Home
last modified time | relevance | path

Searched refs:BT_OCTET16_LEN (Results 1 – 14 of 14) sorted by relevance

/system/bt/stack/smp/
Dsmp_cmac.c61 p[BT_OCTET16_LEN - i*4 -1], p[BT_OCTET16_LEN - i*4 -2], in print128()
62 p[BT_OCTET16_LEN - i*4 -3], p[BT_OCTET16_LEN - i*4 -4]); in print128()
83 for ( i = length ; i < BT_OCTET16_LEN; i++ ) in padding()
84 p[BT_OCTET16_LEN - i - 1] = ( i == length ) ? 0x80 : 0; in padding()
100 for ( i = 0; i < BT_OCTET16_LEN ; i ++ ) in leftshift_onebit()
143 smp_xor_128(&cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], x); /* Mi' := Mi (+) X */ in cmac_aes_k_calculate()
145 …if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET1… in cmac_aes_k_calculate()
151 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate()
157 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate()
189 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE; in cmac_prepare_last_block()
[all …]
Dsmp_keys.c222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey()
399 if (!SMP_Encrypt(er, BT_OCTET16_LEN, buffer, 4, &output)) in smp_compute_csrk()
413 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk()
618 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) in smp_calculate_comfirm()
658 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) in smp_calculate_comfirm_cont()
734 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm()
818 if (!SMP_Encrypt(er, BT_OCTET16_LEN, (UINT8 *)&p_cb->div, in smp_generate_ltk_cont()
828 memcpy((void *)p_cb->ltk, output.param_buf, BT_OCTET16_LEN); in smp_generate_ltk_cont()
854 if (!SMP_Encrypt(dhk, BT_OCTET16_LEN, p_cb->enc_rand, in smp_generate_y()
931 memset(p, 0, BT_OCTET16_LEN); in smp_calculate_legacy_short_term_key()
[all …]
Dsmp_utils.c44 #define SMP_CONFIRM_CMD_SIZE (BT_OCTET16_LEN + 1)
45 #define SMP_RAND_CMD_SIZE (BT_OCTET16_LEN + 1)
46 #define SMP_INIT_CMD_SIZE (BT_OCTET16_LEN + 1)
47 #define SMP_ENC_INFO_SIZE (BT_OCTET16_LEN + 1)
49 #define SMP_ID_INFO_SIZE (BT_OCTET16_LEN + 1)
51 #define SMP_SIGN_INFO_SIZE (BT_OCTET16_LEN + 1)
55 #define SMP_PAIR_COMMITM_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*Commitment*/)
56 #define SMP_PAIR_DHKEY_CHECK_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*DHKey Check*/)
426 ARRAY_TO_STREAM(p, p_cb->confirm, BT_OCTET16_LEN); in smp_build_confirm_cmd()
452 ARRAY_TO_STREAM(p, p_cb->rand, BT_OCTET16_LEN); in smp_build_rand_cmd()
[all …]
Dsmp_act.c406 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_send_enc_info()
456 memcpy (key.csrk, p_cb->csrk, BT_OCTET16_LEN); in smp_send_csrk_info()
677 STREAM_TO_ARRAY(p_cb->rconfirm, p, BT_OCTET16_LEN); in smp_proc_confirm()
701 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_init()
722 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_rand()
774 STREAM_TO_ARRAY(p_cb->remote_commitment, p, BT_OCTET16_LEN); in smp_process_pairing_commitment()
797 STREAM_TO_ARRAY(p_cb->remote_dhkey_check, p, BT_OCTET16_LEN); in smp_process_dhkey_check()
997 STREAM_TO_ARRAY(p_cb->ltk, p, BT_OCTET16_LEN); in smp_proc_enc_info()
1017 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_proc_master_id()
1038 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info()
[all …]
Dsmp_api.c429 if (len > BT_OCTET16_LEN) in SMP_OobDataReply()
430 len = BT_OCTET16_LEN; in SMP_OobDataReply()
/system/bt/bta/dm/
Dbta_dm_ci.c79 memcpy(p_msg->c, c, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
80 memcpy(p_msg->r, r, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
/system/bt/stack/btm/
Dbtm_ble.c224 memcpy (ble_encr_key_value, btm_cb.devcb.ble_encryption_key_value, BT_OCTET16_LEN); in BTM_GetDeviceEncRoot()
242 memcpy (irk, btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN); in BTM_GetDeviceIDRoot()
258 memcpy (dhk, btm_cb.devcb.id_keys.dhk, BT_OCTET16_LEN); in BTM_GetDeviceDHK()
1050 params.param_len = BT_OCTET16_LEN; in btm_ble_rand_enc_complete()
1178 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1196 for (i=0; i<BT_OCTET16_LEN; i++) in btm_sec_save_le_key()
1213 memcpy(p_rec->ble.keys.pcsrk, p_keys->pcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1231 memcpy(p_rec->ble.keys.lltk, p_keys->lenc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1245 memcpy (p_rec->ble.keys.lcsrk, p_keys->lcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key()
2502 memcpy(btm_cb.devcb.id_keys.irk, p->param_buf, BT_OCTET16_LEN); in btm_ble_process_irk()
[all …]
Dbtm_ble_addr.c109 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) in btm_gen_resolve_paddr_low()
291 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_addr_resolvable()
342 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_match_random_bda()
Dbtm_ble_multi_adv.c420 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) in btm_ble_multi_adv_gen_rpa_cmpl()
Dbtm_ble_privacy.c817 ARRAY_TO_STREAM(p, p_dev_rec->ble.keys.irk, BT_OCTET16_LEN); in btm_ble_resolving_list_load_dev()
/system/bt/btif/src/
Dbtif_dm.c127 UINT8 ir[BT_OCTET16_LEN];
128 UINT8 irk[BT_OCTET16_LEN];
129 UINT8 dhk[BT_OCTET16_LEN];
135 UINT8 er[BT_OCTET16_LEN];
1929 BT_OCTET16_LEN); in btif_dm_upstreams_evt()
1932 BT_OCTET16_LEN); in btif_dm_upstreams_evt()
1935 BT_OCTET16_LEN); in btif_dm_upstreams_evt()
1943 BT_OCTET16_LEN); in btif_dm_upstreams_evt()
2867 memcpy(oob_cb.oob_data.c192, c, BT_OCTET16_LEN); in btif_dm_proc_loc_oob()
2868 memcpy(oob_cb.oob_data.r192, r, BT_OCTET16_LEN); in btif_dm_proc_loc_oob()
[all …]
/system/bt/stack/include/
Dsmp_api.h286 UINT8 param_buf[BT_OCTET16_LEN];
Dbt_types.h328 #define BT_OCTET16_LEN 16 macro
329 typedef UINT8 BT_OCTET16[BT_OCTET16_LEN]; /* octet array: size 16 */
Dbtm_ble_api.h272 UINT8 param_buf[BT_OCTET16_LEN];