/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot_signatures_bootloader.c | 30 esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length) in esp_secure_boot_verify_signature() argument 36 ESP_LOGD(TAG, "verifying signature src_addr 0x%x length 0x%x", src_addr, length); in esp_secure_boot_verify_signature() 38 esp_err_t err = bootloader_sha256_flash_contents(src_addr, length, digest); in esp_secure_boot_verify_signature() 44 …sigblock = (const esp_secure_boot_sig_block_t *) bootloader_mmap(src_addr + length, sizeof(esp_sec… in esp_secure_boot_verify_signature() 46 …ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", src_addr + length, sizeof(esp_secure_boot_sig_… in esp_secure_boot_verify_signature()
|
D | secure_boot_signatures_app.c | 31 esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length) in esp_secure_boot_verify_signature() argument 37 ESP_LOGD(TAG, "verifying signature src_addr 0x%"PRIx32" length 0x%"PRIx32, src_addr, length); in esp_secure_boot_verify_signature() 39 esp_err_t err = bootloader_sha256_flash_contents(src_addr, length, digest); in esp_secure_boot_verify_signature() 41 ESP_LOGE(TAG, "Digest calculation failed 0x%"PRIx32", 0x%"PRIx32, src_addr, length); in esp_secure_boot_verify_signature() 46 …sigblock = (const esp_secure_boot_sig_block_t *)bootloader_mmap(src_addr + length, sizeof(esp_secu… in esp_secure_boot_verify_signature() 48 …ESP_LOGE(TAG, "bootloader_mmap(0x%"PRIx32", 0x%x) failed", src_addr + length, sizeof(esp_secure_bo… in esp_secure_boot_verify_signature()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/include/bta/ |
D | bta_gattc_co.h | 130 extern BOOLEAN bta_gattc_co_cache_new_assoc_list(BD_ADDR src_addr, uint8_t index); 132 extern BOOLEAN bta_gattc_co_cache_append_assoc_addr(BD_ADDR src_addr, BD_ADDR assoc_addr); 134 extern BOOLEAN bta_gattc_co_cache_remove_assoc_addr(BD_ADDR src_addr, BD_ADDR assoc_addr); 138 extern BOOLEAN bta_gattc_co_cache_clear_assoc_addr(BD_ADDR src_addr);
|
/hal_espressif-latest/components/bootloader_support/bootloader_flash/include/ |
D | bootloader_flash_priv.h | 90 const void *bootloader_mmap(uint32_t src_addr, uint32_t size); 93 const void *esp_rom_flash_mmap(uint32_t src_addr, uint32_t size); 120 esp_err_t bootloader_flash_read(size_t src_addr, void *dest, size_t size, bool allow_decrypt); 123 esp_err_t esp_rom_flash_read(size_t src_addr, void *dest, size_t size, bool allow_decrypt);
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/ |
D | secure_boot_signatures_bootloader.c | 27 esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length) in esp_secure_boot_verify_signature() argument 34 ESP_LOGD(TAG, "verifying signature src_addr 0x%x length 0x%x", src_addr, length); in esp_secure_boot_verify_signature() 37 esp_err_t err = bootloader_sha256_flash_contents(src_addr, padded_length, digest); in esp_secure_boot_verify_signature() 39 ESP_LOGE(TAG, "Digest calculation failed 0x%x, 0x%x", src_addr, padded_length); in esp_secure_boot_verify_signature() 43 …const ets_secure_boot_signature_t *sig_block = bootloader_mmap(src_addr + padded_length, sizeof(et… in esp_secure_boot_verify_signature() 45 ESP_LOGE(TAG, "Failed to mmap data at offset 0x%x", src_addr + padded_length); in esp_secure_boot_verify_signature()
|
D | secure_boot_signatures_app.c | 169 esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length) in esp_secure_boot_verify_signature() argument 176 ESP_LOGD(TAG, "verifying signature src_addr 0x%"PRIx32" length 0x%"PRIx32, src_addr, length); in esp_secure_boot_verify_signature() 178 esp_err_t err = bootloader_sha256_flash_contents(src_addr, padded_length, digest); in esp_secure_boot_verify_signature() 180 ESP_LOGE(TAG, "Digest calculation failed 0x%"PRIx32", 0x%"PRIx32, src_addr, padded_length); in esp_secure_boot_verify_signature() 184 …const ets_secure_boot_signature_t *sig_block = bootloader_mmap(src_addr + padded_length, sizeof(et… in esp_secure_boot_verify_signature() 186 ESP_LOGE(TAG, "Failed to mmap data at offset 0x%"PRIx32, src_addr + padded_length); in esp_secure_boot_verify_signature()
