Home
last modified time | relevance | path

Searched full:with (Results 1 – 25 of 414) sorted by relevance

12345678910>>...17

/mcuboot-3.4.0/docs/
Dtestplan-mynewt.md8 with wrong key images are not swapped to, and image signed with correct key
12 key_<sign-algo>.pem, key_<sign-algo>_2.pem. And a keys file with the C public
35 Build and load image in slot 1 with no signing, signed with
36 key_<sign-algo>_2.pem and signed with key_<sign-algo>.pem. Mark each one as
37 test image and check that swap only happens for image signed with
45 ### Image signed with more than one key
59 Build and load image in slot 1 with no signing, signed with
60 key_<sign-algo>_2.pem and signed with key_<sign-algo>.pem. Mark each one as
61 test image and check that swap only happens for image signed with
86 Build/load blinky2 both with bad and good key, followed by a permanent swap
[all …]
Drelease-notes.md16 - Workflow improvements with Zephyr CI.
27 - Add a new flash api `flash_area_get_sector`, along with support for each
41 support on some recent targets, and adds support for devices with a
50 been tested with a `BOOT_MAX_ALIGN` up to 32 bytes.
60 - Add support for clear image generation with encryption capability to
144 This release of MCUboot works with the Zephyr "main" at the time of the
146 works with the Zephyr v2.4.0, however it is recommended to enable
170 - Various fixes to work with the latest Zephyr version.
190 ECIES with secp256r1 as an Elliptic Curve alternative to RSA-OAEP. A
198 should work with no changes for little-endian targets, but will
[all …]
Dencrypted_images.md5 - distributed with this work for additional information
9 - with the License. You may obtain a copy of the License at
31 a TLV with the key must be present in the image. When upgrading the
62 The image is encrypted using AES-CTR-128 or AES-CTR-256, with a counter
70 but randomizing a 16-byte block with a TRNG should make it highly
77 For RSA-OAEP a new TLV with value `0x30` is added to the image, for
78 AES-KW a new TLV with value `0x31` is added to the image, for
79 ECIES-P256 a new TLV with value `0x32` is added, and for ECIES-X25519 a
80 newt TLV with value `0x33` is added. The contents of those TLVs
100 * The key is encrypted with AES-128-CTR or AES-256-CTR and a `nonce` of 0 using
[all …]
Dreadme-riot.md1 # Building and using MCUboot with RIOT
12 signature check it is necessary to re-compile it either with Mynewt
23 with a valid formatted value. The format is `major.minor.patch+other`
29 also expects an image padded with some specific headers containing the
30 version information, and trailer type-length-value records (TLVs) with
36 The application will be automatically signed with the provided key.
Dreadme-espressif.md1 # [Building and using MCUboot with Espressif's chips](#building-and-using-mcuboot-with-espressifs-c…
18 1. Install additional packages required for development with MCUboot:
57 *Replace `<TARGET>` with the target ESP32 family (like `esp32`, `esp32s2` and others).*
83 …/dev/ttyUSB0`) and baud rate `<BAUD>` (like `2000000`) according to the connection with your board.
108 1. Images can be regularly signed with the `scripts/imgtool.py` script:
127 For signing with a crypto key and guarantee the authenticity of the image being booted, see the sec…
144 MCUboot will then verify and compare the new image version number with the current one before perfo…
146 Version number is added to the image when signing it with `imgtool` (`-v` parameter, e.g. `-v 1.0.0…
148 ### [Downgrade prevention with security counter](#downgrade-prevention-with-security-counter)
150 It is also possible to rely on a security counter, also added to the image when signing with `imgto…
[all …]
Drelease.md3 This page describes the release process used with MCUboot.
8 follow a `MAJOR.MINOR.PATCH` format with the following guidelines on
54 suffix `rcN` (with no dash) is accepted only for the pre-release versions
64 `repository.yml` in the root directory; it must be updated with the
72 `boot/zephyr/VERSION`. For alignment with Zephyr versions, development
84 in the top-level `README.md`, and create a commit, with just this
85 change, with a commit text similar to "Bump to version a.b.c".
