/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | aes_decrypt.c | 73 static inline void mult_row_column(uint8_t *out, const uint8_t *in) in mult_row_column() argument 75 out[0] = multe(in[0]) ^ multb(in[1]) ^ multd(in[2]) ^ mult9(in[3]); in mult_row_column() 76 out[1] = mult9(in[0]) ^ multe(in[1]) ^ multb(in[2]) ^ multd(in[3]); in mult_row_column() 77 out[2] = multd(in[0]) ^ mult9(in[1]) ^ multe(in[2]) ^ multb(in[3]); in mult_row_column() 78 out[3] = multb(in[0]) ^ multd(in[1]) ^ mult9(in[2]) ^ multe(in[3]); in mult_row_column() 129 int tc_aes_decrypt(uint8_t *out, const uint8_t *in, const TCAesKeySched_t s) in tc_aes_decrypt() argument 136 } else if (in == (const uint8_t *) 0) { in tc_aes_decrypt() 142 (void)_copy(state, sizeof(state), in, sizeof(state)); in tc_aes_decrypt()
|
D | aes_encrypt.c | 124 static inline void mult_row_column(uint8_t *out, const uint8_t *in) in mult_row_column() argument 126 out[0] = _double_byte(in[0]) ^ triple(in[1]) ^ in[2] ^ in[3]; in mult_row_column() 127 out[1] = in[0] ^ _double_byte(in[1]) ^ triple(in[2]) ^ in[3]; in mult_row_column() 128 out[2] = in[0] ^ in[1] ^ _double_byte(in[2]) ^ triple(in[3]); in mult_row_column() 129 out[3] = triple(in[0]) ^ in[1] ^ in[2] ^ _double_byte(in[3]); in mult_row_column() 158 int tc_aes_encrypt(uint8_t *out, const uint8_t *in, const TCAesKeySched_t s) in tc_aes_encrypt() argument 165 } else if (in == (const uint8_t *) 0) { in tc_aes_encrypt() 171 (void)_copy(state, sizeof(state), in, sizeof(state)); in tc_aes_encrypt()
|
D | cbc_mode.c | 37 int tc_cbc_mode_encrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_cbc_mode_encrypt() argument 47 in == (const uint8_t *) 0 || in tc_cbc_mode_encrypt() 64 buffer[m++] ^= *in++; in tc_cbc_mode_encrypt() 77 int tc_cbc_mode_decrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_cbc_mode_decrypt() argument 88 in == (const uint8_t *) 0 || in tc_cbc_mode_decrypt() 106 (void)tc_aes_decrypt(buffer, in, sched); in tc_cbc_mode_decrypt() 107 in += TC_AES_BLOCK_SIZE; in tc_cbc_mode_decrypt()
|
D | ctr_mode.c | 37 int tc_ctr_mode(uint8_t *out, unsigned int outlen, const uint8_t *in, in tc_ctr_mode() argument 50 in == (uint8_t *) 0 || in tc_ctr_mode() 81 *out++ = buffer[n] ^ *in++; in tc_ctr_mode()
|
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_aes.c | 60 uint8_t in[NUM_OF_NIST_KEYS]; member 148 int var_text_test(unsigned int r, const uint8_t *in, const uint8_t *out, in var_text_test() argument 155 (void)tc_aes_encrypt(ciphertext, in, s); in var_text_test() 163 result = check_result(r, in, NUM_OF_NIST_KEYS, in var_text_test() 1087 result = var_text_test(i, kat_tbl[i].in, kat_tbl[i].out, &s); in test_3() 1098 int var_key_test(unsigned int r, const uint8_t *in, const uint8_t *out) in var_key_test() argument 1109 (void)tc_aes128_set_encrypt_key(&s, in); in var_key_test() 2027 result = var_key_test(i, kat_tbl[i].in, kat_tbl[i].out); in test_4()
|
/mcuboot-latest/docs/release-notes.d/ |
D | zephyr-compression.md | 1 - Added protected TLV size to image size check in bootutil 2 - Added Kconfig for decompression support in Zephyr 4 - Added support for removing images with conflicting flags in
|
D | 00readme.md | 8 - Fix bugs in the code. 20 Release notes are included in files under this `docs/release-notes.d` 21 directory and have a name of `*.md`. They will be included in the 27 are not used for anything in particular, but to keep the files 29 different pull requests merge in different orders.
