/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 16 security and technicalities of each cryptographic primitive are found in the 147 length. The security of the output is exactly equal to the 172 length. The security of the output is exactly equal to the 183 * AES128-CMAC mode of operation offers 64 bits of security against collision 211 The mac size parameter is an important parameter to estimate the security 230 * RFC-3610, which also specifies CCM, presents a few relevant security 234 key obviously destroys the security properties of CCM mode.
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 10 * `Secure Boot <https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-boot-v… 11 * `Flash Encryption <https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/flash-en…
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/ |
D | burn-key-cmd.rst | 10 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v1.ht… 11 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.ht… 12 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/flash-encryption.… 56 … keys because byte order will be incorrect and read protection will not meet security requirements. 112 5. no keys, used for user purposes. Chip does not have security features. 145 Leaving a key unprotected may compromise its use as a security feature.
|
D | summary-cmd.rst | 65 "category": "security", 78 "category": "security",
|
D | burn-key-digest-cmd.rst | 6 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.ht…
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/include/stack/ |
D | gap_api.h | 146 UINT16 security, UINT8 chan_mode_mask, tGAP_CONN_CALLBACK *p_cb);
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/esptool/ |
D | basic-commands.rst | 67 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.ht… 78 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/flash-encryption.… 84 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/flash-encryption.… 85 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/flash-encryption.… 149 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.ht… 150 …://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/flash-encryption.…
|
/hal_espressif-3.7.0/components/efuse/ |
D | CMakeLists.txt | 5 " it does not provide any security. FOR TESTING ONLY!")
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/advanced-topics/ |
D | firmware-image-format.rst | 168 …p32/security/secure-boot-v1.html#image-signing-algorithm>`_ and `Secure Boot V2 <https://docs.espr…
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/btc/profile/std/l2cap/ |
D | btc_l2cap.c | 67 uint16_t security; member 502 slot->security = arg->start_srv.sec_mask; in btc_l2cap_start_srv() 510 BTA_JvL2capStartServer(slot->security, slot->role, &obex_l2c_etm_opt, slot->psm, in btc_l2cap_start_srv() 636 slot->security = arg->connect.sec_mask; in btc_l2cap_connect() 644 BTA_JvL2capConnect(slot->security, slot->role, &obex_l2c_etm_opt, slot->psm, in btc_l2cap_connect()
|
/hal_espressif-3.7.0/components/bootloader/ |
D | Kconfig.projbuild | 267 Rollback is possible only between the apps with the same security versions. 274 … This option prevents rollback to previous firmware/application image with lower security version. 282 The security version is set in the bootloader, version is recorded in the eFuse field 284 … for storing the security version is limited (see BOOTLOADER_APP_SEC_VER_SIZE_EFUSE_FIELD option). 287 a security version greater or equal that recorded in eFuse field. 290 The security version is worth increasing if in previous versions there is 307 This determines how many times the security version can be increased. 582 …If hardware secure boot is not enabled, this option doesn't add significant security by itself so … 596 …If hardware secure boot is not enabled, this option still adds significant security against networ… 767 custom combination of security features. [all …]
|
D | project_include.cmake | 106 "\tSee docs/security/secure-boot-v1.rst for details.")
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/gap/ |
D | gap_conn.c | 128 tL2CAP_ERTM_INFO *ertm_info, UINT16 security, UINT8 chan_mode_mask, in GAP_ConnOpen() argument 195 p_ccb->service_id, security, p_ccb->psm, 0, 0)) { in GAP_ConnOpen() 232 … if ((security & (BTM_SEC_OUT_AUTHORIZE | BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT) ) == 0) { in GAP_ConnOpen()
|
/hal_espressif-3.7.0/components/bt/porting/ext/tinycrypt/ |
D | README | 45 security and technicalities, please see the corresponding header file of each
|
/hal_espressif-3.7.0/components/bt/host/nimble/ |
D | Kconfig.in | 84 Defines maximum number of bonds to save for peer security and our security 177 Enable security manager legacy pairing 184 Enable security manager secure connections
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/btc/profile/std/spp/ |
D | btc_spp.c | 67 esp_spp_sec_t security; member 354 slot_new->security = slot->security; in btc_spp_rfcomm_inter_cb() 491 BTA_JvRfcommStartServer(slot->security, slot->role, slot->scn, in btc_spp_dm_inter_cb() 668 slot->security = arg->connect.sec_mask; in btc_spp_connect() 745 slot->security = arg->start_srv.sec_mask; in btc_spp_start_srv()
|
/hal_espressif-3.7.0/components/bt/controller/esp32c2/ |
D | Kconfig.in | 275 Enable security manager legacy pairing 282 Enable security manager secure connections
|
/hal_espressif-3.7.0/components/esp_hw_support/ |
D | Kconfig | 265 there is also associated performance impact based on the security level 273 Configure the DPA protection security level
|
/hal_espressif-3.7.0/components/bt/controller/esp32c6/ |
D | Kconfig.in | 295 Enable security manager legacy pairing 302 Enable security manager secure connections
|
/hal_espressif-3.7.0/components/bt/controller/esp32h2/ |
D | Kconfig.in | 295 Enable security manager legacy pairing 302 Enable security manager secure connections
|
/hal_espressif-3.7.0/components/mbedtls/ |
D | Kconfig | 19 from security perspective. But if application requirement does not 26 from security perspective. 867 Note that the security of Diffie-Hellman key exchanges depends on 1046 bool "Show configurations with potential security risks"
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/inc/ |
D | summary_ESP32-C6.rst | 102 …ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled…
|
D | summary_ESP32-H2.rst | 104 …ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled…
|
D | summary_ESP32-P4.rst | 125 …ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled…
|
/hal_espressif-3.7.0/components/efuse/esp32h2/ |
D | esp_efuse_table.csv | 121 …OAD, EFUSE_BLK0, 133, 1, [] Represents whether security download is enabl…
|