Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 37) sorted by relevance

12

/mcuboot-latest/scripts/imgtool/keys/
Decdsa.py175 def verify(self, signature, payload): argument
177 signature = signature[:signature[1] + 2]
181 return k.verify(signature=signature, data=payload,
248 def verify(self, signature, payload): argument
250 signature = signature[:signature[1] + 2]
254 return k.verify(signature=signature, data=payload,
Ded25519.py64 def verify_digest(self, signature, digest): argument
69 return k.verify(signature=signature, data=digest)
Dx25519.py114 def verify_digest(self, signature, digest): argument
119 return k.verify(signature=signature, data=digest)
Drsa.py76 def verify(self, signature, payload): argument
80 return k.verify(signature=signature, data=payload,
Decdsa_test.py108 signature=sig,
115 signature=sig,
Ded25519_test.py111 k.key.public_key().verify(signature=sig, data=digest)
119 signature=sig,
Drsa_test.py121 signature=sig,
129 signature=sig,
/mcuboot-latest/docs/
Decdsa.md1 # ECDSA signature format
3 When the ECDSA SECP256R1 (EC256) signature support was added to MCUboot, a
7 TLS) are fairly strict about the formatting of the ECDSA signature.
20 that the length does not need to be known until the signature is
45 the `--no-pad-sig` signature to be able to boot all generated
59 The signature generation in the simulator can be changed at the same
66 ECDSA signatures are encoded as ASN.1, notably with the signature
80 signature will vary by a couple of bytes, depending on whether one or
83 Originally, MCUboot added padding to the entire signature and just
85 times, each time the last byte of the signature was non-zero, but if the
[all …]
Dreadme-riot.md11 not a signature check. In order to configure the bootloader for
12 signature check it is necessary to re-compile it either with Mynewt
Dreadme-espressif.md185 section [MCUboot image signature verification](#mcuboot-image-signature-verification) below.*
230 signature verification, the hardware-assisted Secure Boot and Flash Encryption were made available
233 ## [MCUboot image signature verification](#mcuboot-image-signature-verification)
303 bootloader signature checking by the ROM bootloader.
406 Secure boot uses a signature block appended to the bootloader image in order to verify the
407 authenticity. The signature block contains the RSA-3072 signature of that image and the RSA-3072
426 2. ROM bootloader verifies the bootloader's signature block integrity (magic number and CRC).
429 1. Compare the SHA-256 hash digest of the public key embedded in the bootloader’s signature
431 2. Generate the application image digest and match it with the image digest in the signature
433 3. Use the public key to verify the signature of the bootloader image, using RSA-PSS with the
[all …]
/mcuboot-latest/ext/nrf/
Dcc310_glue.c58 uint8_t *signature, in cc310_ecdsa_verify_secp256r1() argument
67 … (nrf_cc310_bl_ecc_signature_secp256r1_t *) signature, in cc310_ecdsa_verify_secp256r1()
Dcc310_glue.h39 uint8_t *signature,
/mcuboot-latest/ext/tinycrypt/lib/source/
Decc_dsa.c100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument
141 uECC_vli_nativeToBytes(signature, curve->num_bytes, p); /* store r */ in uECC_sign_with_k()
157 uECC_vli_nativeToBytes(signature + curve->num_bytes, curve->num_bytes, s); in uECC_sign_with_k()
162 unsigned hash_size, uint8_t *signature, uECC_Curve curve) in uECC_sign() argument
179 if (uECC_sign_with_k(private_key, message_hash, hash_size, k, signature, in uECC_sign()
