/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/ |
D | central.c | 20 LOG_ERR("Size of decrypted data: %d", decrypted_data_size); in data_parse_cb() 46 "Decrypted data from bt_ead_decrypt:"); in data_parse_cb() 49 FAIL("Decrypted AD data does not match expected sample data. (data set " in data_parse_cb() 54 LOG_HEXDUMP_DBG(decrypted_buf.data, decrypted_data_size, "Raw decrypted data: "); in data_parse_cb()
|
/Zephyr-latest/samples/drivers/crypto/src/ |
D | main.c | 130 uint8_t decrypted[16] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ecb_mode() local 145 .out_buf = decrypted, in ecb_mode() 146 .out_buf_max = sizeof(decrypted), in ecb_mode() 188 "decrypted cipher text"); in ecb_mode() 212 uint8_t decrypted[64] __aligned(IO_ALIGNMENT_BYTES) = {0}; in cbc_mode() local 227 .out_buf = decrypted, in cbc_mode() 228 .out_buf_max = sizeof(decrypted), in cbc_mode() 276 "decrypted cipher text"); in cbc_mode() 301 uint8_t decrypted[64] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ctr_mode() local 318 .out_buf = decrypted, in ctr_mode() [all …]
|
/Zephyr-latest/tests/crypto/tinycrypt/src/ |
D | ctr_mode.c | 97 uint8_t decrypted[64]; in test_ctr_sp_800_38a_encrypt_decrypt() local 117 zassert_true(tc_ctr_mode(decrypted, sizeof(decrypted), in test_ctr_sp_800_38a_encrypt_decrypt() 118 &out[TC_AES_BLOCK_SIZE], sizeof(decrypted), in test_ctr_sp_800_38a_encrypt_decrypt() 123 decrypted, sizeof(plaintext), 1); in test_ctr_sp_800_38a_encrypt_decrypt()
|
D | ccm_mode.c | 80 uint8_t decrypted[DECRYPTED_LEN]; in do_test() local 106 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in do_test() 113 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in do_test() 379 uint8_t decrypted[DECRYPTED_LEN]; in ZTEST() local 397 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in ZTEST() 404 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in ZTEST() 436 uint8_t decrypted[DECRYPTED_LEN]; in ZTEST() local 454 result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), in ZTEST() 460 show_str("\t\tComputed", decrypted, sizeof(decrypted)); in ZTEST()
|
D | cbc_mode.c | 112 uint8_t decrypted[64]; in ZTEST() local 140 zassert_true(tc_cbc_mode_decrypt(decrypted, in ZTEST() 144 result = check_result(2, plaintext, sizeof(decrypted), in ZTEST() 145 decrypted, sizeof(decrypted), 1); in ZTEST()
|
D | aes.c | 149 uint8_t decrypted[NUM_OF_NIST_KEYS]; in var_text_test() local 156 if (tc_aes_decrypt(decrypted, ciphertext, s) == 0) { in var_text_test() 161 decrypted, sizeof(decrypted), 0); in var_text_test()
|
/Zephyr-latest/include/zephyr/bluetooth/ |
D | ead.h | 40 /** Get the size (in bytes) of the decrypted payload for a given payload size in 94 * @param[out] payload Decrypted advertising payload. Use @ref 97 * @retval 0 Data have been correctly decrypted and authenticated.
|
D | crypto.h | 88 * @retval 0 Successfully decrypted the data.
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/ |
D | README.rst | 47 encrypted/decrypted data. It requires MCUBoot bootloader previously configured to enable the 54 through eFuse burning on the device, all read and write operations are decrypted/encrypted 103 [00:00:00.482,000] <inf> flash_encryption: FLASH DECRYPTED DATA
|
/Zephyr-latest/dts/bindings/crypto/ |
D | nordic,nrf-ccm.yaml | 21 (8 bits) of the LENGTH field in encrypted/decrypted packets.
|
/Zephyr-latest/tests/bluetooth/bt_crypto_ccm/src/ |
D | test_bt_crypto_ccm.c | 62 LOG_DBG("decrypted data %s (len: %d)", bt_hex(decrypted_data, p->input_len), in ZTEST() 67 "Decrypted data are not correct for packet vector %d", i + 1); in ZTEST()
|
/Zephyr-latest/samples/psa/persistent_key/src/ |
D | main.c | 78 LOG_HEXDUMP_INF(decrypted_text, sizeof(decrypted_text), "Decrypted text:"); in use_persistent_key() 79 LOG_ERR("The decrypted text doesn't match the plaintext."); in use_persistent_key()
|
/Zephyr-latest/subsys/usb/device/class/dfu/ |
D | Kconfig | 47 the executable image is always decrypted despite the image
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/src/ |
D | main.c | 55 LOG_HEXDUMP_INF(buffer, sizeof(buffer), "FLASH DECRYPTED DATA"); in main()
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | csip_crypto.h | 79 * @param out_sirk The decrypted SIRK.
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | gap.rst | 265 … Received encrypted advertising data will now be decrypted using provided key materials. 272 [START DECRYPTED DATA] 275 [END DECRYPTED DATA]
|
/Zephyr-latest/drivers/crypto/ |
D | crypto_ataes132a_priv.h | 295 * buffer that requires to be decrypted (it must be 16 or 32 380 * encrypted/decrypted, the length of the input buffer (it cannot
|
D | crypto_ataes132a.c | 371 LOG_ERR("decrypted output data size %d and expected data" in ataes132a_aes_ccm_decrypt()
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | solicitation.c | 163 LOG_DBG("Decrypted PDU %s", bt_hex(out->data, out->len)); in sol_pdu_decrypt() 258 LOG_DBG("Decrypted solicitation PDU for existing subnet"); in bt_mesh_sol_recv()
|
D | app_keys.c | 572 * If a message is successfully decrypted using the device in bt_mesh_app_key_find()
|
/Zephyr-latest/subsys/bluetooth/lib/ |
D | ead.c | 199 LOG_HEXDUMP_DBG(payload, payload_size, "Decrypted Data: "); in ead_decrypt()
|
/Zephyr-latest/doc/services/tfm/ |
D | overview.rst | 242 can't be decrypted if they are removed and placed on a new device, since each
|
/Zephyr-latest/include/zephyr/bluetooth/mesh/ |
D | main.h | 810 * was received and successfully decrypted.
|
/Zephyr-latest/subsys/bluetooth/host/shell/ |
D | bt.c | 446 bt_shell_fprintf_info("\n%*s[START DECRYPTED DATA]\n", in data_verbose_cb() 465 bt_shell_fprintf_info("%*s[END DECRYPTED DATA]", in data_verbose_cb() 4825 shell_info(sh, "Received encrypted advertising data will now be decrypted using " in cmd_encrypted_ad_decrypt_scan() 4829 shell_info(sh, "Received encrypted advertising data will now longer be decrypted."); in cmd_encrypted_ad_decrypt_scan()
|
/Zephyr-latest/tests/bsim/bluetooth/mesh/src/ |
D | test_friendship.c | 1108 * UUIDs, but the first message shall not be decrypted and shall be dropped. in test_lpn_va_collision()
|