/packages/modules/Bluetooth/system/stack/gatt/ |
D | gatt_db.cc | 82 uint8_t key_size) { in gatts_check_attr_readability() argument 113 (key_size < min_key_size)) { in gatts_check_attr_readability() 125 if (key_size < min_key_size) { in gatts_check_attr_readability() 173 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { in read_attr_value() argument 180 sec_flag, key_size); in read_attr_value() 279 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument 296 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 477 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument 485 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 516 uint8_t key_size) { in gatts_read_attr_perm_check() argument [all …]
|
D | gatt_sr.cc | 438 uint8_t key_size; in gatt_process_read_multi_req() local 449 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req() 475 key_size); in gatt_process_read_multi_req() 515 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req() 937 uint8_t key_size; in gatts_process_read_by_type_req() local 938 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_read_by_type_req() 942 sec_flag, key_size, 0, &err_hdl); in gatts_process_read_by_type_req() 983 uint8_t key_size, *p = p_data; in gatts_process_write_req() local 1020 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req() 1024 sec_flag, key_size); in gatts_process_write_req() [all …]
|
D | gatt_int.h | 675 uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle); 679 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id); 684 uint8_t key_size); 688 uint8_t key_size);
|
/packages/modules/Bluetooth/system/gd/security/ |
D | pairing_handler_le.cc | 76 uint8_t key_size = in PairingMain() local 78 if (key_size < 7 || key_size > 16) { in PairingMain() 79 log::warn("Resulting key size is bad {}", key_size); in PairingMain() 84 if (key_size != 16) { in PairingMain() 131 std::fill(ltk.begin() + key_size, ltk.end(), 0x00); in PairingMain() 161 std::fill(stk.begin() + key_size, stk.end(), 0x00); in PairingMain() 217 .key_size = key_size, in PairingMain() 294 uint8_t key_size = pairing_request->GetMaximumEncryptionKeySize(); in ExchangePairingFeature() local 295 if (key_size < 7 || key_size > 16) { in ExchangePairingFeature() 296 log::warn("Resulting key size is bad {}", key_size); in ExchangePairingFeature()
|
D | initial_informations.h | 56 uint8_t key_size; member
|
/packages/modules/Bluetooth/floss/pandora/floss/ |
D | bluetooth_gatt_service.py | 61 key_size=None, argument 69 self.key_size = key_size 85 'key_size': self.key_size, 147 key_size=characteristic['key_size'],
|
D | gatt_server.py | 836 characteristic.key_size = 0 852 characteristic.key_size = 0 865 characteristic.key_size = 0 877 characteristic.key_size = 0 889 characteristic.key_size = 0 903 characteristic.key_size = 0 921 characteristic.key_size = 10 933 characteristic.key_size = 0 946 characteristic.key_size = 0 959 characteristic.key_size = 0 [all …]
|
/packages/modules/Connectivity/staticlibs/native/bpf_syscall_wrappers/include/ |
D | BpfSyscallWrappers.h | 55 inline int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, in createMap() argument 59 .key_size = key_size, in createMap() 71 inline int createOuterMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, in createOuterMap() argument 75 .key_size = key_size, in createOuterMap() 288 DEFINE_BPF_GET_FD(map, KeySize, key_size) // int bpfGetFdKeySize(const BPF_FD_TYPE map_fd)
|
/packages/modules/adb/pairing_auth/ |
D | pairing_auth.cpp | 123 size_t key_size = 0; in PairingAuthCtx() local 125 int status = SPAKE2_generate_msg(spake2_ctx_.get(), key, &key_size, SPAKE2_MAX_MSG_SIZE, in PairingAuthCtx() 127 if (status != 1 || key_size == 0) { in PairingAuthCtx() 131 our_msg_.assign(key, key + key_size); in PairingAuthCtx()
|
