| /bsp/x86/drivers/ |
| A D | keyboard.c | 61 t_32 key = 0; in keyboard_read() local 110 if ((key != PAUSEBREAK) && (key != PRINTSCREEN)) { in keyboard_read() 134 switch(key) { in keyboard_read() 180 if ((key >= PAD_SLASH) && (key <= PAD_9)) { in keyboard_read() 184 key = '/'; in keyboard_read() 200 if ((key >= PAD_0) && (key <= PAD_9)) { in keyboard_read() 201 key = key - PAD_0 + '0'; in keyboard_read() 254 *pkey = key; in keyboard_read() 337 rt_uint32_t key = 0; in rt_keyboard_getc() local 340 switch(key) in rt_keyboard_getc() [all …]
|
| /bsp/fujitsu/mb9x/mb9bf500r/ |
| A D | key.c | 48 kbd_event.key = RTGUIK_UNKNOWN; in key_thread_entry() 76 kbd_event.key = RTGUIK_DOWN; in key_thread_entry() 81 kbd_event.key = RTGUIK_UP; in key_thread_entry() 86 kbd_event.key = RTGUIK_RIGHT; in key_thread_entry() 91 kbd_event.key = RTGUIK_LEFT; in key_thread_entry() 117 msg.key = NO_KEY; in key_thread_entry() 123 msg.key = KEY_ENTER; in key_thread_entry() 128 msg.key = KEY_DOWN; in key_thread_entry() 133 msg.key = KEY_UP; in key_thread_entry() 138 msg.key = KEY_RIGHT; in key_thread_entry() [all …]
|
| /bsp/efm32/Libraries/emlib/inc/ |
| A D | em_aes.h | 76 const uint8_t *key, 83 const uint8_t *key, 90 const uint8_t *key, 97 const uint8_t *key, 104 const uint8_t *key, 111 const uint8_t *key, 124 const uint8_t *key, 130 const uint8_t *key, 214 const uint8_t *key, 220 const uint8_t *key,
|
| /bsp/hpmicro/libraries/hpm_sdk/drivers/inc/ |
| A D | hpm_bkey_drv.h | 46 static inline void bkey_set_key_data(BKEY_Type *ptr, uint8_t key, uint8_t start, uint32_t *data, ui… in bkey_set_key_data() argument 49 ptr->KEY[key].DATA[start + i] = *(data + i); in bkey_set_key_data() 64 static inline void bkey_get_key_data(BKEY_Type *ptr, uint8_t key, uint8_t start, uint32_t *data, ui… in bkey_get_key_data() argument 67 *(data + i) = ptr->KEY[key].DATA[start + i]; in bkey_get_key_data() 81 static inline void bkey_lock(BKEY_Type *ptr, uint8_t key, bkey_lock_type_t lock, uint16_t ecc) in bkey_lock() argument 83 ptr->ECC[key] = BKEY_ECC_ECC_SET(ecc) | lock; in bkey_lock() 96 static inline void bkey_select_key(BKEY_Type *ptr, uint8_t key) in bkey_select_key() argument 98 ptr->SELECT = BKEY_SELECT_SELECT_SET(key); in bkey_select_key()
|
| /bsp/simulator/drivers/ |
| A D | uart_console.c | 26 #define SAVEKEY(key) do { char ch = key; rt_ringbuffer_put_force(&(_console_uart.rb), &ch, 1); } w… argument 125 unsigned char key; local 139 key = getch(); 141 if (key == 0xE0) 143 key = getch(); 145 if (key == 0x48) //up key , 0x1b 0x5b 0x41 151 else if (key == 0x50)//0x1b 0x5b 0x42 157 else if (key == 0x4b)//<- 0x1b 0x5b 0x44 163 else if (key == 0x4d)//<- 0x1b 0x5b 0x43 173 SAVEKEY(key);
|
| /bsp/samd21/sam_d2x_asflib/sam0/drivers/pac/pac_sam_l_c/ |
| A D | pac.c | 70 const uint32_t key) in system_peripheral_lock() argument 73 if (~peripheral_id != key) { in system_peripheral_lock() 105 const uint32_t key) in system_peripheral_lock_always() argument 108 if (~peripheral_id != key) { in system_peripheral_lock_always() 139 const uint32_t key) in system_peripheral_unlock() argument 142 if (~peripheral_id != key) { in system_peripheral_unlock()
