/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | sha256.c | 157 static inline unsigned int ROTR(unsigned int a, unsigned int n) in ROTR() argument 159 return (((a) >> n) | ((a) << (32 - n))); in ROTR() 162 #define Sigma0(a)(ROTR((a), 2) ^ ROTR((a), 13) ^ ROTR((a), 22)) argument 163 #define Sigma1(a)(ROTR((a), 6) ^ ROTR((a), 11) ^ ROTR((a), 25)) argument 164 #define sigma0(a)(ROTR((a), 7) ^ ROTR((a), 18) ^ ((a) >> 3)) argument 165 #define sigma1(a)(ROTR((a), 17) ^ ROTR((a), 19) ^ ((a) >> 10)) argument 167 #define Ch(a, b, c)(((a) & (b)) ^ ((~(a)) & (c))) argument 168 #define Maj(a, b, c)(((a) & (b)) ^ ((a) & (c)) ^ ((b) & (c))) argument 183 unsigned int a, b, c, d, e, f, g, h; in compress() local 190 a = iv[0]; b = iv[1]; c = iv[2]; d = iv[3]; in compress() [all …]
|
D | aes_decrypt.c | 67 #define mult8(a)(_double_byte(_double_byte(_double_byte(a)))) argument 68 #define mult9(a)(mult8(a)^(a)) argument 69 #define multb(a)(mult8(a)^_double_byte(a)^(a)) argument 70 #define multd(a)(mult8(a)^_double_byte(_double_byte(a))^(a)) argument 71 #define multe(a)(mult8(a)^_double_byte(_double_byte(a))^_double_byte(a)) argument
|
D | utils.c | 59 uint8_t _double_byte(uint8_t a) in _double_byte() argument 61 return ((a<<1) ^ ((a>>7) * MASK_TWENTY_SEVEN)); in _double_byte() 64 int _compare(const uint8_t *a, const uint8_t *b, size_t size) in _compare() argument 66 const uint8_t *tempa = a; in _compare()
|
D | aes_encrypt.c | 62 static inline unsigned int rotword(unsigned int a) in rotword() argument 64 return (((a) >> 24)|((a) << 8)); in rotword() 67 #define subbyte(a, o)(sbox[((a) >> (o))&0xff] << (o)) argument 68 #define subword(a)(subbyte(a, 24)|subbyte(a, 16)|subbyte(a, 8)|subbyte(a, 0)) argument 122 #define triple(a)(_double_byte(a)^(a)) argument
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/ |
D | sha512.c | 170 static inline uint64_t ROTR(uint64_t a, uint64_t n) in ROTR() argument 172 return (((a) >> n) | ((a) << (64 - n))); in ROTR() 175 #define Sigma0(a)(ROTR((a), 28) ^ ROTR((a), 34) ^ ROTR((a), 39)) argument 176 #define Sigma1(a)(ROTR((a), 14) ^ ROTR((a), 18) ^ ROTR((a), 41)) argument 177 #define sigma0(a)(ROTR((a), 1) ^ ROTR((a), 8) ^ ((a) >> 7)) argument 178 #define sigma1(a)(ROTR((a), 19) ^ ROTR((a), 61) ^ ((a) >> 6)) argument 180 #define Ch(a, b, c)(((a) & (b)) ^ ((~(a)) & (c))) argument 181 #define Maj(a, b, c)(((a) & (b)) ^ ((a) & (c)) ^ ((b) & (c))) argument 200 uint64_t a, b, c, d, e, f, g, h; in compress() local 207 a = iv[0]; b = iv[1]; c = iv[2]; d = iv[3]; in compress() [all …]
|
/mcuboot-latest/docs/ |
D | release.md | 8 follow a `MAJOR.MINOR.PATCH` format with the following guidelines on 12 2. MINOR version when new functionalities were added in a 23 Before making a release, update the `docs/release-notes.md` file 24 to describe the release. This should be a high-level description of 25 the changes, not a list of the git commits. 36 release candidate (a.b.c-rc1, followed by a.b.c-rc2 and the subsequent 37 release candidates, followed by the official a.b.c release). The intent 62 On Mynewt, `newt` always fetches a versioned MCUboot release, so after 70 There is a version file used by Zephyr builds to indicate the version 79 To make a release, make sure your local repo is on the tip version by [all …]
|
D | SubmittingPatches.md | 8 Each commit has to have, in the commit message, a "Signed-off-by" line 10 must add this line at the end of the commit text, separated by a blank 11 line. You can also add a line linking the commit to a specific GitHub 29 For more details about linking a GitHub pull request to a GitHub issue, 31 …(https://docs.github.com/en/issues/tracking-your-work-with-issues/linking-a-pull-request-to-an-iss… 36 changes must include a release note snippet in the pull request. 37 This can be either a separate commit, or as part of a single commit 39 release note snippet should be a separate commit, and a pull request 40 that is a single commit can include the release note snippet in that 66 By making a contribution to this project, I certify that: [all …]
