/hal_espressif-2.7.6/components/wpa_supplicant/src/common/ |
D | sae.c | 32 struct sae_temporary_data *tmp; in sae_set_group() local 35 tmp = sae->tmp = os_zalloc(sizeof(*tmp)); in sae_set_group() 36 if (tmp == NULL) in sae_set_group() 40 tmp->ec = crypto_ec_init(group); in sae_set_group() 41 if (tmp->ec) { in sae_set_group() 45 tmp->prime_len = crypto_ec_prime_len(tmp->ec); in sae_set_group() 46 tmp->prime = crypto_ec_get_prime(tmp->ec); in sae_set_group() 47 tmp->order = crypto_ec_get_order(tmp->ec); in sae_set_group() 52 tmp->dh = dh_groups_get(group); in sae_set_group() 53 if (tmp->dh) { in sae_set_group() [all …]
|
D | ieee802_11_common.c | 54 char *endptr, *tmp; in ieee802_11_parse_candidate_list() local 109 tmp = os_strchr(pos, ','); in ieee802_11_parse_candidate_list() 110 if (tmp && (!end || tmp < end)) { in ieee802_11_parse_candidate_list() 114 pos = tmp + 1; in ieee802_11_parse_candidate_list()
|
/hal_espressif-2.7.6/components/bt/host/bluedroid/external/sbc/encoder/srce/ |
D | sbc_dct.c | 209 SINT32 tmp[8]; in SBC_FastIDCT4() local 213 SBC_IDCT_MULT((SBC_COS_PI_SUR_4 >> 1), temp , tmp[0]); in SBC_FastIDCT4() 214 tmp[1] = x2 - tmp[0]; in SBC_FastIDCT4() 215 tmp[0] += x2; in SBC_FastIDCT4() 217 SBC_IDCT_MULT((SBC_COS_3PI_SUR_8 >> 1), temp , tmp[3]); in SBC_FastIDCT4() 218 SBC_IDCT_MULT((SBC_COS_PI_SUR_8 >> 1), temp , tmp[2]); in SBC_FastIDCT4() 220 SBC_IDCT_MULT((SBC_COS_3PI_SUR_8 >> 1), temp , tmp[5]); in SBC_FastIDCT4() 221 SBC_IDCT_MULT((SBC_COS_PI_SUR_8 >> 1), temp , tmp[4]); in SBC_FastIDCT4() 222 tmp[6] = tmp[2] + tmp[5]; in SBC_FastIDCT4() 223 tmp[7] = tmp[3] - tmp[4]; in SBC_FastIDCT4() [all …]
|
/hal_espressif-2.7.6/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | ecc.c | 225 uECC_word_t tmp[NUM_ECC_WORDS]; in uECC_vli_cmp() local 226 uECC_word_t neg = !!uECC_vli_sub(tmp, left, right, num_words); in uECC_vli_cmp() 227 uECC_word_t equal = uECC_vli_isZero(tmp, num_words); in uECC_vli_cmp() 324 uECC_word_t tmp[2 * NUM_ECC_WORDS]; in uECC_vli_mmod() local 325 uECC_word_t *v[2] = {tmp, product}; in uECC_vli_mmod() 523 unsigned int tmp[NUM_ECC_WORDS]; in vli_mmod_fast_secp256r1() local 530 tmp[0] = tmp[1] = tmp[2] = 0; in vli_mmod_fast_secp256r1() 531 tmp[3] = product[11]; in vli_mmod_fast_secp256r1() 532 tmp[4] = product[12]; in vli_mmod_fast_secp256r1() 533 tmp[5] = product[13]; in vli_mmod_fast_secp256r1() [all …]
|
D | ecc_dsa.c | 104 uECC_word_t tmp[NUM_ECC_WORDS]; in uECC_sign_with_k() local 106 uECC_word_t *k2[2] = {tmp, s}; in uECC_sign_with_k() 119 carry = regularize_k(k, tmp, s, curve); in uECC_sign_with_k() 128 uECC_vli_clear(tmp, num_n_words); in uECC_sign_with_k() 129 tmp[0] = 1; in uECC_sign_with_k() 130 } else if (!uECC_generate_random_int(tmp, curve->n, num_n_words)) { in uECC_sign_with_k() 136 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */ in uECC_sign_with_k() 138 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k() 143 uECC_vli_bytesToNative(tmp, private_key, BITS_TO_BYTES(curve->num_n_bits)); in uECC_sign_with_k() 147 uECC_vli_modMult(s, tmp, s, curve->n, num_n_words); /* s = r*d */ in uECC_sign_with_k() [all …]
|
