/hal_espressif-3.6.0/examples/network/network_tests/ |
D | README.md | 1 # Intel net test suite for LwIP network stack 4 Intel network test suite defined in TTCN3 framework. 9 ## Execute net test suite 19 * Rebuild the netsuite tests (according to README.md in net-test-suite) by executing `source make.s… 32 1) Start the test server which would pass packets from TTCN3 test suite into ESP32 board in `$IDF_P… 37 2) Start test suite in TTCN3 environment in `src` subdir of the cloned repository `net-test-suites.… 44 Purpose of this test is to execute standard network suite on a ESP32 network stack. 49 Standard Intel net suite executed by TTCN3 engine uses udp ports for input/ouput of network packets… 52 …, progress, evaluation and test reporting is done using standard net-test-suite scripts running on… 61 | | net-test-suite |--7777/udp--| net_suite.py |--stdout---------| -----> | esp_netif / lwip …
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ie.c | 127 u32 suite; in wpa_gen_wpa_ie_rsn() local 152 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn() 153 if (suite == 0) { in wpa_gen_wpa_ie_rsn() 158 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_rsn() 168 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, pairwise_cipher); in wpa_gen_wpa_ie_rsn() 169 if (suite == 0 || in wpa_gen_wpa_ie_rsn() 175 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_rsn()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/tls/ |
D | tlsv1_record.c | 34 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local 41 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 42 if (suite == NULL) in tlsv1_record_set_cipher_suite() 45 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite() 48 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite() 51 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite() 56 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
|
D | tlsv1_common.c | 110 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument 114 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite() 132 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local 135 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed() 136 if (suite == NULL) in tls_server_key_exchange_allowed() 139 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
|
D | tlsv1_server_write.c | 163 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local 165 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 166 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate() 248 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local 254 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 255 if (suite == NULL) in tls_write_server_key_exchange() 258 keyx = suite->key_exchange; in tls_write_server_key_exchange()
|
D | tlsv1_client_read.c | 540 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local 601 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange() 602 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange() 603 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange() 605 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
|
D | tlsv1_common.h | 215 u16 suite; member 249 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
D | tlsv1_client_write.c | 409 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 411 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 412 if (suite == NULL) in tls_write_client_key_exchange() 415 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
D | tlsv1_server_read.c | 696 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local 745 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange() 746 if (suite == NULL) in tls_process_client_key_exchange() 749 keyx = suite->key_exchange; in tls_process_client_key_exchange()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/ap/ |
D | wpa_auth_ie.c | 28 u32 suite; in wpa_write_wpa_ie() local 36 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie() 37 if (suite == 0) { in wpa_write_wpa_ie() 42 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie() 94 u32 suite; in wpa_write_rsn_ie() local 101 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie() 102 if (suite == 0) { in wpa_write_rsn_ie() 107 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie()
|
/hal_espressif-3.6.0/components/esptool_py/esptool/ |
D | CONTRIBUTING.rst | 59 * Have you tried running ``esptool.py`` test suite locally? 107 The test directory contains a `pytest <https://docs.pytest.org/>`_ integration suite with some inte… 129 …Or to run the TestFlashing suite only (using the pytest ``-k`` option to select tests based on the… 149 The whole test suite (without the tests needing an actual hardware) can be easily run with the foll…
|
/hal_espressif-3.6.0/components/wpa_supplicant/ |
D | Kconfig | 22 bool "Enable NSA suite B support with 192 bit key" 27 Select this option to enable 192 bit NSA suite-B.
|
/hal_espressif-3.6.0/components/libsodium/test/ |
D | CMakeLists.txt | 17 …# The libsodium test suite is designed to be run each test case as an executable on a desktop comp…
|
/hal_espressif-3.6.0/tools/kconfig_new/test/confserver/ |
D | README.md | 13 …action session (input and output) from confserver.py - sometimes the test suite misinterprets some…
|
/hal_espressif-3.6.0/components/esp_netif/ |
D | Kconfig | 24 lwIP is a small independent implementation of the TCP/IP protocol suite.
|
/hal_espressif-3.6.0/examples/protocols/smtp_client/ |
D | README.md | 64 I (5692) smtp_example: Cipher suite is TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
|
/hal_espressif-3.6.0/examples/protocols/https_mbedtls/ |
D | README.md | 50 I (15019) example: Cipher suite is TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
|
/hal_espressif-3.6.0/examples/wifi/wifi_enterprise/ |
D | README.md | 14 …3. In case using suite-b, please use appropriate certificates such as RSA-3072 or p384 EC certific…
|
/hal_espressif-3.6.0/docs/en/api-reference/system/ |
D | random.rst | 40 …entropy source was sufficient to pass the `Dieharder`_ random number test suite without the main e…
|
/hal_espressif-3.6.0/tools/ci/python_packages/tiny_test_fw/docs/ |
D | index.rst | 44 dut1.expect_all(re.compile(r"Cipher suite is TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256"),
|
/hal_espressif-3.6.0/components/esp_event/ |
D | event_send_compat.inc | 156 {WIFI_REASON_CIPHER_SUITE_REJECTED, "cipher suite rejected"}
|
/hal_espressif-3.6.0/docs/en/api-reference/protocols/ |
D | modbus.rst | 7 …ist for serial port and for Ethernet and other protocols that support the Internet protocol suite.
|
/hal_espressif-3.6.0/docs/zh_CN/api-guides/ |
D | wifi.rst | 930 | CIPHER_SUITE_REJECTED | 24 | 24 | 因安全策略,安全密钥算法套件 (cipher suite) 被拒。 …
|
/hal_espressif-3.6.0/docs/en/api-guides/ |
D | wifi.rst | 990 | CIPHER_SUITE_REJECTED | 24 | 24 | Cipher suite rejected due to security policies. … 1419 …suite to be used. {IDF_TARGET_NAME} supports 802.1X/EAP (WPA) method of AKM and Advanced encryptio…
|