Home
last modified time | relevance | path

Searched full:not (Results 1 – 25 of 445) sorted by relevance

12345678910>>...18

/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Dcheck_config.h11 * not use this file except in compliance with the License.
28 * target platforms, so not an issue, but let's just be extra sure.
40 /* Fix the config here. Not convenient to put an #ifdef _WIN32 in mbedtls_config.h as
54 #error "The NET module is not available for mbed OS - please use the network functions provided by …
63 #error "MBEDTLS_HAVE_TIME_DATE without MBEDTLS_HAVE_TIME does not make sense"
67 #error "MBEDTLS_AESNI_C defined, but not all prerequisites"
71 #error "MBEDTLS_CTR_DRBG_C defined, but not all prerequisites"
75 #error "MBEDTLS_DHM_C defined, but not all prerequisites"
80 #error "MBEDTLS_CMAC_C defined, but not all prerequisites"
85 #error "MBEDTLS_NIST_KW_C defined, but not all prerequisites"
[all …]
Decp.h22 * not use this file except in compliance with the License.
47 … -0x4E80 /**< The requested feature is not available, for example, the requested curve i…
48 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00 /**< The signature is not valid.…
84 * \warning This library does not support validation of arbitrary domain
106 MBEDTLS_ECP_DP_NONE = 0, /*!< Curve not defined. */
193 * For Montgomery curves, we do not store \p A, but <code>(A + 2) / 4</code>,
195 * not the size of \p N but the required size for private keys.
213 * of these fields does not need to be supported.
214 * They do not need to be at the same offset in the structure.
442 * same operation, but output parameters need not be the
[all …]
Drsa.h17 * not use this file except in compliance with the License.
51 …T_TOO_LARGE -0x4400 /**< The output buffer for decryption is not large enough. */
85 * Do not set this field in application
135 * \param ctx The RSA context to initialize. This must not be \c NULL.
166 * function but may be not suitable for some operations.
181 * imports, if the parameters are not simultaneously present.
192 * \note The imported parameters are copied and need not be preserved
215 * imports, if the parameters are not simultaneously present.
226 * \note The imported parameters are copied and need not be preserved
264 * Alternative implementations need not support these.
[all …]
Dpk.h11 * not use this file except in compliance with the License.
60 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80 /**< Given private key password does not allow …
114 * For RSA_ALT, the signature size is not necessarily tied to what the
245 * \return The PK info associated with the type or NULL if not found.
253 * This must not be \c NULL.
264 * mbedtls_pk_setup_opaque(), this does not free the underlying
275 * This must not be \c NULL.
292 * \param ctx Context to initialize. It must not have been set
330 * \return #MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE if the key is not an
342 * \param ctx Context to initialize. It must not have been set
[all …]
Decdsa.h18 * not use this file except in compliance with the License.
72 * ECDSA context is not supported; objects of this type
73 * should not be shared between multiple threads.
161 * \param f_rng The RNG function. This must not be \c NULL.
204 * \param f_rng_blind The RNG function used for blinding. This must not be
264 * \warning It is not thread-safe to use the same context in
295 * the signature written. Must not be \c NULL.
296 * \param f_rng The RNG function. This must not be \c NULL if
338 * the signature written. Must not be \c NULL.
