ESP-IDF
SHA1_MAC_LEN
is only used within ESP-IDF.
Symbol previews are coming soon...
Symbols
loading...
Files
loading (3/5)...
Summary
Syntax
Examples
References
Call Tree
Data Use
Class Tree
Override Tree
Implementations
Instances
Lifecycle
SourceVu
ESP-IDF Framework and Examples
ESP-IDF
SHA1_MAC_LEN
SHA1_MAC_LEN macro
Syntax
Show:
Summary
Declaration
from
sha1.h:12
#define
SHA1_MAC_LEN
20
Examples
References
from
examples
Code
Location
#define
SHA1_MAC_LEN
20
sha1.h:12
if
(
*
len
<
SHA1_MAC_LEN
)
{
crypto_mbedtls.c:235
*
len
=
SHA1_MAC_LEN
;
crypto_mbedtls.c:236
*
len
=
SHA1_MAC_LEN
;
crypto_mbedtls.c:240
u8
cmk
[
EAP_FAST_CMK_LEN
]
,
cmac
[
SHA1_MAC_LEN
]
;
eap_fast.c:759
u8
buf
[
61
]
,
mac
[
SHA1_MAC_LEN
]
;
eap_peap.c:423
if
(
os_memcmp
(
mac
,
pos
,
SHA1_MAC_LEN
)
!=
0
)
{
eap_peap.c:463
u8
hash
[
SHA1_MAC_LEN
]
;
eap_peap_common.c:24
if
(
plen
>=
SHA1_MAC_LEN
)
{
eap_peap_common.c:77
os_memcpy
(
&
buf
[
pos
]
,
hash
,
SHA1_MAC_LEN
)
;
eap_peap_common.c:78
pos
+=
SHA1_MAC_LEN
;
eap_peap_common.c:79
len
[
0
]
=
SHA1_MAC_LEN
;
eap_peap_common.c:84
u8
hash
[
SHA1_MAC_LEN
]
;
ms_funcs.c:84
const
size_t
len2
[
3
]
=
{
SHA1_MAC_LEN
,
8
,
sizeof
(
magic2
)
}
;
ms_funcs.c:251
u8
hash
[
SHA1_MAC_LEN
]
;
ms_funcs.c:335
u8
digest
[
SHA1_MAC_LEN
]
;
ms_funcs.c:396
if
(
session_key_len
>
SHA1_MAC_LEN
)
ms_funcs.c:412
session_key_len
=
SHA1_MAC_LEN
;
ms_funcs.c:413
u
=
SHA1_MAC_LEN
;
pkcs5.c:409
u8
hash
[
SHA1_MAC_LEN
]
;
pkcs5.c:439
len
[
0
]
=
SHA1_MAC_LEN
;
pkcs5.c:451
u8
hash
[
SHA1_MAC_LEN
]
;
sha1-prf.c:35
if
(
plen
>=
SHA1_MAC_LEN
)
{
sha1-prf.c:50
pos
+=
SHA1_MAC_LEN
;
sha1-prf.c:54
u8
A_MD5
[
MD5_MAC_LEN
]
,
A_SHA1
[
SHA1_MAC_LEN
]
;
sha1-tlsprf.c:35
u8
P_MD5
[
MD5_MAC_LEN
]
,
P_SHA1
[
SHA1_MAC_LEN
]
;
sha1-tlsprf.c:36
SHA1_len
[
0
]
=
SHA1_MAC_LEN
;
sha1-tlsprf.c:51
SHA1_pos
=
SHA1_MAC_LEN
;
sha1-tlsprf.c:75
if
(
SHA1_pos
==
SHA1_MAC_LEN
)
{
sha1-tlsprf.c:82
hmac_sha1
(
S2
,
L_S2
,
A_SHA1
,
SHA1_MAC_LEN
,
A_SHA1
)
;
sha1-tlsprf.c:86
forced_memzero
(
A_SHA1
,
SHA1_MAC_LEN
)
;
sha1-tlsprf.c:97
forced_memzero
(
P_SHA1
,
SHA1_MAC_LEN
)
;
sha1-tlsprf.c:98
u8
hash
[
SHA1_MAC_LEN
]
;
sha1-tprf.c:34
if
(
plen
>=
SHA1_MAC_LEN
)
{
sha1-tprf.c:59
os_memcpy
(
&
buf
[
pos
]
,
hash
,
SHA1_MAC_LEN
)
;
sha1-tprf.c:60
pos
+=
SHA1_MAC_LEN
;
sha1-tprf.c:61
len
[
0
]
=
SHA1_MAC_LEN
;
sha1-tprf.c:66
forced_memzero
(
hash
,
SHA1_MAC_LEN
)
;
sha1-tprf.c:69
u8
hash
[
SHA1_MAC_LEN
]
;
tlsv1_client_ocsp.c:54
return
os_memcmp
(
hash
,
key_hash
,
SHA1_MAC_LEN
)
==
0
;
tlsv1_client_ocsp.c:60
if
(
hdr
.
length
!=
SHA1_MAC_LEN
)
{
tlsv1_client_ocsp.c:524
u8
hash
[
MD5_MAC_LEN
+
SHA1_MAC_LEN
]
;
tlsv1_client_read.c:1331
hlen
=
SHA1_MAC_LEN
;
tlsv1_client_read.c:1412
hlen
=
MD5_MAC_LEN
+
SHA1_MAC_LEN
;
tlsv1_client_read.c:1422
hlen
=
SHA1_MAC_LEN
;
tlsv1_client_write.c:665
u8
hash
[
MD5_MAC_LEN
+
SHA1_MAC_LEN
]
;
tlsv1_client_write.c:785
hlen
=
SHA1_MAC_LEN
;
tlsv1_client_write.c:817
hlen
=
MD5_MAC_LEN
+
SHA1_MAC_LEN
;
tlsv1_client_write.c:827
rl
->
hash_size
=
SHA1_MAC_LEN
;
tlsv1_record.c:49
u8
hash
[
SHA1_MAC_LEN
]
;
wps_common.c:520
Call Tree
from
examples
All items filtered out
All items filtered out
Data Use
from
examples
All items filtered out
All items filtered out
Class Tree
from
examples
All items filtered out
All items filtered out
Override Tree
from
examples
All items filtered out
All items filtered out
Implementations
from
examples
All items filtered out
All items filtered out
Instances
from
examples
Lifecycle
from
examples
All items filtered out
All items filtered out