/Zephyr-latest/tests/crypto/tinycrypt/src/ |
D | sha256.c | 67 uint8_t digest[32]; in ZTEST() local 72 (void)tc_sha256_final(digest, &s); in ZTEST() 74 digest, sizeof(digest), 1); in ZTEST() 97 uint8_t digest[32]; in ZTEST() local 102 (void)tc_sha256_final(digest, &s); in ZTEST() 105 digest, sizeof(digest), 1); in ZTEST() 124 uint8_t digest[32]; in ZTEST() local 129 (void)tc_sha256_final(digest, &s); in ZTEST() 132 digest, sizeof(digest), 1); in ZTEST() 152 uint8_t digest[32]; in ZTEST() local [all …]
|
D | ecc_dsa.c | 90 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local 108 /* validate ECDSA: hash message, sign digest, check r+s */ in sign_vectors() 123 /* if digest larger than ECC scalar, drop the end in sign_vectors() 124 * if digest smaller than ECC scalar, zero-pad front */ in sign_vectors() 130 (void)memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors() 131 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS - hash_dwords), in sign_vectors() 352 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local 380 /* if digest larger than ECC scalar, drop the end in vrfy_vectors() 381 * if digest smaller than ECC scalar, zero-pad front */ in vrfy_vectors() 387 (void)memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors() [all …]
|
D | hmac.c | 49 uint8_t digest[32]; in do_hmac_test() local 54 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test() 56 digest, sizeof(digest), 1); in do_hmac_test()
|
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/ |
D | sample.yaml | 16 - "Digest: be45cb2605bf36bebde684841a28f0fd43c69850a3dce5fedba69928ee3a8991" 17 - "Digest: 1452c8f04245d355722fdbfb03c69bcfd380b7dff911a3e425013397251f6a4e" 18 - "Digest: d3b4349010abb691b9584b6fd6b41ec54596ef7b98d853fb4f5bfa690f50f222" 19 - "Digest: 5afbcfede855ca834ff5b4e8a44a32206a51381f3cf52f5001a3241f017ac41a" 20 - "Digest: 983318380c325099da63de2e7ca57c1630693b28b4754e08817533295dbfcfbb"
|
D | README.rst | 54 Digest: be45cb2605bf36bebde684841a28f0fd43c69850a3dce5fedba69928ee3a8991 55 Digest: 1452c8f04245d355722fdbfb03c69bcfd380b7dff911a3e425013397251f6a4e 56 Digest: d3b4349010abb691b9584b6fd6b41ec54596ef7b98d853fb4f5bfa690f50f222 57 Digest: 5afbcfede855ca834ff5b4e8a44a32206a51381f3cf52f5001a3241f017ac41a 58 Digest: 983318380c325099da63de2e7ca57c1630693b28b4754e08817533295dbfcfbb
|
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/src/ |
D | main.c | 14 uint8_t digest[32]; in main() local 17 psa_status_t status = dp_secret_digest(key, digest, sizeof(digest)); in main() 24 printk("Digest: "); in main() 26 printk("%02x", digest[i]); in main()
|
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/dummy_partition/ |
D | dummy_partition.c | 28 typedef void (*psa_write_callback_t)(void *handle, uint8_t *digest, 35 uint8_t digest[32]; in tfm_dp_secret_digest() local 44 if (digest_size != sizeof(digest)) { in tfm_dp_secret_digest() 49 sizeof(secrets[secret_index].secret), digest, in tfm_dp_secret_digest() 59 callback(handle, digest, digest_size); in tfm_dp_secret_digest() 66 static void psa_write_digest(void *handle, uint8_t *digest, in psa_write_digest() argument 69 psa_write((psa_handle_t)handle, 0, digest, digest_size); in psa_write_digest()
|
/Zephyr-latest/samples/boards/microchip/mec172xevb_assy6906/rom_api/src/ |
D | main.c | 23 const uint8_t *digest; member 189 .digest = msg37_sha224_digest, 195 .digest = msg37_sha256_digest, 201 .digest = msg37_sha384_digest, 207 .digest = msg37_sha512_digest, 213 .digest = msg185_sha224_digest, 219 .digest = msg185_sha256_digest, 225 .digest = msg185_sha384_digest, 231 .digest = msg185_sha512_digest, 237 .digest = msg238_sha224_digest, [all …]
|
/Zephyr-latest/subsys/net/lib/tls_credentials/ |
D | tls_credentials_digest_raw.c | 8 /* This file provides an (internal-use-only) credential digest function that backends storing 32 /* Compute digest. */ in credential_digest_raw() 39 /* Attempt to encode digest to destination. in credential_digest_raw()
|
D | tls_internal.h | 67 /* Writes a (NULL-terminated, printable) string digest of the contents of the provided credential 70 * Digest format/type is up to the tls_credentials backend in use.
