/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_client_ocsp.c | 145 pos = hdr.payload; in tls_process_ocsp_single_response() 146 end = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 167 name_hash = hdr.payload; in tls_process_ocsp_single_response() 171 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 192 key_hash = hdr.payload; in tls_process_ocsp_single_response() 195 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 215 serial_number = hdr.payload; in tls_process_ocsp_single_response() 249 hdr.payload, hdr.length); in tls_process_ocsp_single_response() 250 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 256 x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) { in tls_process_ocsp_single_response() [all …]
|
D | tlsv1_cred.c | 463 pos = hdr.payload; in pkcs12_certbag() 464 end = hdr.payload + hdr.length; in pkcs12_certbag() 488 if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 || in pkcs12_certbag() 496 hdr.payload, hdr.length); in pkcs12_certbag() 501 cert = x509_certificate_parse(hdr.payload, hdr.length); in pkcs12_certbag() 511 return tlsv1_set_cert(cred, NULL, hdr.payload, hdr.length); in pkcs12_certbag() 535 hdr.payload, hdr.length); in pkcs12_parse_attr_friendly_name() 560 hdr.payload, hdr.length); in pkcs12_parse_attr_local_key_id() 592 hdr.payload, hdr.length); in pkcs12_parse_attr() 593 pos = hdr.payload; in pkcs12_parse_attr() [all …]
|
D | pkcs8.c | 35 pos = hdr.payload; in pkcs8_key_import() 48 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { in pkcs8_key_import() 53 pos = hdr.payload + hdr.length; in pkcs8_key_import() 72 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { in pkcs8_key_import() 94 pos = hdr.payload + hdr.length; in pkcs8_key_import() 106 crypto_rsa_import_private_key(hdr.payload, hdr.length); in pkcs8_key_import() 136 pos = hdr.payload; in pkcs8_enc_key_import() 146 enc_alg = hdr.payload; in pkcs8_enc_key_import() 148 pos = hdr.payload + hdr.length; in pkcs8_enc_key_import() 158 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length, in pkcs8_enc_key_import()
|
D | x509v3.c | 200 if (hdr.length > buf + len - hdr.payload) in x509_parse_algorithm_identifier() 202 pos = hdr.payload; in x509_parse_algorithm_identifier() 239 pos = hdr.payload; in x509_parse_public_key() 258 pos = hdr.payload; in x509_parse_public_key() 310 pos = hdr.payload; in x509_parse_name() 328 set_pos = hdr.payload; in x509_parse_name() 329 pos = set_end = hdr.payload + hdr.length; in x509_parse_name() 339 seq_pos = hdr.payload; in x509_parse_name() 340 seq_end = hdr.payload + hdr.length; in x509_parse_name() 412 os_memcpy(name->email, hdr.payload, hdr.length); in x509_parse_name() [all …]
|
D | pkcs5.c | 115 pos = hdr.payload; in pkcs5_get_params_pbes2() 116 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 125 pos = hdr.payload; in pkcs5_get_params_pbes2() 126 kdf_end = end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 166 pos = hdr.payload; in pkcs5_get_params_pbes2() 167 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 177 pos = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2() 188 params->iter_count = *hdr.payload; in pkcs5_get_params_pbes2() 190 params->iter_count = WPA_GET_BE16(hdr.payload); in pkcs5_get_params_pbes2() [all …]
|
D | pkcs1.c | 246 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 248 pos = hdr.payload; in pkcs1_v15_sig_ver() 267 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 268 da_end = hdr.payload + hdr.length; in pkcs1_v15_sig_ver() 270 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &next)) { in pkcs1_v15_sig_ver() 287 hdr.payload + hdr.length != da_end)) { in pkcs1_v15_sig_ver() 316 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 319 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver() 325 if (hdr.payload + hdr.length != decrypted + decrypted_len) { in pkcs1_v15_sig_ver() 330 hdr.payload + hdr.length, in pkcs1_v15_sig_ver() [all …]
