/hal_espressif-latest/tools/esptool_py/test/ |
D | test_esptool_sdm.py | 26 output = self.run_esptool_error("flash_id", chip="auto") 29 assert "Secure Download Mode is enabled" in output 30 assert "Unsupported detection protocol" in output 32 assert "Unsupported detection protocol" not in output 33 assert f"Detecting chip type... {self.expected_chip_name}" in output 34 assert "Stub loader is not supported in Secure Download Mode" in output 36 f"Chip is {self.expected_chip_name} in Secure Download Mode" in output 41 output = self.run_esptool_error("flash_id") # flash_id 42 assert "This command (0xa) is not supported in Secure Download Mode" in output 44 output = self.run_esptool_error("read_flash 0 10 out.bin") # read_flash [all …]
|
D | test_espefuse.py | 144 output = self._run_command(full_cmd, check_msg, ret_code) 148 print(output) 149 return output 160 output, _ = p.communicate() 163 assert check_msg in output 165 print(output) 168 return output 280 output = self.espefuse_py(cmd) 281 assert count_protects == output.count("is already read protected") 428 output = self.espefuse_py(f"write_protect_efuse {efuse_lists2}") [all …]
|
D | test_esptool.py | 126 output = subprocess.check_output( 129 output = output.decode("utf-8") 130 print(output) # for more complete stdout logs on failure 131 return output 133 print(e.output) 155 output = subprocess.check_output( 160 return output.decode("utf-8") 162 print(e.output.decode("utf-8")) 211 output = run_esptool_process(full_cmd) 212 print(output) # for more complete stdout logs on failure [all …]
|
D | test_imagegen.py | 124 output = subprocess.check_output(cmd) 125 output = output.decode("utf-8") 126 print(output) 128 print(e.output) 131 r"Checksum: [a-fA-F0-9]{2} \(valid\)", output 135 r"Validation Hash: [a-fA-F0-9]{64} \(valid\)", output 138 "warning" not in output.lower() 149 output = subprocess.check_output(cmd) 150 output = output.decode("utf-8") 151 print(output) [all …]
|
D | test_image_info.py | 50 output = subprocess.check_output(cmd) 51 output = output.decode("utf-8") 52 print(output) # for more complete stdout logs on failure 54 "warning" not in output.lower() 56 return output 58 print(e.output)
|
D | test_merge_bin.py | 60 output = subprocess.check_output( 63 output = output.decode("utf-8") 64 print(output) 67 "warning" not in output.lower() 73 print(e.output) 115 output = capsys.readouterr().out 116 assert "overlap" in output 372 output = subprocess.check_output(com_args + file_args, stderr=subprocess.STDOUT) 373 output = output.decode("utf-8") 374 print(output) [all …]
|
/hal_espressif-latest/zephyr/scripts/partitions/ |
D | esp_genpartition.py | 122 output = [] 124 output.append("/*") 126 …output.append(f" * Copyright (c) {start_year}-{datetime.now().year} Espressif Systems (Shanghai) C… 128 … output.append(f" * Copyright (c) {datetime.now().year} Espressif Systems (Shanghai) Co., Ltd.") 129 output.append(" *") 130 output.append(" * SPDX-License-Identifier: Apache-2.0") 131 output.append(" */") 132 output.append("") 133 output.append("&flash0 {") 134 output.append("\tpartitions {") [all …]
|
/hal_espressif-latest/components/mbedtls/port/aes/block/ |