|
| /bsp/xuantie/libraries/xuantie_libraries/csi/csi2/include/drv/ |
| A D | tee.h | 56 const uint8_t *key, uint32_t key_len, 74 const uint8_t *key, uint32_t key_len, 90 #define csi_tee_aes_encrypt_ecb(in, in_len, key, key_len, out) \ argument 104 #define csi_tee_aes_decrypt_ecb(in, in_len, key, key_len, out) \ argument 118 #define csi_tee_aes_encrypt_cbc(in, in_len, key, key_len, iv, out) \ argument 299 const uint8_t *key, uint32_t key_len, 315 const uint8_t *key, uint32_t key_len, 337 const uint8_t *key, uint32_t key_len, 352 const uint8_t *key, uint32_t key_len, 453 const uint8_t *key, uint32_t key_len, [all …]
|
| A D | aes.h | 74 csi_error_t csi_aes_set_encrypt_key(csi_aes_t *aes, void *key, csi_aes_key_bits_t key_len); 83 csi_error_t csi_aes_set_decrypt_key(csi_aes_t *aes, void *key, csi_aes_key_bits_t key_len); 92 csi_error_t csi_aes_set_encrypt_key2(csi_aes_t *aes, void *key, csi_aes_key_bits_t key_len); 102 csi_error_t csi_aes_set_decrypt_key2(csi_aes_t *aes, void *key, csi_aes_key_bits_t key_len);
|
| /bsp/CME_M7/StdPeriph_Driver/src/ |
| A D | cmem7_efuse.c | 216 BOOL EFUSE_Compare(EFUSE_AesKey* key) { in EFUSE_Compare() argument 217 assert_param(key); in EFUSE_Compare() 224 EFUSE->USER_DATA0_LOW = key->key0; in EFUSE_Compare() 225 EFUSE->USER_DATA1_LOW = key->key1; in EFUSE_Compare() 226 EFUSE->USER_DATA2_LOW = key->key2; in EFUSE_Compare() 227 EFUSE->USER_DATA3_LOW = key->key3; in EFUSE_Compare() 239 EFUSE->USER_DATA0_HI = key->key4; in EFUSE_Compare() 240 EFUSE->USER_DATA1_HI = key->key5; in EFUSE_Compare() 241 EFUSE->USER_DATA2_HI = key->key6; in EFUSE_Compare() 242 EFUSE->USER_DATA3_HI = key->key7; in EFUSE_Compare()
|
| /bsp/synwit/libraries/SWM341_CSL/SWM341_UsbHost_Lib/HID/ |
| A D | usbh_hid_keybd.c | 98 char key; in USBH_HID_KeyBD_Decode() local 134 key = HID_KEYBRD_ShiftKey[HID_KEYBRD_Codes[keys_new[0]]]; in USBH_HID_KeyBD_Decode() 138 key = HID_KEYBRD_Key[HID_KEYBRD_Codes[keys_new[0]]]; in USBH_HID_KeyBD_Decode() 141 USBH_HID_KeyBD_Handle(pbuf[0], key); // call user process handle in USBH_HID_KeyBD_Decode() 150 void USBH_HID_KeyBD_Handle(uint8_t ctrl, char key) in USBH_HID_KeyBD_Handle() argument 158 printf("%c\r\n", key); in USBH_HID_KeyBD_Handle()
|
| /bsp/microchip/same54/bsp/hal/documentation/ |
| A D | aes_sync.rst | 8 key size used for an AES cipher specifies the number of repetitions of 10 final output, called the ciphertext. The AES works on a symmetric-key 11 algorithm, meaning the same key is used for both encrypting and decrypting the 15 for authenticated encryption. Before use any encrypt mode of AES, the key must 16 be set firstly. And for privacy situaion, after encrypt/decrypt data, the key 17 should be cleared by application. Common practice is set the key to zero. 24 * Set 128/192/256 bit cryptographic key 36 the same authentication key, the ciphered data cannot be recovered without 37 authentication key.
