Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 41) sorted by relevance

12

/packages/modules/Bluetooth/system/stack/gatt/
Dgatt_db.cc82 uint8_t key_size) { in gatts_check_attr_readability() argument
113 (key_size < min_key_size)) { in gatts_check_attr_readability()
125 if (key_size < min_key_size) { in gatts_check_attr_readability()
173 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { in read_attr_value() argument
180 sec_flag, key_size); in read_attr_value()
279 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument
296 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
477 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument
485 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
516 uint8_t key_size) { in gatts_read_attr_perm_check() argument
[all …]
Dgatt_sr.cc438 uint8_t key_size; in gatt_process_read_multi_req() local
449 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req()
475 key_size); in gatt_process_read_multi_req()
515 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req()
937 uint8_t key_size; in gatts_process_read_by_type_req() local
938 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_read_by_type_req()
942 sec_flag, key_size, 0, &err_hdl); in gatts_process_read_by_type_req()
983 uint8_t key_size, *p = p_data; in gatts_process_write_req() local
1020 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req()
1024 sec_flag, key_size); in gatts_process_write_req()
[all …]
Dgatt_int.h675 uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle);
679 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id);
684 uint8_t key_size);
688 uint8_t key_size);
/packages/modules/Bluetooth/system/gd/security/
Dpairing_handler_le.cc76 uint8_t key_size = in PairingMain() local
78 if (key_size < 7 || key_size > 16) { in PairingMain()
79 log::warn("Resulting key size is bad {}", key_size); in PairingMain()
84 if (key_size != 16) { in PairingMain()
131 std::fill(ltk.begin() + key_size, ltk.end(), 0x00); in PairingMain()
161 std::fill(stk.begin() + key_size, stk.end(), 0x00); in PairingMain()
217 .key_size = key_size, in PairingMain()
294 uint8_t key_size = pairing_request->GetMaximumEncryptionKeySize(); in ExchangePairingFeature() local
295 if (key_size < 7 || key_size > 16) { in ExchangePairingFeature()
296 log::warn("Resulting key size is bad {}", key_size); in ExchangePairingFeature()
Dinitial_informations.h56 uint8_t key_size; member
/packages/modules/Bluetooth/floss/pandora/floss/
Dbluetooth_gatt_service.py61 key_size=None, argument
69 self.key_size = key_size
85 'key_size': self.key_size,
147 key_size=characteristic['key_size'],
Dgatt_server.py836 characteristic.key_size = 0
852 characteristic.key_size = 0
865 characteristic.key_size = 0
877 characteristic.key_size = 0
889 characteristic.key_size = 0
903 characteristic.key_size = 0
921 characteristic.key_size = 10
933 characteristic.key_size = 0
946 characteristic.key_size = 0
959 characteristic.key_size = 0
[all …]
/packages/modules/Connectivity/staticlibs/native/bpf_syscall_wrappers/include/
DBpfSyscallWrappers.h55 inline int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, in createMap() argument
59 .key_size = key_size, in createMap()
71 inline int createOuterMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, in createOuterMap() argument
75 .key_size = key_size, in createOuterMap()
288 DEFINE_BPF_GET_FD(map, KeySize, key_size) // int bpfGetFdKeySize(const BPF_FD_TYPE map_fd)
/packages/modules/adb/pairing_auth/
Dpairing_auth.cpp123 size_t key_size = 0; in PairingAuthCtx() local
125 int status = SPAKE2_generate_msg(spake2_ctx_.get(), key, &key_size, SPAKE2_MAX_MSG_SIZE, in PairingAuthCtx()
127 if (status != 1 || key_size == 0) { in PairingAuthCtx()
