Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 13 of 13) sorted by relevance

/Zephyr-latest/samples/drivers/crypto/src/
Dmain.c142 struct cipher_pkt decrypt = { in ecb_mode() local
179 if (cipher_block_op(&ini, &decrypt)) { in ecb_mode()
184 LOG_INF("Output length (decryption): %d", decrypt.out_len); in ecb_mode()
186 if (memcmp(decrypt.out_buf, ecb_plaintext, sizeof(ecb_plaintext))) { in ecb_mode()
189 print_buffer_comparison(ecb_plaintext, decrypt.out_buf, in ecb_mode()
224 struct cipher_pkt decrypt = { in cbc_mode() local
267 if (cipher_cbc_op(&ini, &decrypt, encrypted)) { in cbc_mode()
272 LOG_INF("Output length (decryption): %d", decrypt.out_len); in cbc_mode()
274 if (memcmp(decrypt.out_buf, plaintext, sizeof(plaintext))) { in cbc_mode()
277 print_buffer_comparison(plaintext, decrypt.out_buf, in cbc_mode()
[all …]
/Zephyr-latest/subsys/mgmt/osdp/src/
Dosdp_common.c106 struct cipher_pkt decrypt = { in osdp_decrypt() local
127 if (cipher_cbc_op(&ctx, &decrypt, iv)) { in osdp_decrypt()
138 if (cipher_block_op(&ctx, &decrypt)) { in osdp_decrypt()
/Zephyr-latest/modules/
DKconfig.tinycrypt62 bool "AES-128 decrypt/encrypt"
64 This option enables support for AES-128 decrypt and encrypt.
DKconfig.mcuboot73 used to decrypt the ephemeral key that is embedded in the
/Zephyr-latest/subsys/bluetooth/audio/
DKconfig.csip27 WARNING: This option enables anyone to track and decrypt the SIRK
75 to locate members and decrypt the SIRK, and thus won't work
/Zephyr-latest/samples/boards/espressif/flash_encryption/
DREADME.rst4 Encrypt/decrypt data stored in flash memory using ESP32 flash encryption feature.
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst213 On the Central side, it's possible to decrypt the received encrypted advertising data by setting the
215 :code:`bt encrypted-ad decrypt-scan on`.
264 uart:~$ bt encrypted-ad decrypt-scan on
/Zephyr-latest/subsys/bluetooth/host/
DKconfig670 WARNING: This option enables anyone to decrypt on-air traffic.
706 WARNING: This option potentially enables anyone to decrypt on-air
1070 DH private key and LTK keys, which can be used by sniffers to decrypt
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c4895 SHELL_CMD_ARG(decrypt-scan, NULL, HELP_ONOFF, cmd_encrypted_ad_decrypt_scan, 2, 0),
/Zephyr-latest/doc/security/
Dvulnerabilities.rst74 practical brute-force attacks (aka "KNOB") that can decrypt traffic
/Zephyr-latest/doc/releases/
Drelease-notes-1.14.rst264 that can decrypt traffic and inject arbitrary ciphertext without the
2287 * :github:`3244` - Ataes132a fails to encrypt/decrypt with mode ECB and CCM mode
Drelease-notes-2.0.rst36 that can decrypt traffic and inject arbitrary ciphertext without the
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dshell.rst706 Bind an application key to a model. Models can only encrypt and decrypt messages sent with