/system/bt/stack/smp/ |
D | smp_cmac.c | 61 p[BT_OCTET16_LEN - i*4 -1], p[BT_OCTET16_LEN - i*4 -2], in print128() 62 p[BT_OCTET16_LEN - i*4 -3], p[BT_OCTET16_LEN - i*4 -4]); in print128() 83 for ( i = length ; i < BT_OCTET16_LEN; i++ ) in padding() 84 p[BT_OCTET16_LEN - i - 1] = ( i == length ) ? 0x80 : 0; in padding() 100 for ( i = 0; i < BT_OCTET16_LEN ; i ++ ) in leftshift_onebit() 143 smp_xor_128(&cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], x); /* Mi' := Mi (+) X */ in cmac_aes_k_calculate() 145 …if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET1… in cmac_aes_k_calculate() 151 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate() 157 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate() 189 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE; in cmac_prepare_last_block() [all …]
|
D | smp_keys.c | 222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey() 399 if (!SMP_Encrypt(er, BT_OCTET16_LEN, buffer, 4, &output)) in smp_compute_csrk() 413 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk() 618 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) in smp_calculate_comfirm() 658 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) in smp_calculate_comfirm_cont() 734 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm() 818 if (!SMP_Encrypt(er, BT_OCTET16_LEN, (UINT8 *)&p_cb->div, in smp_generate_ltk_cont() 828 memcpy((void *)p_cb->ltk, output.param_buf, BT_OCTET16_LEN); in smp_generate_ltk_cont() 854 if (!SMP_Encrypt(dhk, BT_OCTET16_LEN, p_cb->enc_rand, in smp_generate_y() 931 memset(p, 0, BT_OCTET16_LEN); in smp_calculate_legacy_short_term_key() [all …]
|
D | smp_utils.c | 44 #define SMP_CONFIRM_CMD_SIZE (BT_OCTET16_LEN + 1) 45 #define SMP_RAND_CMD_SIZE (BT_OCTET16_LEN + 1) 46 #define SMP_INIT_CMD_SIZE (BT_OCTET16_LEN + 1) 47 #define SMP_ENC_INFO_SIZE (BT_OCTET16_LEN + 1) 49 #define SMP_ID_INFO_SIZE (BT_OCTET16_LEN + 1) 51 #define SMP_SIGN_INFO_SIZE (BT_OCTET16_LEN + 1) 55 #define SMP_PAIR_COMMITM_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*Commitment*/) 56 #define SMP_PAIR_DHKEY_CHECK_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*DHKey Check*/) 426 ARRAY_TO_STREAM(p, p_cb->confirm, BT_OCTET16_LEN); in smp_build_confirm_cmd() 452 ARRAY_TO_STREAM(p, p_cb->rand, BT_OCTET16_LEN); in smp_build_rand_cmd() [all …]
|
D | smp_act.c | 406 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_send_enc_info() 456 memcpy (key.csrk, p_cb->csrk, BT_OCTET16_LEN); in smp_send_csrk_info() 677 STREAM_TO_ARRAY(p_cb->rconfirm, p, BT_OCTET16_LEN); in smp_proc_confirm() 701 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_init() 722 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_rand() 774 STREAM_TO_ARRAY(p_cb->remote_commitment, p, BT_OCTET16_LEN); in smp_process_pairing_commitment() 797 STREAM_TO_ARRAY(p_cb->remote_dhkey_check, p, BT_OCTET16_LEN); in smp_process_dhkey_check() 997 STREAM_TO_ARRAY(p_cb->ltk, p, BT_OCTET16_LEN); in smp_proc_enc_info() 1017 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_proc_master_id() 1038 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info() [all …]
|
D | smp_api.c | 429 if (len > BT_OCTET16_LEN) in SMP_OobDataReply() 430 len = BT_OCTET16_LEN; in SMP_OobDataReply()
|
/system/bt/bta/dm/ |
D | bta_dm_ci.c | 79 memcpy(p_msg->c, c, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob() 80 memcpy(p_msg->r, r, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
|
/system/bt/stack/btm/ |
D | btm_ble.c | 224 memcpy (ble_encr_key_value, btm_cb.devcb.ble_encryption_key_value, BT_OCTET16_LEN); in BTM_GetDeviceEncRoot() 242 memcpy (irk, btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN); in BTM_GetDeviceIDRoot() 258 memcpy (dhk, btm_cb.devcb.id_keys.dhk, BT_OCTET16_LEN); in BTM_GetDeviceDHK() 1050 params.param_len = BT_OCTET16_LEN; in btm_ble_rand_enc_complete() 1178 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1196 for (i=0; i<BT_OCTET16_LEN; i++) in btm_sec_save_le_key() 1213 memcpy(p_rec->ble.keys.pcsrk, p_keys->pcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1231 memcpy(p_rec->ble.keys.lltk, p_keys->lenc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1245 memcpy (p_rec->ble.keys.lcsrk, p_keys->lcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key() 2502 memcpy(btm_cb.devcb.id_keys.irk, p->param_buf, BT_OCTET16_LEN); in btm_ble_process_irk() [all …]
|
D | btm_ble_addr.c | 109 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) in btm_gen_resolve_paddr_low() 291 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_addr_resolvable() 342 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_match_random_bda()
|
D | btm_ble_multi_adv.c | 420 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) in btm_ble_multi_adv_gen_rpa_cmpl()
|
D | btm_ble_privacy.c | 817 ARRAY_TO_STREAM(p, p_dev_rec->ble.keys.irk, BT_OCTET16_LEN); in btm_ble_resolving_list_load_dev()
|
/system/bt/btif/src/ |
D | btif_dm.c | 127 UINT8 ir[BT_OCTET16_LEN]; 128 UINT8 irk[BT_OCTET16_LEN]; 129 UINT8 dhk[BT_OCTET16_LEN]; 135 UINT8 er[BT_OCTET16_LEN]; 1929 BT_OCTET16_LEN); in btif_dm_upstreams_evt() 1932 BT_OCTET16_LEN); in btif_dm_upstreams_evt() 1935 BT_OCTET16_LEN); in btif_dm_upstreams_evt() 1943 BT_OCTET16_LEN); in btif_dm_upstreams_evt() 2867 memcpy(oob_cb.oob_data.c192, c, BT_OCTET16_LEN); in btif_dm_proc_loc_oob() 2868 memcpy(oob_cb.oob_data.r192, r, BT_OCTET16_LEN); in btif_dm_proc_loc_oob() [all …]
|
/system/bt/stack/include/ |
D | smp_api.h | 286 UINT8 param_buf[BT_OCTET16_LEN];
|
D | bt_types.h | 328 #define BT_OCTET16_LEN 16 macro 329 typedef UINT8 BT_OCTET16[BT_OCTET16_LEN]; /* octet array: size 16 */
|
D | btm_ble_api.h | 272 UINT8 param_buf[BT_OCTET16_LEN];
|