/Zephyr-latest/subsys/net/l2/ieee802154/ |
D | ieee802154_security.c | 58 sec_ctx->enc.mode_params.ccm_info.tag_len = authtag_len; in ieee802154_security_setup_session() 65 sec_ctx->enc.key.bit_stream = sec_ctx->key; in ieee802154_security_setup_session() 66 sec_ctx->enc.keylen = sec_ctx->key_len; in ieee802154_security_setup_session() 71 ret = cipher_begin_session(sec_ctx->enc.device, &sec_ctx->enc, CRYPTO_CIPHER_ALGO_AES, in ieee802154_security_setup_session() 83 cipher_free_session(sec_ctx->enc.device, &sec_ctx->enc); in ieee802154_security_setup_session() 97 cipher_free_session(sec_ctx->enc.device, &sec_ctx->enc); in ieee802154_security_teardown_session() 197 ret = cipher_ccm_op(&sec_ctx->enc, &apkt, nonce); in ieee802154_encrypt_auth() 213 (void)memset(&sec_ctx->enc, 0, sizeof(struct cipher_ctx)); in ieee802154_security_init() 221 sec_ctx->enc.flags = crypto_query_hwcaps(dev); in ieee802154_security_init() 224 sec_ctx->enc.mode_params.ccm_info.nonce_len = 13U; in ieee802154_security_init() [all …]
|
/Zephyr-latest/soc/intel/intel_adsp/common/ |
D | clk.c | 27 uint32_t enc = adsp_clock_freq_enc[freq_idx]; in select_cpu_clock_hw() local 33 clk_ctl |= (enc & ADSP_CLKCTL_OSC_SOURCE_MASK); in select_cpu_clock_hw() 40 ADSP_CLKCTL |= enc; in select_cpu_clock_hw() 50 enc; in select_cpu_clock_hw() 53 ADSP_CLKCTL &= ~ADSP_CLKCTL_OSC_REQUEST_MASK | enc; in select_cpu_clock_hw()
|
/Zephyr-latest/subsys/bluetooth/controller/ll_sw/ |
D | ull_llcp_enc.c | 153 ecb_encrypt(&ctx->data.enc.ltk[0], &ctx->data.enc.skd[0], NULL, &conn->lll.ccm_rx.key[0]); in enc_setup_lll() 237 if (ctx->data.enc.error == BT_HCI_ERR_SUCCESS) { in lp_enc_ntf() 250 llcp_pdu_encode_reject_ind(pdu, ctx->data.enc.error); in lp_enc_ntf() 264 memcpy(&ctx->data.enc.skd[0], pdu->llctrl.enc_req.skdm, sizeof(pdu->llctrl.enc_req.skdm)); in lp_enc_store_m() 362 memcpy(&ctx->data.enc.skd[8], pdu->llctrl.enc_rsp.skds, sizeof(pdu->llctrl.enc_rsp.skds)); in lp_enc_store_s() 427 ctx->data.enc.error = reject_error_code(pdu); in lp_enc_st_wait_rx_enc_rsp() 457 ctx->data.enc.error = reject_error_code(pdu); in lp_enc_st_wait_rx_start_enc_req() 495 ctx->data.enc.error = BT_HCI_ERR_SUCCESS; in lp_enc_st_wait_rx_start_enc_rsp() 814 memcpy(&ctx->data.enc.skds, pdu->llctrl.enc_rsp.skds, sizeof(pdu->llctrl.enc_rsp.skds)); in rp_enc_store_s() 866 if (ctx->data.enc.error == BT_HCI_ERR_PIN_OR_KEY_MISSING) { in rp_enc_send_reject_ind() [all …]
|
D | ull_iso_internal.h | 33 uint32_t sub_interval, uint8_t phy, uint8_t max_pdu, bool enc);
|
D | ull_sync_types.h | 57 uint8_t enc : 1; member
|
D | lll_sync_iso.h | 29 uint64_t enc:1; member
|
D | ull_llcp.c | 687 memcpy(ctx->data.enc.rand, rand, sizeof(ctx->data.enc.rand)); in ull_cp_encryption_start() 688 ctx->data.enc.ediv[0] = ediv[0]; in ull_cp_encryption_start() 689 ctx->data.enc.ediv[1] = ediv[1]; in ull_cp_encryption_start() 690 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_start() 713 memcpy(ctx->data.enc.rand, rand, sizeof(ctx->data.enc.rand)); in ull_cp_encryption_pause() 714 ctx->data.enc.ediv[0] = ediv[0]; in ull_cp_encryption_pause() 715 ctx->data.enc.ediv[1] = ediv[1]; in ull_cp_encryption_pause() 716 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_encryption_pause() 958 memcpy(ctx->data.enc.ltk, ltk, sizeof(ctx->data.enc.ltk)); in ull_cp_ltk_req_reply()
|
D | pdu.h | 361 #define PDU_BIS_MAX_US(octets, enc, phy) PDU_MAX_US((octets), \ argument 362 ((enc) ? \ 366 #define PDU_BIS_US(octets, enc, phy, s8) PDU_US((octets), \ argument 367 ((enc) ? (PDU_MIC_SIZE) : 0), \ 370 #define PDU_CIS_MAX_US(octets, enc, phy) PDU_MAX_US((octets), \ argument 371 ((enc) ? \
|
D | ull_sync_iso.c | 145 if (encryption != sync->enc) { in ll_big_sync_create() 208 lll->enc = 1U; in ll_big_sync_create() 210 lll->enc = 0U; in ll_big_sync_create() 507 lll->enc && (bi_size == PDU_BIG_INFO_ENCRYPTED_SIZE)) { in ull_sync_iso_setup() 528 lll->enc = 0U; in ull_sync_iso_setup() 613 lll->enc, lll->phy, PHY_FLAGS_S8); in ull_sync_iso_setup()