|
D | readme-nuttx.md | 5 The NuttX port of MCUboot secure boot library expects that the platform provides a Flash storage wi… 25 …a firmware update agent, which is an important component of a secure firmware update subsystem. Th… 27 …a webserver, installing it and triggering the firmware update process for the next boot after a sy… 29 ## Using MCUboot on NuttX as a secure boot solution 31 …a secure bootloader application requiring minimal platform-specific implementation. The logical im… 39 The implementation of `<flash_map_backend/flash_map_backend.h>` expects that the MTD driver for a g… 45 … MTD. So The NuttX implementation of `flash_area_align()` is able to return a fixed value of 1 byt…
|
D | readme-mbed.md | 7 Note: The following is a general overview. It does not cover MCUboot or Mbed OS basics. 9 See https://github.com/AGlass0fMilk/mbed-mcuboot-demo as a detailed example. 21 ### Providing a secondary slot 35 …ild a bootloader based on MCUboot, make sure `"mcuboot.bootloader-build"` is `true` (already the d… 37 ### Building a user application 39 …a user application, set `"mcuboot.bootloader-build"` to `false` so MCUboot is built as a _library …
|
D | readme-zephyr.md | 4 acquired the ability to be used as a bootloader for Zephyr as well. 21 needed (see end of this help file for details on creating a scratch partition 33 The flash partitions are typically defined in the Zephyr boards folder, in a 51 Zephyr's point of view. There is a bit of configuration that needs to 54 guidance. It is important to select a signature algorithm, and decide 57 To build MCUboot, create a build directory in boot/zephyr, and build 70 MCUboot on a per-SoC family basis. 90 a simple application with everything you need. You can try it on your 91 board and then just make a copy of it to get started on your own 92 application; see samples/zephyr/README.md for a tutorial. [all …]
|
D | PORTING.md | 4 `MCUboot` to a new target `OS`. 8 * `MCUboot` requires a configuration file, which can be included as 12 * `MCUboot` requires that the target provides a `flash` API with ability to 15 * `MCUboot` doesn't bundle a cryptographic library, which means the target 24 From the perspective of the target OS, the bootloader can be seen as a library, 25 so an entry point must be provided. This is likely a typical `app` for the 32 This function is located at `boot/bootutil/loader.c` and receives a `struct 55 You must provide a file, mcuboot_config/mcuboot_config.h. This is 60 See the file samples/mcuboot_config/mcuboot_config.template.h for a 61 starting point and more information. This is a good place to convert [all …]
|
D | testplan-zephyr.md | 21 Begin by doing a full erase, and programming the bootloader itself: 26 After it resets, look for "main: Starting bootloader", a few debug 42 This should print a message: `boot_swap_type: Swap type: test`, and 49 And you should see a revert and "hello1" running. 53 Repeat this, to make sure we can mark the image as OK, and that a 61 $ pyocd flash -a 0x7ffe8 image_ok.bin
|
D | readme-riot.md | 4 acquired the ability to be used as a bootloader for RIOT as well. 9 In this first version, a prebuilt Mynewt binary is downloaded at 11 not a signature check. In order to configure the bootloader for 23 with a valid formatted value. The format is `major.minor.patch+other` 27 The goal is to produce an ELF file which is linked to be flashed at a 37 If no key is provided, a new key will be automatically generated. The
|
