Searched refs:public (Results 1 – 17 of 17) sorted by relevance
/mcuboot-latest/docs/ |
D | imgtool.md | 30 ## [Incorporating the public key into the code](#incorporating-the-public-key-into-the-code) 35 key, as described above, you should replace the public key in the 44 will extract the public key from the given private key file, and 63 --public-key-format [hash|full] 88 -E, --encrypt filename Encrypt image using the provided public key 129 The `--public-key-format` argument can be used to distinguish where the public 131 which case only the hash of the public key is added to the TLV area (the full 132 public key is incorporated into the bootloader). When the `full` option is used 133 instead, the TLV area will contain the whole public key and thus the bootloader
|
D | SECURITY.md | 55 public, and the public CVE database will be updated with all
|
D | readme-zephyr.md | 149 ### Extracting the public key 151 The generated keypair above contains both the public and the private 152 key. It is necessary to extract the public key and insert it into the 155 the public key in a format usable by the C compiler. 156 The generated public key is saved in `build/zephyr/autogen-pubkey.h`, which is included
|
D | readme-riot.md | 41 using you public key, either in Zephyr or Mynewt by following the
|
D | SubmittingPatches.md | 85 are public and that a record of the contribution (including all
|
D | testplan-mynewt.md | 12 key_<sign-algo>.pem, key_<sign-algo>_2.pem. And a keys file with the C public
|
D | readme-nuttx.md | 51 MCUboot's documentation imposes no restrictions regarding the usage of its public interfaces, which…
|
D | release.md | 96 proper signing key, and that the public key is signed by enough parties to
|
D | release-notes.md | 93 - imgtool: add 'getpubhash' command to dump the sha256 hash of the public key 95 - imgtool can dump the raw versions of the public keys 114 the private and public keys. The Kconfig menu has changed to only 492 - The public key is referred to by its SHA1 hash (or a prefix of the
|
D | readme-espressif.md | 282 Notice that the public key will be embedded in the bootloader code, since the hardware key storage 408 public key. 416 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse. 429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature 433 3. Use the public key to verify the signature of the bootloader image, using RSA-PSS with the
|
/mcuboot-latest/boot/mbed/include/utils/ |
D | DataShare.h | 46 public:
|
/mcuboot-latest/samples/zephyr/bad-keys/ |
D | README.md | 5 the demo keys's public keys in the bootloader should result in it not
|
/mcuboot-latest/ |
D | CODE_OF_CONDUCT.md | 55 an individual is officially representing the community in public spaces. 82 behavior was inappropriate. A public apology may be requested. 101 **Consequence**: A temporary ban from any sort of interaction or public 102 communication with the community for a specified period of time. No public or 113 **Consequence**: A permanent ban from any sort of public interaction within
|
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_ecc_dsa.c | 596 uint8_t public[2*NUM_ECC_BYTES]; in montecarlo_signverify() local 612 if (!uECC_make_key(public, private, curve)) { in montecarlo_signverify() 622 if (!uECC_verify(public, hash, sizeof(hash), sig, curve)) { in montecarlo_signverify()
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig | 203 with the public key information will be written in a format expected by 229 Use HW key for image verification, otherwise the public key is embedded 230 in MCUBoot. If enabled the public key is appended to the signed image 231 and requires the hash of the public key to be provisioned to the device 435 with the public key information will be written in a format expected by
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | MCUBootApp.ld | 237 /* Unprotected public RAM */
|
D | README.md | 162 …ing binary key data in `enc_priv_key[]` (file `\MCUBootApp\keys.c`). The public part will be used …
|