/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | test.c | 38 int i, j, k; in bt_mesh_device_auto_enter_network() local 100 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network() 101 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network() 102 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network() 106 for (k = 0; k < ARRAY_SIZE(model->groups); k++) { in bt_mesh_device_auto_enter_network() 107 if (model->groups[k] == BLE_MESH_ADDR_UNASSIGNED) { in bt_mesh_device_auto_enter_network() 108 model->groups[k] = info->group_addr; in bt_mesh_device_auto_enter_network() 115 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network() 116 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network() 117 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network() [all …]
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
D | aes_encrypt.c | 70 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_encrypt_key() argument 81 } else if (k == (const uint8_t *) 0) { in tc_aes128_set_encrypt_key() 86 s->words[i] = (k[Nb*i]<<24) | (k[Nb*i+1]<<16) | in tc_aes128_set_encrypt_key() 87 (k[Nb*i+2]<<8) | (k[Nb*i+3]); in tc_aes128_set_encrypt_key() 101 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument 103 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key() 104 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key() 105 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key() 106 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key() 107 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key() [all …]
|
D | aes_decrypt.c | 62 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_decrypt_key() argument 64 return tc_aes128_set_encrypt_key(s, k); in tc_aes128_set_decrypt_key() 92 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument 94 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key() 95 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key() 96 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key() 97 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key() 98 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key() 99 s[10] ^= (uint8_t)(k[2] >> 8); s[11] ^= (uint8_t)(k[2]); in add_round_key() 100 s[12] ^= (uint8_t)(k[3] >> 24); s[13] ^= (uint8_t)(k[3] >> 16); in add_round_key() [all …]
|
D | ecc_dsa.c | 100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument 114 if (uECC_vli_isZero(k, num_words) || in uECC_sign_with_k() 115 uECC_vli_cmp(curve->n, k, num_n_words) != 1) { in uECC_sign_with_k() 119 carry = regularize_k(k, tmp, s, curve); in uECC_sign_with_k() 137 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */ in uECC_sign_with_k() 138 uECC_vli_modInv(k, k, curve->n, num_n_words); /* k = 1 / k' */ in uECC_sign_with_k() 139 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k() 152 uECC_vli_modMult(s, s, k, curve->n, num_n_words); /* s = (e + r*d) / k */ in uECC_sign_with_k() 165 uECC_word_t k[NUM_ECC_WORDS]; in uECC_sign() local 177 uECC_vli_mmod(k, _random, curve->n, BITS_TO_WORDS(curve->num_n_bits)); in uECC_sign() [all …]
|
D | cmac_mode.c | 224 uint8_t *k; in tc_cmac_final() local 235 k = (uint8_t *) s->K1; in tc_cmac_final() 242 k = (uint8_t *) s->K2; in tc_cmac_final() 245 s->iv[i] ^= s->leftover[i] ^ k[i]; in tc_cmac_final()
|
D | ecc.c | 266 wordcount_t i, k; in uECC_vli_mult() local 269 for (k = 0; k < num_words; ++k) { in uECC_vli_mult() 271 for (i = 0; i <= k; ++i) { in uECC_vli_mult() 272 muladd(left[i], right[k - i], &r0, &r1, &r2); in uECC_vli_mult() 275 result[k] = r0; in uECC_vli_mult() 281 for (k = num_words; k < num_words * 2 - 1; ++k) { in uECC_vli_mult() 283 for (i = (k + 1) - num_words; i < num_words; ++i) { in uECC_vli_mult() 284 muladd(left[i], right[k - i], &r0, &r1, &r2); in uECC_vli_mult() 286 result[k] = r0; in uECC_vli_mult() 774 uECC_word_t regularize_k(const uECC_word_t * const k, uECC_word_t *k0, in regularize_k() argument [all …]