131 our_msg_.assign(key, key + key_size); in PairingAuthCtx()
/packages/modules/Bluetooth/system/stack/include/
Dbtm_ble_sec_api_types.h34 uint8_t key_size; member
48 uint8_t key_size; member
/packages/modules/Bluetooth/system/stack/btm/
Dbtm_ble_sec.cc896 p_rec->sec_rec.ble_keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key()
950 p_rec->sec_rec.ble_keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key()
957 p_rec->sec_rec.ble_keys.key_size, in btm_sec_save_le_key()
1322 p_dev_rec->sec_rec.enc_key_size = p_dev_rec->sec_rec.ble_keys.key_size; in btm_ble_link_encrypted()
1377 p_cb->key_size = p_rec->sec_rec.ble_keys.key_size; in btm_ble_ltk_request_reply()
1379 log::error("key size={}", p_rec->sec_rec.ble_keys.key_size); in btm_ble_ltk_request_reply()
1406 p_cb->key_size = p_rec->sec_rec.ble_keys.key_size; in btm_ble_ltk_request_reply()
Dbtm_sec_cb.h44 uint8_t key_size{0};
Dbtm_sec.cc327 uint8_t key_size) { in btm_sec_is_session_key_size_downgrade() argument
341 return property_val > key_size; in btm_sec_is_session_key_size_downgrade()
352 uint8_t key_size) { in btm_sec_update_session_key_size() argument
356 uint8_t property_val = key_size; in btm_sec_update_session_key_size()
3477 uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_encryption_change() argument
3494 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_encryption_change()
3497 handle, key_size); in read_encryption_key_size_complete_after_encryption_change()
3507 if (btm_sec_is_session_key_size_downgrade(handle, key_size)) { in read_encryption_key_size_complete_after_encryption_change()
3511 handle, key_size); in read_encryption_key_size_complete_after_encryption_change()
3519 btm_sec_update_session_key_size(handle, key_size); in read_encryption_key_size_complete_after_encryption_change()
[all …]
/packages/modules/Virtualization/libs/devicemapper/src/
Dcrypt.rs66 fn validata_key_size(&self, key_size: usize) -> bool { in validata_key_size()
67 key_size == self.get_required_key_size() in validata_key_size()
/packages/modules/adb/tls/tests/
Dtls_connection_test.cpp416 const size_t key_size = 64; in TEST_F() local
417 auto client_key_material = client_->ExportKeyingMaterial(key_size); in TEST_F()
419 auto server_key_material = server_->ExportKeyingMaterial(key_size); in TEST_F()
421 ASSERT_EQ(client_key_material.size(), key_size); in TEST_F()
/packages/modules/Bluetooth/system/stack/test/gatt/
Dgatt_sr_test.cc87 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument
100 uint8_t key_size) { in gatts_read_attr_perm_check() argument
106 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument
114 uint8_t key_size) { in gatts_write_attr_perm_check() argument
/packages/modules/Bluetooth/tools/rootcanal/rust/test/ENC/
DBV-26-C.in13 key_size: 0x10,
DBV-01-C.in13 key_size: 0x10,
DBV-05-C.in21 key_size: 0x10,
DBV-34-C.in21 key_size: 0x10,
/packages/modules/Bluetooth/system/gd/security/record/
Dsecurity_record_storage.cc76 penc_keys[27] = record->key_size; in SetLeData()
174 record->key_size = peer_encryption_keys->data()[27]; in LoadSecurityRecords()
Dsecurity_record.h125 uint8_t key_size; variable
/packages/modules/Connectivity/staticlibs/native/bpf_headers/include/bpf/
Dbpf_map_def.h162 unsigned int key_size; member
/packages/modules/Bluetooth/tools/rootcanal/rust/src/lmp/procedure/
Dencryption.rs46 lmp::EncryptionKeySizeReqBuilder { transaction_id: 0, key_size: 16 }.build(), in initiate()
/packages/modules/Connectivity/netbpfload/
Dloader.cpp603 (fd_key_size == (int)mapDef.key_size) && in mapMatchesExpectations()
612 mapName.c_str(), type, fd_type, mapDef.key_size, fd_key_size, mapDef.value_size, in mapMatchesExpectations()
769 .key_size = md[i].key_size, in createMaps()

12