/mcuboot-latest/boot/espressif/hal/include/ |
D | esp_log.h | 17 #define ESP_LOGE(tag, fmt, ...) MCUBOOT_LOG_ERR("[%s] " fmt, tag, ##__VA_ARGS__) argument 18 #define ESP_LOGW(tag, fmt, ...) MCUBOOT_LOG_WRN("[%s] " fmt, tag, ##__VA_ARGS__) argument 19 #define ESP_LOGI(tag, fmt, ...) MCUBOOT_LOG_INF("[%s] " fmt, tag, ##__VA_ARGS__) argument 20 #define ESP_LOGD(tag, fmt, ...) MCUBOOT_LOG_DBG("[%s] " fmt, tag, ##__VA_ARGS__) argument 21 #define ESP_LOGV(tag, fmt, ...) MCUBOOT_LOG_DBG("[%s] " fmt, tag, ##__VA_ARGS__) argument 23 #define ESP_EARLY_LOGE(tag, fmt, ...) MCUBOOT_LOG_ERR("[%s] " fmt, tag, ##__VA_ARGS__) argument 24 #define ESP_EARLY_LOGW(tag, fmt, ...) MCUBOOT_LOG_WRN("[%s] " fmt, tag, ##__VA_ARGS__) argument 25 #define ESP_EARLY_LOGI(tag, fmt, ...) MCUBOOT_LOG_INF("[%s] " fmt, tag, ##__VA_ARGS__) argument 26 #define ESP_EARLY_LOGD(tag, fmt, ...) MCUBOOT_LOG_DBG("[%s] " fmt, tag, ##__VA_ARGS__) argument 27 #define ESP_EARLY_LOGV(tag, fmt, ...) MCUBOOT_LOG_DBG("[%s] " fmt, tag, ##__VA_ARGS__) argument
|
D | soc_log.h | 12 #define SOC_LOGE(tag, fmt, ...) MCUBOOT_LOG_ERR("[%s] " fmt, tag, ##__VA_ARGS__) argument 13 #define SOC_LOGW(tag, fmt, ...) MCUBOOT_LOG_WRN("[%s] " fmt, tag, ##__VA_ARGS__) argument 14 #define SOC_LOGI(tag, fmt, ...) MCUBOOT_LOG_INF("[%s] " fmt, tag, ##__VA_ARGS__) argument 15 #define SOC_LOGD(tag, fmt, ...) MCUBOOT_LOG_DBG("[%s] " fmt, tag, ##__VA_ARGS__) argument
|
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_cmac_mode.c | 124 const uint8_t tag[BUF_LEN] = { in verify_cmac_null_msg() local 134 if (memcmp(Tag, tag, BUF_LEN) != 0) { in verify_cmac_null_msg() 136 show("expected Tag =", tag, sizeof(tag)); in verify_cmac_null_msg() 155 const uint8_t tag[BUF_LEN] = { in verify_cmac_1_block_msg() local 165 if (memcmp(Tag, tag, BUF_LEN) != 0) { in verify_cmac_1_block_msg() 168 show("expected Tag =", tag, sizeof(tag)); in verify_cmac_1_block_msg() 190 const uint8_t tag[BUF_LEN] = { in verify_cmac_320_bit_msg() local 200 if (memcmp(Tag, tag, BUF_LEN) != 0) { in verify_cmac_320_bit_msg() 203 show("expected Tag =", tag, sizeof(tag)); in verify_cmac_320_bit_msg() 228 const uint8_t tag[BUF_LEN] = { in verify_cmac_512_bit_msg() local [all …]
|
/mcuboot-latest/ext/mbedtls-asn1/src/ |
D | asn1parse.c | 105 size_t *len, int tag ) in mbedtls_asn1_get_tag() argument 110 if( **p != tag ) in mbedtls_asn1_get_tag() 139 int tag, int *val ) in asn1_get_tagged_int() argument 144 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, tag ) ) != 0 ) in asn1_get_tagged_int() 253 int (*cb)( void *ctx, int tag, in mbedtls_asn1_traverse_sequence_of() argument 272 unsigned char const tag = *(*p)++; in mbedtls_asn1_traverse_sequence_of() local 274 if( ( tag & tag_must_mask ) != tag_must_val ) in mbedtls_asn1_traverse_sequence_of() 280 if( ( tag & tag_may_mask ) == tag_may_val ) in mbedtls_asn1_traverse_sequence_of() 284 ret = cb( ctx, tag, *p, len ); in mbedtls_asn1_traverse_sequence_of() 331 int tag; member [all …]
|
