/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | check_config.h | 11 * not use this file except in compliance with the License. 28 * target platforms, so not an issue, but let's just be extra sure. 40 /* Fix the config here. Not convenient to put an #ifdef _WIN32 in mbedtls_config.h as 54 #error "The NET module is not available for mbed OS - please use the network functions provided by … 63 #error "MBEDTLS_HAVE_TIME_DATE without MBEDTLS_HAVE_TIME does not make sense" 67 #error "MBEDTLS_AESNI_C defined, but not all prerequisites" 71 #error "MBEDTLS_CTR_DRBG_C defined, but not all prerequisites" 75 #error "MBEDTLS_DHM_C defined, but not all prerequisites" 80 #error "MBEDTLS_CMAC_C defined, but not all prerequisites" 85 #error "MBEDTLS_NIST_KW_C defined, but not all prerequisites" [all …]
|
D | ecp.h | 22 * not use this file except in compliance with the License. 47 … -0x4E80 /**< The requested feature is not available, for example, the requested curve i… 48 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00 /**< The signature is not valid.… 84 * \warning This library does not support validation of arbitrary domain 106 MBEDTLS_ECP_DP_NONE = 0, /*!< Curve not defined. */ 193 * For Montgomery curves, we do not store \p A, but <code>(A + 2) / 4</code>, 195 * not the size of \p N but the required size for private keys. 213 * of these fields does not need to be supported. 214 * They do not need to be at the same offset in the structure. 442 * same operation, but output parameters need not be the [all …]
|
D | rsa.h | 17 * not use this file except in compliance with the License. 51 …T_TOO_LARGE -0x4400 /**< The output buffer for decryption is not large enough. */ 85 * Do not set this field in application 135 * \param ctx The RSA context to initialize. This must not be \c NULL. 166 * function but may be not suitable for some operations. 181 * imports, if the parameters are not simultaneously present. 192 * \note The imported parameters are copied and need not be preserved 215 * imports, if the parameters are not simultaneously present. 226 * \note The imported parameters are copied and need not be preserved 264 * Alternative implementations need not support these. [all …]
|
D | pk.h | 11 * not use this file except in compliance with the License. 60 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80 /**< Given private key password does not allow … 114 * For RSA_ALT, the signature size is not necessarily tied to what the 245 * \return The PK info associated with the type or NULL if not found. 253 * This must not be \c NULL. 264 * mbedtls_pk_setup_opaque(), this does not free the underlying 275 * This must not be \c NULL. 292 * \param ctx Context to initialize. It must not have been set 330 * \return #MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE if the key is not an 342 * \param ctx Context to initialize. It must not have been set [all …]
|
D | ecdsa.h | 18 * not use this file except in compliance with the License. 72 * ECDSA context is not supported; objects of this type 73 * should not be shared between multiple threads. 161 * \param f_rng The RNG function. This must not be \c NULL. 204 * \param f_rng_blind The RNG function used for blinding. This must not be 264 * \warning It is not thread-safe to use the same context in 295 * the signature written. Must not be \c NULL. 296 * \param f_rng The RNG function. This must not be \c NULL if 338 * the signature written. Must not be \c NULL. 339 * \param f_rng The RNG function. This must not be \c NULL if [all …]
|
/mcuboot-latest/boot/zephyr/ |
D | prj.conf | 13 # CONFIG_HEAP_MEM_POOL_SIZE is not set 17 # CONFIG_TINYCRYPT is not set 18 # CONFIG_TINYCRYPT_ECC_DSA is not set 19 # CONFIG_TINYCRYPT_SHA256 is not set 24 # CONFIG_BT is not set 25 # CONFIG_BT_CTLR is not set 26 # CONFIG_I2C is not set
|
D | CMakeLists.txt | 34 if(NOT EXISTS ${NRFXLIB_DIR}) 79 if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT) 175 # Since here we are not using Zephyr's mbedTLS but rather our own, we need 272 if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "") 278 if (NOT DEFINED CONF_DIR) 311 if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "") 318 if(NOT DEFINED CONF_DIR) 395 if(NOT CONFIG_SINGLE_APPLICATION_SLOT) 415 if(NOT DEFINED slot0_size) 417 elseif(NOT DEFINED erase_size_slot0) [all …]
