Home
last modified time | relevance | path

Searched full:sha256 (Results 1 – 25 of 107) sorted by relevance

12345

/hal_espressif-3.7.0/zephyr/
Dmodule.yml9 sha256: 8f2e920fbe4453d32d31cbc40c2a4072e3165f0e411094ee923a98d7392fd924
17 sha256: 67704b02270e4b88f321f338fed30d354d0499abae43afd71af7c5d5cca7ff5f
25 sha256: f5272ce1bdd8c8d21260f6895646a846b1d93f5b09c9da84c98951833fdca4fd
33 sha256: 9441a88e84dac4de39295d1be8ec1dedb151f0c53cecb7ed1398a4802b2483de
41 sha256: 6fad0d34245a61e4937b21fc8cf73f9695182821a9834f2b63b9d77c2ddc16a7
49 sha256: 0f2fc18f611df328b6883dd9057325e568bd8a0da1863c4c79c571224856f823
57 sha256: b4c8f7d77de12b30c1ec6b49d7689214892a43a020468744a6242a013ed48cbf
65 sha256: e4f4d09f3be95226d173a57fca1c4d11e9324018f056ddd168b714297c1fe3e6
73 sha256: d0c15decd260b6709ceac257a9340e389c1e1a8baff6f77a9740b24031673678
81 sha256: 4e6a4cbedf7712c86d03cbc7bf6180eca35bdc3ef97ab909ec3f1605920a7f7e
[all …]
/hal_espressif-3.7.0/components/mbedtls/test_apps/main/
Dtest_mbedtls_sha.c15 #include "mbedtls/sha256.h"
31 TEST_ASSERT_FALSE_MESSAGE(mbedtls_sha256_self_test(1), "SHA256 self-tests should pass.");
71 unsigned char sha1[20], sha256[32], sha512[64]; variable
88 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256));
96 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_as, sha256, 32, "SHA256 calculation");
125 unsigned char sha256[32]; in tskRunSHA256Test() local
133 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); in tskRunSHA256Test()
135 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_bs, sha256, 32, "SHA256 calculation"); in tskRunSHA256Test()
167 printf("SHA256 self-tests failed.\n"); in tskRunSHASelftests()
271 TEST_CASE("mbedtls SHA256 clone", "[mbedtls]")
[all …]
Dtest_sha_perf.c13 #include "mbedtls/sha256.h"
27 unsigned char sha256[32]; variable
40 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256));
50 char hash_str[sizeof(sha256) * 2 + 1];
51 utils_bin2hex(hash_str, sizeof(hash_str), sha256, sizeof(sha256));
57 printf("SHA256 rate %.3fMB/sec\n", mb_sec);
Dtest_aes_sha_parallel.c10 #include "mbedtls/sha256.h"
32 unsigned char sha256[32]; in tskRunSHA256Test() local
41 TEST_ASSERT_EQUAL(0, mbedtls_sha256_finish(&sha256_ctx, sha256)); in tskRunSHA256Test()
43 TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha256_thousand_bs, sha256, 32, "SHA256 calculation"); in tskRunSHA256Test()
Dtest_aes_sha_rsa.c28 #include "mbedtls/sha256.h"
68 … TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "SHA256 must match"); in sha_task()
101 …TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "MBEDTLS SHA256 must match… in mbedtls_sha256_task()
107 TEST_CASE("Test shared using AES SHA512 SHA256", "[hw_crypto]")
225 TEST_CASE("Test shared using SHA256 RSA", "[hw_crypto]")
/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/
Dcrypto_internal.c25 struct sha256_state sha256; member
62 sha256_init(&ctx->u.sha256); in crypto_hash_init()
116 sha256_init(&ctx->u.sha256); in crypto_hash_init()
117 sha256_process(&ctx->u.sha256, key, key_len); in crypto_hash_init()
118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init()
130 sha256_init(&ctx->u.sha256); in crypto_hash_init()
131 sha256_process(&ctx->u.sha256, k_pad, sizeof(k_pad)); in crypto_hash_init()
160 sha256_process(&ctx->u.sha256, data, len); in crypto_hash_update()
219 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish()
293 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish()
[all …]
Dsha256.c12 #include "sha256.h"
17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104)
42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */ in hmac_sha256_vector()
52 * SHA256(K XOR opad, SHA256(K XOR ipad, text)) in hmac_sha256_vector()
66 /* perform inner SHA256 */ in hmac_sha256_vector()
82 /* perform outer SHA256 */ in hmac_sha256_vector()
92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104)
Dsha256-kdf.c2 * HMAC-SHA256 KDF (RFC 5295) and HKDF-Expand(SHA256) (RFC 5869)
12 #include "sha256.h"
16 * hmac_sha256_kdf - HMAC-SHA256 based KDF (RFC 5295)
Dsha256-prf.c2 * SHA256-based PRF (IEEE 802.11r)
12 #include "sha256.h"
17 * sha256_prf - SHA256-based Pseudo-Random Function (IEEE 802.11r, 8.5.1.5.2)
Dsha256-internal.c12 #include "sha256.h"
18 * sha256_vector - SHA256 hash for data vector
44 /* ===== start - public domain SHA256 implementation ===== */
46 /* This is based on SHA256 implementation in LibTomCrypt that was released into
229 /* ===== end - public domain SHA256 implementation ===== */
