/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_ecc_dsa.c | 76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument 118 tc_sha256_init(hash); in sign_vectors() 119 tc_sha256_update(hash, msg, msglen); in sign_vectors() 120 tc_sha256_final(digest_bytes, hash); in sign_vectors() 343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument 385 tc_sha256_init(hash); in vrfy_vectors() 386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors() 387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors() 597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local 610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify() [all …]
|
/mcuboot-latest/boot/bootutil/src/ |
D | image_rsa.c | 87 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument 97 bootutil_sha_update(&ctx, hash, PSS_HLEN); in pss_mgf1() 121 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument 226 bootutil_sha_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig() 242 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument 249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig() 262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_validate.c | 235 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local 245 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key() 246 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key() 260 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local 268 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key() 282 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key() 410 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_img_validate() local 420 tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate() 426 memcpy(out_hash, hash, IMAGE_HASH_SIZE); in bootutil_img_validate() 474 if (len != sizeof(hash)) { in bootutil_img_validate() [all …]
|
D | image_ecdsa.c | 40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig() 71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_ed25519.c | 69 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 91 rc = ED25519_verify(hash, IMAGE_HASH_SIZE, sig, pubkey); in bootutil_verify_sig()
|
D | bootutil_priv.h | 268 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | rsa.h | 813 const unsigned char *hash, 845 const unsigned char *hash, 896 const unsigned char *hash, 946 const unsigned char *hash, 978 const unsigned char *hash, 1003 const unsigned char *hash, 1038 const unsigned char *hash, 1078 const unsigned char *hash,
|
D | ecdsa.h | 309 const unsigned char *hash, size_t hlen, 356 const unsigned char *hash, size_t hlen, 390 const unsigned char *hash, size_t hlen, 425 const unsigned char *hash, size_t hlen,
|
D | pk.h | 236 const unsigned char *hash, unsigned char *sig ); 423 const unsigned char *hash, size_t hash_len, 448 const unsigned char *hash, size_t hash_len, 483 const unsigned char *hash, size_t hash_len, 515 const unsigned char *hash, size_t hash_len, 550 const unsigned char *hash, size_t hash_len,
|
/mcuboot-latest/ext/nrf/ |
D | cc310_glue.c | 56 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument 68 hash, in cc310_ecdsa_verify_secp256r1()
|
D | cc310_glue.h | 37 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
|
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/ |
D | ecdsa.h | 196 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 217 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, signature, uECC_secp256r1()); in bootutil_ecdsa_verify() 246 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify() 470 uint8_t *hash, size_t hlen, in bootutil_ecdsa_verify() argument 481 hash, hlen, reformatted_signature, 2*ctx->curve_byte_count); in bootutil_ecdsa_verify() 547 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 559 return mbedtls_ecdsa_read_signature(&ctx, hash, hash_len, sig, sig_len); in bootutil_ecdsa_verify() 566 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument 572 (void)hash; in bootutil_ecdsa_verify() [all …]
|
D | rsa.h | 169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument 172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
|
/mcuboot-latest/sim/src/ |
D | tlv.rs | 508 let (hash,hash_size,tlv_kind) = if self.kinds.contains(&TlvKinds::SHA256) in make_tlv() 510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable 511 (hash,32,TlvKinds::SHA256) in make_tlv() 514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() localVariable 515 (hash,48,TlvKinds::SHA384) in make_tlv() 517 let hash = hash.as_ref(); in make_tlv() localVariable 519 assert!(hash.len() == hash_size); in make_tlv() 522 result.extend_from_slice(hash); in make_tlv() 543 let hash = if is_rsa2048 { in make_tlv() localVariable 548 let hash = hash.as_ref(); in make_tlv() localVariable [all …]
|
/mcuboot-latest/boot/boot_serial/src/ |
D | boot_serial.c | 158 const struct flash_area *fap, uint8_t *hash); 266 uint8_t hash[32]; in bs_list() local 340 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_list() 410 zcbor_bstr_encode_ptr(cbor_state, hash, sizeof(hash)); in bs_list() 443 uint8_t hash[32]; in bs_set() local 472 if ((img_hash.len != sizeof(hash) && img_hash.len != 0) || in bs_set() 527 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_set() 530 if (rc == 0 && memcmp(hash, img_hash.value, sizeof(hash)) == 0) { in bs_set() 1445 const struct flash_area *fap, uint8_t *hash) in boot_serial_get_hash() argument 1476 rc = flash_area_read(fap, offset, hash, len); in boot_serial_get_hash()
|
/mcuboot-latest/ |
D | .travis.yml-disabled | 46 ## Corrupt image hash is not tested as it is in the unprotected TLV section 47 ## and is easy to calculate a valid hash for a changed image
|
/mcuboot-latest/docs/ |
D | testplan-mynewt.md | 43 * `newtmgr image test <hash of slot 1>` 72 * `newtmgr image test <hash of slot 1>` 92 * `newtmgr image confirm <hash of slot 1>` 147 * `newtmgr image confirm <hash of slot 1>`
|
D | imgtool.md | 63 --public-key-format [hash|full] 130 key is stored for image authentication. The `hash` option is used by default, in 131 which case only the hash of the public key is added to the TLV area (the full
|
D | readme-riot.md | 31 hash and signing information. This is done through the imgtool.py
|
D | release-notes.md | 93 - imgtool: add 'getpubhash' command to dump the sha256 hash of the public key 492 - The public key is referred to by its SHA1 hash (or a prefix of the 493 hash), instead of an index that has to be maintained with the
|
D | readme-espressif.md | 416 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse. 429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig.serial_recovery | 193 bool "Image list hash support" 196 If y, image list responses will include the image hash (adds ~100
|
D | Kconfig | 92 prompt "Selected image hash algorithm" 126 bool "No signature; use only hash check" 231 and requires the hash of the public key to be provisioned to the device 529 the hash of the firmware image in a shared memory area. This data can
|
/mcuboot-latest/ptest/ |
D | Cargo.lock | 215 name = "linked-hash-map" 555 "linked-hash-map",
|
/mcuboot-latest/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 125 however that this will only be a problem if you intend to hash more than
|