 boot_rsp` pointer. The `struct boot_rsp` is defined as:
82 `struct flash_area` as they wish; the only restriction is that ID should be
136 The numbers, given above, are provided as an example and depend on system
140 flash characterized by `struct flash_area` objects is as follows:
174As of writing, it is possible that MCUboot will open a flash area multiple times simultaneously (t…
DSECURITY.md37 Please include the word "SECURITY" as well as "MCUboot" in the subject
46 Vulnerability reports and published fixes will be reported as follows:
50 the interested parties (including the reporter) added as viewers.
Dreadme-espressif.md4 or 3rd party frameworks as such as Zephyr-RTOS (`zephyrproject-rtos/hal_espressif/`) or NuttX RTOS
7 standalone build version means that ESP-IDF and its toolchain are used as source. For 3rd parties
46 3. If ESP-IDF is the chosen option for use as HAL layer and the system already have ESP-IDF
69 from NuttX RTOS environments also can be used for the bootloader standalone build, however as
108 *If using ESP-IDF as HAL layer source, `ESP_HAL_PATH` can be ommited.*
174 Default slot0 size is `0x100000`, but it can change as per application flash partitions.
176 For Zephyr images, `--pad-header` is not needed as it already has the padding for MCUboot
293 If signing a Zephyr image, the `--pad-header` is not needed, as it already have the padding for
397 Flash the bootloader as following, with `--after no_reset` flag, so you can reset the device only
425 the boot will proceed as following.
[all …]
Decdsa.md61 always run out of the same tree as the MCUboot code, so there should
66 ECDSA signatures are encoded as ASN.1, notably with the signature
67 itself encoded as follows:
77 unsigned numbers that are being encoded in ASN.1 as signed values, if
90 variable length, and to make sure that we can handle them as such.
/mcuboot-3.6.0/ext/tinycrypt/documentation/
Dtinycrypt.rst9 with a minimal set of standard cryptography primitives, as listed below. To better
13 primitives, as mentioned in the list below.
89 the size of a platform-independent implementation, as presented in TinyCrypt.
116 side-channel countermeasures such as increasing the overall code size,
132 Note that conventional memory-comparison methods (such as memcmp function)
134 memory comparison function (such as compare_constant_time
140 be changed in future versions of the library as there are applications
150 * NIST SP 800-90A requires three items as seed material in the initialization
157 * The current implementation does not support other key-lengths (such as 256
158 bits). Note that if you need AES-256, it doesn't sound as though your
[all …]
/mcuboot-3.6.0/boot/cypress/MCUBootApp/
DREADME.md38 … Mbed TLS Library via shim layer. Implementation of this layer is supplied as separate submodule `…
73 As an example in a makefile it should look like following:
85 …. This could also be done on build time by passing `MCUBOOT_IMAGE_NUMBER=2` as parameter to `make`.
89 …on (two images are considered for simplicity) MCUboot Bootloader application operates as following:
120 Since this application is created to demonstrate MCUboot library features and not as reference exam…
124 2. `CY_SMIF_SLAVE_SELECT_0` is used as definition SMIF driver API. This configuration is used on ev…
158 …ied. The ECDH/HKDF with EC256 scheme is used in a given solution as well as Mbed TLS as a crypto p…
220 This will iherit system's PATH so should find `python3.7` installed in regular way as well as imgto…
/mcuboot-3.6.0/boot/zephyr/
DKconfig.serial_recovery36 the "zephyr,uart-mcumgr" points to the same device as
57 The mapping of image number to partition is as follows:
58 0 -> default behaviour, same as 1;
103 If enabled, flash is erased as necessary when receiving new firmware,
118 and above, as defined within mcumgr library.
149 Useful for powering on when using the same button as
203 state command can be used to mark an image as test/confirmed.
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/
Dccm_mode.h20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
56 * implementation accepts any even integer between 4 and 16, as
60 * security suggestions, such as: it is recommended for most
136 * @note: The sequence b for encryption is formatted as follows:
145 * @note: The sequence b for authentication is formatted as follows:
152 * 3-5 bits: mac length (encoded as: (mlen-2)/2)
182 * @note: The sequence b for encryption is formatted as follows:
191 * @note: The sequence b for authentication is formatted as follows:
198 * 3-5 bits: mac length (encoded as: (mlen-2)/2)
Decc_dh.h17 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
46 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
86 * @param p_private_key OUT -- Will be filled in with the private key. Must be as
87 * long as the curve order (for secp256r1, p_private_key must be 32 bytes long).
115 * the same size as the curve size (for curve secp256r1, secret must be 32 bytes
120 * @warning It is recommended to use the output of uECC_shared_secret() as the
/mcuboot-3.6.0/boot/bootutil/include/bootutil/
Dbench.h13 * distributed under the License is distributed on an "AS IS" BASIS,
28 * benchmark. This is generally something small, such as an integer
53 /* The type needs to take space. As long as it remains unused, the C
/mcuboot-3.6.0/boot/cypress/
DREADME.md5 …ces. These applications are not recomended as a starting point for development and should not be c…
42 Those are represented as submodules.
83 This will inherit system's PATH so should find `python3.7` installed in regular way as well as imgt…
/mcuboot-3.6.0/scripts/
Dassemble.py14 # distributed under the License is distributed on an "AS IS" BASIS,
50 except OSError as e:
84 with open(self.output, 'ab') as ofd:
92 with open(source, 'rb') as rfd:
100 with open(dot_config, "r") as f:
136 with open(edt_pickle, 'rb') as f:

12345678910>>...17