/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5() 66 if (secret_len & 1) { in tls_prf_sha1_md5()
|
D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
D | sha384.h | 24 int tls_prf_sha384(const u8 *secret, size_t secret_len, 27 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
D | crypto.h | 989 u8 *secret, size_t *secret_len);
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/eap_peer/ |
D | chap.c | 13 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 22 len[1] = secret_len; in chap_md5()
|
D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/common/ |
D | dpp.c | 112 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument 116 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 121 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 125 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 234 u8 *secret, size_t *secret_len) in dpp_ecdh() argument 236 return crypto_ecdh(own, peer, secret, secret_len); in dpp_ecdh() 926 len[num_elem] = auth->secret_len; in dpp_derive_ke() 1523 size_t secret_len; in dpp_auth_init() local 1592 auth->Mx, &secret_len) < 0) in dpp_auth_init() 1594 auth->secret_len = secret_len; in dpp_auth_init() [all …]
|
D | dpp.h | 261 size_t secret_len; member
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/tls/ |
D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
D | tlsv1_common.h | 260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/hal_espressif-3.7.0/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls-ec.c | 720 u8 *secret, size_t *secret_len) in crypto_ecdh() argument 736 *secret_len = 0; in crypto_ecdh() 762 if (mbedtls_ecdh_calc_secret(ctx, secret_len, secret, DPP_MAX_SHARED_SECRET_LEN, in crypto_ecdh() 768 if (*secret_len > DPP_MAX_SHARED_SECRET_LEN) { in crypto_ecdh() 769 wpa_printf(MSG_ERROR, "secret len=%d is too big", *secret_len); in crypto_ecdh()
|
D | tls_mbedtls.c | 559 size_t secret_len, in tls_key_derivation() argument
|