/mcuboot-2.7.6/ext/tinycrypt/lib/source/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 44 key[i] = inner_pad ^ new_key[i]; in rekey() 45 key[i + TC_SHA256_BLOCK_SIZE] = outer_pad ^ new_key[i]; in rekey() 48 key[i] = inner_pad; key[i + TC_SHA256_BLOCK_SIZE] = outer_pad; in rekey() 52 int tc_hmac_set_key(TCHmacState_t ctx, const uint8_t *key, in tc_hmac_set_key() argument 58 key == (const uint8_t *) 0 || in tc_hmac_set_key() 78 (void)tc_sha256_final(&dummy_state.key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key() 82 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key() 86 (void)tc_sha256_final(&ctx->key[TC_SHA256_DIGEST_SIZE], in tc_hmac_set_key() [all …]
|
D | hmac_prng.c | 88 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update() 90 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update() 102 (void)tc_hmac_final(prng->key, sizeof(prng->key), &prng->h); in update() 104 (void)tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in update() 125 _set(prng->key, 0x00, sizeof(prng->key)); in tc_hmac_prng_init() 127 tc_hmac_set_key(&prng->h, prng->key, sizeof(prng->key)); in tc_hmac_prng_init()
|
D | ctr_prng.c | 93 (void)tc_aes_encrypt(output_block, ctx->V, &ctx->key); in tc_ctr_prng_update() 110 (void)tc_aes128_set_encrypt_key(&ctx->key, temp); in tc_ctr_prng_update() 148 (void)tc_aes128_set_encrypt_key(&ctx->key, zeroArr); in tc_ctr_prng_init() 247 (void)tc_aes_encrypt(output_block, ctx->V, &ctx->key); in tc_ctr_prng_generate() 275 memset(ctx->key.words, 0x00, sizeof ctx->key.words); in tc_ctr_prng_uninstantiate()
|
/mcuboot-2.7.6/ext/tinycrypt/tests/ |
D | test_hmac.c | 75 const uint8_t key[20] = { in test_1() local 90 (void)tc_hmac_set_key(&h, key, sizeof(key)); in test_1() 101 const uint8_t key[4] = { in test_2() local 117 (void)tc_hmac_set_key(&h, key, sizeof(key)); in test_2() 129 const uint8_t key[20] = { in test_3() local 148 (void)tc_hmac_set_key(&h, key, sizeof(key)); in test_3() 161 const uint8_t key[25] = { in test_4() local 181 (void)tc_hmac_set_key(&h, key, sizeof(key)); in test_4() 193 const uint8_t key[20] = { in test_5() local 209 (void)tc_hmac_set_key(&h, key, sizeof(key)); in test_5() [all …]
|
D | test_ccm_mode.c | 70 int do_test(const uint8_t *key, uint8_t *nonce, in do_test() argument 84 tc_aes128_set_encrypt_key(&sched, key); in do_test() 136 const uint8_t key[NUM_NIST_KEYS] = { in test_vector_1() local 163 result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), in test_vector_1() 173 const uint8_t key[NUM_NIST_KEYS] = { in test_vector_2() local 200 result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), in test_vector_2() 210 const uint8_t key[NUM_NIST_KEYS] = { in test_vector_3() local 239 result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, in test_vector_3() 249 const uint8_t key[NUM_NIST_KEYS] = { in test_vector_4() local 277 result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), in test_vector_4() [all …]
|
D | test_cbc_mode.c | 72 const uint8_t key[16] = { variable 114 (void)tc_aes128_set_encrypt_key(&a, key); in test_1_and_2() 132 (void)tc_aes128_set_decrypt_key(&a, key); in test_1_and_2()
|
/mcuboot-2.7.6/scripts/imgtool/keys/ |
D | x25519.py | 19 def __init__(self, key): argument 20 self.key = key 29 return self.key 66 def __init__(self, key): argument 68 self.key = key 76 return self.key.public_key() 79 return self.key.private_bytes( 93 pem = self.key.private_bytes( 102 return self.key.sign(data=digest) 106 k = self.key [all …]
|
D | ed25519.py | 19 def __init__(self, key): argument 20 self.key = key 29 return self.key 66 def __init__(self, key): argument 68 self.key = key 76 return self.key.public_key() 91 pem = self.key.private_bytes( 100 return self.key.sign(data=digest) 104 k = self.key 105 if isinstance(self.key, ed25519.Ed25519PrivateKey): [all …]
|
D | rsa.py | 26 def __init__(self, key): argument 27 self.key = key 30 return self.key.key_size 39 return self.key 71 k = self.key 72 if isinstance(self.key, rsa.RSAPrivateKey): 73 k = self.key.public_key() 84 def __init__(self, key): argument 86 self.key = key 100 return self.key.public_key() [all …]
|
D | ecdsa.py | 18 def __init__(self, key): argument 19 self.key = key 28 return self.key 73 k = self.key 74 if isinstance(self.key, ec.EllipticCurvePrivateKey): 75 k = self.key.public_key() 85 def __init__(self, key): argument 87 self.key = key 98 return self.key.public_key() 125 priv = self.key.private_bytes( [all …]
|
/mcuboot-2.7.6/boot/zephyr/ |
