Home
last modified time | relevance | path

Searched refs:block (Results 1 – 14 of 14) sorted by relevance

/mcuboot-latest/boot/espressif/hal/src/
Dsecure_boot.c30 static esp_err_t validate_signature_block(const ets_secure_boot_sig_block_t *block, int block_num, … in validate_signature_block() argument
32 if (block->magic_byte != ETS_SECURE_BOOT_V2_SIGNATURE_MAGIC) { in validate_signature_block()
37 if (block->block_crc != esp_rom_crc32_le(0, (uint8_t *)block, CRC_SIGN_BLOCK_LEN)) { in validate_signature_block()
41 if (memcmp(image_digest, block->image_digest, ESP_SECURE_BOOT_DIGEST_LEN)) { in validate_signature_block()
92 const ets_secure_boot_sig_block_t *block = &signatures->block[i]; in s_calculate_image_public_key_digests() local
94 ret = validate_signature_block(block, i, image_digest); in s_calculate_image_public_key_digests()
104 bootloader_sha256_data(sig_block_sha, &block->key, sizeof(block->key)); in s_calculate_image_public_key_digests()
106 bootloader_sha256_data(sig_block_sha, &block->ecdsa.key, sizeof(block->ecdsa.key)); in s_calculate_image_public_key_digests()
113 …bool verified = ets_rsa_pss_verify(&block->key, block->signature, image_digest, temp_verified_dige… in s_calculate_image_public_key_digests()
115 …bool verified = ets_ecdsa_verify(&block->ecdsa.key.point[0], block->ecdsa.signature, block->ecdsa.… in s_calculate_image_public_key_digests()
/mcuboot-latest/docs/release-notes.d/
Dcompatible-slots.md1 - Added optional write block size checking to ensure expected
6 and write block sizes in dts vs actual hardware configuration
/mcuboot-latest/boot/zephyr/boards/
Dnrf52840dk_ram.overlay37 erase-block-size = <4096>;
38 write-block-size = <1>;
Dnrf52840dk_ram_multi.overlay45 erase-block-size = <4096>;
46 write-block-size = <1>;
/mcuboot-latest/boot/zephyr/
DCMakeLists.txt382 dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size")
383 dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size")
400 dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size")
401 dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size")
462 # Check both slots for the one with the largest write/erase block size
463 dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size")
464 dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size")
465 dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size")
466 dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size")
492 dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size")
[all …]
/mcuboot-latest/boot/cypress/MCUBootApp/
DExternalMemory.md21 This corresponds to PSoC6's SMIF (Serial Memory InterFace) IP block mapping.
57 …all to Init-SFDP API which performs required GPIO configurations, SMIF IP block configurations, SF…
/mcuboot-latest/sim/src/
Dtlv.rs746 let block = Aes256::new(&key); in make_tlv() localVariable
747 let mut cipher = Aes256Ctr::from_block_cipher(block, &nonce); in make_tlv()
751 let block = Aes128::new(&key); in make_tlv() localVariable
752 let mut cipher = Aes128Ctr::from_block_cipher(block, &nonce); in make_tlv()
Dimage.rs1857 let block = Aes256::new(&key); in install_image() localVariable
1858 let mut cipher = Aes256Ctr::from_block_cipher(block, &nonce); in install_image()
1862 let block = Aes128::new(&key); in install_image() localVariable
1863 let mut cipher = Aes128Ctr::from_block_cipher(block, &nonce); in install_image()
/mcuboot-latest/scripts/
Dmcubin.bt124 // uchar block[ptable.entries[i].size];
/mcuboot-latest/docs/
Decdsa.md84 removed any trailing 0 bytes from the data block. This turned out to be fine 255 out of 256
Dreadme-espressif.md406 Secure boot uses a signature block appended to the bootloader image in order to verify the
407 authenticity. The signature block contains the RSA-3072 signature of that image and the RSA-3072
426 2. ROM bootloader verifies the bootloader's signature block integrity (magic number and CRC).
430 block with the digest saved in the eFuses.
432 block.
Drelease-notes.md487 block appended to the image. This allows
/mcuboot-latest/boot/cypress/BlinkyApp/
DReadme.md100 Note: for S25FL512S block address shuld be mutiple by 0x40000
/mcuboot-latest/ext/tinycrypt/documentation/
Dtinycrypt.rst166 need to replace the key after 2^32 block encryptions.