Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 40) sorted by relevance

12

/mcuboot-latest/samples/zephyr/bad-keys/
DREADME.md1 # Bad keys for testing
3 This directory contains some alternate keys that can be used for
4 testing. Signing the images with either of these keys, but leaving
5 the demo keys's public keys in the bootloader should result in it not
/mcuboot-latest/scripts/imgtool/
Dmain.py23 import imgtool.keys as keys namespace
33 from .keys import (
50 keys.RSA.generate().export_private(path=keyfile, passwd=passwd)
54 keys.RSA.generate(key_size=3072).export_private(path=keyfile,
59 keys.ECDSA256P1.generate().export_private(keyfile, passwd=passwd)
63 keys.ECDSA384P1.generate().export_private(keyfile, passwd=passwd)
67 keys.Ed25519.generate().export_private(path=keyfile, passwd=passwd)
71 keys.X25519.generate().export_private(path=keyfile, passwd=passwd)
103 key = keys.load(keyfile)
107 return keys.load(keyfile, passwd)
[all …]
Dboot_record.py50 last_key = list(properties.keys())[-1]
Dimage.py47 from . import version as versmod, keys
49 from .keys import rsa, ecdsa, x25519
175 return tlv in TLV_SHA_TO_SHA_AND_ALG.keys()
184 keys.ECDSA384P1 : ['384'],
185 keys.ECDSA384P1Public : ['384'],
186 keys.ECDSA256P1 : ['256'],
187 keys.RSA : ['256'],
188 keys.RSAPublic : ['256'],
190 keys.Ed25519 : ['256', '512'],
191 keys.X25519 : ['256', '512']
[all …]
/mcuboot-latest/ci/fih_test_docker/
Dgenerate_test_report.py29 for last_line in failed_boot_last_lines.keys():
33 for reason in exec_fail_reasons.keys():
Dutils.py50 if "skipped" in test.keys() and not test["skipped"]:
/mcuboot-latest/docs/release-notes.d/
Dbootutil-enc-hw-keys.md1 - Added support for retrieving hw embed private keys for image encryption
/mcuboot-latest/boot/cypress/
DMakefile202 @echo Generate ECC256 keys: $(SIGN_KEY_FILE).pem and $(SIGN_KEY_FILE).pub
203 ../../scripts/imgtool.py keygen -k keys/$(SIGN_KEY_FILE).pem -t ecdsa-p256
204 ../../scripts/imgtool.py getpub -k keys/$(SIGN_KEY_FILE).pem > keys/$(SIGN_KEY_FILE).pub
/mcuboot-latest/boot/espressif/hal/include/esp32c3/
Desp32c3.cmake8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
/mcuboot-latest/boot/espressif/hal/include/esp32s3/
Desp32s3.cmake8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
/mcuboot-latest/boot/espressif/hal/include/esp32s2/
Desp32s2.cmake8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
/mcuboot-latest/boot/espressif/include/crypto_config/
Dec256.cmake23 ${ESPRESSIF_PORT_DIR}/keys.c
Drsa.cmake11 ${ESPRESSIF_PORT_DIR}/keys.c
Ded25519.cmake25 ${ESPRESSIF_PORT_DIR}/keys.c
/mcuboot-latest/boot/espressif/hal/include/esp32c2/
Desp32c2.cmake9 …${esp_hal_dir}/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/esp_e…
/mcuboot-latest/scripts/
Dassemble.py34 for ak in a.keys():
37 for bk in b.keys():
/mcuboot-latest/boot/espressif/hal/include/esp32/
Desp32.cmake7 …${esp_hal_dir}/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/es…
/mcuboot-latest/scripts/imgtool/keys/
Drsa_test.py21 from imgtool.keys import load, RSA, RSAUsageError
22 from imgtool.keys.rsa import RSA_KEY_SIZES
/mcuboot-latest/boot/espressif/hal/include/esp32c6/
Desp32c6.cmake12 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
/mcuboot-latest/boot/espressif/hal/include/esp32h2/
Desp32h2.cmake12 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
/mcuboot-latest/docs/
Dimgtool.md4 operations that are necessary to manage keys and sign images. Using
13 ## [Managing keys](#managing-keys)
15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys.
38 For Zephyr, the keys live in the file `boot/zephyr/keys.c`. For
132 instead of plain keys. Enable when
Dtestplan-mynewt.md12 key_<sign-algo>.pem, key_<sign-algo>_2.pem. And a keys file with the C public
40 * `newt create-image k64f_blinky2 1.0.2 <one-of-the-sign-keys-or-none>`
89 * `newt create-image k64f_blinky2 1.0.2 <bad and good rsa keys>.pem`
/mcuboot-latest/boot/espressif/hal/src/
Dflash_encrypt.c216 uint8_t keys[BLOCKS_NEEDED][32] = { 0 }; in check_and_generate_encryption_keys() local
219 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
223 esp_err_t err = esp_efuse_write_keys(purposes, keys, BLOCKS_NEEDED); in check_and_generate_encryption_keys()
/mcuboot-latest/samples/zephyr/
DMakefile275 SIGNING_KEY=bad-keys/bad-rsa-2048.pem \
290 SIGNING_KEY=bad-keys/bad-ec-p256.pem \
/mcuboot-latest/boot/cypress/BlinkyApp/
DBlinkyApp.mk103 … 8 -v "2.0" -S $(SLOT_SIZE) -M 512 --overwrite-only -R $(ERASED_VALUE) -k keys/$(SIGN_KEY_FILE).pem

12