Home
last modified time | relevance | path

Searched refs:aad_len (Results 1 – 8 of 8) sorted by relevance

/hal_espressif-2.7.6/components/wpa_supplicant/src/crypto/
Dccmp.c19 u8 *aad, size_t *aad_len, u8 *nonce, bool espnow_pkt) in ccmp_aad_nonce() argument
68 *aad_len = pos - aad; in ccmp_aad_nonce()
82 u8 *aad, size_t *aad_len, u8 *nonce) in ccmp_aad_nonce_pv1() argument
126 *aad_len = pos - aad; in ccmp_aad_nonce_pv1()
142 size_t aad_len; in ccmp_decrypt() local
156 ccmp_aad_nonce((const struct ieee80211_hdr *)hdr, data, aad, &aad_len, in ccmp_decrypt()
158 wpa_hexdump(MSG_DEBUG, "CCMP AAD", aad, aad_len); in ccmp_decrypt()
161 if (aes_ccm_ad(tk, 16, nonce, 8, data + 8, mlen, aad, aad_len, in ccmp_decrypt()
187 size_t aad_len, plen; in ccmp_encrypt() local
213 ccmp_aad_nonce(hdr, crypt + hdrlen, aad, &aad_len, nonce, false); in ccmp_encrypt()
[all …]
Daes-ccm.c31 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument
39 b[0] = aad_len ? 0x40 : 0 /* Adata */; in aes_ccm_auth_start()
48 if (!aad_len) in aes_ccm_auth_start()
51 WPA_PUT_BE16(aad_buf, aad_len); in aes_ccm_auth_start()
52 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start()
53 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start()
58 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start()
152 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
158 if (aad_len > 30 || M > AES_BLOCK_SIZE) in aes_ccm_ae()
165 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae()
[all …]
Daes.h31 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
34 const u8 *aad, size_t aad_len, const u8 *auth,
/hal_espressif-2.7.6/components/mbedtls/port/aes/
Desp_aes_gcm.c344 size_t aad_len ) in esp_aes_gcm_starts() argument
350 ( (uint32_t) aad_len ) >> 29 != 0 ) { in esp_aes_gcm_starts()
364 if ( (aad_len > 0) && !aad) { in esp_aes_gcm_starts()
376 ctx->aad_len = aad_len; in esp_aes_gcm_starts()
404 esp_gcm_ghash(ctx, ctx->aad, ctx->aad_len, ctx->ghash); in esp_aes_gcm_starts()
483 ESP_PUT_BE64(len_block, ctx->aad_len * 8); in esp_aes_gcm_finish()
495 …ic bool esp_aes_gcm_input_support_hw_accel(size_t length, const unsigned char *aad, size_t aad_len, in esp_aes_gcm_input_support_hw_accel() argument
500 if (aad_len > ESP_AES_GCM_AAD_MAX_BYTES) { in esp_aes_gcm_input_support_hw_accel()
502 } else if (!esp_ptr_dma_capable(aad) && aad_len > 0) { in esp_aes_gcm_input_support_hw_accel()
524 size_t aad_len, in esp_aes_gcm_crypt_and_tag_partial_hw() argument
[all …]
/hal_espressif-2.7.6/components/bt/esp_ble_mesh/mesh_core/
Dcrypto.c197 const uint8_t *aad, size_t aad_len, in bt_mesh_ccm_decrypt() argument
206 if (msg_len < 1 || aad_len >= 0xff00) { in bt_mesh_ccm_decrypt()
222 pmsg[0] = 0x19 | (aad_len ? 0x40 : 0x00); in bt_mesh_ccm_decrypt()
224 pmsg[0] = 0x09 | (aad_len ? 0x40 : 0x00); in bt_mesh_ccm_decrypt()
236 if (aad_len) { in bt_mesh_ccm_decrypt()
237 sys_put_be16(aad_len, pmsg); in bt_mesh_ccm_decrypt()
244 aad_len += sizeof(uint16_t); in bt_mesh_ccm_decrypt()
245 while (aad_len > 16) { in bt_mesh_ccm_decrypt()
251 aad_len -= 16; in bt_mesh_ccm_decrypt()
260 for (; i < aad_len; i++, j++) { in bt_mesh_ccm_decrypt()
[all …]
/hal_espressif-2.7.6/components/mbedtls/port/include/aes/
Desp_aes_gcm.h56 uint64_t aad_len; /*!< The total length of the additional data. */ member
113 size_t aad_len );
196 size_t aad_len,
231 size_t aad_len,
Desp_aes_internal.h49 …const unsigned char *input, unsigned char *output, size_t len, lldesc_t *aad_desc, size_t aad_len);
/hal_espressif-2.7.6/components/mbedtls/port/aes/dma/
Desp_aes.c434 … const unsigned char *input, unsigned char *output, size_t len, lldesc_t *aad_desc, size_t aad_len) in esp_aes_process_dma_gcm() argument
500 len_buf[1] = __builtin_bswap32(aad_len * 8); in esp_aes_process_dma_gcm()