Home
last modified time | relevance | path

Searched refs:hash (Results 1 – 25 of 25) sorted by relevance

/mcuboot-latest/ext/tinycrypt/tests/
Dtest_ecc_dsa.c76 int sign_vectors(TCSha256State_t hash, char **d_vec, char **k_vec, in sign_vectors() argument
118 tc_sha256_init(hash); in sign_vectors()
119 tc_sha256_update(hash, msg, msglen); in sign_vectors()
120 tc_sha256_final(digest_bytes, hash); in sign_vectors()
343 int vrfy_vectors(TCSha256State_t hash, char **msg_vec, char **qx_vec, char **qy_vec, in vrfy_vectors() argument
385 tc_sha256_init(hash); in vrfy_vectors()
386 tc_sha256_update(hash, msg, msglen); in vrfy_vectors()
387 tc_sha256_final(digest_bytes, hash); in vrfy_vectors()
597 uint8_t hash[NUM_ECC_BYTES]; in montecarlo_signverify() local
610 uECC_vli_nativeToBytes(hash, NUM_ECC_BYTES, hash_words); in montecarlo_signverify()
[all …]
/mcuboot-latest/boot/bootutil/src/
Dimage_rsa.c87 pss_mgf1(uint8_t *mask, const uint8_t *hash) in pss_mgf1() argument
97 bootutil_sha_update(&ctx, hash, PSS_HLEN); in pss_mgf1()
121 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument
226 bootutil_sha_update(&shactx, hash, PSS_HLEN); in bootutil_cmp_rsasig()
242 bootutil_cmp_rsasig(bootutil_rsa_context *ctx, uint8_t *hash, uint32_t hlen, in bootutil_cmp_rsasig() argument
249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig()
262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_validate.c235 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local
245 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key()
246 if (!memcmp(hash, keyhash, keyhash_len)) { in bootutil_find_key()
260 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_find_key() local
268 bootutil_sha_finish(&sha_ctx, hash); in bootutil_find_key()
282 FIH_CALL(boot_fih_memequal, fih_rc, hash, key_hash, key_hash_size); in bootutil_find_key()
410 uint8_t hash[IMAGE_HASH_SIZE]; in bootutil_img_validate() local
420 tmp_buf_sz, hash, seed, seed_len); in bootutil_img_validate()
426 memcpy(out_hash, hash, IMAGE_HASH_SIZE); in bootutil_img_validate()
474 if (len != sizeof(hash)) { in bootutil_img_validate()
[all …]
Dimage_ecdsa.c40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig()
71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_ed25519.c69 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
91 rc = ED25519_verify(hash, IMAGE_HASH_SIZE, sig, pubkey); in bootutil_verify_sig()
Dbootutil_priv.h268 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Drsa.h813 const unsigned char *hash,
845 const unsigned char *hash,
896 const unsigned char *hash,
946 const unsigned char *hash,
978 const unsigned char *hash,
1003 const unsigned char *hash,
1038 const unsigned char *hash,
1078 const unsigned char *hash,
Decdsa.h309 const unsigned char *hash, size_t hlen,
356 const unsigned char *hash, size_t hlen,
390 const unsigned char *hash, size_t hlen,
425 const unsigned char *hash, size_t hlen,
Dpk.h236 const unsigned char *hash, unsigned char *sig );
423 const unsigned char *hash, size_t hash_len,
448 const unsigned char *hash, size_t hash_len,
483 const unsigned char *hash, size_t hash_len,
515 const unsigned char *hash, size_t hash_len,
550 const unsigned char *hash, size_t hash_len,
/mcuboot-latest/ext/nrf/
Dcc310_glue.c56 int cc310_ecdsa_verify_secp256r1(uint8_t *hash, in cc310_ecdsa_verify_secp256r1() argument
68 hash, in cc310_ecdsa_verify_secp256r1()
Dcc310_glue.h37 int cc310_ecdsa_verify_secp256r1(uint8_t *hash,
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Decdsa.h196 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
217 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, signature, uECC_secp256r1()); in bootutil_ecdsa_verify()
