/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_ecc_dsa.c | 76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument 118 tc_sha256_init(hash); in sign_vectors() 119 tc_sha256_update(hash, msg, msglen); in sign_vectors() 120 tc_sha256_final(digest_bytes, hash); in sign_vectors() 343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument 385 tc_sha256_init(hash); in vrfy_vectors() 386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors() 387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors() 597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local 610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify() [all …]
|
/mcuboot-latest/boot/bootutil/src/ |
D | image_rsa.c | 87 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument 97 bootutil_sha_update(&ctx, hash, PSS_HLEN); in pss_mgf1() 121 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument 226 bootutil_sha_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig() 242 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument 249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig() 262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_ecdsa.c | 40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig() 71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_validate.c | 281 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local 291 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key() 292 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key() 306 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local 314 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key() 328 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key() 511 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_img_validate() local 523 rc = bootutil_img_hash(state, hdr, fap, tmp_buf, tmp_buf_sz, hash, seed, seed_len, in bootutil_img_validate() 526 rc = bootutil_img_hash(state, hdr, fap, tmp_buf, tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate() 533 memcpy(out_hash, hash, IMAGE_HASH_SIZE); in bootutil_img_validate() [all …]
|
D | image_ed25519.c | 122 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, in bootutil_verify_sig() argument 133 FIH_CALL(bootutil_verify, fih_rc, hash, IMAGE_HASH_SIZE, sig, in bootutil_verify_sig()
|
D | bootutil_priv.h | 289 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | rsa.h | 813 const unsigned char *hash, 845 const unsigned char *hash, 896 const unsigned char *hash, 946 const unsigned char *hash, 978 const unsigned char *hash, 1003 const unsigned char *hash, 1038 const unsigned char *hash, 1078 const unsigned char *hash,
|
D | ecdsa.h | 309 const unsigned char *hash, size_t hlen, 356 const unsigned char *hash, size_t hlen, 390 const unsigned char *hash, size_t hlen, 425 const unsigned char *hash, size_t hlen,
|
D | pk.h | 236 const unsigned char *hash, unsigned char *sig ); 423 const unsigned char *hash, size_t hash_len, 448 const unsigned char *hash, size_t hash_len, 483 const unsigned char *hash, size_t hash_len, 515 const unsigned char *hash, size_t hash_len, 550 const unsigned char *hash, size_t hash_len,
|
/mcuboot-latest/ext/nrf/ |
D | cc310_glue.c | 56 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument 68 hash, in cc310_ecdsa_verify_secp256r1()
|
D | cc310_glue.h | 37 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
|
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/ |
D | ecdsa.h | 196 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 217 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, signature, uECC_secp256r1()); in bootutil_ecdsa_verify() 246 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify() 470 uint8_t *hash, size_t hlen, in bootutil_ecdsa_verify() argument 481 hash, hlen, reformatted_signature, 2*ctx->curve_byte_count); in bootutil_ecdsa_verify() 547 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 559 return mbedtls_ecdsa_read_signature(&ctx, hash, hash_len, sig, sig_len); in bootutil_ecdsa_verify() 566 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 572 (void)hash; in bootutil_ecdsa_verify() [all …]
|
D | rsa.h | 169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument 172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 508 let (hash,hash_size,tlv_kind) = if self.kinds.contains(&TlvKinds::SHA256) in make_tlv() 510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable 511 (hash,32,TlvKinds::SHA256) in make_tlv() 514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() localVariable 515 (hash,48,TlvKinds::SHA384) in make_tlv() 517 let hash = hash.as_ref(); in make_tlv() localVariable 519 assert!(hash.len() == hash_size); in make_tlv() 522 result.extend_from_slice(hash); in make_tlv() 543 let hash = if is_rsa2048 { in make_tlv() localVariable 548 let hash = hash.as_ref(); in make_tlv() localVariable [all …]
|
/mcuboot-latest/boot/boot_serial/src/ |
D | boot_serial.c | 173 const struct flash_area *fap, uint8_t *hash, uint32_t start_off); 176 const struct flash_area *fap, uint8_t *hash); 285 uint8_t hash[IMAGE_HASH_SIZE]; in bs_list() local 396 rc = boot_serial_get_hash(&hdr, fap, hash, start_off); in bs_list() 398 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_list() 469 zcbor_bstr_encode_ptr(cbor_state, hash, sizeof(hash)); in bs_list() 502 uint8_t hash[IMAGE_HASH_SIZE]; in bs_set() local 531 if ((img_hash.len != sizeof(hash) && img_hash.len != 0) || in bs_set() 620 rc = boot_serial_get_hash(&hdr, fap, hash, start_off); in bs_set() 622 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_set() [all …]
|
/mcuboot-latest/ |
D | .travis.yml-disabled | 46 ## Corrupt image hash is not tested as it is in the unprotected TLV section 47 ## and is easy to calculate a valid hash for a changed image
|
/mcuboot-latest/docs/ |
D | testplan-mynewt.md | 43 * `newtmgr image test <hash of slot 1>` 72 * `newtmgr image test <hash of slot 1>` 92 * `newtmgr image confirm <hash of slot 1>` 147 * `newtmgr image confirm <hash of slot 1>`
|
D | compression_format.md | 155 - `DECOMP_SHA (0x71)`: Contains the hash of the decompressed image. 156 - `DECOMP_SIGNATURE (0x72)`: Holds the signature of either the hash or 162 signature and hash algorithm used for securing the image is the same,
|
D | imgtool.md | 75 over an image rather than hash of that 82 --public-key-format [hash|full] 84 image manifest: full key or hash of the key. 186 key is stored for image authentication. The `hash` option is used by default, in 187 which case only the hash of the public key is added to the TLV area (the full
|
D | readme-riot.md | 31 hash and signing information. This is done through the imgtool.py
|
D | release-notes.md | 93 - imgtool: add 'getpubhash' command to dump the sha256 hash of the public key 492 - The public key is referred to by its SHA1 hash (or a prefix of the 493 hash), instead of an index that has to be maintained with the
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig.serial_recovery | 193 bool "Image list hash support" 196 If y, image list responses will include the image hash (adds ~100
|
D | Kconfig | 105 to address space or RAM area, enabling this option allows hash 117 prompt "Selected image hash algorithm" 151 signature is calculated over entire image instead of hash 159 bool "No signature; use only hash check" 213 To check signature over entire image directly, rather than hash, 223 hash of an image, as the BOOT_SIGNATURE_TYPE_ED25519 does by 300 and requires the hash of the public key to be provisioned to the device 637 the hash of the firmware image in a shared memory area. This data can
|
/mcuboot-latest/ptest/ |
D | Cargo.lock | 215 name = "linked-hash-map" 555 "linked-hash-map",
|
/mcuboot-latest/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 125 however that this will only be a problem if you intend to hash more than
|