/mcuboot-latest/sim/ |
D | Cargo.toml | 10 sig-rsa = ["mcuboot-sys/sig-rsa"] 11 sig-rsa3072 = ["mcuboot-sys/sig-rsa3072"] 12 sig-ecdsa = ["mcuboot-sys/sig-ecdsa"] 13 sig-ecdsa-mbedtls = ["mcuboot-sys/sig-ecdsa-mbedtls"] 14 sig-ecdsa-psa = ["mcuboot-sys/sig-ecdsa-psa", "mcuboot-sys/psa-crypto-api"] 15 sig-p384 = ["mcuboot-sys/sig-p384"] 16 sig-ed25519 = ["mcuboot-sys/sig-ed25519"]
|
D | README.rst | 44 $ cargo test --features sig-rsa
|
/mcuboot-latest/boot/bootutil/src/ |
D | image_ed25519.c | 80 uint8_t *sig, size_t slen, in bootutil_verify() argument 102 rc = ED25519_verify(buf, blen, sig, pubkey); in bootutil_verify() 123 uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 133 FIH_CALL(bootutil_verify, fih_rc, hash, IMAGE_HASH_SIZE, sig, in bootutil_verify_sig() 146 uint8_t *sig, size_t slen, in bootutil_verify_img() argument 151 FIH_CALL(bootutil_verify, fih_rc, img, size, sig, in bootutil_verify_img()
|
D | image_ecdsa.c | 40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig() 71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | image_rsa.c | 122 uint8_t *sig, size_t slen) in bootutil_cmp_rsasig() argument 142 if (bootutil_rsa_public(ctx, sig, em)) { in bootutil_cmp_rsasig() 243 uint8_t *sig, size_t slen) in bootutil_cmp_rsasig() argument 249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig() 262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument 281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
|
D | bootutil_priv.h | 289 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, 296 uint8_t *sig, size_t slen, uint8_t key_id);
|
/mcuboot-latest/ext/tinycrypt/tests/ |
D | test_ecc_dsa.c | 84 unsigned int sig[2 * NUM_ECC_WORDS]; in sign_vectors() local 140 uECC_vli_bytesToNative(sig, sig_bytes, NUM_ECC_BYTES); in sign_vectors() 141 uECC_vli_bytesToNative(sig + NUM_ECC_WORDS, sig_bytes+NUM_ECC_BYTES, NUM_ECC_BYTES); in sign_vectors() 143 result = check_ecc_result(i, "sig.r", exp_r, sig, NUM_ECC_WORDS, verbose); in sign_vectors() 147 result = check_ecc_result(i, "sig.s", exp_s, sig + NUM_ECC_WORDS, NUM_ECC_WORDS, verbose); in sign_vectors() 350 unsigned int sig[2 * NUM_ECC_WORDS]; in vrfy_vectors() local 367 string2scalar(sig, NUM_ECC_WORDS, r_vec[i]); in vrfy_vectors() 368 string2scalar(sig + NUM_ECC_WORDS, NUM_ECC_WORDS, s_vec[i]); in vrfy_vectors() 409 uECC_vli_nativeToBytes(sig_bytes, NUM_ECC_BYTES, sig); in vrfy_vectors() 411 sig + NUM_ECC_WORDS); in vrfy_vectors() [all …]
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | ecdsa.h | 110 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */ 310 unsigned char *sig, size_t sig_size, size_t *slen, 357 unsigned char *sig, size_t sig_size, size_t *slen, 391 const unsigned char *sig, size_t slen ); 426 const unsigned char *sig, size_t slen,
|
D | rsa.h | 814 unsigned char *sig ); 846 unsigned char *sig ); 898 unsigned char *sig ); 947 unsigned char *sig ); 979 const unsigned char *sig ); 1004 const unsigned char *sig ); 1039 const unsigned char *sig ); 1081 const unsigned char *sig );
|
D | pk.h | 236 const unsigned char *hash, unsigned char *sig ); 424 const unsigned char *sig, size_t sig_len ); 449 const unsigned char *sig, size_t sig_len, 484 const unsigned char *sig, size_t sig_len ); 516 unsigned char *sig, size_t sig_size, size_t *sig_len, 551 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/ |
D | ecdsa.h | 197 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument 206 rc = bootutil_decode_sig(signature, sig, sig + sig_len); in bootutil_ecdsa_verify() 247 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument 260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify() 337 static void parse_signature_from_rfc5480_encoding(const uint8_t *sig, in parse_signature_from_rfc5480_encoding() argument 351 size_t r_len = sig[3]; in parse_signature_from_rfc5480_encoding() 352 sig_ptr = &sig[4]; in parse_signature_from_rfc5480_encoding() 471 uint8_t *sig, size_t slen) in bootutil_ecdsa_verify() argument 478 parse_signature_from_rfc5480_encoding(sig, ctx->curve_byte_count,reformatted_signature); in bootutil_ecdsa_verify() 548 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument [all …]
|
D | rsa.h | 169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument 172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
|
/mcuboot-latest/sim/mcuboot-sys/ |
D | Cargo.toml | 15 # compile with both sig-rsa and sig-ecdsa enabled. 16 sig-rsa = [] 19 sig-rsa3072 = [] 22 sig-ecdsa = [] 25 sig-ecdsa-mbedtls = [] 28 sig-ecdsa-psa = [] 31 sig-p384 = [] 34 sig-ed25519 = []
|
/mcuboot-latest/scripts/imgtool/keys/ |
D | ecdsa.py | 208 sig = self.raw_sign(payload) 211 sig += b'\000' * (self.sig_len() - len(sig)) 212 return sig 214 return sig 283 sig = self.raw_sign(payload) 286 sig += b'\000' * (self.sig_len() - len(sig)) 287 return sig 289 return sig
|
D | ecdsa_test.py | 103 sig = k.raw_sign(buf) 108 signature=sig, 115 signature=sig,
|
D | ed25519_test.py | 107 sig = k.sign_digest(digest) 111 k.key.public_key().verify(signature=sig, data=digest) 119 signature=sig,
|
D | rsa_test.py | 116 sig = k.sign(buf) 121 signature=sig, 129 signature=sig,
|
/mcuboot-latest/docs/ |
D | ecdsa.md | 31 1. Add a `--no-pad-sig` argument to the sign command in 36 without any padding. The `--pad-sig` argument is also 45 the `--no-pad-sig` signature to be able to boot all generated 52 - `--no-pad-sig` will still be accepted but will have no effect. 54 - `--pad-sig` will now bring back the old padding behavior.
|
D | imgtool.md | 70 --sig-out filename Path to the file to which signature will be 77 --fix-sig-pubkey filename public key relevant to fixed signature 78 --fix-sig filename fixed signature for the image. It will be 95 --pad-sig Add 0-2 bytes of padding to ECDSA signature
|
D | readme-espressif.md | 294 imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 4 -v 0 -H 32 --pad-header -S 0x00… 533 imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 32 --max-align 32 -v 0 -H 32 --pa…
|
/mcuboot-latest/scripts/imgtool/ |
D | image.py | 648 sig = key.sign(bytes(self.payload)) 651 sig = key.sign_digest(message) 652 tlv.add(key.sig_tlv(), sig) 653 self.signature = sig
|
D | main.py | 95 def save_signature(sigfile, sig): argument 97 signature = base64.b64encode(sig)
|