/mcuboot-3.7.0/scripts/imgtool/keys/ |
D | privatebytes.py | 7 def _get_private_bytes(self, minimal, format, exclass): argument 8 if format is None: 9 format = self._DEFAULT_FORMAT 10 if format not in self._VALID_FORMATS: 11 raise exclass("{} does not support {}".format( 12 self.shortname(), format)) 13 return format, self.key.private_bytes( 15 format=self._VALID_FORMATS[format],
|
D | x25519.py | 27 raise X25519UsageError("Operation {} requires private key".format(name)) 36 format=serialization.PublicFormat.SubjectPublicKeyInfo) 41 format=serialization.PublicFormat.SubjectPublicKeyInfo) 43 def get_private_bytes(self, minimal, format): argument 53 format=serialization.PublicFormat.SubjectPublicKeyInfo) 89 def get_private_bytes(self, minimal, format): argument 90 _, priv = self._get_private_bytes(minimal, format, 105 format=serialization.PrivateFormat.PKCS8,
|
D | ed25519.py | 26 raise Ed25519UsageError("Operation {} requires private key".format(name)) 35 format=serialization.PublicFormat.SubjectPublicKeyInfo) 37 def get_private_bytes(self, minimal, format): argument 47 format=serialization.PublicFormat.SubjectPublicKeyInfo) 85 def get_private_bytes(self, minimal, format): argument 86 raise Ed25519UsageError("Operation not supported with {} keys".format( 100 format=serialization.PrivateFormat.PKCS8,
|
D | rsa.py | 37 raise RSAUsageError("Operation {} requires private key".format(name)) 46 format=serialization.PublicFormat.PKCS1) 51 format=serialization.PublicFormat.SubjectPublicKeyInfo) 53 def get_private_bytes(self, minimal, format): argument 63 format=serialization.PublicFormat.SubjectPublicKeyInfo) 68 return "PKCS1_PSS_RSA{}_SHA256".format(self.key_size()) 71 return"RSA{}".format(self.key_size()) 98 .format(key_size)) 147 def get_private_bytes(self, minimal, format): argument 148 _, priv = self._get_private_bytes(minimal, format, RSAUsageError) [all …]
|
D | ecdsa.py | 30 raise ECDSAUsageError("Operation {} requires private key".format(name)) 39 format=serialization.PublicFormat.SubjectPublicKeyInfo) 44 format=serialization.PublicFormat.SubjectPublicKeyInfo) 46 def get_private_bytes(self, minimal, format): argument 56 format=serialization.PublicFormat.SubjectPublicKeyInfo) 71 def _build_minimal_ecdsa_privkey(self, der, format): argument 77 if format == serialization.PrivateFormat.OpenSSH: 84 if format == serialization.PrivateFormat.PKCS8: 105 elif format == serialization.PrivateFormat.TraditionalOpenSSL: 121 def get_private_bytes(self, minimal, format): argument [all …]
|
D | general.py | 48 print("0x{:02x},".format(b), end='', file=file) 51 print(len_format.format(len(encoded_bytes)), file=file) 66 .format(self.shortname()), 71 .format(self.shortname()), 79 .format(self.shortname()), 84 .format(self.shortname()), 98 .format(self.shortname().upper()), 108 def emit_private(self, minimal, format, file=sys.stdout): argument 112 encoded_bytes=self.get_private_bytes(minimal, format),
|
/mcuboot-3.7.0/boot/nuttx/include/mcuboot_config/ |
