Home
last modified time | relevance | path

Searched refs:ltk (Results 1 – 24 of 24) sorted by relevance

/Zephyr-latest/tests/bluetooth/controller/ctrl_encrypt/src/
Dmain.c237 const uint8_t ltk[] = { LTK }; in ZTEST() local
259 memcpy(ecb_encrypt_custom_fake_context.key_le, ltk, 16); in ZTEST()
274 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST()
395 const uint8_t ltk[] = { LTK }; in ZTEST() local
417 memcpy(ecb_encrypt_custom_fake_context.key_le, ltk, 16); in ZTEST()
444 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST()
579 const uint8_t ltk[] = { LTK }; in ZTEST() local
613 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST()
681 const uint8_t ltk[] = { LTK }; in ZTEST() local
710 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST()
[all …]
/Zephyr-latest/subsys/bluetooth/host/
Dkeys.c494 uint8_t ltk[16]; in bt_keys_show_sniffer_info() local
499 sys_memcpy_swap(ltk, keys->ltk.val, keys->enc_size); in bt_keys_show_sniffer_info()
500 LOG_INF("SC LTK: 0x%s", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info()
505 sys_memcpy_swap(ltk, keys->periph_ltk.val, keys->enc_size); in bt_keys_show_sniffer_info()
506 LOG_INF("Legacy LTK: 0x%s (peripheral)", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info()
511 sys_memcpy_swap(ltk, keys->ltk.val, keys->enc_size); in bt_keys_show_sniffer_info()
512 LOG_INF("Legacy LTK: 0x%s (central)", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info()
Dsmp.h88 uint8_t ltk[16]; member
137 uint8_t *ltk);
Dsmp.c774 if (bt_crypto_h7(salt, conn->le.keys->ltk.val, ilk)) { in sc_derive_link_key()
782 if (bt_crypto_h6(conn->le.keys->ltk.val, tmp1, ilk)) { in sc_derive_link_key()
993 if (bt_crypto_h6(ilk, brle, keys->ltk.val)) { in smp_br_derive_ltk()
998 (void)memset(keys->ltk.ediv, 0, sizeof(keys->ltk.ediv)); in smp_br_derive_ltk()
999 (void)memset(keys->ltk.rand, 0, sizeof(keys->ltk.rand)); in smp_br_derive_ltk()
2051 memcpy(info->ltk, rand.key, keys->enc_size); in legacy_distribute_keys()
2052 if (keys->enc_size < sizeof(info->ltk)) { in legacy_distribute_keys()
2053 (void)memset(info->ltk + keys->enc_size, 0, in legacy_distribute_keys()
2054 sizeof(info->ltk) - keys->enc_size); in legacy_distribute_keys()
2536 memcpy(keys->ltk.val, req->ltk, 16); in smp_encrypt_info()
[all …]
Dkeys.h73 struct bt_ltk ltk; member
Dconn_internal.h523 uint8_t ediv[2], const uint8_t *ltk, size_t len);
Dconn.c2536 uint8_t ediv[2], const uint8_t *ltk, size_t len) in bt_conn_le_start_encryption() argument
2541 if (len > sizeof(cp->ltk)) { in bt_conn_le_start_encryption()
2555 memcpy(cp->ltk, ltk, len); in bt_conn_le_start_encryption()
2556 if (len < sizeof(cp->ltk)) { in bt_conn_le_start_encryption()
2557 (void)memset(cp->ltk + len, 0, sizeof(cp->ltk) - len); in bt_conn_le_start_encryption()
Dhci_core.c2342 static void le_ltk_reply(uint16_t handle, uint8_t *ltk) in le_ltk_reply() argument
2356 memcpy(cp->ltk, ltk, sizeof(cp->ltk)); in le_ltk_reply()
2366 uint8_t ltk[16]; in le_ltk_request() local
