Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 16 of 16) sorted by relevance

/mcuboot-latest/ext/tinycrypt/tests/
Dtest_sha256.c64 uint8_t digest[32]; in test_1() local
69 (void)tc_sha256_final(digest, &s); in test_1()
71 digest, sizeof(digest)); in test_1()
89 uint8_t digest[32]; in test_2() local
94 (void) tc_sha256_final(digest, &s); in test_2()
97 digest, sizeof(digest)); in test_2()
112 uint8_t digest[32]; in test_3() local
117 (void)tc_sha256_final(digest, &s); in test_3()
120 digest, sizeof(digest)); in test_3()
135 uint8_t digest[32]; in test_4() local
[all …]
Dtest_hmac.c55 uint8_t digest[32]; in do_hmac_test() local
60 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test()
62 digest, sizeof(digest)); in do_hmac_test()
Dtest_ecc_dsa.c86 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local
129 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors()
130 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), in sign_vectors()
353 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local
396 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors()
397 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), digest_bytes, in vrfy_vectors()
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/
Dsha512.c86 int tc_sha512_final(uint8_t *digest, TCSha512State_t s) in tc_sha512_final() argument
91 if (digest == (uint8_t *) 0 || s == (TCSha512State_t) 0) { in tc_sha512_final()
130 *digest++ = (uint8_t)(t >> 56); in tc_sha512_final()
131 *digest++ = (uint8_t)(t >> 48); in tc_sha512_final()
132 *digest++ = (uint8_t)(t >> 40); in tc_sha512_final()
133 *digest++ = (uint8_t)(t >> 32); in tc_sha512_final()
134 *digest++ = (uint8_t)(t >> 24); in tc_sha512_final()
135 *digest++ = (uint8_t)(t >> 16); in tc_sha512_final()
136 *digest++ = (uint8_t)(t >> 8); in tc_sha512_final()
137 *digest++ = (uint8_t)(t); in tc_sha512_final()
/mcuboot-latest/scripts/imgtool/keys/
Dgeneral.py75 digest = Hash(SHA256())
76 digest.update(self.get_public_bytes())
81 encoded_bytes=digest.finalize(),
91 digest = Hash(SHA256())
92 digest.update(self.get_public_bytes())
93 self._emit_raw(digest.finalize(), file=file)
Ded25519.py64 def verify_digest(self, signature, digest): argument
69 return k.verify(signature=signature, data=digest)
109 def sign_digest(self, digest): argument
111 return self.key.sign(data=digest)
Ded25519_test.py106 digest = sha.digest()
107 sig = k.sign_digest(digest)
111 k.key.public_key().verify(signature=sig, data=digest)
116 new_digest = sha.digest()
Dx25519.py110 def sign_digest(self, digest): argument
112 return self.key.sign(data=digest)
114 def verify_digest(self, signature, digest): argument
119 return k.verify(signature=signature, data=digest)
/mcuboot-latest/sim/src/
Dtlv.rs24 use ring::{digest, rand, agreement, hkdf, hmac};
510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv()
544 digest::digest(&digest::SHA256, RSA_PUB_KEY) in make_tlv()
546 digest::digest(&digest::SHA256, RSA3072_PUB_KEY) in make_tlv()
584 let keyhash = digest::digest(&digest::SHA384, ECDSAP384_PUB_KEY); in make_tlv()
590 let keyhash = digest::digest(&digest::SHA256, ECDSA256_PUB_KEY); in make_tlv()
612 let keyhash = digest::digest(&digest::SHA256, ED25519_PUB_KEY); in make_tlv()
620 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
/mcuboot-latest/ext/tinycrypt/lib/source/
Dsha256.c87 int tc_sha256_final(uint8_t *digest, TCSha256State_t s) in tc_sha256_final() argument
92 if (digest == (uint8_t *) 0 || in tc_sha256_final()
126 *digest++ = (uint8_t)(t >> 24); in tc_sha256_final()
127 *digest++ = (uint8_t)(t >> 16); in tc_sha256_final()
128 *digest++ = (uint8_t)(t >> 8); in tc_sha256_final()
129 *digest++ = (uint8_t)(t); in tc_sha256_final()
/mcuboot-latest/scripts/imgtool/
Dimage.py226 return sha.digest()
462 pubbytes = sha.digest()
469 pubbytes = sha.digest()
497 digest = bytes(hash_algorithm().digest_size)
501 hash_tlv, digest,
594 digest = sha.digest()
595 message = digest;
596 tlv.add(hash_tlv, digest)
597 self.image_hash = digest
605 self.payload = digest
[all …]
Dmain.py229 ret, version, digest = image.Image.verify(imgfile, key)
233 print("Image digest: {}".format(digest.hex()))
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Dsha256.h123 int tc_sha256_final(uint8_t *digest, TCSha256State_t s);
/mcuboot-latest/ext/tinycrypt-sha512/lib/include/tinycrypt/
Dsha512.h123 int tc_sha512_final(uint8_t *digest, TCSha512State_t s);
/mcuboot-latest/docs/
Dreadme-espressif.md416 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse.
429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature
430 block with the digest saved in the eFuses.
431 2. Generate the application image digest and match it with the image digest in the signature
434 image digest calculated from previous step for comparison.
Drelease-notes.md257 - imgtool: Print image digest during verify.