Searched refs:BT_EAD_IV_SIZE (Results 1 – 7 of 7) sorted by relevance
/Zephyr-latest/include/zephyr/bluetooth/ |
D | ead.h | 30 #define BT_EAD_IV_SIZE 8 macro 77 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], 103 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],
|
/Zephyr-latest/subsys/bluetooth/lib/ |
D | ead.c | 54 static int bt_ead_generate_nonce(const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_generate_nonce() argument 73 memcpy(&nonce[BT_EAD_RANDOMIZER_SIZE], iv, BT_EAD_IV_SIZE); in bt_ead_generate_nonce() 78 static int ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_encrypt() argument 105 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_encrypt() argument 139 const uint8_t iv[BT_EAD_IV_SIZE], in bt_test_ead_encrypt() argument 178 static int ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_decrypt() argument 208 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_decrypt() argument
|
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/ |
D | common.h | 45 const uint8_t iv[BT_EAD_IV_SIZE], 76 const uint8_t iv[BT_EAD_IV_SIZE];
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/include/ |
D | common.h | 17 uint8_t iv[BT_EAD_IV_SIZE];
|
/Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/src/ |
D | main.c | 86 LOG_HEXDUMP_DBG(received_keymat.iv, BT_EAD_IV_SIZE, "Received IV"); in central_main() 92 if (memcmp(&received_keymat, &mk, BT_EAD_KEY_SIZE + BT_EAD_IV_SIZE) != 0) { in central_main()
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/central/src/ |
D | central_ead.c | 512 LOG_HEXDUMP_DBG(keymat.iv, BT_EAD_IV_SIZE, "IV"); in run_central_sample()
|
/Zephyr-latest/subsys/bluetooth/host/shell/ |
D | bt.c | 264 static uint8_t bt_shell_ead_iv[BT_EAD_IV_SIZE] = {0xFB, 0x56, 0xE1, 0xDA, 0xDC, 0x7E, 0xAD, 0xF5}; 4592 len = hex2bin(iv, strlen(iv), bt_shell_ead_iv, BT_EAD_IV_SIZE); in cmd_encrypted_ad_set_keys() 4593 if (len != BT_EAD_IV_SIZE) { in cmd_encrypted_ad_set_keys() 4601 shell_hexdump(sh, bt_shell_ead_iv, BT_EAD_IV_SIZE); in cmd_encrypted_ad_set_keys()
|