Home
last modified time | relevance | path

Searched refs:tk (Results 1 – 18 of 18) sorted by relevance

/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/
Dccmp.h13 u8 * ccmp_decrypt(const u8 *tk, const u8 *hdr, const u8 *data,
15 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen,
17 u8 * ccmp_encrypt_pv1(const u8 *tk, const u8 *a1, const u8 *a2, const u8 *a3,
22 u8 * ccmp_256_decrypt(const u8 *tk, const u8 *hdr, const u8 *data,
24 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen,
Dsha1.c30 unsigned char tk[20]; in hmac_sha1_vector() local
45 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector()
47 key = tk; in hmac_sha1_vector()
90 forced_memzero(tk, sizeof(tk)); in hmac_sha1_vector()
Dmd5.c30 u8 tk[16]; in hmac_md5_vector() local
45 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector()
47 key = tk; in hmac_md5_vector()
91 os_memset(tk, 0, sizeof(tk)); in hmac_md5_vector()
Dccmp.c139 u8 * ccmp_decrypt(const u8 *tk, const u8 *hdr, in ccmp_decrypt() argument
169 if (aes_ccm_ad(tk, 16, nonce, tag_len, data + 8, mlen, aad, aad_len, in ccmp_decrypt()
191 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_encrypt() argument
225 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt()
240 u8 * ccmp_encrypt_pv1(const u8 *tk, const u8 *a1, const u8 *a2, const u8 *a3, in ccmp_encrypt_pv1() argument
268 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt_pv1()
282 u8 * ccmp_256_decrypt(const u8 *tk, const u8 *hdr, const u8 *data, in ccmp_256_decrypt() argument
305 if (aes_ccm_ad(tk, 32, nonce, 16, data + 8, mlen, aad, aad_len, in ccmp_256_decrypt()
317 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_256_encrypt() argument
351 if (aes_ccm_ae(tk, 32, nonce, 16, frame + hdrlen, plen, aad, aad_len, in ccmp_256_encrypt()
Dsha256.c30 unsigned char tk[32]; in hmac_sha256_vector() local
44 if (sha256_vector(1, &key, &key_len, tk) < 0) in hmac_sha256_vector()
46 key = tk; in hmac_sha256_vector()
Dcrypto_internal.c44 u8 tk[32]; in crypto_hash_init() local
79 MD5Final(tk, &ctx->u.md5); in crypto_hash_init()
80 key = tk; in crypto_hash_init()
98 SHA1Final(tk, &ctx->u.sha1); in crypto_hash_init()
99 key = tk; in crypto_hash_init()
118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init()
119 key = tk; in crypto_hash_init()
/hal_espressif-3.7.0/components/esp_wifi/include/
Desp_wifi_crypto_types.h334 typedef uint8_t * (*esp_ccmp_decrypt_t)(const uint8_t *tk, const uint8_t *ieee80211_hdr,
350 typedef uint8_t * (*esp_ccmp_encrypt_t)(const uint8_t *tk, uint8_t *frame, size_t len, size_t hdrle…
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/smp/
Dsmp_api.c335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply()
443 memcpy(p_cb->tk, p_data, len); in SMP_OobDataReply()
446 key.p_data = p_cb->tk; in SMP_OobDataReply()
Dsmp_keys.c218 UINT8 *tt = p_cb->tk; in smp_use_static_passkey()
222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_use_static_passkey()
226 key.p_data = p_cb->tk; in smp_use_static_passkey()
276 UINT8 *tt = p_cb->tk; in smp_proc_passkey()
291 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey()
295 key.p_data = p_cb->tk; in smp_proc_passkey()
666 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm()
703 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm_cont()
981 encrypted = SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, output); in smp_calculate_legacy_short_term_key()
Dsmp_utils.c834 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) in smp_convert_string_to_tk() argument
836 UINT8 *p = tk; in smp_convert_string_to_tk()
842 key.p_data = tk; in smp_convert_string_to_tk()
Dsmp_act.c1063 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info()
1081 memcpy(pid_key.irk, p_cb->tk, BT_OCTET16_LEN); in smp_proc_id_addr()
1361 key.p_data = p_cb->tk; in smp_decide_association_model()
1364 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_decide_association_model()
/hal_espressif-3.7.0/components/wpa_supplicant/src/eap_peer/
Deap_peap.c254 u8 *tk; in eap_peap_derive_cmk() local
261 tk = data->key_data; in eap_peap_derive_cmk()
262 if (tk == NULL) in eap_peap_derive_cmk()
264 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); in eap_peap_derive_cmk()
269 os_memcpy(data->ipmk, tk, 40); in eap_peap_derive_cmk()
272 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk()
289 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); in eap_peap_derive_cmk()
290 if (peap_prfplus(data->peap_version, tk, 40, in eap_peap_derive_cmk()
/hal_espressif-3.7.0/components/wpa_supplicant/src/common/
Dwpa_common.c815 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk()
819 wpa_hexdump_key(MSG_DEBUG, "FT: TK", ptk->tk, ptk->tk_len); in wpa_pmk_r1_to_ptk()
1154 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
1155 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); in wpa_pmk_to_ptk()
Dwpa_common.h203 u8 tk[WPA_TK_MAX_LEN]; /* Temporal Key (TK) */ member
/hal_espressif-3.7.0/components/bt/host/bluedroid/stack/smp/include/
Dsmp_int.h322 BT_OCTET16 tk; member
479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
/hal_espressif-3.7.0/components/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk()
Dwpa.c772 sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk()
1366 WPA_KEY_RSC_LEN, sm->ptk.tk, keylen, in wpa_supplicant_activate_ptk()
/hal_espressif-3.7.0/components/wpa_supplicant/src/ap/
Dwpa_auth.c1951 sm->PTK.tk, klen)) { in SM_STATE()