/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_server.c | 531 char *cipher; in tlsv1_server_get_cipher() local 535 cipher = "RC4-MD5"; in tlsv1_server_get_cipher() 538 cipher = "RC4-SHA"; in tlsv1_server_get_cipher() 541 cipher = "DES-CBC-SHA"; in tlsv1_server_get_cipher() 544 cipher = "DES-CBC3-SHA"; in tlsv1_server_get_cipher() 547 cipher = "DHE-RSA-DES-CBC-SHA"; in tlsv1_server_get_cipher() 550 cipher = "DHE-RSA-DES-CBC3-SHA"; in tlsv1_server_get_cipher() 553 cipher = "ADH-RC4-MD5"; in tlsv1_server_get_cipher() 556 cipher = "ADH-DES-SHA"; in tlsv1_server_get_cipher() 559 cipher = "ADH-DES-CBC3-SHA"; in tlsv1_server_get_cipher() [all …]
|
D | tlsv1_client.c | 617 char *cipher; in tlsv1_client_get_cipher() local 621 cipher = "RC4-MD5"; in tlsv1_client_get_cipher() 624 cipher = "RC4-SHA"; in tlsv1_client_get_cipher() 627 cipher = "DES-CBC-SHA"; in tlsv1_client_get_cipher() 630 cipher = "DES-CBC3-SHA"; in tlsv1_client_get_cipher() 633 cipher = "DHE-RSA-DES-CBC-SHA"; in tlsv1_client_get_cipher() 636 cipher = "DHE-RSA-DES-CBC3-SHA"; in tlsv1_client_get_cipher() 639 cipher = "ADH-RC4-MD5"; in tlsv1_client_get_cipher() 642 cipher = "ADH-DES-SHA"; in tlsv1_client_get_cipher() 645 cipher = "ADH-DES-CBC3-SHA"; in tlsv1_client_get_cipher() [all …]
|
D | tlsv1_common.h | 218 tls_cipher cipher; member 228 tls_cipher cipher; member 251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 252 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
D | tlsv1_common.c | 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) in tls_get_cipher_data() argument 121 if (tls_ciphers[i].cipher == cipher) in tls_get_cipher_data() 127 int tls_server_key_exchange_allowed(tls_cipher cipher) in tls_server_key_exchange_allowed() argument 132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
|
D | tlsv1_record.c | 55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 33 a = cipher; in aes_wrap() 34 r = cipher + 8; in aes_wrap() 52 r = cipher + 8; in aes_wrap()
|
D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 35 os_memcpy(a, cipher, 8); in aes_unwrap() 37 os_memcpy(r, cipher + 8, 8 * n); in aes_unwrap()
|
D | crypto_ops.c | 20 static int esp_aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) in esp_aes_wrap() argument 22 return aes_wrap(kek, DEFAULT_KEK_LEN, n, plain, cipher); in esp_aes_wrap() 25 static int esp_aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) in esp_aes_unwrap() argument 27 return aes_unwrap(kek, DEFAULT_KEK_LEN, n, cipher, plain); in esp_aes_unwrap()
|
D | aes_wrap.h | 22 u8 *cipher); 24 const u8 *cipher, u8 *plain);
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wpa_common.c | 373 int wpa_cipher_valid_mgmt_group(int cipher) in wpa_cipher_valid_mgmt_group() argument 375 return cipher == WPA_CIPHER_AES_128_CMAC || in wpa_cipher_valid_mgmt_group() 376 cipher == WPA_CIPHER_BIP_GMAC_128 || in wpa_cipher_valid_mgmt_group() 377 cipher == WPA_CIPHER_BIP_GMAC_256; in wpa_cipher_valid_mgmt_group() 775 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) in wpa_pmk_r1_to_ptk() argument 800 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_r1_to_ptk() 1096 const char * wpa_cipher_txt(int cipher) in wpa_cipher_txt() argument 1098 switch (cipher) { in wpa_cipher_txt() 1146 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument 1177 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 351 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 393 const char * wpa_cipher_txt(int cipher); 436 struct wpa_ptk *ptk, int akmp, int cipher); 441 int wpa_cipher_key_len(int cipher); 442 int wpa_cipher_rsc_len(int cipher); 443 int wpa_cipher_to_alg(int cipher); 444 int wpa_cipher_valid_pairwise(int cipher); 445 int wpa_cipher_valid_mgmt_group(int cipher); 446 u32 wpa_cipher_to_suite(int proto, int cipher);
