Home
last modified time | relevance | path

Searched full:key (Results 1 – 25 of 151) sorted by relevance

1234567

/mcuboot-3.6.0/boot/cypress/MCUBootApp/
DMCUBootApp_CM0P_Debug.launch3 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doContinue" value="false"/>
4 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doDebugInRam" value="false"/>
5 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doFirstReset" value="true"/>
6 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateConsole" value="t…
7 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateTelnetConsole" va…
8 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doSecondReset" value="false"/>
9 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbCLient" value="true"/>
10 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbServer" value="true"/>
11 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.enableSemihosting" value="true"/>
12 <stringAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.firstResetType" value="init"/>
[all …]
/mcuboot-3.6.0/boot/cypress/BlinkyApp/
DBlinkyApp_CM4_Debug.launch3 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doContinue" value="false"/>
4 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doDebugInRam" value="false"/>
5 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doFirstReset" value="true"/>
6 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateConsole" value="t…
7 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateTelnetConsole" va…
8 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doSecondReset" value="false"/>
9 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbCLient" value="true"/>
10 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbServer" value="true"/>
11 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.enableSemihosting" value="true"/>
12 <stringAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.firstResetType" value="init"/>
[all …]
/mcuboot-3.6.0/scripts/imgtool/keys/
Decdsa.py2 ECDSA key management
24 Wrapper around an ECDSA public key.
26 def __init__(self, key): argument
27 self.key = key
30 raise ECDSAUsageError("Operation {} requires private key".format(name))
33 return self.key
36 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format
53 """Write the public key to the given file."""
63 Wrapper around an ECDSA private key.
65 def __init__(self, key): argument
[all …]
Ded25519.py2 ED25519 key management
19 def __init__(self, key): argument
20 self.key = key
26 raise Ed25519UsageError("Operation {} requires private key".format(name))
29 return self.key
32 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format
44 """Write the public key to the given file."""
62 k = self.key
63 if isinstance(self.key, ed25519.Ed25519PrivateKey):
64 k = self.key.public_key()
[all …]
Dx25519.py2 X25519 key management
20 def __init__(self, key): argument
21 self.key = key
27 raise X25519UsageError("Operation {} requires private key".format(name))
30 return self.key
33 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format
50 """Write the public key to the given file."""
69 Wrapper around an X25519 private key.
72 def __init__(self, key): argument
73 """key should be an instance of EllipticCurvePrivateKey"""
[all …]
Drsa.py2 RSA Key management
26 """The public key can only do a few operations"""
27 def __init__(self, key): argument
28 self.key = key
31 return self.key.key_size
37 raise RSAUsageError("Operation {} requires private key".format(name))
40 return self.key
43 # The key embedded into MCUboot is in PKCS1 format.
60 """Write the public key to the given file."""
77 k = self.key
[all …]
D__init__.py19 Cryptographic key management for imgtool.
41 """Raised to indicate that the key is password protected, but a
47 """Try loading a key from the given path.
60 if "private key is encrypted" in msg:
64 # This seems to happen if the key is a public key, let's try
65 # loading it as a public key.
72 raise Exception("Unsupported RSA key size: " + pk.key_size)
76 raise Exception("Unsupported RSA key size: " + pk.key_size)
105 raise Exception("Unknown key type: " + str(type(pk)))
Drsa_test.py37 # Try generating a RSA key with non-supported size
46 # Try loading the key without a password.
55 # We should be able to export the public key from the loaded
56 # public key, but not the private key.
76 """Basic sanity check on the code emitters, from public key."""
101 k.key.public_key().verify(
109 k.key.public_key().verify,
/mcuboot-3.6.0/docs/
Dencrypted_images.md31 a TLV with the key must be present in the image. When upgrading the
47 Since decrypting requires a private key (or secret if using symmetric
49 device manufacturer to guarantee that this key is already in the device
68 The key used is a randomized when creating a new image, by `imgtool` or
69 `newt`. This key should never be reused and no checks are done for this,
73 To distribute this AES-CTR key, new TLVs were defined. The key can be
75 AES-CTR key length), ECIES-P256 or ECIES-X25519.
81 are the results of applying the given operations over the AES-CTR key.
85 ECIES follows a well defined protocol to generate an encryption key. There are
88 libraries. The whole key encryption can be summarized as:
[all …]
Dimgtool.md20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used
23 This key file is what is used to sign images, this file should be
28 time you use the private key.
30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code)
32 There is a development key distributed with MCUboot that can be used
33 for testing. Since this private key is widely distributed, it should
35 key, as described above, you should replace the public key in the
40 the key file.
