Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 64) sorted by relevance

123

/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/
Dtest.c35 struct bt_mesh_app_keys *keys = NULL; in bt_mesh_device_auto_enter_network() local
74 keys = sub->kr_flag ? &key->keys[1] : &key->keys[0]; in bt_mesh_device_auto_enter_network()
76 if (bt_mesh_app_id(info->app_key, &keys->id)) { in bt_mesh_device_auto_enter_network()
83 memcpy(keys->val, info->app_key, 16); in bt_mesh_device_auto_enter_network()
100 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network()
101 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network()
102 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network()
115 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network()
116 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network()
117 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network()
Dlocal_operation.c140 return sub->kr_flag ? sub->keys[1].net : sub->keys[0].net; in bt_mesh_node_get_local_net_key()
158 return key->updated ? key->keys[1].val : key->keys[0].val; in bt_mesh_node_get_local_app_key()
186 memcmp(bt_mesh.sub[i].keys[0].net, net_key, 16) == 0) || in bt_mesh_node_local_net_key_add()
188 memcmp(bt_mesh.sub[i].keys[1].net, net_key, 16) == 0)) { in bt_mesh_node_local_net_key_add()
207 err = bt_mesh_net_keys_create(&sub->keys[0], net_key); in bt_mesh_node_local_net_key_add()
262 memcmp(bt_mesh.app_keys[i].keys[0].val, app_key, 16) == 0) || in bt_mesh_node_local_app_key_add()
264 memcmp(bt_mesh.app_keys[i].keys[1].val, app_key, 16) == 0)) { in bt_mesh_node_local_app_key_add()
273 struct bt_mesh_app_keys *keys = &key->keys[0]; in bt_mesh_node_local_app_key_add() local
275 if (bt_mesh_app_id(app_key, &keys->id)) { in bt_mesh_node_local_app_key_add()
283 memcpy(keys->val, app_key, 16); in bt_mesh_node_local_app_key_add()
[all …]
Dnet.c164 int bt_mesh_net_keys_create(struct bt_mesh_subnet_keys *keys, in bt_mesh_net_keys_create() argument
171 err = bt_mesh_k2(key, p, sizeof(p), &nid, keys->enc, keys->privacy); in bt_mesh_net_keys_create()
177 memcpy(keys->net, key, 16); in bt_mesh_net_keys_create()
179 keys->nid = nid; in bt_mesh_net_keys_create()
181 BT_DBG("NID 0x%02x EncKey %s", keys->nid, bt_hex(keys->enc, 16)); in bt_mesh_net_keys_create()
182 BT_DBG("PrivacyKey %s", bt_hex(keys->privacy, 16)); in bt_mesh_net_keys_create()
184 err = bt_mesh_k3(key, keys->net_id); in bt_mesh_net_keys_create()
190 BT_DBG("NetID %s", bt_hex(keys->net_id, 8)); in bt_mesh_net_keys_create()
193 err = bt_mesh_identity_key(key, keys->identity); in bt_mesh_net_keys_create()
199 BT_DBG("IdentityKey %s", bt_hex(keys->identity, 16)); in bt_mesh_net_keys_create()
[all …]
Dprovisioner_main.c104 if (bt_mesh_net_keys_create(&sub->keys[1], p_key)) { in bt_mesh_provisioner_net_create()
112 if (bt_mesh_net_keys_create(&sub->keys[0], p_key)) { in bt_mesh_provisioner_net_create()
150 BT_INFO("NetKeyIndex 0x%03x, NID 0x%02x", sub->net_idx, sub->keys[0].nid); in bt_mesh_provisioner_net_create()
151 BT_INFO("NetKey %s", bt_hex(sub->keys[0].net, 16)); in bt_mesh_provisioner_net_create()
720 return sub->keys[1].net; in bt_mesh_provisioner_net_key_get()
722 return sub->keys[0].net; in bt_mesh_provisioner_net_key_get()
829 if (key && (!memcmp(key->keys[0].val, app_key, 16) || in provisioner_check_app_key()
830 !memcmp(key->keys[1].val, app_key, 16))) { in provisioner_check_app_key()
891 if (sub && (!memcmp(sub->keys[0].net, net_key, 16) || in provisioner_check_net_key()
892 !memcmp(sub->keys[1].net, net_key, 16))) { in provisioner_check_net_key()
[all …]
Dsettings.c469 memcpy(sub->keys[0].net, &key.val[0], 16); in net_key_set()
470 memcpy(sub->keys[1].net, &key.val[1], 16); in net_key_set()