/hal_espressif-3.7.0/components/mbedtls/port/sha/
Desp_sha.c15 #include <mbedtls/sha256.h>
35 mbedtls_sha256_context sha256; in esp_sha() member
60 mbedtls_sha256_init(&ctx.sha256); in esp_sha()
61 mbedtls_sha256_starts(&ctx.sha256, 0); in esp_sha()
62 ret = mbedtls_sha256_update(&ctx.sha256, input, ilen); in esp_sha()
64 ret = mbedtls_sha256_finish(&ctx.sha256, output); in esp_sha()
66 mbedtls_sha256_free(&ctx.sha256); in esp_sha()
/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/include/tinycrypt/
Dsha256.h1 /* sha256.h - TinyCrypt interface to a SHA-256 implementation */
81 * @brief SHA256 initialization procedure
85 * @param s Sha256 state struct
90 * @brief SHA256 update procedure
101 * @param s Sha256 state struct
108 * @brief SHA256 final procedure
121 * @param Sha256 state struct
/hal_espressif-3.7.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Dsha256.h1 /* sha256.h - TinyCrypt interface to a SHA-256 implementation */
81 * @brief SHA256 initialization procedure
85 * @param s Sha256 state struct
90 * @brief SHA256 update procedure
101 * @param s Sha256 state struct
108 * @brief SHA256 final procedure
121 * @param Sha256 state struct
/hal_espressif-3.7.0/zephyr/scripts/blobs/
Desp_genblobs.py30 sha256: {SHA256}
72 result = hashlib.sha256(f_byte)
92 sha256 = get_file_sha256(path_in_str)
95 SHA256=sha256,
/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/documentation/
Dtinycrypt.rst25 * HMAC-SHA256:
35 * Requires: SHA-256 and HMAC-SHA256.
262 * Measurement of code, data structures, and other digital artifacts (SHA256);
264 * Generate commitments (SHA256);
266 * Construct keys (HMAC-SHA256);
268 * Extract entropy from strings containing some randomness (HMAC-SHA256);
270 * Construct random mappings (HMAC-SHA256);
274 * Authenticate using a shared secret (HMAC-SHA256);
276 * Create an authenticated, replay-protected session (HMAC-SHA256 + HMAC-PRNG);
344 * `RFC 2104 (HMAC-SHA256)`_
[all …]
/hal_espressif-3.7.0/components/esp_app_format/include/
Desp_app_desc.h34 uint8_t app_elf_sha256[32]; /*!< sha256 of elf file */
51 …* @brief Fill the provided buffer with SHA256 of the ELF file, formatted as hexadecimal, null-te…
52 * If the buffer size is not sufficient to fit the entire SHA256 in hex plus a null terminator,
/hal_espressif-3.7.0/components/wpa_supplicant/
DCMakeLists.txt16 "src/crypto/sha256-kdf.c"
24 "src/crypto/sha256-tlsprf.c"
26 "src/crypto/sha256-prf.c"
148 "src/crypto/sha256-internal.c"
149 "src/crypto/sha256.c"
152 "src/crypto/sha256.c")
/hal_espressif-3.7.0/components/bootloader_support/private_include/
Dbootloader_sha.h8 /* Provide a SHA256 API for bootloader_support code,
12 Use mbedTLS APIs or include esp32/sha.h to calculate SHA256 in IDF apps.
/hal_espressif-3.7.0/components/bootloader_support/src/esp32s2/
Dbootloader_sha.c16 // Words per SHA256 block
18 // Words in final SHA256 digest
/hal_espressif-3.7.0/components/esp_rom/include/esp32c6/rom/
Dsha.h28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16
29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
/hal_espressif-3.7.0/components/esp_rom/include/esp32h2/rom/
Dsha.h28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16
29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
/hal_espressif-3.7.0/components/esp_rom/include/esp32c2/rom/
Dsha.h28 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16
29 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
/hal_espressif-3.7.0/tools/esptool_py/esptool/
Dbin_image.py250 If SHA256 digest of the ELF file needs to be inserted into this segment, do so.
259 # SHA256 digest needs to be patched into this binary segment,
268 "Cannot place SHA256 digest on segment boundary"
279 "Contents of segment at SHA256 digest offset 0x%x are not all zero."
686 calc_digest = hashlib.sha256()
894 # calculate the SHA256 of the whole file and append it
896 digest = hashlib.sha256()
1040 # calculate the SHA256 of the whole file and append it
1042 digest = hashlib.sha256()
1416 def sha256(self): member in ELFFile
[all …]
/hal_espressif-3.7.0/components/esp_rom/include/esp32c3/rom/
Dsha.h36 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16
37 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128
/hal_espressif-3.7.0/components/esp_rom/include/esp32s3/rom/
Dsha.h40 uint32_t state[16]; // For SHA1/SHA224/SHA256, used 8, other used 16
41 unsigned char buffer[128]; // For SHA1/SHA224/SHA256, used 64, other used 128

12345