/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | test.c | 35 struct bt_mesh_app_keys *keys = NULL; in bt_mesh_device_auto_enter_network() local 74 keys = sub->kr_flag ? &key->keys[1] : &key->keys[0]; in bt_mesh_device_auto_enter_network() 76 if (bt_mesh_app_id(info->app_key, &keys->id)) { in bt_mesh_device_auto_enter_network() 83 memcpy(keys->val, info->app_key, 16); in bt_mesh_device_auto_enter_network() 100 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network() 101 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network() 102 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network() 115 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network() 116 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network() 117 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network()
|
D | local_operation.c | 140 return sub->kr_flag ? sub->keys[1].net : sub->keys[0].net; in bt_mesh_node_get_local_net_key() 158 return key->updated ? key->keys[1].val : key->keys[0].val; in bt_mesh_node_get_local_app_key() 186 memcmp(bt_mesh.sub[i].keys[0].net, net_key, 16) == 0) || in bt_mesh_node_local_net_key_add() 188 memcmp(bt_mesh.sub[i].keys[1].net, net_key, 16) == 0)) { in bt_mesh_node_local_net_key_add() 207 err = bt_mesh_net_keys_create(&sub->keys[0], net_key); in bt_mesh_node_local_net_key_add() 262 memcmp(bt_mesh.app_keys[i].keys[0].val, app_key, 16) == 0) || in bt_mesh_node_local_app_key_add() 264 memcmp(bt_mesh.app_keys[i].keys[1].val, app_key, 16) == 0)) { in bt_mesh_node_local_app_key_add() 273 struct bt_mesh_app_keys *keys = &key->keys[0]; in bt_mesh_node_local_app_key_add() local 275 if (bt_mesh_app_id(app_key, &keys->id)) { in bt_mesh_node_local_app_key_add() 283 memcpy(keys->val, app_key, 16); in bt_mesh_node_local_app_key_add() [all …]
|
D | net.c | 164 int bt_mesh_net_keys_create(struct bt_mesh_subnet_keys *keys, in bt_mesh_net_keys_create() argument 171 err = bt_mesh_k2(key, p, sizeof(p), &nid, keys->enc, keys->privacy); in bt_mesh_net_keys_create() 177 memcpy(keys->net, key, 16); in bt_mesh_net_keys_create() 179 keys->nid = nid; in bt_mesh_net_keys_create() 181 BT_DBG("NID 0x%02x EncKey %s", keys->nid, bt_hex(keys->enc, 16)); in bt_mesh_net_keys_create() 182 BT_DBG("PrivacyKey %s", bt_hex(keys->privacy, 16)); in bt_mesh_net_keys_create() 184 err = bt_mesh_k3(key, keys->net_id); in bt_mesh_net_keys_create() 190 BT_DBG("NetID %s", bt_hex(keys->net_id, 8)); in bt_mesh_net_keys_create() 193 err = bt_mesh_identity_key(key, keys->identity); in bt_mesh_net_keys_create() 199 BT_DBG("IdentityKey %s", bt_hex(keys->identity, 16)); in bt_mesh_net_keys_create() [all …]
|
D | provisioner_main.c | 104 if (bt_mesh_net_keys_create(&sub->keys[1], p_key)) { in bt_mesh_provisioner_net_create() 112 if (bt_mesh_net_keys_create(&sub->keys[0], p_key)) { in bt_mesh_provisioner_net_create() 150 BT_INFO("NetKeyIndex 0x%03x, NID 0x%02x", sub->net_idx, sub->keys[0].nid); in bt_mesh_provisioner_net_create() 151 BT_INFO("NetKey %s", bt_hex(sub->keys[0].net, 16)); in bt_mesh_provisioner_net_create() 720 return sub->keys[1].net; in bt_mesh_provisioner_net_key_get() 722 return sub->keys[0].net; in bt_mesh_provisioner_net_key_get() 829 if (key && (!memcmp(key->keys[0].val, app_key, 16) || in provisioner_check_app_key() 830 !memcmp(key->keys[1].val, app_key, 16))) { in provisioner_check_app_key() 891 if (sub && (!memcmp(sub->keys[0].net, net_key, 16) || in provisioner_check_net_key() 892 !memcmp(sub->keys[1].net, net_key, 16))) { in provisioner_check_net_key() [all …]
|
D | settings.c | 469 memcpy(sub->keys[0].net, &key.val[0], 16); in net_key_set() 470 memcpy(sub->keys[1].net, &key.val[1], 16); in net_key_set() 473 BT_INFO("Restored NetKey %s", bt_hex(sub->keys[0].net, 16)); in net_key_set() 535 memcpy(app->keys[0].val, key.val[0], 16); in app_key_set() 536 memcpy(app->keys[1].val, key.val[1], 16); in app_key_set() 537 bt_mesh_app_id(app->keys[0].val, &app->keys[0].id); in app_key_set() 538 bt_mesh_app_id(app->keys[1].val, &app->keys[1].id); in app_key_set() 542 BT_INFO("Restored AppKey %s", bt_hex(app->keys[0].val, 16)); in app_key_set() 639 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in model_set_bind() 640 model->keys[i] = BLE_MESH_KEY_UNUSED; in model_set_bind() [all …]