|
/mcuboot-latest/boot/mbed/ |
D | mbed_lib.json | 96 … read operations, in bytes. Enables a workaround if your block device does not support reading a s… 101 "help": "Use hardware key (NOT TESTED)", 107 "help": "Boot swap using move (NOT TESTED)", 113 "help": "Updateable image number (NOT TESTED)", 117 "help": "Swap save enctlv (NOT TESTED)", 122 "help": "Encrypt images using RSA (NOT TESTED)", 128 "help": "Encrypt images using EC256 (NOT TESTED)", 134 "help": "Encrypt images using X25519 (NOT TESTED)", 140 "help": "Bootstrap (NOT TESTED)", 145 "help": "Use bench (NOT TESTED)", [all …]
|
/mcuboot-latest/scripts/imgtool/ |
D | image.py | 8 # you may not use this file except in compliance with the License. 137 if not TLV_VENDOR_RES_MIN <= kind <= TLV_VENDOR_RES_MAX: 205 # If key is not None, then we have to filter hash to only allowed 210 raise click.UsageError("Colud not find allowed hash algorithms for {}" 218 raise click.UsageError("Key {} can not be used with --sha {}; allowed sha are one of {}" 232 # We do not need the result here, and the key_and_user_sha_to_alg_and_tlv 254 raise click.UsageError("Can not set rom_fixed and load_addr at the same time") 297 # Security counter has not been explicitly provided, 313 self.base_addr if self.base_addr is not None else "N/A", 337 raise click.UsageError("Input file not found") [all …]
|
D | main.py | 9 # you may not use this file except in compliance with the License. 104 if key is not None: 116 print("Passwords do not match, try again") 146 The stdout is used if it is not provided.') 152 elif not encoding and not lang: 158 if not output: 183 The stdout is used if it is not provided.') 186 if not encoding: 190 if not output: 244 print("Key type does not match TLV record") [all …]
|
/mcuboot-latest/scripts/ |
D | assemble.py | 8 # you may not use this file except in compliance with the License. 35 if ak not in b: 38 if bk not in a: 67 if not same_keys(offsets, sizes): 71 if 'mcuboot' not in offsets: 72 raise Exception("Board partition table does not have mcuboot partition") 74 if 'image-0' not in offsets: 75 raise Exception("Board partition table does not have image-0 partition") 77 if 'image-1' not in offsets: 78 raise Exception("Board partition table does not have image-1 partition") [all …]
|
/mcuboot-latest/boot/espressif/ |
D | CMakeLists.txt | 10 if (NOT DEFINED MCUBOOT_TARGET) 11 message(FATAL_ERROR "MCUBOOT_TARGET not defined. Please pass -DMCUBOOT_TARGET flag.") 28 if (NOT DEFINED CMAKE_TOOLCHAIN_FILE) 30 …message("CMAKE_TOOLCHAIN_FILE not defined, searching for toolchain compiler in TOOLCHAIN_BIN_DIR: … 34 if (NOT C_COMPILER_BIN) 42 if (NOT CXX_COMPILER_BIN) 82 if (NOT DEFINED ESP_HAL_PATH) 86 message(WARNING "ESP_HAL_PATH not defined, checking if IDF_PATH exists.") 104 if (NOT DEFINED MCUBOOT_CONFIG_FILE) 110 if (NOT EXISTS "${CONFIG_FILE}") [all …]
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | __init__.py | 7 # you may not use this file except in compliance with the License. 42 password was not specified.""" 71 if pk.key_size not in RSA_KEY_SIZES: 75 if pk.key_size not in RSA_KEY_SIZES: 79 if pk.curve.name not in ('secp256r1', 'secp384r1'): 81 if pk.key_size not in (256, 384): 88 if pk.curve.name not in ('secp256r1', 'secp384r1'): 90 if pk.key_size not in (256, 384):
|
/mcuboot-latest/ |
D | LICENSE | 27 including but not limited to software source code, documentation 32 not limited to compiled object code, generated documentation, 44 of this License, Derivative Works shall not include works that remain 55 to the Licensor or its representatives, including but not limited to 60 designated in writing by the copyright owner as "Not a Contribution." 103 excluding those notices that do not pertain to any part of 109 within such NOTICE file, excluding those notices that do not 117 do not modify the License. You may add Your own attribution 138 6. Trademarks. This License does not grant permission to use the trade 160 Work (including but not limited to damages for loss of goodwill, [all …]
