Home
last modified time | relevance | path

Searched refs:k (Results 1 – 25 of 66) sorted by relevance

123

/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/
Dtest.c38 int i, j, k; in bt_mesh_device_auto_enter_network() local
100 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network()
101 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network()
102 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network()
106 for (k = 0; k < ARRAY_SIZE(model->groups); k++) { in bt_mesh_device_auto_enter_network()
107 if (model->groups[k] == BLE_MESH_ADDR_UNASSIGNED) { in bt_mesh_device_auto_enter_network()
108 model->groups[k] = info->group_addr; in bt_mesh_device_auto_enter_network()
115 for (k = 0; k < ARRAY_SIZE(model->keys); k++) { in bt_mesh_device_auto_enter_network()
116 if (model->keys[k] == BLE_MESH_KEY_UNUSED) { in bt_mesh_device_auto_enter_network()
117 model->keys[k] = info->app_idx; in bt_mesh_device_auto_enter_network()
[all …]
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/
Daes_encrypt.c70 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_encrypt_key() argument
81 } else if (k == (const uint8_t *) 0) { in tc_aes128_set_encrypt_key()
86 s->words[i] = (k[Nb*i]<<24) | (k[Nb*i+1]<<16) | in tc_aes128_set_encrypt_key()
87 (k[Nb*i+2]<<8) | (k[Nb*i+3]); in tc_aes128_set_encrypt_key()
101 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument
103 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key()
104 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key()
105 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key()
106 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key()
107 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key()
[all …]
Daes_decrypt.c62 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_decrypt_key() argument
64 return tc_aes128_set_encrypt_key(s, k); in tc_aes128_set_decrypt_key()
92 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument
94 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key()
95 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key()
96 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key()
97 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key()
98 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key()
99 s[10] ^= (uint8_t)(k[2] >> 8); s[11] ^= (uint8_t)(k[2]); in add_round_key()
100 s[12] ^= (uint8_t)(k[3] >> 24); s[13] ^= (uint8_t)(k[3] >> 16); in add_round_key()
[all …]
Decc_dsa.c100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument
114 if (uECC_vli_isZero(k, num_words) || in uECC_sign_with_k()
115 uECC_vli_cmp(curve->n, k, num_n_words) != 1) { in uECC_sign_with_k()
119 carry = regularize_k(k, tmp, s, curve); in uECC_sign_with_k()
137 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */ in uECC_sign_with_k()
138 uECC_vli_modInv(k, k, curve->n, num_n_words); /* k = 1 / k' */ in uECC_sign_with_k()
139 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k()
152 uECC_vli_modMult(s, s, k, curve->n, num_n_words); /* s = (e + r*d) / k */ in uECC_sign_with_k()
165 uECC_word_t k[NUM_ECC_WORDS]; in uECC_sign() local
177 uECC_vli_mmod(k, _random, curve->n, BITS_TO_WORDS(curve->num_n_bits)); in uECC_sign()
[all …]
Dcmac_mode.c224 uint8_t *k; in tc_cmac_final() local
235 k = (uint8_t *) s->K1; in tc_cmac_final()
242 k = (uint8_t *) s->K2; in tc_cmac_final()
245 s->iv[i] ^= s->leftover[i] ^ k[i]; in tc_cmac_final()
Decc.c266 wordcount_t i, k; in uECC_vli_mult() local
269 for (k = 0; k < num_words; ++k) { in uECC_vli_mult()
271 for (i = 0; i <= k; ++i) { in uECC_vli_mult()
272 muladd(left[i], right[k - i], &r0, &r1, &r2); in uECC_vli_mult()
275 result[k] = r0; in uECC_vli_mult()
281 for (k = num_words; k < num_words * 2 - 1; ++k) { in uECC_vli_mult()
283 for (i = (k + 1) - num_words; i < num_words; ++i) { in uECC_vli_mult()
284 muladd(left[i], right[k - i], &r0, &r1, &r2); in uECC_vli_mult()
286 result[k] = r0; in uECC_vli_mult()
774 uECC_word_t regularize_k(const uECC_word_t * const k, uECC_word_t *k0, in regularize_k() argument
