/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_common.c | 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init() 216 verify->md5_cert == NULL || verify->sha1_client == NULL || in tls_verify_hash_init() [all …]
|
D | tlsv1_client_write.c | 244 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello() 338 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate() 566 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange() 621 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify() 622 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 624 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 629 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 653 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify() 654 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 657 conn->verify.md5_cert = NULL; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_server_read.c | 987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() 1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify() 1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify() 1011 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() [all …]
|
D | tlsv1_server_write.c | 171 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_hello() 273 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate() 360 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_status() 687 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_key_exchange() 753 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_request() 790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done() 848 if (conn->verify.sha256_server == NULL || in tls_write_server_finished() 849 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_write_server_finished() 851 conn->verify.sha256_server = NULL; in tls_write_server_finished() 856 conn->verify.sha256_server = NULL; in tls_write_server_finished() [all …]
|
D | tlsv1_common.h | 254 int tls_verify_hash_init(struct tls_verify_hash *verify); 255 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, 257 void tls_verify_hash_free(struct tls_verify_hash *verify);
|
D | tlsv1_client_read.c | 1388 if (conn->verify.sha256_server == NULL || in tls_process_server_finished() 1389 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished() 1393 conn->verify.sha256_server = NULL; in tls_process_server_finished() 1396 conn->verify.sha256_server = NULL; in tls_process_server_finished() 1401 if (conn->verify.md5_server == NULL || in tls_process_server_finished() 1402 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { in tls_process_server_finished() 1405 conn->verify.md5_server = NULL; in tls_process_server_finished() 1406 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); in tls_process_server_finished() 1407 conn->verify.sha1_server = NULL; in tls_process_server_finished() 1410 conn->verify.md5_server = NULL; in tls_process_server_finished() [all …]
|
D | tlsv1_server_i.h | 37 struct tls_verify_hash verify; member
|
D | tlsv1_client_i.h | 43 struct tls_verify_hash verify; member
|
D | tlsv1_server.c | 391 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_init() 423 tls_verify_hash_free(&conn->verify); in tlsv1_server_clear_data() 616 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_shutdown()
|
D | tlsv1_client.c | 477 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_init() 526 tls_verify_hash_free(&conn->verify); in tlsv1_client_deinit() 702 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_shutdown()
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/ |
D | csv_table_parser.py | 122 def verify(self, type_table=None): member in CSVFuseTable 144 p.verify(type_table) 232 def verify(self, type_table): member in FuseDefinition
|
/hal_espressif-latest/components/efuse/ |
D | efuse_table_gen.py | 150 def verify(self, type_table=None): member in FuseTable 171 p.verify(type_table) 418 def verify(self, type_table): member in FuseDefinition 453 table.verify(type_table) 527 two_table.verify()
|
/hal_espressif-latest/tools/esptool_py/docs/en/ |
D | index.rst | 8 * Read, write, erase, and verify binary data stored in flash.
|
D | troubleshooting.rst | 22 * Try using a slower baud rate (``-b 9600`` is a very slow value that you can use to verify it's n… 184 …is data in the serial buffer result in "Invalid head of packet". You can verify this by connecting…
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 384 vk.verify(signature, binary_content, hashlib.sha256) # throws exception on failure 572 public_key.verify( 604 public_key.verify( 792 if vk.verify(signature, data, hashlib.sha256): 883 vk.verify( 917 vk.verify(signature, digest, ec.ECDSA(utils.Prehashed(hash_type)))
|
/hal_espressif-latest/tools/esptool_py/esptool/ |
D | bin_image.py | 221 def verify(self): member in BaseFirmwareImage 469 self.verify() 566 self.verify() 691 self.verify()
|
D | cmds.py | 271 test_image.verify() 748 if args.verify: 1113 image.verify()
|
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 38 Once the signed image is generated, we can verify it using the following command: ::
|
/hal_espressif-latest/components/bootloader/ |
D | Kconfig.projbuild | 538 Require apps to be signed to verify their integrity. 616 …If this option is set, the bootloader will be compiled with code to verify that an app is signed b… 631 updates, or esp_image_format.h APIs are used to verify apps. 748 Path to a public key file used to verify signed images. 750 app, to verify app images. 764 if it fails to verify the signature of software bootloader with it. 770 NOTE: Once a digest slot is revoked, it can never be used again to verify an image
|
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/ |
D | advanced-commands.rst | 17 The ``verify_flash`` command allows you to verify that data in flash matches a local file.
|
D | basic-commands.rst | 335 * :ref:`verify-flash`
|
/hal_espressif-latest/tools/esptool_py/docs/en/advanced-topics/ |
D | serial-protocol.rst | 370 …H_MD5 command (not supported on ESP8266 ROM loader) or use another method to verify flash contents. 374 … The uploader should send the SPI_FLASH_MD5 command or use another method to verify flash contents.
|
/hal_espressif-latest/components/mbedtls/ |
D | Kconfig | 550 Enable hardware accelerated ECDSA peripheral to verify signature 561 bool "Enable hardware ECDSA verify acceleration when using ATECC608A"
|