/mcuboot-2.7.6/ext/tinycrypt/lib/source/ |
D | aes_decrypt.c | 73 static inline void mult_row_column(uint8_t *out, const uint8_t *in) in mult_row_column() argument 75 out[0] = multe(in[0]) ^ multb(in[1]) ^ multd(in[2]) ^ mult9(in[3]); in mult_row_column() 76 out[1] = mult9(in[0]) ^ multe(in[1]) ^ multb(in[2]) ^ multd(in[3]); in mult_row_column() 77 out[2] = multd(in[0]) ^ mult9(in[1]) ^ multe(in[2]) ^ multb(in[3]); in mult_row_column() 78 out[3] = multb(in[0]) ^ multd(in[1]) ^ mult9(in[2]) ^ multe(in[3]); in mult_row_column() 129 int tc_aes_decrypt(uint8_t *out, const uint8_t *in, const TCAesKeySched_t s) in tc_aes_decrypt() argument 136 } else if (in == (const uint8_t *) 0) { in tc_aes_decrypt() 142 (void)_copy(state, sizeof(state), in, sizeof(state)); in tc_aes_decrypt()
|
D | aes_encrypt.c | 124 static inline void mult_row_column(uint8_t *out, const uint8_t *in) in mult_row_column() argument 126 out[0] = _double_byte(in[0]) ^ triple(in[1]) ^ in[2] ^ in[3]; in mult_row_column() 127 out[1] = in[0] ^ _double_byte(in[1]) ^ triple(in[2]) ^ in[3]; in mult_row_column() 128 out[2] = in[0] ^ in[1] ^ _double_byte(in[2]) ^ triple(in[3]); in mult_row_column() 129 out[3] = triple(in[0]) ^ in[1] ^ in[2] ^ _double_byte(in[3]); in mult_row_column() 158 int tc_aes_encrypt(uint8_t *out, const uint8_t *in, const TCAesKeySched_t s) in tc_aes_encrypt() argument 165 } else if (in == (const uint8_t *) 0) { in tc_aes_encrypt() 171 (void)_copy(state, sizeof(state), in, sizeof(state)); in tc_aes_encrypt()
|
D | cbc_mode.c | 37 int tc_cbc_mode_encrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_cbc_mode_encrypt() argument 47 in == (const uint8_t *) 0 || in tc_cbc_mode_encrypt() 64 buffer[m++] ^= *in++; in tc_cbc_mode_encrypt() 77 int tc_cbc_mode_decrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_cbc_mode_decrypt() argument 88 in == (const uint8_t *) 0 || in tc_cbc_mode_decrypt() 106 (void)tc_aes_decrypt(buffer, in, sched); in tc_cbc_mode_decrypt() 107 in += TC_AES_BLOCK_SIZE; in tc_cbc_mode_decrypt()
|
D | ctr_mode.c | 37 int tc_ctr_mode(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_ctr_mode() argument 50 in == (uint8_t *) 0 || in tc_ctr_mode() 81 *out++ = buffer[n] ^ *in++; in tc_ctr_mode()
|
/mcuboot-2.7.6/sim/mcuboot-sys/ |
D | Cargo.toml | 38 # Encrypt image in the secondary slot using RSA-OAEP-2048 41 # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048 44 # Encrypt image in the secondary slot using AES-KW-128 47 # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256 50 # Encrypt image in the secondary slot using ECIES-P256 53 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256 56 # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS 59 # Encrypt image in the secondary slot using ECIES-X25519 62 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519 71 # Check (in software) against version downgrades.