|
D | lll_adv.h | 34 uint64_t enc:1; member
|
D | ull_iso.c | 335 lll_iso->enc); in ll_setup_iso_path() 364 lll_iso->enc); in ll_setup_iso_path() 901 lll_iso->enc); in ll_iso_receive_test() 1544 uint32_t sub_interval, uint8_t phy, uint8_t max_pdu, bool enc) in ull_iso_big_sync_delay() argument 1550 BYTES2US(PDU_OVERHEAD_SIZE(phy) + max_pdu + (enc ? 4 : 0), phy); in ull_iso_big_sync_delay()
|
D | ull_adv_iso.c | 598 lll_adv_iso->enc = 1U; in big_create() 600 lll_adv_iso->enc = 0U; in big_create() 1185 pdu_spacing = PDU_BIS_US(lll_iso->max_pdu, lll_iso->enc, lll_iso->phy, in adv_iso_time_get() 1188 ctrl_spacing = PDU_BIS_US(sizeof(struct pdu_big_ctrl), lll_iso->enc, in adv_iso_time_get()
|
D | ull_llcp_pdu.c | 333 memcpy(p->rand, ctx->data.enc.rand, sizeof(p->rand)); in encode_enc_req() 334 p->ediv[0] = ctx->data.enc.ediv[0]; in encode_enc_req() 335 p->ediv[1] = ctx->data.enc.ediv[1]; in encode_enc_req()
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | iso.rst | 19 create-big :Create a BIG as a broadcaster [enc <broadcast code>] 22 [enc <broadcast code>]
|
/Zephyr-latest/samples/userspace/shared_mem/src/ |
D | main.h | 23 void enc(void *p1, void *p2, void *p3);
|
D | main.c | 136 enc, NULL, NULL, NULL, in main() 207 void enc(void *p1, void *p2, void *p3) in enc() function
|
/Zephyr-latest/include/zephyr/net/ |
D | ieee802154.h | 195 struct cipher_ctx enc; member
|
/Zephyr-latest/subsys/bluetooth/controller/ll_sw/nordic/lll/ |
D | lll_adv_iso.c | 355 pdu->len && lll->enc) { in prepare_cb_common() 369 if (lll->enc) { in prepare_cb_common() 393 PDU_BIS_US(pdu->len, ((pdu->len) ? lll->enc : 0U), in prepare_cb_common() 709 pdu->len && lll->enc) { in isr_tx_common() 729 if (lll->enc) { in isr_tx_common() 747 PDU_BIS_US(pdu->len, ((pdu->len) ? lll->enc : 0U), in isr_tx_common()
|
D | lll_sync_iso.c | 318 lll->enc) { in prepare_cb_common() 480 if (IS_ENABLED(CONFIG_BT_CTLR_BROADCAST_ISO_ENC) && crc_ok && lll->enc) { in isr_rx_estab() 686 lll->enc) { in isr_rx() 939 if (lll->enc) { in isr_rx() 1026 lll->enc) { in isr_rx()
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | subnet.h | 35 struct bt_mesh_key enc; /* EncKey */ member
|
D | solicitation.c | 160 err = bt_mesh_net_decrypt(&sub->keys[i].msg.enc, out, in sol_pdu_decrypt() 310 err = bt_mesh_net_encrypt(&sub->keys[SUBNET_KEY_TX_IDX(sub)].msg.enc, in sol_pdu_create()
|
D | subnet.c | 200 bt_mesh_key_destroy(&key->msg.enc); in subnet_keys_destroy() 304 return bt_mesh_k2(key, p, p_len, &cred->nid, &cred->enc, &cred->privacy); in msg_cred_create() 327 bt_hex(&keys->msg.enc, sizeof(struct bt_mesh_key))); in net_keys_create() 507 bt_mesh_key_destroy(&cred->enc); in bt_mesh_friend_cred_destroy()
|
/Zephyr-latest/share/sysbuild/images/bootloader/ |
D | Kconfig | 165 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-ec256-priv.pem" if BOOT_SIGNATURE_TYPE_ECDSA_P256 166 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-x25519-priv.pem" if BOOT_SIGNATURE_TYPE_ED25519 167 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-rsa2048-priv.pem" if BOOT_SIGNATURE_TYPE_RSA
|
/Zephyr-latest/tests/bsim/bluetooth/mesh/src/ |
D | test_beacon.c | 1669 } enc; member 1690 beac->ctx.enc.hash = net_buf_simple_pull_le64(buf); in proxy_adv_scan_all_cb() 1691 beac->ctx.enc.random = net_buf_simple_pull_le64(buf); in proxy_adv_scan_all_cb() 1839 if (beac->ctx.enc.hash == in proxy_adv_subnet_find() 1840 proxy_adv_hash_calc(nets[i], beac->ctx.enc.random, in proxy_adv_subnet_find() 1847 if (beac->ctx.enc.hash == in proxy_adv_subnet_find() 1848 proxy_adv_hash_calc(nets[i], beac->ctx.enc.random, in proxy_adv_subnet_find() 1855 if (beac->ctx.enc.hash == in proxy_adv_subnet_find() 1856 proxy_adv_hash_calc(nets[i], beac->ctx.enc.random, in proxy_adv_subnet_find()
|
D | test_proxy_sol.c | 167 ASSERT_OK(bt_mesh_net_encrypt(&sub->keys[SUBNET_KEY_TX_IDX(sub)].msg.enc, pdu, 0, in sol_fixed_pdu_create()
|