Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 22 of 22) sorted by relevance

/mcuboot-latest/sim/
DCargo.toml10 sig-rsa = ["mcuboot-sys/sig-rsa"]
11 sig-rsa3072 = ["mcuboot-sys/sig-rsa3072"]
12 sig-ecdsa = ["mcuboot-sys/sig-ecdsa"]
13 sig-ecdsa-mbedtls = ["mcuboot-sys/sig-ecdsa-mbedtls"]
14 sig-ecdsa-psa = ["mcuboot-sys/sig-ecdsa-psa", "mcuboot-sys/psa-crypto-api"]
15 sig-p384 = ["mcuboot-sys/sig-p384"]
16 sig-ed25519 = ["mcuboot-sys/sig-ed25519"]
DREADME.rst44 $ cargo test --features sig-rsa
/mcuboot-latest/boot/bootutil/src/
Dimage_ed25519.c80 uint8_t *sig, size_t slen, in bootutil_verify() argument
102 rc = ED25519_verify(buf, blen, sig, pubkey); in bootutil_verify()
123 uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
133 FIH_CALL(bootutil_verify, fih_rc, hash, IMAGE_HASH_SIZE, sig, in bootutil_verify_sig()
146 uint8_t *sig, size_t slen, in bootutil_verify_img() argument
151 FIH_CALL(bootutil_verify, fih_rc, img, size, sig, in bootutil_verify_img()
Dimage_ecdsa.c40 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
58 rc = bootutil_ecdsa_verify(&ctx, pubkey, end-pubkey, hash, hlen, sig, slen); in bootutil_verify_sig()
71 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
83 rc = bootutil_ecdsa_verify(&ctx, NULL, 0, hash, hlen, sig, slen); in bootutil_verify_sig()
Dimage_rsa.c122 uint8_t *sig, size_t slen) in bootutil_cmp_rsasig() argument
142 if (bootutil_rsa_public(ctx, sig, em)) { in bootutil_cmp_rsasig()
243 uint8_t *sig, size_t slen) in bootutil_cmp_rsasig() argument
249 rc = bootutil_rsassa_pss_verify(ctx, hash, hlen, sig, slen); in bootutil_cmp_rsasig()
262 bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen, in bootutil_verify_sig() argument
281 FIH_CALL(bootutil_cmp_rsasig, fih_rc, &ctx, hash, hlen, sig, slen); in bootutil_verify_sig()
Dbootutil_priv.h289 fih_ret bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig,
296 uint8_t *sig, size_t slen, uint8_t key_id);
/mcuboot-latest/ext/tinycrypt/tests/
Dtest_ecc_dsa.c84 unsigned int sig[2 * NUM_ECC_WORDS]; in sign_vectors() local
140 uECC_vli_bytesToNative(sig, sig_bytes, NUM_ECC_BYTES); in sign_vectors()
141 uECC_vli_bytesToNative(sig + NUM_ECC_WORDS, sig_bytes+NUM_ECC_BYTES, NUM_ECC_BYTES); in sign_vectors()
143 result = check_ecc_result(i, "sig.r", exp_r, sig, NUM_ECC_WORDS, verbose); in sign_vectors()
147 result = check_ecc_result(i, "sig.s", exp_s, sig + NUM_ECC_WORDS, NUM_ECC_WORDS, verbose); in sign_vectors()
350 unsigned int sig[2 * NUM_ECC_WORDS]; in vrfy_vectors() local
367 string2scalar(sig, NUM_ECC_WORDS, r_vec[i]); in vrfy_vectors()
368 string2scalar(sig + NUM_ECC_WORDS, NUM_ECC_WORDS, s_vec[i]); in vrfy_vectors()
409 uECC_vli_nativeToBytes(sig_bytes, NUM_ECC_BYTES, sig); in vrfy_vectors()
411 sig + NUM_ECC_WORDS); in vrfy_vectors()
[all …]
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Decdsa.h110 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */
310 unsigned char *sig, size_t sig_size, size_t *slen,
357 unsigned char *sig, size_t sig_size, size_t *slen,
391 const unsigned char *sig, size_t slen );
426 const unsigned char *sig, size_t slen,
Drsa.h814 unsigned char *sig );
846 unsigned char *sig );
898 unsigned char *sig );
947 unsigned char *sig );
979 const unsigned char *sig );
1004 const unsigned char *sig );
1039 const unsigned char *sig );