D | esp_aes.c | 82 static int esp_aes_block(esp_aes_context *ctx, const void *input, void *output) in esp_aes_block() argument 86 uint32_t *output_words = (uint32_t *)output; in esp_aes_block() 94 mbedtls_platform_zeroize(output, 16); in esp_aes_block() 102 aes_hal_transform_block(input, output); in esp_aes_block() 114 memset(output, 0, 16); in esp_aes_block() 115 mbedtls_platform_zeroize(output, 16); in esp_aes_block() 123 const unsigned char *output ) in esp_aes_validate_input() argument 133 if (!output) { in esp_aes_validate_input() 144 unsigned char output[16] ) in esp_aes_encrypt() 146 esp_internal_aes_encrypt(ctx, input, output); in esp_aes_encrypt() [all …]
|
/hal_espressif-latest/components/mbedtls/port/aes/dma/ |
D | esp_aes.c | 110 static inline void esp_aes_wait_dma_done(lldesc_t *output) in esp_aes_wait_dma_done() argument 114 if ( esp_aes_dma_done(output) ) { in esp_aes_wait_dma_done() 247 …ess_dma(esp_aes_context *ctx, const unsigned char *input, unsigned char *output, size_t len, uint8… 257 …ext_ram(esp_aes_context *ctx, const unsigned char *input, unsigned char *output, size_t len, uint8… in esp_aes_process_dma_ext_ram() argument 271 mbedtls_platform_zeroize(output, len); in esp_aes_process_dma_ext_ram() 281 mbedtls_platform_zeroize(output, len); in esp_aes_process_dma_ext_ram() 286 output_buf = output; in esp_aes_process_dma_ext_ram() 306 memcpy(output + offset, output_buf, chunk_len); in esp_aes_process_dma_ext_ram() 308 output_buf = output + offset + chunk_len; in esp_aes_process_dma_ext_ram() 334 …ess_dma(esp_aes_context *ctx, const unsigned char *input, unsigned char *output, size_t len, uint8… in esp_aes_process_dma() argument [all …]
|
D | esp_aes_gdma_impl.c | 19 esp_err_t esp_aes_dma_start(const lldesc_t *input, const lldesc_t *output) in esp_aes_dma_start() argument 21 return esp_crypto_shared_gdma_start(input, output, GDMA_TRIG_PERIPH_AES); in esp_aes_dma_start() 24 bool esp_aes_dma_done(const lldesc_t *output) in esp_aes_dma_done() argument 26 return (output->owner == 0); in esp_aes_dma_done()
|
D | esp_aes_crypto_dma_impl.c | 23 esp_err_t esp_aes_dma_start(const lldesc_t *input, const lldesc_t *output) in esp_aes_dma_start() argument 30 crypto_dma_ll_inlink_set((uint32_t)output); in esp_aes_dma_start() 39 bool esp_aes_dma_done(const lldesc_t *output) in esp_aes_dma_done() argument 41 return (crypto_dma_ll_inlink_is_eof() && (output->owner == 0)); in esp_aes_dma_done()
|
/hal_espressif-latest/components/mbedtls/port/include/aes/ |
D | esp_aes.h | 135 …ypt_ecb( esp_aes_context *ctx, int mode, const unsigned char input[16], unsigned char output[16] ); 164 unsigned char *output ); 198 unsigned char *output ); 229 unsigned char *output ); 259 unsigned char *output ); 284 unsigned char *output ); 332 …ernal_aes_encrypt( esp_aes_context *ctx, const unsigned char input[16], unsigned char output[16] ); 343 …ernal_aes_decrypt( esp_aes_context *ctx, const unsigned char input[16], unsigned char output[16] ); 346 …e_t length, const unsigned char data_unit[16], const unsigned char *input, unsigned char *output ); 349 void esp_aes_decrypt( esp_aes_context *ctx, const unsigned char input[16], unsigned char output[16]… [all …]
|
D | esp_aes_gcm.h | 172 unsigned char *output, size_t output_size, 209 unsigned char *output, size_t output_size, 252 unsigned char *output, 289 unsigned char *output );
|
/hal_espressif-latest/tools/esptool_py/flasher_stub/ |
