Home
last modified time | relevance | path

Searched refs:BT_EAD_IV_SIZE (Results 1 – 7 of 7) sorted by relevance

/Zephyr-latest/include/zephyr/bluetooth/
Dead.h30 #define BT_EAD_IV_SIZE 8 macro
77 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],
103 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],
/Zephyr-latest/subsys/bluetooth/lib/
Dead.c54 static int bt_ead_generate_nonce(const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_generate_nonce() argument
73 memcpy(&nonce[BT_EAD_RANDOMIZER_SIZE], iv, BT_EAD_IV_SIZE); in bt_ead_generate_nonce()
78 static int ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_encrypt() argument
105 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_encrypt() argument
139 const uint8_t iv[BT_EAD_IV_SIZE], in bt_test_ead_encrypt() argument
178 static int ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_decrypt() argument
208 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_decrypt() argument
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/
Dcommon.h45 const uint8_t iv[BT_EAD_IV_SIZE],
76 const uint8_t iv[BT_EAD_IV_SIZE];
/Zephyr-latest/samples/bluetooth/encrypted_advertising/include/
Dcommon.h17 uint8_t iv[BT_EAD_IV_SIZE];
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/src/
Dmain.c86 LOG_HEXDUMP_DBG(received_keymat.iv, BT_EAD_IV_SIZE, "Received IV"); in central_main()
92 if (memcmp(&received_keymat, &mk, BT_EAD_KEY_SIZE + BT_EAD_IV_SIZE) != 0) { in central_main()
/Zephyr-latest/samples/bluetooth/encrypted_advertising/central/src/
Dcentral_ead.c512 LOG_HEXDUMP_DBG(keymat.iv, BT_EAD_IV_SIZE, "IV"); in run_central_sample()
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c264 static uint8_t bt_shell_ead_iv[BT_EAD_IV_SIZE] = {0xFB, 0x56, 0xE1, 0xDA, 0xDC, 0x7E, 0xAD, 0xF5};
4592 len = hex2bin(iv, strlen(iv), bt_shell_ead_iv, BT_EAD_IV_SIZE); in cmd_encrypted_ad_set_keys()
4593 if (len != BT_EAD_IV_SIZE) { in cmd_encrypted_ad_set_keys()
4601 shell_hexdump(sh, bt_shell_ead_iv, BT_EAD_IV_SIZE); in cmd_encrypted_ad_set_keys()