/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot_signatures_app.c | 62 ptrdiff_t keylen; in esp_secure_boot_verify_ecdsa_signature_block() 67 keylen = signature_verification_key_end - signature_verification_key_start; in esp_secure_boot_verify_ecdsa_signature_block() 68 if (keylen != SIGNATURE_VERIFICATION_KEYLEN) { in esp_secure_boot_verify_ecdsa_signature_block() 69 ESP_LOGE(TAG, "Embedded public verification key has wrong length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block() 107 if (keylen != 2 * plen) { in esp_secure_boot_verify_ecdsa_signature_block() 108 ESP_LOGE(TAG, "Incorrect ECDSA key length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block()
|
D | secure_boot_signatures_bootloader.c | 65 ptrdiff_t keylen; in esp_secure_boot_verify_ecdsa_signature_block() local 67 keylen = signature_verification_key_end - signature_verification_key_start; in esp_secure_boot_verify_ecdsa_signature_block() 68 if (keylen != SIGNATURE_VERIFICATION_KEYLEN) { in esp_secure_boot_verify_ecdsa_signature_block() 69 ESP_LOGE(TAG, "Embedded public verification key has wrong length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 31 if (kpos >= keylen) in rc4_skip()
|
D | crypto_internal-cipher.c | 23 size_t keylen; member 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt() 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
|
D | crypto.h | 485 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 329 int keylen; in wpa_ft_install_ptk() local 342 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk() 345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk() 591 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 614 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem() 623 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 632 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem() 635 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem() 639 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 648 (u8 *)(gtk_elem + 3), rsc_len, gtk, keylen, KEY_FLAG_GROUP | KEY_FLAG_RX) < 0) { in wpa_ft_process_gtk_subelem()
|
D | wpa.c | 772 int keylen; in wpa_supplicant_install_ptk() local 792 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_supplicant_install_ptk() 800 sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk() 803 alg, keylen, MAC2STR(sm->bssid)); in wpa_supplicant_install_ptk() 820 int keylen, int maxkeylen, in wpa_supplicant_check_group_cipher() argument 836 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher() 839 wpa_cipher_txt(group_cipher), keylen, maxkeylen); in wpa_supplicant_check_group_cipher() 1286 u16 key_info, keylen; in wpa_supplicant_process_3_of_4() local 1312 keylen = WPA_GET_BE16(key->key_length); in wpa_supplicant_process_3_of_4() 1315 if (keylen != 16) { in wpa_supplicant_process_3_of_4() [all …]
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_wifi_crypto_types.h | 248 typedef int (*esp_rc4_skip_t)(const unsigned char *key, unsigned int keylen, unsigned int skip, 368 typedef int (*esp_aes_gmac_t)(const uint8_t *key, size_t keylen, const uint8_t *iv, size_t iv_len,
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | aes.c | 513 return_type aes_set_key( const unsigned char key[], length_type keylen, aes_context ctx[1] ) argument 517 switch ( keylen ) { 520 keylen = 16; 524 keylen = 24; 528 keylen = 32; 534 block_copy_nn(ctx->ksch, key, keylen); 535 hi = (keylen + 28) << 2; 537 for ( cc = keylen, rc = 1; cc < hi; cc += 4 ) { 544 if ( cc % keylen == 0 ) { 551 } else if ( keylen > 24 && cc % keylen == 16 ) { [all …]
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/ |
D | aes.h | 84 length_type keylen,
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 903 keylen = 24 906 keylen = 32 909 keylen = 48 912 r = int.from_bytes(encoded_rs[:keylen], "little") 913 s = int.from_bytes(encoded_rs[keylen : keylen * 2], "little") 1126 if args.keylen == 192: 1133 "" if args.keylen == 256 else " (truncated to 192 bits)", 1229 print("Writing %d random bits to key file %s" % (args.keylen, args.key_file.name)) 1230 args.key_file.write(os.urandom(args.keylen // 8))
|
/hal_espressif-latest/components/bootloader/subproject/ |
D | CMakeLists.txt | 94 --keylen "${key_digest_len}" 110 "--keylen (192/256) --keyfile KEYFILE "
|
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/ |
D | mbedtls_rom_osi.h | 230 …_rom_mbedtls_md_hmac_starts)( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ); 641 …nst mbedtls_cipher_info_t *cipher_info, const unsigned char *key, size_t keylen, const unsigned ch…
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | dpp.c | 5512 int keylen, ret = -1; in dpp_configurator_get_key() local 5518 crypto_ec_get_priv_key_der(conf->csign, &key, &keylen); in dpp_configurator_get_key() 5520 if (keylen > 0) in dpp_configurator_get_key() 5521 ret = wpa_snprintf_hex(buf, buflen, key, keylen); in dpp_configurator_get_key()
|