/mcuboot-latest/docs/ |
D | Gemfile.lock | 53 jekyll-seo-tag (= 2.8.0) 146 jekyll-seo-tag (2.8.0) 153 jekyll-seo-tag (~> 2.0) 156 jekyll-seo-tag (~> 2.0) 159 jekyll-seo-tag (~> 2.0) 162 jekyll-seo-tag (~> 2.0) 165 jekyll-seo-tag (~> 2.0) 168 jekyll-seo-tag (~> 2.0) 171 jekyll-seo-tag (~> 2.0) 174 jekyll-seo-tag (~> 2.0) [all …]
|
D | release.md | 88 not just a tag pointing to another commit. 90 Once this is done, the release should create a signed tag with the 91 appropriate tag name: 93 git tag -s va.b.c-rcn 99 At this point, the tag can be pushed to GitHub to make the actual release
|
D | imgtool.md | 140 --custom-tlv [tag] [value] Custom TLV that will be placed into
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | asn1.h | 90 #define MBEDTLS_ASN1_IS_STRING_TAG( tag ) \ argument 91 ( ( tag ) < 32u && ( \ 92 ( ( 1u << ( tag ) ) & ( ( 1u << MBEDTLS_ASN1_BMP_STRING ) | \ 148 int MBEDTLS_PRIVATE(tag); /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */ 232 size_t *len, int tag ); 387 int tag ); 501 int (*cb)( void *ctx, int tag,
|
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/ |
D | hmac_sha256.h | 76 static inline int bootutil_hmac_sha256_finish(bootutil_hmac_sha256_context *ctx, uint8_t *tag, unsi… in bootutil_hmac_sha256_finish() argument 79 rc = tc_hmac_final(tag, taglen, ctx); in bootutil_hmac_sha256_finish() 120 static inline int bootutil_hmac_sha256_finish(bootutil_hmac_sha256_context *ctx, uint8_t *tag, unsi… in bootutil_hmac_sha256_finish() argument 126 return mbedtls_md_hmac_finish(ctx, tag); in bootutil_hmac_sha256_finish()
|
/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | hmac.c | 125 int tc_hmac_final(uint8_t *tag, unsigned int taglen, TCHmacState_t ctx) in tc_hmac_final() argument 129 if (tag == (uint8_t *) 0 || in tc_hmac_final() 135 (void) tc_sha256_final(tag, &ctx->hash_state); in tc_hmac_final() 141 (void)tc_sha256_update(&ctx->hash_state, tag, TC_SHA256_DIGEST_SIZE); in tc_hmac_final() 142 (void)tc_sha256_final(tag, &ctx->hash_state); in tc_hmac_final()
|
D | ccm_mode.c | 155 uint8_t tag[Nb * Nk]; in tc_ccm_generation_encryption() local 169 (void) tc_aes_encrypt(tag, b, c->sched); in tc_ccm_generation_encryption() 171 ccm_cbc_mac(tag, associated_data, alen, 1, c->sched); in tc_ccm_generation_encryption() 174 ccm_cbc_mac(tag, payload, plen, 0, c->sched); in tc_ccm_generation_encryption() 192 *out++ = tag[i] ^ b[i]; in tc_ccm_generation_encryption() 216 uint8_t tag[Nb * Nk]; in tc_ccm_decryption_verification() local 236 tag[i] = *(payload + plen - c->mlen + i) ^ b[i]; in tc_ccm_decryption_verification() 259 if (_compare(b, tag, c->mlen) == 0) { in tc_ccm_decryption_verification()
|
D | cmac_mode.c | 222 int tc_cmac_final(uint8_t *tag, TCCmacState_t s) in tc_cmac_final() argument 228 if (tag == (uint8_t *) 0 || in tc_cmac_final() 248 tc_aes_encrypt(tag, s->iv, s->sched); in tc_cmac_final()
|
/mcuboot-latest/ci/fih_test_docker/docker-build/ |
D | build.sh | 29 docker build --pull --tag=$image .
