Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 37) sorted by relevance

12

/device/soc/winnermicro/wm800/board/src/bt/blehost/ext/tinycrypt/src/
Dhmac.c37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument
43 for (i = 0; i < key_size; ++i) { in rekey()
55 unsigned int key_size) in tc_hmac_set_key() argument
60 key_size == 0) { in tc_hmac_set_key()
64 const uint8_t dummy_key[key_size]; in tc_hmac_set_key()
67 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key()
78 key_size); in tc_hmac_set_key()
82 rekey(ctx->key, key, key_size); in tc_hmac_set_key()
85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/smp/
Desp_app_sec.c52 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument
56 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk()
65 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/
Dble_sm.c311 rc = ble_hs_hci_util_rand(ltk, proc->key_size); in ble_sm_gen_ltk()
317 …memset_s(ltk + proc->key_size, sizeof(ltk + proc->key_size), 0, sizeof proc->ltk - proc->key_size); in ble_sm_gen_ltk()
403 int authenticated, int bonded, int key_size) in ble_sm_update_sec_state() argument
419 if (key_size) { in ble_sm_update_sec_state()
420 conn->bhc_sec_state.key_size = key_size; in ble_sm_update_sec_state()
435 value_sec->key_size = keys->key_size; in ble_sm_fill_store_value()
781 uint8_t key_size) in ble_sm_chk_repeat_pairing() argument
804 rp.cur_key_size = bond.key_size; in ble_sm_chk_repeat_pairing()
807 rp.new_key_size = key_size; in ble_sm_chk_repeat_pairing()
1001 int key_size; in ble_sm_enc_event_rx() local
[all …]
Dble_sm_lgcy.c156 memcpy_s(proc->ltk, sizeof(proc->ltk), key, proc->key_size); in ble_sm_gen_stk()
158 …memset_s(proc->ltk + proc->key_size, sizeof(proc->ltk + proc->key_size), 0, sizeof key - proc->key… in ble_sm_gen_stk()
Dble_sm_sc.c458 …memset_s(proc->ltk + proc->key_size, sizeof(proc->ltk + proc->key_size), 0, sizeof proc->ltk - pro… in ble_sm_sc_random_rx()
465 proc->our_keys.key_size = proc->key_size; in ble_sm_sc_random_rx()
471 proc->peer_keys.key_size = proc->key_size; in ble_sm_sc_random_rx()
Dble_sm_priv.h237 uint8_t key_size; member
253 uint8_t key_size; member
394 int ble_sm_enc_initiate(uint16_t conn_handle, uint8_t key_size,
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/smp/include/
Desp_sec_api.h50 UINT8 key_size; member
75 void app_ble_sec_gen_ltk(UINT8 key_size);
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/
Dgatt_sr.c481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local
490 &key_size); in gatt_process_read_multi_req()
515 key_size)) in gatt_process_read_multi_req()
558 key_size, in gatt_process_read_multi_req()
1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local
1048 &key_size); in gatts_process_read_by_type_req()
1059 key_size, in gatts_process_read_by_type_req()
1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local
1139 &key_size); in gatts_process_write_req()
1148 key_size); in gatts_process_write_req()
[all …]
Dgatt_db.c122 UINT8 key_size) in gatts_check_attr_readability() argument
158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability()
214 UINT8 key_size) in read_attr_value() argument
228 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value()
336 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument
374 …tatus = read_attr_value ((void *)p_attr, 0, &p, 0, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
927 UINT8 key_size, in gatts_read_attr_value_by_handle() argument
941 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
1020 UINT8 key_size) in gatts_read_attr_perm_check() argument
1032 sec_flag, key_size); in gatts_read_attr_perm_check()
[all …]
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/api/
Dhal_gapc_task.h787 uint8_t key_size; member
808 uint8_t key_size; member
858 uint8_t key_size; member
1000 uint8_t key_size; member
/device/soc/rockchip/common/sdk_linux/kernel/bpf/
Dsyscall.c330 map->key_size = attr->key_size; in bpf_map_init_from_attr()
555 map->map_type, map->key_size, map->value_size, map->max_entries, map->map_flags, in bpf_map_show_fdinfo()
749 u32 key_size, value_size; in map_check_btf() local
754 key_type = btf_type_id_size(btf, &btf_key_id, &key_size); in map_check_btf()
755 if (!key_type || key_size != map->key_size) { in map_check_btf()
997 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument
