/mcuboot-3.6.0/boot/bootutil/include/bootutil/ |
D | boot_status.h | 30 * The shared data between boot loader and runtime SW is TLV encoded. The 31 * shared data is stored in a well known location in memory and this is a 34 * The structure of shared data must be the following: 37 * size of the shared data area including this header. 39 * header structure: struct shared_data_tlv_entry and the data. In the entry 41 * entry in the runtime SW and specify the subtype of that data item. There 42 * is a size field (tlv_len) which covers the size of the the data. After 43 * this structure comes the actual data. 45 * - Arbitrary number and size of data entry can be in the shared memory area. 49 * identifies the addressee in runtime SW, who should process the data entry. [all …]
|
D | boot_record.h | 39 * @brief Add a data item to the shared data area between bootloader and 44 * @param[in] size length of added data 45 * @param[in] data pointer to data 52 const uint8_t *data); 69 * Add application specific data to the shared memory area between the
|
/mcuboot-3.6.0/ext/tinycrypt/tests/ |
D | test_ccm_mode.c | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 44 * - AES128 CCM mode encryption No associated data 45 * - AES128 CCM mode encryption No payload data 72 size_t hlen, const uint8_t *data, in do_test() argument 95 hlen, data, dlen, &c); in do_test() 118 show_str("\t\tExpected", data, dlen); in do_test() 147 const uint8_t data[DATA_BUF_LEN23] = { in test_vector_1() local 164 data, sizeof(data), expected, sizeof(expected), mlen); in test_vector_1() 184 const uint8_t data[DATA_BUF_LEN24] = { in test_vector_2() local 201 data, sizeof(data), expected, sizeof(expected), mlen); in test_vector_2() [all …]
|
D | test_hmac.c | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 51 unsigned int do_hmac_test(TCHmacState_t h, unsigned int testnum, const uint8_t *data, in do_hmac_test() argument 59 (void)tc_hmac_update(h, data, datalen); in do_hmac_test() 79 const uint8_t data[8] = { in test_1() local 91 result = do_hmac_test(&h, 1, data, sizeof(data),expected, in test_1() 104 const uint8_t data[28] = { in test_2() local 119 result = do_hmac_test(&h, 2, data, sizeof(data), expected, in test_2() 133 const uint8_t data[50] = { in test_3() local 150 result = do_hmac_test(&h, 3, data, sizeof(data), expected, in test_3() 166 const uint8_t data[50] = { in test_4() local [all …]
|
/mcuboot-3.6.0/boot/mbed/include/utils/ |
D | DataShare.h | 38 #define DATA_SHARE_ERROR_CORRUPT 3 /* Data corruption has been detected */ 41 * Class enabling iterator-style access to the TLV-encoded data shared 55 * Validates the magic number of the shared data section 61 * Gets the total size of the shared data region 62 * @return 0 if shared data region is not valid, otherwise the size of the shared data region 67 * Attempts to get the next TLV entry in the shared data memory 68 * @param[put] type Type code of the data entry 77 * data region
|
/mcuboot-3.6.0/ext/tinycrypt/lib/include/tinycrypt/ |
D | cmac_mode.h | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 71 * cipher block size. Once setup, this data structure can be used for 75 * some data requires three steps: 78 * (2) next mix all of the data into the CMAC computation state using 79 * tc_cmac_update. If all of the data resides in a single data 80 * segment then only one tc_cmac_update call is needed; if data 81 * is scattered throughout memory in n data segments, then n calls 83 * attacks that swap bytes, so the order in which data is mixed 85 * (3) Once all of the data for a message has been mixed, use 166 * @brief Incrementally computes CMAC over the next data segment [all …]