|
D | asn1.c | 115 if (hdr->payload[0] != 0 && hdr->payload[0] != 0xff) { in asn1_valid_der_boolean() 118 hdr->payload[0]); in asn1_valid_der_boolean() 266 hdr->payload = pos; in asn1_get_next() 345 *next = hdr.payload + hdr.length; in asn1_get_oid() 347 return asn1_parse_oid(hdr.payload, hdr.length, oid); in asn1_get_oid() 446 *next = hdr.payload + hdr.length; in asn1_get_integer() 447 pos = hdr.payload; in asn1_get_integer() 475 *next = hdr->payload + hdr->length; in asn1_get_sequence() 492 asn1_get_oid(hdr.payload, hdr.length, oid, &pos) < 0) in asn1_get_alg_id() 497 *params_len = hdr.payload + hdr.length - pos; in asn1_get_alg_id() [all …]
|
D | tlsv1_server_write.c | 766 u8 payload[4]; in tls_write_server_hello_done() local 773 pos = payload; in tls_write_server_hello_done() 782 *msgpos, end - *msgpos, payload, pos - payload, in tls_write_server_hello_done() 790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done() 802 u8 payload[1]; in tls_write_server_change_cipher_spec() local 806 payload[0] = TLS_CHANGE_CIPHER_SPEC; in tls_write_server_change_cipher_spec() 809 *msgpos, end - *msgpos, payload, sizeof(payload), in tls_write_server_change_cipher_spec()
|
D | rsa.c | 45 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { in crypto_rsa_parse_integer() 50 return hdr.payload + hdr.length; in crypto_rsa_parse_integer() 90 pos = hdr.payload; in crypto_rsa_import_public_key() 193 pos = hdr.payload; in crypto_rsa_import_private_key()
|
D | asn1.h | 50 const u8 *payload; member 81 void asn1_put_sequence(struct wpabuf *buf, const struct wpabuf *payload); 82 void asn1_put_set(struct wpabuf *buf, const struct wpabuf *payload);
|
D | tlsv1_record.c | 151 size_t buf_size, const u8 *payload, size_t payload_len, in tlsv1_record_send() argument 198 os_memmove(pos, payload, payload_len); in tlsv1_record_send() 217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send()
|
D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
D | ccm_mode.c | 139 unsigned int alen, const uint8_t *payload, in tc_ccm_generation_encryption() argument 146 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_generation_encryption() 174 ccm_cbc_mac(tag, payload, plen, 0, c->sched); in tc_ccm_generation_encryption() 184 ccm_ctr_mode(out, plen, payload, plen, b, c->sched); in tc_ccm_generation_encryption() 200 unsigned int alen, const uint8_t *payload, in tc_ccm_decryption_verification() argument 207 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_decryption_verification() 229 ccm_ctr_mode(out, plen - c->mlen, payload, plen - c->mlen, b, c->sched); in tc_ccm_decryption_verification() 236 tag[i] = *(payload + plen - c->mlen + i) ^ b[i]; in tc_ccm_decryption_verification()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | ccm_mode.c | 139 unsigned int alen, const uint8_t *payload, in tc_ccm_generation_encryption() argument 146 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_generation_encryption() 174 ccm_cbc_mac(tag, payload, plen, 0, c->sched); in tc_ccm_generation_encryption() 184 ccm_ctr_mode(out, plen, payload, plen, b, c->sched); in tc_ccm_generation_encryption() 200 unsigned int alen, const uint8_t *payload, in tc_ccm_decryption_verification() argument 207 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_decryption_verification() 229 ccm_ctr_mode(out, plen - c->mlen, payload, plen - c->mlen, b, c->sched); in tc_ccm_decryption_verification() 236 tag[i] = *(payload + plen - c->mlen + i) ^ b[i]; in tc_ccm_decryption_verification()