999 if (key_size) { in __bpf_copy_key()
1000 return memdup_user(ukey, key_size); in __bpf_copy_key()
1047 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem()
1114 key = __bpf_copy_key(ukey, map->key_size); in map_update_elem()
[all …]
/device/soc/hisilicon/hi3861v100/sdk_liteos/components/at/src/
Dat_demo_hks.c272 hi_u32 key_size = 0; in hks_encrypt_conn_para() local
273 ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN, LEN_BYTE, (hi_u8 *)&key_size); in hks_encrypt_conn_para()
278 …ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN + LEN_BYTE, key_size, &key_data[0]… in hks_encrypt_conn_para()
284 key_data_blob.size = key_size; in hks_encrypt_conn_para()
550 hi_u32 key_size = 0; in hks_encrypt_cert() local
551 hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN, LEN_BYTE, (hi_u8 *)&key_size); in hks_encrypt_cert()
553 …ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN + LEN_BYTE, key_size, &key_data[0]… in hks_encrypt_cert()
559 key_data_blob.size = key_size; in hks_encrypt_cert()
/device/soc/winnermicro/wm800/board/src/bt/blehost/ext/tinycrypt/include/tinycrypt/
Dhmac.h93 unsigned int key_size);
/device/soc/beken/bk7235/liteos_m/bk_sdk_armino/middleware/driver/include/bk_private/
Dbk_security.h77 void *hal_aes_init(const u8 *key, size_t key_size);
/device/soc/asrmicro/asr582x/liteos_m/sdk/drivers/ble_inc/
Dsonata_gap_api.h1269 uint8_t key_size; member
1303 uint8_t key_size; member
1422 uint8_t key_size; member
2176 …sonata_gap_io_cap iocap, enum sonata_gap_oob_auth oob, enum sonata_gap_auth auth, uint8_t key_size,
2190 uint8_t key_size, uint8_t *key);
2278 uint16_t sonata_ble_gap_send_encrypt_cfm(uint8_t conidx, uint8_t found, uint8_t key_size, uint8_t *…
2299 …6_t sonata_ble_gap_bond(uint8_t conidx, uint8_t iocap, uint8_t oob, uint8_t auth, uint8_t key_size,
/device/board/isoftstone/zhiyuan/kernel/driver/drivers/sid/
Dsunxi-sid.c207 static u32 sid_read_key(s8 *key_name, u32 *key_buf, u32 key_size, u32 sec) in sid_read_key() argument
218 if (key_size > max_size) { in sid_read_key()
219 key_size = max_size; in sid_read_key()
221 for (i = 0; i < key_size; i += 4) { in sid_read_key()
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c1241 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key()
1294 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key()
1308 p_rec->ble.keys.key_size, in btm_sec_save_le_key()
1661 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted()
1702 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
1704 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply()
2367 *p_le_key_size = p_dev_rec->ble.keys.key_size;
/device/soc/goodix/gr551x/sdk_liteos/gr551x_sdk/components/sdk/
Dble_sec.h175 uint8_t key_size; /**< Indicate the supported maximum LTK size (range: 7-16). */ member
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/inc/
Dhal_smpc.h293 uint8_t key_size; member
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/include/
Dgatt_int.h745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra…
747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i…
752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/include/host/
Dble_store.h74 uint8_t key_size; member
Dble_gap.h163 unsigned key_size : 5; member
1851 int ble_gap_encryption_initiate(uint16_t conn_handle, uint8_t key_size,
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c1557 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1558 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1559 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler()
1563 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1564 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1565 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler()
1594 uint8_t key_size = 0; in btc_gap_ble_call_handler() local
1595 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler()
1596 bta_dm_co_ble_set_appl_enc_key_size(key_size); in btc_gap_ble_call_handler()
/device/soc/goodix/gr551x/sdk_liteos/gr551x_sdk/drivers/inc/
Dgr55xx_hal_aes.h100 uint32_t key_size; /**< 128, 192 or 256-bits key length. member
/device/soc/esp/esp32/components/bt/host/bluedroid/api/include/api/
Desp_gap_ble_api.h481 uint8_t key_size; /*!< The key size(7~16) of the security link*/ member
511 uint8_t key_size; /*!< The key size of the security link */ member

12