/Zephyr-latest/tests/bluetooth/controller/ctrl_encrypt/src/ |
D | main.c | 237 const uint8_t ltk[] = { LTK }; in ZTEST() local 259 memcpy(ecb_encrypt_custom_fake_context.key_le, ltk, 16); in ZTEST() 274 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST() 395 const uint8_t ltk[] = { LTK }; in ZTEST() local 417 memcpy(ecb_encrypt_custom_fake_context.key_le, ltk, 16); in ZTEST() 444 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST() 579 const uint8_t ltk[] = { LTK }; in ZTEST() local 613 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST() 681 const uint8_t ltk[] = { LTK }; in ZTEST() local 710 err = ull_cp_encryption_start(&conn, rand, ediv, ltk); in ZTEST() [all …]
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | keys.c | 494 uint8_t ltk[16]; in bt_keys_show_sniffer_info() local 499 sys_memcpy_swap(ltk, keys->ltk.val, keys->enc_size); in bt_keys_show_sniffer_info() 500 LOG_INF("SC LTK: 0x%s", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info() 505 sys_memcpy_swap(ltk, keys->periph_ltk.val, keys->enc_size); in bt_keys_show_sniffer_info() 506 LOG_INF("Legacy LTK: 0x%s (peripheral)", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info() 511 sys_memcpy_swap(ltk, keys->ltk.val, keys->enc_size); in bt_keys_show_sniffer_info() 512 LOG_INF("Legacy LTK: 0x%s (central)", bt_hex(ltk, keys->enc_size)); in bt_keys_show_sniffer_info()
|
D | smp.h | 88 uint8_t ltk[16]; member 137 uint8_t *ltk);
|
D | smp.c | 774 if (bt_crypto_h7(salt, conn->le.keys->ltk.val, ilk)) { in sc_derive_link_key() 782 if (bt_crypto_h6(conn->le.keys->ltk.val, tmp1, ilk)) { in sc_derive_link_key() 993 if (bt_crypto_h6(ilk, brle, keys->ltk.val)) { in smp_br_derive_ltk() 998 (void)memset(keys->ltk.ediv, 0, sizeof(keys->ltk.ediv)); in smp_br_derive_ltk() 999 (void)memset(keys->ltk.rand, 0, sizeof(keys->ltk.rand)); in smp_br_derive_ltk() 2051 memcpy(info->ltk, rand.key, keys->enc_size); in legacy_distribute_keys() 2052 if (keys->enc_size < sizeof(info->ltk)) { in legacy_distribute_keys() 2053 (void)memset(info->ltk + keys->enc_size, 0, in legacy_distribute_keys() 2054 sizeof(info->ltk) - keys->enc_size); in legacy_distribute_keys() 2536 memcpy(keys->ltk.val, req->ltk, 16); in smp_encrypt_info() [all …]
|
D | keys.h | 73 struct bt_ltk ltk; member
|
D | conn_internal.h | 523 uint8_t ediv[2], const uint8_t *ltk, size_t len);
|
D | conn.c | 2536 uint8_t ediv[2], const uint8_t *ltk, size_t len) in bt_conn_le_start_encryption() argument 2541 if (len > sizeof(cp->ltk)) { in bt_conn_le_start_encryption() 2555 memcpy(cp->ltk, ltk, len); in bt_conn_le_start_encryption() 2556 if (len < sizeof(cp->ltk)) { in bt_conn_le_start_encryption() 2557 (void)memset(cp->ltk + len, 0, sizeof(cp->ltk) - len); in bt_conn_le_start_encryption()
|
D | hci_core.c | 2342 static void le_ltk_reply(uint16_t handle, uint8_t *ltk) in le_ltk_reply() argument 2356 memcpy(cp->ltk, ltk, sizeof(cp->ltk)); in le_ltk_reply() 2366 uint8_t ltk[16]; in le_ltk_request() local 2378 if (bt_smp_request_ltk(conn, evt->rand, evt->ediv, ltk)) { in le_ltk_request() 2379 le_ltk_reply(handle, ltk); in le_ltk_request()
