Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 30) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_server.c531 char *cipher; in tlsv1_server_get_cipher() local
535 cipher = "RC4-MD5"; in tlsv1_server_get_cipher()
538 cipher = "RC4-SHA"; in tlsv1_server_get_cipher()
541 cipher = "DES-CBC-SHA"; in tlsv1_server_get_cipher()
544 cipher = "DES-CBC3-SHA"; in tlsv1_server_get_cipher()
547 cipher = "DHE-RSA-DES-CBC-SHA"; in tlsv1_server_get_cipher()
550 cipher = "DHE-RSA-DES-CBC3-SHA"; in tlsv1_server_get_cipher()
553 cipher = "ADH-RC4-MD5"; in tlsv1_server_get_cipher()
556 cipher = "ADH-DES-SHA"; in tlsv1_server_get_cipher()
559 cipher = "ADH-DES-CBC3-SHA"; in tlsv1_server_get_cipher()
[all …]
Dtlsv1_client.c617 char *cipher; in tlsv1_client_get_cipher() local
621 cipher = "RC4-MD5"; in tlsv1_client_get_cipher()
624 cipher = "RC4-SHA"; in tlsv1_client_get_cipher()
627 cipher = "DES-CBC-SHA"; in tlsv1_client_get_cipher()
630 cipher = "DES-CBC3-SHA"; in tlsv1_client_get_cipher()
633 cipher = "DHE-RSA-DES-CBC-SHA"; in tlsv1_client_get_cipher()
636 cipher = "DHE-RSA-DES-CBC3-SHA"; in tlsv1_client_get_cipher()
639 cipher = "ADH-RC4-MD5"; in tlsv1_client_get_cipher()
642 cipher = "ADH-DES-SHA"; in tlsv1_client_get_cipher()
645 cipher = "ADH-DES-CBC3-SHA"; in tlsv1_client_get_cipher()
[all …]
Dtlsv1_common.h218 tls_cipher cipher; member
228 tls_cipher cipher; member
251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
252 int tls_server_key_exchange_allowed(tls_cipher cipher);
Dtlsv1_common.c117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) in tls_get_cipher_data() argument
121 if (tls_ciphers[i].cipher == cipher) in tls_get_cipher_data()
127 int tls_server_key_exchange_allowed(tls_cipher cipher) in tls_server_key_exchange_allowed() argument
132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
Dtlsv1_record.c55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
33 a = cipher; in aes_wrap()
34 r = cipher + 8; in aes_wrap()
52 r = cipher + 8; in aes_wrap()
Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
35 os_memcpy(a, cipher, 8); in aes_unwrap()
37 os_memcpy(r, cipher + 8, 8 * n); in aes_unwrap()
Dcrypto_ops.c20 static int esp_aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) in esp_aes_wrap() argument
22 return aes_wrap(kek, DEFAULT_KEK_LEN, n, plain, cipher); in esp_aes_wrap()
25 static int esp_aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) in esp_aes_unwrap() argument
27 return aes_unwrap(kek, DEFAULT_KEK_LEN, n, cipher, plain); in esp_aes_unwrap()
Daes_wrap.h22 u8 *cipher);
24 const u8 *cipher, u8 *plain);
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dwpa_common.c373 int wpa_cipher_valid_mgmt_group(int cipher) in wpa_cipher_valid_mgmt_group() argument
375 return cipher == WPA_CIPHER_AES_128_CMAC || in wpa_cipher_valid_mgmt_group()
376 cipher == WPA_CIPHER_BIP_GMAC_128 || in wpa_cipher_valid_mgmt_group()
377 cipher == WPA_CIPHER_BIP_GMAC_256; in wpa_cipher_valid_mgmt_group()
775 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) in wpa_pmk_r1_to_ptk() argument
800 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_r1_to_ptk()
1096 const char * wpa_cipher_txt(int cipher) in wpa_cipher_txt() argument
1098 switch (cipher) { in wpa_cipher_txt()
1146 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument
1177 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk()
[all …]
Dwpa_common.h351 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
393 const char * wpa_cipher_txt(int cipher);
436 struct wpa_ptk *ptk, int akmp, int cipher);
441 int wpa_cipher_key_len(int cipher);
442 int wpa_cipher_rsc_len(int cipher);