193 unsigned hash_size, const uint8_t *signature, in uECC_verify() argument
222 uECC_vli_bytesToNative(r, signature, curve->num_bytes); in uECC_verify()
223 uECC_vli_bytesToNative(s, signature + curve->num_bytes, curve->num_bytes); in uECC_verify()
/mcuboot-latest/sim/src/
Dtlv.rs26 use ring::signature::{
564 let mut signature = vec![0; key_pair.public_modulus_len()]; in make_tlv() localVariable
566 assert_eq!(signature.len(), 256); in make_tlv()
568 assert_eq!(signature.len(), 384); in make_tlv()
570 key_pair.sign(&RSA_PSS_SHA256, &rng, &sig_payload, &mut signature).unwrap(); in make_tlv()
577 result.write_u16::<LittleEndian>(signature.len() as u16).unwrap(); in make_tlv()
578 result.extend_from_slice(&signature); in make_tlv()
583 let (signature, keyhash, keyhash_size) = if self.kinds.contains(&TlvKinds::SHA384) { in make_tlv()
606 let signature = signature.as_ref().to_vec(); in make_tlv() localVariable
607 result.write_u16::<LittleEndian>(signature.len() as u16).unwrap(); in make_tlv()
[all …]
/mcuboot-latest/ext/tinycrypt/lib/include/tinycrypt/
Decc_dsa.h114 unsigned int hash_size, uECC_word_t *k, uint8_t *signature,
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Decdsa.h157 static int bootutil_decode_sig(uint8_t signature[NUM_ECC_BYTES * 2], uint8_t *cp, uint8_t *end) in bootutil_decode_sig()
171 rc = bootutil_read_bigint(signature, &cp, end); in bootutil_decode_sig()
175 rc = bootutil_read_bigint(signature + NUM_ECC_BYTES, &cp, end); in bootutil_decode_sig()
205 uint8_t signature[2 * NUM_ECC_BYTES]; in bootutil_ecdsa_verify() local
206 rc = bootutil_decode_sig(signature, sig, sig + sig_len); in bootutil_ecdsa_verify()
217 rc = uECC_verify(pk, hash, BOOTUTIL_CRYPTO_ECDSA_P256_HASH_SIZE, signature, uECC_secp256r1()); in bootutil_ecdsa_verify()
/mcuboot-latest/boot/espressif/include/crypto_config/
Dec256.cmake16 message(FATAL_ERROR "EC256 signature verification using Mbed TLS lib is not supported")
Drsa.cmake27 message(FATAL_ERROR "RSA signature verification using Tinycrypt lib is not supported")
/mcuboot-latest/boot/bootutil/src/
Dimage_ed25519.c26 const uint8_t signature[64],
/mcuboot-latest/boot/espressif/hal/src/
Dsecure_boot.c113 …bool verified = ets_rsa_pss_verify(&block->key, block->signature, image_digest, temp_verified_dige… in s_calculate_image_public_key_digests()
115 …bool verified = ets_ecdsa_verify(&block->ecdsa.key.point[0], block->ecdsa.signature, block->ecdsa.… in s_calculate_image_public_key_digests()
/mcuboot-latest/scripts/imgtool/
Dmain.py91 signature = base64.b64decode(f.read())
92 return signature
97 signature = base64.b64encode(sig)
98 f.write(signature)
Dimage.py258 self.signature = None
627 self.signature = sig
630 self.signature = fixed_sig['value']
681 return self.signature
/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml11 # By default, build with simplistic signature verification.
/mcuboot-latest/ci/fih_test_docker/
Ddamage_image.py180 if is_valid_signature(tlv) and args.signature:
/mcuboot-latest/ext/fiat/src/
Dcurve25519.c1053 const uint8_t signature[64], const uint8_t public_key[32]) { in ED25519_verify()
1055 if ((signature[63] & 224) != 0 || in ED25519_verify()
1069 memcpy(rcopy, signature, 32); in ED25519_verify()
1074 memcpy(&scopy.u8[0], signature + 32, 32); in ED25519_verify()
1106 ret = mbedtls_sha512_update_ret(&ctx, signature, 32); in ED25519_verify()
1126 rc = tc_sha512_update(&s, signature, 32); in ED25519_verify()

12