339 * \param f_rng The RNG function. This must not be \c NULL if
[all …]
/mcuboot-latest/boot/zephyr/
Dprj.conf13 # CONFIG_HEAP_MEM_POOL_SIZE is not set
17 # CONFIG_TINYCRYPT is not set
18 # CONFIG_TINYCRYPT_ECC_DSA is not set
19 # CONFIG_TINYCRYPT_SHA256 is not set
24 # CONFIG_BT is not set
25 # CONFIG_BT_CTLR is not set
26 # CONFIG_I2C is not set
DCMakeLists.txt34 if(NOT EXISTS ${NRFXLIB_DIR})
79 if(NOT DEFINED CONFIG_FLASH_PAGE_LAYOUT)
175 # Since here we are not using Zephyr's mbedTLS but rather our own, we need
272 if(NOT CONFIG_BOOT_SIGNATURE_KEY_FILE STREQUAL "")
278 if (NOT DEFINED CONF_DIR)
311 if(CONFIG_BOOT_ENCRYPTION_KEY_FILE AND NOT CONFIG_BOOT_ENCRYPTION_KEY_FILE STREQUAL "")
318 if(NOT DEFINED CONF_DIR)
395 if(NOT CONFIG_SINGLE_APPLICATION_SLOT)
415 if(NOT DEFINED slot0_size)
417 elseif(NOT DEFINED erase_size_slot0)
[all …]
/mcuboot-latest/boot/mbed/
Dmbed_lib.json96 … read operations, in bytes. Enables a workaround if your block device does not support reading a s…
101 "help": "Use hardware key (NOT TESTED)",
107 "help": "Boot swap using move (NOT TESTED)",
113 "help": "Updateable image number (NOT TESTED)",
117 "help": "Swap save enctlv (NOT TESTED)",
122 "help": "Encrypt images using RSA (NOT TESTED)",
128 "help": "Encrypt images using EC256 (NOT TESTED)",
134 "help": "Encrypt images using X25519 (NOT TESTED)",
140 "help": "Bootstrap (NOT TESTED)",
145 "help": "Use bench (NOT TESTED)",
[all …]
/mcuboot-latest/scripts/imgtool/
Dimage.py8 # you may not use this file except in compliance with the License.
137 if not TLV_VENDOR_RES_MIN <= kind <= TLV_VENDOR_RES_MAX:
205 # If key is not None, then we have to filter hash to only allowed
210 raise click.UsageError("Colud not find allowed hash algorithms for {}"
218 raise click.UsageError("Key {} can not be used with --sha {}; allowed sha are one of {}"
232 # We do not need the result here, and the key_and_user_sha_to_alg_and_tlv
254 raise click.UsageError("Can not set rom_fixed and load_addr at the same time")
297 # Security counter has not been explicitly provided,
313 self.base_addr if self.base_addr is not None else "N/A",
337 raise click.UsageError("Input file not found")
[all …]
Dmain.py9 # you may not use this file except in compliance with the License.
104 if key is not None:
116 print("Passwords do not match, try again")
146 The stdout is used if it is not provided.')
152 elif not encoding and not lang:
158 if not output:
183 The stdout is used if it is not provided.')
186 if not encoding:
190 if not output:
244 print("Key type does not match TLV record")
[all …]
/mcuboot-latest/scripts/
Dassemble.py8 # you may not use this file except in compliance with the License.
35 if ak not in b:
38 if bk not in a:
67 if not same_keys(offsets, sizes):
71 if 'mcuboot' not in offsets:
72 raise Exception("Board partition table does not have mcuboot partition")
74 if 'image-0' not in offsets:
75 raise Exception("Board partition table does not have image-0 partition")
77 if 'image-1' not in offsets:
78 raise Exception("Board partition table does not have image-1 partition")
[all …]
/mcuboot-latest/boot/espressif/
DCMakeLists.txt10 if (NOT DEFINED MCUBOOT_TARGET)
11 message(FATAL_ERROR "MCUBOOT_TARGET not defined. Please pass -DMCUBOOT_TARGET flag.")
28 if (NOT DEFINED CMAKE_TOOLCHAIN_FILE)
30 …message("CMAKE_TOOLCHAIN_FILE not defined, searching for toolchain compiler in TOOLCHAIN_BIN_DIR: …
34 if (NOT C_COMPILER_BIN)
42 if (NOT CXX_COMPILER_BIN)
82 if (NOT DEFINED ESP_HAL_PATH)
86 message(WARNING "ESP_HAL_PATH not defined, checking if IDF_PATH exists.")
104 if (NOT DEFINED MCUBOOT_CONFIG_FILE)
110 if (NOT EXISTS "${CONFIG_FILE}")
[all …]
/mcuboot-latest/scripts/imgtool/keys/
D__init__.py7 # you may not use this file except in compliance with the License.
42 password was not specified."""
71 if pk.key_size not in RSA_KEY_SIZES:
75 if pk.key_size not in RSA_KEY_SIZES:
79 if pk.curve.name not in ('secp256r1', 'secp384r1'):
81 if pk.key_size not in (256, 384):
88 if pk.curve.name not in ('secp256r1', 'secp384r1'):
90 if pk.key_size not in (256, 384):
/mcuboot-latest/
DLICENSE27 including but not limited to software source code, documentation
32 not limited to compiled object code, generated documentation,
44 of this License, Derivative Works shall not include works that remain
55 to the Licensor or its representatives, including but not limited to
60 designated in writing by the copyright owner as "Not a Contribution."
