/hal_espressif-3.5.0/tools/kconfig/ |
D | confdata.c | 128 char *p2; in conf_set_sym_val() local 155 for (p2 = p; *p2 && !isspace(*p2); p2++) in conf_set_sym_val() 164 for (p2 = p; (p2 = strpbrk(p2, "\"\\")); p2++) { in conf_set_sym_val() 165 if (*p2 == '"') { in conf_set_sym_val() 166 *p2 = 0; in conf_set_sym_val() 169 memmove(p2, p2 + 1, strlen(p2)); in conf_set_sym_val() 171 if (!p2) { in conf_set_sym_val() 256 char *p, *p2; in conf_read_simple() local 354 p2 = strchr(p, '\n'); in conf_read_simple() 355 if (p2) { in conf_read_simple() [all …]
|
/hal_espressif-3.5.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | ecc_dh.c | 153 uECC_word_t *p2[2] = {_private, tmp}; in uECC_shared_secret() local 178 if (!uECC_generate_random_int(p2[carry], curve->p, num_words)) { in uECC_shared_secret() 182 initial_Z = p2[carry]; in uECC_shared_secret() 185 EccPoint_mult(_public, _public, p2[!carry], initial_Z, curve->num_n_bits + 1, in uECC_shared_secret() 193 _set_secure(p2, 0, sizeof(p2)); in uECC_shared_secret()
|
D | ecc.c | 797 uECC_word_t *p2[2] = {tmp1, tmp2}; in EccPoint_compute_public_key() local 804 EccPoint_mult(result, curve->G, p2[!carry], 0, curve->num_n_bits + 1, curve); in EccPoint_compute_public_key()
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/bta/hf_client/ |
D | bta_hf_client_at.c | 1220 char *p1, *p2; in bta_hf_client_dump_at() local 1223 p2 = dump; in bta_hf_client_dump_at() 1227 strlcpy(p2, "<cr>", 4); in bta_hf_client_dump_at() 1228 p2 += 4; in bta_hf_client_dump_at() 1230 strlcpy(p2, "<lf>", 4); in bta_hf_client_dump_at() 1231 p2 += 4; in bta_hf_client_dump_at() 1233 *p2 = *p1; in bta_hf_client_dump_at() 1234 p2++; in bta_hf_client_dump_at() 1239 *p2 = '\0'; in bta_hf_client_dump_at()
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/stack/smp/ |
D | smp_keys.c | 581 void smp_gen_p2_4_confirm( tSMP_CB *p_cb, BT_OCTET16 p2) in smp_gen_p2_4_confirm() argument 583 UINT8 *p = (UINT8 *)p2; in smp_gen_p2_4_confirm() 609 smp_debug_print_nbyte_little_endian(p2, (const UINT8 *)"p2", 16); in smp_gen_p2_4_confirm() 660 BT_OCTET16 p2; in smp_calculate_comfirm_cont() local 670 smp_gen_p2_4_confirm(p_cb, p2); in smp_calculate_comfirm_cont() 673 smp_xor_128(p2, p->param_buf); in smp_calculate_comfirm_cont() 674 smp_debug_print_nbyte_little_endian ((UINT8 *)p2, (const UINT8 *)"p2' = C1 xor p2", 16); in smp_calculate_comfirm_cont() 677 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm_cont() 2020 UINT8 *p2; in smp_calculate_long_term_key_from_link_key() local 2022 p2 = p_dev_rec->link_key; in smp_calculate_long_term_key_from_link_key() [all …]
|
D | aes.c | 237 uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; in gf_inv() local 247 p2 ^= (p1 * n2) & 0xff; /* and remove from larger one */ in gf_inv() 249 n2 = hibit(p2); /* add into result */ in gf_inv() 258 p1 ^= p2 * n1; in gf_inv()
|
/hal_espressif-3.5.0/components/bootloader/subproject/components/micro-ecc/micro-ecc/ |
