/hal_espressif-latest/components/mbedtls/port/esp_ds/ |
D | esp_rsa_sign_alt.c | 231 …uint32_t *signature = heap_caps_malloc_prefer((s_ds_data->rsa_length + 1) * FACTOR_KEYLEN_IN_BYTES… in esp_ds_rsa_sign() local 232 if (signature == NULL) { in esp_ds_rsa_sign() 239 heap_caps_free(signature); in esp_ds_rsa_sign() 244 signature[i] = SWAP_INT32(((uint32_t *)sig)[(s_ds_data->rsa_length + 1) - (i + 1)]); in esp_ds_rsa_sign() 247 ds_r = esp_ds_start_sign((const void *)signature, in esp_ds_rsa_sign() 253 heap_caps_free(signature); in esp_ds_rsa_sign() 257 ds_r = esp_ds_finish_sign((void *)signature, esp_ds_ctx); in esp_ds_rsa_sign() 264 heap_caps_free(signature); in esp_ds_rsa_sign() 269 … ((uint32_t *)sig)[i] = SWAP_INT32(((uint32_t *)signature)[(s_ds_data->rsa_length + 1) - (i + 1)]); in esp_ds_rsa_sign() 271 heap_caps_free(signature); in esp_ds_rsa_sign()
|
/hal_espressif-latest/components/esp_hw_support/ |
D | esp_ds.c | 99 void *signature) in esp_ds_sign() argument 103 if (!signature) { in esp_ds_sign() 117 return esp_ds_finish_sign(signature, context); in esp_ds_sign() 183 esp_err_t esp_ds_finish_sign(void *signature, esp_ds_context_t *esp_ds_ctx) in esp_ds_finish_sign() argument 185 if (!signature || !esp_ds_ctx) { in esp_ds_finish_sign() 191 ets_ds_result_t result = ets_ds_finish_sign(signature, ds_data); in esp_ds_finish_sign() 282 void *signature) in esp_ds_sign() argument 286 if (!signature) { in esp_ds_sign() 300 return esp_ds_finish_sign(signature, context); in esp_ds_sign() 371 esp_err_t esp_ds_finish_sign(void *signature, esp_ds_context_t *esp_ds_ctx) in esp_ds_finish_sign() argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/ |
D | __init__.py | 135 signature = private_key.sign( 139 if len(signature) != 0: 143 r = int(binascii.hexlify(signature[:32]), 16) 144 s = int(binascii.hexlify(signature[32:]), 16) 147 signature = ecdsa.der.encode_sequence( 151 return signature
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 366 if args.signature: 370 signature = args.signature[0].read() 379 signature = sk.sign_deterministic(binary_content, hashlib.sha256) 384 vk.verify(signature, binary_content, hashlib.sha256) # throws exception on failure 396 outfile.write(signature) 413 signature = args.signature 417 if args.signature: 477 signature = generate_signature_using_hsm(config, contents) 479 if signature: 482 if len(signature) != key_count: [all …]
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
D | ecc_dsa.c | 100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument 141 uECC_vli_nativeToBytes(signature, curve->num_bytes, p); /* store r */ in uECC_sign_with_k() 157 uECC_vli_nativeToBytes(signature + curve->num_bytes, curve->num_bytes, s); in uECC_sign_with_k() 162 unsigned hash_size, uint8_t *signature, uECC_Curve curve) in uECC_sign() argument 179 if (uECC_sign_with_k(private_key, message_hash, hash_size, k, signature, in uECC_sign() 193 unsigned hash_size, const uint8_t *signature, in uECC_verify() argument 222 uECC_vli_bytesToNative(r, signature, curve->num_bytes); in uECC_verify() 223 uECC_vli_bytesToNative(s, signature + curve->num_bytes, curve->num_bytes); in uECC_verify()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | ecc_dsa.c | 100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument 140 uECC_vli_nativeToBytes(signature, curve->num_bytes, p); /* store r */ in uECC_sign_with_k() 156 uECC_vli_nativeToBytes(signature + curve->num_bytes, curve->num_bytes, s); in uECC_sign_with_k() 161 unsigned hash_size, uint8_t *signature, uECC_Curve curve) in uECC_sign() argument 178 if (uECC_sign_with_k(private_key, message_hash, hash_size, k, signature, in uECC_sign() 192 unsigned hash_size, const uint8_t *signature, in uECC_verify() argument 221 uECC_vli_bytesToNative(r, signature, curve->num_bytes); in uECC_verify() 222 uECC_vli_bytesToNative(s, signature + curve->num_bytes, curve->num_bytes); in uECC_verify()
|
/hal_espressif-latest/components/bootloader/subproject/components/micro-ecc/ |