|
D | Kconfig.shell | 33 Also used to print error messages if digest generation fails.
|
/Zephyr-latest/dts/bindings/crypto/ |
D | nuvoton,npcx-sha.yaml | 19 intermdiate computation result and final digest.
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | tls_credentials_shell.rst | 190 <SECTAG>,<TYPE>,<DIGEST>,<STATUS> 200 …"``<DIGEST>``", "A string digest representing the credential contents. The exact nature of this di… 201 …"``<STATUS>``", "Status code indicating success or failure with generating a digest of the listed …
|
/Zephyr-latest/drivers/crypto/ |
D | crypto_mchp_xec_symcr.c | 264 int mchp_xec_rom_hash_digest_wrapper(struct mchphash *c, uint8_t *digest) in mchp_xec_rom_hash_digest_wrapper() argument 266 if (!c || !digest) { in mchp_xec_rom_hash_digest_wrapper() 270 if (mchp_xec_rom_hash_digest(c, (char *)digest)) { in mchp_xec_rom_hash_digest_wrapper() 296 * and compute final hash digest(finish==true) 323 /* Not final digest computation and not enough data to run engine */ in xec_symcr_do_hash()
|
D | crypto_npcx_sha.c | 44 /* Return the SHA result (digest.) */
|
/Zephyr-latest/soc/espressif/common/ |
D | Kconfig.esptool | 177 by a SHA256 digest. Updating the bootloader image before flashing would 178 invalidate the digest.
|
/Zephyr-latest/soc/nuvoton/npcm/common/esiost/ |
D | esiost.py | 309 """Computes the SHA-256 digest of a file using hashlib. 311 :param filepath: Path to the file to digest. 312 :return: The SHA-256 digest of the file as a bytearray. 319 return bytearray(sha256_hash.digest()) 357 hash_data = bytearray(sha256_hash.digest()) 487 hash_data = bytearray(sha256_hash.digest())
|
/Zephyr-latest/scripts/build/ |
D | llext_slidlib.py | 41 hash = m.digest()
|
/Zephyr-latest/soc/microchip/mec/common/spigen/ |
D | mec_spi_gen.py | 224 # hdr[0xB0 through 0xDF] = SHA-384 digest of hdr[0 through 0xAF] Always required 230 hdr_digest = h.digest() 423 image_digest = h.digest() 427 print("SHA-384 digest (paddedFW || ec_info_block || cosig)") 428 print_bytes("digest", image_digest)
|
/Zephyr-latest/subsys/mgmt/updatehub/ |
D | updatehub_integrity.c | 86 LOG_DBG("HASH input buffer is to small to store the message digest"); in updatehub_integrity_finish()
|
/Zephyr-latest/subsys/net/ip/ |
D | ipv6_pe.c | 228 uint8_t digest[32]; in gen_temporary_iid() local 277 ret = mbedtls_md_hmac_finish(&ctx, digest); in gen_temporary_iid() 283 memcpy(temporary_iid, digest, MIN(sizeof(digest), temporary_iid_len)); in gen_temporary_iid()
|
D | ipv6.c | 873 uint8_t digest[32]; in gen_stable_iid() local 924 ret = mbedtls_md_hmac_finish(&ctx, digest); in gen_stable_iid() 930 memcpy(stable_iid, digest, MIN(sizeof(digest), stable_iid_len)); in gen_stable_iid()
|
/Zephyr-latest/scripts/west_commands/ |
D | sdk.py | 326 digest = hashlib.sha256(sha256file.read()).hexdigest() 327 if sha256 != digest: 328 raise Exception(f"sha256 mismatched: {sha256}:{digest}")
|
D | blobs.py | 122 # to the digest in blob metadata, warn user if they differ.
|
/Zephyr-latest/boards/microchip/mec172xevb_assy6906/support/ |
D | mec172x_remote_flasher.py | 140 # Calculate a sha256 digest for SPI file.
|