/Zephyr-latest/include/zephyr/bluetooth/ |
D | crypto.h | 44 * hardware to encrypt the plaintext using the key and returns the encrypted 48 * @param plaintext 128 bit LS byte first plaintext data block to be encrypted 49 * @param enc_data 128 bit LS byte first encrypted data block 59 * hardware to encrypt the plaintext using the key and returns the encrypted 63 * @param plaintext 128 bit MS byte first plaintext data block to be encrypted 64 * @param enc_data 128 bit MS byte first encrypted data block 77 * Assumes that the MIC follows directly after the encrypted data. 81 * @param enc_data Encrypted data 82 * @param len Length of the encrypted data 102 * Places the MIC directly after the encrypted data. [all …]
|
D | ead.h | 19 * @brief Encrypted Advertising Data (EAD) 20 * @defgroup bt_ead Encrypted Advertising Data (EAD) 34 /** Get the size (in bytes) of the encrypted advertising data for a given 51 * - Encrypted payload is added ( @p payload_size bytes); 67 * @param[out] encrypted_payload Encrypted Ad Data including the Randomizer and 72 * @retval 0 Data have been correctly encrypted and authenticated. 81 * @brief Decrypt and authenticate the given encrypted advertising data. 88 * @param[in] encrypted_payload Encrypted Advertising Data received. This
|
/Zephyr-latest/tests/bsim/bluetooth/mesh/tests_scripts/bridge/ |
D | brg_simple.sh | 29 # 4. Tester sends a DATA message to each node encrypted with primary key. 31 # 6. Tester sends a GET message to each node encrypted with primary key. 32 # 7. Nodes send the stored messages back to the tester through a STATUS message encrypted 36 # 10. Tester sends a DATA message to each node encrypted with primary key. 37 # 11. Tester sends a GET message to each node encrypted with primary key.
|
D | brg_table_state_change.sh | 13 # 4. While bridging table is empty, Tester sends a GET message to each node encrypted with primary 17 # 6. Tester sends a DATA and GET messages to device 1 encrypted with primary key and verifies that 21 # 10. Tester sends a GET message to device 1 encrypted with primary key and verifies that a STATUS 25 # 12. Tester sends a GET message to device 1 encrypted with primary key and verifies that a STATUS
|
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/ |
D | peripheral.c | 63 FAIL("Computed size of encrypted data does not match the size of the encrypted " in set_ad_data() 74 LOG_HEXDUMP_ERR(ead, size_ead, "Encrypted data from bt_ead_encrypt:"); in set_ad_data() 76 "Encrypted data from sample:"); in set_ad_data() 77 FAIL("Encrypted AD data does not match the ones provided in the sample. (data set " in set_ad_data() 82 LOG_HEXDUMP_DBG(ead, size_ead, "Encrypted data:"); in set_ad_data()
|
D | common.h | 31 * is also placed in front of the encrypted advertising data. 35 * @param[out] encrypted_payload Encrypted Ad Data including the Randomizer and 40 * @retval 0 Data have been correctly encrypted and authenticated. 84 /* Encrypted Advertising Data Set 1 (ref: Supplement to the Bluetooth Core 112 /* Encrypted Advertising Data Set 2 (ref: Supplement to the Bluetooth Core
|
/Zephyr-latest/subsys/bluetooth/lib/ |
D | Kconfig | 5 bool "Encrypted Advertising Data" 8 Enable the Encrypted Advertising Data library
|
D | ead.c | 100 LOG_HEXDUMP_DBG(encrypted_payload, ead_size, "Encrypted Data: "); in ead_encrypt() 129 LOG_WRN("payload_size is set to 0. The encrypted result will only contain the " in bt_ead_encrypt() 169 LOG_WRN("payload_size is set to 0. The encrypted result will be filled with only " in bt_test_ead_encrypt() 195 LOG_HEXDUMP_DBG(encrypted_ad_data, encrypted_ad_data_size, "Encrypted Data: "); in ead_decrypt() 236 LOG_WRN("encrypted_payload_size not large enough to contain encrypted data."); in bt_ead_decrypt()
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/ |
D | README.rst | 10 Once this feature is enabled, firmware is flashed as plaintext and then the data is encrypted 20 readout of encrypted flash contents. 24 Recommended for manufacturing and production to prevent physical readout of encrypted flash 27 With flash encryption enabled, the following types of data are encrypted by default: 47 encrypted/decrypted data. It requires MCUBoot bootloader previously configured to enable the 54 through eFuse burning on the device, all read and write operations are decrypted/encrypted 88 Then, it dumps 32-bytes of the same memory area in plaintext mode. The content is encrypted, meaning 100 [00:00:00.482,000] <inf> flash_encryption: FLASH RAW DATA (Encrypted)
|
/Zephyr-latest/cmake/ |
D | mcuboot.cmake | 163 list(APPEND byproducts ${output}.signed.encrypted.bin) 164 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_BIN_NAME "${output}.signed.encrypted.bin" 165 CACHE FILEPATH "Signed and encrypted kernel bin file" FORCE 169 ${output}.signed.encrypted.bin) 173 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin) 186 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin) 189 ${output}.bin ${output}.slot1.signed.encrypted.bin) 215 list(APPEND byproducts ${output}.signed.encrypted.hex) 216 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_HEX_NAME "${output}.signed.encrypted.hex" 217 CACHE FILEPATH "Signed and encrypted kernel hex file" FORCE [all …]