D | uECC_verify_antifault.c | 20 const uint8_t *signature, in uECC_verify_antifault() argument 49 bcopy((uint8_t *) r, signature, curve->num_bytes); in uECC_verify_antifault() 50 bcopy((uint8_t *) s, signature + curve->num_bytes, curve->num_bytes); in uECC_verify_antifault() 55 uECC_vli_bytesToNative(r, signature, curve->num_bytes); in uECC_verify_antifault() 56 uECC_vli_bytesToNative(s, signature + curve->num_bytes, curve->num_bytes); in uECC_verify_antifault()
|
D | uECC_verify_antifault.h | 18 const uint8_t *signature,
|
/hal_espressif-latest/components/esp_hw_support/include/ |
D | esp_ds.h | 135 void *signature); 200 esp_err_t esp_ds_finish_sign(void *signature, esp_ds_context_t *esp_ds_ctx);
|
/hal_espressif-latest/components/esp_rom/include/esp32c6/rom/ |
D | secure_boot.h | 84 uint8_t signature[384]; member 102 uint8_t signature[64]; /* r followed by s (both little-endian) */ member
|
D | digital_signature.h | 106 ets_ds_result_t ets_ds_finish_sign(void *signature, const ets_ds_data_t *data);
|
/hal_espressif-latest/components/esp_rom/include/esp32h2/rom/ |
D | secure_boot.h | 84 uint8_t signature[384]; member 102 uint8_t signature[64]; /* r followed by s (both little-endian) */ member
|
D | digital_signature.h | 106 ets_ds_result_t ets_ds_finish_sign(void *signature, const ets_ds_data_t *data);
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/ |
D | secure_boot_rsa_signature.c | 29 const unsigned rsa_key_size = sizeof(sig_block->block[0].signature); in verify_rsa_signature_block() 78 sig_be[rsa_key_size - j - 1] = trusted_block->signature[j]; in verify_rsa_signature_block()
|
D | secure_boot_ecdsa_signature.c | 63 _r[i] = trusted_block->ecdsa.signature[key_size - i - 1]; in verify_ecdsa_signature_block() 64 _s[i] = trusted_block->ecdsa.signature[2 * key_size - i - 1]; in verify_ecdsa_signature_block()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | x509v3.c | 1542 if (x509_parse_algorithm_identifier(pos, end - pos, &cert->signature, in x509_parse_tbs_certificate() 1835 return x509_check_signature(issuer, &cert->signature, in x509_certificate_check_signature() 1842 struct x509_algorithm_identifier *signature, in x509_check_signature() argument 1857 if (!x509_pkcs_oid(&signature->oid) || in x509_check_signature() 1858 signature->oid.len != 7 || in x509_check_signature() 1859 signature->oid.oid[5] != 1 /* pkcs-1 */) { in x509_check_signature() 1956 if (signature->oid.oid[6] != 5 /* sha-1WithRSAEncryption */) { in x509_check_signature() 1960 signature->oid.oid[6]); in x509_check_signature() 1968 if (signature->oid.oid[6] != in x509_check_signature() 1973 signature->oid.oid[6]); in x509_check_signature() [all …]
|
D | x509v3.h | 55 struct x509_algorithm_identifier signature; member 146 struct x509_algorithm_identifier *signature,
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot_signatures_app.c | 88 ret = mbedtls_mpi_read_binary(&r, &sig_block->signature[0], ECDSA_INTEGER_LEN); in esp_secure_boot_verify_ecdsa_signature_block() 94 ret = mbedtls_mpi_read_binary(&s, &sig_block->signature[ECDSA_INTEGER_LEN], ECDSA_INTEGER_LEN); in esp_secure_boot_verify_ecdsa_signature_block()
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
D | ecc_dsa.h | 114 unsigned int hash_size, uECC_word_t *k, uint8_t *signature,
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | ecc_dsa.h | 114 unsigned int hash_size, uECC_word_t *k, uint8_t *signature,
|
/hal_espressif-latest/components/esp_rom/include/esp32s3/rom/ |
D | digital_signature.h | 107 ets_ds_result_t ets_ds_finish_sign(void *signature, const ets_ds_data_t *data);
|
/hal_espressif-latest/components/esp_rom/include/esp32s2/rom/ |
D | digital_signature.h | 111 ets_ds_result_t ets_ds_finish_sign(void *signature, const ets_ds_data_t *data);
|
/hal_espressif-latest/components/esp_rom/include/esp32c3/rom/ |
D | digital_signature.h | 114 ets_ds_result_t ets_ds_finish_sign(void *signature, const ets_ds_data_t *data);
|
/hal_espressif-latest/components/hal/ |
D | Kconfig | 107 bool "Enable countermeasure for ECDSA signature generation" 111 Enable this option to apply the countermeasure for ECDSA signature operation 113 under dummy sign operations to add randomness in the generated power signature.
|
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 26 …s the public key from the HSM, generates a signature for an image using the HSM, and then creates … 61 # to be used to generate signature.
|