|
/hal_espressif-latest/components/bootloader_support/bootloader_flash/src/ |
D | bootloader_flash.c | 62 const void *bootloader_mmap(uint32_t src_addr, uint32_t size) in bootloader_mmap() argument 69 uint32_t src_page = src_addr & ~(SPI_FLASH_MMU_PAGE_SIZE - 1); in bootloader_mmap() 70 size += (src_addr - src_page); in bootloader_mmap() 76 return (void *)((intptr_t)result + (src_addr - src_page)); in bootloader_mmap() 270 static esp_err_t bootloader_flash_read_no_decrypt(size_t src_addr, void *dest, size_t size) in bootloader_flash_read_no_decrypt() argument 279 esp_rom_spiflash_result_t r = esp_rom_spiflash_read(src_addr, dest, size); in bootloader_flash_read_no_decrypt() 290 static esp_err_t bootloader_flash_read_allow_decrypt(size_t src_addr, void *dest, size_t size) in bootloader_flash_read_allow_decrypt() argument 295 uint32_t word_src = src_addr + word * 4; /* Read this offset from flash */ in bootloader_flash_read_allow_decrypt() 339 esp_err_t bootloader_flash_read(size_t src_addr, void *dest, size_t size, bool allow_decrypt) in bootloader_flash_read() argument 341 if (src_addr & 3) { in bootloader_flash_read() [all …]
|
/hal_espressif-latest/zephyr/port/bootloader/ |
D | bootloader_flash.c | 59 const void *bootloader_mmap(uint32_t src_addr, uint32_t size) in bootloader_mmap() argument 66 uint32_t src_page = src_addr & ~(SPI_FLASH_MMU_PAGE_SIZE - 1); in bootloader_mmap() 67 size += (src_addr - src_page); in bootloader_mmap() 73 return (void *)((intptr_t)result + (src_addr - src_page)); in bootloader_mmap() 265 static esp_err_t bootloader_flash_read_no_decrypt(size_t src_addr, void *dest, size_t size) in bootloader_flash_read_no_decrypt() argument 274 esp_rom_spiflash_result_t r = esp_rom_spiflash_read(src_addr, dest, size); in bootloader_flash_read_no_decrypt() 285 static esp_err_t bootloader_flash_read_allow_decrypt(size_t src_addr, void *dest, size_t size) in bootloader_flash_read_allow_decrypt() argument 290 uint32_t word_src = src_addr + word * 4; /* Read this offset from flash */ in bootloader_flash_read_allow_decrypt() 334 esp_err_t esp_rom_flash_read(size_t src_addr, void *dest, size_t size, bool allow_decrypt) in esp_rom_flash_read() argument 336 if (src_addr & 3) { in esp_rom_flash_read() [all …]
|
/hal_espressif-latest/components/spi_flash/sim/ |
D | SpiFlash.cpp | 200 esp_rom_spiflash_result_t SpiFlash::read(uint32_t src_addr, void *dest, uint32_t size) in read() argument 211 start = src_addr / this->get_sector_size(); in read() 212 end = size > 0 ? (src_addr + size - 1) / this->get_sector_size() : start; in read() 222 memcpy(dest, &this->memory[src_addr], size); in read()
|
D | flash_mock.cpp | 53 extern "C" esp_err_t spi_flash_mmap(size_t src_addr, size_t size, spi_flash_mmap_memory_t memory, in spi_flash_mmap() argument 57 *out_ptr = (void*)spiflash.get_memory_ptr(src_addr); in spi_flash_mmap()
|
D | SpiFlash.h | 38 esp_rom_spiflash_result_t read(uint32_t src_addr, void *dest, uint32_t size);
|
/hal_espressif-latest/tools/esptool_py/flasher_stub/ |
D | stub_write_flash.c | 174 static esp_rom_spiflash_result_t SPIWrite4B(int spi_num, uint32_t target, uint8_t *src_addr, int32_… in SPIWrite4B() argument 183 page_program_internal(spi_num, target, src_addr, len); in SPIWrite4B() 185 page_program_internal(spi_num, target, src_addr, pgm_len); in SPIWrite4B() 189 page_program_internal(spi_num, target + pgm_len, (src_addr + pgm_len), page_size); in SPIWrite4B() 193 page_program_internal(spi_num, target + pgm_len, (src_addr + pgm_len), len - pgm_len); in SPIWrite4B()
|
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/ |
D | flash_encrypt.c | 433 esp_err_t esp_flash_encrypt_region(uint32_t src_addr, size_t data_length) in esp_flash_encrypt_region() argument 438 if (src_addr % FLASH_SECTOR_SIZE != 0) { in esp_flash_encrypt_region() 439 ESP_LOGE(TAG, "esp_flash_encrypt_region bad src_addr 0x%x", src_addr); in esp_flash_encrypt_region() 449 uint32_t sec_start = i + src_addr; in esp_flash_encrypt_region()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/gatt/ |
