Home
last modified time | relevance | path

Searched refs:secret_len (Results 1 – 16 of 16) sorted by relevance

/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
Dsha384.h24 int tls_prf_sha384(const u8 *secret, size_t secret_len,
27 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
Dcrypto.h989 u8 *secret, size_t *secret_len);
/hal_espressif-3.7.0/components/wpa_supplicant/src/eap_peer/
Dchap.c13 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
22 len[1] = secret_len; in chap_md5()
Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/hal_espressif-3.7.0/components/wpa_supplicant/src/common/
Ddpp.c112 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument
116 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
121 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
125 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
234 u8 *secret, size_t *secret_len) in dpp_ecdh() argument
236 return crypto_ecdh(own, peer, secret, secret_len); in dpp_ecdh()
926 len[num_elem] = auth->secret_len; in dpp_derive_ke()
1523 size_t secret_len; in dpp_auth_init() local
1592 auth->Mx, &secret_len) < 0) in dpp_auth_init()
1594 auth->secret_len = secret_len; in dpp_auth_init()
[all …]
Ddpp.h261 size_t secret_len; member
/hal_espressif-3.7.0/components/wpa_supplicant/src/tls/
Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
Dtlsv1_common.h260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
/hal_espressif-3.7.0/components/wpa_supplicant/esp_supplicant/src/crypto/
Dcrypto_mbedtls-ec.c720 u8 *secret, size_t *secret_len) in crypto_ecdh() argument
736 *secret_len = 0; in crypto_ecdh()
762 if (mbedtls_ecdh_calc_secret(ctx, secret_len, secret, DPP_MAX_SHARED_SECRET_LEN, in crypto_ecdh()
768 if (*secret_len > DPP_MAX_SHARED_SECRET_LEN) { in crypto_ecdh()
769 wpa_printf(MSG_ERROR, "secret len=%d is too big", *secret_len); in crypto_ecdh()
Dtls_mbedtls.c559 size_t secret_len, in tls_key_derivation() argument