Home
last modified time | relevance | path

Searched refs:encrypt (Results 1 – 25 of 35) sorted by relevance

12

/Zephyr-latest/samples/drivers/crypto/src/
Dmain.c138 struct cipher_pkt encrypt = { in ecb_mode() local
145 .in_buf = encrypt.out_buf, in ecb_mode()
157 if (cipher_block_op(&ini, &encrypt)) { in ecb_mode()
162 LOG_INF("Output length (encryption): %d", encrypt.out_len); in ecb_mode()
164 if (memcmp(encrypt.out_buf, ecb_ciphertext, sizeof(ecb_ciphertext))) { in ecb_mode()
167 print_buffer_comparison(ecb_ciphertext, encrypt.out_buf, in ecb_mode()
220 struct cipher_pkt encrypt = { in cbc_mode() local
227 .in_buf = encrypt.out_buf, in cbc_mode()
244 if (cipher_cbc_op(&ini, &encrypt, iv)) { in cbc_mode()
249 LOG_INF("Output length (encryption): %d", encrypt.out_len); in cbc_mode()
[all …]
/Zephyr-latest/scripts/west_commands/runners/
Desp32.py22 encrypt=False, no_stub=False): argument
39 self.encrypt = encrypt
105 encrypt=args.esp_encrypt, no_stub=args.esp_no_stub)
130 if self.encrypt:
/Zephyr-latest/subsys/mgmt/osdp/src/
Dosdp_common.c59 struct cipher_pkt encrypt = { in osdp_encrypt() local
80 if (cipher_cbc_op(&ctx, &encrypt, iv)) { in osdp_encrypt()
91 if (cipher_block_op(&ctx, &encrypt)) { in osdp_encrypt()
/Zephyr-latest/modules/
DKconfig.tinycrypt62 bool "AES-128 decrypt/encrypt"
64 This option enables support for AES-128 decrypt and encrypt.
DKconfig.mcuboot70 The file contains the public key that is used to encrypt the
77 sign and encrypt the final binaries using a 'west sign -t imgtool'
90 If left empty, you must encrypt the Zephyr binaries manually.
/Zephyr-latest/cmake/
Dmcuboot.cmake155 ${imgtool_sign} ${imgtool_args} --encrypt "${keyfile_enc}" ${output}.bin
175 ${imgtool_sign} ${imgtool_args_alt_slot} --encrypt "${keyfile_enc}"
191 # encrypt the data, this means that when the image is moved out of the primary into the
194 ${imgtool_sign} ${imgtool_args} --encrypt "${keyfile_enc}" --clear
217 ${imgtool_sign} ${imgtool_args} --encrypt "${keyfile_enc}" ${output}.hex
237 ${imgtool_sign} ${imgtool_args_alt_slot} --encrypt "${keyfile_enc}"
/Zephyr-latest/drivers/flash/
Dflash_esp32.c172 bool encrypt = esp_flash_encryption_enabled(); in flash_esp32_write() local
174 ret = esp_rom_flash_write(address, (void *)buffer, length, encrypt); in flash_esp32_write()
/Zephyr-latest/samples/userspace/shared_mem/
DREADME.rst52 the encrypt thread. After writing the buffer, the flag is set. The
53 encrypt thread copies the memory from the common buffer into the
/Zephyr-latest/boards/native/nrf_bsim/
DKconfig.defconfig59 # default to encrypt packets on its own.
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dop_agg_srv.rst20 to encrypt the sequence of access layer messages sent to the Opcodes Aggregator Server.
/Zephyr-latest/samples/bluetooth/bap_broadcast_source/
DKconfig50 Setting a non-empty string for this option will encrypt the broadcast using this
/Zephyr-latest/modules/trusted-firmware-m/
DKconfig.tfm.crypto_modules62 Unset this option if the encrypt functionality provided by 'crypto_asymmetric.c'
/Zephyr-latest/include/zephyr/bluetooth/audio/
Dcap.h651 bool encrypt; member
/Zephyr-latest/subsys/bluetooth/host/classic/
Dbr.c151 if (!conn->encrypt) { in bt_br_update_sec_level()
158 if (conn->encrypt == BT_HCI_ENCRYPTION_ON_BR_AES_CCM) { in bt_br_update_sec_level()
236 conn->encrypt = evt->encr_enabled; in bt_hci_conn_complete()
Dl2cap_br.c824 chan->conn->encrypt && chan->conn->br.link_key && in l2cap_br_conn_security()
1060 BT_FEAT_HOST_SSP(conn->br.features) && !conn->encrypt) { in l2cap_br_conn_req()
2044 LOG_DBG("chan %p status 0x%02x encr 0x%02x", chan, status, chan->conn->encrypt); in l2cap_br_conn_pend()
2062 if (!chan->conn->encrypt) { in l2cap_br_conn_pend()
Dssp.c853 encr->encrypt = 0x01; in link_encr()
Drfcomm.c1597 LOG_DBG("session %p status 0x%02x encr 0x%02x", session, hci_status, conn->encrypt); in rfcomm_encrypt_change()
1606 if (hci_status || !conn->encrypt || in rfcomm_encrypt_change()
/Zephyr-latest/subsys/bluetooth/host/
Dconn_internal.h227 uint8_t encrypt; member
Dhci_core.c2157 evt->status, bt_hci_err_to_str(evt->status), handle, evt->encrypt); in hci_encrypt_change()
2172 if (conn->encrypt == evt->encrypt) { in hci_encrypt_change()
2173 LOG_WRN("No change to encryption state (encrypt 0x%02x)", evt->encrypt); in hci_encrypt_change()
2178 conn->encrypt = evt->encrypt; in hci_encrypt_change()
2190 if (conn->encrypt) { in hci_encrypt_change()
Dsmp.c962 conn->encrypt != BT_HCI_ENCRYPTION_ON_BR_AES_CCM) { in smp_br_derive_ltk()
1168 if (conn->encrypt == BT_HCI_ENCRYPTION_ON_BR_AES_CCM) { in smp_br_pairing_allowed()
1172 if (IS_ENABLED(CONFIG_BT_SMP_FORCE_BREDR) && conn->encrypt == BT_HCI_ENCRYPTION_ON_BR_E0) { in smp_br_pairing_allowed()
4787 conn->handle, conn->encrypt, hci_status, bt_hci_err_to_str(hci_status)); in bt_smp_encrypt_change()
4810 if (!conn->encrypt) { in bt_smp_encrypt_change()
/Zephyr-latest/subsys/secure_storage/
DKconfig.its_transform37 The AEAD scheme used to encrypt and authenticate the data.
/Zephyr-latest/samples/boards/espressif/flash_encryption/
DREADME.rst51 When enabling the Flash Encryption, user can encrypt the content either using a device
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst201 To encrypt the advertising data, key materials need to be provided, that can be done with :code:`bt
207 Specification), when the later will read the given data, encrypt them and then add the generated
/Zephyr-latest/subsys/bluetooth/audio/
Dcsip_set_member.c462 if (err != 0 || conn->encrypt == 0) { in csip_security_changed()
/Zephyr-latest/doc/services/tfm/
Doverview.rst240 **Protected Storage** service, for example, to encrypt information stored in

12