1081 const unsigned char *sig );
Dpk.h236 const unsigned char *hash, unsigned char *sig );
424 const unsigned char *sig, size_t sig_len );
449 const unsigned char *sig, size_t sig_len,
484 const unsigned char *sig, size_t sig_len );
516 unsigned char *sig, size_t sig_size, size_t *sig_len,
551 unsigned char *sig, size_t sig_size, size_t *sig_len,
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Decdsa.h197 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument
206 rc = bootutil_decode_sig(signature, sig, sig + sig_len); in bootutil_ecdsa_verify()
247 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument
260 return cc310_ecdsa_verify_secp256r1(hash, pk, sig, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE); in bootutil_ecdsa_verify()
337 static void parse_signature_from_rfc5480_encoding(const uint8_t *sig, in parse_signature_from_rfc5480_encoding() argument
351 size_t r_len = sig[3]; in parse_signature_from_rfc5480_encoding()
352 sig_ptr = &sig[4]; in parse_signature_from_rfc5480_encoding()
471 uint8_t *sig, size_t slen) in bootutil_ecdsa_verify() argument
478 parse_signature_from_rfc5480_encoding(sig, ctx->curve_byte_count,reformatted_signature); in bootutil_ecdsa_verify()
548 uint8_t *sig, size_t sig_len) in bootutil_ecdsa_verify() argument
[all …]
Drsa.h169 uint8_t *hash, size_t hlen, uint8_t *sig, size_t slen) in bootutil_rsassa_pss_verify() argument
172 hash, hlen, sig, slen); in bootutil_rsassa_pss_verify()
/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml15 # compile with both sig-rsa and sig-ecdsa enabled.
16 sig-rsa = []
19 sig-rsa3072 = []
22 sig-ecdsa = []
25 sig-ecdsa-mbedtls = []
28 sig-ecdsa-psa = []
31 sig-p384 = []
34 sig-ed25519 = []
/mcuboot-latest/scripts/imgtool/keys/
Decdsa.py208 sig = self.raw_sign(payload)
211 sig += b'\000' * (self.sig_len() - len(sig))
212 return sig
214 return sig
283 sig = self.raw_sign(payload)
286 sig += b'\000' * (self.sig_len() - len(sig))
287 return sig
289 return sig
Decdsa_test.py103 sig = k.raw_sign(buf)
108 signature=sig,
115 signature=sig,
Ded25519_test.py107 sig = k.sign_digest(digest)
111 k.key.public_key().verify(signature=sig, data=digest)
119 signature=sig,
Drsa_test.py116 sig = k.sign(buf)
121 signature=sig,
129 signature=sig,
/mcuboot-latest/docs/
Decdsa.md31 1. Add a `--no-pad-sig` argument to the sign command in
36 without any padding. The `--pad-sig` argument is also
45 the `--no-pad-sig` signature to be able to boot all generated
52 - `--no-pad-sig` will still be accepted but will have no effect.
54 - `--pad-sig` will now bring back the old padding behavior.
Dimgtool.md70 --sig-out filename Path to the file to which signature will be
77 --fix-sig-pubkey filename public key relevant to fixed signature
78 --fix-sig filename fixed signature for the image. It will be
95 --pad-sig Add 0-2 bytes of padding to ECDSA signature
Dreadme-espressif.md294 imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 4 -v 0 -H 32 --pad-header -S 0x00…
533 imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 32 --max-align 32 -v 0 -H 32 --pa…
/mcuboot-latest/scripts/imgtool/
Dimage.py648 sig = key.sign(bytes(self.payload))
651 sig = key.sign_digest(message)
652 tlv.add(key.sig_tlv(), sig)
653 self.signature = sig
Dmain.py95 def save_signature(sigfile, sig): argument
97 signature = base64.b64encode(sig)