Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 25 of 37) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_client_ocsp.c145 pos = hdr.payload; in tls_process_ocsp_single_response()
146 end = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
167 name_hash = hdr.payload; in tls_process_ocsp_single_response()
171 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
192 key_hash = hdr.payload; in tls_process_ocsp_single_response()
195 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
215 serial_number = hdr.payload; in tls_process_ocsp_single_response()
249 hdr.payload, hdr.length); in tls_process_ocsp_single_response()
250 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
256 x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) { in tls_process_ocsp_single_response()
[all …]
Dtlsv1_cred.c463 pos = hdr.payload; in pkcs12_certbag()
464 end = hdr.payload + hdr.length; in pkcs12_certbag()
488 if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 || in pkcs12_certbag()
496 hdr.payload, hdr.length); in pkcs12_certbag()
501 cert = x509_certificate_parse(hdr.payload, hdr.length); in pkcs12_certbag()
511 return tlsv1_set_cert(cred, NULL, hdr.payload, hdr.length); in pkcs12_certbag()
535 hdr.payload, hdr.length); in pkcs12_parse_attr_friendly_name()
560 hdr.payload, hdr.length); in pkcs12_parse_attr_local_key_id()
592 hdr.payload, hdr.length); in pkcs12_parse_attr()
593 pos = hdr.payload; in pkcs12_parse_attr()
[all …]
Dpkcs8.c35 pos = hdr.payload; in pkcs8_key_import()
48 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { in pkcs8_key_import()
53 pos = hdr.payload + hdr.length; in pkcs8_key_import()
72 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { in pkcs8_key_import()
94 pos = hdr.payload + hdr.length; in pkcs8_key_import()
106 crypto_rsa_import_private_key(hdr.payload, hdr.length); in pkcs8_key_import()
136 pos = hdr.payload; in pkcs8_enc_key_import()
146 enc_alg = hdr.payload; in pkcs8_enc_key_import()
148 pos = hdr.payload + hdr.length; in pkcs8_enc_key_import()
158 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length, in pkcs8_enc_key_import()
Dx509v3.c200 if (hdr.length > buf + len - hdr.payload) in x509_parse_algorithm_identifier()
202 pos = hdr.payload; in x509_parse_algorithm_identifier()
239 pos = hdr.payload; in x509_parse_public_key()
258 pos = hdr.payload; in x509_parse_public_key()
310 pos = hdr.payload; in x509_parse_name()
328 set_pos = hdr.payload; in x509_parse_name()
329 pos = set_end = hdr.payload + hdr.length; in x509_parse_name()
339 seq_pos = hdr.payload; in x509_parse_name()
340 seq_end = hdr.payload + hdr.length; in x509_parse_name()
412 os_memcpy(name->email, hdr.payload, hdr.length); in x509_parse_name()
[all …]
Dpkcs5.c115 pos = hdr.payload; in pkcs5_get_params_pbes2()
116 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
125 pos = hdr.payload; in pkcs5_get_params_pbes2()
126 kdf_end = end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
166 pos = hdr.payload; in pkcs5_get_params_pbes2()
167 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
177 pos = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2()
188 params->iter_count = *hdr.payload; in pkcs5_get_params_pbes2()
190 params->iter_count = WPA_GET_BE16(hdr.payload); in pkcs5_get_params_pbes2()
[all …]
Dpkcs1.c246 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
248 pos = hdr.payload; in pkcs1_v15_sig_ver()
267 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
268 da_end = hdr.payload + hdr.length; in pkcs1_v15_sig_ver()
270 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &next)) { in pkcs1_v15_sig_ver()
287 hdr.payload + hdr.length != da_end)) { in pkcs1_v15_sig_ver()
