Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 21 of 21) sorted by relevance

/mcuboot-latest/testplan/mynewt/
DMakefile47 build-boot-rsa:
52 build-boot-rsa-pss:
68 build-boot-rsa-ec:
73 build-boot-rsa-validate0:
78 build-boot-rsa-noswap:
85 build-mcuboot: build-boot-rsa build-boot-rsa-pss build-boot-ec \
86 build-boot-ec256 build-boot-rsa-validate0 build-boot-rsa-noswap
/mcuboot-latest/samples/zephyr/
DMakefile66 SIGNING_KEY ?= ../../root-rsa-2048.pem
194 test-good-rsa: clean
196 BOOTLOADER_EXTRA_CONF_FILE=$(PWD)/overlay-rsa.conf \
227 test-bad-rsa-upgrade: clean
229 BOOTLOADER_EXTRA_CONF_FILE=$(PWD)/overlay-rsa.conf \
232 BOOTLOADER_EXTRA_CONF_FILE=$(PWD)/overlay-rsa.conf \
249 SIGNING_KEY=../../root-rsa-2048.pem \
269 test-wrong-rsa: clean
271 BOOTLOADER_EXTRA_CONF_FILE=$(PWD)/overlay-rsa.conf \
274 BOOTLOADER_EXTRA_CONF_FILE=$(PWD)/overlay-rsa.conf \
[all …]
/mcuboot-latest/sim/
DCargo.toml10 sig-rsa = ["mcuboot-sys/sig-rsa"]
21 enc-rsa = ["mcuboot-sys/enc-rsa"]
22 enc-aes256-rsa = ["mcuboot-sys/enc-aes256-rsa"]
DREADME.rst44 $ cargo test --features sig-rsa
/mcuboot-latest/boot/espressif/ci_configs/
Dsecureboot-sign-rsa2048.conf18 CONFIG_ESP_SIGN_KEY_FILE=root-rsa-2048.pem
Dsecureboot-sign-rsa3072.conf18 CONFIG_ESP_SIGN_KEY_FILE=root-rsa-3072.pem
/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml15 # compile with both sig-rsa and sig-ecdsa enabled.
16 sig-rsa = []
49 enc-rsa = []
52 enc-aes256-rsa = []
/mcuboot-latest/scripts/imgtool/keys/
D__init__.py24 from cryptography.hazmat.primitives.asymmetric.rsa import (
33 from .rsa import RSA, RSAPublic, RSAUsageError, RSA_KEY_SIZES
Drsa.py9 from cryptography.hazmat.primitives.asymmetric import rsa
78 if isinstance(self.key, rsa.RSAPrivateKey):
99 pk = rsa.generate_private_key(
Drsa_test.py22 from imgtool.keys.rsa import RSA_KEY_SIZES
/mcuboot-latest/boot/espressif/include/crypto_config/
Drsa.cmake15 ${MBEDTLS_DIR}/library/rsa.c
/mcuboot-latest/boot/bootutil/src/
Dencrypted.c436 bootutil_rsa_context rsa; in boot_decrypt_key() local
473 bootutil_rsa_init(&rsa); in boot_decrypt_key()
478 rc = bootutil_rsa_parse_private_key(&rsa, &cp, cpend); in boot_decrypt_key()
480 bootutil_rsa_drop(&rsa); in boot_decrypt_key()
484 rc = bootutil_rsa_oaep_decrypt(&rsa, &olen, buf, enckey, BOOT_ENC_KEY_SIZE); in boot_decrypt_key()
485 bootutil_rsa_drop(&rsa); in boot_decrypt_key()
/mcuboot-latest/docs/
Dtestplan-mynewt.md11 For the 3 algorithms supported, rsa, ec and ec256, two files are provided:
29 *flag `--rsa-pss` eg:*
31 `newt create-image k64f_blinky 1.0.1 key_rsa.pem --rsa-pss`
89 * `newt create-image k64f_blinky2 1.0.2 <bad and good rsa keys>.pem`
Dimgtool.md15 This tool currently supports rsa-2048, rsa-3072, ecdsa-p256 and ed25519 keys.
18 ./scripts/imgtool.py keygen -k filename.pem -t rsa-2048
20 or use rsa-3072, ecdsa-p256, or ed25519 for the type. The key type used
Dtestplan-zephyr.md19 $ make test-good-rsa
Dreadme-zephyr.md143 $ ./scripts/imgtool.py keygen -k mykey.pem -t rsa-2048
/mcuboot-latest/scripts/imgtool/
Dimage.py49 from .keys import rsa, ecdsa, x25519
671 if isinstance(enckey, rsa.RSAPublic):
/mcuboot-latest/boot/zephyr/
DCMakeLists.txt341 ${MCUBOOT_DIR}/root-rsa-2048.pem
342 ${MCUBOOT_DIR}/root-rsa-3072.pem
DKconfig251 default "root-rsa-3072.pem" if BOOT_SIGNATURE_TYPE_RSA && BOOT_SIGNATURE_TYPE_RSA_LEN=3072
252 default "root-rsa-2048.pem" if BOOT_SIGNATURE_TYPE_RSA && BOOT_SIGNATURE_TYPE_RSA_LEN=2048
/mcuboot-latest/boot/mbed/
Dmcuboot_imgtool.cmake43 …message(FATAL_ERROR "Since mcuboot.encrypt-rsa is enabled, you must specify the path to a valid im…
/mcuboot-latest/boot/espressif/
DCMakeLists.txt198 include(${CMAKE_CURRENT_LIST_DIR}/include/crypto_config/rsa.cmake)