D | compare_stubs.py | 24 output = "" 29 output += " Data start: New {:#x}, old {:#x} \n".format( 33 output += " Text start: New {:#x}, old {:#x} \n".format( 37 output += " Entrypoint: New {:#x}, old {:#x} \n".format(new.entry, old.entry) 44 output += " Data byte {:#x}: new {:#04x} old {:#04x} \n".format( 48 output += " Data length: New {} bytes, old {} bytes \n".format( 57 output += " Text byte {:#x}: new {:#04x} old {:#04x} \n".format( 61 output += " Text length: New {} bytes, old {} bytes \n".format( 64 return output 81 output = diff(new, old) variable [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/utils/ |
D | wpa_debug.c | 56 char output[50]; in wpa_dump_mem() local 61 _wpa_snprintf_hex(output, 50, addr + i * 16, 16, 0, 1); in wpa_dump_mem() 62 wpa_printf(MSG_DEBUG, "%s", output); in wpa_dump_mem() 66 _wpa_snprintf_hex(output, 50, addr + bytes_printed, in wpa_dump_mem() 68 wpa_printf(MSG_DEBUG, "%s", output); in wpa_dump_mem() 86 char output[50]; in wpa_hexdump() local 96 _wpa_snprintf_hex(output, 50, buf + i * 16, 16, 0, 1); in wpa_hexdump() 97 wpa_printf(level, "%s", output); in wpa_hexdump() 101 _wpa_snprintf_hex(output, 50, buf + bytes_printed, in wpa_hexdump() 103 wpa_printf(level, "%s", output); in wpa_hexdump()
|
/hal_espressif-latest/tools/idf_monitor/idf_monitor_base/ |
D | ansi_color_converter.py | 64 def __init__(self, output=None, decode_output=False): argument 66 self.output = output 68 … self.handle = GetStdHandle(STD_ERROR_HANDLE if self.output == sys.stderr else STD_OUTPUT_HANDLE) 74 self.output.write(data.decode()) # type: ignore 76 self.output.write(data) # type: ignore 87 self.output.write('?') # type: ignore 124 self.output.flush() # type: ignore
|
/hal_espressif-latest/components/mbedtls/port/aes/ |
D | esp_aes_gcm.c | 207 unsigned char output[16] ) in gcm_mult() 245 PUT_UINT32_BE( zh >> 32, output, 0 ); in gcm_mult() 246 PUT_UINT32_BE( zh, output, 4 ); in gcm_mult() 247 PUT_UINT32_BE( zl >> 32, output, 8 ); in gcm_mult() 248 PUT_UINT32_BE( zl, output, 12 ); in gcm_mult() 488 unsigned char *output, size_t output_size, in esp_aes_gcm_update() argument 498 …return mbedtls_gcm_update_soft(ctx->ctx_soft, input, input_length, output, output_size, output_len… in esp_aes_gcm_update() 516 if (!output) { in esp_aes_gcm_update() 521 if ( output > input && (size_t) ( output - input ) < input_length ) { in esp_aes_gcm_update() 543 …et = esp_aes_crypt_ctr(&ctx->aes_ctx, input_length, &nc_off, nonce_counter, stream, input, output); in esp_aes_gcm_update() [all …]
|
/hal_espressif-latest/components/mbedtls/port/sha/ |
D | esp_sha.c | 28 void esp_sha(esp_sha_type sha_type, const unsigned char *input, size_t ilen, unsigned char *output) in esp_sha() argument 43 assert(input != NULL && output != NULL); in esp_sha() 51 ret = mbedtls_sha1_finish(&ctx.sha1, output); in esp_sha() 64 ret = mbedtls_sha256_finish(&ctx.sha256, output); in esp_sha() 77 ret = mbedtls_sha512_finish(&ctx.sha512, output); in esp_sha() 90 ret = mbedtls_sha512_finish(&ctx.sha512, output); in esp_sha()
|
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/ |
