Searched refs:block (Results 1 – 14 of 14) sorted by relevance
/mcuboot-latest/boot/espressif/hal/src/ |
D | secure_boot.c | 30 static esp_err_t validate_signature_block(const ets_secure_boot_sig_block_t *block, int block_num, … in validate_signature_block() argument 32 if (block->magic_byte != ETS_SECURE_BOOT_V2_SIGNATURE_MAGIC) { in validate_signature_block() 37 if (block->block_crc != esp_rom_crc32_le(0, (uint8_t *)block, CRC_SIGN_BLOCK_LEN)) { in validate_signature_block() 41 if (memcmp(image_digest, block->image_digest, ESP_SECURE_BOOT_DIGEST_LEN)) { in validate_signature_block() 92 const ets_secure_boot_sig_block_t *block = &signatures->block[i]; in s_calculate_image_public_key_digests() local 94 ret = validate_signature_block(block, i, image_digest); in s_calculate_image_public_key_digests() 104 bootloader_sha256_data(sig_block_sha, &block->key, sizeof(block->key)); in s_calculate_image_public_key_digests() 106 bootloader_sha256_data(sig_block_sha, &block->ecdsa.key, sizeof(block->ecdsa.key)); in s_calculate_image_public_key_digests() 113 …bool verified = ets_rsa_pss_verify(&block->key, block->signature, image_digest, temp_verified_dige… in s_calculate_image_public_key_digests() 115 …bool verified = ets_ecdsa_verify(&block->ecdsa.key.point[0], block->ecdsa.signature, block->ecdsa.… in s_calculate_image_public_key_digests()
|
/mcuboot-latest/docs/release-notes.d/ |
D | compatible-slots.md | 1 - Added optional write block size checking to ensure expected 6 and write block sizes in dts vs actual hardware configuration
|
/mcuboot-latest/boot/zephyr/boards/ |
D | nrf52840dk_ram.overlay | 37 erase-block-size = <4096>; 38 write-block-size = <1>;
|
D | nrf52840dk_ram_multi.overlay | 45 erase-block-size = <4096>; 46 write-block-size = <1>;
|
/mcuboot-latest/boot/zephyr/ |
D | CMakeLists.txt | 382 dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size") 383 dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size") 400 dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size") 401 dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size") 462 # Check both slots for the one with the largest write/erase block size 463 dt_prop(erase_size_slot0 PATH "${slot0_flash}" PROPERTY "erase-block-size") 464 dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size") 465 dt_prop(erase_size_slot1 PATH "${slot1_flash}" PROPERTY "erase-block-size") 466 dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size") 492 dt_prop(erase_size PATH "${slot0_flash}" PROPERTY "erase-block-size") [all …]
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | ExternalMemory.md | 21 This corresponds to PSoC6's SMIF (Serial Memory InterFace) IP block mapping. 57 …all to Init-SFDP API which performs required GPIO configurations, SMIF IP block configurations, SF…
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 746 let block = Aes256::new(&key); in make_tlv() localVariable 747 let mut cipher = Aes256Ctr::from_block_cipher(block, &nonce); in make_tlv() 751 let block = Aes128::new(&key); in make_tlv() localVariable 752 let mut cipher = Aes128Ctr::from_block_cipher(block, &nonce); in make_tlv()
|
D | image.rs | 1857 let block = Aes256::new(&key); in install_image() localVariable 1858 let mut cipher = Aes256Ctr::from_block_cipher(block, &nonce); in install_image() 1862 let block = Aes128::new(&key); in install_image() localVariable 1863 let mut cipher = Aes128Ctr::from_block_cipher(block, &nonce); in install_image()
|
/mcuboot-latest/scripts/ |
D | mcubin.bt | 124 // uchar block[ptable.entries[i].size];
|
/mcuboot-latest/docs/ |
D | ecdsa.md | 84 removed any trailing 0 bytes from the data block. This turned out to be fine 255 out of 256
|
D | readme-espressif.md | 406 Secure boot uses a signature block appended to the bootloader image in order to verify the 407 authenticity. The signature block contains the RSA-3072 signature of that image and the RSA-3072 426 2. ROM bootloader verifies the bootloader's signature block integrity (magic number and CRC). 430 block with the digest saved in the eFuses. 432 block.
|
D | release-notes.md | 487 block appended to the image. This allows
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 100 Note: for S25FL512S block address shuld be mutiple by 0x40000
|
/mcuboot-latest/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 166 need to replace the key after 2^32 block encryptions.
|