[all …]
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Daes_encrypt.c70 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_encrypt_key() argument
81 } else if (k == (const uint8_t *) 0) { in tc_aes128_set_encrypt_key()
86 s->words[i] = (k[Nb * i] << 24) | (k[Nb * i + 1] << 16) | in tc_aes128_set_encrypt_key()
87 (k[Nb * i + 2] << 8) | (k[Nb * i + 3]); in tc_aes128_set_encrypt_key()
101 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument
103 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key()
104 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key()
105 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key()
106 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key()
107 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key()
[all …]
Daes_decrypt.c62 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k) in tc_aes128_set_decrypt_key() argument
64 return tc_aes128_set_encrypt_key(s, k); in tc_aes128_set_decrypt_key()
92 static inline void add_round_key(uint8_t *s, const unsigned int *k) in add_round_key() argument
94 s[0] ^= (uint8_t)(k[0] >> 24); s[1] ^= (uint8_t)(k[0] >> 16); in add_round_key()
95 s[2] ^= (uint8_t)(k[0] >> 8); s[3] ^= (uint8_t)(k[0]); in add_round_key()
96 s[4] ^= (uint8_t)(k[1] >> 24); s[5] ^= (uint8_t)(k[1] >> 16); in add_round_key()
97 s[6] ^= (uint8_t)(k[1] >> 8); s[7] ^= (uint8_t)(k[1]); in add_round_key()
98 s[8] ^= (uint8_t)(k[2] >> 24); s[9] ^= (uint8_t)(k[2] >> 16); in add_round_key()
99 s[10] ^= (uint8_t)(k[2] >> 8); s[11] ^= (uint8_t)(k[2]); in add_round_key()
100 s[12] ^= (uint8_t)(k[3] >> 24); s[13] ^= (uint8_t)(k[3] >> 16); in add_round_key()
[all …]
Decc_dsa.c100 unsigned hash_size, uECC_word_t *k, uint8_t *signature, in uECC_sign_with_k() argument
114 if (uECC_vli_isZero(k, num_words) || in uECC_sign_with_k()
115 uECC_vli_cmp(curve->n, k, num_n_words) != 1) { in uECC_sign_with_k()
119 carry = regularize_k(k, tmp, s, curve); in uECC_sign_with_k()
136 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */ in uECC_sign_with_k()
137 uECC_vli_modInv(k, k, curve->n, num_n_words); /* k = 1 / k' */ in uECC_sign_with_k()
138 uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */ in uECC_sign_with_k()
151 uECC_vli_modMult(s, s, k, curve->n, num_n_words); /* s = (e + r*d) / k */ in uECC_sign_with_k()
164 uECC_word_t k[NUM_ECC_WORDS]; in uECC_sign() local
176 uECC_vli_mmod(k, _random, curve->n, BITS_TO_WORDS(curve->num_n_bits)); in uECC_sign()
[all …]
Dcmac_mode.c224 uint8_t *k; in tc_cmac_final() local
235 k = (uint8_t *) s->K1; in tc_cmac_final()
242 k = (uint8_t *) s->K2; in tc_cmac_final()
245 s->iv[i] ^= s->leftover[i] ^ k[i]; in tc_cmac_final()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Daes.c375 static void copy_and_key( void *d, const void *s, const void *k ) in copy_and_key() argument
378 ((uint_32t *)d)[ 0] = ((uint_32t *)s)[ 0] ^ ((uint_32t *)k)[ 0]; in copy_and_key()
379 ((uint_32t *)d)[ 1] = ((uint_32t *)s)[ 1] ^ ((uint_32t *)k)[ 1]; in copy_and_key()
380 ((uint_32t *)d)[ 2] = ((uint_32t *)s)[ 2] ^ ((uint_32t *)k)[ 2]; in copy_and_key()
381 ((uint_32t *)d)[ 3] = ((uint_32t *)s)[ 3] ^ ((uint_32t *)k)[ 3]; in copy_and_key()
383 ((uint_8t *)d)[ 0] = ((uint_8t *)s)[ 0] ^ ((uint_8t *)k)[ 0]; in copy_and_key()
384 ((uint_8t *)d)[ 1] = ((uint_8t *)s)[ 1] ^ ((uint_8t *)k)[ 1]; in copy_and_key()
385 ((uint_8t *)d)[ 2] = ((uint_8t *)s)[ 2] ^ ((uint_8t *)k)[ 2]; in copy_and_key()
386 ((uint_8t *)d)[ 3] = ((uint_8t *)s)[ 3] ^ ((uint_8t *)k)[ 3]; in copy_and_key()
387 ((uint_8t *)d)[ 4] = ((uint_8t *)s)[ 4] ^ ((uint_8t *)k)[ 4]; in copy_and_key()
[all …]
Dp_256_ecc_pp.c159 static void ECC_NAF(uint8_t *naf, uint32_t *NumNAF, DWORD *k, uint32_t keyLength) in ECC_NAF() argument
166 while ((var = multiprecision_most_signbits(k, keyLength)) >= 1) { in ECC_NAF()
167 if (k[0] & 0x01) { // k is odd in ECC_NAF()
168 sign = (k[0] & 0x03); // 1 or 3 in ECC_NAF()
172 k[0] = k[0] & 0xFFFFFFFE; in ECC_NAF()
174 k[0] = k[0] + 1; in ECC_NAF()