|
D | compatible-slots.md | 5 - Added debug logs for zephyr to output discrepencies in erase 6 and write block sizes in dts vs actual hardware configuration
|
/mcuboot-latest/sim/mcuboot-sys/ |
D | Cargo.toml | 44 # Encrypt image in the secondary slot using RSA-OAEP-2048 47 # Encrypt image in the secondary slot using AES-256-CTR and RSA-OAEP-2048 50 # Encrypt image in the secondary slot using AES-KW-128 53 # Encrypt image in the secondary slot using AES-256-CTR and AES-KW-256 56 # Encrypt image in the secondary slot using ECIES-P256 59 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-P256 62 # Encrypt image in the secondary slot using ECIES-P256 using Mbed TLS 65 # Encrypt image in the secondary slot using ECIES-X25519 68 # Encrypt image in the secondary slot using AES-256-CTR and ECIES-X25519 86 # Check (in software) against version downgrades.
|
/mcuboot-latest/ |
D | Cargo.toml | 7 # compiles in about half the time, but runs about 5-6 times slower. 2 8 # and 3 are hardly different in either compile time or performance. 9 # Use 2 in case that makes the code slightly more debuggable.
|
/mcuboot-latest/docs/ |
D | SubmittingPatches.md | 3 The development of MCUboot takes place in the [MCUboot GitHub 8 Each commit has to have, in the commit message, a "Signed-off-by" line 36 changes must include a release note snippet in the pull request. 40 that is a single commit can include the release note snippet in that 41 commit). In either case, the release notes must be included in the 44 The release notes should be placed in the `docs/release-notes.d` 45 directory. Please see the readme file in that directory for specifics. 68 (a) The contribution was created in whole or in part by me and I 70 indicated in the file; or 75 work with modifications, whether created in whole or in part [all …]
|
D | testplan-mynewt.md | 20 Build and load good image in slot 0: 28 *If testing RSA/PSS `newt create-image` needs to be passed in the extra* 35 Build and load image in slot 1 with no signing, signed with 54 Build and load good image in slot 0: 59 Build and load image in slot 1 with no signing, signed with 94 This should not swap and delete the image in slot 1 when signed with the wrong 95 key, otherwise the image in slot 1 should be *moved* to slot 0 and slot 1 should 144 image in slot 1 and check that it works. 150 in slot 1 and do random swaps (as much as you like!). When the swap finishes 151 confirm that the swap was finished with the previous slot 1 image now in [all …]
|
D | release-notes.md | 26 - Allow sim tests to skip slow tests. By setting `MCUBOOT_SKIP_SLOW_TESTS` in 29 slow tests are useful, in that they test bad powerdown recovery, but are 38 - Zephyr: Add estimated image footer size to cache in sysbuild. 40 allows for a single application slot and firmware loader image in 42 (loading it in any way it sees fit e.g. via Bluetooth). 54 - fix a memory leak in the HKDF implementation. 63 change in the interface between mcuboot and the platform. All platforms 65 will have to be adjusted. The following commit makes the API change, in the 80 - Fixes issue with serial recovery in single slot mode wrongly 83 calls, this now allows the parameters to be supplied in any order. [all …]
|
D | testplan-zephyr.md | 4 testing is done with the code in `samples/zephyr`. These examples 6 At this time, however, the partitions are hardcoded in the Makefile 9 Note that the script "run-tests.sh" in that directory is helpful for 15 The tests are build using the various `test-*` targets in 64 And make sure this stays in the "hello2" image. 71 Repeat these steps for each of the `test-*` targest in the Makefile.
