| /hal_espressif-latest/components/wpa_supplicant/src/tls/ |
| D | tlsv1_server.c | 60 u8 seed[2 * TLS_RANDOM_LEN]; in tlsv1_server_derive_keys() local 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_derive_keys() 73 "master secret", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys() 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 89 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys() 477 u8 *seed, *pos; in tlsv1_server_prf() local 490 seed = os_malloc(seed_len); in tlsv1_server_prf() 491 if (!seed) in tlsv1_server_prf() [all …]
|
| D | tlsv1_client.c | 78 u8 seed[2 * TLS_RANDOM_LEN]; in tls_derive_keys() local 86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 87 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tls_derive_keys() 91 "master secret", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys() 101 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tls_derive_keys() 102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 108 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys() 563 u8 *seed, *pos; in tlsv1_client_prf() local 576 seed = os_malloc(seed_len); in tlsv1_client_prf() 577 if (!seed) in tlsv1_client_prf() [all …]
|
| D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
| D | tlsv1_common.h | 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
| /hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
| D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 47 MD5_addr[2] = seed; in tls_prf_sha1_md5() 54 SHA1_addr[2] = seed; in tls_prf_sha1_md5()
|
| D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 43 addr[2] = seed; in tls_prf_sha256()
|
| D | sha384-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 43 addr[2] = seed; in tls_prf_sha384()
|
| D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 44 addr[2] = seed; in sha1_t_prf()
|
| D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 23 const char *label, const u8 *seed,
|
| D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
| D | sha384.h | 25 const char *label, const u8 *seed, size_t seed_len, 28 const char *label, const u8 *seed, size_t seed_len,
|
| D | sha256-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument 51 addr[2] = seed; in hmac_sha256_kdf()
|
| /hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
| D | eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; in eap_fast_derive_master_secret() local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
|
| D | eap_peap_common.c | 19 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 34 addr[2] = seed; in peap_prfplus()
|
| D | eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
| /hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
| D | hmac_prng.c | 139 const uint8_t *seed, in tc_hmac_prng_reseed() argument 147 seed == (const uint8_t *) 0 || in tc_hmac_prng_reseed() 163 update(prng, seed, seedlen); in tc_hmac_prng_reseed() 168 update(prng, seed, seedlen); in tc_hmac_prng_reseed()
|
| /hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
| D | hmac_prng.c | 159 const uint8_t *seed, in tc_hmac_prng_reseed() argument 167 seed == (const uint8_t *) 0 || in tc_hmac_prng_reseed() 183 update(prng, seed, seedlen, additional_input, additionallen); in tc_hmac_prng_reseed() 187 update(prng, seed, seedlen, 0, 0); in tc_hmac_prng_reseed()
|
| /hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/ |
| D | hmac_prng.h | 139 int tc_hmac_prng_reseed(TCHmacPrng_t prng, const uint8_t *seed,
|
| /hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
| D | hmac_prng.h | 139 int tc_hmac_prng_reseed(TCHmacPrng_t prng, const uint8_t *seed,
|
| /hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/ |
| D | esp_app_sec.c | 13 extern void srand (unsigned int seed);
|
| /hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/ |
| D | tinycrypt.rst | 145 * Before using HMAC-PRNG, you *must* find an entropy source to produce a seed. 146 PRNGs only stretch the seed into a seemingly random output of arbitrary 148 unpredictability of the seed. 150 * NIST SP 800-90A requires three items as seed material in the initialization 151 step: entropy seed, personalization and a nonce (which is not implemented). 153 the entropy seed using a mandatory call to the re-seed function. 170 * Before using CTR-PRNG, you *must* find an entropy source to produce a seed. 171 PRNGs only stretch the seed into a seemingly random output of arbitrary 173 unpredictability of the seed.
|
| /hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
| D | tls_mbedtls.c | 1010 u8 seed[2 * TLS_RANDOM_LEN]; in tls_connection_prf() local 1023 os_memcpy(seed, conn->randbytes + TLS_RANDOM_LEN, TLS_RANDOM_LEN); in tls_connection_prf() 1024 os_memcpy(seed + TLS_RANDOM_LEN, conn->randbytes, TLS_RANDOM_LEN); in tls_connection_prf() 1026 os_memcpy(seed, conn->randbytes, 2 * TLS_RANDOM_LEN); in tls_connection_prf() 1029 wpa_hexdump_key(MSG_MSGDUMP, "random", seed, 2 * TLS_RANDOM_LEN); in tls_connection_prf() 1033 label, seed, 2 * TLS_RANDOM_LEN, out, out_len); in tls_connection_prf()
|
| /hal_espressif-latest/zephyr/esp32/src/bt/ |
| D | esp_bt_adapter.c | 127 void (*_srand)(unsigned int seed); 243 static void srand_wrapper(unsigned int seed); 698 static void IRAM_ATTR srand_wrapper(unsigned int seed) in srand_wrapper() argument 701 ARG_UNUSED(seed); in srand_wrapper()
|
| /hal_espressif-latest/zephyr/esp32c3/src/bt/ |
| D | esp_bt_adapter.c | 155 void (* _srand)(unsigned int seed); 266 static void srand_wrapper(unsigned int seed); 741 static void IRAM_ATTR srand_wrapper(unsigned int seed) in srand_wrapper() argument 744 ARG_UNUSED(seed); in srand_wrapper()
|
| /hal_espressif-latest/zephyr/esp32s3/src/bt/ |
| D | esp_bt_adapter.c | 155 void (* _srand)(unsigned int seed); 264 static void srand_wrapper(unsigned int seed); 730 static void IRAM_ATTR srand_wrapper(unsigned int seed) in srand_wrapper() argument 733 ARG_UNUSED(seed); in srand_wrapper()
|