Home
last modified time | relevance | path

Searched full:digest (Results 1 – 25 of 29) sorted by relevance

12

/Zephyr-latest/tests/crypto/tinycrypt/src/
Dsha256.c67 uint8_t digest[32]; in ZTEST() local
72 (void)tc_sha256_final(digest, &s); in ZTEST()
74 digest, sizeof(digest), 1); in ZTEST()
97 uint8_t digest[32]; in ZTEST() local
102 (void)tc_sha256_final(digest, &s); in ZTEST()
105 digest, sizeof(digest), 1); in ZTEST()
124 uint8_t digest[32]; in ZTEST() local
129 (void)tc_sha256_final(digest, &s); in ZTEST()
132 digest, sizeof(digest), 1); in ZTEST()
152 uint8_t digest[32]; in ZTEST() local
[all …]
Decc_dsa.c90 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local
108 /* validate ECDSA: hash message, sign digest, check r+s */ in sign_vectors()
123 /* if digest larger than ECC scalar, drop the end in sign_vectors()
124 * if digest smaller than ECC scalar, zero-pad front */ in sign_vectors()
130 (void)memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors()
131 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS - hash_dwords), in sign_vectors()
352 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local
380 /* if digest larger than ECC scalar, drop the end in vrfy_vectors()
381 * if digest smaller than ECC scalar, zero-pad front */ in vrfy_vectors()
387 (void)memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors()
[all …]
Dhmac.c49 uint8_t digest[32]; in do_hmac_test() local
54 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test()
56 digest, sizeof(digest), 1); in do_hmac_test()
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/
Dsample.yaml16 - "Digest: be45cb2605bf36bebde684841a28f0fd43c69850a3dce5fedba69928ee3a8991"
17 - "Digest: 1452c8f04245d355722fdbfb03c69bcfd380b7dff911a3e425013397251f6a4e"
18 - "Digest: d3b4349010abb691b9584b6fd6b41ec54596ef7b98d853fb4f5bfa690f50f222"
19 - "Digest: 5afbcfede855ca834ff5b4e8a44a32206a51381f3cf52f5001a3241f017ac41a"
20 - "Digest: 983318380c325099da63de2e7ca57c1630693b28b4754e08817533295dbfcfbb"
DREADME.rst54 Digest: be45cb2605bf36bebde684841a28f0fd43c69850a3dce5fedba69928ee3a8991
55 Digest: 1452c8f04245d355722fdbfb03c69bcfd380b7dff911a3e425013397251f6a4e
56 Digest: d3b4349010abb691b9584b6fd6b41ec54596ef7b98d853fb4f5bfa690f50f222
57 Digest: 5afbcfede855ca834ff5b4e8a44a32206a51381f3cf52f5001a3241f017ac41a
58 Digest: 983318380c325099da63de2e7ca57c1630693b28b4754e08817533295dbfcfbb
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/src/
Dmain.c14 uint8_t digest[32]; in main() local
17 psa_status_t status = dp_secret_digest(key, digest, sizeof(digest)); in main()
24 printk("Digest: "); in main()
26 printk("%02x", digest[i]); in main()
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/dummy_partition/
Ddummy_partition.c28 typedef void (*psa_write_callback_t)(void *handle, uint8_t *digest,
35 uint8_t digest[32]; in tfm_dp_secret_digest() local
44 if (digest_size != sizeof(digest)) { in tfm_dp_secret_digest()
49 sizeof(secrets[secret_index].secret), digest, in tfm_dp_secret_digest()
59 callback(handle, digest, digest_size); in tfm_dp_secret_digest()
66 static void psa_write_digest(void *handle, uint8_t *digest, in psa_write_digest() argument
69 psa_write((psa_handle_t)handle, 0, digest, digest_size); in psa_write_digest()
/Zephyr-latest/samples/boards/microchip/mec172xevb_assy6906/rom_api/src/
Dmain.c23 const uint8_t *digest; member
189 .digest = msg37_sha224_digest,
195 .digest = msg37_sha256_digest,
201 .digest = msg37_sha384_digest,
207 .digest = msg37_sha512_digest,
213 .digest = msg185_sha224_digest,
219 .digest = msg185_sha256_digest,