473 BT_INFO("Restored NetKey %s", bt_hex(sub->keys[0].net, 16)); in net_key_set()
535 memcpy(app->keys[0].val, key.val[0], 16); in app_key_set()
536 memcpy(app->keys[1].val, key.val[1], 16); in app_key_set()
537 bt_mesh_app_id(app->keys[0].val, &app->keys[0].id); in app_key_set()
538 bt_mesh_app_id(app->keys[1].val, &app->keys[1].id); in app_key_set()
542 BT_INFO("Restored AppKey %s", bt_hex(app->keys[0].val, 16)); in app_key_set()
639 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in model_set_bind()
640 model->keys[i] = BLE_MESH_KEY_UNUSED; in model_set_bind()
[all …]
Dfast_prov.c127 return (sub->kr_flag ? sub->keys[1].net : sub->keys[0].net); in bt_mesh_fast_prov_net_key_get()
140 return (key->updated ? key->keys[1].val : key->keys[0].val); in bt_mesh_get_fast_prov_app_key()
Dbeacon.c110 struct bt_mesh_subnet_keys *keys = NULL; in bt_mesh_beacon_create() local
115 keys = &sub->keys[1]; in bt_mesh_beacon_create()
117 keys = &sub->keys[0]; in bt_mesh_beacon_create()
123 net_buf_simple_add_mem(buf, keys->net_id, 8); in bt_mesh_beacon_create()
132 BT_DBG("NetID %s Auth %s", bt_hex(keys->net_id, 8), in bt_mesh_beacon_create()
Dcfg_srv.c205 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_pub_app_key_bound()
206 if (model->keys[i] == app_idx) { in mod_pub_app_key_bound()
300 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_bind()
302 if (model->keys[i] == key_idx) { in mod_bind()
307 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_bind()
308 if (model->keys[i] == BLE_MESH_KEY_UNUSED) { in mod_bind()
309 model->keys[i] = key_idx; in mod_bind()
332 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_unbind()
333 if (model->keys[i] != key_idx) { in mod_unbind()
337 model->keys[i] = BLE_MESH_KEY_UNUSED; in mod_unbind()
[all …]
Dnet.h42 } keys[2]; member
72 } keys[2]; member
326 int bt_mesh_net_keys_create(struct bt_mesh_subnet_keys *keys,
/hal_espressif-latest/tools/idf_monitor/idf_monitor_base/
Dchip_specific_config.py61 if chip not in conf.keys():
63 chip_revisions = sorted(list(conf[chip].keys()), key=int)
67 for key in conf[chip][rev].keys():
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c1193 p_dev_rec->ble.keys.local_counter++; in btm_ble_increment_sign_ctr()
1195 p_dev_rec->ble.keys.counter++; in btm_ble_increment_sign_ctr()
1199 p_dev_rec->ble.keys.local_counter, in btm_ble_increment_sign_ctr()
1200 p_dev_rec->ble.keys.counter); in btm_ble_increment_sign_ctr()
1254 if (p_dev_rec && p_dev_rec->ble.keys.div) { in btm_get_local_div()
1256 *p_div = p_dev_rec->ble.keys.div; in btm_get_local_div()
1295 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1296 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key()
1297 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key()
1298 p_rec->ble.keys.ediv = p_keys->penc_key.ediv; in btm_sec_save_le_key()
[all …]
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dburn-key-cmd.rst6 The ``espefuse.py burn_key`` command burns keys to eFuse blocks:
38 …ect``. Disable write-protecting of the key. The key remains writable. The keys use the RS coding s…
45 {IDF_TARGET_NAME} supports keys:
50 … and write protected. The hardware will still have access to them. These keys are burned in rever…
56 …mes ``BLOCK1`` and ``BLOCK2`` to burn flash encryption and secure boot v2 keys because byte order …
68 …:esp32h2: - ECDSA_KEY. It can be ECDSA private keys based on NIST192p or NIST256p curve. The priva…
81 …es and supports private keys based on the NIST192p or NIST256p curve. These two commands below can…
97 … secure boot keys. This chip does not have any eFuse key purpose fields, but we use the key purpos…
106 {IDF_TARGET_NAME} can have in eFuse block the following combination of keys:
112 5. no keys, used for user purposes. Chip does not have security features.
