Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 9 of 9) sorted by relevance

/mcuboot-latest/sim/mcuboot-sys/
DCargo.toml14 # Verify RSA signatures. Note that at this time, the C code will not
18 # Verify RSA-3072 signatures.
21 # Verify ECDSA (secp256r1) signatures.
24 # Verify ECDSA (secp256r1) signatures using mbed TLS
27 # Verify ECDSA (p256 or p384) signatures using PSA Crypto API
33 # Verify ED25519 signatures.
/mcuboot-latest/docs/
Decdsa.md4 shortcut was taken, and these signatures were padded to make them
15 signatures. The EC code would work reliably only in the new
39 2. MCUboot will be modified to allow unpadded signatures right away.
42 to accept padded and unpadded signatures.
60 time the boot code begins to accept unpadded signatures. The simulator is
66 ECDSA signatures are encoded as ASN.1, notably with the signature
89 The correct approach here is to accept that ECDSA signatures are of
Drelease-notes.md13 (available with the PSA Crypto API based crypto backend for ECDSA signatures).
486 information about signatures out of the header and into the TLV
489 - Multiple signatures to be applied. This can be used, for example,
495 - Allow new types of signatures in the future.
496 - Support for PKCS#1 v1.5 signatures has been dropped. All RSA
497 signatures should be made with PSS. The tools have been changed to
510 - The simulator is now able to test RSA signatures.
DPORTING.md193 If your system already provides functions with compatible signatures, those can
Dreadme-zephyr.md108 repository. See below on how to make your own signatures.
/mcuboot-latest/boot/espressif/hal/src/
Dsecure_boot.c84 …const ets_secure_boot_signature_t *signatures = bootloader_mmap(sig_block_addr, sizeof(ets_secure_… in s_calculate_image_public_key_digests() local
85 if (signatures == NULL) { in s_calculate_image_public_key_digests()
92 const ets_secure_boot_sig_block_t *block = &signatures->block[i]; in s_calculate_image_public_key_digests()
137 bootloader_munmap(signatures); in s_calculate_image_public_key_digests()
/mcuboot-latest/sim/
DREADME.rst42 testing RSA signatures can be done with::
/mcuboot-latest/boot/zephyr/
DCMakeLists.txt156 # When using ECDSA signatures, pull in our copy of the tinycrypt library.
192 # Use mbedTLS provided by Zephyr for RSA signatures. (Its config file
DKconfig131 bool "RSA signatures"
145 bool "Elliptic curve digital signatures with curve P-256"
169 bool "Edwards curve digital signatures using ed25519"