|
| /bsp/nxp/lpc/lpc178x/applications/ |
| A D | application.c | 187 void key(rt_uint32_t key) in key() function 194 ekbd.key = key; in key() 204 FINSH_FUNCTION_EXPORT(key, send a key to gui server);
|
| /bsp/efm32/Libraries/emlib/src/ |
| A D | em_aes.c | 160 const uint8_t *key, in AES_CBC128() argument 176 if (key) in AES_CBC128() 298 const uint8_t *key, in AES_CBC256() argument 461 const uint8_t *key, in AES_CFB128() argument 556 const uint8_t *key, in AES_CFB256() argument 679 const uint8_t *key, in AES_CTR128() argument 694 if (key) in AES_CTR128() 763 const uint8_t *key, in AES_CTR256() argument 976 const uint8_t *key, in AES_ECB128() argument 1058 const uint8_t *key, in AES_ECB256() argument [all …]
|
| /bsp/apm32/libraries/APM32F4xx_Library/APM32F4xx_StdPeriphDriver/inc/ |
| A D | apm32f4xx_cryp.h | 239 uint8_t CRYP_AES_ECB(CRYP_MODE_T mode, uint8_t *key, uint16_t keysize, 242 uint8_t CRYP_AES_CBC(CRYP_MODE_T mode, uint8_t *key, uint16_t keysize, 246 uint8_t CRYP_AES_CTR(CRYP_MODE_T mode, uint8_t *key, uint16_t keysize, 251 uint8_t CRYP_DES_ECB(CRYP_MODE_T mode, uint8_t key[8], uint8_t *input, 254 uint8_t CRYP_DES_CBC(CRYP_MODE_T mode, uint8_t key[8], uint8_t *input, 258 uint8_t CRYP_TDES_ECB(CRYP_MODE_T mode, uint8_t key[24], uint8_t *input, 261 uint8_t CRYP_TDES_CBC(CRYP_MODE_T mode,uint8_t key[24], uint8_t *input,
|
| /bsp/samd21/sam_d2x_asflib/sam0/drivers/pac/pac_sam_d_r_h/ |
| A D | pac.c | 70 const uint32_t key) in system_peripheral_lock() argument 80 if (~peripheral_id != key) { in system_peripheral_lock() 132 const uint32_t key) in system_peripheral_unlock() argument 142 if (~peripheral_id != key) { in system_peripheral_unlock()
|
| /bsp/airm2m/air105/libraries/HAL_Driver/Src/ |
| A D | core_keyboard.c | 46 uint32_t Status, Event, i, type, key; in KB_IrqHandle() local 55 key = (Event & (0x000000ff << (i * 8))) >> (i * 8); in KB_IrqHandle() 56 key |= (type << 16); in KB_IrqHandle() 57 prvKB.CB(key, prvKB.pParam); in KB_IrqHandle()
|
| /bsp/ck802/libraries/common/aes/ |
| A D | ck_aes.c | 126 static void aes_set_key(void *context, uint8_t *key, uint32_t keylen, uint32_t enc, uint32_t endian) in aes_set_key() argument 142 aes_reg->key[keynum - 1 - i] = *(uint32_t *)key; in aes_set_key() 143 key += 4; in aes_set_key() 147 aes_reg->key[i] = *(uint32_t *)key; in aes_set_key() 148 key += 4; in aes_set_key() 411 int32_t csi_aes_set_key(aes_handle_t handle, void *context, void *key, uint32_t key_len, aes_crypto… in csi_aes_set_key() argument 414 AES_NULL_PARA_CHK(key); in csi_aes_set_key() 424 aes_set_key(context, key, key_len, enc, aes_priv->endian); in csi_aes_set_key()
|
| /bsp/samd21/sam_d2x_asflib/sam0/drivers/pac/ |
| A D | pac.h | 683 const uint32_t key); 687 const uint32_t key); 696 const uint32_t key);
|
| /bsp/hc32/tests/ |