D | ecc_dh.c | 152 uECC_word_t tmp[NUM_ECC_WORDS]; in uECC_shared_secret() local 153 uECC_word_t *p2[2] = {_private, tmp}; in uECC_shared_secret() 173 carry = regularize_k(_private, _private, tmp, curve); in uECC_shared_secret() 194 _set_secure(tmp, 0, sizeof(tmp)); in uECC_shared_secret()
|
/hal_espressif-2.7.6/components/wpa_supplicant/src/tls/ |
D | asn1.c | 17 u8 tmp; in asn1_get_next() local 35 tmp = *pos++; in asn1_get_next() 37 "0x%02x", tmp); in asn1_get_next() 38 hdr->tag = (hdr->tag << 7) | (tmp & 0x7f); in asn1_get_next() 39 } while (tmp & 0x80); in asn1_get_next() 43 tmp = *pos++; in asn1_get_next() 44 if (tmp & 0x80) { in asn1_get_next() 45 if (tmp == 0xff) { in asn1_get_next() 50 tmp &= 0x7f; /* number of subsequent octets */ in asn1_get_next() 52 if (tmp > 4) { in asn1_get_next() [all …]
|
D | rsa.c | 244 struct bignum *tmp, *a = NULL, *b = NULL; in crypto_rsa_exptmod() local 251 tmp = bignum_init(); in crypto_rsa_exptmod() 252 if (tmp == NULL) in crypto_rsa_exptmod() 255 if (bignum_set_unsigned_bin(tmp, in, inlen) < 0) in crypto_rsa_exptmod() 257 if (bignum_cmp(key->n, tmp) < 0) { in crypto_rsa_exptmod() 282 if (bignum_exptmod(tmp, key->dmp1, key->p, a) < 0) in crypto_rsa_exptmod() 286 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) in crypto_rsa_exptmod() 290 if (bignum_sub(a, b, tmp) < 0 || in crypto_rsa_exptmod() 291 bignum_mulmod(tmp, key->iqmp, key->p, tmp) < 0) in crypto_rsa_exptmod() 295 if (bignum_mul(tmp, key->q, tmp) < 0 || in crypto_rsa_exptmod() [all …]
|
/hal_espressif-2.7.6/examples/bluetooth/esp_ble_mesh/ble_mesh_console/main/ |
D | ble_mesh_console_lib.c | 100 uint8_t tmp = 0; in str_2_mac() local 116 tmp = tmp * 16 + src_p[loop] - '0'; in str_2_mac() 118 tmp = tmp * 16 + src_p[loop] - 'A' + 10; in str_2_mac() 120 tmp = tmp * 16 + src_p[loop] - 'a' + 10; in str_2_mac() 126 *dest++ = tmp; in str_2_mac() 127 tmp = 0; in str_2_mac()
|
/hal_espressif-2.7.6/examples/bluetooth/esp_ble_mesh/ble_mesh_coex_test/components/case/ |
D | test_env.c | 91 uint8_t tmp = 0; in coex_env_str_to_mac() local 110 tmp = tmp * 16 + src_p[loop] - '0'; in coex_env_str_to_mac() 112 tmp = tmp * 16 + src_p[loop] - 'A' + 10; in coex_env_str_to_mac() 114 tmp = tmp * 16 + src_p[loop] - 'a' + 10; in coex_env_str_to_mac() 121 *dest++ = tmp; in coex_env_str_to_mac() 122 tmp = 0; in coex_env_str_to_mac()
|
/hal_espressif-2.7.6/components/wpa_supplicant/src/crypto/ |
D | aes-siv.c | 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() local 75 os_memcpy(tmp, zero, sizeof(zero)); in aes_s2v() 76 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 77 data[0] = tmp; in aes_s2v() 78 data_len[0] = sizeof(tmp); in aes_s2v() 84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp); in aes_s2v() 94 dbl(tmp); in aes_s2v() 95 xor(tmp, tmp2); in aes_s2v() 102 xorend(buf, len[i], tmp, AES_BLOCK_SIZE); in aes_s2v() 109 dbl(tmp); in aes_s2v() [all …]
|
