Searched refs:BT_EAD_KEY_SIZE (Results 1 – 7 of 7) sorted by relevance
| /Zephyr-latest/include/zephyr/bluetooth/ |
| D | ead.h | 28 #define BT_EAD_KEY_SIZE 16 macro 77 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], 103 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],
|
| /Zephyr-latest/subsys/bluetooth/lib/ |
| D | ead.c | 78 static int ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_encrypt() argument 105 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_encrypt() argument 138 int bt_test_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], in bt_test_ead_encrypt() argument 178 static int ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in ead_decrypt() argument 208 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE], in bt_ead_decrypt() argument
|
| /Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/ |
| D | common.h | 44 int bt_test_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], 52 const uint8_t session_key[BT_EAD_KEY_SIZE];
|
| /Zephyr-latest/samples/bluetooth/encrypted_advertising/include/ |
| D | common.h | 16 uint8_t session_key[BT_EAD_KEY_SIZE];
|
| /Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/src/ |
| D | main.c | 85 LOG_HEXDUMP_DBG(received_keymat.session_key, BT_EAD_KEY_SIZE, "Receveid key"); in central_main() 92 if (memcmp(&received_keymat, &mk, BT_EAD_KEY_SIZE + BT_EAD_IV_SIZE) != 0) { in central_main()
|
| /Zephyr-latest/samples/bluetooth/encrypted_advertising/central/src/ |
| D | central_ead.c | 511 LOG_HEXDUMP_DBG(keymat.session_key, BT_EAD_KEY_SIZE, "Session Key"); in run_central_sample()
|
| /Zephyr-latest/subsys/bluetooth/host/shell/ |
| D | bt.c | 263 static uint8_t bt_shell_ead_session_key[BT_EAD_KEY_SIZE] = {0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 4618 len = hex2bin(session_key, strlen(session_key), bt_shell_ead_session_key, BT_EAD_KEY_SIZE); in cmd_encrypted_ad_set_keys() 4619 if (len != BT_EAD_KEY_SIZE) { in cmd_encrypted_ad_set_keys() 4631 shell_hexdump(sh, bt_shell_ead_session_key, BT_EAD_KEY_SIZE); in cmd_encrypted_ad_set_keys()
|