|
/mcuboot-2.7.6/ext/tinycrypt/tests/ |
D | test_aes.c | 60 uint8_t in[NUM_OF_NIST_KEYS]; member 148 int var_text_test(unsigned int r, const uint8_t *in, const uint8_t *out, in var_text_test() argument 155 (void)tc_aes_encrypt(ciphertext, in, s); in var_text_test() 163 result = check_result(r, in, NUM_OF_NIST_KEYS, in var_text_test() 1087 result = var_text_test(i, kat_tbl[i].in, kat_tbl[i].out, &s); in test_3() 1098 int var_key_test(unsigned int r, const uint8_t *in, const uint8_t *out) in var_key_test() argument 1109 (void)tc_aes128_set_encrypt_key(&s, in); in var_key_test() 2027 result = var_key_test(i, kat_tbl[i].in, kat_tbl[i].out); in test_4()
|
/mcuboot-2.7.6/boot/cypress/BlinkyApp/ |
D | Readme.md | 5 Implements simple Blinky LED CM4 application to demonstrate MCUBoot Application operation in terms … 25 …lication - change definitions of `CY_DEBUG_UART_TX` and `CY_DEBUG_UART_RX` in `main.c` of BlinkyAp… 26 …are with this application - change definitions of `LED_PORT` and `LED_PIN` in `main.c` of BlinkyAp… 31 …g following macros: `-DUSER_APP_SIZE`, `-DUSER_APP_START`, `-DRAM_SIZE`, `-DRAM_START` in makefile. 33 Pre-build action calls GCC preprocessor which intantiates defines for particular values in `BlinkyA… 45 …BlinkyApp for BOOT slot. Substitute `PLATFORM=` to a paltform name you use in all following comman… 66 `BlinkyApp` can be built to use in multi-image bootloader configuration. 92 `HEADER_OFFSET` defines the offset from original boot image address. This one in line above suggest… 94 `ERASED_VALUE` defines the memory cell contents in erased state. It is `0x00` for PSoC6's internal … 106 To obtain encrypted upgrade image of BlinkyApp extra flag `ENC_IMG=1` should be passed in command l… [all …]
|
/mcuboot-2.7.6/docs/ |
D | SubmittingPatches.md | 3 Development on mcuboot primarily takes place in github, at: 12 The Signed-off-by line should be at the end of the commit text, in the 13 last blank-line-separated section. There can be multiple lines in 27 putting them in a trailer with a common format will make them easier 49 (a) The contribution was created in whole or in part by me and I 51 indicated in the file; or 56 work with modifications, whether created in whole or in part 59 in the file; or
|
D | readme-zephyr.md | 5 There are some pretty significant differences in how apps are built 13 partitions defined in its device tree. These partitions are: 27 The flash partitions are typically defined in the Zephyr boards folder, in a 29 flash partitions defined is the frdm_k64f's in 30 `boards/arm/frdm_k64f/frdm_k64f.dts`. Make sure the labels in your board's 46 be made before building it. Most of this can be done as documented in 47 the `CMakeLists.txt` file in boot/zephyr. There are comments there for 51 To build MCUboot, create a build directory in boot/zephyr, and build 61 In addition to the partitions defined in DTS, some additional 63 MCUboot itself. All the needed configuration is collected in [all …]
|
D | testplan-mynewt.md | 20 Build and load good image in slot 0: 25 NOTE: If testing RSA/PSS `newt create-image` needs to be passed in the extra 30 Build and load image in slot 1 with no signing, signed with 49 Build and load good image in slot 0: 54 Build and load image in slot 1 with no signing, signed with 89 This should not swap and delete the image in slot 1 when signed with the wrong 90 key, otherwise the image in slot 1 should be *moved* to slot 0 and slot 1 should 139 image in slot 1 and check that it works. 145 in slot 1 and do random swaps (as much as you like!). When the swap finishes 146 confirm that the swap was finished with the previous slot 1 image now in [all …]
|
D | testplan-zephyr.md | 4 testing is done with the code in `samples/zephyr`. These examples 6 At this time, however, the partitions are hardcoded in the Makefile 9 Note that the script "run-tests.sh" in that directory is helpful for 15 The tests are build using the various `test-*` targets in 64 And make sure this stays in the "hello2" image. 71 Repeat these steps for each of the `test-*` targest in the Makefile.