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | aes_encrypt.c | 70 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_encrypt_key() argument 81 } else if (k == (const uint8_t *) 0) { in tc_aes128_set_encrypt_key() 86 s->words[i] = (k[Nb * i] << 24) | (k[Nb * i + 1] << 16) | in tc_aes128_set_encrypt_key() 87 (k[Nb * i + 2] << 8) | (k[Nb * i + 3]); in tc_aes128_set_encrypt_key() 101 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument 103 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key() 104 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key() 105 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key() 106 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key() 107 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key() [all …]
|
D | aes_decrypt.c | 62 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_decrypt_key() argument 64 return tc_aes128_set_encrypt_key(s, k); in tc_aes128_set_decrypt_key() 92 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument 94 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key() 95 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key() 96 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key() 97 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key() 98 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key() 99 s[10] ^= (uint8_t)(k[2] >> 8); s[11] ^= (uint8_t)(k[2]); in add_round_key() 100 s[12] ^= (uint8_t)(k[3] >> 24); s[13] ^= (uint8_t)(k[3] >> 16); in add_round_key() [all …]
|
D | ecc_dsa.c | 100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument 114 if (uECC_vli_isZero(k, num_words) || in uECC_sign_with_k() 115 uECC_vli_cmp(curve->n, k, num_n_words) != 1) { in uECC_sign_with_k() 119 carry = regularize_k(k, tmp, s, curve); in uECC_sign_with_k() 136 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */ in uECC_sign_with_k() 137 uECC_vli_modInv(k, k, curve->n, num_n_words); /* k = 1 / k' */ in uECC_sign_with_k() 138 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k() 151 uECC_vli_modMult(s, s, k, curve->n, num_n_words); /* s = (e + r*d) / k */ in uECC_sign_with_k() 164 uECC_word_t k[NUM_ECC_WORDS]; in uECC_sign() local 176 uECC_vli_mmod(k, _random, curve->n, BITS_TO_WORDS(curve->num_n_bits)); in uECC_sign() [all …]
|
D | cmac_mode.c | 224 uint8_t *k; in tc_cmac_final() local 235 k = (uint8_t *) s->K1; in tc_cmac_final() 242 k = (uint8_t *) s->K2; in tc_cmac_final() 245 s->iv[i] ^= s->leftover[i] ^ k[i]; in tc_cmac_final()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | aes.c | 375 static void copy_and_key( void *d, const void *s, const void *k ) in copy_and_key() argument 378 ((uint_32t *)d)[ 0] = ((uint_32t *)s)[ 0] ^ ((uint_32t *)k)[ 0]; in copy_and_key() 379 ((uint_32t *)d)[ 1] = ((uint_32t *)s)[ 1] ^ ((uint_32t *)k)[ 1]; in copy_and_key() 380 ((uint_32t *)d)[ 2] = ((uint_32t *)s)[ 2] ^ ((uint_32t *)k)[ 2]; in copy_and_key() 381 ((uint_32t *)d)[ 3] = ((uint_32t *)s)[ 3] ^ ((uint_32t *)k)[ 3]; in copy_and_key() 383 ((uint_8t *)d)[ 0] = ((uint_8t *)s)[ 0] ^ ((uint_8t *)k)[ 0]; in copy_and_key() 384 ((uint_8t *)d)[ 1] = ((uint_8t *)s)[ 1] ^ ((uint_8t *)k)[ 1]; in copy_and_key() 385 ((uint_8t *)d)[ 2] = ((uint_8t *)s)[ 2] ^ ((uint_8t *)k)[ 2]; in copy_and_key() 386 ((uint_8t *)d)[ 3] = ((uint_8t *)s)[ 3] ^ ((uint_8t *)k)[ 3]; in copy_and_key() 387 ((uint_8t *)d)[ 4] = ((uint_8t *)s)[ 4] ^ ((uint_8t *)k)[ 4]; in copy_and_key() [all …]
|
D | p_256_ecc_pp.c | 159 static void ECC_NAF(uint8_t *naf, uint32_t *NumNAF, DWORD *k, uint32_t keyLength) in ECC_NAF() argument 166 while ((var = multiprecision_most_signbits(k, keyLength)) >= 1) { in ECC_NAF() 167 if (k[0] & 0x01) { // k is odd in ECC_NAF() 168 sign = (k[0] & 0x03); // 1 or 3 in ECC_NAF() 172 k[0] = k[0] & 0xFFFFFFFE; in ECC_NAF() 174 k[0] = k[0] + 1; in ECC_NAF() 175 if (k[0] == 0) { //overflow in ECC_NAF() 178 k[j]++; in ECC_NAF() 179 } while (k[j++] == 0); //overflow in ECC_NAF() 186 multiprecision_rshift(k, k, keyLength); in ECC_NAF()
