/hal_espressif-3.7.0/zephyr/ |
D | module.yml | 9 sha256: 8f2e920fbe4453d32d31cbc40c2a4072e3165f0e411094ee923a98d7392fd924 17 sha256: 67704b02270e4b88f321f338fed30d354d0499abae43afd71af7c5d5cca7ff5f 25 sha256: f5272ce1bdd8c8d21260f6895646a846b1d93f5b09c9da84c98951833fdca4fd 33 sha256: 9441a88e84dac4de39295d1be8ec1dedb151f0c53cecb7ed1398a4802b2483de 41 sha256: 6fad0d34245a61e4937b21fc8cf73f9695182821a9834f2b63b9d77c2ddc16a7 49 sha256: 0f2fc18f611df328b6883dd9057325e568bd8a0da1863c4c79c571224856f823 57 sha256: b4c8f7d77de12b30c1ec6b49d7689214892a43a020468744a6242a013ed48cbf 65 sha256: e4f4d09f3be95226d173a57fca1c4d11e9324018f056ddd168b714297c1fe3e6 73 sha256: d0c15decd260b6709ceac257a9340e389c1e1a8baff6f77a9740b24031673678 81 sha256: 4e6a4cbedf7712c86d03cbc7bf6180eca35bdc3ef97ab909ec3f1605920a7f7e [all …]
|
/hal_espressif-3.7.0/components/mbedtls/test_apps/main/ |
D | test_mbedtls_sha.c | 15 #include "mbedtls/sha256.h" 31 TEST_ASSERT_FALSE_MESSAGE(mbedtls_sha256_self_test(1), "SHA256 self-tests should pass."); 71 unsigned char sha1[20], sha256[32], sha512[64]; variable 88 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); 96 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_as, sha256, 32, "SHA256 calculation"); 125 unsigned char sha256[32]; in tskRunSHA256Test() local 133 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); in tskRunSHA256Test() 135 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_bs, sha256, 32, "SHA256 calculation"); in tskRunSHA256Test() 167 printf("SHA256 self-tests failed.\n"); in tskRunSHASelftests() 271 TEST_CASE("mbedtls SHA256 clone", "[mbedtls]") [all …]
|
D | test_sha_perf.c | 13 #include "mbedtls/sha256.h" 27 unsigned char sha256[32]; variable 40 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); 50 char hash_str[sizeof(sha256) * 2 + 1]; 51 utils_bin2hex(hash_str, sizeof(hash_str), sha256, sizeof(sha256)); 57 printf("SHA256 rate %.3fMB/sec\n", mb_sec);
|
D | test_aes_sha_parallel.c | 10 #include "mbedtls/sha256.h" 32 unsigned char sha256[32]; in tskRunSHA256Test() local 41 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); in tskRunSHA256Test() 43 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_bs, sha256, 32, "SHA256 calculation"); in tskRunSHA256Test()
|
D | test_aes_sha_rsa.c | 28 #include "mbedtls/sha256.h" 68 … TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "SHA256 must match"); in sha_task() 101 …TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "MBEDTLS SHA256 must match… in mbedtls_sha256_task() 107 TEST_CASE("Test shared using AES SHA512 SHA256", "[hw_crypto]") 225 TEST_CASE("Test shared using SHA256 RSA", "[hw_crypto]")
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/ |
D | crypto_internal.c | 25 struct sha256_state sha256; member 62 sha256_init(&ctx->u.sha256); in crypto_hash_init() 116 sha256_init(&ctx->u.sha256); in crypto_hash_init() 117 sha256_process(&ctx->u.sha256, key, key_len); in crypto_hash_init() 118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init() 130 sha256_init(&ctx->u.sha256); in crypto_hash_init() 131 sha256_process(&ctx->u.sha256, k_pad, sizeof(k_pad)); in crypto_hash_init() 160 sha256_process(&ctx->u.sha256, data, len); in crypto_hash_update() 219 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() 293 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() [all …]
|
D | sha256.c | 12 #include "sha256.h" 17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104) 42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */ in hmac_sha256_vector() 52 * SHA256(K XOR opad, SHA256(K XOR ipad, text)) in hmac_sha256_vector() 66 /* perform inner SHA256 */ in hmac_sha256_vector() 82 /* perform outer SHA256 */ in hmac_sha256_vector() 92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104)
|
D | sha256-kdf.c | 2 * HMAC-SHA256 KDF (RFC 5295) and HKDF-Expand(SHA256) (RFC 5869) 12 #include "sha256.h" 16 * hmac_sha256_kdf - HMAC-SHA256 based KDF (RFC 5295)
|
D | sha256-prf.c | 2 * SHA256-based PRF (IEEE 802.11r) 12 #include "sha256.h" 17 * sha256_prf - SHA256-based Pseudo-Random Function (IEEE 802.11r, 8.5.1.5.2)
|
D | sha256-internal.c | 12 #include "sha256.h" 18 * sha256_vector - SHA256 hash for data vector 44 /* ===== start - public domain SHA256 implementation ===== */ 46 /* This is based on SHA256 implementation in LibTomCrypt that was released into 229 /* ===== end - public domain SHA256 implementation ===== */
|
/hal_espressif-3.7.0/components/mbedtls/port/sha/ |
