Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 10 of 10) sorted by relevance

/mcuboot-3.6.0/scripts/imgtool/keys/
Drsa_test.py39 RSA.generate(key_size=1024)
41 for key_size in RSA_KEY_SIZES:
43 k = RSA.generate(key_size=key_size)
63 for key_size in RSA_KEY_SIZES:
64 k = RSA.generate(key_size=key_size)
78 for key_size in RSA_KEY_SIZES:
79 k = RSA.generate(key_size=key_size)
94 for key_size in RSA_KEY_SIZES:
95 k = RSA.generate(key_size=key_size)
D__init__.py71 if pk.key_size not in RSA_KEY_SIZES:
72 raise Exception("Unsupported RSA key size: " + pk.key_size)
75 if pk.key_size not in RSA_KEY_SIZES:
76 raise Exception("Unsupported RSA key size: " + pk.key_size)
81 if pk.key_size not in (256, 384):
82 raise Exception("Unsupported EC size: " + pk.key_size)
90 if pk.key_size not in (256, 384):
91 raise Exception("Unsupported EC size: " + pk.key_size)
Drsa.py30 def key_size(self): member in RSAPublic
31 return self.key.key_size
68 return "PKCS1_PSS_RSA{}_SHA256".format(self.key_size())
71 return"RSA{}".format(self.key_size())
74 return self.key_size() / 8
95 def generate(key_size=2048): argument
96 if key_size not in RSA_KEY_SIZES:
98 .format(key_size))
101 key_size=key_size,
/mcuboot-3.6.0/ext/tinycrypt/lib/source/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
43 for (i = 0; i < key_size; ++i) { in rekey()
53 unsigned int key_size) in tc_hmac_set_key() argument
59 key_size == 0) { in tc_hmac_set_key()
63 const uint8_t dummy_key[key_size]; in tc_hmac_set_key()
66 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key()
77 key_size); in tc_hmac_set_key()
82 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
/mcuboot-3.6.0/boot/bootutil/include/bootutil/crypto/
Dhmac_sha256.h52 …l_hmac_sha256_set_key(bootutil_hmac_sha256_context *ctx, const uint8_t *key, unsigned int key_size) in bootutil_hmac_sha256_set_key() argument
55 rc = tc_hmac_set_key(ctx, key, key_size); in bootutil_hmac_sha256_set_key()
103 …l_hmac_sha256_set_key(bootutil_hmac_sha256_context *ctx, const uint8_t *key, unsigned int key_size) in bootutil_hmac_sha256_set_key() argument
111 rc = mbedtls_md_hmac_starts(ctx, key, key_size); in bootutil_hmac_sha256_set_key()
Decdsa.h413 size_t key_size; in bootutil_ecdsa_parse_public_key() local
437 get_public_key_from_rfc5280_encoding(cp, &key_size); in bootutil_ecdsa_parse_public_key()
443 return (int)psa_import_key(&key_attributes, *cp, key_size, &ctx->key_id); in bootutil_ecdsa_parse_public_key()
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/
Dhmac.h93 unsigned int key_size);
/mcuboot-3.6.0/boot/espressif/hal/src/
Dflash_encrypt.c158 size_t key_size = 32; in check_and_generate_encryption_keys() local
170 key_size = 24; in check_and_generate_encryption_keys()
189 key_size = 16; in check_and_generate_encryption_keys()
219 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
/mcuboot-3.6.0/boot/zephyr/
DCMakeLists.txt440 set(key_size 0) variable
466 set(key_size 256) variable
468 math(EXPR key_size "65 + 32 + ${boot_enc_key_size}")
470 math(EXPR key_size "32 + 32 + ${boot_enc_key_size}")
473 set(key_size "${boot_enc_key_size}") variable
476 align_up(${key_size} ${write_size} key_size)
477 math(EXPR key_size "${key_size} * 2")
494 …math(EXPR required_size "${key_size} + ${boot_magic_size} + ${boot_swap_data_size} + ${boot_status…
/mcuboot-3.6.0/scripts/imgtool/
Dmain.py43 keys.RSA.generate(key_size=3072).export_private(path=keyfile,