Searched refs:keys (Results 1 – 25 of 40) sorted by relevance
12
/mcuboot-latest/samples/zephyr/bad-keys/ |
D | README.md | 1 # Bad keys for testing 3 This directory contains some alternate keys that can be used for 4 testing. Signing the images with either of these keys, but leaving 5 the demo keys's public keys in the bootloader should result in it not
|
/mcuboot-latest/scripts/imgtool/ |
D | main.py | 23 import imgtool.keys as keys namespace 33 from .keys import ( 50 keys.RSA.generate().export_private(path=keyfile, passwd=passwd) 54 keys.RSA.generate(key_size=3072).export_private(path=keyfile, 59 keys.ECDSA256P1.generate().export_private(keyfile, passwd=passwd) 63 keys.ECDSA384P1.generate().export_private(keyfile, passwd=passwd) 67 keys.Ed25519.generate().export_private(path=keyfile, passwd=passwd) 71 keys.X25519.generate().export_private(path=keyfile, passwd=passwd) 103 key = keys.load(keyfile) 107 return keys.load(keyfile, passwd) [all …]
|
D | boot_record.py | 50 last_key = list(properties.keys())[-1]
|
D | image.py | 47 from . import version as versmod, keys 49 from .keys import rsa, ecdsa, x25519 175 return tlv in TLV_SHA_TO_SHA_AND_ALG.keys() 184 keys.ECDSA384P1 : ['384'], 185 keys.ECDSA384P1Public : ['384'], 186 keys.ECDSA256P1 : ['256'], 187 keys.RSA : ['256'], 188 keys.RSAPublic : ['256'], 190 keys.Ed25519 : ['256', '512'], 191 keys.X25519 : ['256', '512'] [all …]
|
/mcuboot-latest/ci/fih_test_docker/ |
D | generate_test_report.py | 29 for last_line in failed_boot_last_lines.keys(): 33 for reason in exec_fail_reasons.keys():
|
D | utils.py | 50 if "skipped" in test.keys() and not test["skipped"]:
|
/mcuboot-latest/docs/release-notes.d/ |
D | bootutil-enc-hw-keys.md | 1 - Added support for retrieving hw embed private keys for image encryption
|
/mcuboot-latest/boot/cypress/ |
D | Makefile | 202 @echo Generate ECC256 keys: $(SIGN_KEY_FILE).pem and $(SIGN_KEY_FILE).pub 203 ../../scripts/imgtool.py keygen -k keys/$(SIGN_KEY_FILE).pem -t ecdsa-p256 204 ../../scripts/imgtool.py getpub -k keys/$(SIGN_KEY_FILE).pem > keys/$(SIGN_KEY_FILE).pub
|
/mcuboot-latest/boot/espressif/hal/include/esp32c3/ |
D | esp32c3.cmake | 8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
|
/mcuboot-latest/boot/espressif/hal/include/esp32s3/ |
D | esp32s3.cmake | 8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
|
/mcuboot-latest/boot/espressif/hal/include/esp32s2/ |
D | esp32s2.cmake | 8 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
|
/mcuboot-latest/boot/espressif/include/crypto_config/ |
D | ec256.cmake | 23 ${ESPRESSIF_PORT_DIR}/keys.c
|
D | rsa.cmake | 11 ${ESPRESSIF_PORT_DIR}/keys.c
|
D | ed25519.cmake | 25 ${ESPRESSIF_PORT_DIR}/keys.c
|
/mcuboot-latest/boot/espressif/hal/include/esp32c2/ |
D | esp32c2.cmake | 9 …${esp_hal_dir}/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/esp_e…
|
/mcuboot-latest/scripts/ |
D | assemble.py | 34 for ak in a.keys(): 37 for bk in b.keys():
|
/mcuboot-latest/boot/espressif/hal/include/esp32/ |
D | esp32.cmake | 7 …${esp_hal_dir}/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/es…
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | rsa_test.py | 21 from imgtool.keys import load, RSA, RSAUsageError 22 from imgtool.keys.rsa import RSA_KEY_SIZES
|
/mcuboot-latest/boot/espressif/hal/include/esp32c6/ |
D | esp32c6.cmake | 12 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
|
/mcuboot-latest/boot/espressif/hal/include/esp32h2/ |
D | esp32h2.cmake | 12 ${esp_hal_dir}/components/efuse/src/efuse_controller/keys/with_key_purposes/esp_efuse_api_key.c
|
/mcuboot-latest/docs/ |
D | imgtool.md | 4 operations that are necessary to manage keys and sign images. Using 13 ## [Managing keys](#managing-keys) 15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys. 38 For Zephyr, the keys live in the file `boot/zephyr/keys.c`. For 132 instead of plain keys. Enable when
|
D | testplan-mynewt.md | 12 key_<sign-algo>.pem, key_<sign-algo>_2.pem. And a keys file with the C public 40 * `newt create-image k64f_blinky2 1.0.2 <one-of-the-sign-keys-or-none>` 89 * `newt create-image k64f_blinky2 1.0.2 <bad and good rsa keys>.pem`
|
/mcuboot-latest/boot/espressif/hal/src/ |
D | flash_encrypt.c | 216 uint8_t keys[BLOCKS_NEEDED][32] = { 0 }; in check_and_generate_encryption_keys() local 219 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys() 223 esp_err_t err = esp_efuse_write_keys(purposes, keys, BLOCKS_NEEDED); in check_and_generate_encryption_keys()
|
/mcuboot-latest/samples/zephyr/ |
D | Makefile | 275 SIGNING_KEY=bad-keys/bad-rsa-2048.pem \ 290 SIGNING_KEY=bad-keys/bad-ec-p256.pem \
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | BlinkyApp.mk | 103 … 8 -v "2.0" -S $(SLOT_SIZE) -M 512 --overwrite-only -R $(ERASED_VALUE) -k keys/$(SIGN_KEY_FILE).pem
|
12