| A D | test_crypto.c | 127 const char *key; in aes_test() local 138 key = key128; in aes_test() 141 key = key192; in aes_test() 144 key = key256; in aes_test() 147 key = key128; in aes_test() 150 result = rt_hwcrypto_symmetric_setkey(ctx, (rt_uint8_t *)key, key_bitlen); in aes_test()
|
| /bsp/nuvoton/numaker-iot-ma35d1/nuwriter_scripts/ |
| A D | xusbcom.py | 75 for key in cfg.keys(): 76 if key == 'nand_align': 79 elif key == 'spinand_align': 103 for key in cfg.keys(): 104 if key == 'nand_align': 106 elif key == 'spinand_align':
|
| /bsp/nuvoton/numaker-hmi-ma35d1/nuwriter_scripts/ |
| A D | xusbcom.py | 75 for key in cfg.keys(): 76 if key == 'nand_align': 79 elif key == 'spinand_align': 103 for key in cfg.keys(): 104 if key == 'nand_align': 106 elif key == 'spinand_align':
|
| /bsp/n32/libraries/N32WB452_Firmware_Library/n32wb452_ble_driver/profile/ |
| A D | app_sec.c | 173 … cfm->data.ltk.ltk.key[counter] = (uint8_t)((co_rand_word() + app_env.loc_irk[counter]) ); in gapc_bond_req_ind_handler() 247 memcpy(cfm->data.irk.irk.key, app_env.loc_irk, KEY_LEN); in gapc_bond_req_ind_handler() 267 memset(cfm->data.tk.key, 0, KEY_LEN); in gapc_bond_req_ind_handler() 268 cfm->data.tk.key[0] = (uint8_t)((app_env.pin_code & 0x000000FF) >> 0); in gapc_bond_req_ind_handler() 269 cfm->data.tk.key[1] = (uint8_t)((app_env.pin_code & 0x0000FF00) >> 8); in gapc_bond_req_ind_handler() 270 cfm->data.tk.key[2] = (uint8_t)((app_env.pin_code & 0x00FF0000) >> 16); in gapc_bond_req_ind_handler() 271 cfm->data.tk.key[3] = (uint8_t)((app_env.pin_code & 0xFF000000) >> 24); in gapc_bond_req_ind_handler()
|
| /bsp/apm32/libraries/APM32F4xx_Library/APM32F4xx_StdPeriphDriver/src/ |
| A D | apm32f4xx_cryp_des.c | 57 uint8_t CRYP_DES_ECB(CRYP_MODE_T mode, uint8_t key[8], uint8_t *input, in CRYP_DES_ECB() 63 uint32_t keyAddr = (uint32_t)key; in CRYP_DES_ECB() 148 uint8_t CRYP_DES_CBC(CRYP_MODE_T mode, uint8_t key[8], uint8_t *input, in CRYP_DES_CBC() 155 uint32_t keyAddr = (uint32_t)key; in CRYP_DES_CBC()
|
| A D | apm32f4xx_cryp_tdes.c | 57 uint8_t CRYP_TDES_ECB(CRYP_MODE_T mode, uint8_t key[24], uint8_t *input, in CRYP_TDES_ECB() 63 uint32_t keyAddr = (uint32_t)key; in CRYP_TDES_ECB() 156 uint8_t CRYP_TDES_CBC(CRYP_MODE_T mode, uint8_t key[24], uint8_t *input, in CRYP_TDES_CBC() 163 uint32_t keyAddr = (uint32_t)key; in CRYP_TDES_CBC()
|
| /bsp/amebaz/drivers/wlan/ |
| A D | drv_wifi.c | 336 char *ssid = RT_NULL, *key = RT_NULL; in rthw_wlan_join() local 363 if (sta_info->key.len > 0) in rthw_wlan_join() 364 key = &sta_info->key.val[0]; in rthw_wlan_join() 369 key, in rthw_wlan_join() 370 sta_info->key.len in rthw_wlan_join() 372 …rthw_wifi_connect_bssid(sta_info->bssid, ssid, sta_info->ssid.len, key, sta_info->key.len, securit… in rthw_wlan_join() 376 …w_wifi_connect(sta_info->ssid.val, sta_info->ssid.len, sta_info->key.val, sta_info->key.len, secur… in rthw_wlan_join() 399 if (rthw_wifi_ap_start(&ap_info->ssid.val[0], &ap_info->key.val[0], ap_info->channel) != 0) in rthw_wlan_softap()
|