D | crypto_mbedtls-bignum.c | 199 mbedtls_mpi exp, tmp; in crypto_bignum_legendre() local 203 mbedtls_mpi_init(&tmp); in crypto_bignum_legendre() 208 …MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&tmp, (const mbedtls_mpi *) a, &exp, (const mbedtls_mpi *) p, … in crypto_bignum_legendre() 210 if (mbedtls_mpi_cmp_int(&tmp, 1) == 0) { in crypto_bignum_legendre() 212 } else if (mbedtls_mpi_cmp_int(&tmp, 0) == 0 in crypto_bignum_legendre() 217 || mbedtls_mpi_cmp_mpi(&tmp, (const mbedtls_mpi *)p) == 0) { in crypto_bignum_legendre() 224 mbedtls_mpi_free(&tmp); in crypto_bignum_legendre() 259 struct crypto_bignum *tmp = crypto_bignum_init(); in crypto_bignum_addmod() local 262 …if (mbedtls_mpi_add_mpi((mbedtls_mpi *) tmp, (const mbedtls_mpi *) b, (const mbedtls_mpi *) c) < 0) in crypto_bignum_addmod() 265 …if (mbedtls_mpi_mod_mpi( (mbedtls_mpi *) a, (const mbedtls_mpi *) tmp, (const mbedtls_mpi *) d) < … in crypto_bignum_addmod() [all …]
|
D | sha1-pbkdf2.c | 79 unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN]; in pbkdf2_sha1_f() local 102 tmp)) in pbkdf2_sha1_f() 104 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 107 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 110 os_memcpy(tmp, tmp2, SHA1_MAC_LEN); in pbkdf2_sha1_f()
|
D | aes-ccm.c | 122 u8 tmp[AES_BLOCK_SIZE]; in aes_ccm_encr_auth() local 127 aes_encrypt(aes, a, tmp); in aes_ccm_encr_auth() 129 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 137 u8 tmp[AES_BLOCK_SIZE]; in aes_ccm_decr_auth() local 142 aes_encrypt(aes, a, tmp); in aes_ccm_decr_auth() 144 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
|
/hal_espressif-2.7.6/components/mbedtls/port/aes/ |
D | esp_aes_xts.c | 194 unsigned char tmp[16]; in esp_aes_crypt_xts() local 227 tmp[i] = input[i] ^ tweak[i]; in esp_aes_crypt_xts() 230 ret = esp_aes_crypt_ecb( &ctx->crypt, mode, tmp, tmp ); in esp_aes_crypt_xts() 236 output[i] = tmp[i] ^ tweak[i]; in esp_aes_crypt_xts() 262 tmp[i] = input[i] ^ t[i]; in esp_aes_crypt_xts() 268 tmp[i] = prev_output[i] ^ t[i]; in esp_aes_crypt_xts() 271 ret = esp_aes_crypt_ecb( &ctx->crypt, mode, tmp, tmp ); in esp_aes_crypt_xts() 279 prev_output[i] = tmp[i] ^ t[i]; in esp_aes_crypt_xts()
|
/hal_espressif-2.7.6/tools/kconfig/ |
D | expr.c | 248 struct expr *tmp; in expr_eliminate_yn() local 264 tmp = e->right.expr; in expr_eliminate_yn() 266 free(tmp); in expr_eliminate_yn() 280 tmp = e->left.expr; in expr_eliminate_yn() 282 free(tmp); in expr_eliminate_yn() 293 tmp = e->right.expr; in expr_eliminate_yn() 295 free(tmp); in expr_eliminate_yn() 309 tmp = e->left.expr; in expr_eliminate_yn() 311 free(tmp); in expr_eliminate_yn() 363 struct expr *tmp; in expr_join_or() local [all …]
|
D | mconf.c | 323 struct subtitle_list *pos, *tmp; in set_subtitle() local 325 for (pos = subtitles; pos != NULL; pos = tmp) { in set_subtitle() 326 tmp = pos->next; in set_subtitle() 348 struct subtitle_list *pos, *tmp; in reset_subtitle() local 350 for (pos = subtitles; pos != NULL; pos = tmp) { in reset_subtitle() 351 tmp = pos->next; in reset_subtitle() 442 struct jump_key *pos, *tmp; in search_conf() local 457 list_for_each_entry_safe(pos, tmp, &head, entries) in search_conf() 471 int type, tmp, doint = 2; in build_conf() local 616 tmp = 2 + strlen(sym_get_string_value(sym)); /* () = 2 */ in build_conf() [all …]
|
/hal_espressif-2.7.6/components/nvs_flash/src/ |
D | nvs_item_hash_list.cpp | 27 auto tmp = it; in clear() local 29 mBlockList.erase(tmp); in clear() 30 delete static_cast<HashListBlock*>(tmp); in clear() 89 auto tmp = it; in erase() local 91 mBlockList.erase(tmp); in erase() 92 delete static_cast<HashListBlock*>(tmp); in erase()
