/mcuboot-3.6.0/boot/cypress/MCUBootApp/ |
D | MCUBootApp_CM0P_Debug.launch | 3 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doContinue" value="false"/> 4 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doDebugInRam" value="false"/> 5 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doFirstReset" value="true"/> 6 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateConsole" value="t… 7 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateTelnetConsole" va… 8 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doSecondReset" value="false"/> 9 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbCLient" value="true"/> 10 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbServer" value="true"/> 11 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.enableSemihosting" value="true"/> 12 <stringAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.firstResetType" value="init"/> [all …]
|
/mcuboot-3.6.0/boot/cypress/BlinkyApp/ |
D | BlinkyApp_CM4_Debug.launch | 3 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doContinue" value="false"/> 4 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doDebugInRam" value="false"/> 5 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doFirstReset" value="true"/> 6 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateConsole" value="t… 7 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doGdbServerAllocateTelnetConsole" va… 8 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doSecondReset" value="false"/> 9 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbCLient" value="true"/> 10 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.doStartGdbServer" value="true"/> 11 <booleanAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.enableSemihosting" value="true"/> 12 <stringAttribute key="ilg.gnumcueclipse.debug.gdbjtag.openocd.firstResetType" value="init"/> [all …]
|
/mcuboot-3.6.0/scripts/imgtool/keys/ |
D | ecdsa.py | 2 ECDSA key management 24 Wrapper around an ECDSA public key. 26 def __init__(self, key): argument 27 self.key = key 30 raise ECDSAUsageError("Operation {} requires private key".format(name)) 33 return self.key 36 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format 53 """Write the public key to the given file.""" 63 Wrapper around an ECDSA private key. 65 def __init__(self, key): argument [all …]
|
D | ed25519.py | 2 ED25519 key management 19 def __init__(self, key): argument 20 self.key = key 26 raise Ed25519UsageError("Operation {} requires private key".format(name)) 29 return self.key 32 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format 44 """Write the public key to the given file.""" 62 k = self.key 63 if isinstance(self.key, ed25519.Ed25519PrivateKey): 64 k = self.key.public_key() [all …]
|
D | x25519.py | 2 X25519 key management 20 def __init__(self, key): argument 21 self.key = key 27 raise X25519UsageError("Operation {} requires private key".format(name)) 30 return self.key 33 # The key is embedded into MBUboot in "SubjectPublicKeyInfo" format 50 """Write the public key to the given file.""" 69 Wrapper around an X25519 private key. 72 def __init__(self, key): argument 73 """key should be an instance of EllipticCurvePrivateKey""" [all …]
|
D | rsa.py | 2 RSA Key management 26 """The public key can only do a few operations""" 27 def __init__(self, key): argument 28 self.key = key 31 return self.key.key_size 37 raise RSAUsageError("Operation {} requires private key".format(name)) 40 return self.key 43 # The key embedded into MCUboot is in PKCS1 format. 60 """Write the public key to the given file.""" 77 k = self.key [all …]
|
D | __init__.py | 19 Cryptographic key management for imgtool. 41 """Raised to indicate that the key is password protected, but a 47 """Try loading a key from the given path. 60 if "private key is encrypted" in msg: 64 # This seems to happen if the key is a public key, let's try 65 # loading it as a public key. 72 raise Exception("Unsupported RSA key size: " + pk.key_size) 76 raise Exception("Unsupported RSA key size: " + pk.key_size) 105 raise Exception("Unknown key type: " + str(type(pk)))
|
D | rsa_test.py | 37 # Try generating a RSA key with non-supported size 46 # Try loading the key without a password. 55 # We should be able to export the public key from the loaded 56 # public key, but not the private key. 76 """Basic sanity check on the code emitters, from public key.""" 101 k.key.public_key().verify( 109 k.key.public_key().verify,
|
/mcuboot-3.6.0/docs/ |
D | encrypted_images.md | 31 a TLV with the key must be present in the image. When upgrading the 47 Since decrypting requires a private key (or secret if using symmetric 49 device manufacturer to guarantee that this key is already in the device 68 The key used is a randomized when creating a new image, by `imgtool` or 69 `newt`. This key should never be reused and no checks are done for this, 73 To distribute this AES-CTR key, new TLVs were defined. The key can be 75 AES-CTR key length), ECIES-P256 or ECIES-X25519. 81 are the results of applying the given operations over the AES-CTR key. 85 ECIES follows a well defined protocol to generate an encryption key. There are 88 libraries. The whole key encryption can be summarized as: [all …]