|
D | sha256.h | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 38 * specified in FIPS 180. A hash algorithm maps data of arbitrary 39 * size to data of fixed length. 91 * Hashes data_length bytes addressed by data into state s 96 * data == NULL 99 * If your application intends to have sensitive data in this 100 * buffer, remind to erase it after the data has been processed 102 * @param data message to hash 105 int tc_sha256_update (TCSha256State_t s, const uint8_t *data, size_t datalen); 118 * If your application intends to have sensitive data in this [all …]
|
D | ccm_mode.h | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 42 * 1) Both non-empty payload and associated data (it encrypts and 44 * data); 45 * 2) Non-empty payload and empty associated data (it encrypts and 47 * 3) Non-empty associated data and empty payload (it degenerates to 48 * an authentication mode on the associated data). 50 * TinyCrypt CCM implementation accepts associated data of any length 69 * 2) call tc_ccm_mode_encrypt to encrypt data and generate tag. 71 * 3) call tc_ccm_mode_decrypt to decrypt data and verify tag. 126 * @param out OUT -- encrypted data [all …]
|
D | hmac.h | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 41 * transformation specified by a key in an arbitrary length data 42 * set into a fixed length data set (also called tag). 54 * processing the data. 106 * Mixes data_length bytes addressed by data into state 111 * @param data IN -- data to incorporate into state 112 * @param data_length IN -- size of data in bytes 114 int tc_hmac_update(TCHmacState_t ctx, const void *data,
|
D | ecc_dsa.h | 23 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 53 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 69 * Usage: - To sign: Compute a hash of the data you wish to sign (SHA-2 is 73 * - To verify a signature: Compute the hash of the signed data using 100 * @note Usage: Compute a hash of the data you wish to sign (SHA-2 is 124 * @param p_message_hash IN -- The hash of the signed data. 128 * @note Usage: Compute the hash of the signed data using the same hash as the
|
/mcuboot-3.6.0/ext/tinycrypt-sha512/lib/include/tinycrypt/ |
D | sha512.h | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 38 * specified in FIPS 180. A hash algorithm maps data of arbitrary 39 * size to data of fixed length. 91 * Hashes data_length bytes addressed by data into state s 96 * data == NULL 99 * If your application intends to have sensitive data in this 100 * buffer, remind to erase it after the data has been processed 102 * @param data message to hash 105 int tc_sha512_update (TCSha512State_t s, const uint8_t *data, size_t datalen); 118 * If your application intends to have sensitive data in this [all …]
|
/mcuboot-3.6.0/boot/zephyr/ |
D | shared_data.c | 33 const uint8_t *data) in boot_add_data_to_shared_area() argument 44 if (data == NULL) { in boot_add_data_to_shared_area() 49 * shared data area. in boot_add_data_to_shared_area() 101 LOG_ERR("Shared data TLV header write failed: %d", rc); in boot_add_data_to_shared_area() 106 rc = retention_write(bootloader_info_dev, offset, data, size); in boot_add_data_to_shared_area() 109 LOG_ERR("Shared data TLV data write failed: %d", rc); in boot_add_data_to_shared_area()
|
/mcuboot-3.6.0/ext/tinycrypt/lib/source/ |
