Home
last modified time | relevance | path

Searched refs:aad (Results 1 – 7 of 7) sorted by relevance

/hal_espressif-2.7.6/components/wpa_supplicant/src/crypto/
Dccmp.c19 u8 *aad, size_t *aad_len, u8 *nonce, bool espnow_pkt) in ccmp_aad_nonce() argument
49 WPA_PUT_LE16(aad, fc); in ccmp_aad_nonce()
50 pos = aad + 2; in ccmp_aad_nonce()
68 *aad_len = pos - aad; in ccmp_aad_nonce()
82 u8 *aad, size_t *aad_len, u8 *nonce) in ccmp_aad_nonce_pv1() argument
98 WPA_PUT_LE16(aad, fc); in ccmp_aad_nonce_pv1()
99 pos = aad + 2; in ccmp_aad_nonce_pv1()
126 *aad_len = pos - aad; in ccmp_aad_nonce_pv1()
141 u8 aad[30], nonce[13]; in ccmp_decrypt() local
155 os_memset(aad, 0, sizeof(aad)); in ccmp_decrypt()
[all …]
Daes-ccm.c31 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument
52 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start()
152 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
165 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae()
182 const u8 *aad, size_t aad_len, const u8 *auth, in aes_ccm_ad() argument
209 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); in aes_ccm_ad()
Daes.h31 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
34 const u8 *aad, size_t aad_len, const u8 *auth,
/hal_espressif-2.7.6/components/mbedtls/port/aes/
Desp_aes_gcm.c343 const unsigned char *aad, in esp_aes_gcm_starts() argument
364 if ( (aad_len > 0) && !aad) { in esp_aes_gcm_starts()
375 ctx->aad = aad; in esp_aes_gcm_starts()
404 esp_gcm_ghash(ctx, ctx->aad, ctx->aad_len, ctx->ghash); in esp_aes_gcm_starts()
495 static bool esp_aes_gcm_input_support_hw_accel(size_t length, const unsigned char *aad, size_t aad_… in esp_aes_gcm_input_support_hw_accel() argument
502 } else if (!esp_ptr_dma_capable(aad) && aad_len > 0) { in esp_aes_gcm_input_support_hw_accel()
523 const unsigned char *aad, in esp_aes_gcm_crypt_and_tag_partial_hw() argument
532 if ( ( ret = esp_aes_gcm_starts( ctx, mode, iv, iv_len, aad, aad_len ) ) != 0 ) { in esp_aes_gcm_crypt_and_tag_partial_hw()
552 const unsigned char *aad, in esp_aes_gcm_crypt_and_tag() argument
568 if (!esp_aes_gcm_input_support_hw_accel(length, aad, aad_len, input, output)) { in esp_aes_gcm_crypt_and_tag()
[all …]
/hal_espressif-2.7.6/components/mbedtls/test/
Dtest_aes_gcm.c384 uint8_t aad[16]; variable
388 memset(aad, 0x76, 16);
401 …TEST_ASSERT(mbedtls_gcm_starts( &ctx, MBEDTLS_AES_ENCRYPT, iv, sizeof(iv), aad, sizeof(aad) ) == 0…
445 uint8_t aad[16]; variable
449 memset(aad, 0x76, 16);
461 …mbedtls_gcm_crypt_and_tag(&ctx, MBEDTLS_AES_ENCRYPT, CALL_SZ, iv, sizeof(iv), aad, sizeof(aad), bu…
/hal_espressif-2.7.6/components/mbedtls/port/include/aes/
Desp_aes_gcm.h59 const unsigned char *aad; /*!< The additional data. */ member
112 const unsigned char *aad,
/hal_espressif-2.7.6/components/bt/esp_ble_mesh/mesh_core/
Dcrypto.c197 const uint8_t *aad, size_t aad_len, in bt_mesh_ccm_decrypt() argument
247 pmsg[i] = Xn[i] ^ aad[j]; in bt_mesh_ccm_decrypt()
261 pmsg[i] = Xn[i] ^ aad[j]; in bt_mesh_ccm_decrypt()
356 const uint8_t *aad, size_t aad_len, in bt_mesh_ccm_encrypt() argument
412 pmsg[i] = Xn[i] ^ aad[j]; in bt_mesh_ccm_encrypt()
426 pmsg[i] = Xn[i] ^ aad[j]; in bt_mesh_ccm_encrypt()