Home
last modified time | relevance | path

Searched refs:hash (Results 1 – 20 of 20) sorted by relevance

/mcuboot-2.7.6/boot/bootutil/include/bootutil/crypto/
Decdsa_p256.h55 const uint8_t *hash, in bootutil_ecdsa_p256_verify() argument
69 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, sig, uECC_secp256r1()); in bootutil_ecdsa_p256_verify()
91 uint8_t *hash, in bootutil_ecdsa_p256_verify() argument
104 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_p256_verify()
127 uint8_t *hash, in bootutil_ecdsa_p256_verify() argument
133 (void)hash; in bootutil_ecdsa_p256_verify()
150 rc = mbedtls_ecdsa_read_signature(ctx, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, in bootutil_ecdsa_p256_verify()
/mcuboot-2.7.6/ext/tinycrypt/tests/
Dtest_ecc_dsa.c76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument
118 tc_sha256_init(hash); in sign_vectors()
119 tc_sha256_update(hash, msg, msglen); in sign_vectors()
120 tc_sha256_final(digest_bytes, hash); in sign_vectors()
343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument
385 tc_sha256_init(hash); in vrfy_vectors()
386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors()
387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors()
597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local
610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify()
[all …]
/mcuboot-2.7.6/boot/bootutil/src/
Dimage_validate.c207 uint8_t hash[32]; in bootutil_find_key() local
217 bootutil_sha256_finish(&sha256_ctx, hash); in bootutil_find_key()
218 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key()
232 uint8_t hash[32]; in bootutil_find_key() local
240 bootutil_sha256_finish(&sha256_ctx, hash); in bootutil_find_key()
254 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key()
352 uint8_t hash[32]; in bootutil_img_validate() local
362 tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate()
368 memcpy(out_hash, hash, 32); in bootutil_img_validate()
393 if (len != sizeof(hash)) { in bootutil_img_validate()
[all …]
Dimage_ec.c95 bootutil_cmp_sig(mbedtls_ecdsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_sig() argument
98 return mbedtls_ecdsa_read_signature(ctx, hash, hlen, sig, slen); in bootutil_cmp_sig()
102 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
123 rc = bootutil_cmp_sig(&ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_rsa.c129 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument
139 bootutil_sha256_update(&ctx, hash, PSS_HLEN); in pss_mgf1()
163 bootutil_cmp_rsasig(mbedtls_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument
272 bootutil_sha256_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig()
290 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
309 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig); in bootutil_verify_sig()
Dimage_ed25519.c66 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
85 rc = ED25519_verify(hash, 32, sig, pubkey); in bootutil_verify_sig()
Dimage_ec256.c198 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
237 rc = mbedtls_ecdsa_read_signature(&ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
246 rc = bootutil_ecdsa_p256_verify(&ctx, pubkey, end - pubkey, hash, sig, slen); in bootutil_verify_sig()
248 rc = bootutil_ecdsa_p256_verify(&ctx, pubkey, end - pubkey, hash, signature, in bootutil_verify_sig()
Dbootutil_priv.h230 fih_int bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
/mcuboot-2.7.6/ext/mbedtls-asn1/include/mbedtls/
Decdsa.h253 const unsigned char *hash, size_t hlen,
286 const unsigned char *hash, size_t hlen,
340 const unsigned char *hash, size_t hlen,
372 const unsigned char *hash, size_t hlen,
402 const unsigned char *hash, size_t hlen,
Dpk.h186 const unsigned char *hash, unsigned char *sig );
314 const unsigned char *hash, size_t hash_len,
339 const unsigned char *hash, size_t hash_len,
374 const unsigned char *hash, size_t hash_len,
402 const unsigned char *hash, size_t hash_len,
430 const unsigned char *hash, size_t hash_len,
/mcuboot-2.7.6/ext/nrf/
Dcc310_glue.c45 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument
57 hash, in cc310_ecdsa_verify_secp256r1()
Dcc310_glue.h25 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
/mcuboot-2.7.6/sim/src/
Dtlv.rs394 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable
395 let hash = hash.as_ref(); in make_tlv() localVariable
397 assert!(hash.len() == 32); in make_tlv()
400 result.extend_from_slice(hash); in make_tlv()
421 let hash = if is_rsa2048 { in make_tlv() localVariable
426 let hash = hash.as_ref(); in make_tlv() localVariable
428 assert!(hash.len() == 32); in make_tlv()
431 result.extend_from_slice(hash); in make_tlv()
493 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable
494 let hash = hash.as_ref(); in make_tlv() localVariable
[all …]
/mcuboot-2.7.6/docs/
Dtestplan-mynewt.md38 * `newtmgr image test <hash of slot 1>`
67 * `newtmgr image test <hash of slot 1>`
87 * `newtmgr image confirm <hash of slot 1>`
142 * `newtmgr image confirm <hash of slot 1>`
Dimgtool.md63 --public-key-format [hash|full]
130 key is stored for image authentication. The `hash` option is used by default, in
131 which case only the hash of the public key is added to the TLV area (the full
Dreadme-riot.md31 hash and signing information. This is done through the imgtool.py
Drelease-notes.md273 - The public key is referred to by its SHA1 hash (or a prefix of the
274 hash), instead of an index that has to be maintained with the
/mcuboot-2.7.6/ptest/
DCargo.lock155 name = "linked-hash-map"
388 "linked-hash-map",
/mcuboot-2.7.6/boot/zephyr/
DKconfig73 bool "No signature; use only hash check"
173 and requires the hash of the public key to be provisioned to the device
313 the hash of the firmware image in a shared memory area. This data can
/mcuboot-2.7.6/ext/tinycrypt/documentation/
Dtinycrypt.rst125 however that this will only be a problem if you intend to hash more than