[all …]
Dburn-key-digest-cmd.rst25 …ect``. Disable write-protecting of the key. The key remains writable. The keys use the RS coding s…
26 …ing of the key. This option does not change anything, because Secure Boot keys are readable anyway.
74 …See :ref:`perform-multiple-operations` for how to burn flash encryption and secure boot keys to th…
82 Burn keys to blocks:
124 Burn keys to blocks:
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_tls_common.c303 struct tls_random keys; in eap_peer_tls_derive_session_id() local
310 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys)) in eap_peer_tls_derive_session_id()
313 if (keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id()
316 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_peer_tls_derive_session_id()
323 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
324 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_peer_tls_derive_session_id()
325 keys.server_random_len); in eap_peer_tls_derive_session_id()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Ddes-internal.c318 static void desfunc(u32 *block, const u32 *keys) in desfunc() argument
350 work = RORc(right, 4) ^ *keys++; in desfunc()
355 work = right ^ *keys++; in desfunc()
361 work = RORc(leftt, 4) ^ *keys++; in desfunc()
366 work = leftt ^ *keys++; in desfunc()
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_server.c645 int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *keys) in tlsv1_server_get_random() argument
647 os_memset(keys, 0, sizeof(*keys)); in tlsv1_server_get_random()
651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
652 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
655 keys->server_random = conn->server_random; in tlsv1_server_get_random()
656 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
Dtlsv1_client.c779 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) in tlsv1_client_get_random() argument
781 os_memset(keys, 0, sizeof(*keys)); in tlsv1_client_get_random()
785 keys->client_random = conn->client_random; in tlsv1_client_get_random()
786 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
789 keys->server_random = conn->server_random; in tlsv1_client_get_random()
790 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/
Desp_efuse_api_key.c212 esp_err_t esp_efuse_write_keys(const esp_efuse_purpose_t purposes[], uint8_t keys[][32], unsigned n… in esp_efuse_write_keys()
215 …if (number_of_keys == 0 || number_of_keys > (EFUSE_BLK_KEY_MAX - EFUSE_BLK_KEY0) || keys == NULL |… in esp_efuse_write_keys()
232 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
/hal_espressif-latest/components/bootloader/
Dproject_include.cmake28 # Regardless, pass the main project's keys (signing/verification) to the bootloader subproject
56 # Since keys are usually given relative to main project dir, get the absolute paths to the keys
58 … so that bootloader subproject does not need to assume main project dir to obtain path to the keys.
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/
Desp_efuse_api_key.c218 esp_err_t esp_efuse_write_keys(const esp_efuse_purpose_t purposes[], uint8_t keys[][32], unsigned n… in esp_efuse_write_keys()
221 if (number_of_keys == 0 || number_of_keys > 2 || keys == NULL || purposes == NULL) { in esp_efuse_write_keys()
232 ESP_EFUSE_CHK(esp_efuse_write_key(EFUSE_BLK_KEY0, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/include/
Dmesh_access.h259 .keys = ESP_BLE_MESH_MODEL_KEYS_UNUSED, \
282 .keys = ESP_BLE_MESH_MODEL_KEYS_UNUSED, \
476 uint16_t keys[CONFIG_BLE_MESH_MODEL_KEY_COUNT]; member
/hal_espressif-latest/tools/esptool_py/esptool/targets/
D__init__.py38 CHIP_LIST = list(CHIP_DEFS.keys())
/hal_espressif-latest/tools/esptool_py/test/
Dtest_uf2_ids.py48 [chip.upper() for chip in CHIP_DEFS.keys() if "beta" not in chip]
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/
Dflash_encrypt.c185 uint8_t keys[BLOCKS_NEEDED][32] = { 0 }; in check_and_generate_encryption_keys() local
188 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys()
192 esp_err_t err = esp_efuse_write_keys(purposes, keys, BLOCKS_NEEDED); in check_and_generate_encryption_keys()
/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_common.c68 u8 keys[WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN + WPS_EMSK_LEN]; in wps_derive_keys() local
122 keys, sizeof(keys)); in wps_derive_keys()
123 os_memcpy(wps->authkey, keys, WPS_AUTHKEY_LEN); in wps_derive_keys()
124 os_memcpy(wps->keywrapkey, keys + WPS_AUTHKEY_LEN, WPS_KEYWRAPKEY_LEN); in wps_derive_keys()
125 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, in wps_derive_keys()

123