Home
last modified time | relevance | path

Searched full:encrypted (Results 1 – 25 of 131) sorted by relevance

123456

/Zephyr-latest/include/zephyr/bluetooth/
Dcrypto.h44 * hardware to encrypt the plaintext using the key and returns the encrypted
48 * @param plaintext 128 bit LS byte first plaintext data block to be encrypted
49 * @param enc_data 128 bit LS byte first encrypted data block
59 * hardware to encrypt the plaintext using the key and returns the encrypted
63 * @param plaintext 128 bit MS byte first plaintext data block to be encrypted
64 * @param enc_data 128 bit MS byte first encrypted data block
77 * Assumes that the MIC follows directly after the encrypted data.
81 * @param enc_data Encrypted data
82 * @param len Length of the encrypted data
102 * Places the MIC directly after the encrypted data.
[all …]
Dead.h19 * @brief Encrypted Advertising Data (EAD)
20 * @defgroup bt_ead Encrypted Advertising Data (EAD)
34 /** Get the size (in bytes) of the encrypted advertising data for a given
51 * - Encrypted payload is added ( @p payload_size bytes);
67 * @param[out] encrypted_payload Encrypted Ad Data including the Randomizer and
72 * @retval 0 Data have been correctly encrypted and authenticated.
81 * @brief Decrypt and authenticate the given encrypted advertising data.
88 * @param[in] encrypted_payload Encrypted Advertising Data received. This
/Zephyr-latest/tests/bsim/bluetooth/mesh/tests_scripts/bridge/
Dbrg_simple.sh29 # 4. Tester sends a DATA message to each node encrypted with primary key.
31 # 6. Tester sends a GET message to each node encrypted with primary key.
32 # 7. Nodes send the stored messages back to the tester through a STATUS message encrypted
36 # 10. Tester sends a DATA message to each node encrypted with primary key.
37 # 11. Tester sends a GET message to each node encrypted with primary key.
Dbrg_table_state_change.sh13 # 4. While bridging table is empty, Tester sends a GET message to each node encrypted with primary
17 # 6. Tester sends a DATA and GET messages to device 1 encrypted with primary key and verifies that
21 # 10. Tester sends a GET message to device 1 encrypted with primary key and verifies that a STATUS
25 # 12. Tester sends a GET message to device 1 encrypted with primary key and verifies that a STATUS
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/
Dperipheral.c63 FAIL("Computed size of encrypted data does not match the size of the encrypted " in set_ad_data()
74 LOG_HEXDUMP_ERR(ead, size_ead, "Encrypted data from bt_ead_encrypt:"); in set_ad_data()
76 "Encrypted data from sample:"); in set_ad_data()
77 FAIL("Encrypted AD data does not match the ones provided in the sample. (data set " in set_ad_data()
82 LOG_HEXDUMP_DBG(ead, size_ead, "Encrypted data:"); in set_ad_data()
Dcommon.h31 * is also placed in front of the encrypted advertising data.
35 * @param[out] encrypted_payload Encrypted Ad Data including the Randomizer and
40 * @retval 0 Data have been correctly encrypted and authenticated.
84 /* Encrypted Advertising Data Set 1 (ref: Supplement to the Bluetooth Core
112 /* Encrypted Advertising Data Set 2 (ref: Supplement to the Bluetooth Core
/Zephyr-latest/subsys/bluetooth/lib/
DKconfig5 bool "Encrypted Advertising Data"
8 Enable the Encrypted Advertising Data library
Dead.c100 LOG_HEXDUMP_DBG(encrypted_payload, ead_size, "Encrypted Data: "); in ead_encrypt()
129 LOG_WRN("payload_size is set to 0. The encrypted result will only contain the " in bt_ead_encrypt()
169 LOG_WRN("payload_size is set to 0. The encrypted result will be filled with only " in bt_test_ead_encrypt()
195 LOG_HEXDUMP_DBG(encrypted_ad_data, encrypted_ad_data_size, "Encrypted Data: "); in ead_decrypt()
236 LOG_WRN("encrypted_payload_size not large enough to contain encrypted data."); in bt_ead_decrypt()
/Zephyr-latest/samples/boards/espressif/flash_encryption/
DREADME.rst10 Once this feature is enabled, firmware is flashed as plaintext and then the data is encrypted
20 readout of encrypted flash contents.
24 Recommended for manufacturing and production to prevent physical readout of encrypted flash
27 With flash encryption enabled, the following types of data are encrypted by default:
47 encrypted/decrypted data. It requires MCUBoot bootloader previously configured to enable the
54 through eFuse burning on the device, all read and write operations are decrypted/encrypted
88 Then, it dumps 32-bytes of the same memory area in plaintext mode. The content is encrypted, meaning
100 [00:00:00.482,000] <inf> flash_encryption: FLASH RAW DATA (Encrypted)
/Zephyr-latest/cmake/
Dmcuboot.cmake163 list(APPEND byproducts ${output}.signed.encrypted.bin)
164 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_BIN_NAME "${output}.signed.encrypted.bin"
165 CACHE FILEPATH "Signed and encrypted kernel bin file" FORCE
169 ${output}.signed.encrypted.bin)
173 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin)