D | bta_gattc_co.c | 590 BOOLEAN bta_gattc_co_cache_new_assoc_list(BD_ADDR src_addr, UINT8 index) in bta_gattc_co_cache_new_assoc_list() argument 597 BOOLEAN bta_gattc_co_cache_append_assoc_addr(BD_ADDR src_addr, BD_ADDR assoc_addr) in bta_gattc_co_cache_append_assoc_addr() argument 606 if ((addr_index = bta_gattc_co_find_addr_in_cache(src_addr)) != INVALID_ADDR_NUM) { in bta_gattc_co_cache_append_assoc_addr() 619 BOOLEAN bta_gattc_co_cache_remove_assoc_addr(BD_ADDR src_addr, BD_ADDR assoc_addr) in bta_gattc_co_cache_remove_assoc_addr() argument 623 if ((addr_index = bta_gattc_co_find_addr_in_cache(src_addr)) != INVALID_ADDR_NUM) { in bta_gattc_co_cache_remove_assoc_addr() 674 BOOLEAN bta_gattc_co_cache_clear_assoc_addr(BD_ADDR src_addr) in bta_gattc_co_cache_clear_assoc_addr() argument 678 if ((addr_index = bta_gattc_co_find_addr_in_cache(src_addr)) != INVALID_ADDR_NUM) { in bta_gattc_co_cache_clear_assoc_addr()
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.h | 76 size_t ies_len, const u8 *src_addr); 118 const u8 *src_addr) in wpa_ft_validate_reassoc_resp() argument
|
D | wpa_i.h | 208 int wpa_sm_rx_eapol(u8 *src_addr, u8 *buf, u32 len); 210 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr,
|
D | wpa.c | 395 const unsigned char *src_addr, in wpa_supplicant_get_pmk() argument 405 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid, in wpa_supplicant_get_pmk() 464 NULL, NULL, 0, src_addr, sm->own_addr, in wpa_supplicant_get_pmk() 468 pmksa_cache_get(sm->pmksa, src_addr, pmkid, NULL)) in wpa_supplicant_get_pmk() 646 static int wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, in wpa_derive_ptk() argument 651 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); in wpa_derive_ptk() 660 const unsigned char *src_addr, in wpa_supplicant_process_1_of_4() argument 699 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); in wpa_supplicant_process_1_of_4() 729 wpa_derive_ptk(sm, src_addr, key, ptk); in wpa_supplicant_process_1_of_4() 1063 const char *reason, const u8 *src_addr, in wpa_report_ie_mismatch() argument [all …]
|
/hal_espressif-latest/components/bootloader_support/include/ |
D | esp_flash_encrypt.h | 142 esp_err_t esp_flash_encrypt_region(uint32_t src_addr, size_t data_length);
|
D | esp_secure_boot.h | 173 esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length);
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_eap_client.c | 63 static int eap_sm_rx_eapol_internal(u8 *src_addr, u8 *buf, u32 len, uint8_t *bssid); 463 static int eap_sm_rx_eapol(u8 *src_addr, u8 *buf, u32 len, uint8_t *bssid) in eap_sm_rx_eapol() argument 486 memcpy(param->sa, src_addr, WPA_ADDR_LEN); in eap_sm_rx_eapol() 493 return eap_sm_rx_eapol_internal(src_addr, buf, len, bssid); in eap_sm_rx_eapol() 497 static int wpa2_ent_rx_eapol(u8 *src_addr, u8 *buf, u32 len, uint8_t *bssid) in wpa2_ent_rx_eapol() argument 508 ret = eap_sm_rx_eapol(src_addr, buf, len, bssid); in wpa2_ent_rx_eapol() 511 ret = wpa_sm_rx_eapol(src_addr, buf, len); in wpa2_ent_rx_eapol() 521 static int eap_sm_rx_eapol_internal(u8 *src_addr, u8 *buf, u32 len, uint8_t *bssid) in eap_sm_rx_eapol_internal() argument
|
D | esp_wifi_driver.h | 125 int (*wpa_sta_rx_eapol)(u8 *src_addr, u8 *buf, u32 len); 149 int (*wpa2_sm_rx_eapol)(u8 *src_addr, u8 *buf, u32 len, u8 *bssid); 159 int (*wps_sm_rx_eapol)(u8 *src_addr, u8 *buf, u32 len);
|
D | esp_wps_i.h | 106 int wps_sm_rx_eapol(u8 *src_addr, u8 *buf, u32 len);
|
/hal_espressif-latest/components/spi_flash/include/ |
D | spi_flash_mmap.h | 68 esp_err_t spi_flash_mmap(size_t src_addr, size_t size, spi_flash_mmap_memory_t memory,
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_now.h | 88 uint8_t * src_addr; /**< Source address of ESPNOW packet */ member
|
/hal_espressif-latest/components/esp_rom/include/ |
D | esp_rom_spiflash.h | 251 esp_rom_spiflash_result_t esp_rom_spiflash_read(uint32_t src_addr, uint32_t *dest, int32_t len);
|