Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 36) sorted by relevance

12

/hal_espressif-3.4.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
43 for (i = 0; i < key_size; ++i) { in rekey()
53 unsigned int key_size) in tc_hmac_set_key() argument
58 key_size == 0) { in tc_hmac_set_key()
65 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key()
76 key_size); in tc_hmac_set_key()
81 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
84 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
/hal_espressif-3.4.0/examples/protocols/mqtt/ssl_ds/
Dconfigure_ds.py99 key_size = private_key.key_size
100 if key_size not in supported_key_size[idf_target]:
102 .format(key_size, idf_target, str(supported_key_size[idf_target])))
107 rr = 1 << (key_size * 2)
111 length = key_size // 32 - 1
145 return c, iv, key_size
173 def generate_csv_file(c, iv, hmac_key_id, key_size, csv_file): argument
181 f.write('esp_ds_rsa_len,data,u16,%d\n' % (key_size))
384 …c, iv, key_size = calculate_ds_parameters(args.privkey, args.priv_key_pass, hmac_key_read, idf_tar…
387 generate_csv_file(c, iv, args.efuse_key_id, key_size, csv_filename)
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/smp/
Desp_app_sec.c52 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument
56 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk()
65 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
/hal_espressif-3.4.0/components/esp_hw_support/test/
Dgen_digital_signature_tests.py106 key_size = sizes[case % len(sizes)]
110 key_size=key_size,
118 rr = 1 << (key_size * 2)
122 length = key_size // 32 - 1
129 f.write(' .length = %d, // %d bit\n' % (length, key_size))
166 mask = (1 << key_size) - 1 # truncate messages if needed
/hal_espressif-3.4.0/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot.c119 size_t key_size = 256; in esp_secure_boot_generate_digest() local
121 key_size = 192; in esp_secure_boot_generate_digest()
123 bootloader_fill_random(key, key_size / 8); in esp_secure_boot_generate_digest()
124 esp_efuse_write_block(EFUSE_BLK_SECURE_BOOT, key, 0, key_size); in esp_secure_boot_generate_digest()
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/smp/include/
Desp_sec_api.h50 UINT8 key_size; member
75 void app_ble_sec_gen_ltk(UINT8 key_size);
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/gatt/
Dgatt_sr.c481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local
490 &key_size); in gatt_process_read_multi_req()
515 key_size)) in gatt_process_read_multi_req()
558 key_size, in gatt_process_read_multi_req()
1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local
1048 &key_size); in gatts_process_read_by_type_req()
1059 key_size, in gatts_process_read_by_type_req()
1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local
1139 &key_size); in gatts_process_write_req()
1148 key_size); in gatts_process_write_req()
[all …]
Dgatt_db.c122 UINT8 key_size) in gatts_check_attr_readability() argument
158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability()
214 UINT8 key_size) in read_attr_value() argument
228 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value()
336 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument
374 …s = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
927 UINT8 key_size, in gatts_read_attr_value_by_handle() argument
941 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
1020 UINT8 key_size) in gatts_read_attr_perm_check() argument
1032 sec_flag, key_size); in gatts_read_attr_perm_check()
[all …]
/hal_espressif-3.4.0/components/efuse/src/
Desp_efuse_api_key_esp32.c212 size_t key_size = 32; in esp_efuse_write_keys() local
215 key_size = 24; in esp_efuse_write_keys()
225 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
/hal_espressif-3.4.0/components/bootloader_support/src/flash_encryption/
Dflash_encrypt.c74 size_t key_size = 32; in check_and_generate_encryption_keys() local
86 key_size = 24; in check_and_generate_encryption_keys()
127 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/ble_hid_device_demo/main/
Dble_hidd_demo_main.c236 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
241 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
/hal_espressif-3.4.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Dhmac.h93 unsigned int key_size);
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c1242 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key()
1295 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key()
1309 p_rec->ble.keys.key_size, in btm_sec_save_le_key()
1662 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted()
1703 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
1705 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply()
2368 *p_le_key_size = p_dev_rec->ble.keys.key_size;
/hal_espressif-3.4.0/components/protocomm/src/simple_ble/
Dsimple_ble.c279 uint8_t key_size = 16; //the key size should be 7~16 bytes in simple_ble_start() local
285 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in simple_ble_start()
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/gatt/include/
Dgatt_int.h745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra…
747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i…
752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c1549 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1550 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1551 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler()
1555 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1556 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1557 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler()
1586 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1587 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1588 bta_dm_co_ble_set_appl_enc_key_size(key_size); in btc_gap_ble_call_handler()
/hal_espressif-3.4.0/examples/protocols/mqtt/ssl_psk/main/
Dapp_main.c51 .key_size = sizeof(s_key),
/hal_espressif-3.4.0/components/esp-tls/
Desp_tls_wolfssl.c202 …psk_hint_key->key == NULL || cfg->psk_hint_key->hint == NULL || cfg->psk_hint_key->key_size <= 0) { in set_client_config()
212 …if((cfg->psk_hint_key->key_size > PSK_MAX_KEY_LEN) || (strlen(cfg->psk_hint_key->hint) > PSK_MAX_I… in set_client_config()
216 psk_key_max_len = cfg->psk_hint_key->key_size; in set_client_config()
Desp_tls.h56 const size_t key_size; /*!< length of the key */ member
/hal_espressif-3.4.0/components/esptool_py/esptool/espsecure/
D__init__.py176 public_exponent=65537, key_size=3072, backend=default_backend()
235 if sk.key_size != 3072:
238 % sk.key_size
260 if vk.key_size != 3072:
263 % vk.key_size
307 rr = 1 << (public_key.key_size * 2)
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble_50/ble50_security_server/main/
Dble50_sec_gatts_demo.c511 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
521 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/gatt_security_server/main/
Dexample_ble_sec_gatts_demo.c557 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
567 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/gatt_security_client/main/
Dexample_ble_sec_gattc_demo.c576 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
582 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble_50/ble50_security_client/main/
Dble50_sec_gattc_demo.c615 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
621 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/ble_ancs/main/
Dble_ancs_demo.c667 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local
677 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()

12