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | hmac.h | 133 int tc_hmac_final(uint8_t *tag, unsigned int taglen, TCHmacState_t ctx);
|
D | cmac_mode.h | 188 int tc_cmac_final(uint8_t *tag, TCCmacState_t s);
|
/mcuboot-latest/boot/zcbor/src/ |
D | zcbor_encode.c | 566 bool zcbor_tag_put(zcbor_state_t *state, uint32_t tag) argument 568 if (!value_encode(state, ZCBOR_MAJOR_TYPE_TAG, &tag, sizeof(tag))) { 577 bool zcbor_tag_encode(zcbor_state_t *state, uint32_t *tag) argument 579 return zcbor_tag_put(state, *tag);
|
/mcuboot-latest/boot/zcbor/include/ |
D | zcbor_encode.h | 72 bool zcbor_tag_put(zcbor_state_t *state, uint32_t tag); /* CBOR tag */ 91 bool zcbor_tag_encode(zcbor_state_t *state, uint32_t *tag); /* CBOR tag. Note that zcbor_tag_encode…
|
/mcuboot-latest/scripts/imgtool/ |
D | main.py | 487 tag = int(tlv[0], 0) 488 if tag in custom_tlvs: 489 raise click.UsageError('Custom TLV %s already exists.' % hex(tag)) 490 if tag in image.TLV_VALUES.values(): 492 'Custom TLV %s conflicts with predefined TLV.' % hex(tag)) 498 custom_tlvs[tag] = bytes.fromhex(value[2:]) 500 custom_tlvs[tag] = value.encode('utf-8')
|
D | image.py | 594 for tag, value in compression_tlvs.items(): 595 prot_tlv.add(tag, value) 597 for tag, value in custom_tlvs.items(): 598 prot_tlv.add(tag, value)
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 561 assert_eq!(key_bytes.tag, "RSA PRIVATE KEY"); in make_tlv() 625 assert_eq!(key_bytes.tag, "PRIVATE KEY"); in make_tlv() 641 assert_eq!(key_bytes.tag, "PUBLIC KEY"); in make_tlv() 687 assert_eq!(key_bytes.tag, "PUBLIC KEY"); in make_tlv() 758 let tag = hmac::sign(&key, &cipherkey); in make_tlv() localVariable 762 buf.append(&mut tag.as_ref().to_vec()); in make_tlv()
|
/mcuboot-latest/boot/bootutil/src/ |
D | encrypted.c | 450 uint8_t tag[BOOTUTIL_CRYPTO_SHA256_DIGEST_SIZE]; in boot_decrypt_key() local 586 rc = bootutil_hmac_sha256_finish(&hmac, tag, BOOTUTIL_CRYPTO_SHA256_DIGEST_SIZE); in boot_decrypt_key() 592 if (bootutil_constant_time_compare(tag, &buf[EC_TAG_INDEX], 32) != 0) { in boot_decrypt_key()
|
/mcuboot-latest/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 131 This compares the computed tag with some given tag. 137 * The tc_hmac_final function, responsible for computing the message tag, 213 produce the same authentication tag). TinyCrypt CCM implementation
|