87 easier to find, as each release has a commit associated with it, and
90 Once this is done, the release should create a signed tag with the
Dreadme-zephyr.md1 # Building and using MCUboot with Zephyr
34 file named `boards/<arch>/<board>/<board>.dts`. An example `.dts` file with
41 Install additional packages required for development with MCUboot:
90 a simple application with everything you need. You can try it on your
100 With this, build the application as your normally would.
106 To make development easier, MCUboot is distributed with some example
111 Images can be signed with the `scripts/imgtool.py` script. It is best
116 The application itself can flashed with regular flash tools, but will
140 Generating a keypair with imgtool is a matter of running the keygen
172 with a sector size of 512 bytes and secondar slot in external off-chip flash
[all …]
Decdsa.md24 However, this will also break compatibility with older versions,
25 because images generated with newer tools will not
26 work with older versions of MCUboot.
34 Without this argument, the images are padded with the
35 existing scheme. With this argument, the ECDSA is encoded
40 The existing EC256 implementations will still work (with or
66 ECDSA signatures are encoded as ASN.1, notably with the signature
Dreadme-mynewt.md1 # Running mynewt apps with MCUboot
4 when building an app that will be run with MCUboot as the bootloader and
40 # Boot serial functionality with Mynewt
42 Building with `BOOT_SERIAL: 1` enables some basic management functionality
/mcuboot-3.4.0/sim/mcuboot-sys/src/
Dapi.rs147 THREAD_CTX.with(|ctx| { in set_flash()
161 THREAD_CTX.with(|ctx| { in clear_flash()
170 THREAD_CTX.with(|ctx| { in sim_get_flash_areas()
177 THREAD_CTX.with(|ctx| { in sim_set_flash_areas()
184 THREAD_CTX.with(|ctx| { in sim_reset_flash_areas()
191 SIM_CTX.with(|ctx| { in sim_get_context()
198 SIM_CTX.with(|ctx| { in sim_set_context()
205 SIM_CTX.with(|ctx| { in sim_reset_context()
212 RAM_CTX.with(|ctx| { in bootsim_get_ram_info()
224 RAM_CTX.with(|ctx| { in set_ram_info()
[all …]
/mcuboot-3.4.0/testplan/mynewt/
DMakefile48 @echo "* Building mcuboot with RSA... \c"
53 @echo "* Building mcuboot with RSA/PSS... \c"
58 @echo "* Building mcuboot with EC... \c"
63 @echo "* Building mcuboot with EC256... \c"
69 @echo "* Building mcuboot with RSA + EC... \c"
74 @echo "* Building mcuboot with primary slot validation... \c"
79 @echo "* Building mcuboot with overwrite only upgrade... \c"
/mcuboot-3.4.0/boot/cypress/MCUBootApp/
DREADME.md1 ### Port of MCUboot library to be used with Cypress targets
11 Cypress boards, that can be used with this evaluation example:
29 MCUBootApp checks image integrity with SHA256, image authenticity with EC256 digital signature veri…
53 Now define and initialize `struct flash_area *boot_area_descs[]` with flash memory addresses and si…
55 __Note:__ for both options make sure you have updated `MCUBOOT_MAX_IMG_SECTORS` appropriatery with
122 …er among available Cypress PSoC 6 kits. If you try to use custom hardware with this application - …
124 …Y8PROTO-062S3-4343W, CY8CKIT-062-4343W. If you try to use custom hardware with this application - …
152 * To Build MCUBootApp with external memory support - pass `USE_EXTERNAL_FLASH=1` flag to `make` com…
158 …om unwanted read - Upgrade Image Encryption can be applied. The ECDH/HKDF with EC256 scheme is use…
160 To enable image encryption support use `ENC_IMG=1` build flag (BlinkyApp should also be built with
[all …]
/mcuboot-3.4.0/boot/cypress/BlinkyApp/
DReadme.md11 * Blinks RED led with 2 different rates, depending on type of image - BOOT or UPGRADE.
