Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 17 of 17) sorted by relevance

/mcuboot-latest/ext/tinycrypt/tests/
Dtest_sha256.c64 uint8_t digest[32]; in test_1() local
69 (void)tc_sha256_final(digest, &s); in test_1()
71 digest, sizeof(digest)); in test_1()
89 uint8_t digest[32]; in test_2() local
94 (void) tc_sha256_final(digest, &s); in test_2()
97 digest, sizeof(digest)); in test_2()
112 uint8_t digest[32]; in test_3() local
117 (void)tc_sha256_final(digest, &s); in test_3()
120 digest, sizeof(digest)); in test_3()
135 uint8_t digest[32]; in test_4() local
[all …]
Dtest_hmac.c55 uint8_t digest[32]; in do_hmac_test() local
60 (void)tc_hmac_final(digest, TC_SHA256_DIGEST_SIZE, h); in do_hmac_test()
62 digest, sizeof(digest)); in do_hmac_test()
Dtest_ecc_dsa.c86 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in sign_vectors() local
129 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in sign_vectors()
130 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), in sign_vectors()
353 unsigned int digest[TC_SHA256_DIGEST_SIZE / 4]; in vrfy_vectors() local
396 memset(digest, 0, NUM_ECC_BYTES - 4 * hash_dwords); in vrfy_vectors()
397 uECC_vli_bytesToNative(digest + (NUM_ECC_WORDS-hash_dwords), digest_bytes, in vrfy_vectors()
/mcuboot-latest/ext/tinycrypt-sha512/lib/source/
Dsha512.c86 int tc_sha512_final(uint8_t *digest, TCSha512State_t s) in tc_sha512_final() argument
91 if (digest == (uint8_t *) 0 || s == (TCSha512State_t) 0) { in tc_sha512_final()
130 *digest++ = (uint8_t)(t >> 56); in tc_sha512_final()
131 *digest++ = (uint8_t)(t >> 48); in tc_sha512_final()
132 *digest++ = (uint8_t)(t >> 40); in tc_sha512_final()
133 *digest++ = (uint8_t)(t >> 32); in tc_sha512_final()
134 *digest++ = (uint8_t)(t >> 24); in tc_sha512_final()
135 *digest++ = (uint8_t)(t >> 16); in tc_sha512_final()
136 *digest++ = (uint8_t)(t >> 8); in tc_sha512_final()
137 *digest++ = (uint8_t)(t); in tc_sha512_final()
/mcuboot-latest/scripts/imgtool/keys/
Dgeneral.py75 digest = Hash(SHA256())
76 digest.update(self.get_public_bytes())
81 encoded_bytes=digest.finalize(),
91 digest = Hash(SHA256())
92 digest.update(self.get_public_bytes())
93 self._emit_raw(digest.finalize(), file=file)
Ded25519.py64 def verify_digest(self, signature, digest): argument
69 return k.verify(signature=signature, data=digest)
109 def sign_digest(self, digest): argument
111 return self.key.sign(data=digest)
Ded25519_test.py106 digest = sha.digest()
107 sig = k.sign_digest(digest)
111 k.key.public_key().verify(signature=sig, data=digest)
116 new_digest = sha.digest()
Dx25519.py110 def sign_digest(self, digest): argument
112 return self.key.sign(data=digest)
114 def verify_digest(self, signature, digest): argument
119 return k.verify(signature=signature, data=digest)
/mcuboot-latest/sim/src/
Dtlv.rs24 use ring::{digest, rand, agreement, hkdf, hmac};
510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv()
544 digest::digest(&digest::SHA256, RSA_PUB_KEY) in make_tlv()
546 digest::digest(&digest::SHA256, RSA3072_PUB_KEY) in make_tlv()
584 let keyhash = digest::digest(&digest::SHA384, ECDSAP384_PUB_KEY); in make_tlv()
590 let keyhash = digest::digest(&digest::SHA256, ECDSA256_PUB_KEY); in make_tlv()
612 let keyhash = digest::digest(&digest::SHA256, ED25519_PUB_KEY); in make_tlv()
620 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv()
/mcuboot-latest/ext/tinycrypt/lib/source/
Dsha256.c87 int tc_sha256_final(uint8_t *digest, TCSha256State_t s) in tc_sha256_final() argument
92 if (digest == (uint8_t *) 0 || in tc_sha256_final()
126 *digest++ = (uint8_t)(t >> 24); in tc_sha256_final()
127 *digest++ = (uint8_t)(t >> 16); in tc_sha256_final()
128 *digest++ = (uint8_t)(t >> 8); in tc_sha256_final()
129 *digest++ = (uint8_t)(t); in tc_sha256_final()
/mcuboot-latest/scripts/imgtool/
Dimage.py239 return sha.digest()
476 pubbytes = sha.digest()
483 pubbytes = sha.digest()
511 digest = bytes(hash_algorithm().digest_size)
515 hash_tlv, digest,
612 digest = sha.digest()
613 tlv.add(hash_tlv, digest)
614 self.image_hash = digest
616 message = digest
631 self.payload = digest
[all …]
Dmain.py229 ret, version, digest, signature = image.Image.verify(imgfile, key)
233 if digest:
234 print("Image digest: {}".format(digest.hex()))
235 if signature and digest is None:
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Dsha256.h123 int tc_sha256_final(uint8_t *digest, TCSha256State_t s);
/mcuboot-latest/ext/tinycrypt-sha512/lib/include/tinycrypt/
Dsha512.h123 int tc_sha512_final(uint8_t *digest, TCSha512State_t s);
/mcuboot-latest/docs/
Dimgtool.md62 --vector-to-sign [payload|digest]
64 digest instead of complied image. These data
Dreadme-espressif.md420 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse.
433 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature
434 block with the digest saved in the eFuses.
435 2. Generate the application image digest and match it with the image digest in the signature
438 image digest calculated from previous step for comparison.
Drelease-notes.md257 - imgtool: Print image digest during verify.