D | cmac_mode.c | 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 157 int tc_cmac_update(TCCmacState_t s, const uint8_t *data, size_t data_length) in tc_cmac_update() argument 168 if (data == (const uint8_t *) 0) { in tc_cmac_update() 179 /* last data added to s didn't end on a TC_AES_BLOCK_SIZE byte boundary */ in tc_cmac_update() 183 /* still not enough data to encrypt this time either */ in tc_cmac_update() 184 _copy(&s->leftover[s->leftover_offset], data_length, data, data_length); in tc_cmac_update() 191 data, in tc_cmac_update() 194 data += remaining_space; in tc_cmac_update() 203 /* CBC encrypt each (except the last) of the data blocks */ in tc_cmac_update() 206 s->iv[i] ^= data[i]; in tc_cmac_update() [all …]
|
/mcuboot-3.6.0/boot/espressif/port/ |
D | esp_loader.c | 28 const uint32_t *data = (const uint32_t *)bootloader_mmap((fap->fa_off + data_addr), data_len); in load_segment() local 29 if (!data) { in load_segment() 33 memcpy((void *)load_addr, data, data_len); in load_segment() 34 bootloader_munmap(data); in load_segment() 52 …const uint32_t *data = (const uint32_t *)bootloader_mmap((fap->fa_off + hdr_offset), sizeof(esp_im… in esp_app_image_load() local 54 memcpy((void *)&load_header, data, sizeof(esp_image_load_header_t)); in esp_app_image_load() 55 bootloader_munmap(data); in esp_app_image_load()
|
/mcuboot-3.6.0/ext/mbedtls-asn1/include/mbedtls/ |
D | asn1.h | 43 * ASN1 is a standard to specify data structures. 46 …R_ASN1_OUT_OF_DATA -0x0060 /**< Out of data when parsing an ASN1 data struct… 50 #define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068 /**< Data is invalid. */ 52 …F_TOO_SMALL -0x006C /**< Buffer too small when writing ASN.1 data structure. */ 139 * \name Functions to parse ASN.1 data structures 150 unsigned char *MBEDTLS_PRIVATE(p); /**< ASN1 data, e.g. in ASCII. */ 161 unsigned char *MBEDTLS_PRIVATE(p); /**< Raw ASN1 data for the bit string */ 176 * Container for a sequence or list of 'named' ASN.1 data items 196 * \param end End of data. 218 * \param end End of data. [all …]
|
D | rsa.h | 45 #define MBEDTLS_ERR_RSA_INVALID_PADDING -0x4100 /**< Input data contains invalid… 577 * \param input The input data to encrypt. This must be a readable 604 * \param input The input data to encrypt. This must be a readable 638 * \param input The input data to encrypt. This must be a readable 793 * \param md_alg The message-digest algorithm used to hash the original data. 794 * Use #MBEDTLS_MD_NONE for signing raw data. 795 * \param hashlen The length of the message digest or raw data in Bytes. 798 * \param hash The buffer holding the message digest or raw data. 825 * \param md_alg The message-digest algorithm used to hash the original data. 826 * Use #MBEDTLS_MD_NONE for signing raw data. [all …]
|
D | md.h | 241 * with mbedtls_md_setup(), and before passing data with 261 * \param input The buffer holding the input data. 262 * \param ilen The length of the input data. 300 * \param input The buffer holding the data. 301 * \param ilen The length of the input data. 339 * mbedtls_md_hmac_update() to provide the input data, and 366 * \param input The buffer holding the input data. 367 * \param ilen The length of the input data. 427 * \param input The buffer holding the input data. 428 * \param ilen The length of the input data. [all …]
|
/mcuboot-3.6.0/ext/nrf/ |
D | cc310_glue.c | 38 const void *data, in cc310_sha256_update() argument 43 * if the data provided is not located in RAM. in cc310_sha256_update() 46 if ((uint32_t) data < CONFIG_SRAM_BASE_ADDRESS) { in cc310_sha256_update() 49 memcpy(stack_buffer, data, block_len); in cc310_sha256_update() 52 nrf_cc310_bl_hash_sha256_update(ctx, data, data_len); in cc310_sha256_update()