|
/hal_espressif-2.7.6/tools/kconfig/lxdialog/ |
D | check-lxdialog.sh | 61 tmp=.lxdialog.tmp 62 trap "rm -f $tmp ${tmp%.tmp}.d" 0 1 2 3 15 66 $cc -x c - -o $tmp 2>/dev/null <<'EOF'
|
/hal_espressif-2.7.6/examples/bluetooth/esp_ble_mesh/aligenie_demo/main/ |
D | board.c | 183 float tmp = ((float) actual / UINT16_MAX); in convert_lightness_actual_to_linear() local 184 return bt_mesh_ceiling(UINT16_MAX * tmp * tmp); in convert_lightness_actual_to_linear() 194 float tmp = (temp - min) * UINT16_MAX / (max - min); in convert_temperature_to_level() local 195 return (int16_t) (tmp + INT16_MIN); in convert_temperature_to_level() 201 uint16_t tmp = (uint16_t) ((level - INT16_MIN) * diff); in covert_level_to_temperature() local 202 return (uint16_t) (min + tmp); in covert_level_to_temperature()
|
/hal_espressif-2.7.6/examples/bluetooth/esp_ble_mesh/aligenie_demo/components/vendor_model/ |
D | genie_timer.c | 133 int tmp; in convert_unix_to_utc() local 140 tmp = (leapyear ? 366 : 365); in convert_unix_to_utc() 143 if (jdn >= tmp) { in convert_unix_to_utc() 146 jdn -= tmp; in convert_unix_to_utc() 168 tmp = g_noleap_daysbeforemonth[value + 1]; in convert_unix_to_utc() 170 tmp++; in convert_unix_to_utc() 176 if (tmp > jdn) { in convert_unix_to_utc() 180 tmp = g_noleap_daysbeforemonth[value]; in convert_unix_to_utc() 182 tmp++; in convert_unix_to_utc() 185 if (tmp > jdn) { in convert_unix_to_utc() [all …]
|
/hal_espressif-2.7.6/examples/system/sysview_tracing/ |
D | gdbinit | 9 mon esp sysview start file:///tmp/sysview_example.svdat 11 # mon esp sysview start file:///tmp/sysview_example0.svdat file:///tmp/sysview_example1.svdat
|
/hal_espressif-2.7.6/components/bt/esp_ble_mesh/mesh_core/ |
D | crypto.c | 130 uint8_t tmp[16] = {0}; in bt_mesh_k3() local 134 err = bt_mesh_s1("smk3", tmp); in bt_mesh_k3() 139 err = bt_mesh_aes_cmac_one(tmp, n, 16, t); in bt_mesh_k3() 144 err = bt_mesh_aes_cmac_one(t, id64, sizeof(id64), tmp); in bt_mesh_k3() 149 memcpy(out, tmp + 8, 8); in bt_mesh_k3() 157 uint8_t tmp[16] = {0}; in bt_mesh_k4() local 161 err = bt_mesh_s1("smk4", tmp); in bt_mesh_k4() 166 err = bt_mesh_aes_cmac_one(tmp, n, 16, t); in bt_mesh_k4() 171 err = bt_mesh_aes_cmac_one(t, id6, sizeof(id6), tmp); in bt_mesh_k4() 176 out[0] = tmp[15] & BIT_MASK(6); in bt_mesh_k4() [all …]
|
/hal_espressif-2.7.6/examples/peripherals/secure_element/atecc608_ecdsa/main/ |
D | ecdsa_example_main.c | 88 uint8_t * tmp; in print_public_key() local 92 tmp = buf + sizeof(buf) - ATCA_PUB_KEY_SIZE - sizeof(public_key_x509_header); in print_public_key() 95 memcpy(tmp, public_key_x509_header, sizeof(public_key_x509_header)); in print_public_key() 98 memcpy(tmp + sizeof(public_key_x509_header), pubkey, ATCA_PUB_KEY_SIZE); in print_public_key() 101 …(void)atcab_base64encode(tmp, ATCA_PUB_KEY_SIZE + sizeof(public_key_x509_header), (char*)buf, &buf… in print_public_key()
|
/hal_espressif-2.7.6/components/wpa_supplicant/test/ |
D | test_dpp.c | 119 u8 *tmp; variable 142 tmp = auth; 143 tmp += 26; 149 TEST_ASSERT(memcmp(frame + 28, tmp + 26, len - 26) == 0);
|