Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 19 of 19) sorted by relevance

/mcuboot-3.7.0/scripts/imgtool/keys/
Drsa_test.py21 from imgtool.keys import load, RSA, RSAUsageError
39 RSA.generate(key_size=1024)
43 k = RSA.generate(key_size=key_size)
64 k = RSA.generate(key_size=key_size)
98 k = RSA.generate(key_size=key_size)
114 k = RSA.generate(key_size=key_size)
D__init__.py33 from .rsa import RSA, RSAPublic, RSAUsageError, RSA_KEY_SIZES
73 return RSA(pk)
Drsa.py85 class RSA(RSAPublic, PrivateBytesMixin): class
103 return RSA(pk)
/mcuboot-3.7.0/samples/zephyr/bad-keys/
Dbad-rsa-2048.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
/mcuboot-3.7.0/
Denc-rsa2048-priv.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
Droot-rsa-2048.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
Droot-rsa-3072.pem1 -----BEGIN RSA PRIVATE KEY-----
39 -----END RSA PRIVATE KEY-----
/mcuboot-3.7.0/testplan/mynewt/
Dkey_rsa.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
Dkey_rsa_2.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
/mcuboot-3.7.0/sim/mcuboot-sys/
DCargo.toml14 # Verify RSA signatures. Note that at this time, the C code will not
18 # Verify RSA-3072 signatures.
44 # Encrypt image in the secondary slot using RSA-OAEP-2048
47 # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048
/mcuboot-3.7.0/boot/espressif/include/crypto_config/
Drsa.cmake27 message(FATAL_ERROR "RSA signature verification using Tinycrypt lib is not supported")
/mcuboot-3.7.0/sim/
DREADME.rst42 testing RSA signatures can be done with::
/mcuboot-3.7.0/docs/
Dtestplan-mynewt.md5 ### Basic sign support (RSA/EC/EC256)
28 *If testing RSA/PSS `newt create-image` needs to be passed in the extra*
Dreadme-riot.md38 default key type is RSA-2048.
Dreadme-espressif.md235 The image that MCUboot is booting can be signed with 4 types of keys: RSA-2048, RSA-3072, EC256 and
269 #### For RSA (2048 or 3072) algorithm use
276 # Use Mbed TLS lib for RSA image signing
301 is hardware-assisted and RSA based - except ESP32-C2 that uses ECDSA signing scheme - and has the
318 For the currently supported chips, with exception of ESP32-C2, enable RSA signing scheme:
407 authenticity. The signature block contains the RSA-3072 signature of that image and the RSA-3072
433 3. Use the public key to verify the signature of the bootloader image, using RSA-PSS with the
646 1. ROM bootloader validates the MCUboot bootloader using RSA signature verification.
647 2. MCUboot bootloader validates the image using the chosen algorithm EC256/RSA/ED25519. It also
Drelease-notes.md307 ECIES with secp256r1 as an Elliptic Curve alternative to RSA-OAEP. A
374 - Added RSA-3072 signing support
496 - Support for PKCS#1 v1.5 signatures has been dropped. All RSA
510 - The simulator is now able to test RSA signatures.
536 - RSA 2048 and RSA PKCS#1 v1.5 or v2.1
545 - RSA 2048 needs Mbed TLS
/mcuboot-3.7.0/scripts/imgtool/
Dmain.py39 keys.RSA.generate().export_private(path=keyfile, passwd=passwd)
43 keys.RSA.generate(key_size=3072).export_private(path=keyfile,
435 or (isinstance(key, keys.RSA) and
/mcuboot-3.7.0/boot/zephyr/
DKconfig79 bool "RSA signatures"
86 int "RSA signature length"
341 - RSA-OAEP (2048 bits).
354 Hidden option selecting RSA encryption.
DCMakeLists.txt196 # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file