D | ecdsa.md | 3 When the ECDSA SECP256R1 (EC256) signature support was added to MCUboot, a 5 always a fixed length. Unfortunately, this padding was done in a way 11 - Use a reversible padding scheme. This solution requires 28 This document proposes a multi-stage approach to give a transition 31 1. Add a `--no-pad-sig` argument to the sign command in 57 behavior, but will not specify a specific version of imgtool. 80 signature will vary by a couple of bytes, depending on whether one or 86 signature ended in a zero, MCUboot would remove too many bytes and render the
|
D | release-notes.md | 22 a given board. 40 allows for a single application slot and firmware loader image in 45 - Zephyr: Add USB CDC serial recovery check that now causes a build 48 - Zephyr: Add USB CDC serial recovery check that now causes a build 53 improves support a bit for some configurations of external flash. 54 - fix a memory leak in the HKDF implementation. 55 - Zephyr: Added a MCUboot banner which displays the version of 62 Note that this release, 2.0.0 is a new major number, and contains a small API 94 - imgtool's getpub can print the output to a file 98 output was sent, this would lead to a divergence of commands [all …]
|
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_cbc_mode.c | 106 struct tc_aes_key_sched_struct a; in test_1_and_2() local 114 (void)tc_aes128_set_encrypt_key(&a, key); in test_1_and_2() 120 plaintext, sizeof(plaintext), iv_buffer, &a) == 0) { in test_1_and_2() 132 (void)tc_aes128_set_decrypt_key(&a, key); in test_1_and_2() 138 encrypted, &a) == 0) { in test_1_and_2()
|
/mcuboot-latest/samples/zephyr/hello-world/ |
D | README.rst | 1 This is a "Hello world" skeleton application which can be used as a 5 loadable by mcuboot in addition to a basic Zephyr hello world
|
D | CMakeLists.txt | 8 # This provides a basic application structure suitable for loading by 9 # mcuboot, which is easy to customize on a per-board basis. It can be 10 # used as a starting point for new applications.
|
/mcuboot-latest/ext/tinycrypt/lib/ |
D | Makefile | 29 all: libtinycrypt.a 31 libtinycrypt.a: $(OBJS) 37 -$(RM) *.exe $(OBJS) $(DEPS) *~ libtinycrypt.a
|
/mcuboot-latest/docs/release-notes.d/ |
D | swap-using-offset.md | 1 - Added a new swap using offset algorithm which is set with 5 the update slot, which offers a faster update process and 6 requires a smaller swap status area
|
D | 00readme.md | 6 Generally a release note entry should be created for changes that: 21 directory and have a name of `*.md`. They will be included in the 22 `release-notes.md` file, and should be formatted as a Markdown list 26 Choose a filename that is related to what this change does. The names 28 distinct so that there isn't a concern with merge conflicts as
|
D | fix-stuck-revert.md | 1 - Fixed issue for swap using move whereby a device could get 2 stuck in a revert loop despite there being no image in the
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | utils.h | 79 uint8_t _double_byte(uint8_t a); 89 int _compare(const uint8_t *a, const uint8_t *b, size_t size);
|
/mcuboot-latest/ext/fiat/ |
D | README.md | 9 To generate the field arithmetic procedures in `curve25519.c` from a fiat-crypto 16 unsigned integers with a single carry chain and two wraparound carries" where 26 To generate the field arithmetic procedures in `p256.c` from a fiat-crypto 33 untrusted. There is currently a known issue where `fesub.c` for p256 does not 34 manage to complete the build (specialization) within a week on Coq 8.7.0. 43 contains an overview of the implementation templates followed by a tour of the
|
/mcuboot-latest/samples/runtime-source/zephyr/ |
D | README.md | 3 This sample demonstrates how to use a non flash storage to retrieve the image 4 being booted. It was tested on a FRDM K64F. Both slots are used to store two 5 different images. The image to be booted is selected based on a button press. 53 Open a serial terminal to see the output and reset the board. It shall boot the
|