44 will extract the public key from the given private key file, and
46 into the key file. However, when the `MCUBOOT_HW_KEY` config option is
[all …]
Dsigned_images.md28 The public key of this keypair must be included in the bootloader,
36 For an alternative solution when the public key(s) doesn't need to be
45 This created a file which contains both the private and public key,
48 Then you need to extract the public key from this to include it
49 in the bootloader. Bootloader need to keep key parsing minimal,
50 so it expects simple key format.
54 Now the public key is in file called image_sign_pub.der.
60 ## Creating a key package
64 Then you need to create a package containing this key, or keys.
82 .key = image_sign_pub_der,
[all …]
/mcuboot-3.6.0/ext/mbedtls-asn1/include/mbedtls/
Dpk.h4 * \brief Public Key abstraction layer
53 …_ERR_PK_TYPE_MISMATCH -0x3F00 /**< Type mismatch, eg attempt to encrypt with an ECDSA key */
56 #define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80 /**< Unsupported key version */
57 #define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT -0x3D00 /**< Invalid key tag or value. */
58 #define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG -0x3C80 /**< Key algorithm is unsupported (only RSA and…
59 #define MBEDTLS_ERR_PK_PASSWORD_REQUIRED -0x3C00 /**< Private key password can't be empty. */
60 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80 /**< Given private key password does not allow …
64 …TLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980 /**< Unavailable feature, e.g. RSA disabled for RSA key. */
73 * \brief Public key types
173 * \brief Public key information and operations
[all …]
/mcuboot-3.6.0/scripts/imgtool/
Dmain.py91 key = keys.load(keyfile)
92 if key is not None:
93 return key
94 passwd = getpass.getpass("Enter key passphrase: ").encode('utf-8')
100 passwd = getpass.getpass("Enter key passphrase: ")
112 help='Prompt for password to protect key')
116 @click.option('-k', '--key', metavar='filename', required=True)
118 def keygen(type, key, password): argument
120 keygens[type](key, password)
131 @click.option('-k', '--key', metavar='filename', required=True)
[all …]
/mcuboot-3.6.0/boot/boot_serial/src/
Dzcbor_bulk.h24 struct zcbor_string key; /* Map key string */ member
25 zcbor_decoder_t *decoder; /* Key corresponding decoder */
30 /** @brief Define single key-decoder mapping
34 * @param k key is "" enclosed string representing key;
51 /** @brief Define single key-value decode mapping
59 * @param k key; the @p k will be stringified so should be given
70 /** @brief Decodes single level map according to a provided key-decode map.
72 * The function takes @p map of key to decoder array defined as:
80 * where "key?" is string representing key; the decode_fun? is
83 * a given key will place a decoded value - they have to agree in type
[all …]
Dzcbor_bulk.c26 struct zcbor_string key; in zcbor_map_decode_bulk() local
30 ok = zcbor_tstr_decode(zsd, &key); in zcbor_map_decode_bulk()
37 if (key.len == dptr->key.len && in zcbor_map_decode_bulk()
38 memcmp(key.value, dptr->key.value, key.len) == 0) { in zcbor_map_decode_bulk()
44 /* Failure to decode value matched to key in zcbor_map_decode_bulk()
/mcuboot-3.6.0/ext/tinycrypt/lib/source/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
44 key[i] = inner_pad ^ new_key[i]; in rekey()
45 key[i + TC_SHA256_BLOCK_SIZE] = outer_pad ^ new_key[i]; in rekey()
48 key[i] = inner_pad; key[i + TC_SHA256_BLOCK_SIZE] = outer_pad; in rekey()
52 int tc_hmac_set_key(TCHmacState_t ctx, const uint8_t *key, in tc_hmac_set_key() argument
58 key == (const uint8_t *) 0 || in tc_hmac_set_key()
78 (void)tc_sha256_final(&dummy_state.key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key()
82 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
86 (void)tc_sha256_final(&ctx->key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key()
[all …]
Dhmac_prng.c83 /* use current state, e and separator 0 to compute a new prng key: */ in update()
88 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update()
89 /* configure the new prng key into the prng's instance of hmac */ in update()
90 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update()
92 /* use the new key to compute a new state variable v */ in update()
97 /* use current state, e and separator 1 to compute a new prng key: */ in update()
102 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update()
103 /* configure the new prng key into the prng's instance of hmac */ in update()
104 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update()
106 /* use the new key to compute a new state variable v */ in update()
[all …]
/mcuboot-3.6.0/boot/espressif/hal/src/
Dsecure_boot.c51 /* Generates the public key digests of the valid public keys in an image's
52 signature block, verifies each signature, and stores the key digests in the
57 @param[out] public_key_digests Pointer to structure to hold the key digests for valid sig blocks
64 … if there's a valid signature block that doesn't verify using the included public key (unexpected!)
