/Zephyr-latest/subsys/bluetooth/mesh/ |
D | crypto.c | 50 int bt_mesh_s1(const char *m, size_t m_len, uint8_t salt[16]) in bt_mesh_s1() 54 return bt_mesh_aes_cmac_one_raw_key(zero, m, m_len, salt); in bt_mesh_s1() 57 int bt_mesh_s2(const char *m, size_t m_len, uint8_t salt[32]) in bt_mesh_s2() 61 return bt_mesh_sha256_hmac_one_raw_key(zero, m, m_len, salt); in bt_mesh_s2() 64 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], in bt_mesh_k1() 69 err = bt_mesh_aes_cmac_one_raw_key(salt, ikm, ikm_len, okm); in bt_mesh_k1() 81 uint8_t salt[16]; in bt_mesh_k2() local 90 err = bt_mesh_s1_str("smk2", salt); in bt_mesh_k2() 95 err = bt_mesh_aes_cmac_one_raw_key(salt, n, 16, t); in bt_mesh_k2() 202 int bt_mesh_k5(const uint8_t *n, size_t n_len, const uint8_t salt[32], in bt_mesh_k5() [all …]
|
D | crypto.h | 43 int bt_mesh_s1(const char *m, size_t m_len, uint8_t salt[16]); 45 static inline int bt_mesh_s1_str(const char *m, uint8_t salt[16]) in bt_mesh_s1_str() 47 return bt_mesh_s1(m, strlen(m), salt); in bt_mesh_s1_str() 50 int bt_mesh_s2(const char *m, size_t m_len, uint8_t salt[32]); 52 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], const char *info, 62 int bt_mesh_k5(const uint8_t *n, size_t n_len, const uint8_t salt[32], uint8_t *p, uint8_t out[32]); 131 int bt_mesh_prov_conf_salt(uint8_t algorithm, const uint8_t conf_inputs[145], uint8_t *salt);
|
/Zephyr-latest/subsys/bluetooth/crypto/ |
D | bt_crypto.c | 59 static const uint8_t salt[16] = {0x6c, 0x88, 0x83, 0x91, 0xaa, 0xf5, 0xa5, 0x38, in bt_crypto_f5() local 79 err = bt_crypto_aes_cmac(salt, ws, 32, t); in bt_crypto_f5() 216 int bt_crypto_h7(const uint8_t salt[16], const uint8_t w[16], uint8_t res[16]) in bt_crypto_h7() 223 LOG_DBG("salt %s", bt_hex(salt, 16)); in bt_crypto_h7() 226 sys_memcpy_swap(salt_s, salt, 16); in bt_crypto_h7()
|
D | bt_crypto.h | 127 int bt_crypto_h7(const uint8_t salt[16], const uint8_t w[16], uint8_t res[16]);
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | csip_crypto.c | 95 const uint8_t salt[BT_CSIP_CRYPTO_SALT_SIZE], in k1() 111 LOG_DBG("BE: salt %s", bt_hex(salt, BT_CSIP_CRYPTO_SALT_SIZE)); in k1() 114 err = bt_crypto_aes_cmac(salt, n, n_size, t); in k1()
|
/Zephyr-latest/tests/bluetooth/bt_crypto/src/ |
D | test_bt_crypto.c | 150 uint8_t salt[16] = {0x31, 0x70, 0x6d, 0x74, 0x00, 0x00, 0x00, 0x00, in ZTEST() local 159 bt_crypto_h7(salt, w, res); in ZTEST()
|
/Zephyr-latest/subsys/secure_storage/ |
D | Kconfig.its_transform | 74 for which it is generating a key to the data hashed as a salt.
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | smp.c | 769 static const uint8_t salt[16] = { 0x31, 0x70, 0x6d, 0x74, in sc_derive_link_key() local 774 if (bt_crypto_h7(salt, conn->le.keys->ltk.val, ilk)) { in sc_derive_link_key() 974 static const uint8_t salt[16] = { 0x32, 0x70, 0x6d, 0x74, in smp_br_derive_ltk() local 979 if (bt_crypto_h7(salt, link_key->val, ilk)) { in smp_br_derive_ltk() 5330 uint8_t salt[16] = { 0x31, 0x70, 0x6d, 0x74, 0x00, 0x00, 0x00, 0x00, in smp_h7_test() local 5339 err = bt_crypto_h7(salt, w, res); in smp_h7_test()
|
/Zephyr-latest/doc/services/tfm/ |
D | overview.rst | 248 they can be regenerated from the HUK at startup, using an additional salt/seed
|