|
/mcuboot-3.6.0/boot/bootutil/include/bootutil/crypto/ |
D | sha.h | 99 const void *data, in bootutil_sha_update() argument 102 return (int)psa_hash_update(ctx, data, data_len); in bootutil_sha_update() 136 const void *data, 139 return mbedtls_sha256_update_ret(ctx, data, data_len); 166 const void *data, in bootutil_sha_update() argument 169 return tc_sha256_update(ctx, data, data_len); in bootutil_sha_update() 194 const void *data, in bootutil_sha_update() argument 197 cc310_sha256_update(ctx, data, data_len); in bootutil_sha_update()
|
/mcuboot-3.6.0/sim/simflash/src/ |
D | lib.rs | 57 fn read(&self, offset: usize, data: &mut [u8]) -> Result<()>; in read() 89 data: Vec<u8>, field 108 data: vec![erased_val; total], in new() 120 self.data.dump(); in dump() 127 fd.write_all(&self.data)?; in write_file() 163 for x in &mut self.data[offset .. offset + len] { in erase() 194 if offset + payload.len() > self.data.len() { in write() 214 let sub = &mut self.data[offset .. offset + payload.len()]; in write() 220 fn read(&self, offset: usize, data: &mut [u8]) -> Result<()> { in read() 221 if offset + data.len() > self.data.len() { in read() [all …]
|
/mcuboot-3.6.0/boot/espressif/port/esp32h2/ld/ |
D | bootloader.ld | 10 * ESP32-H2 ROM static data usage is as follows: 13 …* - 0x4084f380 - 0x4084fee0: ROM .bss and .data used in startup code or nonos/early boot (can be … 14 …* - 0x4084fee0 - 0x40850000: ROM .bss and .data used in startup code and when IDF runs (cannot be… 26 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu… 105 .dram0.data : 108 *(.data) 109 *(.data.*) 156 /* Literals are also RO data. */
|
/mcuboot-3.6.0/boot/espressif/port/esp32c2/ld/ |
D | bootloader.ld | 10 * ESP32-C2 ROM static data usage is as follows: 13 * - 0x3fcdeb70 - 0x3fce0000: ROM .bss and .data (not easily reclaimable) 28 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu… 107 .dram0.data : 110 *(.data) 111 *(.data.*) 158 /* Literals are also RO data. */
|
/mcuboot-3.6.0/boot/espressif/port/esp32c6/ld/ |
D | bootloader.ld | 10 * ESP32-C6 ROM static data usage is as follows: 13 * - 0x4087e610 - 0x40880000: ROM .bss and .data (not easily reclaimable) 25 bootloader_stack_overhead = 0x2000; /* For safety margin between bootloader data section and startu… 103 .dram0.data : 106 *(.data) 107 *(.data.*) 154 /* Literals are also RO data. */
|
/mcuboot-3.6.0/boot/cypress/BlinkyApp/linker/ |
D | BlinkyApp_template.ld | 75 … * Note some middleware (e.g. BLE, Emulated EEPROM) can place their data into this memory region. 81 …_user_data (rx) : ORIGIN = 0x16000800, LENGTH = 0x800 /* Supervisory flash: User data */ 194 /* Copy data section to RAM */ 226 .data __ram_vectors_end__ : AT (__etext) 231 *(.data*) 234 /* preinit data */ 240 /* init data */ 247 /* finit data */ 322 /* Check if data + heap + stack exceeds RAM limit */ 327 * The size of the section depends on the required data size. */ [all …]
|
/mcuboot-3.6.0/boot/zcbor/include/ |
D | zcbor_tags.h | 31 …_ENCRYPT0 = 16, ///! COSE_Encrypt0 [RFC9052] COSE Single Recipient Encrypted Data Object 33 …ZCBOR_TAG_COSE_SIGN1 = 18, ///! COSE_Sign1 [RFC9052] COSE Single Signer Data Obje… 37 ZCBOR_TAG_BSTR = 24, ///! byte string [RFC8949] Encoded CBOR data item 77 ZCBOR_TAG_COSE_ENCRYPT = 96, ///! COSE_Encrypt [RFC9052] COSE Encrypted Data Object 78 ZCBOR_TAG_COSE_MAC = 97, ///! COSE_Mac [RFC9052] COSE MACed Data Object 79 ZCBOR_TAG_COSE_SIGN = 98, ///! COSE_Sign [RFC9052] COSE Signed Data Object 89 …agged bstr [RFC9277] indicates that the file starts with a CBOR-Labeled Non-CBOR Data label.
|