Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 9 of 9) sorted by relevance

/Zephyr-latest/subsys/bluetooth/mesh/
Dcrypto.c50 int bt_mesh_s1(const char *m, size_t m_len, uint8_t salt[16]) in bt_mesh_s1()
54 return bt_mesh_aes_cmac_one_raw_key(zero, m, m_len, salt); in bt_mesh_s1()
57 int bt_mesh_s2(const char *m, size_t m_len, uint8_t salt[32]) in bt_mesh_s2()
61 return bt_mesh_sha256_hmac_one_raw_key(zero, m, m_len, salt); in bt_mesh_s2()
64 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], in bt_mesh_k1()
69 err = bt_mesh_aes_cmac_one_raw_key(salt, ikm, ikm_len, okm); in bt_mesh_k1()
81 uint8_t salt[16]; in bt_mesh_k2() local
90 err = bt_mesh_s1_str("smk2", salt); in bt_mesh_k2()
95 err = bt_mesh_aes_cmac_one_raw_key(salt, n, 16, t); in bt_mesh_k2()
202 int bt_mesh_k5(const uint8_t *n, size_t n_len, const uint8_t salt[32], in bt_mesh_k5()
[all …]
Dcrypto.h43 int bt_mesh_s1(const char *m, size_t m_len, uint8_t salt[16]);
45 static inline int bt_mesh_s1_str(const char *m, uint8_t salt[16]) in bt_mesh_s1_str()
47 return bt_mesh_s1(m, strlen(m), salt); in bt_mesh_s1_str()
50 int bt_mesh_s2(const char *m, size_t m_len, uint8_t salt[32]);
52 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], const char *info,
62 int bt_mesh_k5(const uint8_t *n, size_t n_len, const uint8_t salt[32], uint8_t *p, uint8_t out[32]);
131 int bt_mesh_prov_conf_salt(uint8_t algorithm, const uint8_t conf_inputs[145], uint8_t *salt);
/Zephyr-latest/subsys/bluetooth/crypto/
Dbt_crypto.c59 static const uint8_t salt[16] = {0x6c, 0x88, 0x83, 0x91, 0xaa, 0xf5, 0xa5, 0x38, in bt_crypto_f5() local
79 err = bt_crypto_aes_cmac(salt, ws, 32, t); in bt_crypto_f5()
216 int bt_crypto_h7(const uint8_t salt[16], const uint8_t w[16], uint8_t res[16]) in bt_crypto_h7()
223 LOG_DBG("salt %s", bt_hex(salt, 16)); in bt_crypto_h7()
226 sys_memcpy_swap(salt_s, salt, 16); in bt_crypto_h7()
Dbt_crypto.h127 int bt_crypto_h7(const uint8_t salt[16], const uint8_t w[16], uint8_t res[16]);
/Zephyr-latest/subsys/bluetooth/audio/
Dcsip_crypto.c95 const uint8_t salt[BT_CSIP_CRYPTO_SALT_SIZE], in k1()
111 LOG_DBG("BE: salt %s", bt_hex(salt, BT_CSIP_CRYPTO_SALT_SIZE)); in k1()
114 err = bt_crypto_aes_cmac(salt, n, n_size, t); in k1()
/Zephyr-latest/tests/bluetooth/bt_crypto/src/
Dtest_bt_crypto.c150 uint8_t salt[16] = {0x31, 0x70, 0x6d, 0x74, 0x00, 0x00, 0x00, 0x00, in ZTEST() local
159 bt_crypto_h7(salt, w, res); in ZTEST()
/Zephyr-latest/subsys/secure_storage/
DKconfig.its_transform74 for which it is generating a key to the data hashed as a salt.
/Zephyr-latest/subsys/bluetooth/host/
Dsmp.c769 static const uint8_t salt[16] = { 0x31, 0x70, 0x6d, 0x74, in sc_derive_link_key() local
774 if (bt_crypto_h7(salt, conn->le.keys->ltk.val, ilk)) { in sc_derive_link_key()
974 static const uint8_t salt[16] = { 0x32, 0x70, 0x6d, 0x74, in smp_br_derive_ltk() local
979 if (bt_crypto_h7(salt, link_key->val, ilk)) { in smp_br_derive_ltk()
5330 uint8_t salt[16] = { 0x31, 0x70, 0x6d, 0x74, 0x00, 0x00, 0x00, 0x00, in smp_h7_test() local
5339 err = bt_crypto_h7(salt, w, res); in smp_h7_test()
/Zephyr-latest/doc/services/tfm/
Doverview.rst248 they can be regenerated from the HUK at startup, using an additional salt/seed