|
D | readme-zephyr.md | 5 There are some pretty significant differences in how apps are built 13 partitions defined in its device tree. These partitions are: 33 The flash partitions are typically defined in the Zephyr boards folder, in a 35 flash partitions defined is the frdm_k64f's in 36 `boards/arm/frdm_k64f/frdm_k64f.dts`. Make sure the DT node labels in your board's 52 be made before building it. Most of this can be done as documented in 53 the `CMakeLists.txt` file in boot/zephyr. There are comments there for 57 To build MCUboot, create a build directory in boot/zephyr, and build 65 In addition to the partitions defined in DTS, some additional 67 MCUboot itself. All the needed configuration is collected in [all …]
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 5 Implements simple Blinky LED CM4 application to demonstrate MCUboot Application operation in terms … 25 …lication - change definitions of `CY_DEBUG_UART_TX` and `CY_DEBUG_UART_RX` in `main.c` of BlinkyAp… 26 …are with this application - change definitions of `LED_PORT` and `LED_PIN` in `main.c` of BlinkyAp… 31 …g following macros: `-DUSER_APP_SIZE`, `-DUSER_APP_START`, `-DRAM_SIZE`, `-DRAM_START` in makefile. 33 Pre-build action calls GCC preprocessor which intantiates defines for particular values in `BlinkyA… 45 …BlinkyApp for BOOT slot. Substitute `PLATFORM=` to a paltform name you use in all following comman… 66 `BlinkyApp` can be built to use in multi-image bootloader configuration. 92 `HEADER_OFFSET` defines the offset from original boot image address. This one in line above suggest… 94 `ERASED_VALUE` defines the memory cell contents in erased state. It is `0x00` for PSoC6's internal … 106 To obtain encrypted upgrade image of BlinkyApp extra flag `ENC_IMG=1` should be passed in command l… [all …]
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | cbc_mode.h | 110 int tc_cbc_mode_encrypt(uint8_t *out, unsigned int outlen, const uint8_t *in, 143 int tc_cbc_mode_decrypt(uint8_t *out, unsigned int outlen, const uint8_t *in,
|
D | aes.h | 93 int tc_aes_encrypt(uint8_t *out, const uint8_t *in, 123 int tc_aes_decrypt(uint8_t *out, const uint8_t *in,
|
/mcuboot-latest/samples/zephyr/bad-keys/ |
D | README.md | 5 the demo keys's public keys in the bootloader should result in it not
|
/mcuboot-latest/samples/zephyr/ |
D | README.md | 9 Please see the comments in the Makefile in this directory for more 20 or in Fedora:
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | README.md | 31 …loader app sizes are appropriate and correspond to flash area size defined in Applications' linker… 40 To enable hardware acceleration in `MCUBootApp` pass flag `USE_CRYPTO_HW=1` to `make` while build. 73 As an example in a makefile it should look like following: 85 To enable multi-image operation define `MCUBOOT_IMAGE_NUMBER` in `MCUBootApp/config/mcuboot_config.… 97 This ensures two dependent applications can be accepted by device only in case both images are vali… 115 __Note:__ It is also possible to place secondary (upgrade) slots in external memory module so resul… 122 …stom hardware with this application - change definition of `CYBSP_UART_HW` in `main.c` of MCUBootA… 124 …y to use custom hardware with this application - change value of `smif_id` in `main.c` of MCUBootA… 142 …e files infrastructure for building MCUBoot Bootloader. Same approach used in sample BlinkyLedApp … 144 * Build MCUBootApp in `Debug` for signle image use case. [all …]
|
/mcuboot-latest/ext/nrf/ |
D | README.md | 9 …IGNATURE_TYPE_ECDSA_P256` is selected not `CONFIG_BOOT_SIGNATURE_TYPE_RSA` in `prj.conf` of `boot/… 10 …nto `menuconfig` and change the implementation selection to `cc310` or also set this in `prj.conf`. 18 Build a hello world example in zephyr and sign it with imgtool.py with the `root-ec-p256.pem` and f…
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig.firmware_loader | 22 the one used to place the device in bootloader mode. 30 in firmware loader mode and reboot the module). 33 bool "Stay in bootloader if no application" 43 remain in bootloader firmware loader mode if it was.
|
/mcuboot-latest/boot/cypress/ |
D | README.md | 5 Given solution is included in `MCUboot` repository with purpose to demonstrate basic consepts and f… 12 2. MCUboot-Based Bootloader with Rollback to Factory App in External Flash [mtb-example-anycloud-mc… 29 …sible to place secondary (upgrade) slots in external memory module. In this case primary slot can … 61 …p bootloader application and sample user applocation are located in `Readme.md` files in correspon… 77 *Make* - make sure it is added to system's `PATH` variable and correct path is first in the list; 79 *Python/Python3* - make sure you have correct path referenced in `PATH`; 83 This will inherit system's PATH so should find `python3.7` installed in regular way as well as imgt…
|
/mcuboot-latest/boot/cypress/platforms/PSOC_062_2M/CM0P/GCC_ARM/ |
D | cy8c6xxa_cm0plus.ld | 7 * The main purpose of the linker script is to describe how the sections in the 16 * defined in the linker files. In that case you may see warnings during the 18 * relevant code in the linker file. 26 * you may not use this file except in compliance with the License. 31 * Unless required by applicable law or agreed to in writing, software 46 /* Force symbol to be entered in the output file as an undefined symbol. Doing 54 /* The MEMORY section below describes the location and size of blocks of memory in the target. 63 …* Your changes must be aligned with the corresponding memory regions for the CM4 core in 'xx_cm4_d… 91 * It references following symbols, which must be defined in code: 184 * define __STARTUP_COPY_MULTIPLE in startup_psoc6_02_cm0plus.S */ [all …]
|