|
D | imgtool.md | 20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used 23 This key file is what is used to sign images, this file should be 28 time you use the private key. 30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code) 32 There is a development key distributed with MCUboot that can be used 33 for testing. Since this private key is widely distributed, it should 35 key, as described above, you should replace the public key in the 40 the key file. 44 will extract the public key from the given private key file, and 46 into the key file. However, when the `MCUBOOT_HW_KEY` config option is [all …]
|
D | signed_images.md | 28 The public key of this keypair must be included in the bootloader, 36 For an alternative solution when the public key(s) doesn't need to be 45 This created a file which contains both the private and public key, 48 Then you need to extract the public key from this to include it 49 in the bootloader. Bootloader need to keep key parsing minimal, 50 so it expects simple key format. 54 Now the public key is in file called image_sign_pub.der. 60 ## Creating a key package 64 Then you need to create a package containing this key, or keys. 82 .key = image_sign_pub_der, [all …]
|
/mcuboot-3.6.0/ext/mbedtls-asn1/include/mbedtls/ |
D | pk.h | 4 * \brief Public Key abstraction layer 53 …_ERR_PK_TYPE_MISMATCH -0x3F00 /**< Type mismatch, eg attempt to encrypt with an ECDSA key */ 56 #define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80 /**< Unsupported key version */ 57 #define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT -0x3D00 /**< Invalid key tag or value. */ 58 #define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG -0x3C80 /**< Key algorithm is unsupported (only RSA and… 59 #define MBEDTLS_ERR_PK_PASSWORD_REQUIRED -0x3C00 /**< Private key password can't be empty. */ 60 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80 /**< Given private key password does not allow … 64 …TLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980 /**< Unavailable feature, e.g. RSA disabled for RSA key. */ 73 * \brief Public key types 173 * \brief Public key information and operations [all …]
|
/mcuboot-3.6.0/scripts/imgtool/ |
D | main.py | 91 key = keys.load(keyfile) 92 if key is not None: 93 return key 94 passwd = getpass.getpass("Enter key passphrase: ").encode('utf-8') 100 passwd = getpass.getpass("Enter key passphrase: ") 112 help='Prompt for password to protect key') 116 @click.option('-k', '--key', metavar='filename', required=True) 118 def keygen(type, key, password): argument 120 keygens[type](key, password) 131 @click.option('-k', '--key', metavar='filename', required=True) [all …]
|
/mcuboot-3.6.0/boot/boot_serial/src/ |
D | zcbor_bulk.h | 24 struct zcbor_string key; /* Map key string */ member 25 zcbor_decoder_t *decoder; /* Key corresponding decoder */ 30 /** @brief Define single key-decoder mapping 34 * @param k key is "" enclosed string representing key; 51 /** @brief Define single key-value decode mapping 59 * @param k key; the @p k will be stringified so should be given 70 /** @brief Decodes single level map according to a provided key-decode map. 72 * The function takes @p map of key to decoder array defined as: 80 * where "key?" is string representing key; the decode_fun? is 83 * a given key will place a decoded value - they have to agree in type [all …]
|
D | zcbor_bulk.c | 26 struct zcbor_string key; in zcbor_map_decode_bulk() local 30 ok = zcbor_tstr_decode(zsd, &key); in zcbor_map_decode_bulk() 37 if (key.len == dptr->key.len && in zcbor_map_decode_bulk() 38 memcmp(key.value, dptr->key.value, key.len) == 0) { in zcbor_map_decode_bulk() 44 /* Failure to decode value matched to key in zcbor_map_decode_bulk()
|
/mcuboot-3.6.0/ext/tinycrypt/lib/source/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 44 key[i] = inner_pad ^ new_key[i]; in rekey() 45 key[i + TC_SHA256_BLOCK_SIZE] = outer_pad ^ new_key[i]; in rekey() 48 key[i] = inner_pad; key[i + TC_SHA256_BLOCK_SIZE] = outer_pad; in rekey() 52 int tc_hmac_set_key(TCHmacState_t ctx, const uint8_t *key, in tc_hmac_set_key() argument 58 key == (const uint8_t *) 0 || in tc_hmac_set_key() 78 (void)tc_sha256_final(&dummy_state.key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key() 82 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key() 86 (void)tc_sha256_final(&ctx->key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key() [all …]
|
D | hmac_prng.c | 83 /* use current state, e and separator 0 to compute a new prng key: */ in update() 88 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update() 89 /* configure the new prng key into the prng's instance of hmac */ in update() 90 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update() 92 /* use the new key to compute a new state variable v */ in update() 97 /* use current state, e and separator 1 to compute a new prng key: */ in update() 102 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update() 103 /* configure the new prng key into the prng's instance of hmac */ in update() 104 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update() 106 /* use the new key to compute a new state variable v */ in update() [all …]
