Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 23 of 23) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_common.c206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument
208 tls_verify_hash_free(verify); in tls_verify_hash_init()
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init()
216 verify->md5_cert == NULL || verify->sha1_client == NULL || in tls_verify_hash_init()
[all …]
Dtlsv1_client_write.c244 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello()
338 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate()
566 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange()
621 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify()
622 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
624 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
629 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
653 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify()
654 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
657 conn->verify.md5_cert = NULL; in tls_write_client_certificate_verify()
[all …]
Dtlsv1_server_read.c987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify()
1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify()
1011 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
[all …]
Dtlsv1_server_write.c171 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_hello()
273 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate()
360 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_status()
687 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_key_exchange()
753 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_request()
790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done()
848 if (conn->verify.sha256_server == NULL || in tls_write_server_finished()
849 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_write_server_finished()
851 conn->verify.sha256_server = NULL; in tls_write_server_finished()
856 conn->verify.sha256_server = NULL; in tls_write_server_finished()
[all …]
Dtlsv1_common.h254 int tls_verify_hash_init(struct tls_verify_hash *verify);
255 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
257 void tls_verify_hash_free(struct tls_verify_hash *verify);
Dtlsv1_client_read.c1388 if (conn->verify.sha256_server == NULL || in tls_process_server_finished()
1389 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished()
1393 conn->verify.sha256_server = NULL; in tls_process_server_finished()
1396 conn->verify.sha256_server = NULL; in tls_process_server_finished()
1401 if (conn->verify.md5_server == NULL || in tls_process_server_finished()
1402 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { in tls_process_server_finished()
1405 conn->verify.md5_server = NULL; in tls_process_server_finished()
1406 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); in tls_process_server_finished()
1407 conn->verify.sha1_server = NULL; in tls_process_server_finished()
1410 conn->verify.md5_server = NULL; in tls_process_server_finished()
[all …]
Dtlsv1_server_i.h37 struct tls_verify_hash verify; member
Dtlsv1_client_i.h43 struct tls_verify_hash verify; member
Dtlsv1_server.c391 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_init()
423 tls_verify_hash_free(&conn->verify); in tlsv1_server_clear_data()
616 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_shutdown()
Dtlsv1_client.c477 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_init()
526 tls_verify_hash_free(&conn->verify); in tlsv1_client_deinit()
702 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_shutdown()
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/
Dcsv_table_parser.py122 def verify(self, type_table=None): member in CSVFuseTable
144 p.verify(type_table)
232 def verify(self, type_table): member in FuseDefinition
/hal_espressif-latest/components/efuse/
Defuse_table_gen.py150 def verify(self, type_table=None): member in FuseTable
171 p.verify(type_table)
418 def verify(self, type_table): member in FuseDefinition
453 table.verify(type_table)
527 two_table.verify()
/hal_espressif-latest/tools/esptool_py/docs/en/
Dindex.rst8 * Read, write, erase, and verify binary data stored in flash.
Dtroubleshooting.rst22 * Try using a slower baud rate (``-b 9600`` is a very slow value that you can use to verify it's n…
184 …is data in the serial buffer result in "Invalid head of packet". You can verify this by connecting…
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py384 vk.verify(signature, binary_content, hashlib.sha256) # throws exception on failure
572 public_key.verify(
604 public_key.verify(
792 if vk.verify(signature, data, hashlib.sha256):
883 vk.verify(
917 vk.verify(signature, digest, ec.ECDSA(utils.Prehashed(hash_type)))
/hal_espressif-latest/tools/esptool_py/esptool/
Dbin_image.py221 def verify(self): member in BaseFirmwareImage
469 self.verify()
566 self.verify()
691 self.verify()
Dcmds.py271 test_image.verify()
748 if args.verify:
1113 image.verify()
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/
Dindex.rst38 Once the signed image is generated, we can verify it using the following command: ::
/hal_espressif-latest/components/bootloader/
DKconfig.projbuild538 Require apps to be signed to verify their integrity.
616 …If this option is set, the bootloader will be compiled with code to verify that an app is signed b…
631 updates, or esp_image_format.h APIs are used to verify apps.
748 Path to a public key file used to verify signed images.
750 app, to verify app images.
764 if it fails to verify the signature of software bootloader with it.
770 NOTE: Once a digest slot is revoked, it can never be used again to verify an image
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/
Dadvanced-commands.rst17 The ``verify_flash`` command allows you to verify that data in flash matches a local file.
Dbasic-commands.rst335 * :ref:`verify-flash`
/hal_espressif-latest/tools/esptool_py/docs/en/advanced-topics/
Dserial-protocol.rst370 …H_MD5 command (not supported on ESP8266 ROM loader) or use another method to verify flash contents.
374 … The uploader should send the SPI_FLASH_MD5 command or use another method to verify flash contents.
/hal_espressif-latest/components/mbedtls/
DKconfig550 Enable hardware accelerated ECDSA peripheral to verify signature
561 bool "Enable hardware ECDSA verify acceleration when using ATECC608A"