/packages/modules/Bluetooth/system/stack/include/ |
D | btm_ble_sec_api_types.h | 34 uint8_t key_size; member 48 uint8_t key_size; member
|
/packages/modules/Bluetooth/system/stack/btm/ |
D | btm_ble_sec.cc | 896 p_rec->sec_rec.ble_keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key() 950 p_rec->sec_rec.ble_keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key() 957 p_rec->sec_rec.ble_keys.key_size, in btm_sec_save_le_key() 1322 p_dev_rec->sec_rec.enc_key_size = p_dev_rec->sec_rec.ble_keys.key_size; in btm_ble_link_encrypted() 1377 p_cb->key_size = p_rec->sec_rec.ble_keys.key_size; in btm_ble_ltk_request_reply() 1379 log::error("key size={}", p_rec->sec_rec.ble_keys.key_size); in btm_ble_ltk_request_reply() 1406 p_cb->key_size = p_rec->sec_rec.ble_keys.key_size; in btm_ble_ltk_request_reply()
|
D | btm_sec_cb.h | 44 uint8_t key_size{0};
|
D | btm_sec.cc | 327 uint8_t key_size) { in btm_sec_is_session_key_size_downgrade() argument 341 return property_val > key_size; in btm_sec_is_session_key_size_downgrade() 352 uint8_t key_size) { in btm_sec_update_session_key_size() argument 356 uint8_t property_val = key_size; in btm_sec_update_session_key_size() 3477 uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_encryption_change() argument 3494 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_encryption_change() 3497 handle, key_size); in read_encryption_key_size_complete_after_encryption_change() 3507 if (btm_sec_is_session_key_size_downgrade(handle, key_size)) { in read_encryption_key_size_complete_after_encryption_change() 3511 handle, key_size); in read_encryption_key_size_complete_after_encryption_change() 3519 btm_sec_update_session_key_size(handle, key_size); in read_encryption_key_size_complete_after_encryption_change() [all …]
|
/packages/modules/Virtualization/libs/devicemapper/src/ |
D | crypt.rs | 66 fn validata_key_size(&self, key_size: usize) -> bool { in validata_key_size() 67 key_size == self.get_required_key_size() in validata_key_size()
|
/packages/modules/adb/tls/tests/ |
D | tls_connection_test.cpp | 416 const size_t key_size = 64; in TEST_F() local 417 auto client_key_material = client_->ExportKeyingMaterial(key_size); in TEST_F() 419 auto server_key_material = server_->ExportKeyingMaterial(key_size); in TEST_F() 421 ASSERT_EQ(client_key_material.size(), key_size); in TEST_F()
|
/packages/modules/Bluetooth/system/stack/test/gatt/ |
D | gatt_sr_test.cc | 87 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument 100 uint8_t key_size) { in gatts_read_attr_perm_check() argument 106 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument 114 uint8_t key_size) { in gatts_write_attr_perm_check() argument
|
/packages/modules/Bluetooth/tools/rootcanal/rust/test/ENC/ |
D | BV-26-C.in | 13 key_size: 0x10,
|
D | BV-01-C.in | 13 key_size: 0x10,
|
D | BV-05-C.in | 21 key_size: 0x10,
|
D | BV-34-C.in | 21 key_size: 0x10,
|
/packages/modules/Bluetooth/system/gd/security/record/ |
D | security_record_storage.cc | 76 penc_keys[27] = record->key_size; in SetLeData() 174 record->key_size = peer_encryption_keys->data()[27]; in LoadSecurityRecords()
|
D | security_record.h | 125 uint8_t key_size; variable
|
/packages/modules/Connectivity/staticlibs/native/bpf_headers/include/bpf/ |
D | bpf_map_def.h | 162 unsigned int key_size; member
|
/packages/modules/Bluetooth/tools/rootcanal/rust/src/lmp/procedure/ |
D | encryption.rs | 46 lmp::EncryptionKeySizeReqBuilder { transaction_id: 0, key_size: 16 }.build(), in initiate()
|
/packages/modules/Connectivity/netbpfload/ |
D | loader.cpp | 603 (fd_key_size == (int)mapDef.key_size) && in mapMatchesExpectations() 612 mapName.c_str(), type, fd_type, mapDef.key_size, fd_key_size, mapDef.value_size, in mapMatchesExpectations() 769 .key_size = md[i].key_size, in createMaps()
|