316 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
319 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
325 if (hdr.payload + hdr.length != decrypted + decrypted_len) { in pkcs1_v15_sig_ver()
330 hdr.payload + hdr.length, in pkcs1_v15_sig_ver()
[all …]
Dasn1.c115 if (hdr->payload[0] != 0 && hdr->payload[0] != 0xff) { in asn1_valid_der_boolean()
118 hdr->payload[0]); in asn1_valid_der_boolean()
266 hdr->payload = pos; in asn1_get_next()
345 *next = hdr.payload + hdr.length; in asn1_get_oid()
347 return asn1_parse_oid(hdr.payload, hdr.length, oid); in asn1_get_oid()
446 *next = hdr.payload + hdr.length; in asn1_get_integer()
447 pos = hdr.payload; in asn1_get_integer()
475 *next = hdr->payload + hdr->length; in asn1_get_sequence()
492 asn1_get_oid(hdr.payload, hdr.length, oid, &pos) < 0) in asn1_get_alg_id()
497 *params_len = hdr.payload + hdr.length - pos; in asn1_get_alg_id()
[all …]
Dtlsv1_server_write.c766 u8 payload[4]; in tls_write_server_hello_done() local
773 pos = payload; in tls_write_server_hello_done()
782 *msgpos, end - *msgpos, payload, pos - payload, in tls_write_server_hello_done()
790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done()
802 u8 payload[1]; in tls_write_server_change_cipher_spec() local
806 payload[0] = TLS_CHANGE_CIPHER_SPEC; in tls_write_server_change_cipher_spec()
809 *msgpos, end - *msgpos, payload, sizeof(payload), in tls_write_server_change_cipher_spec()
Drsa.c45 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { in crypto_rsa_parse_integer()
50 return hdr.payload + hdr.length; in crypto_rsa_parse_integer()
90 pos = hdr.payload; in crypto_rsa_import_public_key()
193 pos = hdr.payload; in crypto_rsa_import_private_key()
Dasn1.h50 const u8 *payload; member
81 void asn1_put_sequence(struct wpabuf *buf, const struct wpabuf *payload);
82 void asn1_put_set(struct wpabuf *buf, const struct wpabuf *payload);
Dtlsv1_record.c151 size_t buf_size, const u8 *payload, size_t payload_len, in tlsv1_record_send() argument
198 os_memmove(pos, payload, payload_len); in tlsv1_record_send()
217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send()
Dtlsv1_record.h65 size_t buf_size, const u8 *payload, size_t payload_len,
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/
Dccm_mode.c139 unsigned int alen, const uint8_t *payload, in tc_ccm_generation_encryption() argument
146 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_generation_encryption()
174 ccm_cbc_mac(tag, payload, plen, 0, c->sched); in tc_ccm_generation_encryption()
184 ccm_ctr_mode(out, plen, payload, plen, b, c->sched); in tc_ccm_generation_encryption()
200 unsigned int alen, const uint8_t *payload, in tc_ccm_decryption_verification() argument
207 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_decryption_verification()
229 ccm_ctr_mode(out, plen - c->mlen, payload, plen - c->mlen, b, c->sched); in tc_ccm_decryption_verification()
236 tag[i] = *(payload + plen - c->mlen + i) ^ b[i]; in tc_ccm_decryption_verification()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Dccm_mode.c139 unsigned int alen, const uint8_t *payload, in tc_ccm_generation_encryption() argument
146 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_generation_encryption()
174 ccm_cbc_mac(tag, payload, plen, 0, c->sched); in tc_ccm_generation_encryption()
184 ccm_ctr_mode(out, plen, payload, plen, b, c->sched); in tc_ccm_generation_encryption()
200 unsigned int alen, const uint8_t *payload, in tc_ccm_decryption_verification() argument
207 ((plen > 0) && (payload == (uint8_t *) 0)) || in tc_ccm_decryption_verification()
229 ccm_ctr_mode(out, plen - c->mlen, payload, plen - c->mlen, b, c->sched); in tc_ccm_decryption_verification()