|
/mcuboot-latest/ci/fih_test_docker/ |
D | utils.py | 4 # you may not use this file except in compliance with the License. 23 'ADDRES_NOEXEC': 'Address was not executed', 26 'NO_BOOT': 'System not booted (desired behaviour)', 35 if not results: 50 if "skipped" in test.keys() and not test["skipped"]:
|
/mcuboot-latest/boot/zephyr/boards/ |
D | nrf52_minimal_footprint.conf | 3 # This is not recomendet configuration because of security and reliability 13 # CONFIG_BOOT_VALIDATE_SLOT0 is not set 19 # CONFIG_BOARD_ENABLE_DCDC is not set 26 # CONFIG_TICKLESS_KERNEL is not set
|
/mcuboot-latest/scripts/tests/ |
D | test_keys.py | 4 # you may not use this file except in compliance with the License. 60 assert not gen_key.exists() 73 assert not gen_key2.exists() 133 assert not pub_key.exists() 162 assert not pub_key_hash.exists() 193 # not all required arguments are provided 205 assert not image_signed.exists() 242 # 'another' key is not valid to verify a signed image
|
/mcuboot-latest/docs/ |
D | ecdsa.md | 6 that is not easily reversible. Some crypto libraries (specifically, Mbed 20 that the length does not need to be known until the signature is 22 languages, so this change should not be difficult. 25 because images generated with newer tools will not 57 behavior, but will not specify a specific version of imgtool. 62 not be any compatibility issues.
|
D | readme-espressif.md | 75 4. If ESP-IDF is not installed and will not be used, install `esptool`: 123 If `MCUBOOT_FLASH_PORT` arg was not passed to `cmake`, the default `PORT` for flashing will be 176 For Zephyr images, `--pad-header` is not needed as it already has the padding for MCUboot 226 [MCUboot encrypted images](encrypted_images.md) do not provide full code confidentiality when only 283 is not supported by Espressif port. 293 If signing a Zephyr image, the `--pad-header` is not needed, as it already have the padding for 359 *This may be suitable for __production__ builds. __After disabling UART Download Mode you will not 393 key are correct and you did not forget anything before flashing.* 410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor 413 1. On startup, since it is the first boot, the ROM bootloader will not verify the bootloader image [all …]
|
/mcuboot-latest/boot/zephyr/sysbuild/ |
D | CMakeLists.txt | 9 if(NOT "${PRE_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT) 24 if(NOT "${POST_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT)
|
/mcuboot-latest/ci/ |
D | get_features.py | 6 # you may not use this file except in compliance with the License. 28 if not os.path.isfile(args.infile): 29 print("File not found") 39 if 'features' not in config:
|
D | imgtool_run.sh | 4 # you may not use this file except in compliance with the License. 17 echo "Either a PR or not \"main\" branch, exiting" 40 echo "Imgtool version not changed; will not publish"
|
/mcuboot-latest/boot/bootutil/include/bootutil/ |
D | bench.h | 7 * you may not use this file except in compliance with the License. 51 #else /* not MCUBOOT_USE_BENCH */ 66 #endif /* not MCUBOOT_USE_BENCH */ 68 #endif /* not H_BOOTUTIL_BENCH_H__ */
|
/mcuboot-latest/boot/espressif/port/ |
D | esp_loader.c | 63 BOOT_LOG_ERR("IRAM region in load header is not valid. Aborting"); in esp_app_image_load() 68 BOOT_LOG_ERR("DRAM region in load header is not valid. Aborting"); in esp_app_image_load() 73 … BOOT_LOG_ERR("Application entry point (0x%x) is not in IRAM. Aborting", load_header.entry_addr); in esp_app_image_load() 94 ((void (*)(void))entry_addr)(); /* Call to application entry address should not return */ in start_cpu0_image() 95 FIH_PANIC; /* It should not get here */ in start_cpu0_image()
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | ecc_platform_specific.h | 15 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 44 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 48 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 64 * not be generated. The filled-in values should be either truly random, or from
|