/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | dpp.c | 240 static void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument 242 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 889 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument 901 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_ke() 910 nonce_len = auth->curve->nonce_len; in dpp_derive_ke() 911 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 912 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 913 addr[num_elem] = auth->Mx; in dpp_derive_ke() 914 len[num_elem] = auth->Mx_len; in dpp_derive_ke() 916 addr[num_elem] = auth->Nx; in dpp_derive_ke() [all …]
|
D | dpp.h | 461 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 463 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 465 struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth, 469 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 471 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 482 struct dpp_authentication *auth, 484 void dpp_auth_deinit(struct dpp_authentication *auth); 486 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, 488 int dpp_conf_resp_rx(struct dpp_authentication *auth, const u8 *resp, 490 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth, [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | aes-ccm.c | 118 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 128 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 129 wpa_hexdump_key(MSG_DEBUG, "CCM U", auth, M); in aes_ccm_encr_auth() 133 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 138 wpa_hexdump_key(MSG_DEBUG, "CCM U", auth, M); in aes_ccm_decr_auth() 143 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 151 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 170 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 181 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 197 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|
D | aes_wrap.h | 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_dpp.c | 192 static void gas_query_req_tx(struct dpp_authentication *auth) in gas_query_req_tx() argument 197 buf = dpp_build_conf_req_helper(auth, NULL, 0, NULL, in gas_query_req_tx() 206 MAC2STR(auth->peer_mac_addr), auth->curr_chan); in gas_query_req_tx() 208 esp_dpp_send_action_frame(auth->peer_mac_addr, wpabuf_head(buf), wpabuf_len(buf), in gas_query_req_tx() 209 auth->curr_chan, OFFCHAN_TX_WAIT_TIME); in gas_query_req_tx() 212 static int esp_dpp_handle_config_obj(struct dpp_authentication *auth, in esp_dpp_handle_config_obj() argument 250 struct dpp_authentication *auth = s_dpp_ctx.dpp_auth; in esp_dpp_rx_auth_conf() local 259 if (!auth) { in esp_dpp_rx_auth_conf() 265 if (os_memcmp(rx_param->sa, auth->peer_mac_addr, ETH_ALEN) != 0) { in esp_dpp_rx_auth_conf() 267 MACSTR ") - drop", MAC2STR(auth->peer_mac_addr)); in esp_dpp_rx_auth_conf() [all …]
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | beacon.c | 128 net_buf_simple_add_mem(buf, sub->auth, 8); in bt_mesh_beacon_create() 133 bt_hex(sub->auth, 8)); in bt_mesh_beacon_create() 339 uint8_t *data = NULL, *net_id = NULL, *auth = NULL; in secure_beacon_recv() local 364 auth = buf->data; in secure_beacon_recv() 369 sub = bt_mesh_subnet_find(net_id, flags, iv_index, auth, &new_key); in secure_beacon_recv()
|
D | prov.c | 125 uint8_t auth[16]; /* Authentication Value */ member 699 (void)memset(link.auth, 0, sizeof(link.auth)); in prov_auth() 706 memcpy(link.auth + 16 - prov->static_val_len, in prov_auth() 708 (void)memset(link.auth, 0, in prov_auth() 709 sizeof(link.auth) - prov->static_val_len); in prov_auth() 743 memcpy(link.auth, str, size); in prov_auth() 744 (void)memset(link.auth + size, 0, in prov_auth() 745 sizeof(link.auth) - size); in prov_auth() 768 sys_put_be32(num, &link.auth[12]); in prov_auth() 769 (void)memset(link.auth, 0, 12); in prov_auth() [all …]
|
D | crypto.h | 81 uint8_t auth[8]); 162 const uint8_t auth[16], uint8_t conf[16]);
|
D | provisioner_prov.c | 146 uint8_t *auth; /* Authentication Value */ member 1249 PROV_FREE_MEM(idx, auth); 1897 link[idx].auth = (uint8_t *)bt_mesh_calloc(PROV_AUTH_VAL_SIZE); 1898 if (!link[idx].auth) { 1909 memset(link[idx].auth, 0, 16); 1916 memcpy(link[idx].auth + 16 - prov_ctx.static_oob_len, 1918 memset(link[idx].auth, 0, 16 - prov_ctx.static_oob_len); 1969 memcpy(link[idx].auth, str, size); 1970 memset(link[idx].auth + size, 0, PROV_AUTH_VAL_SIZE - size); 1990 sys_put_be32(num, &link[idx].auth[12]); [all …]
|
D | crypto.c | 827 const uint8_t auth[16], uint8_t conf[16]) in bt_mesh_prov_conf() 829 struct bt_mesh_sg sg[] = { { rand, 16 }, { auth, 16 } }; in bt_mesh_prov_conf() 833 BT_DBG("AuthValue %s", bt_hex(auth, 16)); in bt_mesh_prov_conf() 854 uint8_t auth[8]) in bt_mesh_beacon_auth() 871 memcpy(auth, tmp, 8); in bt_mesh_beacon_auth()
|
D | net.h | 60 uint8_t auth[8]; /* Beacon Authentication Value */ member 349 uint32_t iv_index, const uint8_t auth[8],
|
D | net.c | 439 bt_mesh.iv_index, sub->auth); in bt_mesh_net_beacon_update() 1015 uint32_t iv_index, const uint8_t auth[8]) in auth_match() 1026 if (memcmp(auth, net_auth, 8)) { in auth_match() 1028 bt_hex(auth, 8), bt_hex(net_auth, 8)); in auth_match() 1036 uint32_t iv_index, const uint8_t auth[8], in bt_mesh_subnet_find() 1051 if (auth_match(&sub->keys[0], net_id, flags, iv_index, auth)) { in bt_mesh_subnet_find() 1060 if (auth_match(&sub->keys[1], net_id, flags, iv_index, auth)) { in bt_mesh_subnet_find()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_act.c | 532 uint16_t auth = 0; in smp_get_auth_mode() local 537 auth |= SMP_SC_SUPPORT_BIT; in smp_get_auth_mode() 541 auth |= SMP_AUTH_YN_BIT; in smp_get_auth_mode() 544 auth |= SMP_SC_SUPPORT_BIT; in smp_get_auth_mode() 545 auth |= SMP_AUTH_YN_BIT; in smp_get_auth_mode() 547 auth = 0; in smp_get_auth_mode() 549 return auth; in smp_get_auth_mode() 607 uint16_t auth = smp_get_auth_mode(p_cb->selected_association_model); in smp_proc_pair_cmd() local 609 auth |= SMP_AUTH_GEN_BOND; in smp_proc_pair_cmd() 611 p_cb->auth_mode = auth; in smp_proc_pair_cmd() [all …]
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/smp/include/ |
D | esp_sec_api.h | 50 UINT8 auth; member
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls.c | 816 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 831 aad_len, plain, crypt, auth, M); in aes_ccm_ae() 841 const u8 *aad, size_t aad_len, const u8 *auth, in aes_ccm_ad() argument 857 crypt, plain, auth, M); in aes_ccm_ad()
|
/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) in wps_validate_key_wrap_auth() argument 928 if (auth == NULL) { in wps_validate_key_wrap_auth()
|
D | wps_registrar.c | 2432 static int wps_process_auth_type_flags(struct wps_data *wps, const u8 *auth) in wps_process_auth_type_flags() argument 2436 if (auth == NULL) { in wps_process_auth_type_flags() 2442 auth_types = WPA_GET_BE16(auth); in wps_process_auth_type_flags()
|