/device/soc/winnermicro/wm800/board/src/bt/blehost/ext/tinycrypt/src/ |
D | hmac.c | 37 static void rekey(uint8_t *key, const uint8_t *new_key, unsigned int key_size) in rekey() argument 43 for (i = 0; i < key_size; ++i) { in rekey() 55 unsigned int key_size) in tc_hmac_set_key() argument 60 key_size == 0) { in tc_hmac_set_key() 64 const uint8_t dummy_key[key_size]; in tc_hmac_set_key() 67 if (key_size <= TC_SHA256_BLOCK_SIZE) { in tc_hmac_set_key() 78 key_size); in tc_hmac_set_key() 82 rekey(ctx->key, key, key_size); in tc_hmac_set_key() 85 (void)tc_sha256_update(&ctx->hash_state, key, key_size); in tc_hmac_set_key()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/smp/ |
D | esp_app_sec.c | 52 void app_ble_sec_gen_ltk(UINT8 key_size) in app_ble_sec_gen_ltk() argument 56 app_sec_env.key_size = key_size; in app_ble_sec_gen_ltk() 65 app_sec_env.ltk.key[i] = (((key_size) < (16 - i)) ? 0 : random() % 256); in app_ble_sec_gen_ltk()
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/ |
D | ble_sm.c | 311 rc = ble_hs_hci_util_rand(ltk, proc->key_size); in ble_sm_gen_ltk() 317 …memset_s(ltk + proc->key_size, sizeof(ltk + proc->key_size), 0, sizeof proc->ltk - proc->key_size); in ble_sm_gen_ltk() 403 int authenticated, int bonded, int key_size) in ble_sm_update_sec_state() argument 419 if (key_size) { in ble_sm_update_sec_state() 420 conn->bhc_sec_state.key_size = key_size; in ble_sm_update_sec_state() 435 value_sec->key_size = keys->key_size; in ble_sm_fill_store_value() 781 uint8_t key_size) in ble_sm_chk_repeat_pairing() argument 804 rp.cur_key_size = bond.key_size; in ble_sm_chk_repeat_pairing() 807 rp.new_key_size = key_size; in ble_sm_chk_repeat_pairing() 1001 int key_size; in ble_sm_enc_event_rx() local [all …]
|
D | ble_sm_lgcy.c | 156 memcpy_s(proc->ltk, sizeof(proc->ltk), key, proc->key_size); in ble_sm_gen_stk() 158 …memset_s(proc->ltk + proc->key_size, sizeof(proc->ltk + proc->key_size), 0, sizeof key - proc->key… in ble_sm_gen_stk()
|
D | ble_sm_sc.c | 458 …memset_s(proc->ltk + proc->key_size, sizeof(proc->ltk + proc->key_size), 0, sizeof proc->ltk - pro… in ble_sm_sc_random_rx() 465 proc->our_keys.key_size = proc->key_size; in ble_sm_sc_random_rx() 471 proc->peer_keys.key_size = proc->key_size; in ble_sm_sc_random_rx()
|
D | ble_sm_priv.h | 237 uint8_t key_size; member 253 uint8_t key_size; member 394 int ble_sm_enc_initiate(uint16_t conn_handle, uint8_t key_size,
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/smp/include/ |
D | esp_sec_api.h | 50 UINT8 key_size; member 75 void app_ble_sec_gen_ltk(UINT8 key_size);
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_sr.c | 481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local 490 &key_size); in gatt_process_read_multi_req() 515 key_size)) in gatt_process_read_multi_req() 558 key_size, in gatt_process_read_multi_req() 1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local 1048 &key_size); in gatts_process_read_by_type_req() 1059 key_size, in gatts_process_read_by_type_req() 1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 1139 &key_size); in gatts_process_write_req() 1148 key_size); in gatts_process_write_req() [all …]
|
D | gatt_db.c | 122 UINT8 key_size) in gatts_check_attr_readability() argument 158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 214 UINT8 key_size) in read_attr_value() argument 228 …atus = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); in read_attr_value() 336 UINT8 key_size, in gatts_db_read_attr_value_by_type() argument 374 …tatus = read_attr_value ((void *)p_attr, 0, &p, 0, (UINT16)(*p_len - 2), &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 927 UINT8 key_size, in gatts_read_attr_value_by_handle() argument 941 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 1020 UINT8 key_size) in gatts_read_attr_perm_check() argument 1032 sec_flag, key_size); in gatts_read_attr_perm_check() [all …]
|
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/api/ |
D | hal_gapc_task.h | 787 uint8_t key_size; member 808 uint8_t key_size; member 858 uint8_t key_size; member 1000 uint8_t key_size; member
|
/device/soc/rockchip/common/sdk_linux/kernel/bpf/ |
D | syscall.c | 330 map->key_size = attr->key_size; in bpf_map_init_from_attr() 555 map->map_type, map->key_size, map->value_size, map->max_entries, map->map_flags, in bpf_map_show_fdinfo() 749 u32 key_size, value_size; in map_check_btf() local 754 key_type = btf_type_id_size(btf, &btf_key_id, &key_size); in map_check_btf() 755 if (!key_type || key_size != map->key_size) { in map_check_btf() 997 static void *__bpf_copy_key(void __user *ukey, u64 key_size) in __bpf_copy_key() argument 999 if (key_size) { in __bpf_copy_key() 1000 return memdup_user(ukey, key_size); in __bpf_copy_key() 1047 key = __bpf_copy_key(ukey, map->key_size); in map_lookup_elem() 1114 key = __bpf_copy_key(ukey, map->key_size); in map_update_elem() [all …]