443 int wpa_cipher_to_alg(int cipher);
444 int wpa_cipher_valid_pairwise(int cipher);
445 int wpa_cipher_valid_mgmt_group(int cipher);
446 u32 wpa_cipher_to_suite(int proto, int cipher);
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa.h45 wifi_cipher_type_t cipher_type_map_supp_to_public(unsigned cipher);
47 unsigned cipher_type_map_public_to_supp(wifi_cipher_type_t cipher);
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py134 cipher = Cipher(algorithms.AES(key), modes.ECB(), backend=backend)
135 encryptor = cipher.encryptor()
1251 cipher = None
1267 if block_offs % 32 == 0 or cipher is None:
1272 if cipher is None: # first pass
1273 cipher = Cipher(algorithms.AES(block_key), modes.ECB(), backend=backend)
1278 actor = cipher.encryptor() if do_decrypt else cipher.decryptor()
1300 cipher.algorithm.key = block_key
1301 actor = cipher.encryptor() if do_decrypt else cipher.decryptor()
1363 cipher = Cipher(algorithms.AES(key), modes.XTS(tweak), backend=backend)
[all …]
/hal_espressif-latest/components/esp_wifi/include/
Desp_wifi_crypto_types.h90 …sp_aes_wrap_t)(const unsigned char *kek, int n, const unsigned char *plain, unsigned char *cipher);
101 typedef int (*esp_aes_unwrap_t)(const unsigned char *kek, int n, const unsigned char *cipher, unsig…
/hal_espressif-latest/components/mbedtls/port/include/mbedtls/
Dgcm.h29 mbedtls_cipher_id_t cipher,
/hal_espressif-latest/components/mbedtls/port/include/aes/
Desp_aes_gcm.h73 mbedtls_cipher_id_t cipher,
/hal_espressif-latest/components/mbedtls/
DKconfig411 cipher GCM operation as we support hardware acceleration only for AES cipher.
415 If this config is disabled, performing a non-AES cipher GCM operation with
425 operations using a non-AES cipher, you can safely disable this config,
829 bool "AES block cipher"
833 bool "Camellia block cipher"
837 bool "DES block cipher (legacy, insecure)"
840 Enables the DES block cipher to support 3DES-based TLS ciphersuites.
846 bool "Blowfish block cipher (read help)"
849 Enables the Blowfish block cipher (not used for TLS sessions.)
851 The Blowfish cipher is not used for mbedTLS TLS sessions but can be
[all …]
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dcrypto_mbedtls.c687 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
701 n * 8, cipher, &olen, (n + 1) * 8); in aes_wrap()
707 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
721 ret = mbedtls_nist_kw_unwrap(&ctx, MBEDTLS_KW_MODE_KW, cipher, in aes_unwrap()
/hal_espressif-latest/components/mbedtls/port/aes/
Desp_aes_gcm.c255 mbedtls_cipher_id_t cipher, in esp_aes_gcm_setkey() argument
270 if (cipher != MBEDTLS_CIPHER_ID_AES) { in esp_aes_gcm_setkey()
276 return mbedtls_gcm_setkey_soft(ctx->ctx_soft, cipher, key, keybits); in esp_aes_gcm_setkey()
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_fast.c1607 char cipher[80]; in eap_fast_process() local
1614 cipher, sizeof(cipher)) < 0 || in eap_fast_process()
1615 os_strstr(cipher, "ADH-") || in eap_fast_process()
1616 os_strstr(cipher, "anon"))) { in eap_fast_process()
/hal_espressif-latest/components/wpa_supplicant/
DCMakeLists.txt149 "src/crypto/crypto_internal-cipher.c"
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/
Dtinycrypt.rst39 * Type of primitive: Block cipher.
/hal_espressif-latest/zephyr/esp32/
DCMakeLists.txt572 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"
/hal_espressif-latest/zephyr/esp32c2/
DCMakeLists.txt530 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"
/hal_espressif-latest/zephyr/esp32s2/
DCMakeLists.txt532 "${WPA_SUPPLICANT_COMPONENT_DIR}/src/crypto/crypto_internal-cipher.c"

12