Home
last modified time | relevance | path

Searched refs:hash (Results 1 – 25 of 26) sorted by relevance

12

/mcuboot-latest/ext/tinycrypt/tests/
Dtest_ecc_dsa.c76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument
118 tc_sha256_init(hash); in sign_vectors()
119 tc_sha256_update(hash, msg, msglen); in sign_vectors()
120 tc_sha256_final(digest_bytes, hash); in sign_vectors()
343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument
385 tc_sha256_init(hash); in vrfy_vectors()
386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors()
387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors()
597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local
610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify()
[all …]
/mcuboot-latest/boot/bootutil/src/
Dimage_rsa.c87 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument
97 bootutil_sha_update(&ctx, hash, PSS_HLEN); in pss_mgf1()
121 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument
226 bootutil_sha_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig()
242 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument
249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig()
262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_ecdsa.c40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig()
71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_validate.c281 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local
291 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key()
292 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key()
306 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local
314 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key()
328 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key()
511 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_img_validate() local
523 rc = bootutil_img_hash(state, hdr, fap, tmp_buf, tmp_buf_sz, hash, seed, seed_len, in bootutil_img_validate()
526 rc = bootutil_img_hash(state, hdr, fap, tmp_buf, tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate()
533 memcpy(out_hash, hash, IMAGE_HASH_SIZE); in bootutil_img_validate()
[all …]
Dimage_ed25519.c122 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, in bootutil_verify_sig() argument
133 FIH_CALL(bootutil_verify, fih_rc, hash, IMAGE_HASH_SIZE, sig, in bootutil_verify_sig()
Dbootutil_priv.h289 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Drsa.h813 const unsigned char *hash,
845 const unsigned char *hash,
896 const unsigned char *hash,
946 const unsigned char *hash,
978 const unsigned char *hash,
1003 const unsigned char *hash,
1038 const unsigned char *hash,
1078 const unsigned char *hash,
Decdsa.h309 const unsigned char *hash, size_t hlen,
356 const unsigned char *hash, size_t hlen,
390 const unsigned char *hash, size_t hlen,
425 const unsigned char *hash, size_t hlen,
Dpk.h236 const unsigned char *hash, unsigned char *sig );
423 const unsigned char *hash, size_t hash_len,
448 const unsigned char *hash, size_t hash_len,
483 const unsigned char *hash, size_t hash_len,
515 const unsigned char *hash, size_t hash_len,
550 const unsigned char *hash, size_t hash_len,
/mcuboot-latest/ext/nrf/
Dcc310_glue.c56 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument
68 hash, in cc310_ecdsa_verify_secp256r1()
Dcc310_glue.h37 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Decdsa.h196 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
217 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, signature, uECC_secp256r1()); in bootutil_ecdsa_verify()
246 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify()
470 uint8_t *hash, size_t hlen, in bootutil_ecdsa_verify() argument
481 hash, hlen, reformatted_signature, 2*ctx->curve_byte_count); in bootutil_ecdsa_verify()
547 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
559 return mbedtls_ecdsa_read_signature(&ctx, hash, hash_len, sig, sig_len); in bootutil_ecdsa_verify()
566 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
572 (void)hash; in bootutil_ecdsa_verify()
[all …]
Drsa.h169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument
172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
/mcuboot-latest/sim/src/
Dtlv.rs508 let (hash,hash_size,tlv_kind) = if self.kinds.contains(&TlvKinds::SHA256) in make_tlv()
510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable
511 (hash,32,TlvKinds::SHA256) in make_tlv()
514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() localVariable
515 (hash,48,TlvKinds::SHA384) in make_tlv()
517 let hash = hash.as_ref(); in make_tlv() localVariable
519 assert!(hash.len() == hash_size); in make_tlv()
522 result.extend_from_slice(hash); in make_tlv()
543 let hash = if is_rsa2048 { in make_tlv() localVariable
548 let hash = hash.as_ref(); in make_tlv() localVariable
[all …]
/mcuboot-latest/boot/boot_serial/src/
Dboot_serial.c173 const struct flash_area *fap, uint8_t *hash, uint32_t start_off);
176 const struct flash_area *fap, uint8_t *hash);
285 uint8_t hash[IMAGE_HASH_SIZE]; in bs_list() local
396 rc = boot_serial_get_hash(&hdr, fap, hash, start_off); in bs_list()
398 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_list()
469 zcbor_bstr_encode_ptr(cbor_state, hash, sizeof(hash)); in bs_list()
502 uint8_t hash[IMAGE_HASH_SIZE]; in bs_set() local
531 if ((img_hash.len != sizeof(hash) && img_hash.len != 0) || in bs_set()
620 rc = boot_serial_get_hash(&hdr, fap, hash, start_off); in bs_set()
622 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_set()
[all …]
/mcuboot-latest/
D.travis.yml-disabled46 ## Corrupt image hash is not tested as it is in the unprotected TLV section
47 ## and is easy to calculate a valid hash for a changed image
/mcuboot-latest/docs/
Dtestplan-mynewt.md43 * `newtmgr image test <hash of slot 1>`
72 * `newtmgr image test <hash of slot 1>`
92 * `newtmgr image confirm <hash of slot 1>`
147 * `newtmgr image confirm <hash of slot 1>`
Dcompression_format.md155 - `DECOMP_SHA (0x71)`: Contains the hash of the decompressed image.
156 - `DECOMP_SIGNATURE (0x72)`: Holds the signature of either the hash or
162 signature and hash algorithm used for securing the image is the same,
Dimgtool.md75 over an image rather than hash of that
82 --public-key-format [hash|full]
84 image manifest: full key or hash of the key.
186 key is stored for image authentication. The `hash` option is used by default, in
187 which case only the hash of the public key is added to the TLV area (the full
Dreadme-riot.md31 hash and signing information. This is done through the imgtool.py
Drelease-notes.md93 - imgtool: add 'getpubhash' command to dump the sha256 hash of the public key
492 - The public key is referred to by its SHA1 hash (or a prefix of the
493 hash), instead of an index that has to be maintained with the
/mcuboot-latest/boot/zephyr/
DKconfig.serial_recovery193 bool "Image list hash support"
196 If y, image list responses will include the image hash (adds ~100
DKconfig105 to address space or RAM area, enabling this option allows hash
117 prompt "Selected image hash algorithm"
151 signature is calculated over entire image instead of hash
159 bool "No signature; use only hash check"
213 To check signature over entire image directly, rather than hash,
223 hash of an image, as the BOOT_SIGNATURE_TYPE_ED25519 does by
300 and requires the hash of the public key to be provisioned to the device
637 the hash of the firmware image in a shared memory area. This data can
/mcuboot-latest/ptest/
DCargo.lock215 name = "linked-hash-map"
555 "linked-hash-map",
/mcuboot-latest/ext/tinycrypt/documentation/
Dtinycrypt.rst125 however that this will only be a problem if you intend to hash more than

12