/Zephyr-latest/tests/crypto/tinycrypt/src/ |
D | cbc_mode.c | 111 uint8_t encrypted[80]; in ZTEST() local 124 zassert_true(tc_cbc_mode_encrypt(encrypted, in ZTEST() 129 result = check_result(1, ciphertext, sizeof(encrypted), in ZTEST() 130 encrypted, sizeof(encrypted), 1); in ZTEST() 136 p = &encrypted[TC_AES_BLOCK_SIZE]; in ZTEST() 137 length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE; in ZTEST() 141 length, p, length, encrypted, in ZTEST()
|
/Zephyr-latest/samples/drivers/crypto/src/ |
D | main.c | 129 uint8_t encrypted[16] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ecb_mode() local 139 .out_buf_max = sizeof(encrypted), in ecb_mode() 140 .out_buf = encrypted, in ecb_mode() 144 .in_len = sizeof(encrypted), in ecb_mode() 211 uint8_t encrypted[80] __aligned(IO_ALIGNMENT_BYTES) = {0}; in cbc_mode() local 221 .out_buf_max = sizeof(encrypted), in cbc_mode() 222 .out_buf = encrypted, in cbc_mode() 226 .in_len = sizeof(encrypted), in cbc_mode() 267 if (cipher_cbc_op(&ini, &decrypt, encrypted)) { in cbc_mode() 300 uint8_t encrypted[64] __aligned(IO_ALIGNMENT_BYTES) = {0}; in ctr_mode() local [all …]
|
/Zephyr-latest/cmake/ |
D | mcuboot.cmake | 163 list(APPEND byproducts ${output}.signed.encrypted.bin) 164 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_BIN_NAME "${output}.signed.encrypted.bin" 165 CACHE FILEPATH "Signed and encrypted kernel bin file" FORCE 169 ${output}.signed.encrypted.bin) 173 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin) 186 list(APPEND byproducts ${output}.slot1.signed.encrypted.bin) 189 ${output}.bin ${output}.slot1.signed.encrypted.bin) 215 list(APPEND byproducts ${output}.signed.encrypted.hex) 216 set(BYPRODUCT_KERNEL_SIGNED_ENCRYPTED_HEX_NAME "${output}.signed.encrypted.hex" 217 CACHE FILEPATH "Signed and encrypted kernel hex file" FORCE [all …]
|
/Zephyr-latest/samples/boards/espressif/flash_encryption/ |
D | README.rst | 10 Once this feature is enabled, firmware is flashed as plaintext and then the data is encrypted 20 readout of encrypted flash contents. 24 Recommended for manufacturing and production to prevent physical readout of encrypted flash 27 With flash encryption enabled, the following types of data are encrypted by default: 47 encrypted/decrypted data. It requires MCUBoot bootloader previously configured to enable the 54 through eFuse burning on the device, all read and write operations are decrypted/encrypted 88 Then, it dumps 32-bytes of the same memory area in plaintext mode. The content is encrypted, meaning
|
/Zephyr-latest/tests/bluetooth/tester/src/audio/btp/ |
D | btp_csis.h | 34 uint8_t encrypted; member
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | gap.rst | 198 Zephyr has support for the Encrypted Advertising Data feature. The :code:`bt encrypted-ad` 202 encrypted-ad set-keys <session key> <init vector>`. The session key is 16 bytes long and the 205 You can add advertising data by using :code:`bt encrypted-ad add-ad` and :code:`bt encrypted-ad 208 encrypted advertising data structure. It's possible to mix encrypted and non-encrypted data, when 209 done adding advertising data, :code:`bt encrypted-ad commit-ad` can be used to apply the change to 211 previously. It's possible to clear the advertising data by using :code:`bt encrypted-ad clear-ad`. 213 On the Central side, it's possible to decrypt the received encrypted advertising data by setting the 215 :code:`bt encrypted-ad decrypt-scan on`. 240 … uart:~$ bt encrypted-ad set-keys 9ba22d3824efc70feb800c80294cba38 2e83f3d4d47695b6 245 uart:~$ bt encrypted-ad add-ad 06097368656C6C [all …]
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | Kconfig.csip | 28 (if encrypted) using public sample data. 32 bool "Support for encrypted SIRK" 88 bool "Support for encrypted SIRK"
|
/Zephyr-latest/samples/userspace/shared_mem/ |
D | README.rst | 49 The PT thread sends a message followed by the encrypted version of the 54 encrypted thread's private memory when the flag is set and then clears 55 the flag. Once the encrypted thread receives the text string, it
|
/Zephyr-latest/samples/bluetooth/encrypted_advertising/ |
D | README.rst | 5 Use the Bluetooth LE encrypted advertising feature. 10 This sample demonstrates the use of the encrypted advertising feature, such as: 22 the encrypted advertising. The feature can be used with legacy advertising as
|
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/ |
D | brg_cfg_srv.rst | 15 configure it. The Bridge Configuration Server model only accepts messages encrypted with the node’s
|
D | od_srv.rst | 18 messages encrypted with the node's device key.
|
D | op_agg_srv.rst | 14 The Opcodes Aggregator Server model accepts messages encrypted with the node's device key
|
D | sar_cfg_srv.rst | 22 messages encrypted with the node’s device key.
|
D | srpl_srv.rst | 16 :ref:`bluetooth_mesh_srpl_cli` to control it. The model only accepts messages encrypted with an
|
D | proxy.rst | 38 Solicitation UUID, encrypted with the network key of the subnet that the legacy device wants to 53 the Solicitation PDU RPL Configuration Client and Server is encrypted using the application key,
|
D | rpr_srv.rst | 16 model only accepts messages encrypted with the node's device key.
|
D | priv_beacon_srv.rst | 23 Server model only accepts messages encrypted with the node's device key.
|
D | lcd_srv.rst | 15 :ref:`bluetooth_mesh_lcd_cli` to control it. The model only accepts messages encrypted with the
|
D | sar_cfg_cli.rst | 31 only accepts messages encrypted with the device key of the node supporting the SAR Configuration
|
/Zephyr-latest/samples/bluetooth/peripheral_hids/ |
D | README.rst | 17 To disable authentication and just use encrypted channels instead, build the
|
/Zephyr-latest/samples/subsys/mgmt/osdp/ |
D | README.rst | 8 It supports Secure Channel (SC) for encrypted and authenticated communication
|
/Zephyr-latest/tests/bluetooth/tester/src/audio/ |
D | btp_csis.c | 70 enc_sirk = cp->encrypted != 0U; in csis_sirk_type()
|
/Zephyr-latest/samples/tfm_integration/psa_protected_storage/ |
D | README.rst | 4 Use the Protected Storage (PS) API to store encrypted data. 11 Protected storage provides a key/value storage interface where data is (by default) encrypted, with
|
/Zephyr-latest/samples/bluetooth/bap_broadcast_source/ |
D | Kconfig | 42 string "The broadcast code (if any) to use for encrypted broadcast"
|
/Zephyr-latest/samples/bluetooth/iso_central/ |
D | README.rst | 15 To run the sample with an encrypted isochronous channel, enable :kconfig:option:`CONFIG_BT_SMP`.
|