Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 13 of 13) sorted by relevance

/Zephyr-latest/samples/drivers/crypto/src/
Dmain.c144 struct cipher_pkt decrypt = { in ecb_mode() local
181 if (cipher_block_op(&ini, &decrypt)) { in ecb_mode()
186 LOG_INF("Output length (decryption): %d", decrypt.out_len); in ecb_mode()
188 if (memcmp(decrypt.out_buf, ecb_plaintext, sizeof(ecb_plaintext))) { in ecb_mode()
191 print_buffer_comparison(ecb_plaintext, decrypt.out_buf, in ecb_mode()
226 struct cipher_pkt decrypt = { in cbc_mode() local
269 if (cipher_cbc_op(&ini, &decrypt, encrypted)) { in cbc_mode()
274 LOG_INF("Output length (decryption): %d", decrypt.out_len); in cbc_mode()
276 if (memcmp(decrypt.out_buf, plaintext, sizeof(plaintext))) { in cbc_mode()
279 print_buffer_comparison(plaintext, decrypt.out_buf, in cbc_mode()
[all …]
/Zephyr-latest/subsys/mgmt/osdp/src/
Dosdp_common.c106 struct cipher_pkt decrypt = { in osdp_decrypt() local
127 if (cipher_cbc_op(&ctx, &decrypt, iv)) { in osdp_decrypt()
138 if (cipher_block_op(&ctx, &decrypt)) { in osdp_decrypt()
/Zephyr-latest/modules/
DKconfig.tinycrypt62 bool "AES-128 decrypt/encrypt"
64 This option enables support for AES-128 decrypt and encrypt.
DKconfig.mcuboot73 used to decrypt the ephemeral key that is embedded in the
/Zephyr-latest/subsys/bluetooth/audio/
DKconfig.csip29 WARNING: This option enables anyone to track and decrypt the SIRK
78 to locate members and decrypt the SIRK, and thus won't work
/Zephyr-latest/samples/boards/espressif/flash_encryption/
DREADME.rst4 Encrypt/decrypt data stored in flash memory using ESP32 flash encryption feature.
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst213 On the Central side, it's possible to decrypt the received encrypted advertising data by setting the
215 :code:`bt encrypted-ad decrypt-scan on`.
264 uart:~$ bt encrypted-ad decrypt-scan on
/Zephyr-latest/subsys/bluetooth/host/
DKconfig674 WARNING: This option enables anyone to decrypt on-air traffic.
710 WARNING: This option potentially enables anyone to decrypt on-air
1062 DH private key and LTK keys, which can be used by sniffers to decrypt
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c4927 SHELL_CMD_ARG(decrypt-scan, NULL, HELP_ONOFF, cmd_encrypted_ad_decrypt_scan, 2, 0),
/Zephyr-latest/doc/security/
Dvulnerabilities.rst74 practical brute-force attacks (aka "KNOB") that can decrypt traffic
/Zephyr-latest/doc/releases/
Drelease-notes-1.14.rst264 that can decrypt traffic and inject arbitrary ciphertext without the
2287 * :github:`3244` - Ataes132a fails to encrypt/decrypt with mode ECB and CCM mode
Drelease-notes-2.0.rst36 that can decrypt traffic and inject arbitrary ciphertext without the
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dshell.rst706 Bind an application key to a model. Models can only encrypt and decrypt messages sent with