| /Zephyr-latest/subsys/bluetooth/lib/ | 
| D | ead.c | 78 static int ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],  in ead_encrypt()93 	err = bt_ccm_encrypt(session_key, nonce, payload, payload_size, bt_ead_aad, BT_EAD_AAD_SIZE,  in ead_encrypt()
 105 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],  in bt_ead_encrypt()
 108 	CHECKIF(session_key == NULL) {  in bt_ead_encrypt()
 133 	return ead_encrypt(session_key, iv, NULL, payload, payload_size, encrypted_payload);  in bt_ead_encrypt()
 138 int bt_test_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE],  in bt_test_ead_encrypt()
 143 	CHECKIF(session_key == NULL) {  in bt_test_ead_encrypt()
 173 	return ead_encrypt(session_key, iv, randomizer, payload, payload_size, encrypted_payload);  in bt_test_ead_encrypt()
 178 static int ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],  in ead_decrypt()
 197 	err = bt_ccm_decrypt(session_key, nonce, encrypted_ad_data, payload_size, bt_ead_aad,  in ead_decrypt()
 [all …]
 
 | 
| /Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/css_sample_data/src/ | 
| D | common.h | 44 int bt_test_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE],52 	const uint8_t session_key[BT_EAD_KEY_SIZE];  member
 79 	.session_key = {0x57, 0xA9, 0xDA, 0x12, 0xD1, 0x2E, 0x6E, 0x13, 0x1E, 0x20, 0x61, 0x2A,
 106 	.session_key = {0x57, 0xA9, 0xDA, 0x12, 0xD1, 0x2E, 0x6E, 0x13, 0x1E, 0x20, 0x61, 0x2A,
 
 | 
| D | central.c | 40 		err = bt_ead_decrypt(sample_data->session_key, sample_data->iv, data->data,  in data_parse_cb()
 | 
| D | peripheral.c | 68 	err = bt_test_ead_encrypt(sample_data->session_key, sample_data->iv,  in set_ad_data()
 | 
| /Zephyr-latest/include/zephyr/bluetooth/ | 
| D | ead.h | 77 int bt_ead_encrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],103 int bt_ead_decrypt(const uint8_t session_key[BT_EAD_KEY_SIZE], const uint8_t iv[BT_EAD_IV_SIZE],
 
 | 
| /Zephyr-latest/drivers/crypto/ | 
| D | crypto_tc_shim.c | 37 				&data->session_key) == TC_CRYPTO_FAIL) {  in do_cbc_encrypt()65 			op->in_buf, &data->session_key) == TC_CRYPTO_FAIL) {  in do_cbc_decrypt()
 90 			&data->session_key) == TC_CRYPTO_FAIL) {  in do_ctr_op()
 109 	if (tc_ccm_config(&ccm, &data->session_key, nonce,  in do_ccm_encrypt_mac()
 149 	if (tc_ccm_config(&ccm, &data->session_key, nonce,  in do_ccm_decrypt_auth()
 276 	if (tc_aes128_set_encrypt_key(&data->session_key, ctx->key.bit_stream)  in tc_session_setup()
 
 | 
| D | crypto_tc_shim_priv.h | 24 	struct tc_aes_key_sched_struct session_key;  member
 | 
| /Zephyr-latest/samples/bluetooth/encrypted_advertising/include/ | 
| D | common.h | 16 	uint8_t session_key[BT_EAD_KEY_SIZE];  member
 | 
| /Zephyr-latest/samples/bluetooth/encrypted_advertising/peripheral/src/ | 
| D | data.h | 48 	.session_key = {0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB,
 | 
| D | peripheral_ead.c | 64 	err = bt_ead_encrypt(mk.session_key, mk.iv, ad_1, size_ad_1, ead_1);  in update_ad_data()81 	err = bt_ead_encrypt(mk.session_key, mk.iv, ad_3_4, size_ad_3_4, ead_2);  in update_ad_data()
 
 | 
| /Zephyr-latest/tests/bsim/bluetooth/host/adv/encrypted/ead_sample/src/ | 
| D | main.c | 85 	LOG_HEXDUMP_DBG(received_keymat.session_key, BT_EAD_KEY_SIZE, "Receveid key");  in central_main()
 | 
| /Zephyr-latest/subsys/bluetooth/mesh/ | 
| D | provisionee.c | 512 	struct bt_mesh_key session_key;  in prov_data()  local525 				  bt_mesh_prov_link.prov_salt, &session_key);  in prov_data()
 542 	err = bt_mesh_prov_decrypt(&session_key, nonce, data, pdu);  in prov_data()
 609 	bt_mesh_key_destroy(&session_key);  in prov_data()
 
 | 
| D | provisioner.c | 497 	struct bt_mesh_key session_key;  in send_prov_data()  local502 				  bt_mesh_prov_link.prov_salt, &session_key);  in send_prov_data()
 553 	err = bt_mesh_prov_encrypt(&session_key, nonce, &pdu.data[1],  in send_prov_data()
 569 	bt_mesh_key_destroy(&session_key);  in send_prov_data()
 
 | 
| D | crypto.h | 92 			struct bt_mesh_key *session_key);
 | 
| D | crypto.c | 261 			struct bt_mesh_key *session_key)  in bt_mesh_session_key()  argument270 		err = bt_mesh_key_import(BT_MESH_KEY_TYPE_CCM, raw_key, session_key);  in bt_mesh_session_key()
 
 | 
| /Zephyr-latest/samples/bluetooth/encrypted_advertising/central/src/ | 
| D | central_ead.c | 68 		err = bt_ead_decrypt(keymat.session_key, keymat.iv, data->data, data->data_len,  in data_parse_cb()511 	LOG_HEXDUMP_DBG(keymat.session_key, BT_EAD_KEY_SIZE, "Session Key");  in run_central_sample()
 
 | 
| /Zephyr-latest/subsys/bluetooth/host/shell/ | 
| D | bt.c | 4615 	const char *session_key = argv[1];  in cmd_encrypted_ad_set_keys()  local4618 	len = hex2bin(session_key, strlen(session_key), bt_shell_ead_session_key, BT_EAD_KEY_SIZE);  in cmd_encrypted_ad_set_keys()
 
 |