103 excluding those notices that do not pertain to any part of
109 within such NOTICE file, excluding those notices that do not
117 do not modify the License. You may add Your own attribution
138 6. Trademarks. This License does not grant permission to use the trade
160 Work (including but not limited to damages for loss of goodwill,
[all …]
/mcuboot-latest/ci/fih_test_docker/
Dutils.py4 # you may not use this file except in compliance with the License.
23 'ADDRES_NOEXEC': 'Address was not executed',
26 'NO_BOOT': 'System not booted (desired behaviour)',
35 if not results:
50 if "skipped" in test.keys() and not test["skipped"]:
/mcuboot-latest/boot/zephyr/boards/
Dnrf52_minimal_footprint.conf3 # This is not recomendet configuration because of security and reliability
13 # CONFIG_BOOT_VALIDATE_SLOT0 is not set
19 # CONFIG_BOARD_ENABLE_DCDC is not set
26 # CONFIG_TICKLESS_KERNEL is not set
/mcuboot-latest/scripts/tests/
Dtest_keys.py4 # you may not use this file except in compliance with the License.
60 assert not gen_key.exists()
73 assert not gen_key2.exists()
133 assert not pub_key.exists()
162 assert not pub_key_hash.exists()
193 # not all required arguments are provided
205 assert not image_signed.exists()
242 # 'another' key is not valid to verify a signed image
/mcuboot-latest/docs/
Decdsa.md6 that is not easily reversible. Some crypto libraries (specifically, Mbed
20 that the length does not need to be known until the signature is
22 languages, so this change should not be difficult.
25 because images generated with newer tools will not
57 behavior, but will not specify a specific version of imgtool.
62 not be any compatibility issues.
Dreadme-espressif.md75 4. If ESP-IDF is not installed and will not be used, install `esptool`:
123 If `MCUBOOT_FLASH_PORT` arg was not passed to `cmake`, the default `PORT` for flashing will be
176 For Zephyr images, `--pad-header` is not needed as it already has the padding for MCUboot
226 [MCUboot encrypted images](encrypted_images.md) do not provide full code confidentiality when only
283 is not supported by Espressif port.
293 If signing a Zephyr image, the `--pad-header` is not needed, as it already have the padding for
359 *This may be suitable for __production__ builds. __After disabling UART Download Mode you will not
393 key are correct and you did not forget anything before flashing.*
410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor
413 1. On startup, since it is the first boot, the ROM bootloader will not verify the bootloader image
[all …]
/mcuboot-latest/boot/zephyr/sysbuild/
DCMakeLists.txt9 if(NOT "${PRE_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT)
24 if(NOT "${POST_IMAGE_CMAKE_IMAGE}" STREQUAL "mcuboot" OR NOT SB_CONFIG_BOOTLOADER_MCUBOOT)
/mcuboot-latest/ci/
Dget_features.py6 # you may not use this file except in compliance with the License.
28 if not os.path.isfile(args.infile):
29 print("File not found")
39 if 'features' not in config:
Dimgtool_run.sh4 # you may not use this file except in compliance with the License.
17 echo "Either a PR or not \"main\" branch, exiting"
40 echo "Imgtool version not changed; will not publish"
/mcuboot-latest/boot/bootutil/include/bootutil/
Dbench.h7 * you may not use this file except in compliance with the License.
51 #else /* not MCUBOOT_USE_BENCH */
66 #endif /* not MCUBOOT_USE_BENCH */
68 #endif /* not H_BOOTUTIL_BENCH_H__ */
/mcuboot-latest/boot/espressif/port/
Desp_loader.c63 BOOT_LOG_ERR("IRAM region in load header is not valid. Aborting"); in esp_app_image_load()
68 BOOT_LOG_ERR("DRAM region in load header is not valid. Aborting"); in esp_app_image_load()
73 … BOOT_LOG_ERR("Application entry point (0x%x) is not in IRAM. Aborting", load_header.entry_addr); in esp_app_image_load()
94 ((void (*)(void))entry_addr)(); /* Call to application entry address should not return */ in start_cpu0_image()
95 FIH_PANIC; /* It should not get here */ in start_cpu0_image()
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Decc_platform_specific.h15 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
44 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
48 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
64 * not be generated. The filled-in values should be either truly random, or from

12345678910>>...18