Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 14 of 14) sorted by relevance

/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot_signatures_app.c62 ptrdiff_t keylen; in esp_secure_boot_verify_ecdsa_signature_block()
67 keylen = signature_verification_key_end - signature_verification_key_start; in esp_secure_boot_verify_ecdsa_signature_block()
68 if (keylen != SIGNATURE_VERIFICATION_KEYLEN) { in esp_secure_boot_verify_ecdsa_signature_block()
69 ESP_LOGE(TAG, "Embedded public verification key has wrong length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block()
107 if (keylen != 2 * plen) { in esp_secure_boot_verify_ecdsa_signature_block()
108 ESP_LOGE(TAG, "Incorrect ECDSA key length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block()
Dsecure_boot_signatures_bootloader.c65 ptrdiff_t keylen; in esp_secure_boot_verify_ecdsa_signature_block() local
67 keylen = signature_verification_key_end - signature_verification_key_start; in esp_secure_boot_verify_ecdsa_signature_block()
68 if (keylen != SIGNATURE_VERIFICATION_KEYLEN) { in esp_secure_boot_verify_ecdsa_signature_block()
69 ESP_LOGE(TAG, "Embedded public verification key has wrong length %d", keylen); in esp_secure_boot_verify_ecdsa_signature_block()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument
31 if (kpos >= keylen) in rc4_skip()
Dcrypto_internal-cipher.c23 size_t keylen; member
61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init()
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt()
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
Dcrypto.h485 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c329 int keylen; in wpa_ft_install_ptk() local
342 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk()
345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk()
591 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local
614 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem()
623 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem()
632 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem()
635 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem()
639 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem()
648 (u8 *)(gtk_elem + 3), rsc_len, gtk, keylen, KEY_FLAG_GROUP | KEY_FLAG_RX) < 0) { in wpa_ft_process_gtk_subelem()
Dwpa.c772 int keylen; in wpa_supplicant_install_ptk() local
792 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_supplicant_install_ptk()
800 sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk()
803 alg, keylen, MAC2STR(sm->bssid)); in wpa_supplicant_install_ptk()
820 int keylen, int maxkeylen, in wpa_supplicant_check_group_cipher() argument
836 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher()
839 wpa_cipher_txt(group_cipher), keylen, maxkeylen); in wpa_supplicant_check_group_cipher()
1286 u16 key_info, keylen; in wpa_supplicant_process_3_of_4() local
1312 keylen = WPA_GET_BE16(key->key_length); in wpa_supplicant_process_3_of_4()
1315 if (keylen != 16) { in wpa_supplicant_process_3_of_4()
[all …]
/hal_espressif-latest/components/esp_wifi/include/
Desp_wifi_crypto_types.h248 typedef int (*esp_rc4_skip_t)(const unsigned char *key, unsigned int keylen, unsigned int skip,
368 typedef int (*esp_aes_gmac_t)(const uint8_t *key, size_t keylen, const uint8_t *iv, size_t iv_len,
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Daes.c513 return_type aes_set_key( const unsigned char key[], length_type keylen, aes_context ctx[1] ) argument
517 switch ( keylen ) {
520 keylen = 16;
524 keylen = 24;
528 keylen = 32;
534 block_copy_nn(ctx->ksch, key, keylen);
535 hi = (keylen + 28) << 2;
537 for ( cc = keylen, rc = 1; cc < hi; cc += 4 ) {
544 if ( cc % keylen == 0 ) {
551 } else if ( keylen > 24 && cc % keylen == 16 ) {
[all …]
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/
Daes.h84 length_type keylen,
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py903 keylen = 24
906 keylen = 32
909 keylen = 48
912 r = int.from_bytes(encoded_rs[:keylen], "little")
913 s = int.from_bytes(encoded_rs[keylen : keylen * 2], "little")
1126 if args.keylen == 192:
1133 "" if args.keylen == 256 else " (truncated to 192 bits)",
1229 print("Writing %d random bits to key file %s" % (args.keylen, args.key_file.name))
1230 args.key_file.write(os.urandom(args.keylen // 8))
/hal_espressif-latest/components/bootloader/subproject/
DCMakeLists.txt94 --keylen "${key_digest_len}"
110 "--keylen (192/256) --keyfile KEYFILE "
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/
Dmbedtls_rom_osi.h230 …_rom_mbedtls_md_hmac_starts)( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen );
641 …nst mbedtls_cipher_info_t *cipher_info, const unsigned char *key, size_t keylen, const unsigned ch…
/hal_espressif-latest/components/wpa_supplicant/src/common/
Ddpp.c5512 int keylen, ret = -1; in dpp_configurator_get_key() local
5518 crypto_ec_get_priv_key_der(conf->csign, &key, &keylen); in dpp_configurator_get_key()
5520 if (keylen > 0) in dpp_configurator_get_key()
5521 ret = wpa_snprintf_hex(buf, buflen, key, keylen); in dpp_configurator_get_key()