Searched refs:trusted (Results 1 – 6 of 6) sorted by relevance
107 esp_image_sig_public_key_digests_t trusted = {0}; in esp_secure_boot_verify_sbv2_signature_block() local109 if (get_secure_boot_key_digests(&trusted) != ESP_OK) { in esp_secure_boot_verify_sbv2_signature_block()134 bootloader_sha256_finish(sig_block_sha, trusted.key_digests[i]); in esp_secure_boot_verify_sbv2_signature_block()148 …int sb_result = ets_secure_boot_verify_signature(sig_block, image_digest, trusted.key_digests[0], … in esp_secure_boot_verify_sbv2_signature_block()152 trusted_key_digests.key_digests[i] = &trusted.key_digests[i]; in esp_secure_boot_verify_sbv2_signature_block()
209 esp_image_sig_public_key_digests_t trusted = {0}; in esp_secure_boot_verify_sbv2_signature_block() local211 if (get_secure_boot_key_digests(&trusted) != ESP_OK) { in esp_secure_boot_verify_sbv2_signature_block()244 …if (memcmp(app_blk_digest, trusted.key_digests[trusted_key_idx], ESP_SECURE_BOOT_KEY_DIGEST_LEN) =… in esp_secure_boot_verify_sbv2_signature_block()
151 int x509_certificate_chain_validate(struct x509_certificate *trusted,
2142 int x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument2220 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate()2252 if (trusted) { in x509_certificate_chain_validate()
220 bool "Enable trusted certificate callbacks"223 Enables users to configure the set of trusted certificates313 bool "Enable trusted root certificate bundle"529 so that only trusted software can execute on the device.612 In the case where only a small number of certificates are trusted by615 trusted certificates expire while the device is offline and a TLS
962 … Revoking unused digest slots makes ensures that no trusted keys can be added later by an attacker.