|
D | release-notes.md | 23 - Allow larger primary slot in swap-move 24 - Fixed boostrapping in swap-move mode. 59 - CBOR decoding in serial recovery replaced by code generated from a 65 - Add an optional boot record in shared memory to communicate boot 72 - CVE-2020-7595 "xmlStringLenDecodeEntities in parser.c in libxml2 73 2.9.10 has an infinite loop in a certain end-of-file situation." Fix 74 by updating a dependency in documentation generation. 102 - Encrypted image TLVs can be saved in swap metadata during a swap 104 - imgtool can dump private keys in C format (getpriv command), which 130 dependencies used in the generation of the documentation on github. [all …]
|
D | imgtool.md | 5 this script should be preferred to the manual steps described in 27 prompt for a password. You will need to enter this password in every 35 key, as described above, you should replace the public key in the 38 For Zephyr, the keys live in the file `boot/zephyr/keys.c`. For 39 mynewt, follow the instructions in `doc/signed_images.md` to generate 51 Image signing takes an image in binary or Intel Hex format intended for the 94 -x, --hex-addr INTEGER Adjust address in hex output file. 100 field to place in the header (1.2.3 for example), the alignment of the 101 flash device in question, and the header size. 107 in use that does not automatically add this zeroed header, `--pad-header` can [all …]
|
/mcuboot-2.7.6/ext/tinycrypt/lib/include/tinycrypt/ |
D | cbc_mode.h | 110 int tc_cbc_mode_encrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, 143 int tc_cbc_mode_decrypt(uint8_t *out, unsigned int outlen, const uint8_t *in,
|
D | aes.h | 93 int tc_aes_encrypt(uint8_t *out, const uint8_t *in, 123 int tc_aes_decrypt(uint8_t *out, const uint8_t *in,
|
/mcuboot-2.7.6/samples/zephyr/bad-keys/ |
D | README.md | 5 the demo keys's public keys in the bootloader should result in it not
|
/mcuboot-2.7.6/samples/zephyr/ |
D | README.md | 9 Please see the comments in the Makefile in this directory for more 20 or in Fedora:
|
/mcuboot-2.7.6/boot/cypress/MCUBootApp/ |
D | README.md | 31 …loader app sizes are appropriate and correspond to flash area size defined in Applications' linker… 40 To enable hardware acceleration in `MCUBootApp` pass flag `USE_CRYPTO_HW=1` to `make` while build. 73 As an example in a makefile it should look like following: 85 To enable multi-image operation define `MCUBOOT_IMAGE_NUMBER` in `MCUBootApp/config/mcuboot_config.… 97 This ensures two dependent applications can be accepted by device only in case both images are vali… 115 __Note:__ It is also possible to place secondary (upgrade) slots in external memory module so resul… 122 …stom hardware with this application - change definition of `CYBSP_UART_HW` in `main.c` of MCUBootA… 124 …y to use custom hardware with this application - change value of `smif_id` in `main.c` of MCUBootA… 142 …e files infrastructure for building MCUBoot Bootloader. Same approach used in sample BlinkyLedApp … 144 * Build MCUBootApp in `Debug` for signle image use case. [all …]
|
D | MCUBootApp.ld | 7 * The main purpose of the linker script is to describe how the sections in the 16 * defined in the linker files. In that case you may see warnings during the 18 * relevant code in the linker file. 26 * you may not use this file except in compliance with the License. 31 * Unless required by applicable law or agreed to in writing, software 46 /* Force symbol to be entered in the output file as an undefined symbol. Doing 54 /* The MEMORY section below describes the location and size of blocks of memory in the target. 63 …* Your changes must be aligned with the corresponding memory regions for the CM4 core in 'xx_cm4_d… 92 * It references following symbols, which must be defined in code: 185 * define __STARTUP_COPY_MULTIPLE in startup_psoc6_02_cm0plus.S */ [all …]
|
/mcuboot-2.7.6/ext/nrf/ |