186 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin)
189 ${output}.bin ${output}.slot1.signed.encrypted.bin)
215 list(APPEND byproducts ${output}.signed.encrypted.hex)
216 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_HEX_NAME "${output}.signed.encrypted.hex"
217 CACHE FILEPATH "Signed and encrypted kernel hex file" FORCE
[all …]
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst195 Encrypted Advertising Data
198 Zephyr has support for the Encrypted Advertising Data feature. The :code:`bt encrypted-ad`
202 encrypted-ad set-keys <session key> <init vector>`. The session key is 16 bytes long and the
205 You can add advertising data by using :code:`bt encrypted-ad add-ad` and :code:`bt encrypted-ad
208 encrypted advertising data structure. It's possible to mix encrypted and non-encrypted data, when
209 done adding advertising data, :code:`bt encrypted-ad commit-ad` can be used to apply the change to
211 previously. It's possible to clear the advertising data by using :code:`bt encrypted-ad clear-ad`.
213 On the Central side, it's possible to decrypt the received encrypted advertising data by setting the
215 :code:`bt encrypted-ad decrypt-scan on`.
240 … uart:~$ bt encrypted-ad set-keys 9ba22d3824efc70feb800c80294cba38 2e83f3d4d47695b6
[all …]
/Zephyr-latest/samples/drivers/crypto/src/
Dmain.c129 uint8_t encrypted[16] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ecb_mode() local
139 .out_buf_max = sizeof(encrypted), in ecb_mode()
140 .out_buf = encrypted, in ecb_mode()
144 .in_len = sizeof(encrypted), in ecb_mode()
211 uint8_t encrypted[80] __aligned(IO_ALIGNMENT_BYTES) = {0}; in cbc_mode() local
221 .out_buf_max = sizeof(encrypted), in cbc_mode()
222 .out_buf = encrypted, in cbc_mode()
226 .in_len = sizeof(encrypted), in cbc_mode()
266 /* TinyCrypt keeps IV at the start of encrypted buffer */ in cbc_mode()
267 if (cipher_cbc_op(&ini, &decrypt, encrypted)) { in cbc_mode()
[all …]
/Zephyr-latest/tests/crypto/tinycrypt/src/
Dcbc_mode.c111 uint8_t encrypted[80]; in ZTEST() local
124 zassert_true(tc_cbc_mode_encrypt(encrypted, in ZTEST()
129 result = check_result(1, ciphertext, sizeof(encrypted), in ZTEST()
130 encrypted, sizeof(encrypted), 1); in ZTEST()
136 p = &encrypted[TC_AES_BLOCK_SIZE]; in ZTEST()
137 length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE; in ZTEST()
141 length, p, length, encrypted, in ZTEST()
/Zephyr-latest/samples/bluetooth/encrypted_advertising/
DREADME.rst2 :name: Encrypted Advertising
5 Use the Bluetooth LE encrypted advertising feature.
10 This sample demonstrates the use of the encrypted advertising feature, such as:
22 the encrypted advertising. The feature can be used with legacy advertising as
/Zephyr-latest/subsys/bluetooth/audio/
DKconfig.csip28 (if encrypted) using public sample data.
32 bool "Support for encrypted SIRK"
88 bool "Support for encrypted SIRK"
/Zephyr-latest/samples/userspace/shared_mem/
DREADME.rst49 The PT thread sends a message followed by the encrypted version of the
54 encrypted thread's private memory when the flag is set and then clears
55 the flag. Once the encrypted thread receives the text string, it
/Zephyr-latest/drivers/crypto/
Dcrypto_ataes132a_priv.h258 * encrypted by the same ATAES132A * device or other ATAES132A devices.
259 * In User Decryption Mode it can decrypt buffers encrypted by the Host.
260 * To be able to decrypt a buffer encrypted by a different ATAES132A device
284 * buffer was encrypted by the Host and not by an ATAES132A
291 * If the buffer was encrypted by the Host and not by an
301 * encrypted buffer).
304 * authentication. If the buffer was encrypted using a random
341 * encrypted, the length of the input buffer (it cannot be
344 * buffer to receive the encrypted message (it must have space
380 * encrypted/decrypted, the length of the input buffer (it cannot
/Zephyr-latest/tests/bsim/bluetooth/audio/test_scripts/
Dcsip_encrypted_sirk.sh7 # CSIP test where the SIRK is encrypted
18 printf "\n\n======== Running test with SIRK encrypted ========\n\n"
/Zephyr-latest/samples/bluetooth/encrypted_advertising/peripheral/
Dsample.yaml2 name: Bluetooth Peripheral Encrypted Advertising Data
/Zephyr-latest/samples/bluetooth/encrypted_advertising/central/
Dsample.yaml2 name: Bluetooth Central Encrypted Advertising Data
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/
Dtestcase.yaml2 bluetooth.host.adv.encrypted.ead_sample:
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/
Dtestcase.yaml2 bluetooth.host.adv.encrypted.css_sample_data:
/Zephyr-latest/samples/boards/espressif/flash_encryption/src/
Dmain.c44 /* this writes encrypted data into flash */ in main()
50 LOG_HEXDUMP_INF(buffer, sizeof(buffer), "FLASH RAW DATA (Encrypted)"); in main()
/Zephyr-latest/tests/bluetooth/tester/src/audio/btp/
Dbtp_csis.h34 uint8_t encrypted; member
/Zephyr-latest/dts/bindings/crypto/
Dnordic,nrf-ccm.yaml21 (8 bits) of the LENGTH field in encrypted/decrypted packets.

123456