|
/mcuboot-3.6.0/boot/espressif/hal/src/ |
D | secure_boot.c | 51 /* Generates the public key digests of the valid public keys in an image's 52 signature block, verifies each signature, and stores the key digests in the 57 @param[out] public_key_digests Pointer to structure to hold the key digests for valid sig blocks 64 … if there's a valid signature block that doesn't verify using the included public key (unexpected!) 73 …ESP_LOGD(TAG, "calculating public key digests for sig blocks of image offset 0x%x (sig block offse… in s_calculate_image_public_key_digests() 100 /* Generating the SHA of the public key components in the signature block */ in s_calculate_image_public_key_digests() 104 bootloader_sha256_data(sig_block_sha, &block->key, sizeof(block->key)); in s_calculate_image_public_key_digests() 106 bootloader_sha256_data(sig_block_sha, &block->ecdsa.key, sizeof(block->ecdsa.key)); in s_calculate_image_public_key_digests() 110 // Check we can verify the image using this signature and this key in s_calculate_image_public_key_digests() 113 …bool verified = ets_rsa_pss_verify(&block->key, block->signature, image_digest, temp_verified_dige… in s_calculate_image_public_key_digests() [all …]
|
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/ |
D | hmac.h | 41 * transformation specified by a key in an arbitrary length data 44 * Security: The security of the HMAC depends on the length of the key and 51 * Usage: 1) call tc_hmac_set_key to set the HMAC key. 75 /* HMAC key schedule */ 76 uint8_t key[2*TC_SHA256_BLOCK_SIZE]; member 81 * @brief HMAC set key procedure 82 * Configures ctx to use key 86 * key == NULL or 89 * @param key IN -- the HMAC key to configure 90 * @param key_size IN -- the HMAC key size [all …]
|
D | aes.h | 39 * perform a transformation specified by a symmetric key in fixed- 44 * Usage: 1) call tc_aes128_set_encrypt/decrypt_key to set the key. 59 #define Nk (4) /* number of 32-bit words comprising the key */ 69 * @brief Set AES-128 encryption key 70 * Uses key k to initialize s 75 * AES-256 key schedule -- see FIPS 197 for details 77 * @param k IN -- points to the AES key 83 * Encrypts contents of in buffer into out buffer under key; 91 * @param s IN -- initialized AES key schedule 97 * @brief Set the AES-128 decryption key [all …]
|
D | cmac_mode.h | 49 * generate the tags him/herself without knowing the MAC key. In this 56 * tc_cmac_setup (allowing a new key to be set), as suggested in 65 * correctly. Like all symmetric key operations, it is session 69 * tc_cmac_struct with encryption key and buffer. Our implementation 70 * always assume that the AES key to be the same size as the block 74 * Once the state has been setup with a key, computing the CMAC of 90 * have to change the key. 92 * Once you are done computing CMAC with a key, it is a good idea to 93 * destroy the state so an attacker cannot recover the key; use 121 /* identifies the encryption key */ [all …]
|
D | ecc_dh.h | 79 * @brief Create a public/private key pair. 80 * @return returns TC_CRYPTO_SUCCESS (1) if the key pair was generated successfully 81 * returns TC_CRYPTO_FAIL (0) if error while generating key pair 83 * @param p_public_key OUT -- Will be filled in with the public key. Must be at 86 * @param p_private_key OUT -- Will be filled in with the private key. Must be as 99 * @brief Create a public/private key pair given a specific d. 109 * @brief Compute a shared secret given your secret key and someone else's 110 * public key. 117 * @param p_public_key IN -- The public key of the remote party. 118 * @param p_private_key IN -- Your private key. [all …]
|
/mcuboot-3.6.0/boot/zephyr/ |
D | keys.c | 25 * use Kconfig symbols for key types, and have to rely on the MCUBoot 48 * key file. If no key file was configured, the array and length must be 55 .key = rsa_pub_key, 58 .key = ecdsa_pub_key, 61 .key = ed25519_pub_key, 72 .key = 0, 83 .key = enc_priv_key,
|
/mcuboot-3.6.0/boot/espressif/ |
D | keys.c | 27 * key file. If no key file was configured, the array and length must be 34 .key = rsa_pub_key, 37 .key = ecdsa_pub_key, 40 .key = ed25519_pub_key, 51 .key = 0,
|
/mcuboot-3.6.0/boot/bootutil/src/ |
D | image_validate.c | 211 const struct bootutil_key *key; in bootutil_find_key() local 219 key = &bootutil_keys[i]; in bootutil_find_key() 221 bootutil_sha_update(&sha_ctx, key->key, *key->len); in bootutil_find_key() 234 bootutil_find_key(uint8_t image_index, uint8_t *key, uint16_t key_len) in bootutil_find_key() argument 244 bootutil_sha_update(&sha_ctx, key, key_len); in bootutil_find_key() 254 * - Image is signed with an arbitrary key and the corresponding public in bootutil_find_key() 255 * key is added as a TLV field. in bootutil_find_key() 256 * - During public key validation (comparing against key-hash read from in bootutil_find_key() 257 * HW) a fault is injected to accept the public key as valid one. in bootutil_find_key() 261 bootutil_keys[0].key = key; in bootutil_find_key() [all …]
|