73 …ESP_LOGD(TAG, "calculating public key digests for sig blocks of image offset 0x%x (sig block offse… in s_calculate_image_public_key_digests()
100 /* Generating the SHA of the public key components in the signature block */ in s_calculate_image_public_key_digests()
104 bootloader_sha256_data(sig_block_sha, &block->key, sizeof(block->key)); in s_calculate_image_public_key_digests()
106 bootloader_sha256_data(sig_block_sha, &block->ecdsa.key, sizeof(block->ecdsa.key)); in s_calculate_image_public_key_digests()
110 // Check we can verify the image using this signature and this key in s_calculate_image_public_key_digests()
113 …bool verified = ets_rsa_pss_verify(&block->key, block->signature, image_digest, temp_verified_dige… in s_calculate_image_public_key_digests()
[all …]
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/
Dhmac.h41 * transformation specified by a key in an arbitrary length data
44 * Security: The security of the HMAC depends on the length of the key and
51 * Usage: 1) call tc_hmac_set_key to set the HMAC key.
75 /* HMAC key schedule */
76 uint8_t key[2*TC_SHA256_BLOCK_SIZE]; member
81 * @brief HMAC set key procedure
82 * Configures ctx to use key
86 * key == NULL or
89 * @param key IN -- the HMAC key to configure
90 * @param key_size IN -- the HMAC key size
[all …]
Daes.h39 * perform a transformation specified by a symmetric key in fixed-
44 * Usage: 1) call tc_aes128_set_encrypt/decrypt_key to set the key.
59 #define Nk (4) /* number of 32-bit words comprising the key */
69 * @brief Set AES-128 encryption key
70 * Uses key k to initialize s
75 * AES-256 key schedule -- see FIPS 197 for details
77 * @param k IN -- points to the AES key
83 * Encrypts contents of in buffer into out buffer under key;
91 * @param s IN -- initialized AES key schedule
97 * @brief Set the AES-128 decryption key
[all …]
Dcmac_mode.h49 * generate the tags him/herself without knowing the MAC key. In this
56 * tc_cmac_setup (allowing a new key to be set), as suggested in
65 * correctly. Like all symmetric key operations, it is session
69 * tc_cmac_struct with encryption key and buffer. Our implementation
70 * always assume that the AES key to be the same size as the block
74 * Once the state has been setup with a key, computing the CMAC of
90 * have to change the key.
92 * Once you are done computing CMAC with a key, it is a good idea to
93 * destroy the state so an attacker cannot recover the key; use
121 /* identifies the encryption key */
[all …]
Decc_dh.h79 * @brief Create a public/private key pair.
80 * @return returns TC_CRYPTO_SUCCESS (1) if the key pair was generated successfully
81 * returns TC_CRYPTO_FAIL (0) if error while generating key pair
83 * @param p_public_key OUT -- Will be filled in with the public key. Must be at
86 * @param p_private_key OUT -- Will be filled in with the private key. Must be as
99 * @brief Create a public/private key pair given a specific d.
109 * @brief Compute a shared secret given your secret key and someone else's
110 * public key.
117 * @param p_public_key IN -- The public key of the remote party.
118 * @param p_private_key IN -- Your private key.
[all …]
/mcuboot-3.6.0/boot/zephyr/
Dkeys.c25 * use Kconfig symbols for key types, and have to rely on the MCUBoot
48 * key file. If no key file was configured, the array and length must be
55 .key = rsa_pub_key,
58 .key = ecdsa_pub_key,
61 .key = ed25519_pub_key,
72 .key = 0,
83 .key = enc_priv_key,
/mcuboot-3.6.0/boot/espressif/
Dkeys.c27 * key file. If no key file was configured, the array and length must be
34 .key = rsa_pub_key,
37 .key = ecdsa_pub_key,
40 .key = ed25519_pub_key,
51 .key = 0,
/mcuboot-3.6.0/boot/bootutil/src/
Dimage_validate.c211 const struct bootutil_key *key; in bootutil_find_key() local
219 key = &bootutil_keys[i]; in bootutil_find_key()
221 bootutil_sha_update(&sha_ctx, key->key, *key->len); in bootutil_find_key()
234 bootutil_find_key(uint8_t image_index, uint8_t *key, uint16_t key_len) in bootutil_find_key() argument
244 bootutil_sha_update(&sha_ctx, key, key_len); in bootutil_find_key()
254 * - Image is signed with an arbitrary key and the corresponding public in bootutil_find_key()
255 * key is added as a TLV field. in bootutil_find_key()
256 * - During public key validation (comparing against key-hash read from in bootutil_find_key()
257 * HW) a fault is injected to accept the public key as valid one. in bootutil_find_key()
261 bootutil_keys[0].key = key; in bootutil_find_key()
[all …]

1234567