D | keys.c | 55 .key = rsa_pub_key, 58 .key = ecdsa_pub_key, 61 .key = ed25519_pub_key, 72 .key = 0, 185 .key = enc_priv_key, 199 .key = enc_priv_key, 211 .key = enc_key,
|
/mcuboot-2.7.6/boot/cypress/MCUBootApp/ |
D | keys.c | 149 .key = rsa_pub_key, 155 .key = ecdsa_pub_key, 160 .key = NULL, 171 .key = 0, 194 .key = enc_priv_key,
|
/mcuboot-2.7.6/scripts/imgtool/ |
D | main.py | 74 key = keys.load(keyfile) 75 if key is not None: 76 return key 101 def keygen(type, key, password): argument 103 keygens[type](key, password) 110 def getpub(key, lang): argument 111 key = load_key(key) 112 if key is None: 115 key.emit_c_public() 117 key.emit_rust_public() [all …]
|
/mcuboot-2.7.6/testplan/mynewt/keys/ec/src/ |
D | keys.c | 2 static unsigned char key[] = { variable 14 .key = key,
|
/mcuboot-2.7.6/testplan/mynewt/keys/ec256/src/ |
D | keys.c | 2 static unsigned char key[] = { variable 15 .key = key,
|
/mcuboot-2.7.6/testplan/mynewt/keys/rsa/src/ |
D | keys.c | 2 static unsigned char key[] = { variable 30 .key = key,
|
/mcuboot-2.7.6/sim/mcuboot-sys/csupport/ |
D | keys.c | 141 .key = root_pub_der, 253 .key = enc_key, 274 .key = enc_key, 291 .key = enc_key, 305 .key = enc_key,
|
/mcuboot-2.7.6/boot/mbed/ |
D | app_enc_keys.c | 45 .key = rsa_pub_key, 48 .key = ecdsa_pub_key, 51 .key = ed25519_pub_key, 64 .key = enc_priv_key,
|
/mcuboot-2.7.6/boot/bootutil/include/bootutil/crypto/ |
D | aes_kw.h | 58 …context *ctx, const uint8_t *wrapped_key, uint32_t wrapped_key_len, uint8_t *key, uint32_t key_len) in bootutil_aes_kw_unwrap() argument 61 …return mbedtls_nist_kw_unwrap(ctx, MBEDTLS_KW_MODE_KW, wrapped_key, wrapped_key_len, key, &olen, k… in bootutil_aes_kw_unwrap() 96 …context *ctx, const uint8_t *wrapped_key, uint32_t wrapped_key_len, uint8_t *key, uint32_t key_len) in bootutil_aes_kw_unwrap() argument 108 key[k] = wrapped_key[8 + k]; in bootutil_aes_kw_unwrap() 109 key[8 + k] = wrapped_key[16 + k]; in bootutil_aes_kw_unwrap() 116 B[8 + k] = key[((i-1) * 8) + k]; in bootutil_aes_kw_unwrap() 124 key[((i-1) * 8) + k] = B[8 + k]; in bootutil_aes_kw_unwrap()
|
D | hmac_sha256.h | 53 …util_hmac_sha256_set_key(bootutil_hmac_sha256_context *ctx, const uint8_t *key, unsigned int key_s… in bootutil_hmac_sha256_set_key() argument 56 rc = tc_hmac_set_key(ctx, key, key_size); in bootutil_hmac_sha256_set_key() 104 …util_hmac_sha256_set_key(bootutil_hmac_sha256_context *ctx, const uint8_t *key, unsigned int key_s… in bootutil_hmac_sha256_set_key() argument 112 rc = mbedtls_md_hmac_starts(ctx, key, key_size); in bootutil_hmac_sha256_set_key()
|
/mcuboot-2.7.6/docs/ |
D | imgtool.md | 20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used 23 This key file is what is used to sign images, this file should be 28 time you use the private key. 30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code) 32 There is a development key distributed with mcuboot that can be used 33 for testing. Since this private key is widely distributed, it should 35 key, as described above, you should replace the public key in the 40 the key file. 44 will extract the public key from the given private key file, and 46 into the key file. However, when the `MCUBOOT_HW_KEY` config option is [all …]
|
D | readme-riot.md | 36 The application will be automatically signed with the provided key. 37 If no key is provided, a new key will be automatically generated. The 38 default key type is RSA-2048. 40 In order to use your provided key, you need to recompile the bootloader 41 using you public key, either in Zephyr or Mynewt by following the
|
/mcuboot-2.7.6/boot/bootutil/include/bootutil/ |
D | sign_key.h | 34 const uint8_t *key; member 41 uint8_t *key;
|
/mcuboot-2.7.6/ptest/src/ |
D | main.rs | 105 let key = fs.textual(); in start() localVariable 106 if self.running.contains(&key) || self.done.contains(&key) { in start() 107 warn!("Duplicate: {:?}", key); in start() 109 debug!("Starting: {} ({} running)", key, self.running.len() + 1); in start() 110 self.running.insert(key); in start() 115 let key = fs.textual(); in done() localVariable 116 self.running.remove(&key); in done() 117 self.done.insert(key.clone()); in done() 142 error!("Failure {} log:{:?} ({} running)", key, logname, in done() 148 error!("Unable to run test {:?} ({:?}", key, err); in done()
|
/mcuboot-2.7.6/ext/tinycrypt/lib/include/tinycrypt/ |
D | hmac.h | 76 uint8_t key[2*TC_SHA256_BLOCK_SIZE]; member 92 int tc_hmac_set_key(TCHmacState_t ctx, const uint8_t *key,
|