|
/Zephyr-latest/tests/bluetooth/bt_crypto/src/ |
D | test_bt_crypto.c | 85 uint8_t mackey[16], ltk[16]; in ZTEST() local 87 bt_crypto_f5(w, n1, n2, &a1, &a2, mackey, ltk); in ZTEST() 89 zassert_mem_equal(ltk, exp_ltk, 16); in ZTEST()
|
/Zephyr-latest/subsys/bluetooth/controller/ll_sw/ |
D | ull_llcp.h | 98 const uint8_t ltk[16]); 104 const uint8_t ltk[16]); 113 uint8_t ull_cp_ltk_req_reply(struct ll_conn *conn, const uint8_t ltk[16]);
|
D | ull_llcp.c | 673 const uint8_t ltk[16]) in ull_cp_encryption_start() 690 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_start() 699 const uint8_t ltk[16]) in ull_cp_encryption_pause() 716 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_pause() 951 uint8_t ull_cp_ltk_req_reply(struct ll_conn *conn, const uint8_t ltk[16]) in ull_cp_ltk_req_reply() 958 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_ltk_req_reply()
|
D | ull_central.c | 556 uint8_t const *const ediv, uint8_t const *const ltk) in ll_enc_req_send() argument 575 return ull_cp_encryption_start(conn, rand_num, ediv, ltk); in ll_enc_req_send() 578 return ull_cp_encryption_pause(conn, rand_num, ediv, ltk); in ll_enc_req_send()
|
D | ull_peripheral.c | 601 uint8_t const *const ltk) argument 613 return ull_cp_ltk_req_reply(conn, ltk);
|
D | ull_llcp_internal.h | 100 uint8_t ltk[16]; member
|
D | ull_llcp_enc.c | 153 ecb_encrypt(&ctx->data.enc.ltk[0], &ctx->data.enc.skd[0], NULL, &conn->lll.ccm_rx.key[0]); in enc_setup_lll()
|
/Zephyr-latest/subsys/bluetooth/crypto/ |
D | bt_crypto.c | 57 const bt_addr_le_t *a2, uint8_t *mackey, uint8_t *ltk) in bt_crypto_f5() argument 105 err = bt_crypto_aes_cmac(t, m, sizeof(m), ltk); in bt_crypto_f5() 110 LOG_DBG("ltk %s", bt_hex(ltk, 16)); in bt_crypto_f5() 112 sys_mem_swap(ltk, 16); in bt_crypto_f5()
|
D | bt_crypto.h | 61 const bt_addr_le_t *a2, uint8_t *mackey, uint8_t *ltk);
|
/Zephyr-latest/tests/bluetooth/controller/ctrl_hci/src/ |
D | main.c | 503 uint8_t ltk[5]; in ZTEST() local 513 err = ll_enc_req_send(conn_handle + 1, &rand_nr, &ediv, <k[0]); in ZTEST() 515 err = ll_enc_req_send(conn_handle, &rand_nr, &ediv, <k[0]); in ZTEST() 519 err = ll_start_enc_req_send(conn_handle + 1, error_code, <k[0]); in ZTEST() 521 err = ll_start_enc_req_send(conn_handle, error_code, <k[0]); in ZTEST()
|
/Zephyr-latest/subsys/bluetooth/controller/include/ |
D | ll.h | 253 uint8_t const *const ltk); 255 uint8_t const *const ltk);
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | csip_set_member.c | 170 k = conn->le.keys->ltk.val; in sirk_encrypt()
|
D | csip_set_coordinator.c | 288 k = conn->le.keys->ltk.val; in sirk_decrypt()
|
/Zephyr-latest/include/zephyr/bluetooth/ |
D | hci_types.h | 1230 uint8_t ltk[16]; member 1236 uint8_t ltk[16]; member
|
/Zephyr-latest/subsys/bluetooth/controller/hci/ |
D | hci.c | 1996 &cmd->ltk[0]); in le_start_encryption() 2435 status = ll_start_enc_req_send(handle, 0x00, &cmd->ltk[0]); in le_ltk_req_reply()
|
/Zephyr-latest/doc/releases/ |
D | release-notes-4.0.rst | 205 * Fixed an ltk derive issue in L2CAP
|