225 .digest = msg185_sha384_digest,
231 .digest = msg185_sha512_digest,
237 .digest = msg238_sha224_digest,
[all …]
/Zephyr-latest/subsys/net/lib/tls_credentials/
Dtls_credentials_digest_raw.c8 /* This file provides an (internal-use-only) credential digest function that backends storing
32 /* Compute digest. */ in credential_digest_raw()
39 /* Attempt to encode digest to destination. in credential_digest_raw()
Dtls_internal.h67 /* Writes a (NULL-terminated, printable) string digest of the contents of the provided credential
70 * Digest format/type is up to the tls_credentials backend in use.
DKconfig.shell33 Also used to print error messages if digest generation fails.
/Zephyr-latest/dts/bindings/crypto/
Dnuvoton,npcx-sha.yaml19 intermdiate computation result and final digest.
/Zephyr-latest/doc/connectivity/networking/api/
Dtls_credentials_shell.rst190 <SECTAG>,<TYPE>,<DIGEST>,<STATUS>
200 …"``<DIGEST>``", "A string digest representing the credential contents. The exact nature of this di…
201 …"``<STATUS>``", "Status code indicating success or failure with generating a digest of the listed …
/Zephyr-latest/drivers/crypto/
Dcrypto_mchp_xec_symcr.c264 int mchp_xec_rom_hash_digest_wrapper(struct mchphash *c, uint8_t *digest) in mchp_xec_rom_hash_digest_wrapper() argument
266 if (!c || !digest) { in mchp_xec_rom_hash_digest_wrapper()
270 if (mchp_xec_rom_hash_digest(c, (char *)digest)) { in mchp_xec_rom_hash_digest_wrapper()
296 * and compute final hash digest(finish==true)
323 /* Not final digest computation and not enough data to run engine */ in xec_symcr_do_hash()
Dcrypto_npcx_sha.c44 /* Return the SHA result (digest.) */
/Zephyr-latest/soc/espressif/common/
DKconfig.esptool177 by a SHA256 digest. Updating the bootloader image before flashing would
178 invalidate the digest.
/Zephyr-latest/soc/nuvoton/npcm/common/esiost/
Desiost.py309 """Computes the SHA-256 digest of a file using hashlib.
311 :param filepath: Path to the file to digest.
312 :return: The SHA-256 digest of the file as a bytearray.
319 return bytearray(sha256_hash.digest())
357 hash_data = bytearray(sha256_hash.digest())
487 hash_data = bytearray(sha256_hash.digest())
/Zephyr-latest/scripts/build/
Dllext_slidlib.py41 hash = m.digest()
/Zephyr-latest/soc/microchip/mec/common/spigen/
Dmec_spi_gen.py224 # hdr[0xB0 through 0xDF] = SHA-384 digest of hdr[0 through 0xAF] Always required
230 hdr_digest = h.digest()
423 image_digest = h.digest()
427 print("SHA-384 digest (paddedFW || ec_info_block || cosig)")
428 print_bytes("digest", image_digest)
/Zephyr-latest/subsys/mgmt/updatehub/
Dupdatehub_integrity.c86 LOG_DBG("HASH input buffer is to small to store the message digest"); in updatehub_integrity_finish()
/Zephyr-latest/subsys/net/ip/
Dipv6_pe.c228 uint8_t digest[32]; in gen_temporary_iid() local
277 ret = mbedtls_md_hmac_finish(&ctx, digest); in gen_temporary_iid()
283 memcpy(temporary_iid, digest, MIN(sizeof(digest), temporary_iid_len)); in gen_temporary_iid()
Dipv6.c873 uint8_t digest[32]; in gen_stable_iid() local
924 ret = mbedtls_md_hmac_finish(&ctx, digest); in gen_stable_iid()
930 memcpy(stable_iid, digest, MIN(sizeof(digest), stable_iid_len)); in gen_stable_iid()
/Zephyr-latest/scripts/west_commands/
Dsdk.py326 digest = hashlib.sha256(sha256file.read()).hexdigest()
327 if sha256 != digest:
328 raise Exception(f"sha256 mismatched: {sha256}:{digest}")
Dblobs.py122 # to the digest in blob metadata, warn user if they differ.
/Zephyr-latest/boards/microchip/mec172xevb_assy6906/support/
Dmec172x_remote_flasher.py140 # Calculate a sha256 digest for SPI file.

12