/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_sha256.c | 64 uint8_t digest[32]; in test_1() local 69 (void)tc_sha256_final(digest, &s); in test_1() 71 digest, sizeof(digest)); in test_1() 89 uint8_t digest[32]; in test_2() local 94 (void) tc_sha256_final(digest, &s); in test_2() 97 digest, sizeof(digest)); in test_2() 112 uint8_t digest[32]; in test_3() local 117 (void)tc_sha256_final(digest, &s); in test_3() 120 digest, sizeof(digest)); in test_3() 135 uint8_t digest[32]; in test_4() local [all …]
|
D | test_hmac.c | 55 uint8_t digest[32]; in do_hmac_test() local 60 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test() 62 digest, sizeof(digest)); in do_hmac_test()
|
D | test_ecc_dsa.c | 86 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local 129 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors() 130 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), in sign_vectors() 353 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local 396 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors() 397 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), digest_bytes, in vrfy_vectors()
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/ |
D | sha512.c | 86 int tc_sha512_final(uint8_t *digest, TCSha512State_t s) in tc_sha512_final() argument 91 if (digest == (uint8_t *) 0 || s == (TCSha512State_t) 0) { in tc_sha512_final() 130 *digest++ = (uint8_t)(t >> 56); in tc_sha512_final() 131 *digest++ = (uint8_t)(t >> 48); in tc_sha512_final() 132 *digest++ = (uint8_t)(t >> 40); in tc_sha512_final() 133 *digest++ = (uint8_t)(t >> 32); in tc_sha512_final() 134 *digest++ = (uint8_t)(t >> 24); in tc_sha512_final() 135 *digest++ = (uint8_t)(t >> 16); in tc_sha512_final() 136 *digest++ = (uint8_t)(t >> 8); in tc_sha512_final() 137 *digest++ = (uint8_t)(t); in tc_sha512_final()
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | general.py | 75 digest = Hash(SHA256()) 76 digest.update(self.get_public_bytes()) 81 encoded_bytes=digest.finalize(), 91 digest = Hash(SHA256()) 92 digest.update(self.get_public_bytes()) 93 self._emit_raw(digest.finalize(), file=file)
|
D | ed25519.py | 64 def verify_digest(self, signature, digest): argument 69 return k.verify(signature=signature, data=digest) 109 def sign_digest(self, digest): argument 111 return self.key.sign(data=digest)
|
D | ed25519_test.py | 106 digest = sha.digest() 107 sig = k.sign_digest(digest) 111 k.key.public_key().verify(signature=sig, data=digest) 116 new_digest = sha.digest()
|
D | x25519.py | 110 def sign_digest(self, digest): argument 112 return self.key.sign(data=digest) 114 def verify_digest(self, signature, digest): argument 119 return k.verify(signature=signature, data=digest)
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 24 use ring::{digest, rand, agreement, hkdf, hmac}; 510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() 514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() 544 digest::digest(&digest::SHA256, RSA_PUB_KEY) in make_tlv() 546 digest::digest(&digest::SHA256, RSA3072_PUB_KEY) in make_tlv() 584 let keyhash = digest::digest(&digest::SHA384, ECDSAP384_PUB_KEY); in make_tlv() 590 let keyhash = digest::digest(&digest::SHA256, ECDSA256_PUB_KEY); in make_tlv() 612 let keyhash = digest::digest(&digest::SHA256, ED25519_PUB_KEY); in make_tlv() 620 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
|
/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | sha256.c | 87 int tc_sha256_final(uint8_t *digest, TCSha256State_t s) in tc_sha256_final() argument 92 if (digest == (uint8_t *) 0 || in tc_sha256_final() 126 *digest++ = (uint8_t)(t >> 24); in tc_sha256_final() 127 *digest++ = (uint8_t)(t >> 16); in tc_sha256_final() 128 *digest++ = (uint8_t)(t >> 8); in tc_sha256_final() 129 *digest++ = (uint8_t)(t); in tc_sha256_final()
|
/mcuboot-latest/scripts/imgtool/ |
D | image.py | 226 return sha.digest() 462 pubbytes = sha.digest() 469 pubbytes = sha.digest() 497 digest = bytes(hash_algorithm().digest_size) 501 hash_tlv, digest, 594 digest = sha.digest() 595 message = digest; 596 tlv.add(hash_tlv, digest) 597 self.image_hash = digest 605 self.payload = digest [all …]
|
D | main.py | 229 ret, version, digest = image.Image.verify(imgfile, key) 233 print("Image digest: {}".format(digest.hex()))
|
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/ |
D | sha256.h | 123 int tc_sha256_final(uint8_t *digest, TCSha256State_t s);
|
/mcuboot-latest/ext/tinycrypt-sha512/lib/include/tinycrypt/ |
D | sha512.h | 123 int tc_sha512_final(uint8_t *digest, TCSha512State_t s);
|
/mcuboot-latest/docs/ |
D | readme-espressif.md | 416 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse. 429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature 430 block with the digest saved in the eFuses. 431 2. Generate the application image digest and match it with the image digest in the signature 434 image digest calculated from previous step for comparison.
|
D | release-notes.md | 257 - imgtool: Print image digest during verify.
|