/hal_espressif-3.4.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 43 for (i = 0; i < key_size; ++i) { in rekey() 53 unsigned int key_size) in tc_hmac_set_key() argument 58 key_size == 0) { in tc_hmac_set_key() 65 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key() 76 key_size); in tc_hmac_set_key() 81 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 84 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
|
/hal_espressif-3.4.0/examples/protocols/mqtt/ssl_ds/ |
D | configure_ds.py | 99 key_size = private_key.key_size 100 if key_size not in supported_key_size[idf_target]: 102 .format(key_size, idf_target, str(supported_key_size[idf_target]))) 107 rr = 1 << (key_size * 2) 111 length = key_size // 32 - 1 145 return c, iv, key_size 173 def generate_csv_file(c, iv, hmac_key_id, key_size, csv_file): argument 181 f.write('esp_ds_rsa_len,data,u16,%d\n' % (key_size)) 384 …c, iv, key_size = calculate_ds_parameters(args.privkey, args.priv_key_pass, hmac_key_read, idf_tar… 387 generate_csv_file(c, iv, args.efuse_key_id, key_size, csv_filename)
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/smp/ |
D | esp_app_sec.c | 52 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument 56 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk() 65 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
|
/hal_espressif-3.4.0/components/esp_hw_support/test/ |
D | gen_digital_signature_tests.py | 106 key_size = sizes[case % len(sizes)] 110 key_size=key_size, 118 rr = 1 << (key_size * 2) 122 length = key_size // 32 - 1 129 f.write(' .length = %d, // %d bit\n' % (length, key_size)) 166 mask = (1 << key_size) - 1 # truncate messages if needed
|
/hal_espressif-3.4.0/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot.c | 119 size_t key_size = 256; in esp_secure_boot_generate_digest() local 121 key_size = 192; in esp_secure_boot_generate_digest() 123 bootloader_fill_random(key, key_size / 8); in esp_secure_boot_generate_digest() 124 esp_efuse_write_block(EFUSE_BLK_SECURE_BOOT, key, 0, key_size); in esp_secure_boot_generate_digest()
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/smp/include/ |
D | esp_sec_api.h | 50 UINT8 key_size; member 75 void app_ble_sec_gen_ltk(UINT8 key_size);
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_sr.c | 481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local 490 &key_size); in gatt_process_read_multi_req() 515 key_size)) in gatt_process_read_multi_req() 558 key_size, in gatt_process_read_multi_req() 1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local 1048 &key_size); in gatts_process_read_by_type_req() 1059 key_size, in gatts_process_read_by_type_req() 1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 1139 &key_size); in gatts_process_write_req() 1148 key_size); in gatts_process_write_req() [all …]
|
D | gatt_db.c | 122 UINT8 key_size) in gatts_check_attr_readability() argument 158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 214 UINT8 key_size) in read_attr_value() argument 228 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value() 336 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument 374 …s = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 927 UINT8 key_size, in gatts_read_attr_value_by_handle() argument 941 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 1020 UINT8 key_size) in gatts_read_attr_perm_check() argument 1032 sec_flag, key_size); in gatts_read_attr_perm_check() [all …]
|
/hal_espressif-3.4.0/components/efuse/src/ |
D | esp_efuse_api_key_esp32.c | 212 size_t key_size = 32; in esp_efuse_write_keys() local 215 key_size = 24; in esp_efuse_write_keys() 225 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
|
/hal_espressif-3.4.0/components/bootloader_support/src/flash_encryption/ |
D | flash_encrypt.c | 74 size_t key_size = 32; in check_and_generate_encryption_keys() local 86 key_size = 24; in check_and_generate_encryption_keys() 127 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/ble_hid_device_demo/main/ |
D | ble_hidd_demo_main.c | 236 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 241 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|
/hal_espressif-3.4.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | hmac.h | 93 unsigned int key_size);
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 1242 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key() 1295 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key() 1309 p_rec->ble.keys.key_size, in btm_sec_save_le_key() 1662 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted() 1703 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply() 1705 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply() 2368 *p_le_key_size = p_dev_rec->ble.keys.key_size;
|
/hal_espressif-3.4.0/components/protocomm/src/simple_ble/ |
D | simple_ble.c | 279 uint8_t key_size = 16; //the key size should be 7~16 bytes in simple_ble_start() local 285 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in simple_ble_start()
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/stack/gatt/include/ |
D | gatt_int.h | 745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra… 747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i… 752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
|
/hal_espressif-3.4.0/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 1549 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1550 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1551 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler() 1555 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1556 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1557 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler() 1586 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1587 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1588 bta_dm_co_ble_set_appl_enc_key_size(key_size); in btc_gap_ble_call_handler()
|
/hal_espressif-3.4.0/examples/protocols/mqtt/ssl_psk/main/ |
D | app_main.c | 51 .key_size = sizeof(s_key),
|
/hal_espressif-3.4.0/components/esp-tls/ |
D | esp_tls_wolfssl.c | 202 …psk_hint_key->key == NULL || cfg->psk_hint_key->hint == NULL || cfg->psk_hint_key->key_size <= 0) { in set_client_config() 212 …if((cfg->psk_hint_key->key_size > PSK_MAX_KEY_LEN) || (strlen(cfg->psk_hint_key->hint) > PSK_MAX_I… in set_client_config() 216 psk_key_max_len = cfg->psk_hint_key->key_size; in set_client_config()
|
D | esp_tls.h | 56 const size_t key_size; /*!< length of the key */ member
|
/hal_espressif-3.4.0/components/esptool_py/esptool/espsecure/ |
D | __init__.py | 176 public_exponent=65537, key_size=3072, backend=default_backend() 235 if sk.key_size != 3072: 238 % sk.key_size 260 if vk.key_size != 3072: 263 % vk.key_size 307 rr = 1 << (public_key.key_size * 2)
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble_50/ble50_security_server/main/ |
D | ble50_sec_gatts_demo.c | 511 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 521 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/gatt_security_server/main/ |
D | example_ble_sec_gatts_demo.c | 557 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 567 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/gatt_security_client/main/ |
D | example_ble_sec_gattc_demo.c | 576 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 582 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble_50/ble50_security_client/main/ |
D | ble50_sec_gattc_demo.c | 615 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 621 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|
/hal_espressif-3.4.0/examples/bluetooth/bluedroid/ble/ble_ancs/main/ |
D | ble_ancs_demo.c | 667 uint8_t key_size = 16; //the key size should be 7~16 bytes in app_main() local 677 esp_ble_gap_set_security_param(ESP_BLE_SM_MAX_KEY_SIZE, &key_size, sizeof(uint8_t)); in app_main()
|