D | mbedtls_rom_osi.h | 68 …cb)( mbedtls_aes_context *ctx, int mode, const unsigned char input[16], unsigned char output[16] ); 69 …int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output ); 70 …_aes_encrypt)( mbedtls_aes_context *ctx, const unsigned char input[16], unsigned char output[16] ); 71 …_aes_decrypt)( mbedtls_aes_context *ctx, const unsigned char input[16], unsigned char output[16] ); 124 …ed char *add, size_t add_len, const unsigned char *input, unsigned char *output, unsigned char *ta… 125 …ed char *add, size_t add_len, const unsigned char *input, unsigned char *output, const unsigned ch… 129 …int (*_rom_mbedtls_cipher_finish)( mbedtls_cipher_context_t *ctx, unsigned char *output, size_t *o… 130 …*iv, size_t iv_len, const unsigned char *input, size_t ilen, unsigned char *output, size_t *olen ); 133 int (*_rom_mbedtls_cipher_cmac_finish)( mbedtls_cipher_context_t *ctx, unsigned char *output ); 138 …int (*_rom_mbedtls_ctr_drbg_random_with_add)( void *p_rng, unsigned char *output, size_t output_le… [all …]
|
/hal_espressif-latest/components/mbedtls/port/include/mbedtls/ |
D | gcm.h | 42 unsigned char *output, size_t output_size, 46 unsigned char *output, size_t output_size, 59 unsigned char *output, 73 unsigned char *output);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_cmac.c | 95 static void leftshift_onebit(UINT8 *input, UINT8 *output) in leftshift_onebit() argument 102 output[i] = (input[i] << 1) | overflow; in leftshift_onebit() 135 tSMP_ENC output; in cmac_aes_k_calculate() local 145 …key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET16_LEN, &output)) { in cmac_aes_k_calculate() 150 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate() 155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate() 254 tSMP_ENC output; in cmac_generate_subkey() local 257 if (SMP_Encrypt(key, BT_OCTET16_LEN, z, BT_OCTET16_LEN, &output)) { in cmac_generate_subkey() 258 cmac_subkey_cont(&output);; in cmac_generate_subkey()
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 99 _check_output_is_not_input(args.keyfile, args.output) 100 _check_output_is_not_input(args.image, args.output) 101 _check_output_is_not_input(args.iv, args.output) 148 if args.output is None: 149 args.output = os.path.splitext(args.image.name)[0] + "-digest-0x0000.bin" 150 with open(args.output, "wb") as f: 157 print("digest+image written to %s" % args.output) 346 _check_output_is_not_input(args.keyfile, args.output) 347 _check_output_is_not_input(args.datafile, args.output) 385 if args.output is None or os.path.abspath(args.output) == os.path.abspath( [all …]
|
/hal_espressif-latest/components/mbedtls/port/aes/dma/include/ |
D | esp_aes_dma_priv.h | 26 esp_err_t esp_aes_dma_start(const lldesc_t *input, const lldesc_t *output); 36 bool esp_aes_dma_done(const lldesc_t *output);
|
/hal_espressif-latest/components/mbedtls/port/ |
D | esp_hardware.c | 20 unsigned char *output, size_t len, size_t *olen ) in mbedtls_hardware_poll() argument 22 esp_fill_random(output, len); in mbedtls_hardware_poll()
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3/ |
D | fields.py | 293 output = "Flash voltage (VDD_SPI) determined by GPIO45 on reset " 294 output += "(GPIO45=High: VDD_SPI pin is powered from internal 1.8V LDO\n" 295 output += "GPIO45=Low or NC: VDD_SPI pin is powered directly from " 296 output += "VDD3P3_RTC_IO via resistor Rspi. " 297 output += "Typically this voltage is 3.3 V)." 299 output = "Flash voltage (VDD_SPI) internal regulator disabled by efuse." 301 output = "Flash voltage (VDD_SPI) set to 1.8V by efuse." 303 output = "Flash voltage (VDD_SPI) set to 3.3V by efuse." 304 return output 396 output = "Block%d has ERRORS:%d FAIL:%d" % (self.block, errs, fail) [all …]
|