/mcuboot-2.7.6/boot/bootutil/include/bootutil/crypto/ |
D | ecdsa_p256.h | 55 const uint8_t *hash, in bootutil_ecdsa_p256_verify() argument 69 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, sig, uECC_secp256r1()); in bootutil_ecdsa_p256_verify() 91 uint8_t *hash, in bootutil_ecdsa_p256_verify() argument 104 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_p256_verify() 127 uint8_t *hash, in bootutil_ecdsa_p256_verify() argument 133 (void)hash; in bootutil_ecdsa_p256_verify() 150 rc = mbedtls_ecdsa_read_signature(ctx, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, in bootutil_ecdsa_p256_verify()
|
/mcuboot-2.7.6/ext/tinycrypt/tests/ |
D | test_ecc_dsa.c | 76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument 118 tc_sha256_init(hash); in sign_vectors() 119 tc_sha256_update(hash, msg, msglen); in sign_vectors() 120 tc_sha256_final(digest_bytes, hash); in sign_vectors() 343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument 385 tc_sha256_init(hash); in vrfy_vectors() 386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors() 387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors() 597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local 610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify() [all …]
|
/mcuboot-2.7.6/boot/bootutil/src/ |
D | image_validate.c | 207 uint8_t hash[32]; in bootutil_find_key() local 217 bootutil_sha256_finish(&sha256_ctx, hash); in bootutil_find_key() 218 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key() 232 uint8_t hash[32]; in bootutil_find_key() local 240 bootutil_sha256_finish(&sha256_ctx, hash); in bootutil_find_key() 254 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key() 352 uint8_t hash[32]; in bootutil_img_validate() local 362 tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate() 368 memcpy(out_hash, hash, 32); in bootutil_img_validate() 393 if (len != sizeof(hash)) { in bootutil_img_validate() [all …]
|
D | image_ec.c | 95 bootutil_cmp_sig(mbedtls_ecdsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_sig() argument 98 return mbedtls_ecdsa_read_signature(ctx, hash, hlen, sig, slen); in bootutil_cmp_sig() 102 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 123 rc = bootutil_cmp_sig(&ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_rsa.c | 129 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument 139 bootutil_sha256_update(&ctx, hash, PSS_HLEN); in pss_mgf1() 163 bootutil_cmp_rsasig(mbedtls_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument 272 bootutil_sha256_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig() 290 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 309 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig); in bootutil_verify_sig()
|
D | image_ed25519.c | 66 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 85 rc = ED25519_verify(hash, 32, sig, pubkey); in bootutil_verify_sig()
|
D | image_ec256.c | 198 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 237 rc = mbedtls_ecdsa_read_signature(&ctx, hash, hlen, sig, slen); in bootutil_verify_sig() 246 rc = bootutil_ecdsa_p256_verify(&ctx, pubkey, end - pubkey, hash, sig, slen); in bootutil_verify_sig() 248 rc = bootutil_ecdsa_p256_verify(&ctx, pubkey, end - pubkey, hash, signature, in bootutil_verify_sig()
|
D | bootutil_priv.h | 230 fih_int bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
|
/mcuboot-2.7.6/ext/mbedtls-asn1/include/mbedtls/ |
D | ecdsa.h | 253 const unsigned char *hash, size_t hlen, 286 const unsigned char *hash, size_t hlen, 340 const unsigned char *hash, size_t hlen, 372 const unsigned char *hash, size_t hlen, 402 const unsigned char *hash, size_t hlen,
|
D | pk.h | 186 const unsigned char *hash, unsigned char *sig ); 314 const unsigned char *hash, size_t hash_len, 339 const unsigned char *hash, size_t hash_len, 374 const unsigned char *hash, size_t hash_len, 402 const unsigned char *hash, size_t hash_len, 430 const unsigned char *hash, size_t hash_len,
|
/mcuboot-2.7.6/ext/nrf/ |
D | cc310_glue.c | 45 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument 57 hash, in cc310_ecdsa_verify_secp256r1()
|
D | cc310_glue.h | 25 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
|
/mcuboot-2.7.6/sim/src/ |
D | tlv.rs | 394 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable 395 let hash = hash.as_ref(); in make_tlv() localVariable 397 assert!(hash.len() == 32); in make_tlv() 400 result.extend_from_slice(hash); in make_tlv() 421 let hash = if is_rsa2048 { in make_tlv() localVariable 426 let hash = hash.as_ref(); in make_tlv() localVariable 428 assert!(hash.len() == 32); in make_tlv() 431 result.extend_from_slice(hash); in make_tlv() 493 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable 494 let hash = hash.as_ref(); in make_tlv() localVariable [all …]
|
/mcuboot-2.7.6/docs/ |
D | testplan-mynewt.md | 38 * `newtmgr image test <hash of slot 1>` 67 * `newtmgr image test <hash of slot 1>` 87 * `newtmgr image confirm <hash of slot 1>` 142 * `newtmgr image confirm <hash of slot 1>`
|
D | imgtool.md | 63 --public-key-format [hash|full] 130 key is stored for image authentication. The `hash` option is used by default, in 131 which case only the hash of the public key is added to the TLV area (the full
|
D | readme-riot.md | 31 hash and signing information. This is done through the imgtool.py
|
D | release-notes.md | 273 - The public key is referred to by its SHA1 hash (or a prefix of the 274 hash), instead of an index that has to be maintained with the
|
/mcuboot-2.7.6/ptest/ |
D | Cargo.lock | 155 name = "linked-hash-map" 388 "linked-hash-map",
|
/mcuboot-2.7.6/boot/zephyr/ |
D | Kconfig | 73 bool "No signature; use only hash check" 173 and requires the hash of the public key to be provisioned to the device 313 the hash of the firmware image in a shared memory area. This data can
|
/mcuboot-2.7.6/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 125 however that this will only be a problem if you intend to hash more than
|