/Zephyr-Core-3.7.0/samples/boards/nrf/mesh/onoff_level_lighting_vnd_app/src/ |
D | storage.c | 119 int key_len; in ps_set() local 122 key_len = settings_name_next(key, &next); in ps_set() 125 if (!strncmp(key, "rc", key_len)) { in ps_set() 130 if (!strncmp(key, "gdtt", key_len)) { in ps_set() 134 if (!strncmp(key, "gpo", key_len)) { in ps_set() 139 if (!strncmp(key, "ld", key_len)) { in ps_set() 144 if (!strncmp(key, "td", key_len)) { in ps_set() 149 if (!strncmp(key, "dd", key_len)) { in ps_set() 154 if (!strncmp(key, "ll", key_len)) { in ps_set() 159 if (!strncmp(key, "llt", key_len)) { in ps_set() [all …]
|
/Zephyr-Core-3.7.0/subsys/net/lib/http/ |
D | http_server_ws.c | 44 size_t key_len; in handle_http1_to_websocket_upgrade() local 48 key_len = MIN(sizeof(key_accept) - 1, sizeof(client->ws_sec_key)); in handle_http1_to_websocket_upgrade() 49 strncpy(key_accept, client->ws_sec_key, key_len); in handle_http1_to_websocket_upgrade() 50 key_len = strlen(key_accept); in handle_http1_to_websocket_upgrade() 52 olen = MIN(sizeof(key_accept) - 1 - key_len, sizeof(WS_MAGIC) - 1); in handle_http1_to_websocket_upgrade() 53 strncpy(key_accept + key_len, WS_MAGIC, olen); in handle_http1_to_websocket_upgrade() 55 mbedtls_sha1(key_accept, olen + key_len, accept); in handle_http1_to_websocket_upgrade()
|
/Zephyr-Core-3.7.0/subsys/mgmt/mcumgr/util/src/ |
D | zcbor_bulk.c | 77 size_t key_len; in zcbor_map_decode_bulk_key_found() local 91 key_len = strlen(key); in zcbor_map_decode_bulk_key_found() 95 if (dptr->key.len == key_len && in zcbor_map_decode_bulk_key_found() 96 memcmp(key, dptr->key.value, key_len) == 0) { in zcbor_map_decode_bulk_key_found()
|
/Zephyr-Core-3.7.0/subsys/net/l2/ieee802154/ |
D | ieee802154_security.c | 26 uint8_t key_mode, uint8_t *key, uint8_t key_len) in ieee802154_security_setup_session() argument 38 (key_len > IEEE802154_KEY_MAX_LEN || !key || in ieee802154_security_setup_session() 61 memcpy(sec_ctx->key, key, key_len); in ieee802154_security_setup_session() 62 sec_ctx->key_len = key_len; in ieee802154_security_setup_session() 66 sec_ctx->enc.keylen = sec_ctx->key_len; in ieee802154_security_setup_session() 69 sec_ctx->dec.keylen = sec_ctx->key_len; in ieee802154_security_setup_session()
|
D | ieee802154_security.h | 19 uint8_t key_mode, uint8_t *key, uint8_t key_len);
|
D | ieee802154_mgmt.c | 914 params->key_len)) { in ieee802154_set_security_settings() 942 memcpy(params->key, ctx->sec_ctx.key, ctx->sec_ctx.key_len); in ieee802154_get_security_settings() 943 params->key_len = ctx->sec_ctx.key_len; in ieee802154_get_security_settings()
|
/Zephyr-Core-3.7.0/samples/tfm_integration/psa_crypto/src/ |
