/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_sha256.c | 64 uint8_t digest[32]; in test_1() local 69 (void)tc_sha256_final(digest, &s); in test_1() 71 digest, sizeof(digest)); in test_1() 89 uint8_t digest[32]; in test_2() local 94 (void) tc_sha256_final(digest, &s); in test_2() 97 digest, sizeof(digest)); in test_2() 112 uint8_t digest[32]; in test_3() local 117 (void)tc_sha256_final(digest, &s); in test_3() 120 digest, sizeof(digest)); in test_3() 135 uint8_t digest[32]; in test_4() local [all …]
|
D | test_hmac.c | 55 uint8_t digest[32]; in do_hmac_test() local 60 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test() 62 digest, sizeof(digest)); in do_hmac_test()
|
D | test_ecc_dsa.c | 86 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local 129 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors() 130 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), in sign_vectors() 353 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local 396 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors() 397 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), digest_bytes, in vrfy_vectors()
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/ |
D | sha512.c | 86 int tc_sha512_final(uint8_t *digest, TCSha512State_t s) in tc_sha512_final() argument 91 if (digest == (uint8_t *) 0 || s == (TCSha512State_t) 0) { in tc_sha512_final() 130 *digest++ = (uint8_t)(t >> 56); in tc_sha512_final() 131 *digest++ = (uint8_t)(t >> 48); in tc_sha512_final() 132 *digest++ = (uint8_t)(t >> 40); in tc_sha512_final() 133 *digest++ = (uint8_t)(t >> 32); in tc_sha512_final() 134 *digest++ = (uint8_t)(t >> 24); in tc_sha512_final() 135 *digest++ = (uint8_t)(t >> 16); in tc_sha512_final() 136 *digest++ = (uint8_t)(t >> 8); in tc_sha512_final() 137 *digest++ = (uint8_t)(t); in tc_sha512_final()
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | general.py | 75 digest = Hash(SHA256()) 76 digest.update(self.get_public_bytes()) 81 encoded_bytes=digest.finalize(), 91 digest = Hash(SHA256()) 92 digest.update(self.get_public_bytes()) 93 self._emit_raw(digest.finalize(), file=file)
|
D | ed25519.py | 64 def verify_digest(self, signature, digest): argument 69 return k.verify(signature=signature, data=digest) 109 def sign_digest(self, digest): argument 111 return self.key.sign(data=digest)
|
D | ed25519_test.py | 106 digest = sha.digest() 107 sig = k.sign_digest(digest) 111 k.key.public_key().verify(signature=sig, data=digest) 116 new_digest = sha.digest()
|
D | x25519.py | 110 def sign_digest(self, digest): argument 112 return self.key.sign(data=digest) 114 def verify_digest(self, signature, digest): argument 119 return k.verify(signature=signature, data=digest)
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 24 use ring::{digest, rand, agreement, hkdf, hmac}; 510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() 514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() 544 digest::digest(&digest::SHA256, RSA_PUB_KEY) in make_tlv() 546 digest::digest(&digest::SHA256, RSA3072_PUB_KEY) in make_tlv() 584 let keyhash = digest::digest(&digest::SHA384, ECDSAP384_PUB_KEY); in make_tlv() 590 let keyhash = digest::digest(&digest::SHA256, ECDSA256_PUB_KEY); in make_tlv() 612 let keyhash = digest::digest(&digest::SHA256, ED25519_PUB_KEY); in make_tlv() 620 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
|
/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | sha256.c | 87 int tc_sha256_final(uint8_t *digest, TCSha256State_t s) in tc_sha256_final() argument 92 if (digest == (uint8_t *) 0 || in tc_sha256_final() 126 *digest++ = (uint8_t)(t >> 24); in tc_sha256_final() 127 *digest++ = (uint8_t)(t >> 16); in tc_sha256_final() 128 *digest++ = (uint8_t)(t >> 8); in tc_sha256_final() 129 *digest++ = (uint8_t)(t); in tc_sha256_final()
|
/mcuboot-latest/scripts/imgtool/ |
D | image.py | 239 return sha.digest() 476 pubbytes = sha.digest() 483 pubbytes = sha.digest() 511 digest = bytes(hash_algorithm().digest_size) 515 hash_tlv, digest, 612 digest = sha.digest() 613 tlv.add(hash_tlv, digest) 614 self.image_hash = digest 616 message = digest 631 self.payload = digest [all …]
|
D | main.py | 229 ret, version, digest, signature = image.Image.verify(imgfile, key) 233 if digest: 234 print("Image digest: {}".format(digest.hex())) 235 if signature and digest is None:
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | sha256.h | 123 int tc_sha256_final(uint8_t *digest, TCSha256State_t s);
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/include/tinycrypt/ |
D | sha512.h | 123 int tc_sha512_final(uint8_t *digest, TCSha512State_t s);
|
/mcuboot-latest/docs/ |
D | imgtool.md | 62 --vector-to-sign [payload|digest] 64 digest instead of complied image. These data
|
D | readme-espressif.md | 420 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse. 433 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature 434 block with the digest saved in the eFuses. 435 2. Generate the application image digest and match it with the image digest in the signature 438 image digest calculated from previous step for comparison.
|
D | release-notes.md | 257 - imgtool: Print image digest during verify.
|