25 …on among available Cypress PSoC 6 kits. If you try to use custom hardware with this application - …
26 …on among available Cypress PSoC 6 kits. If you try to use custom hardware with this application - …
68 To get appropriate artifacts to use with multi image MCUBootApp, makefile flag `HEADER_OFFSET=` can…
86 To prepare MCUBootApp for work with external memory please refer to `MCUBootApp/ExternalMemory.md`.
104 To prepare MCUBootApp for work with encrypted upgrade image please refer to `MCUBootApp/Readme.md`.
126 `BlinkyApp` built to run with `MCUBootApp` produces files with name BlinkyApp.hex in `boot` directo…
140 … image, `1` - build encrypted upgrade image (MCUBootApp should also be built with this flash set 1)
154 [BlinkyApp] Red led blinks with 1 sec period
165 [BlinkyApp] Red led blinks with 0.25 sec period
/mcuboot-3.4.0/ext/mbedtls-asn1/include/mbedtls/
Dasn1.h11 * not use this file except in compliance with the License.
58 * These constants comply with the DER encoded ASN.1 type tags.
225 * with the requested tag.
246 * \return An ASN.1 error code if the input does not start with
265 * \return An ASN.1 error code if the input does not start with
286 * \return An ASN.1 error code if the input does not start with
309 * \return An ASN.1 error code if the input does not start with
328 * \return #MBEDTLS_ERR_ASN1_INVALID_DATA if the input starts with
329 * a valid BIT STRING with a nonzero number of unused bits.
330 * \return An ASN.1 error code if the input does not start with
[all …]
Dmd.h13 * not use this file except in compliance with the License.
79 * Fields can be accessed with #mbedtls_md_get_size,
104 * \note The list starts with the strongest available hashes.
115 * associated with the given digest name.
119 * \return The message-digest information associated with \p md_name.
126 * associated with the given digest type.
130 * \return The message-digest information associated with \p md_type.
173 * or non-zero: HMAC is used with this context.
241 * with mbedtls_md_setup(), and before passing data with
276 * Afterwards, you may either clear the context with
[all …]
Dpk.h11 * not use this file except in compliance with the License.
53 #define MBEDTLS_ERR_PK_TYPE_MISMATCH -0x3F00 /**< Type mismatch, eg attempt to encrypt with
150 * \brief Types for interfacing with the debug module
241 * \brief Return information associated with the given PK type
245 * \return The PK info associated with the type or NULL if not found.
263 * \note For contexts that have been set up with
289 * \brief Initialize a PK context with the information given
391 * cleared with mbedtls_pk_free().
430 * return early and restart according to the limit set with
453 * \brief Verify signature, with options.
[all …]
/mcuboot-3.4.0/boot/cypress/
DREADME.md1 ### Port of MCUBoot library for evaluation with Cypress PSoC 6 chips
5 Given solution is included in `MCUboot` repository with purpose to demonstrate basic consepts and f…
7 Examples provided to use with **ModusToolbox® Software Environment** are a recommended reference po…
12 2. MCUboot-Based Bootloader with Rollback to Factory App in External Flash [mtb-example-anycloud-mc…
32 MCUBootApp checks image integrity with SHA256, image authenticity with EC256 digital signature veri…
44 To retrieve source code with subsequent submodules pull:
/mcuboot-3.4.0/ext/tinycrypt/lib/include/tinycrypt/
Decc_dsa.h7 * Redistribution and use in source and binary forms, with or without
15 * and/or other materials provided with the distribution.
33 * Redistribution and use in source and binary forms, with or without
41 * documentation and/or other materials provided with the distribution.
70 * recommended) and pass it in to ecdsa_sign function along with your
74 * the same hash as the signer and pass it to this function along with
95 * @param p_signature OUT -- Will be filled in with the signature value. Must be
101 * recommended) and pass it in to this function along with your private key.