D | psa_crypto.c | 51 size_t *key_len) in crp_get_pub_key() argument 70 psa_export_public_key(key_handle, key, key_buf_size, key_len), in crp_get_pub_key() 78 sf_hex_tabulate_16(&crp_fmt, key, *key_len); in crp_get_pub_key() 120 size_t key_len = 32; in crp_imp_key_secp256r1() local 137 psa_import_key(&key_attributes, key_data, key_len, &key_handle), in crp_imp_key_secp256r1() 178 if (data_len != key_len) { in crp_imp_key_secp256r1() 184 comp_result = memcmp(data_out, key_data, key_len); in crp_imp_key_secp256r1() 232 size_t key_len = 32; in crp_gen_key_secp256r1() local 290 if (data_len != key_len) { in crp_gen_key_secp256r1()
|
/Zephyr-Core-3.7.0/drivers/crypto/ |
D | crypto_smartbond.c | 289 static int crypto_smartbond_cipher_key_load(uint8_t *key, uint16_t key_len) in crypto_smartbond_cipher_key_load() argument 297 if (key_len == 32) { in crypto_smartbond_cipher_key_load() 300 } else if (key_len == 24) { in crypto_smartbond_cipher_key_load() 303 } else if (key_len == 16) { in crypto_smartbond_cipher_key_load() 323 (void *)&AES_HASH->CRYPTO_KEYS_START, (uint32_t)key_len); in crypto_smartbond_cipher_key_load() 330 key_len -= 4; in crypto_smartbond_cipher_key_load() 331 } while (key_len); in crypto_smartbond_cipher_key_load()
|
/Zephyr-Core-3.7.0/subsys/net/lib/config/ |
D | ieee802154_settings.c | 31 .key_len = sizeof(CONFIG_NET_CONFIG_IEEE802154_SECURITY_KEY), in z_net_config_ieee802154_setup()
|
/Zephyr-Core-3.7.0/include/zephyr/net/ |
D | ieee802154.h | 213 uint8_t key_len; member
|
D | ieee802154_mgmt.h | 350 uint8_t key_len; /**< Key length of 16 bytes is mandatory for standards conformance */ member
|
/Zephyr-Core-3.7.0/subsys/bluetooth/mesh/ |
D | crypto_psa.c | 243 size_t key_len; in bt_mesh_pub_key_gen() local 265 sizeof(dh_pair.public_key_be), &key_len); in bt_mesh_pub_key_gen() 271 if (key_len != PUB_KEY_SIZE + 1) { in bt_mesh_pub_key_gen()
|
/Zephyr-Core-3.7.0/subsys/net/lib/websocket/ |
D | websocket.c | 243 int ret, fd, key_len; in websocket_connect() local 338 key_len = MIN(sizeof(key_accept) - 1, olen); in websocket_connect() 340 key_len); in websocket_connect() 342 olen = MIN(sizeof(key_accept) - 1 - key_len, sizeof(WS_MAGIC) - 1); in websocket_connect() 343 strncpy(key_accept + key_len, WS_MAGIC, olen); in websocket_connect() 346 mbedtls_sha1(key_accept, olen + key_len, sec_accept_key); in websocket_connect()
|
/Zephyr-Core-3.7.0/lib/utils/ |
D | json.c | 22 size_t key_len; member 335 kv->key_len = 0; in obj_next() 351 kv->key_len = (size_t)(tok.end - tok.start); in obj_next() 691 if (kv.key_len != descr[i].field_name_len) { in obj_parse()
|
/Zephyr-Core-3.7.0/tests/bsim/bluetooth/mesh/src/ |
D | test_provision.c | 444 size_t key_len; in generate_oob_key_pair() local 461 &key_len); in generate_oob_key_pair() 464 ASSERT_TRUE(key_len == PSA_KEY_EXPORT_ECC_PUBLIC_KEY_MAX_SIZE(256)); in generate_oob_key_pair() 466 status = psa_export_key(priv_key_id, private_key_be, sizeof(private_key_be), &key_len); in generate_oob_key_pair() 469 ASSERT_TRUE(key_len == sizeof(private_key_be)); in generate_oob_key_pair()
|
/Zephyr-Core-3.7.0/tests/net/ieee802154/l2/src/ |
D | ieee802154_test.c | 350 .key_len = 16U, in set_up_security()
|