/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/ |
D | ccmp.h | 13 u8 * ccmp_decrypt(const u8 *tk, const u8 *hdr, const u8 *data, 15 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, 17 u8 * ccmp_encrypt_pv1(const u8 *tk, const u8 *a1, const u8 *a2, const u8 *a3, 22 u8 * ccmp_256_decrypt(const u8 *tk, const u8 *hdr, const u8 *data, 24 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen,
|
D | sha1.c | 30 unsigned char tk[20]; in hmac_sha1_vector() local 45 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector() 47 key = tk; in hmac_sha1_vector() 90 forced_memzero(tk, sizeof(tk)); in hmac_sha1_vector()
|
D | md5.c | 30 u8 tk[16]; in hmac_md5_vector() local 45 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector() 47 key = tk; in hmac_md5_vector() 91 os_memset(tk, 0, sizeof(tk)); in hmac_md5_vector()
|
D | ccmp.c | 139 u8 * ccmp_decrypt(const u8 *tk, const u8 *hdr, in ccmp_decrypt() argument 169 if (aes_ccm_ad(tk, 16, nonce, tag_len, data + 8, mlen, aad, aad_len, in ccmp_decrypt() 191 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_encrypt() argument 225 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt() 240 u8 * ccmp_encrypt_pv1(const u8 *tk, const u8 *a1, const u8 *a2, const u8 *a3, in ccmp_encrypt_pv1() argument 268 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt_pv1() 282 u8 * ccmp_256_decrypt(const u8 *tk, const u8 *hdr, const u8 *data, in ccmp_256_decrypt() argument 305 if (aes_ccm_ad(tk, 32, nonce, 16, data + 8, mlen, aad, aad_len, in ccmp_256_decrypt() 317 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_256_encrypt() argument 351 if (aes_ccm_ae(tk, 32, nonce, 16, frame + hdrlen, plen, aad, aad_len, in ccmp_256_encrypt()
|
D | sha256.c | 30 unsigned char tk[32]; in hmac_sha256_vector() local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) in hmac_sha256_vector() 46 key = tk; in hmac_sha256_vector()
|
D | crypto_internal.c | 44 u8 tk[32]; in crypto_hash_init() local 79 MD5Final(tk, &ctx->u.md5); in crypto_hash_init() 80 key = tk; in crypto_hash_init() 98 SHA1Final(tk, &ctx->u.sha1); in crypto_hash_init() 99 key = tk; in crypto_hash_init() 118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init() 119 key = tk; in crypto_hash_init()
|
/hal_espressif-3.7.0/components/esp_wifi/include/ |
D | esp_wifi_crypto_types.h | 334 typedef uint8_t * (*esp_ccmp_decrypt_t)(const uint8_t *tk, const uint8_t *ieee80211_hdr, 350 typedef uint8_t * (*esp_ccmp_encrypt_t)(const uint8_t *tk, uint8_t *frame, size_t len, size_t hdrle…
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/smp/ |
D | smp_api.c | 335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply() 443 memcpy(p_cb->tk, p_data, len); in SMP_OobDataReply() 446 key.p_data = p_cb->tk; in SMP_OobDataReply()
|
D | smp_keys.c | 218 UINT8 *tt = p_cb->tk; in smp_use_static_passkey() 222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_use_static_passkey() 226 key.p_data = p_cb->tk; in smp_use_static_passkey() 276 UINT8 *tt = p_cb->tk; in smp_proc_passkey() 291 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey() 295 key.p_data = p_cb->tk; in smp_proc_passkey() 666 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm() 703 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm_cont() 981 encrypted = SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, output); in smp_calculate_legacy_short_term_key()
|
D | smp_utils.c | 834 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) in smp_convert_string_to_tk() argument 836 UINT8 *p = tk; in smp_convert_string_to_tk() 842 key.p_data = tk; in smp_convert_string_to_tk()
|
D | smp_act.c | 1063 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info() 1081 memcpy(pid_key.irk, p_cb->tk, BT_OCTET16_LEN); in smp_proc_id_addr() 1361 key.p_data = p_cb->tk; in smp_decide_association_model() 1364 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_decide_association_model()
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/eap_peer/ |
D | eap_peap.c | 254 u8 *tk; in eap_peap_derive_cmk() local 261 tk = data->key_data; in eap_peap_derive_cmk() 262 if (tk == NULL) in eap_peap_derive_cmk() 264 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); in eap_peap_derive_cmk() 269 os_memcpy(data->ipmk, tk, 40); in eap_peap_derive_cmk() 272 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk() 289 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); in eap_peap_derive_cmk() 290 if (peap_prfplus(data->peap_version, tk, 40, in eap_peap_derive_cmk()
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/common/ |
D | wpa_common.c | 815 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk() 819 wpa_hexdump_key(MSG_DEBUG, "FT: TK", ptk->tk, ptk->tk_len); in wpa_pmk_r1_to_ptk() 1154 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 1155 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); in wpa_pmk_to_ptk()
|
D | wpa_common.h | 203 u8 tk[WPA_TK_MAX_LEN]; /* Temporal Key (TK) */ member
|
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/smp/include/ |
D | smp_int.h | 322 BT_OCTET16 tk; member 479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk()
|
D | wpa.c | 772 sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk() 1366 WPA_KEY_RSC_LEN, sm->ptk.tk, keylen, in wpa_supplicant_activate_ptk()
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/ap/ |
D | wpa_auth.c | 1951 sm->PTK.tk, klen)) { in SM_STATE()
|