/Zephyr-latest/samples/drivers/crypto/src/ |
D | main.c | 136 struct cipher_pkt encrypt = { in ecb_mode() local 143 .in_buf = encrypt.out_buf, in ecb_mode() 155 if (cipher_block_op(&ini, &encrypt)) { in ecb_mode() 160 LOG_INF("Output length (encryption): %d", encrypt.out_len); in ecb_mode() 162 if (memcmp(encrypt.out_buf, ecb_ciphertext, sizeof(ecb_ciphertext))) { in ecb_mode() 165 print_buffer_comparison(ecb_ciphertext, encrypt.out_buf, in ecb_mode() 218 struct cipher_pkt encrypt = { in cbc_mode() local 225 .in_buf = encrypt.out_buf, in cbc_mode() 242 if (cipher_cbc_op(&ini, &encrypt, iv)) { in cbc_mode() 247 LOG_INF("Output length (encryption): %d", encrypt.out_len); in cbc_mode() [all …]
|
/Zephyr-latest/subsys/mgmt/osdp/src/ |
D | osdp_common.c | 59 struct cipher_pkt encrypt = { in osdp_encrypt() local 80 if (cipher_cbc_op(&ctx, &encrypt, iv)) { in osdp_encrypt() 91 if (cipher_block_op(&ctx, &encrypt)) { in osdp_encrypt()
|
/Zephyr-latest/modules/ |
D | Kconfig.tinycrypt | 62 bool "AES-128 decrypt/encrypt" 64 This option enables support for AES-128 decrypt and encrypt.
|
D | Kconfig.mcuboot | 70 The file contains the public key that is used to encrypt the 77 sign and encrypt the final binaries using a 'west sign -t imgtool' 90 If left empty, you must encrypt the Zephyr binaries manually.
|
/Zephyr-latest/samples/userspace/shared_mem/ |
D | README.rst | 52 the encrypt thread. After writing the buffer, the flag is set. The 53 encrypt thread copies the memory from the common buffer into the
|
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/ |
D | op_agg_srv.rst | 20 to encrypt the sequence of access layer messages sent to the Opcodes Aggregator Server.
|
/Zephyr-latest/boards/native/nrf_bsim/ |
D | Kconfig.defconfig | 59 # default to encrypt packets on its own.
|
/Zephyr-latest/cmake/ |
D | mcuboot.cmake | 168 ${imgtool_sign} ${imgtool_args} --encrypt "${keyfile_enc}" ${output}.bin 188 ${imgtool_sign} ${imgtool_args_alt_slot} --encrypt "${keyfile_enc}" 220 ${imgtool_sign} ${imgtool_args} --encrypt "${keyfile_enc}" ${output}.hex 240 ${imgtool_sign} ${imgtool_args_alt_slot} --encrypt "${keyfile_enc}"
|
/Zephyr-latest/samples/bluetooth/bap_broadcast_source/ |
D | Kconfig | 45 Setting a non-empty string for this option will encrypt the broadcast using this
|
/Zephyr-latest/modules/trusted-firmware-m/ |
D | Kconfig.tfm.crypto_modules | 62 Unset this option if the encrypt functionality provided by 'crypto_asymmetric.c'
|
/Zephyr-latest/include/zephyr/bluetooth/audio/ |
D | cap.h | 651 bool encrypt; member
|
/Zephyr-latest/subsys/bluetooth/host/classic/ |
D | br.c | 149 if (!conn->encrypt) { in bt_br_update_sec_level() 156 if (conn->encrypt == 0x02) { in bt_br_update_sec_level() 234 conn->encrypt = evt->encr_enabled; in bt_hci_conn_complete()
|
D | l2cap_br.c | 1016 BT_FEAT_HOST_SSP(conn->br.features) && !conn->encrypt) { in l2cap_br_conn_req() 1930 LOG_DBG("chan %p status 0x%02x encr 0x%02x", chan, status, chan->conn->encrypt); in l2cap_br_conn_pend() 1948 if (!chan->conn->encrypt) { in l2cap_br_conn_pend()
|
D | ssp.c | 822 encr->encrypt = 0x01; in link_encr()
|
D | rfcomm.c | 1580 LOG_DBG("session %p status 0x%02x encr 0x%02x", session, hci_status, conn->encrypt); in rfcomm_encrypt_change() 1589 if (hci_status || !conn->encrypt || in rfcomm_encrypt_change()
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | conn_internal.h | 227 uint8_t encrypt; member
|
D | hci_core.c | 2151 evt->status, bt_hci_err_to_str(evt->status), handle, evt->encrypt); in hci_encrypt_change() 2166 if (conn->encrypt == evt->encrypt) { in hci_encrypt_change() 2167 LOG_WRN("No change to encryption state (encrypt 0x%02x)", evt->encrypt); in hci_encrypt_change() 2172 conn->encrypt = evt->encrypt; in hci_encrypt_change() 2184 if (conn->encrypt) { in hci_encrypt_change()
|
D | smp.c | 955 if (IS_ENABLED(CONFIG_BT_SMP_FORCE_BREDR) && conn->encrypt != 0x02) { in smp_br_derive_ltk() 1130 if (smp->chan.chan.conn->encrypt == 0x02) { in smp_br_pairing_allowed() 1135 smp->chan.chan.conn->encrypt == 0x01) { in smp_br_pairing_allowed() 4735 conn->handle, conn->encrypt, hci_status, bt_hci_err_to_str(hci_status)); in bt_smp_encrypt_change() 4758 if (!conn->encrypt) { in bt_smp_encrypt_change()
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/ |
D | README.rst | 51 When enabling the Flash Encryption, user can encrypt the content either using a device
|
/Zephyr-latest/subsys/secure_storage/ |
D | Kconfig.its_transform | 37 The AEAD scheme used to encrypt and authenticate the data.
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | gap.rst | 201 To encrypt the advertising data, key materials need to be provided, that can be done with :code:`bt 207 Specification), when the later will read the given data, encrypt them and then add the generated
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | csip_set_member.c | 468 if (err != 0 || conn->encrypt == 0) { in csip_security_changed()
|
D | pacs.c | 980 if (err != 0 || conn->encrypt == 0) { in pacs_security_changed()
|
/Zephyr-latest/doc/services/tfm/ |
D | overview.rst | 240 **Protected Storage** service, for example, to encrypt information stored in
|
/Zephyr-latest/modules/mbedtls/ |
D | Kconfig.tls-generic | 267 bool "Xor-encrypt-xor with ciphertext stealing mode (XTS) for AES"
|