/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wpas_glue.c | 19 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 24 *msg_len = sizeof(struct ieee802_1x_hdr) + data_len; in wpa_alloc_eapol() 26 buffer = os_malloc(*msg_len + sizeof(struct l2_ethhdr)); in wpa_alloc_eapol() 131 size_t *msg_len, void **data_pos) in wpa_sm_alloc_eapol() argument 133 return wpa_alloc_eapol(sm, type, data, data_len, msg_len, data_pos); in wpa_sm_alloc_eapol()
|
D | esp_wpas_glue.h | 12 size_t *msg_len, void **data_pos); 27 size_t *msg_len, void **data_pos);
|
D | esp_wps.c | 282 size_t *msg_len, void **data_pos) in wps_sm_alloc_eapol() argument 284 return wpa_alloc_eapol(sm, type, data, data_len, msg_len, data_pos); in wps_sm_alloc_eapol()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | crypto.c | 196 const uint8_t *enc_msg, size_t msg_len, in bt_mesh_ccm_decrypt() argument 206 if (msg_len < 1 || aad_len >= 0xff00) { in bt_mesh_ccm_decrypt() 228 sys_put_be16(msg_len, pmsg + 14); in bt_mesh_ccm_decrypt() 274 last_blk = msg_len % 16; in bt_mesh_ccm_decrypt() 275 blk_cnt = (msg_len + 15) / 16; in bt_mesh_ccm_decrypt() 347 if (memcmp(mic, enc_msg + msg_len, mic_size)) { in bt_mesh_ccm_decrypt() 355 const uint8_t *msg, size_t msg_len, in bt_mesh_ccm_encrypt() argument 367 BT_DBG("msg (len %u) %s", msg_len, bt_hex(msg, msg_len)); in bt_mesh_ccm_encrypt() 393 sys_put_be16(msg_len, pmsg + 14); in bt_mesh_ccm_encrypt() 439 last_blk = msg_len % 16; in bt_mesh_ccm_encrypt() [all …]
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_models/server/ |
D | server_common.c | 224 struct net_buf_simple *bt_mesh_server_get_pub_msg(struct bt_mesh_model *model, uint16_t msg_len) in bt_mesh_server_get_pub_msg() argument 240 if (buf->size < msg_len) { in bt_mesh_server_get_pub_msg()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_keys.c | 1302 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ + 1 /* Z size */; in smp_calculate_f4() local 1330 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); in smp_calculate_f4() 1340 aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac); in smp_calculate_f4() 1413 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ in smp_calculate_g2() local 1448 if (!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) { in smp_calculate_g2() 1643 UINT8 msg_len = 1 /* Counter size */ + 4 /* keyID size */ + in smp_calculate_f5_mackey_or_long_term_key() local 1688 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); in smp_calculate_f5_mackey_or_long_term_key() 1691 if (!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) { in smp_calculate_f5_mackey_or_long_term_key() 1878 UINT8 msg_len = BT_OCTET16_LEN /* N1 size */ + BT_OCTET16_LEN /* N2 size */ + in smp_calculate_f6() local 1923 smp_debug_print_nbyte_little_endian (p_print, (const UINT8 *)"M", msg_len); in smp_calculate_f6() [all …]
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_models/server/include/ |
D | server_common.h | 118 struct net_buf_simple *bt_mesh_server_get_pub_msg(struct bt_mesh_model *model, uint16_t msg_len);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_main.c | 979 UINT16 msg_len; in gatt_data_process() local 985 msg_len = p_buf->len - 1; in gatt_data_process() 1001 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p); in gatt_data_process() 1005 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p); in gatt_data_process()
|
D | gatt_sr.c | 929 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); in gatts_process_primary_service_req() local 943 if ((p_msg = (BT_HDR *)osi_calloc(msg_len)) == NULL) { in gatts_process_primary_service_req() 1117 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), in gatts_process_read_by_type_req() local 1140 if ((p_msg = (BT_HDR *)osi_calloc(msg_len)) == NULL) { in gatts_process_read_by_type_req()
|
/hal_espressif-latest/components/mbedtls/port/ecdsa/ |
D | ecdsa_alt.c | 127 const mbedtls_mpi *d, const unsigned char* msg, size_t msg_len) in esp_ecdsa_sign() argument 141 if (msg_len != ECDSA_SHA_LEN) { in esp_ecdsa_sign()
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 237 u8 *msg, size_t msg_len, u8 *key_mic) in wpa_eapol_key_send() argument 255 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send() 264 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send() 265 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); in wpa_eapol_key_send()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/ |
D | smp_int.h | 375 extern void smp_aes_cmac_rfc4493_chk (UINT8 *key, UINT8 *msg, UINT8 msg_len,
|