/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 43 for (i = 0; i < key_size; ++i) { in rekey() 53 unsigned int key_size) in tc_hmac_set_key() argument 59 key_size == 0) { in tc_hmac_set_key() 63 const uint8_t dummy_key[key_size]; in tc_hmac_set_key() 66 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key() 77 key_size); in tc_hmac_set_key() 82 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/ |
D | secure_boot_ecdsa_signature.c | 40 uint8_t key_size = 0; in verify_ecdsa_signature_block() local 44 key_size = 24; in verify_ecdsa_signature_block() 48 key_size = 32; in verify_ecdsa_signature_block() 62 for (int i = 0; i < key_size; i++) { in verify_ecdsa_signature_block() 63 _r[i] = trusted_block->ecdsa.signature[key_size - i - 1]; in verify_ecdsa_signature_block() 64 _s[i] = trusted_block->ecdsa.signature[2 * key_size - i - 1]; in verify_ecdsa_signature_block() 68 ret = mbedtls_mpi_read_binary(&r, _r, key_size); in verify_ecdsa_signature_block() 75 ret = mbedtls_mpi_read_binary(&s, _s, key_size); in verify_ecdsa_signature_block()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 43 for (i = 0; i < key_size; ++i) { in rekey() 53 unsigned int key_size) in tc_hmac_set_key() argument 58 key_size == 0) { in tc_hmac_set_key() 65 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key() 76 key_size); in tc_hmac_set_key() 81 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 84 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/ |
D | esp_app_sec.c | 44 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument 48 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk() 57 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot.c | 120 size_t key_size = 256; in esp_secure_boot_generate_digest() local 122 key_size = 192; in esp_secure_boot_generate_digest() 124 bootloader_fill_random(key, key_size / 8); in esp_secure_boot_generate_digest() 125 esp_efuse_write_block(EFUSE_BLK_SECURE_BOOT, key, 0, key_size); in esp_secure_boot_generate_digest()
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/include/ |
D | esp_sec_api.h | 42 UINT8 key_size; member 67 void app_ble_sec_gen_ltk(UINT8 key_size);
|
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/ |
D | esp_efuse_api_key.c | 219 size_t key_size = 32; in esp_efuse_write_keys() local 222 key_size = 24; in esp_efuse_write_keys() 232 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
|
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/ |
D | flash_encrypt.c | 127 size_t key_size = 32; in check_and_generate_encryption_keys() local 139 key_size = 24; in check_and_generate_encryption_keys() 158 key_size = 16; in check_and_generate_encryption_keys() 188 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
D | hmac.h | 93 unsigned int key_size);
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | hmac.h | 93 unsigned int key_size);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_sr.c | 596 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local 605 &key_size); in gatt_process_read_multi_req() 630 key_size)) in gatt_process_read_multi_req() 675 key_size, in gatt_process_read_multi_req() 1123 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local 1165 &key_size); in gatts_process_read_by_type_req() 1176 key_size, in gatts_process_read_by_type_req() 1229 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 1256 &key_size); in gatts_process_write_req() 1265 key_size); in gatts_process_write_req() [all …]
|
D | gatt_db.c | 124 UINT8 key_size) in gatts_check_attr_readability() argument 156 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 212 UINT8 key_size) in read_attr_value() argument 226 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value() 334 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument 372 …s = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 996 UINT8 key_size, in gatts_read_attr_value_by_handle() argument 1010 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 1089 UINT8 key_size) in gatts_read_attr_perm_check() argument 1101 sec_flag, key_size); in gatts_read_attr_perm_check() [all …]
|
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/ |
D | esp_efuse_api_key.c | 231 …size_t key_size = (purpose == ESP_EFUSE_KEY_PURPOSE_SECURE_BOOT_V2 || purpose == ESP_EFUSE_KEY_PUR… in esp_efuse_write_keys() local 232 ESP_EFUSE_CHK(esp_efuse_write_key(EFUSE_BLK_KEY0, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 1299 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key() 1352 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key() 1366 p_rec->ble.keys.key_size, in btm_sec_save_le_key() 1719 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted() 1760 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply() 1762 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply() 2454 *p_le_key_size = p_dev_rec->ble.keys.key_size;
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/include/ |
D | gatt_int.h | 764 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra… 766 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i… 771 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 772 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 182 public_exponent=65537, key_size=3072, backend=default_backend() 259 if sk.key_size != 3072: 262 % sk.key_size 282 if vk.key_size != 3072: 285 % vk.key_size 327 rr = 1 << (public_key.key_size * 2)
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 2064 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 2065 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 2066 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler() 2070 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 2071 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 2072 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler()
|
/hal_espressif-latest/components/bt/host/bluedroid/api/include/api/ |
D | esp_gap_ble_api.h | 543 uint8_t key_size; /*!< The key size(7~16) of the security link*/ member 573 uint8_t key_size; /*!< The key size of the security link */ member
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/include/ |
D | btm_int.h | 536 UINT8 key_size; /* key size of the LTK delivered to peer device */ member 877 UINT8 key_size; member
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_utils.c | 1549 lle_key.key_size = p_cb->loc_enc_size; in smp_save_secure_connections_long_term_key() 1558 ple_key.key_size = p_cb->loc_enc_size; in smp_save_secure_connections_long_term_key()
|
D | smp_act.c | 377 le_key.key_size = p_cb->loc_enc_size; in smp_send_enc_info() 1041 le_key.key_size = p_cb->loc_enc_size; in smp_proc_master_id()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/ |
D | btm_api.h | 1741 UINT8 key_size; member 1755 UINT8 key_size; member
|