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/components/at/src/ |
D | at_demo_hks.c | 272 hi_u32 key_size = 0; in hks_encrypt_conn_para() local 273 ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN, LEN_BYTE, (hi_u8 *)&key_size); in hks_encrypt_conn_para() 278 …ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN + LEN_BYTE, key_size, &key_data[0]… in hks_encrypt_conn_para() 284 key_data_blob.size = key_size; in hks_encrypt_conn_para() 550 hi_u32 key_size = 0; in hks_encrypt_cert() local 551 hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN, LEN_BYTE, (hi_u8 *)&key_size); in hks_encrypt_cert() 553 …ret = hi_flash_read(key_save_partition_addr + KYY_PARAM_MAX_LEN + LEN_BYTE, key_size, &key_data[0]… in hks_encrypt_cert() 559 key_data_blob.size = key_size; in hks_encrypt_cert()
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/ext/tinycrypt/include/tinycrypt/ |
D | hmac.h | 93 unsigned int key_size);
|
/device/soc/beken/bk7235/liteos_m/bk_sdk_armino/middleware/driver/include/bk_private/ |
D | bk_security.h | 77 void *hal_aes_init(const u8 *key, size_t key_size);
|
/device/soc/asrmicro/asr582x/liteos_m/sdk/drivers/ble_inc/ |
D | sonata_gap_api.h | 1269 uint8_t key_size; member 1303 uint8_t key_size; member 1422 uint8_t key_size; member 2176 …sonata_gap_io_cap iocap, enum sonata_gap_oob_auth oob, enum sonata_gap_auth auth, uint8_t key_size, 2190 uint8_t key_size, uint8_t *key); 2278 uint16_t sonata_ble_gap_send_encrypt_cfm(uint8_t conidx, uint8_t found, uint8_t key_size, uint8_t *… 2299 …6_t sonata_ble_gap_bond(uint8_t conidx, uint8_t iocap, uint8_t oob, uint8_t auth, uint8_t key_size,
|
/device/board/isoftstone/zhiyuan/kernel/driver/drivers/sid/ |
D | sunxi-sid.c | 207 static u32 sid_read_key(s8 *key_name, u32 *key_buf, u32 key_size, u32 sec) in sid_read_key() argument 218 if (key_size > max_size) { in sid_read_key() 219 key_size = max_size; in sid_read_key() 221 for (i = 0; i < key_size; i += 4) { in sid_read_key()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 1241 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key() 1294 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key() 1308 p_rec->ble.keys.key_size, in btm_sec_save_le_key() 1661 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted() 1702 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply() 1704 BTM_TRACE_DEBUG("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply() 2367 *p_le_key_size = p_dev_rec->ble.keys.key_size;
|
/device/soc/goodix/gr551x/sdk_liteos/gr551x_sdk/components/sdk/ |
D | ble_sec.h | 175 uint8_t key_size; /**< Indicate the supported maximum LTK size (range: 7-16). */ member
|
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/inc/ |
D | hal_smpc.h | 293 uint8_t key_size; member
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/include/ |
D | gatt_int.h | 745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra… 747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i… 752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/include/host/ |
D | ble_store.h | 74 uint8_t key_size; member
|
D | ble_gap.h | 163 unsigned key_size : 5; member 1851 int ble_gap_encryption_initiate(uint16_t conn_handle, uint8_t key_size,
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 1557 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1558 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1559 bta_dm_co_ble_set_max_key_size(key_size); in btc_gap_ble_call_handler() 1563 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1564 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1565 bta_dm_co_ble_set_min_key_size(key_size); in btc_gap_ble_call_handler() 1594 uint8_t key_size = 0; in btc_gap_ble_call_handler() local 1595 STREAM_TO_UINT8(key_size, value); in btc_gap_ble_call_handler() 1596 bta_dm_co_ble_set_appl_enc_key_size(key_size); in btc_gap_ble_call_handler()
|
/device/soc/goodix/gr551x/sdk_liteos/gr551x_sdk/drivers/inc/ |
D | gr55xx_hal_aes.h | 100 uint32_t key_size; /**< 128, 192 or 256-bits key length. member
|
/device/soc/esp/esp32/components/bt/host/bluedroid/api/include/api/ |
D | esp_gap_ble_api.h | 481 uint8_t key_size; /*!< The key size(7~16) of the security link*/ member 511 uint8_t key_size; /*!< The key size of the security link */ member
|