|
D | fast_prov.c | 127 return (sub->kr_flag ? sub->keys[1].net : sub->keys[0].net); in bt_mesh_fast_prov_net_key_get() 140 return (key->updated ? key->keys[1].val : key->keys[0].val); in bt_mesh_get_fast_prov_app_key()
|
D | beacon.c | 110 struct bt_mesh_subnet_keys *keys = NULL; in bt_mesh_beacon_create() local 115 keys = &sub->keys[1]; in bt_mesh_beacon_create() 117 keys = &sub->keys[0]; in bt_mesh_beacon_create() 123 net_buf_simple_add_mem(buf, keys->net_id, 8); in bt_mesh_beacon_create() 132 BT_DBG("NetID %s Auth %s", bt_hex(keys->net_id, 8), in bt_mesh_beacon_create()
|
D | cfg_srv.c | 205 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_pub_app_key_bound() 206 if (model->keys[i] == app_idx) { in mod_pub_app_key_bound() 300 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_bind() 302 if (model->keys[i] == key_idx) { in mod_bind() 307 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_bind() 308 if (model->keys[i] == BLE_MESH_KEY_UNUSED) { in mod_bind() 309 model->keys[i] = key_idx; in mod_bind() 332 for (i = 0; i < ARRAY_SIZE(model->keys); i++) { in mod_unbind() 333 if (model->keys[i] != key_idx) { in mod_unbind() 337 model->keys[i] = BLE_MESH_KEY_UNUSED; in mod_unbind() [all …]
|
D | net.h | 42 } keys[2]; member 72 } keys[2]; member 326 int bt_mesh_net_keys_create(struct bt_mesh_subnet_keys *keys,
|
/hal_espressif-latest/tools/idf_monitor/idf_monitor_base/ |
D | chip_specific_config.py | 61 if chip not in conf.keys(): 63 chip_revisions = sorted(list(conf[chip].keys()), key=int) 67 for key in conf[chip][rev].keys():
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 1193 p_dev_rec->ble.keys.local_counter++; in btm_ble_increment_sign_ctr() 1195 p_dev_rec->ble.keys.counter++; in btm_ble_increment_sign_ctr() 1199 p_dev_rec->ble.keys.local_counter, in btm_ble_increment_sign_ctr() 1200 p_dev_rec->ble.keys.counter); in btm_ble_increment_sign_ctr() 1254 if (p_dev_rec && p_dev_rec->ble.keys.div) { in btm_get_local_div() 1256 *p_div = p_dev_rec->ble.keys.div; in btm_get_local_div() 1295 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1296 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key() 1297 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key() 1298 p_rec->ble.keys.ediv = p_keys->penc_key.ediv; in btm_sec_save_le_key() [all …]
|
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/ |
D | burn-key-cmd.rst | 6 The ``espefuse.py burn_key`` command burns keys to eFuse blocks: 38 …ect``. Disable write-protecting of the key. The key remains writable. The keys use the RS coding s… 45 {IDF_TARGET_NAME} supports keys: 50 … and write protected. The hardware will still have access to them. These keys are burned in rever… 56 …mes ``BLOCK1`` and ``BLOCK2`` to burn flash encryption and secure boot v2 keys because byte order … 68 …:esp32h2: - ECDSA_KEY. It can be ECDSA private keys based on NIST192p or NIST256p curve. The priva… 81 …es and supports private keys based on the NIST192p or NIST256p curve. These two commands below can… 97 … secure boot keys. This chip does not have any eFuse key purpose fields, but we use the key purpos… 106 {IDF_TARGET_NAME} can have in eFuse block the following combination of keys: 112 5. no keys, used for user purposes. Chip does not have security features. [all …]
|
D | burn-key-digest-cmd.rst | 25 …ect``. Disable write-protecting of the key. The key remains writable. The keys use the RS coding s… 26 …ing of the key. This option does not change anything, because Secure Boot keys are readable anyway. 74 …See :ref:`perform-multiple-operations` for how to burn flash encryption and secure boot keys to th… 82 Burn keys to blocks: 124 Burn keys to blocks:
