Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 22 of 22) sorted by relevance

/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
43 for (i = 0; i < key_size; ++i) { in rekey()
53 unsigned int key_size) in tc_hmac_set_key() argument
59 key_size == 0) { in tc_hmac_set_key()
63 const uint8_t dummy_key[key_size]; in tc_hmac_set_key()
66 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key()
77 key_size); in tc_hmac_set_key()
82 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/
Dsecure_boot_ecdsa_signature.c40 uint8_t key_size = 0; in verify_ecdsa_signature_block() local
44 key_size = 24; in verify_ecdsa_signature_block()
48 key_size = 32; in verify_ecdsa_signature_block()
62 for (int i = 0; i < key_size; i++) { in verify_ecdsa_signature_block()
63 _r[i] = trusted_block->ecdsa.signature[key_size - i - 1]; in verify_ecdsa_signature_block()
64 _s[i] = trusted_block->ecdsa.signature[2 * key_size - i - 1]; in verify_ecdsa_signature_block()
68 ret = mbedtls_mpi_read_binary(&r, _r, key_size); in verify_ecdsa_signature_block()
75 ret = mbedtls_mpi_read_binary(&s, _s, key_size); in verify_ecdsa_signature_block()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
43 for (i = 0; i < key_size; ++i) { in rekey()
53 unsigned int key_size) in tc_hmac_set_key() argument
58 key_size == 0) { in tc_hmac_set_key()
65 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key()
76 key_size); in tc_hmac_set_key()
81 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
84 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/
Desp_app_sec.c44 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument
48 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk()
57 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot.c120 size_t key_size = 256; in esp_secure_boot_generate_digest() local
122 key_size = 192; in esp_secure_boot_generate_digest()
124 bootloader_fill_random(key, key_size / 8); in esp_secure_boot_generate_digest()
125 esp_efuse_write_block(EFUSE_BLK_SECURE_BOOT, key, 0, key_size); in esp_secure_boot_generate_digest()
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/include/
Desp_sec_api.h42 UINT8 key_size; member
67 void app_ble_sec_gen_ltk(UINT8 key_size);
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/
Desp_efuse_api_key.c219 size_t key_size = 32; in esp_efuse_write_keys() local
222 key_size = 24; in esp_efuse_write_keys()
232 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/
Dflash_encrypt.c127 size_t key_size = 32; in check_and_generate_encryption_keys() local
139 key_size = 24; in check_and_generate_encryption_keys()
158 key_size = 16; in check_and_generate_encryption_keys()
188 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/
Dhmac.h93 unsigned int key_size);
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Dhmac.h93 unsigned int key_size);
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/
Dgatt_sr.c596 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local
605 &key_size); in gatt_process_read_multi_req()
630 key_size)) in gatt_process_read_multi_req()
675 key_size, in gatt_process_read_multi_req()
1123 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local
1165 &key_size); in gatts_process_read_by_type_req()
1176 key_size, in gatts_process_read_by_type_req()
1229 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local
1256 &key_size); in gatts_process_write_req()
1265 key_size); in gatts_process_write_req()
[all …]
Dgatt_db.c124 UINT8 key_size) in gatts_check_attr_readability() argument
156 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability()
212 UINT8 key_size) in read_attr_value() argument
226 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value()
334 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument
372 …s = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
996 UINT8 key_size, in gatts_read_attr_value_by_handle() argument
1010 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
1089 UINT8 key_size) in gatts_read_attr_perm_check() argument
1101 sec_flag, key_size); in gatts_read_attr_perm_check()
[all …]
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/
Desp_efuse_api_key.c231 …size_t key_size = (purpose == ESP_EFUSE_KEY_PURPOSE_SECURE_BOOT_V2 || purpose == ESP_EFUSE_KEY_PUR… in esp_efuse_write_keys() local
232 ESP_EFUSE_CHK(esp_efuse_write_key(EFUSE_BLK_KEY0, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c1299 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key()
1352 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key()
1366 p_rec->ble.keys.key_size, in btm_sec_save_le_key()
1719 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted()
1760 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
1762 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply()
2454 *p_le_key_size = p_dev_rec->ble.keys.key_size;
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/include/
Dgatt_int.h764 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra…
766 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i…
771 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
772 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py182 public_exponent=65537, key_size=3072, backend=default_backend()
259 if sk.key_size != 3072:
262 % sk.key_size
282 if vk.key_size != 3072:
285 % vk.key_size
327 rr = 1 << (public_key.key_size * 2)
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c2064 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
2065 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
2066 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler()
2070 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
2071 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
2072 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler()
/hal_espressif-latest/components/bt/host/bluedroid/api/include/api/
Desp_gap_ble_api.h543 uint8_t key_size; /*!< The key size(7~16) of the security link*/ member
573 uint8_t key_size; /*!< The key size of the security link */ member
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/include/
Dbtm_int.h536 UINT8 key_size; /* key size of the LTK delivered to peer device */ member
877 UINT8 key_size; member
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_utils.c1549 lle_key.key_size = p_cb->loc_enc_size; in smp_save_secure_connections_long_term_key()
1558 ple_key.key_size = p_cb->loc_enc_size; in smp_save_secure_connections_long_term_key()
Dsmp_act.c377 le_key.key_size = p_cb->loc_enc_size; in smp_send_enc_info()
1041 le_key.key_size = p_cb->loc_enc_size; in smp_proc_master_id()
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/
Dbtm_api.h1741 UINT8 key_size; member
1755 UINT8 key_size; member