Home
last modified time | relevance | path

Searched refs:suite (Results 1 – 13 of 13) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa_ie.c54 u32 suite; in wpa_gen_wpa_ie_wpa() local
66 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); in wpa_gen_wpa_ie_wpa()
67 if (suite == 0) { in wpa_gen_wpa_ie_wpa()
72 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
77 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); in wpa_gen_wpa_ie_wpa()
78 if (suite == 0 || in wpa_gen_wpa_ie_wpa()
85 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
122 u32 suite; in wpa_gen_wpa_ie_rsn() local
147 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn()
148 if (suite == 0) { in wpa_gen_wpa_ie_rsn()
[all …]
/hal_espressif-latest/tools/esptool_py/test/
DREADME.md1 # esptool.py test suite
3 …p32/contributing.html#automated-integration-tests) to learn about the test suite and how to run it.
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_record.c33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local
40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite()
41 if (suite == NULL) in tlsv1_record_set_cipher_suite()
44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite()
47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite()
50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite()
55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
Dtlsv1_common.c107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument
111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite()
129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local
132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
133 if (suite == NULL) in tls_server_key_exchange_allowed()
136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
Dtlsv1_server_read.c30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument
37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter()
38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter()
39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter()
40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter()
41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter()
814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local
862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
863 if (suite == NULL) in tls_process_client_key_exchange()
866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
Dtlsv1_server_write.c195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local
197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate()
198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate()
372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local
380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange()
381 if (suite == NULL) in tls_write_server_key_exchange()
384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
Dtlsv1_common.h216 u16 suite; member
250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
Dtlsv1_client_write.c522 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
524 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
525 if (suite == NULL) in tls_write_client_key_exchange()
528 keyx = suite->key_exchange; in tls_write_client_key_exchange()
Dtlsv1_client_read.c1032 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local
1099 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
1100 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange()
1101 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange()
1103 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwpa_auth_ie.c29 u32 suite; in wpa_write_wpa_ie() local
37 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie()
38 if (suite == 0) { in wpa_write_wpa_ie()
43 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie()
95 u32 suite; in wpa_write_rsn_ie() local
102 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie()
103 if (suite == 0) { in wpa_write_rsn_ie()
108 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie()
/hal_espressif-latest/tools/esptool_py/
DCONTRIBUTING.rst59 * Have you tried running ``esptool.py`` test suite locally?
123 The test directory contains a `pytest <https://docs.pytest.org/>`_ integration suite with some inte…
146 …Or to run the TestFlashing suite only (using the pytest ``-k`` option to select tests based on the…
168 The whole test suite (without the tests needing an actual hardware or installation of additional pr…
/hal_espressif-latest/components/esp_netif/
DKconfig25 lwIP is a small independent implementation of the TCP/IP protocol suite.
/hal_espressif-latest/components/esp_wifi/
DKconfig516 bool "Enable NSA suite B support with 192 bit key"
522 Select this option to enable 192 bit NSA suite-B.