Home
last modified time | relevance | path

Searched full:sha (Results 1 – 25 of 29) sorted by relevance

12

/mcuboot-latest/ci/
Dcheck-signed-off-by.sh23 echo "HEAD is not a merge commit, please supply the oldest SHA"
34 for sha in $commits; do
35 author="$(git show -s --format="%an <%ae>" ${sha})"
36 committer="$(git show -s --format="%cn <%ce>" ${sha})"
46 lines="$(git show -s --format=%B ${sha})"
73 echo -e "Missing \"${author}\" in commit ${sha}"
76 echo -e "Missing \"${committer}\" in commit ${sha}"
/mcuboot-latest/scripts/imgtool/keys/
Ded25519_test.py104 sha = hashlib.sha256()
105 sha.update(buf)
106 digest = sha.digest()
114 sha = hashlib.sha256()
115 sha.update(b'This is thE message')
116 new_digest = sha.digest()
/mcuboot-latest/scripts/imgtool/
Dimage.py156 SHAAndAlgT = namedtuple('SHAAndAlgT', ['sha', 'alg'])
178 return TLV_SHA_TO_SHA_AND_ALG[tlv].sha
194 """Matches key and user requested sha to sha alogrithm and TLV name.
202 # If key is none, we allow whatever user has selected for sha
218 raise click.UsageError("Key {} can not be used with --sha {}; allowed sha are one of {}"
223 sha = TLV_SHA_TO_SHA_AND_ALG[tlv_type].alg()
225 sha.update(hash_region)
226 return sha.digest()
453 # key decides on sha, then pub_key; of both are none default is used
460 sha = hash_algorithm()
[all …]
Dmain.py429 @click.option('--sha', 'user_sha', type=click.Choice(valid_sha), default='auto',
430 help='selected sha algorithm to use; defaults to "auto" which is 256 if '
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Dsha256.h1 /* sha256.h - TinyCrypt interface to a SHA-256 implementation */
35 * @brief Interface to a SHA-256 implementation.
37 * Overview: SHA-256 is a NIST approved cryptographic hashing algorithm
41 * Security: SHA-256 provides 128 bits of security against collision attacks
42 * and 256 bits of security against pre-image attacks. SHA-256 does
Dhmac.h38 * TinyCrypt hard codes SHA-256 as the hash function. A message
49 * Requires: SHA-256
Decc_dsa.h69 * Usage: - To sign: Compute a hash of the data you wish to sign (SHA-2 is
100 * @note Usage: Compute a hash of the data you wish to sign (SHA-2 is
Dhmac_prng.h56 * Requires: - SHA-256
/mcuboot-latest/ext/tinycrypt-sha512/lib/include/tinycrypt/
Dsha512.h1 /* sha512.h - TinyCrypt interface to a SHA-512 implementation */
35 * @brief Interface to a SHA-512 implementation.
37 * Overview: SHA-512 is a NIST approved cryptographic hashing algorithm
41 * Security: SHA-512 provides 256 bits of security against collision attacks
42 * and 512 bits of security against pre-image attacks. SHA-512 does
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Dmd.h45 * \warning MD5 and SHA-1 are considered weak message digests and
53 MBEDTLS_MD_SHA1, /**< The SHA-1 message digest. */
54 MBEDTLS_MD_SHA224, /**< The SHA-224 message digest. */
55 MBEDTLS_MD_SHA256, /**< The SHA-256 message digest. */
56 MBEDTLS_MD_SHA384, /**< The SHA-384 message digest. */
57 MBEDTLS_MD_SHA512, /**< The SHA-512 message digest. */
190 * for example, both are SHA-256.
/mcuboot-latest/ext/tinycrypt/documentation/
Dtinycrypt.rst19 * SHA-256:
29 * Requires: SHA-256
35 * Requires: SHA-256 and HMAC-SHA256.
122 * SHA-256:
304 * `NIST FIPS PUB 180-4 (SHA-256)`_
306 .. _NIST FIPS PUB 180-4 (SHA-256):
/mcuboot-latest/boot/cypress/MCUBootApp/config/
Dmcuboot_crypto_config.h368 * \warning MD2, MD4, MD5, ARC4, DES and SHA-1 are considered weak and their
439 * \warning MD2, MD4, MD5, DES and SHA-1 are considered weak and their use
1181 * Force the entropy accumulator to use a SHA-256 accumulator instead of the
1182 * default SHA-512 based one (if both are available).
1186 * On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option
1326 * Enable an implementation of SHA-256 that has lower ROM footprint but also
2960 * \warning SHA-1 is considered a weak message digest and its use constitutes
2970 * Enable the SHA-224 and SHA-256 cryptographic hash algorithms.
2979 * This module adds support for SHA-224 and SHA-256.
2987 * Enable the SHA-384 and SHA-512 cryptographic hash algorithms.
[all …]
/mcuboot-latest/boot/espressif/include/crypto_config/
Dmbedtls_custom_config.h303 * \warning MD5, DES and SHA-1 are considered weak and their
363 * \warning MD5, DES and SHA-1 are considered weak and their use
1014 * Force the entropy accumulator to use a SHA-256 accumulator instead of the
1015 * default SHA-512 based one (if both are available).
1019 * On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option
1252 * Enable an implementation of SHA-256 that has lower ROM footprint but also
1268 * Enable an implementation of SHA-512 that has lower ROM footprint but also
2696 * \warning SHA-1 is considered a weak message digest and its use constitutes
2706 * Enable the SHA-224 cryptographic hash algorithm.
2709 * SHA-224 without SHA-256.
[all …]
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/
Dsha512.c1 /* sha512.c - TinyCrypt SHA-512 crypto hash algorithm implementation */
109 * NOTE: SHA-512 uses 128 bits for the length of the message, but the in tc_sha512_final()
147 * Initializing SHA-512 Hash constant words K.
/mcuboot-latest/boot/bootutil/src/
Dimage_ed25519.c20 #include "bootutil/crypto/sha.h"
Dimage_rsa.c46 #include "bootutil/crypto/sha.h"
157 * SHA-256. in bootutil_cmp_rsasig()
Dimage_validate.c36 #include "bootutil/crypto/sha.h"
60 * Compute SHA hash over the image.
Dboot_record.c26 #include "bootutil/crypto/sha.h"
/mcuboot-latest/.github/workflows/
Dzephyr_build.yaml60 echo "MCUBOOT_VERSION=${{ github.event.pull_request.head.sha }}" >> $GITHUB_ENV
/mcuboot-latest/ext/tinycrypt/lib/source/
Dsha256.c1 /* sha256.c - TinyCrypt SHA-256 crypto hash algorithm implementation */
139 * Initializing SHA-256 Hash constant words K.
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Dsha.h48 /* Universal defines for SHA-256 */
/mcuboot-latest/ext/tinycrypt/tests/
Dtest_ecc_dsa.c162 * [P-256,SHA-256] in cavp_sign()
437 * [P-256,SHA-256] in cavp_verify()
/mcuboot-latest/boot/espressif/
Dmain.c107 * 1) Calculate the SHA-256 hash digest of the public key and write to EFUSE. in main()
/mcuboot-latest/boot/espressif/hal/src/
Dsecure_boot.c100 /* Generating the SHA of the public key components in the signature block */ in s_calculate_image_public_key_digests()
/mcuboot-latest/docs/
Drelease-notes.md319 by relying on a bundled tinycrypt based sha-512 implementation.
367 Mynewt 1.6.0 and up, and any Zephyr `main` after sha

12