Lines Matching refs:encrypted_payload
80 size_t payload_size, uint8_t *encrypted_payload) in ead_encrypt() argument
91 memcpy(encrypted_payload, nonce, BT_EAD_RANDOMIZER_SIZE); in ead_encrypt()
94 &encrypted_payload[BT_EAD_RANDOMIZER_SIZE], BT_EAD_MIC_SIZE); in ead_encrypt()
100 LOG_HEXDUMP_DBG(encrypted_payload, ead_size, "Encrypted Data: "); in ead_encrypt()
106 const uint8_t *payload, size_t payload_size, uint8_t *encrypted_payload) in bt_ead_encrypt() argument
123 CHECKIF(encrypted_payload == NULL) { in bt_ead_encrypt()
133 return ead_encrypt(session_key, iv, NULL, payload, payload_size, encrypted_payload); in bt_ead_encrypt()
141 size_t payload_size, uint8_t *encrypted_payload) in bt_test_ead_encrypt() argument
163 CHECKIF(encrypted_payload == NULL) { in bt_test_ead_encrypt()
173 return ead_encrypt(session_key, iv, randomizer, payload, payload_size, encrypted_payload); in bt_test_ead_encrypt()
179 const uint8_t *encrypted_payload, size_t encrypted_payload_size, in ead_decrypt() argument
184 const uint8_t *encrypted_ad_data = &encrypted_payload[BT_EAD_RANDOMIZER_SIZE]; in ead_decrypt()
188 const uint8_t *randomizer = encrypted_payload; in ead_decrypt()
209 const uint8_t *encrypted_payload, size_t encrypted_payload_size, in bt_ead_decrypt() argument
222 CHECKIF(encrypted_payload == NULL) { in bt_ead_decrypt()
239 return ead_decrypt(session_key, iv, encrypted_payload, encrypted_payload_size, payload); in bt_ead_decrypt()