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
D | ccm_mode.h | 158 unsigned int alen, const uint8_t *payload, 204 unsigned int alen, const uint8_t *payload, unsigned int plen,
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | ccm_mode.h | 158 unsigned int alen, const uint8_t *payload, 204 unsigned int alen, const uint8_t *payload, unsigned int plen,
|
/hal_espressif-latest/components/esp_netif/lwip/netif/ |
D | wlanif.c | 90 ret = esp_netif_transmit_wrap(esp_netif, q->payload, q->len, q); in low_level_output() 100 ret = esp_netif_transmit_wrap(esp_netif, q->payload, q->len, q); in low_level_output() 148 memcpy(p->payload, buffer, len); in wlanif_input()
|
D | ethernetif.c | 84 ret = esp_netif_transmit(esp_netif, q->payload, q->len); in ethernet_low_level_output() 93 ret = esp_netif_transmit(esp_netif, q->payload, q->len); in ethernet_low_level_output()
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_common.c | 64 os_memcpy(frm->payload, frame, len); in handle_action_frm() 76 u8 *payload, size_t len, int8_t rssi) in handle_rrm_frame() argument 78 if (payload[0] == WLAN_RRM_NEIGHBOR_REPORT_RESPONSE) { in handle_rrm_frame() 80 wpas_rrm_process_neighbor_rep(wpa_s, payload + 1, len - 1); in handle_rrm_frame() 81 } else if (payload[0] == WLAN_RRM_RADIO_MEASUREMENT_REQUEST) { in handle_rrm_frame() 84 sender, payload + 1, len - 1); in handle_rrm_frame() 85 } else if (payload[0] == WLAN_RRM_LINK_MEASUREMENT_REQUEST) { in handle_rrm_frame() 88 payload + 1, len - 1, rssi); in handle_rrm_frame() 136 mgmt_rx_action(frm->payload, frm->len, frm->sender, frm->rssi, frm->channel); in btm_rrm_task()
|
D | esp_common_i.h | 21 u8 payload[0]; member
|
D | esp_dpp_i.h | 57 int esp_supp_rx_action(uint8_t *hdr, uint8_t *payload, size_t len, uint8_t channel);
|
/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/ |
D | __init__.py | 130 def sign_payload(private_key, payload): argument 136 data=payload, mechanism=mechanism, mechanism_param=mechanism_params
|
/hal_espressif-latest/tools/esptool_py/docs/en/advanced-topics/ |
D | serial-protocol.rst | 23 …equest with a SLIP encoded response packet, including status information and any data as a payload. 55 | 8..n | Data | Variable length data payload (0-65535 bytes, as indicated by Size paramete… 78 | 8..n | Data | Variable length data payload. Length indicated by "Size" field. … 84 The final bytes of the Data payload indicate command status: 88 …loader the final two bytes indicate status (most commands return at least a two byte Data payload): 92 …loader the final two bytes indicate status (most commands return at least a two byte Data payload): 284 …DATA`` command packets (like ``FLASH_DEFL_DATA``, ``MEM_DATA``) has the same "data payload" format: 295 | 16- | "Data to write" | Length given at beginning of payload. … 321 …e host starts by sending SYNC commands. These commands have a large data payload which is also use… 322 …e host starts by sending SYNC commands. These commands have a large data payload which is also use… [all …]
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 197 of CCM under a given key and the maximum payload length for those 200 the nonce size, which is: 15-q bytes. The maximum payload length for those 209 The maximum payload length is: 2^16 bytes = 65 KB. 221 * Both non-empty payload and associated data (it encrypts and 222 authenticates the payload and only authenticates the associated data); 224 * Non-empty payload and empty associated data (it encrypts and 225 authenticates the payload); 227 * Non-empty associated data and empty payload (it degenerates to an
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wnm_sta.h | 60 u8 *sender, u8 *payload, size_t len);
|