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_tls_common.c | 303 struct tls_random keys; in eap_peer_tls_derive_session_id() local 310 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys)) in eap_peer_tls_derive_session_id() 313 if (keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id() 316 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_peer_tls_derive_session_id() 323 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id() 324 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_peer_tls_derive_session_id() 325 keys.server_random_len); in eap_peer_tls_derive_session_id()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) in desfunc() argument 350 work = RORc(right, 4) ^ *keys++; in desfunc() 355 work = right ^ *keys++; in desfunc() 361 work = RORc(leftt, 4) ^ *keys++; in desfunc() 366 work = leftt ^ *keys++; in desfunc()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_server.c | 645 int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *keys) in tlsv1_server_get_random() argument 647 os_memset(keys, 0, sizeof(*keys)); in tlsv1_server_get_random() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random() 652 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random() 655 keys->server_random = conn->server_random; in tlsv1_server_get_random() 656 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
|
D | tlsv1_client.c | 779 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) in tlsv1_client_get_random() argument 781 os_memset(keys, 0, sizeof(*keys)); in tlsv1_client_get_random() 785 keys->client_random = conn->client_random; in tlsv1_client_get_random() 786 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random() 789 keys->server_random = conn->server_random; in tlsv1_client_get_random() 790 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
|
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/three_key_blocks/ |
D | esp_efuse_api_key.c | 212 esp_err_t esp_efuse_write_keys(const esp_efuse_purpose_t purposes[], uint8_t keys[][32], unsigned n… in esp_efuse_write_keys() 215 …if (number_of_keys == 0 || number_of_keys > (EFUSE_BLK_KEY_MAX - EFUSE_BLK_KEY0) || keys == NULL |… in esp_efuse_write_keys() 232 ESP_EFUSE_CHK(esp_efuse_write_key(block, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
|
/hal_espressif-latest/components/bootloader/ |
D | project_include.cmake | 28 # Regardless, pass the main project's keys (signing/verification) to the bootloader subproject 56 # Since keys are usually given relative to main project dir, get the absolute paths to the keys 58 … so that bootloader subproject does not need to assume main project dir to obtain path to the keys.
|
/hal_espressif-latest/components/efuse/src/efuse_controller/keys/without_key_purposes/one_key_block/ |
D | esp_efuse_api_key.c | 218 esp_err_t esp_efuse_write_keys(const esp_efuse_purpose_t purposes[], uint8_t keys[][32], unsigned n… in esp_efuse_write_keys() 221 if (number_of_keys == 0 || number_of_keys > 2 || keys == NULL || purposes == NULL) { in esp_efuse_write_keys() 232 ESP_EFUSE_CHK(esp_efuse_write_key(EFUSE_BLK_KEY0, purpose, keys[i_key], key_size)); in esp_efuse_write_keys()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/include/ |
D | mesh_access.h | 259 .keys = ESP_BLE_MESH_MODEL_KEYS_UNUSED, \ 282 .keys = ESP_BLE_MESH_MODEL_KEYS_UNUSED, \ 476 uint16_t keys[CONFIG_BLE_MESH_MODEL_KEY_COUNT]; member
|
/hal_espressif-latest/tools/esptool_py/esptool/targets/ |
D | __init__.py | 38 CHIP_LIST = list(CHIP_DEFS.keys())
|
/hal_espressif-latest/tools/esptool_py/test/ |
D | test_uf2_ids.py | 48 [chip.upper() for chip in CHIP_DEFS.keys() if "beta" not in chip]
|
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/ |
D | flash_encrypt.c | 185 uint8_t keys[BLOCKS_NEEDED][32] = { 0 }; in check_and_generate_encryption_keys() local 188 bootloader_fill_random(keys[i], key_size); in check_and_generate_encryption_keys() 192 esp_err_t err = esp_efuse_write_keys(purposes, keys, BLOCKS_NEEDED); in check_and_generate_encryption_keys()
|
/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_common.c | 68 u8 keys[WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN + WPS_EMSK_LEN]; in wps_derive_keys() local 122 keys, sizeof(keys)); in wps_derive_keys() 123 os_memcpy(wps->authkey, keys, WPS_AUTHKEY_LEN); in wps_derive_keys() 124 os_memcpy(wps->keywrapkey, keys + WPS_AUTHKEY_LEN, WPS_KEYWRAPKEY_LEN); in wps_derive_keys() 125 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, in wps_derive_keys()
|