129 * signer and pass it to this function along with the signer's public key and
Decc_dh.h7 * Redistribution and use in source and binary forms, with or without
15 * and/or other materials provided with the distribution.
32 * Redistribution and use in source and binary forms, with or without
40 * documentation and/or other materials provided with the distribution.
83 * @param p_public_key OUT -- Will be filled in with the public key. Must be at
86 * @param p_private_key OUT -- Will be filled in with the private key. Must be as
114 * @param p_secret OUT -- Will be filled in with the shared secret value. Must be
/mcuboot-3.4.0/
DLICENSE17 control with that entity. For the purposes of this definition,
81 with the Work to which such Contribution(s) was submitted. If You
90 Work or Derivative Works thereof in any medium, with or without
113 documentation, if provided along with the Derivative Works; or,
127 reproduction, and distribution of the Work otherwise complies with
136 with Licensor regarding such Contributions.
151 risks associated with Your exercise of permissions under this License.
168 or other liability obligations and/or rights consistent with this
181 boilerplate notice, with the fields enclosed by brackets "{}"
182 replaced with your own identifying information. (Don't include
[all …]
/mcuboot-3.4.0/ci/fih_test_docker/
Drun_fi_test.sh6 # you may not use this file except in compliance with the License.
32 # strings in the image with a different string. This causes the signature check
47 echo "Failed to damage image $IMAGE with param $DAMAGE_TYPE" 1>&2
61 # join START and END lines together with a comma seperator.
81 # Run the run_test function with each skip length between min and max in turn.
85 echo "Run tests with skip size $size" 1>&2
/mcuboot-3.4.0/boot/bootutil/include/bootutil/
Dimage.h12 * distributed with this work for additional information
16 * with the License. You may obtain a copy of the License at
70 * ECSDA224 is with NIST P-224
71 * ECSDA256 is with NIST P-256
92 #define IMAGE_TLV_ENC_RSA2048 0x30 /* Key encrypted with RSA-OAEP-2048 */
93 #define IMAGE_TLV_ENC_KW 0x31 /* Key encrypted with AES-KW 128 or 256*/
94 #define IMAGE_TLV_ENC_EC256 0x32 /* Key encrypted with ECIES-EC256 */
95 #define IMAGE_TLV_ENC_X25519 0x33 /* Key encrypted with ECIES-X25519 */
/mcuboot-3.4.0/ext/fiat/
DREADME.md11 `make src/Specific/solinas32_2e255m19_10limbs/femul.c` (replacing `femul` with
16 unsigned integers with a single carry chain and two wraparound carries" where
20 The 64-bit implementation uses 5 limbs of radix 2^51 with instruction scheduling
40 ## Working With Fiat Crypto Field Arithmetic
46 There is work ongoing to replace the entire specialization mechanism with
/mcuboot-3.4.0/ci/
Dcompare_versions.py4 # you may not use this file except in compliance with the License.
24 # exit with 0 if --new is equal to --old
25 # exit with 1 on errors
26 # exit with 2 if --new is newer than --old
27 # exit with 3 if --new is older than --old
/mcuboot-3.4.0/boot/zcbor/include/
Dzcbor_decode.h59 /** Consume and expect a pint/nint with a certain value. */
66 /** Consume and expect a pint/nint with a certain value, within a union.
81 /** Consume and expect a bstr/tstr with the value of the provided string literal.
101 /** Consume and expect a bstr/tstr with the value of the provided string literal.
112 /** Consume and expect a bstr/tstr with the value of the provided null-terminated string.
123 /** Consume and expect a bstr/tstr with the value of the provided char array literal.
153 * @param[in] unused Unused parameter to maintain signature parity with
162 * @param[in] unused Unused parameter to maintain signature parity with
254 /** Decode 0 or more elements with the same type and constraints.
276 * The @ref zcbor_decoder_t type is designed to be compatible with all single-
[all …]

12345678910>>...17