D | README.md | 9 …IGNATURE_TYPE_ECDSA_P256` is selected not `CONFIG_BOOT_SIGNATURE_TYPE_RSA` in `prj.conf` of `boot/… 10 …nto `menuconfig` and change the implementation selection to `cc310` or also set this in `prj.conf`. 18 Build a hello world example in zephyr and sign it with imgtool.py with the `root-ec-p256.pem` and f…
|
/mcuboot-2.7.6/boot/zephyr/ |
D | Kconfig | 143 with the public key information will be written in a format expected by 172 in MCUBoot. If enabled the public key is appended to the signed image 177 bool "Validate image in the primary slot on every boot" 207 If y, the swap upgrade is done in two steps, where first every 209 each sector X in the secondary slot, it is moved to index X in 210 the primary slot, then the sector at X+1 in the primary is 211 moved to index X in the secondary. 213 but is currently limited to all sectors in both slots being of 223 mode results in a simpler code path and smaller code size. 228 bool "Enable the revert mechanism in direct-xip mode" [all …]
|
/mcuboot-2.7.6/boot/cypress/ |
D | README.md | 5 Given solution is included in `mcuboot` repository with purpose to demonstrate basic consepts and f… 12 2. MCUboot-Based Bootloader with Rollback to Factory App in External Flash [mtb-example-anycloud-mc… 29 …sible to place secondary (upgrade) slots in external memory module. In this case primary slot can … 61 …p bootloader application and sample user applocation are located in `Readme.md` files in correspon… 77 *Make* - make sure it is added to system's `PATH` variable and correct path is first in the list; 79 *Python/Python3* - make sure you have correct path referenced in `PATH`; 83 This will inherit system's PATH so should find `python3.7` installed in regular way as well as imgt…
|
/mcuboot-2.7.6/boot/cypress/BlinkyApp/linker/ |
D | BlinkyApp_template.ld | 7 * The main purpose of the linker script is to describe how the sections in the 16 * defined in the linker files. In that case you may see warnings during the 18 * relevant code in the linker file. 26 * you may not use this file except in compliance with the License. 31 * Unless required by applicable law or agreed to in writing, software 50 /* Force symbol to be entered in the output file as an undefined symbol. Doing 58 /* The MEMORY section below describes the location and size of blocks of memory in the target. 67 …* Your changes must be aligned with the corresponding memory regions for CM0+ core in 'xx_cm0plus.… 95 * It references following symbols, which must be defined in code: 183 * define __STARTUP_COPY_MULTIPLE in startup_psoc6_02_cm4.S */ [all …]
|
/mcuboot-2.7.6/boot/cypress/platforms/PSOC_062_2M/CM0P/GCC_ARM/ |
D | cy8c6xxa_cm0plus.ld | 7 * The main purpose of the linker script is to describe how the sections in the 16 * defined in the linker files. In that case you may see warnings during the 18 * relevant code in the linker file. 26 * you may not use this file except in compliance with the License. 31 * Unless required by applicable law or agreed to in writing, software 46 /* Force symbol to be entered in the output file as an undefined symbol. Doing 54 /* The MEMORY section below describes the location and size of blocks of memory in the target. 63 …* Your changes must be aligned with the corresponding memory regions for the CM4 core in 'xx_cm4_d… 91 * It references following symbols, which must be defined in code: 184 * define __STARTUP_COPY_MULTIPLE in startup_psoc6_02_cm0plus.S */ [all …]
|
/mcuboot-2.7.6/ |
D | LICENSE | 35 "Work" shall mean the work of authorship, whether in Source or 37 copyright notice that is included in or attached to the work 38 (an example is provided in the Appendix below). 40 "Derivative Works" shall mean any work, whether in Source or Object 51 submitted to Licensor for inclusion in the Work by the copyright owner 60 designated in writing by the copyright owner as "Not a Contribution." 71 Work and such Derivative Works in Source or Object form. 76 (except as stated in this section) patent license to make, have made, 83 cross-claim or counterclaim in a lawsuit) alleging that the Work 90 Work or Derivative Works thereof in any medium, with or without [all …]
|