D | uECC.c | 920 uECC_word_t *p2[2] = {tmp1, tmp2}; in EccPoint_compute_public_key() local 927 EccPoint_mult(result, curve->G, p2[!carry], 0, curve->num_n_bits + 1, curve); in EccPoint_compute_public_key() 1042 uECC_word_t *p2[2] = {_private, tmp}; in uECC_shared_secret() local 1064 if (!uECC_generate_random_int(p2[carry], curve->p, num_words)) { in uECC_shared_secret() 1067 initial_Z = p2[carry]; in uECC_shared_secret() 1070 EccPoint_mult(_public, _public, p2[!carry], initial_Z, curve->num_n_bits + 1, curve); in uECC_shared_secret() 1628 uECC_word_t *p2[2] = {tmp1, tmp2}; in uECC_point_mult() local 1631 EccPoint_mult(result, point, p2[!carry], 0, curve->num_n_bits + 1, curve); in uECC_point_mult()
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/bta/hh/ |
D | bta_hh_le.c | 1377 UINT8 *p2; in bta_hh_gatt_open() local 1385 p2 = p_data->remote_bda; in bta_hh_gatt_open() 1388 ((p2[0]) << 24) + ((p2[1]) << 16) + ((p2[2]) << 8) + (p2[3]), in bta_hh_gatt_open() 1389 ((p2[4]) << 8) + p2[5], p_data->status); in bta_hh_gatt_open()
|
/hal_espressif-3.5.0/components/nvs_flash/test_nvs_host/ |
D | test_nvs.cpp | 2327 Page p2; variable 2328 p2.load(&part, 0); 2331 TEST_ESP_ERR(p2.findItem(1, ItemType::BLOB, "dummyHex2BinKey"), ESP_ERR_NVS_TYPE_MISMATCH); 2334 TEST_ESP_OK(p2.findItem(1, ItemType::BLOB_IDX, "dummyHex2BinKey")); 2490 Page p2; variable 2491 p2.load(&f.part, 0); 2492 TEST_ESP_ERR(p2.findItem(1, ItemType::BLOB, "singlepage"), ESP_ERR_NVS_TYPE_MISMATCH); 2533 Page p2; variable 2534 p2.load(&f.part, 1); 2535 p2.setSeqNumber(1); [all …]
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/bta/dm/ |
D | bta_dm_act.c | 6358 UINT8 *p2; in bta_dm_proc_open_evt() local 6361 p2 = p_data->remote_bda; in bta_dm_proc_open_evt() 6367 ((p2[0]) << 24) + ((p2[1]) << 16) + ((p2[2]) << 8) + (p2[3]), in bta_dm_proc_open_evt() 6368 ((p2[4]) << 8) + p2[5]); in bta_dm_proc_open_evt() 6371 UNUSED(p2); in bta_dm_proc_open_evt()
|
/hal_espressif-3.5.0/components/esptool_py/esptool/espsecure/ |
D | __init__.py | 1336 def _samefile(p1, p2): argument 1338 os.path.normpath(p2)
|
/hal_espressif-3.5.0/components/bt/esp_ble_mesh/mesh_models/server/ |
D | generic_server.c | 2330 static inline int property_id_compare(const void *p1, const void *p2) in property_id_compare() argument 2332 if (*(uint16_t *)p1 < * (uint16_t *)p2) { in property_id_compare() 2335 if (*(uint16_t *)p1 > *(uint16_t *)p2) { in property_id_compare()
|
/hal_espressif-3.5.0/components/wpa_supplicant/src/wps/ |
D | wps_registrar.c | 453 struct upnp_pending_message *p, *p2, *prev = NULL; in wps_registrar_free_pending_m2() local 462 p2 = p; in wps_registrar_free_pending_m2() 464 wpabuf_free(p2->msg); in wps_registrar_free_pending_m2() 465 os_free(p2); in wps_registrar_free_pending_m2()
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/stack/l2cap/include/ |
D | l2c_int.h | 621 UINT8 rem_id, UINT16 p1, UINT16 p2);
|
/hal_espressif-3.5.0/components/bt/host/bluedroid/stack/l2cap/ |
D | l2c_utils.c | 493 UINT16 p1, UINT16 p2) in l2cu_send_peer_cmd_reject() argument 523 UINT16_TO_STREAM (p, p2); in l2cu_send_peer_cmd_reject()
|