|
/hal_espressif-latest/components/bt/host/bluedroid/external/sbc/encoder/srce/ |
D | sbc_dct.c | 162 UINT8 Index, k; in SBC_FastIDCT8() 167 for (k = 0; k < 16; k++) { in SBC_FastIDCT8() 169 temp += (gas16AnalDCTcoeff8[(Index * 8 * 2) + k] * (pInVect[k] >> 16)); in SBC_FastIDCT8() 170 temp += ((gas16AnalDCTcoeff8[(Index * 8 * 2) + k] * (pInVect[k] & 0xFFFF)) >> 16); in SBC_FastIDCT8() 229 UINT8 Index, k; in SBC_FastIDCT4() 234 for (k = 0; k < 8; k++) { in SBC_FastIDCT4() 236 temp += (gas16AnalDCTcoeff4[(Index * 4 * 2) + k] * (pInVect[k] >> 16)); in SBC_FastIDCT4() 237 temp += ((gas16AnalDCTcoeff4[(Index * 4 * 2) + k] * (pInVect[k] & 0xFFFF)) >> 16); in SBC_FastIDCT4()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | rc4.c | 19 u32 i, j, k; in rc4_skip() local 38 for (k = 0; k < skip; k++) { in rc4_skip() 46 for (k = 0; k < data_len; k++) { in rc4_skip()
|
/hal_espressif-latest/components/esp_adc/ |
D | adc_common.c | 71 for (int k = 0; k < SOC_ADC_CHANNEL_NUM(i); k++) { in adc_hw_calibration() local 72 adc_load_hw_calibration_chan_compens(i, k, j); in adc_hw_calibration()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/ |
D | rfc_port_if.c | 145 UINT8 k; in RFCOMM_ParNegReq() local 167 k = (p_port->credit_rx_max < RFCOMM_K_MAX) ? p_port->credit_rx_max : RFCOMM_K_MAX; in RFCOMM_ParNegReq() 168 p_port->credit_rx = k; in RFCOMM_ParNegReq() 171 k = 0; in RFCOMM_ParNegReq() 177 rfc_send_pn (p_mcb, dlci, TRUE, mtu, cl, k); in RFCOMM_ParNegReq() 191 void RFCOMM_ParNegRsp (tRFC_MCB *p_mcb, UINT8 dlci, UINT16 mtu, UINT8 cl, UINT8 k) in RFCOMM_ParNegRsp() argument 198 rfc_send_pn (p_mcb, dlci, FALSE, mtu, cl, k); in RFCOMM_ParNegRsp()
|
/hal_espressif-latest/tools/idf_monitor/idf_monitor_base/ |
D | web_socket_client.py | 104 if all([k in obj and obj[k] == v for k, v in expect_iterable]):
|
D | console_parser.py | 25 k = CTRL_T # ignore CTRL-T here, so people can muscle-memory Ctrl-T Ctrl-F, etc. 26 while k == CTRL_T: 27 k = console.getkey() 30 ret = console_parser.parse_next_action_key(k)
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
D | aes.h | 79 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k); 110 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k);
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | aes.h | 79 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k); 110 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k);
|
/hal_espressif-latest/components/soc/ |
D | Kconfig | 33 # Some chips support different flash MMU page sizes: 64k, 32k, 16k.
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | fastpbkdf2.c | 112 uint8_t k[_blocksz]; \ 119 _final(&ctx->inner, k); \ 121 key = k; \ 129 if (k != key) \ 130 memcpy(k, key, nkey); \ 132 memset(k + nkey, 0, _blocksz - nkey); \ 140 blk_inner[i] = 0x36 ^ k[i]; \ 141 blk_outer[i] = 0x5c ^ k[i]; \
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/sys/ |
D | utl.c | 121 UINT16 j, k; in utl_itoa() local 130 k = i / j; in utl_itoa() 132 if (k > 0 || fill) { in utl_itoa() 133 *p++ = k + '0'; in utl_itoa()
|
/hal_espressif-latest/components/esp_hw_support/port/esp32/ |
D | Kconfig.rtc | 53 - "Method 1" option can't ensure 100% to solve the external 32k crystal start failed 55 - "Method 2" option can solve the external 32k issue, but the touchpad can't work 84 - 32768 Hz if the 32k crystal oscillator is used. For this use value 3000 or more. 89 int "Number of attempts to repeat 32k XTAL calibration" 93 Number of attempts to repeat 32k XTAL calibration 95 Increase this option if the 32k crystal oscillator
|
/hal_espressif-latest/components/esp_hw_support/port/esp32s2/ |
D | Kconfig.rtc | 52 - 32768 Hz if the 32k crystal oscillator is used. For this use value 3000 or more. 57 int "Number of attempts to repeat 32k XTAL calibration" 61 Number of attempts to repeat 32k XTAL calibration 63 Increase this option if the 32k crystal oscillator
|