Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 12 of 12) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_wpas_glue.c19 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
24 *msg_len = sizeof(struct ieee802_1x_hdr) + data_len; in wpa_alloc_eapol()
26 buffer = os_malloc(*msg_len + sizeof(struct l2_ethhdr)); in wpa_alloc_eapol()
131 size_t *msg_len, void **data_pos) in wpa_sm_alloc_eapol() argument
133 return wpa_alloc_eapol(sm, type, data, data_len, msg_len, data_pos); in wpa_sm_alloc_eapol()
Desp_wpas_glue.h12 size_t *msg_len, void **data_pos);
27 size_t *msg_len, void **data_pos);
Desp_wps.c282 size_t *msg_len, void **data_pos) in wps_sm_alloc_eapol() argument
284 return wpa_alloc_eapol(sm, type, data, data_len, msg_len, data_pos); in wps_sm_alloc_eapol()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/
Dcrypto.c196 const uint8_t *enc_msg, size_t msg_len, in bt_mesh_ccm_decrypt() argument
206 if (msg_len < 1 || aad_len >= 0xff00) { in bt_mesh_ccm_decrypt()
228 sys_put_be16(msg_len, pmsg + 14); in bt_mesh_ccm_decrypt()
274 last_blk = msg_len % 16; in bt_mesh_ccm_decrypt()
275 blk_cnt = (msg_len + 15) / 16; in bt_mesh_ccm_decrypt()
347 if (memcmp(mic, enc_msg + msg_len, mic_size)) { in bt_mesh_ccm_decrypt()
355 const uint8_t *msg, size_t msg_len, in bt_mesh_ccm_encrypt() argument
367 BT_DBG("msg (len %u) %s", msg_len, bt_hex(msg, msg_len)); in bt_mesh_ccm_encrypt()
393 sys_put_be16(msg_len, pmsg + 14); in bt_mesh_ccm_encrypt()
439 last_blk = msg_len % 16; in bt_mesh_ccm_encrypt()
[all …]
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_models/server/
Dserver_common.c224 struct net_buf_simple *bt_mesh_server_get_pub_msg(struct bt_mesh_model *model, uint16_t msg_len) in bt_mesh_server_get_pub_msg() argument
240 if (buf->size < msg_len) { in bt_mesh_server_get_pub_msg()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_keys.c1302 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ + 1 /* Z size */; in smp_calculate_f4() local
1330 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); in smp_calculate_f4()
1340 aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac); in smp_calculate_f4()
1413 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ in smp_calculate_g2() local
1448 if (!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) { in smp_calculate_g2()
1643 UINT8 msg_len = 1 /* Counter size */ + 4 /* keyID size */ + in smp_calculate_f5_mackey_or_long_term_key() local
1688 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); in smp_calculate_f5_mackey_or_long_term_key()
1691 if (!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) { in smp_calculate_f5_mackey_or_long_term_key()
1878 UINT8 msg_len = BT_OCTET16_LEN /* N1 size */ + BT_OCTET16_LEN /* N2 size */ + in smp_calculate_f6() local
1923 smp_debug_print_nbyte_little_endian (p_print, (const UINT8 *)"M", msg_len); in smp_calculate_f6()
[all …]
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_models/server/include/
Dserver_common.h118 struct net_buf_simple *bt_mesh_server_get_pub_msg(struct bt_mesh_model *model, uint16_t msg_len);
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/
Dgatt_main.c979 UINT16 msg_len; in gatt_data_process() local
985 msg_len = p_buf->len - 1; in gatt_data_process()
1001 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p); in gatt_data_process()
1005 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p); in gatt_data_process()
Dgatt_sr.c929 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); in gatts_process_primary_service_req() local
943 if ((p_msg = (BT_HDR *)osi_calloc(msg_len)) == NULL) { in gatts_process_primary_service_req()
1117 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), in gatts_process_read_by_type_req() local
1140 if ((p_msg = (BT_HDR *)osi_calloc(msg_len)) == NULL) { in gatts_process_read_by_type_req()
/hal_espressif-latest/components/mbedtls/port/ecdsa/
Decdsa_alt.c127 const mbedtls_mpi *d, const unsigned char* msg, size_t msg_len) in esp_ecdsa_sign() argument
141 if (msg_len != ECDSA_SHA_LEN) { in esp_ecdsa_sign()
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa.c237 u8 *msg, size_t msg_len, u8 *key_mic) in wpa_eapol_key_send() argument
255 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send()
264 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send()
265 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); in wpa_eapol_key_send()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/
Dsmp_int.h375 extern void smp_aes_cmac_rfc4493_chk (UINT8 *key, UINT8 *msg, UINT8 msg_len,