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.h | 45 wifi_cipher_type_t cipher_type_map_supp_to_public(unsigned cipher); 47 unsigned cipher_type_map_public_to_supp(wifi_cipher_type_t cipher);
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 134 cipher = Cipher(algorithms.AES(key), modes.ECB(), backend=backend) 135 encryptor = cipher.encryptor() 1251 cipher = None 1267 if block_offs % 32 == 0 or cipher is None: 1272 if cipher is None: # first pass 1273 cipher = Cipher(algorithms.AES(block_key), modes.ECB(), backend=backend) 1278 actor = cipher.encryptor() if do_decrypt else cipher.decryptor() 1300 cipher.algorithm.key = block_key 1301 actor = cipher.encryptor() if do_decrypt else cipher.decryptor() 1363 cipher = Cipher(algorithms.AES(key), modes.XTS(tweak), backend=backend) [all …]
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_wifi_crypto_types.h | 90 …sp_aes_wrap_t)(const unsigned char *kek, int n, const unsigned char *plain, unsigned char *cipher); 101 typedef int (*esp_aes_unwrap_t)(const unsigned char *kek, int n, const unsigned char *cipher, unsig…
|
/hal_espressif-latest/components/mbedtls/port/include/mbedtls/ |
D | gcm.h | 29 mbedtls_cipher_id_t cipher,
|
/hal_espressif-latest/components/mbedtls/port/include/aes/ |
D | esp_aes_gcm.h | 73 mbedtls_cipher_id_t cipher,
|
/hal_espressif-latest/components/mbedtls/ |
D | Kconfig | 411 cipher GCM operation as we support hardware acceleration only for AES cipher. 415 If this config is disabled, performing a non-AES cipher GCM operation with 425 operations using a non-AES cipher, you can safely disable this config, 829 bool "AES block cipher" 833 bool "Camellia block cipher" 837 bool "DES block cipher (legacy, insecure)" 840 Enables the DES block cipher to support 3DES-based TLS ciphersuites. 846 bool "Blowfish block cipher (read help)" 849 Enables the Blowfish block cipher (not used for TLS sessions.) 851 The Blowfish cipher is not used for mbedTLS TLS sessions but can be [all …]
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls.c | 687 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 701 n * 8, cipher, &olen, (n + 1) * 8); in aes_wrap() 707 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 721 ret = mbedtls_nist_kw_unwrap(&ctx, MBEDTLS_KW_MODE_KW, cipher, in aes_unwrap()
|
/hal_espressif-latest/components/mbedtls/port/aes/ |
D | esp_aes_gcm.c | 255 mbedtls_cipher_id_t cipher, in esp_aes_gcm_setkey() argument 270 if (cipher != MBEDTLS_CIPHER_ID_AES) { in esp_aes_gcm_setkey() 276 return mbedtls_gcm_setkey_soft(ctx->ctx_soft, cipher, key, keybits); in esp_aes_gcm_setkey()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_fast.c | 1607 char cipher[80]; in eap_fast_process() local 1614 cipher, sizeof(cipher)) < 0 || in eap_fast_process() 1615 os_strstr(cipher, "ADH-") || in eap_fast_process() 1616 os_strstr(cipher, "anon"))) { in eap_fast_process()
|
/hal_espressif-latest/components/wpa_supplicant/ |
D | CMakeLists.txt | 149 "src/crypto/crypto_internal-cipher.c"
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 39 * Type of primitive: Block cipher.
|
/hal_espressif-latest/zephyr/esp32/ |
D | CMakeLists.txt | 572 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"
|
/hal_espressif-latest/zephyr/esp32c2/ |
D | CMakeLists.txt | 530 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"
|
/hal_espressif-latest/zephyr/esp32s2/ |
D | CMakeLists.txt | 532 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"
|