Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 18 of 18) sorted by relevance

/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py68 def _load_hardware_key(keyfile): argument
75 key = keyfile.read()
99 _check_output_is_not_input(args.keyfile, args.output)
132 key = _load_hardware_key(args.keyfile)
160 def _generate_ecdsa_signing_key(curve_id, keyfile): argument
162 with open(keyfile, "wb") as f:
167 if os.path.exists(args.keyfile):
168 raise esptool.FatalError("ERROR: Key file %s already exists" % args.keyfile)
176 _generate_ecdsa_signing_key(ecdsa.NIST256p, args.keyfile)
177 print("ECDSA NIST256p private key in PEM format written to %s" % args.keyfile)
[all …]
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32/
Doperations.py206 datafile_list = args.keyfile[
207 0 : len([keyfile for keyfile in args.keyfile if keyfile is not None]) :
294 digest = espsecure._digest_sbv2_public_key(args.keyfile)
/hal_espressif-latest/tools/esptool_py/test/
Dtest_espsecure.py784 ) as keyfile:
785 args = self.ExtractKeyArgs("2", keyfile, pub_keyfile)
825 keyfile = self._open(key_path)
829 keyfile, ciphertext, offset, flash_crypt_conf, aes_xts, original_plaintext
839 keyfile.seek(0)
842 keyfile, plaintext, offset, flash_crypt_conf, aes_xts, ciphertext
929 keyfile = self._open("256bit_key.bin")
933 keyfile, ciphertext_full_block, address, None, "aes_xts", plaintext_file
947 keyfile.seek(0)
954 keyfile,
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c3/
Doperations.py216 datafile_list = args.keyfile[
217 0 : len([name for name in args.keyfile if name is not None]) :
337 datafile_list = args.keyfile[
338 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5/
Doperations.py200 datafile_list = args.keyfile[
201 0 : len([name for name in args.keyfile if name is not None]) :
328 datafile_list = args.keyfile[
329 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5beta3/
Doperations.py200 datafile_list = args.keyfile[
201 0 : len([name for name in args.keyfile if name is not None]) :
328 datafile_list = args.keyfile[
329 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c6/
Doperations.py223 datafile_list = args.keyfile[
224 0 : len([name for name in args.keyfile if name is not None]) :
344 datafile_list = args.keyfile[
345 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2beta1/
Doperations.py220 datafile_list = args.keyfile[
221 0 : len([name for name in args.keyfile if name is not None]) :
340 datafile_list = args.keyfile[
341 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/components/bootloader/subproject/
DCMakeLists.txt95 --keyfile "${SECURE_BOOT_SIGNING_KEY}"
110 "--keylen (192/256) --keyfile KEYFILE "
118 COMMAND ${ESPSECUREPY} digest_secure_bootloader --keyfile "${secure_bootloader_key}"
144 COMMAND ${ESPSECUREPY} sign_data --version 2 --keyfile "${secure_boot_signing_key}"
202 … "* Not recommended to re-use the same secure boot keyfile on multiple production devices."
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2/
Doperations.py220 datafile_list = args.keyfile[
221 0 : len([name for name in args.keyfile if name is not None]) :
357 datafile_list = args.keyfile[
358 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c2/
Doperations.py170 datafile_list = args.keyfile[
171 0 : len([name for name in args.keyfile if name is not None]) :
293 datafile = args.keyfile
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c61/
Doperations.py262 datafile_list = args.keyfile[
263 0 : len([name for name in args.keyfile if name is not None]) :
395 datafile_list = args.keyfile[
396 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32p4/
Doperations.py258 datafile_list = args.keyfile[
259 0 : len([name for name in args.keyfile if name is not None]) :
391 datafile_list = args.keyfile[
392 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s2/
Doperations.py327 datafile_list = args.keyfile[
328 0 : len([name for name in args.keyfile if name is not None]) :
454 datafile_list = args.keyfile[
455 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3/
Doperations.py327 datafile_list = args.keyfile[
328 0 : len([name for name in args.keyfile if name is not None]) :
454 datafile_list = args.keyfile[
455 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3beta2/
Doperations.py327 datafile_list = args.keyfile[
328 0 : len([name for name in args.keyfile if name is not None]) :
454 datafile_list = args.keyfile[
455 0 : len([name for name in args.keyfile if name is not None]) :
/hal_espressif-latest/components/bootloader_support/
DCMakeLists.txt126 extract_public_key --keyfile "${secure_boot_signing_key}"
154 extract_public_key --keyfile "${secure_boot_signing_key}"
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/
Dindex.rst42 If the public key is not stored in the external HSM, you can specify the ``--keyfile`` argument to …
44 python espsecure.py verify_signature --version 2 --keyfile <public_key> <signed_image>