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | gap.rst | 195 Encrypted Advertising Data 198 Zephyr has support for the Encrypted Advertising Data feature. The :code:`bt encrypted-ad` 202 encrypted-ad set-keys <session key> <init vector>`. The session key is 16 bytes long and the 205 You can add advertising data by using :code:`bt encrypted-ad add-ad` and :code:`bt encrypted-ad 208 encrypted advertising data structure. It's possible to mix encrypted and non-encrypted data, when 209 done adding advertising data, :code:`bt encrypted-ad commit-ad` can be used to apply the change to 211 previously. It's possible to clear the advertising data by using :code:`bt encrypted-ad clear-ad`. 213 On the Central side, it's possible to decrypt the received encrypted advertising data by setting the 215 :code:`bt encrypted-ad decrypt-scan on`. 240 … uart:~$ bt encrypted-ad set-keys 9ba22d3824efc70feb800c80294cba38 2e83f3d4d47695b6 [all …]
|
/Zephyr-latest/samples/drivers/crypto/src/ |
D | main.c | 129 uint8_t encrypted[16] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ecb_mode() local 139 .out_buf_max = sizeof(encrypted), in ecb_mode() 140 .out_buf = encrypted, in ecb_mode() 144 .in_len = sizeof(encrypted), in ecb_mode() 211 uint8_t encrypted[80] __aligned(IO_ALIGNMENT_BYTES) = {0}; in cbc_mode() local 221 .out_buf_max = sizeof(encrypted), in cbc_mode() 222 .out_buf = encrypted, in cbc_mode() 226 .in_len = sizeof(encrypted), in cbc_mode() 266 /* TinyCrypt keeps IV at the start of encrypted buffer */ in cbc_mode() 267 if (cipher_cbc_op(&ini, &decrypt, encrypted)) { in cbc_mode() [all …]
|
/Zephyr-latest/tests/crypto/tinycrypt/src/ |
D | cbc_mode.c | 111 uint8_t encrypted[80]; in ZTEST() local 124 zassert_true(tc_cbc_mode_encrypt(encrypted, in ZTEST() 129 result = check_result(1, ciphertext, sizeof(encrypted), in ZTEST() 130 encrypted, sizeof(encrypted), 1); in ZTEST() 136 p = &encrypted[TC_AES_BLOCK_SIZE]; in ZTEST() 137 length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE; in ZTEST() 141 length, p, length, encrypted, in ZTEST()
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/ |
D | README.rst | 2 :name: Encrypted Advertising 5 Use the Bluetooth LE encrypted advertising feature. 10 This sample demonstrates the use of the encrypted advertising feature, such as: 22 the encrypted advertising. The feature can be used with legacy advertising as
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | Kconfig.csip | 28 (if encrypted) using public sample data. 32 bool "Support for encrypted SIRK" 88 bool "Support for encrypted SIRK"
|
/Zephyr-latest/samples/userspace/shared_mem/ |
D | README.rst | 49 The PT thread sends a message followed by the encrypted version of the 54 encrypted thread's private memory when the flag is set and then clears 55 the flag. Once the encrypted thread receives the text string, it
|
/Zephyr-latest/drivers/crypto/ |
D | crypto_ataes132a_priv.h | 258 * encrypted by the same ATAES132A * device or other ATAES132A devices. 259 * In User Decryption Mode it can decrypt buffers encrypted by the Host. 260 * To be able to decrypt a buffer encrypted by a different ATAES132A device 284 * buffer was encrypted by the Host and not by an ATAES132A 291 * If the buffer was encrypted by the Host and not by an 301 * encrypted buffer). 304 * authentication. If the buffer was encrypted using a random 341 * encrypted, the length of the input buffer (it cannot be 344 * buffer to receive the encrypted message (it must have space 380 * encrypted/decrypted, the length of the input buffer (it cannot
|
/Zephyr-latest/tests/bsim/bluetooth/audio/test_scripts/ |
D | csip_encrypted_sirk.sh | 7 # CSIP test where the SIRK is encrypted 18 printf "\n\n======== Running test with SIRK encrypted ========\n\n"
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/peripheral/ |
D | sample.yaml | 2 name: Bluetooth Peripheral Encrypted Advertising Data
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/central/ |
D | sample.yaml | 2 name: Bluetooth Central Encrypted Advertising Data
|
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/ |
D | testcase.yaml | 2 bluetooth.host.adv.encrypted.ead_sample:
|
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/ |
D | testcase.yaml | 2 bluetooth.host.adv.encrypted.css_sample_data:
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/src/ |
D | main.c | 44 /* this writes encrypted data into flash */ in main() 50 LOG_HEXDUMP_INF(buffer, sizeof(buffer), "FLASH RAW DATA (Encrypted)"); in main()
|
/Zephyr-latest/tests/bluetooth/tester/src/audio/btp/ |
D | btp_csis.h | 34 uint8_t encrypted; member
|
/Zephyr-latest/dts/bindings/crypto/ |
D | nordic,nrf-ccm.yaml | 21 (8 bits) of the LENGTH field in encrypted/decrypted packets.
|