2378 if (bt_smp_request_ltk(conn, evt->rand, evt->ediv, ltk)) { in le_ltk_request()
2379 le_ltk_reply(handle, ltk); in le_ltk_request()
/Zephyr-latest/tests/bluetooth/bt_crypto/src/
Dtest_bt_crypto.c85 uint8_t mackey[16], ltk[16]; in ZTEST() local
87 bt_crypto_f5(w, n1, n2, &a1, &a2, mackey, ltk); in ZTEST()
89 zassert_mem_equal(ltk, exp_ltk, 16); in ZTEST()
/Zephyr-latest/subsys/bluetooth/controller/ll_sw/
Dull_llcp.h98 const uint8_t ltk[16]);
104 const uint8_t ltk[16]);
113 uint8_t ull_cp_ltk_req_reply(struct ll_conn *conn, const uint8_t ltk[16]);
Dull_llcp.c673 const uint8_t ltk[16]) in ull_cp_encryption_start()
690 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_start()
699 const uint8_t ltk[16]) in ull_cp_encryption_pause()
716 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_pause()
951 uint8_t ull_cp_ltk_req_reply(struct ll_conn *conn, const uint8_t ltk[16]) in ull_cp_ltk_req_reply()
958 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_ltk_req_reply()
Dull_central.c556 uint8_t const *const ediv, uint8_t const *const ltk) in ll_enc_req_send() argument
575 return ull_cp_encryption_start(conn, rand_num, ediv, ltk); in ll_enc_req_send()
578 return ull_cp_encryption_pause(conn, rand_num, ediv, ltk); in ll_enc_req_send()
Dull_peripheral.c601 uint8_t const *const ltk) argument
613 return ull_cp_ltk_req_reply(conn, ltk);
Dull_llcp_internal.h100 uint8_t ltk[16]; member
Dull_llcp_enc.c153 ecb_encrypt(&ctx->data.enc.ltk[0], &ctx->data.enc.skd[0], NULL, &conn->lll.ccm_rx.key[0]); in enc_setup_lll()
/Zephyr-latest/subsys/bluetooth/crypto/
Dbt_crypto.c57 const bt_addr_le_t *a2, uint8_t *mackey, uint8_t *ltk) in bt_crypto_f5() argument
105 err = bt_crypto_aes_cmac(t, m, sizeof(m), ltk); in bt_crypto_f5()
110 LOG_DBG("ltk %s", bt_hex(ltk, 16)); in bt_crypto_f5()
112 sys_mem_swap(ltk, 16); in bt_crypto_f5()
Dbt_crypto.h61 const bt_addr_le_t *a2, uint8_t *mackey, uint8_t *ltk);
/Zephyr-latest/tests/bluetooth/controller/ctrl_hci/src/
Dmain.c503 uint8_t ltk[5]; in ZTEST() local
513 err = ll_enc_req_send(conn_handle + 1, &rand_nr, &ediv, &ltk[0]); in ZTEST()
515 err = ll_enc_req_send(conn_handle, &rand_nr, &ediv, &ltk[0]); in ZTEST()
519 err = ll_start_enc_req_send(conn_handle + 1, error_code, &ltk[0]); in ZTEST()
521 err = ll_start_enc_req_send(conn_handle, error_code, &ltk[0]); in ZTEST()
/Zephyr-latest/subsys/bluetooth/controller/include/
Dll.h253 uint8_t const *const ltk);
255 uint8_t const *const ltk);
/Zephyr-latest/subsys/bluetooth/audio/
Dcsip_set_member.c170 k = conn->le.keys->ltk.val; in sirk_encrypt()
Dcsip_set_coordinator.c288 k = conn->le.keys->ltk.val; in sirk_decrypt()
/Zephyr-latest/include/zephyr/bluetooth/
Dhci_types.h1230 uint8_t ltk[16]; member
1236 uint8_t ltk[16]; member
/Zephyr-latest/subsys/bluetooth/controller/hci/
Dhci.c1996 &cmd->ltk[0]); in le_start_encryption()
2435 status = ll_start_enc_req_send(handle, 0x00, &cmd->ltk[0]); in le_ltk_req_reply()
/Zephyr-latest/doc/releases/
Drelease-notes-4.0.rst205 * Fixed an ltk derive issue in L2CAP