175 if (k[0] == 0) { //overflow in ECC_NAF()
178 k[j]++; in ECC_NAF()
179 } while (k[j++] == 0); //overflow in ECC_NAF()
186 multiprecision_rshift(k, k, keyLength); in ECC_NAF()
/hal_espressif-latest/components/bt/host/bluedroid/external/sbc/encoder/srce/
Dsbc_dct.c162 UINT8 Index, k; in SBC_FastIDCT8()
167 for (k = 0; k < 16; k++) { in SBC_FastIDCT8()
169 temp += (gas16AnalDCTcoeff8[(Index * 8 * 2) + k] * (pInVect[k] >> 16)); in SBC_FastIDCT8()
170 temp += ((gas16AnalDCTcoeff8[(Index * 8 * 2) + k] * (pInVect[k] & 0xFFFF)) >> 16); in SBC_FastIDCT8()
229 UINT8 Index, k; in SBC_FastIDCT4()
234 for (k = 0; k < 8; k++) { in SBC_FastIDCT4()
236 temp += (gas16AnalDCTcoeff4[(Index * 4 * 2) + k] * (pInVect[k] >> 16)); in SBC_FastIDCT4()
237 temp += ((gas16AnalDCTcoeff4[(Index * 4 * 2) + k] * (pInVect[k] & 0xFFFF)) >> 16); in SBC_FastIDCT4()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Drc4.c19 u32 i, j, k; in rc4_skip() local
38 for (k = 0; k < skip; k++) { in rc4_skip()
46 for (k = 0; k < data_len; k++) { in rc4_skip()
/hal_espressif-latest/components/esp_adc/
Dadc_common.c71 for (int k = 0; k < SOC_ADC_CHANNEL_NUM(i); k++) { in adc_hw_calibration() local
72 adc_load_hw_calibration_chan_compens(i, k, j); in adc_hw_calibration()
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/
Drfc_port_if.c145 UINT8 k; in RFCOMM_ParNegReq() local
167 k = (p_port->credit_rx_max < RFCOMM_K_MAX) ? p_port->credit_rx_max : RFCOMM_K_MAX; in RFCOMM_ParNegReq()
168 p_port->credit_rx = k; in RFCOMM_ParNegReq()
171 k = 0; in RFCOMM_ParNegReq()
177 rfc_send_pn (p_mcb, dlci, TRUE, mtu, cl, k); in RFCOMM_ParNegReq()
191 void RFCOMM_ParNegRsp (tRFC_MCB *p_mcb, UINT8 dlci, UINT16 mtu, UINT8 cl, UINT8 k) in RFCOMM_ParNegRsp() argument
198 rfc_send_pn (p_mcb, dlci, FALSE, mtu, cl, k); in RFCOMM_ParNegRsp()
/hal_espressif-latest/tools/idf_monitor/idf_monitor_base/
Dweb_socket_client.py104 if all([k in obj and obj[k] == v for k, v in expect_iterable]):
Dconsole_parser.py25 k = CTRL_T # ignore CTRL-T here, so people can muscle-memory Ctrl-T Ctrl-F, etc.
26 while k == CTRL_T:
27 k = console.getkey()
30 ret = console_parser.parse_next_action_key(k)
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/
Daes.h79 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k);
110 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k);
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Daes.h79 int tc_aes128_set_encrypt_key(TCAesKeySched_t s, const uint8_t *k);
110 int tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k);
/hal_espressif-latest/components/soc/
DKconfig33 # Some chips support different flash MMU page sizes: 64k, 32k, 16k.
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dfastpbkdf2.c112 uint8_t k[_blocksz]; \
119 _final(&ctx->inner, k); \
121 key = k; \
129 if (k != key) \
130 memcpy(k, key, nkey); \
132 memset(k + nkey, 0, _blocksz - nkey); \
140 blk_inner[i] = 0x36 ^ k[i]; \
141 blk_outer[i] = 0x5c ^ k[i]; \
/hal_espressif-latest/components/bt/host/bluedroid/bta/sys/
Dutl.c121 UINT16 j, k; in utl_itoa() local
130 k = i / j; in utl_itoa()
132 if (k > 0 || fill) { in utl_itoa()
133 *p++ = k + '0'; in utl_itoa()
/hal_espressif-latest/components/esp_hw_support/port/esp32/
DKconfig.rtc53 - "Method 1" option can't ensure 100% to solve the external 32k crystal start failed
55 - "Method 2" option can solve the external 32k issue, but the touchpad can't work
84 - 32768 Hz if the 32k crystal oscillator is used. For this use value 3000 or more.
89 int "Number of attempts to repeat 32k XTAL calibration"
93 Number of attempts to repeat 32k XTAL calibration
95 Increase this option if the 32k crystal oscillator
/hal_espressif-latest/components/esp_hw_support/port/esp32s2/
DKconfig.rtc52 - 32768 Hz if the 32k crystal oscillator is used. For this use value 3000 or more.
57 int "Number of attempts to repeat 32k XTAL calibration"
61 Number of attempts to repeat 32k XTAL calibration
63 Increase this option if the 32k crystal oscillator

123