D | mcuboot_logging.h | 36 #define MCUBOOT_LOG_ERR(format, ...) \ argument 37 syslog(LOG_ERR, "%s: " format "\n", __FUNCTION__, ##__VA_ARGS__) 39 #define MCUBOOT_LOG_WRN(format, ...) \ argument 40 syslog(LOG_WARNING, "%s: " format "\n", __FUNCTION__, ##__VA_ARGS__) 42 #define MCUBOOT_LOG_INF(format, ...) \ argument 43 syslog(LOG_INFO, "%s: " format "\n", __FUNCTION__, ##__VA_ARGS__) 45 #define MCUBOOT_LOG_DBG(format, ...) \ argument 46 syslog(LOG_DEBUG, "%s: " format "\n", __FUNCTION__, ##__VA_ARGS__)
|
/mcuboot-3.7.0/ci/fih_test_docker/ |
D | generate_test_report.py | 23 print("{:s}: {:d}.".format(CATEGORIES['TOTAL'], test_stats[CATEGORIES['TOTAL']])) 24 print("{:s} ({:d}):".format(CATEGORIES['SUCCESS'], test_stats[CATEGORIES['SUCCESS']])) 25 …print(" {:s}: ({:d}):".format(CATEGORIES['ADDRES_NOEXEC'], test_stats[CATEGORIES['ADDRES_NOEXEC… 27 print(" {:s}: ({:d}):".format(CATEGORIES['SKIPPED'], test_with_skip)) 28 …print(" {:s} ({:d}):".format(CATEGORIES['NO_BOOT'], test_with_skip - test_stats[CATEGORIES['BOO… 30 print(" last line: {:s} ({:d})".format(last_line, failed_boot_last_lines[last_line])) 31 print(" {:s} ({:d})".format(CATEGORIES['BOOT'], test_stats[CATEGORIES['BOOT']])) 32 …print("{:s} ({:d}):".format(CATEGORIES['FAILED'], test_stats[CATEGORIES['TOTAL']] - test_stats[CAT… 34 print(" {:s} ({:d})".format(reason, exec_fail_reasons[reason]))
|
D | damage_image.py | 27 return tlvs.get(tlv_type, "UNKNOWN({:d})".format(tlv_type)) 56 " ih_magic = 0x{:X}".format(self.ih_magic), 85 " it_magic = 0x{:X}".format(self.it_magic), 102 (tlv.it_value) = struct.unpack('<{:d}s'.format(tlv.it_len), in_file.read(tlv.it_len)) 129 logging.info(" Damaging TLV at offset 0x{:X}...".format(damage_offset)) 145 …raise Exception("Invalid magic in image_header: 0x{:X} instead of 0x{:X}".format(image_header.ih_m… 153 logging.debug("Protected TLV found at offset 0x{:X}".format(tlv_info_offset)) 155 …raise Exception("Invalid prot TLV len ({:d} vs. {:d})".format(image_header.ih_protect_tlv_size, tl… 166 logging.debug("Unprotected TLV found at offset 0x{:X}".format(tlv_info_offset)) 168 …raise Exception("Invalid magic in tlv info: 0x{:X} instead of 0x{:X}".format(tlv_info.it_magic, TL… [all …]
|
/mcuboot-3.7.0/ci/ |
D | compare_versions.py | 48 print("Invalid version parsed: {}".format(version)) 54 print("Invalid version parsed: {}".format(version)) 61 print("Upgrade detected ({} > {})".format(new, old)) 64 print("Downgrade detected ({} < {})".format(new, old))
|
D | check-signed-off-by.sh | 19 commits=$(git show -s --format=%h ${1}~..HEAD) 21 parents=(`git log -n 1 --format=%p HEAD`) 26 commits=$(git show -s --format=%h ${parents[0]}..${parents[1]})
|
D | get_features.py | 35 print("Error reading \"{}\"".format(args.infile))
|
/mcuboot-3.7.0/scripts/imgtool/ |
D | dumpinfo.py | 54 return "(len: {}, if BOOT_SWAP_SAVE_ENCTLV is unset)".format(hex(key_field_len)) 72 magic += "{0:#04x} ".format(trailer_magic[i]) 106 print(" " * indent, "{}: {} ({})".format( 109 print(" " * indent, "{}: {} ({})".format( 111 print(" " * indent, "{}: ".format(tlv_length), hex(tlv[tlv_length])) 112 print(" " * indent, "{}: ".format(tlv_data), end="") 115 print("{0:#04x}".format(data), end=" ") 136 raise click.UsageError("Image file not found ({})".format(imgfile)) 145 header[key] = "{}.{}.{}+{}".format(*_version) 271 flag_string += "{} ({})".format( [all …]
