Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 136) sorted by relevance

123456

/Zephyr-latest/subsys/jwt/
DKconfig14 prompt "JWT signature algorithm"
20 bool "Use RSA signature (RS-256). Use Mbed TLS as crypto library."
26 bool "Use RSA signature (RS-256). Use PSA Crypto API."
35 bool "Use ECDSA signature (ES-256). Use PSA Crypto API."
/Zephyr-latest/cmake/
Dtarget_toolchain_flags.cmake3 # What we are looking for, is a signature definition that is defined
12 # * CMAKE_C_COMPILER_ID is taking the CMake compiler id for extra signature.
14 # methods, where an upgraded compiler could have same signature due to ccache
16 # and thus generate a new signature.
18 # Toolchains with the same signature will always support the same set of flags.
23 # Extend the CMAKE_C_COMPILER_MD5_SUM with the compiler signature.
/Zephyr-latest/modules/
DKconfig.tinycrypt53 bool "ECC_DSA digital signature algorithm"
56 Signature Algorithm (ECDSA).
/Zephyr-latest/samples/tfm_integration/psa_crypto/src/configs/
Dconfig_tfm.h8 * It causes insufficient memory failure while verifying signature.
/Zephyr-latest/samples/tfm_integration/psa_crypto/src/
Dpsa_crypto.c632 /* Display the ECDSA signature for debug purposes */ in crp_sign_hash()
656 * @brief Verifies the hash signature using the public key associated
662 * @param sig Pointer to the signature buffer.
663 * @param sig_len Size of the signature buffer in bytes.
672 LOG_INF("Verifying signature for SHA-256 hash"); in crp_verify_sign()
684 /* Verify the hash signature. */ in crp_verify_sign()
692 LOG_ERR("Signature verification failed!"); in crp_verify_sign()
696 LOG_INF("Signature verified."); in crp_verify_sign()
815 * $ openssl dgst -sha256 -sign user.pem message.txt > signature.der in crp_test()
817 * Verify the signature using the public key and message file: in crp_test()
[all …]
Dutil_app_log.c80 LOG_ERR("Invalid signature"); in al_psa_status()
/Zephyr-latest/tests/boot/test_mcuboot/
Dsysbuild.cmake9 "Signature key file for signing" FORCE)
/Zephyr-latest/soc/lowrisc/opentitan/
Drom_header.S13 * containing signature, device ID, version info, etc. The test ROM
/Zephyr-latest/samples/tfm_integration/psa_crypto/
Dsample.yaml33 - "Signature verified"
/Zephyr-latest/doc/services/device_mgmt/
Dota.rst44 is downloaded and installed. MCUboot can be used to verify the signature before
56 signature before upgrading the firmware.
/Zephyr-latest/arch/x86/core/intel64/
Dsmp.c21 * z_sched_ipi() doesn't have the same signature as a typical ISR, so in arch_smp_init()
/Zephyr-latest/tests/subsys/rtio/rtio_i2c/include/
Dblocking_emul.hpp10 * We need to override fff's function signature away from a standard function pointer.
/Zephyr-latest/include/zephyr/acpi/
Dacpi.h228 * @brief Retrieve acpi table for the given signature.
230 * @param signature pointer to the 4-character ACPI signature for the requested table
234 void *acpi_table_get(char *signature, int inst);
/Zephyr-latest/include/zephyr/drivers/console/
Dconsole.h30 /** @brief Console input processing handler signature
/Zephyr-latest/include/zephyr/lorawan/
Demul.h17 * @brief Defines the emulator uplink callback handler function signature.
/Zephyr-latest/arch/xtensa/core/startup/
Dreset_vector.S108 /* Signature for compare - retained for later */
116 /* Load save area signature field */
119 /* If signature mismatch then do cold start */
233 * a5 - saved state signature (CORE_STATE_SIGNATURE)
237 /* load save area signature */
239 /* compare signature with expected one */
254 /* Wakeup from PSO with good signature. Now check cache status:
330 * or zero if signature check failed.
333 /* wakeup from PSO with good signature? */
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/
DKconfig42 format consists container header, image arrary entry, signature block
/Zephyr-latest/include/zephyr/debug/coresight/
Dcs_trace_defmt.h24 /** @brief Callback signature.
/Zephyr-latest/share/sysbuild/images/bootloader/
DKconfig125 prompt "Signature type"
129 bool "No signature; use only hash check"
/Zephyr-latest/soc/ite/ec/common/
Dvector.S76 * eflash signature used to enable specific function after power-on reset.
105 /* flag of signature */
/Zephyr-latest/arch/arm/include/cortex_m/
Dtz_ns.h130 * @param ... The rest of the signature of the function. This must be the same
131 * signature as the corresponding NS entry function.
/Zephyr-latest/include/zephyr/
Dtypes.h51 /* Zephyr requires an int main(void) signature with C linkage for the application main if present */
/Zephyr-latest/include/zephyr/drivers/
Duart_emul.h36 * @brief Define the emulation callback function signature
/Zephyr-latest/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dshell.py12 from inspect import signature
122 cls_fields = {field for field in signature(cls).parameters}
/Zephyr-latest/modules/canopennode/
Dcanopen_storage.c151 " signature mismatch, skipping" in canopen_settings_set()
173 " signature mismatch, skipping" in canopen_settings_set()

123456