236 tag[i] = *(payload + plen - c->mlen + i) ^ b[i]; in tc_ccm_decryption_verification()
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/
Dccm_mode.h158 unsigned int alen, const uint8_t *payload,
204 unsigned int alen, const uint8_t *payload, unsigned int plen,
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Dccm_mode.h158 unsigned int alen, const uint8_t *payload,
204 unsigned int alen, const uint8_t *payload, unsigned int plen,
/hal_espressif-latest/components/esp_netif/lwip/netif/
Dwlanif.c90 ret = esp_netif_transmit_wrap(esp_netif, q->payload, q->len, q); in low_level_output()
100 ret = esp_netif_transmit_wrap(esp_netif, q->payload, q->len, q); in low_level_output()
148 memcpy(p->payload, buffer, len); in wlanif_input()
Dethernetif.c84 ret = esp_netif_transmit(esp_netif, q->payload, q->len); in ethernet_low_level_output()
93 ret = esp_netif_transmit(esp_netif, q->payload, q->len); in ethernet_low_level_output()
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_common.c64 os_memcpy(frm->payload, frame, len); in handle_action_frm()
76 u8 *payload, size_t len, int8_t rssi) in handle_rrm_frame() argument
78 if (payload[0] == WLAN_RRM_NEIGHBOR_REPORT_RESPONSE) { in handle_rrm_frame()
80 wpas_rrm_process_neighbor_rep(wpa_s, payload + 1, len - 1); in handle_rrm_frame()
81 } else if (payload[0] == WLAN_RRM_RADIO_MEASUREMENT_REQUEST) { in handle_rrm_frame()
84 sender, payload + 1, len - 1); in handle_rrm_frame()
85 } else if (payload[0] == WLAN_RRM_LINK_MEASUREMENT_REQUEST) { in handle_rrm_frame()
88 payload + 1, len - 1, rssi); in handle_rrm_frame()
136 mgmt_rx_action(frm->payload, frm->len, frm->sender, frm->rssi, frm->channel); in btm_rrm_task()
Desp_common_i.h21 u8 payload[0]; member
Desp_dpp_i.h57 int esp_supp_rx_action(uint8_t *hdr, uint8_t *payload, size_t len, uint8_t channel);
/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/
D__init__.py130 def sign_payload(private_key, payload): argument
136 data=payload, mechanism=mechanism, mechanism_param=mechanism_params
/hal_espressif-latest/tools/esptool_py/docs/en/advanced-topics/
Dserial-protocol.rst23 …equest with a SLIP encoded response packet, including status information and any data as a payload.
55 | 8..n | Data | Variable length data payload (0-65535 bytes, as indicated by Size paramete…
78 | 8..n | Data | Variable length data payload. Length indicated by "Size" field. …
84 The final bytes of the Data payload indicate command status:
88 …loader the final two bytes indicate status (most commands return at least a two byte Data payload):
92 …loader the final two bytes indicate status (most commands return at least a two byte Data payload):
284 …DATA`` command packets (like ``FLASH_DEFL_DATA``, ``MEM_DATA``) has the same "data payload" format:
295 | 16- | "Data to write" | Length given at beginning of payload. …
321 …e host starts by sending SYNC commands. These commands have a large data payload which is also use…
322 …e host starts by sending SYNC commands. These commands have a large data payload which is also use…
[all …]
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/
Dtinycrypt.rst197 of CCM under a given key and the maximum payload length for those
200 the nonce size, which is: 15-q bytes. The maximum payload length for those
209 The maximum payload length is: 2^16 bytes = 65 KB.
221 * Both non-empty payload and associated data (it encrypts and
222 authenticates the payload and only authenticates the associated data);
224 * Non-empty payload and empty associated data (it encrypts and
225 authenticates the payload);
227 * Non-empty associated data and empty payload (it degenerates to an
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dwnm_sta.h60 u8 *sender, u8 *payload, size_t len);

12