Home
last modified time | relevance | path

Searched full:decrypted (Results 1 – 25 of 28) sorted by relevance

12

/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/
Dcentral.c20 LOG_ERR("Size of decrypted data: %d", decrypted_data_size); in data_parse_cb()
46 "Decrypted data from bt_ead_decrypt:"); in data_parse_cb()
49 FAIL("Decrypted AD data does not match expected sample data. (data set " in data_parse_cb()
54 LOG_HEXDUMP_DBG(decrypted_buf.data, decrypted_data_size, "Raw decrypted data: "); in data_parse_cb()
/Zephyr-latest/samples/drivers/crypto/src/
Dmain.c130 uint8_t decrypted[16] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ecb_mode() local
145 .out_buf = decrypted, in ecb_mode()
146 .out_buf_max = sizeof(decrypted), in ecb_mode()
188 "decrypted cipher text"); in ecb_mode()
212 uint8_t decrypted[64] __aligned(IO_ALIGNMENT_BYTES) = {0}; in cbc_mode() local
227 .out_buf = decrypted, in cbc_mode()
228 .out_buf_max = sizeof(decrypted), in cbc_mode()
276 "decrypted cipher text"); in cbc_mode()
301 uint8_t decrypted[64] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ctr_mode() local
318 .out_buf = decrypted, in ctr_mode()
[all …]
/Zephyr-latest/tests/crypto/tinycrypt/src/
Dctr_mode.c97 uint8_t decrypted[64]; in test_ctr_sp_800_38a_encrypt_decrypt() local
117 zassert_true(tc_ctr_mode(decrypted, sizeof(decrypted), in test_ctr_sp_800_38a_encrypt_decrypt()
118 &out[TC_AES_BLOCK_SIZE], sizeof(decrypted), in test_ctr_sp_800_38a_encrypt_decrypt()
123 decrypted, sizeof(plaintext), 1); in test_ctr_sp_800_38a_encrypt_decrypt()
Dccm_mode.c80 uint8_t decrypted[DECRYPTED_LEN]; in do_test() local
106 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in do_test()
113 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in do_test()
379 uint8_t decrypted[DECRYPTED_LEN]; in ZTEST() local
397 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in ZTEST()
404 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in ZTEST()
436 uint8_t decrypted[DECRYPTED_LEN]; in ZTEST() local
454 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in ZTEST()
460 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in ZTEST()
Dcbc_mode.c112 uint8_t decrypted[64]; in ZTEST() local
140 zassert_true(tc_cbc_mode_decrypt(decrypted, in ZTEST()
144 result = check_result(2, plaintext, sizeof(decrypted), in ZTEST()
145 decrypted, sizeof(decrypted), 1); in ZTEST()
Daes.c149 uint8_t decrypted[NUM_OF_NIST_KEYS]; in var_text_test() local
156 if (tc_aes_decrypt(decrypted, ciphertext, s) == 0) { in var_text_test()
161 decrypted, sizeof(decrypted), 0); in var_text_test()
/Zephyr-latest/include/zephyr/bluetooth/
Dead.h40 /** Get the size (in bytes) of the decrypted payload for a given payload size in
94 * @param[out] payload Decrypted advertising payload. Use @ref
97 * @retval 0 Data have been correctly decrypted and authenticated.
Dcrypto.h88 * @retval 0 Successfully decrypted the data.
/Zephyr-latest/samples/boards/espressif/flash_encryption/
DREADME.rst47 encrypted/decrypted data. It requires MCUBoot bootloader previously configured to enable the
54 through eFuse burning on the device, all read and write operations are decrypted/encrypted
103 [00:00:00.482,000] <inf> flash_encryption: FLASH DECRYPTED DATA
/Zephyr-latest/dts/bindings/crypto/
Dnordic,nrf-ccm.yaml21 (8 bits) of the LENGTH field in encrypted/decrypted packets.
/Zephyr-latest/tests/bluetooth/bt_crypto_ccm/src/
Dtest_bt_crypto_ccm.c62 LOG_DBG("decrypted data %s (len: %d)", bt_hex(decrypted_data, p->input_len), in ZTEST()
67 "Decrypted data are not correct for packet vector %d", i + 1); in ZTEST()
/Zephyr-latest/samples/psa/persistent_key/src/
Dmain.c78 LOG_HEXDUMP_INF(decrypted_text, sizeof(decrypted_text), "Decrypted text:"); in use_persistent_key()
79 LOG_ERR("The decrypted text doesn't match the plaintext."); in use_persistent_key()
/Zephyr-latest/subsys/usb/device/class/dfu/
DKconfig47 the executable image is always decrypted despite the image
/Zephyr-latest/samples/boards/espressif/flash_encryption/src/
Dmain.c55 LOG_HEXDUMP_INF(buffer, sizeof(buffer), "FLASH DECRYPTED DATA"); in main()
/Zephyr-latest/subsys/bluetooth/audio/
Dcsip_crypto.h79 * @param out_sirk The decrypted SIRK.
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst265 … Received encrypted advertising data will now be decrypted using provided key materials.
272 [START DECRYPTED DATA]
275 [END DECRYPTED DATA]
/Zephyr-latest/drivers/crypto/
Dcrypto_ataes132a_priv.h295 * buffer that requires to be decrypted (it must be 16 or 32
380 * encrypted/decrypted, the length of the input buffer (it cannot
Dcrypto_ataes132a.c371 LOG_ERR("decrypted output data size %d and expected data" in ataes132a_aes_ccm_decrypt()
/Zephyr-latest/subsys/bluetooth/mesh/
Dsolicitation.c163 LOG_DBG("Decrypted PDU %s", bt_hex(out->data, out->len)); in sol_pdu_decrypt()
258 LOG_DBG("Decrypted solicitation PDU for existing subnet"); in bt_mesh_sol_recv()
Dapp_keys.c572 * If a message is successfully decrypted using the device in bt_mesh_app_key_find()
/Zephyr-latest/subsys/bluetooth/lib/
Dead.c199 LOG_HEXDUMP_DBG(payload, payload_size, "Decrypted Data: "); in ead_decrypt()
/Zephyr-latest/doc/services/tfm/
Doverview.rst242 can't be decrypted if they are removed and placed on a new device, since each
/Zephyr-latest/include/zephyr/bluetooth/mesh/
Dmain.h810 * was received and successfully decrypted.
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c446 bt_shell_fprintf_info("\n%*s[START DECRYPTED DATA]\n", in data_verbose_cb()
465 bt_shell_fprintf_info("%*s[END DECRYPTED DATA]", in data_verbose_cb()
4825 shell_info(sh, "Received encrypted advertising data will now be decrypted using " in cmd_encrypted_ad_decrypt_scan()
4829 shell_info(sh, "Received encrypted advertising data will now longer be decrypted."); in cmd_encrypted_ad_decrypt_scan()
/Zephyr-latest/tests/bsim/bluetooth/mesh/src/
Dtest_friendship.c1108 * UUIDs, but the first message shall not be decrypted and shall be dropped. in test_lpn_va_collision()

12