/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | ccmp.c | 20 u8 *aad, size_t *aad_len, u8 *nonce) in ccmp_aad_nonce() argument 69 *aad_len = pos - aad; in ccmp_aad_nonce() 83 u8 *aad, size_t *aad_len, u8 *nonce) in ccmp_aad_nonce_pv1() argument 127 *aad_len = pos - aad; in ccmp_aad_nonce_pv1() 143 size_t aad_len; in ccmp_decrypt() local 158 ccmp_aad_nonce((const struct ieee80211_hdr *)hdr, data, aad, &aad_len, in ccmp_decrypt() 160 wpa_hexdump(MSG_MSGDUMP, "CCMP AAD", aad, aad_len); in ccmp_decrypt() 169 if (aes_ccm_ad(tk, 16, nonce, tag_len, data + 8, mlen, aad, aad_len, in ccmp_decrypt() 195 size_t aad_len, plen; in ccmp_encrypt() local 221 ccmp_aad_nonce(hdr, crypt + hdrlen, aad, &aad_len, nonce); in ccmp_encrypt() [all …]
|
D | aes-ccm.c | 30 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument 38 b[0] = aad_len ? 0x40 : 0 /* Adata */; in aes_ccm_auth_start() 47 if (!aad_len) in aes_ccm_auth_start() 50 WPA_PUT_BE16(aad_buf, aad_len); in aes_ccm_auth_start() 51 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start() 52 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start() 57 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 151 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 157 if (aad_len > 30 || M > AES_BLOCK_SIZE) in aes_ccm_ae() 164 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() [all …]
|
D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, in aes_gcm_ghash() argument 241 ghash(H, aad, aad_len, S); in aes_gcm_ghash() 243 WPA_PUT_BE64(len_buf, aad_len * 8); in aes_gcm_ghash() 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) in aes_gcm_ae() argument 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); in aes_gcm_ae() 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) in aes_gcm_ad() argument 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 323 const u8 *aad, size_t aad_len, u8 *tag) in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
D | aes_wrap.h | 55 const u8 *aad, size_t aad_len, 60 const u8 *aad, size_t aad_len, const u8 *tag, 64 const u8 *aad, size_t aad_len, u8 *tag); 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
D | crypto_ops.c | 41 const u8 *aad, size_t aad_len, u8 *tag) in esp_aes_gmac() argument 44 return aes_gmac(key, key_len, iv, iv_len, aad, aad_len, tag); in esp_aes_gmac()
|
/hal_espressif-latest/components/mbedtls/port/aes/ |
D | esp_aes_gcm.c | 405 ctx->aad_len = 0; in esp_aes_gcm_starts() 448 size_t aad_len ) in esp_aes_gcm_update_ad() argument 457 return mbedtls_gcm_update_ad_soft(ctx->ctx_soft, aad, aad_len); in esp_aes_gcm_update_ad() 462 if ( ( (uint32_t) aad_len ) >> 29 != 0 ) { in esp_aes_gcm_update_ad() 466 if ( (aad_len > 0) && !aad) { in esp_aes_gcm_update_ad() 478 ctx->aad_len = aad_len; in esp_aes_gcm_update_ad() 480 esp_gcm_ghash(ctx, ctx->aad, ctx->aad_len, ctx->ghash); in esp_aes_gcm_update_ad() 582 ESP_PUT_BE64(len_block, ctx->aad_len * 8); in esp_aes_gcm_finish() 593 …ic bool esp_aes_gcm_input_support_hw_accel(size_t length, const unsigned char *aad, size_t aad_len, in esp_aes_gcm_input_support_hw_accel() argument 598 if (aad_len > ESP_AES_GCM_AAD_MAX_BYTES) { in esp_aes_gcm_input_support_hw_accel() [all …]
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | crypto.c | 197 const uint8_t *aad, size_t aad_len, in bt_mesh_ccm_decrypt() argument 206 if (msg_len < 1 || aad_len >= 0xff00) { in bt_mesh_ccm_decrypt() 222 pmsg[0] = 0x19 | (aad_len ? 0x40 : 0x00); in bt_mesh_ccm_decrypt() 224 pmsg[0] = 0x09 | (aad_len ? 0x40 : 0x00); in bt_mesh_ccm_decrypt() 236 if (aad_len) { in bt_mesh_ccm_decrypt() 237 sys_put_be16(aad_len, pmsg); in bt_mesh_ccm_decrypt() 244 aad_len += sizeof(uint16_t); in bt_mesh_ccm_decrypt() 245 while (aad_len > 16) { in bt_mesh_ccm_decrypt() 251 aad_len -= 16; in bt_mesh_ccm_decrypt() 260 for (; i < aad_len; i++, j++) { in bt_mesh_ccm_decrypt() [all …]
|
/hal_espressif-latest/components/mbedtls/port/include/aes/ |
D | esp_aes_gcm.h | 39 uint64_t aad_len; /*!< The total length of the additional data. */ member 117 size_t aad_len ); 250 size_t aad_len, 285 size_t aad_len,
|
D | esp_aes_internal.h | 49 …const unsigned char *input, unsigned char *output, size_t len, lldesc_t *aad_desc, size_t aad_len);
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls.c | 816 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 831 aad_len, plain, crypt, auth, M); in aes_ccm_ae() 841 const u8 *aad, size_t aad_len, const u8 *auth, in aes_ccm_ad() argument 856 nonce, 13, aad, aad_len, in aes_ccm_ad()
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_wifi_crypto_types.h | 369 const uint8_t *aad, size_t aad_len, uint8_t *mic);
|
/hal_espressif-latest/components/mbedtls/port/aes/dma/ |
D | esp_aes.c | 495 … const unsigned char *input, unsigned char *output, size_t len, lldesc_t *aad_desc, size_t aad_len) in esp_aes_process_dma_gcm() argument 566 len_buf[1] = __builtin_bswap32(aad_len * 8); in esp_aes_process_dma_gcm()
|