246 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify()
470 uint8_t *hash, size_t hlen, in bootutil_ecdsa_verify() argument
481 hash, hlen, reformatted_signature, 2*ctx->curve_byte_count); in bootutil_ecdsa_verify()
547 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
559 return mbedtls_ecdsa_read_signature(&ctx, hash, hash_len, sig, sig_len); in bootutil_ecdsa_verify()
566 uint8_t *hash, size_t hash_len, in bootutil_ecdsa_verify() argument
572 (void)hash; in bootutil_ecdsa_verify()
[all …]
Drsa.h169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument
172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
/mcuboot-latest/sim/src/
Dtlv.rs508 let (hash,hash_size,tlv_kind) = if self.kinds.contains(&TlvKinds::SHA256) in make_tlv()
510 let hash = digest::digest(&digest::SHA256, &sig_payload); in make_tlv() localVariable
511 (hash,32,TlvKinds::SHA256) in make_tlv()
514 let hash = digest::digest(&digest::SHA384, &sig_payload); in make_tlv() localVariable
515 (hash,48,TlvKinds::SHA384) in make_tlv()
517 let hash = hash.as_ref(); in make_tlv() localVariable
519 assert!(hash.len() == hash_size); in make_tlv()
522 result.extend_from_slice(hash); in make_tlv()
543 let hash = if is_rsa2048 { in make_tlv() localVariable
548 let hash = hash.as_ref(); in make_tlv() localVariable
[all …]
/mcuboot-latest/boot/boot_serial/src/
Dboot_serial.c158 const struct flash_area *fap, uint8_t *hash);
266 uint8_t hash[32]; in bs_list() local
340 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_list()
410 zcbor_bstr_encode_ptr(cbor_state, hash, sizeof(hash)); in bs_list()
443 uint8_t hash[32]; in bs_set() local
472 if ((img_hash.len != sizeof(hash) && img_hash.len != 0) || in bs_set()
527 rc = boot_serial_get_hash(&hdr, fap, hash); in bs_set()
530 if (rc == 0 && memcmp(hash, img_hash.value, sizeof(hash)) == 0) { in bs_set()
1445 const struct flash_area *fap, uint8_t *hash) in boot_serial_get_hash() argument
1476 rc = flash_area_read(fap, offset, hash, len); in boot_serial_get_hash()
/mcuboot-latest/
D.travis.yml-disabled46 ## Corrupt image hash is not tested as it is in the unprotected TLV section
47 ## and is easy to calculate a valid hash for a changed image
/mcuboot-latest/docs/
Dtestplan-mynewt.md43 * `newtmgr image test <hash of slot 1>`
72 * `newtmgr image test <hash of slot 1>`
92 * `newtmgr image confirm <hash of slot 1>`
147 * `newtmgr image confirm <hash of slot 1>`
Dimgtool.md63 --public-key-format [hash|full]
130 key is stored for image authentication. The `hash` option is used by default, in
131 which case only the hash of the public key is added to the TLV area (the full
Dreadme-riot.md31 hash and signing information. This is done through the imgtool.py
Drelease-notes.md93 - imgtool: add 'getpubhash' command to dump the sha256 hash of the public key
492 - The public key is referred to by its SHA1 hash (or a prefix of the
493 hash), instead of an index that has to be maintained with the
Dreadme-espressif.md416 2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse.
429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature
/mcuboot-latest/boot/zephyr/
DKconfig.serial_recovery193 bool "Image list hash support"
196 If y, image list responses will include the image hash (adds ~100
DKconfig92 prompt "Selected image hash algorithm"
126 bool "No signature; use only hash check"
231 and requires the hash of the public key to be provisioned to the device
529 the hash of the firmware image in a shared memory area. This data can
/mcuboot-latest/ptest/
DCargo.lock215 name = "linked-hash-map"
555 "linked-hash-map",
/mcuboot-latest/ext/tinycrypt/documentation/
Dtinycrypt.rst125 however that this will only be a problem if you intend to hash more than