|
D | main.py | 115 help='{}'.format('One of: {}'.format(', '.join(keygens.keys())))) 127 'Valid langs: {}'.format(', '.join(valid_langs))) 130 help='Valid encodings: {}'.format(', '.join(valid_encodings))) 166 .format(', '.join(valid_hash_encodings), 198 help='Valid formats: {}'.format(', '.join(valid_formats)) 201 def getpriv(key, minimal, format): argument 206 key.emit_private(minimal, format) 220 print("Image version: {}.{}.{}+{}".format(*version)) 221 print("Image digest: {}".format(digest.hex())) 234 print("Unknown return code: {}".format(ret)) [all …]
|
D | image.py | 121 "value should be between 0x{:04x} and 0x{:04x}".format( 214 max_sectors={}, overwrite_only={}, endian={} format={}, \ 303 "requested size 0x{:x}".format( 328 format=PublicFormat.UncompressedPoint) 332 format=PublicFormat.Raw) 374 "maximum allowed length is 12 characters.".format( 609 raise click.BadParameter("Invalid alignment: {}".format(
|
/mcuboot-3.7.0/ext/mbedtls-asn1/include/mbedtls/ |
D | platform.h | 161 extern int (*mbedtls_fprintf)( FILE *stream, const char *format, ... ); 186 extern int (*mbedtls_printf)( const char *format, ... ); 221 extern int (*mbedtls_snprintf)( char * s, size_t n, const char * format, ... ); 232 const char * format, ... ) ); 258 extern int (*mbedtls_vsnprintf)( char * s, size_t n, const char * format, va_list arg ); 268 const char * format, va_list arg ) );
|
D | ecp.h | 741 int format, size_t *olen, 816 int format, size_t *olen,
|
/mcuboot-3.7.0/scripts/ |
D | mcubin.bt | 58 uint32 magic <format=hex>; 59 uint32 load_addr <format=hex>; 60 uint16 hdr_size <format=hex>; 61 uint16 protect_size <format=hex>; 62 uint32 img_size <format=hex>; 74 uchar type <format=hex>;
|
D | assemble.py | 86 print("partition {}, pos={}, offset={}".format(partition, pos, self.offsets[partition])) 95 raise Exception("Image {} is too large for partition".format(source)) 104 raise Exception("Expected CONFIG_BOARD line in {}".format(dot_config))
|
/mcuboot-3.7.0/sim/simflash/src/ |
D | pdump.rs | 36 self.hex.push_str(&format!(" {:02x}", ch)[..]); in add_byte()
|
/mcuboot-3.7.0/boot/espressif/tools/ |
D | utils.cmake | 5 # Parse config files (.conf, format: <CONFIG_NAME>=<VALUE>) and set each as
|
/mcuboot-3.7.0/scripts/tests/ |
D | test_keys.py | 104 def test_getpriv(key_type, format, tmp_path_persistent): argument 117 format,
|
/mcuboot-3.7.0/docs/release-notes.d/ |
D | 00readme.md | 18 ## Release note format
|
/mcuboot-3.7.0/docs/ |
D | imgtool.md | 51 Image signing takes an image in binary or Intel Hex format intended for the 59 extension, otherwise binary format is used 63 --public-key-format [hash|full] 129 The `--public-key-format` argument can be used to distinguish where the public
|
D | release.md | 8 follow a `MAJOR.MINOR.PATCH` format with the following guidelines on 16 We add pre-release tags using the format `MAJOR.MINOR.PATCH-rc1`. 19 format `MAJOR.MINOR.PATCH-dev`.
|