D | esp_sha.c | 15 #include <mbedtls/sha256.h> 35 mbedtls_sha256_context sha256; in esp_sha() member 60 mbedtls_sha256_init(&ctx.sha256); in esp_sha() 61 mbedtls_sha256_starts(&ctx.sha256, 0); in esp_sha() 62 ret = mbedtls_sha256_update(&ctx.sha256, input, ilen); in esp_sha() 64 ret = mbedtls_sha256_finish(&ctx.sha256, output); in esp_sha() 66 mbedtls_sha256_free(&ctx.sha256); in esp_sha()
|
/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
D | sha256.h | 1 /* sha256.h - TinyCrypt interface to a SHA-256 implementation */ 81 * @brief SHA256 initialization procedure 85 * @param s Sha256 state struct 90 * @brief SHA256 update procedure 101 * @param s Sha256 state struct 108 * @brief SHA256 final procedure 121 * @param Sha256 state struct
|
/hal_espressif-3.7.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | sha256.h | 1 /* sha256.h - TinyCrypt interface to a SHA-256 implementation */ 81 * @brief SHA256 initialization procedure 85 * @param s Sha256 state struct 90 * @brief SHA256 update procedure 101 * @param s Sha256 state struct 108 * @brief SHA256 final procedure 121 * @param Sha256 state struct
|
/hal_espressif-3.7.0/zephyr/scripts/blobs/ |
D | esp_genblobs.py | 30 sha256: {SHA256} 72 result = hashlib.sha256(f_byte) 92 sha256 = get_file_sha256(path_in_str) 95 SHA256=sha256,
|
/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 25 * HMAC-SHA256: 35 * Requires: SHA-256 and HMAC-SHA256. 262 * Measurement of code, data structures, and other digital artifacts (SHA256); 264 * Generate commitments (SHA256); 266 * Construct keys (HMAC-SHA256); 268 * Extract entropy from strings containing some randomness (HMAC-SHA256); 270 * Construct random mappings (HMAC-SHA256); 274 * Authenticate using a shared secret (HMAC-SHA256); 276 * Create an authenticated, replay-protected session (HMAC-SHA256 + HMAC-PRNG); 344 * `RFC 2104 (HMAC-SHA256)`_ [all …]
|
/hal_espressif-3.7.0/components/esp_app_format/include/ |
D | esp_app_desc.h | 34 uint8_t app_elf_sha256[32]; /*!< sha256 of elf file */ 51 …* @brief Fill the provided buffer with SHA256 of the ELF file, formatted as hexadecimal, null-te… 52 * If the buffer size is not sufficient to fit the entire SHA256 in hex plus a null terminator,
|
/hal_espressif-3.7.0/components/wpa_supplicant/ |
D | CMakeLists.txt | 16 "src/crypto/sha256-kdf.c" 24 "src/crypto/sha256-tlsprf.c" 26 "src/crypto/sha256-prf.c" 148 "src/crypto/sha256-internal.c" 149 "src/crypto/sha256.c" 152 "src/crypto/sha256.c")
|
/hal_espressif-3.7.0/components/bootloader_support/private_include/ |
D | bootloader_sha.h | 8 /* Provide a SHA256 API for bootloader_support code, 12 Use mbedTLS APIs or include esp32/sha.h to calculate SHA256 in IDF apps.
|
/hal_espressif-3.7.0/components/bootloader_support/src/esp32s2/ |
D | bootloader_sha.c | 16 // Words per SHA256 block 18 // Words in final SHA256 digest
|
/hal_espressif-3.7.0/components/esp_rom/include/esp32c6/rom/ |
D | sha.h | 28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16 29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
|
/hal_espressif-3.7.0/components/esp_rom/include/esp32h2/rom/ |
D | sha.h | 28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16 29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
|
/hal_espressif-3.7.0/components/esp_rom/include/esp32c2/rom/ |
D | sha.h | 28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16 29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
|
/hal_espressif-3.7.0/tools/esptool_py/esptool/ |
D | bin_image.py | 250 If SHA256 digest of the ELF file needs to be inserted into this segment, do so. 259 # SHA256 digest needs to be patched into this binary segment, 268 "Cannot place SHA256 digest on segment boundary" 279 "Contents of segment at SHA256 digest offset 0x%x are not all zero." 686 calc_digest = hashlib.sha256() 894 # calculate the SHA256 of the whole file and append it 896 digest = hashlib.sha256() 1040 # calculate the SHA256 of the whole file and append it 1042 digest = hashlib.sha256() 1416 def sha256(self): member in ELFFile [all …]
|
/hal_espressif-3.7.0/components/esp_rom/include/esp32c3/rom/ |
D | sha.h | 36 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16 37 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
|
/hal_espressif-3.7.0/components/esp_rom/include/esp32s3/rom/ |
D | sha.h | 40 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16 41 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
|