/system/bt/stack/test/ |
D | stack_smp_test.cc | 85 BT_OCTET16 p1); 88 BT_OCTET16 p2); 90 extern tSMP_STATUS smp_calculate_comfirm(tSMP_CB* p_cb, BT_OCTET16 rand, 95 void dump_uint128(BT_OCTET16 a, char* buffer) { in dump_uint128() 96 for (unsigned int i = 0; i < sizeof(BT_OCTET16); ++i) { in dump_uint128() 103 void dump_uint128_reverse(BT_OCTET16 a, char* buffer) { in dump_uint128_reverse() 104 for (int i = (int)(sizeof(BT_OCTET16) - 1); i >= 0; --i) { in dump_uint128_reverse() 111 void print_uint128(BT_OCTET16 a) { in print_uint128() 112 for (unsigned int i = 0; i < sizeof(BT_OCTET16); ++i) { in print_uint128() 118 void parse_uint128(const char* input, BT_OCTET16 output) { in parse_uint128() [all …]
|
D | ble_advertiser_test.cc | 49 void BTM_GetDeviceIDRoot(BT_OCTET16 irk) {} in BTM_GetDeviceIDRoot()
|
/system/bt/btif/include/ |
D | btif_dm.h | 63 void btif_dm_proc_loc_oob(bool valid, BT_OCTET16 c, BT_OCTET16 r); 64 bool btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r); 99 BT_OCTET16 er,
|
/system/bt/stack/smp/ |
D | smp_cmac.cc | 43 BT_OCTET16 const_Rb = {0x87, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 46 void print128(BT_OCTET16 x, const uint8_t* key_name) { in print128() 74 static void padding(BT_OCTET16 dest, uint8_t length) { in padding() 124 static bool cmac_aes_k_calculate(BT_OCTET16 key, uint8_t* p_signature, in cmac_aes_k_calculate() 177 static void cmac_prepare_last_block(BT_OCTET16 k1, BT_OCTET16 k2) { in cmac_prepare_last_block() 247 static bool cmac_generate_subkey(BT_OCTET16 key) { in cmac_generate_subkey() 248 BT_OCTET16 z = {0}; in cmac_generate_subkey() 279 bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input, uint16_t length, in aes_cipher_msg_auth_code()
|
D | smp_int.h | 275 BT_OCTET16 confirm; 276 BT_OCTET16 rconfirm; 277 BT_OCTET16 rrand; /* for SC this is peer nonce */ 278 BT_OCTET16 rand; /* for SC this is local nonce */ 281 BT_OCTET16 commitment; 282 BT_OCTET16 remote_commitment; 283 BT_OCTET16 local_random; /* local randomizer - passkey or OOB randomizer */ 284 BT_OCTET16 peer_random; /* peer randomizer - passkey or OOB randomizer */ 285 BT_OCTET16 dhkey_check; 286 BT_OCTET16 remote_dhkey_check; [all …]
|
D | smp_keys.cc | 256 BT_OCTET16 er; in smp_compute_csrk() 358 BT_OCTET16 p1) { in smp_gen_p1_4_confirm() 396 void smp_gen_p2_4_confirm(tSMP_CB* p_cb, BD_ADDR remote_bda, BT_OCTET16 p2) { in smp_gen_p2_4_confirm() 400 memset(p, 0, sizeof(BT_OCTET16)); in smp_gen_p2_4_confirm() 424 tSMP_STATUS smp_calculate_comfirm(tSMP_CB* p_cb, BT_OCTET16 rand, in smp_calculate_comfirm() 438 BT_OCTET16 p1; in smp_calculate_comfirm() 452 BT_OCTET16 p2; in smp_calculate_comfirm() 606 BT_OCTET16 dhk; in smp_generate_y() 627 BT_OCTET16 er; in smp_generate_ltk_cont() 703 BT_OCTET16 ptext; in smp_calculate_legacy_short_term_key() [all …]
|
D | smp_utils.cc | 546 BT_OCTET16 irk; in smp_build_identity_info_cmd() 784 void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey) { in smp_convert_string_to_tk() 826 void smp_xor_128(BT_OCTET16 a, BT_OCTET16 b) { in smp_xor_128() 1406 BT_OCTET16 expected; in smp_check_commitment()
|
/system/bt/bta/include/ |
D | bta_dm_co.h | 108 extern void bta_dm_co_loc_oob(bool valid, BT_OCTET16 c, BT_OCTET16 r); 212 tBTA_DM_BLE_LOCAL_KEY_MASK* p_key_mask, BT_OCTET16 er,
|
D | bta_dm_ci.h | 57 extern void bta_dm_ci_rmt_oob(bool accept, BD_ADDR bd_addr, BT_OCTET16 c, 58 BT_OCTET16 r);
|
D | bta_api.h | 492 BT_OCTET16 ir; 493 BT_OCTET16 irk; 494 BT_OCTET16 dhk; 696 BT_OCTET16 ble_er; /* ER event data */
|
/system/bt/btif/co/ |
D | bta_dm_co.cc | 135 void bta_dm_co_loc_oob(bool valid, BT_OCTET16 c, BT_OCTET16 r) { in bta_dm_co_loc_oob() 156 BT_OCTET16 p_c; in bta_dm_co_rmt_oob() 157 BT_OCTET16 p_r; in bta_dm_co_rmt_oob() 303 BT_OCTET16 er, in bta_dm_co_ble_load_local_keys()
|
/system/bt/stack/include/ |
D | smp_api_types.h | 231 BT_OCTET16 randomizer; 232 BT_OCTET16 commitment; 245 BT_OCTET16 randomizer; 246 BT_OCTET16 commitment;
|
D | btm_api_types.h | 1473 BT_OCTET16 c; /* Simple Pairing Hash C */ 1474 BT_OCTET16 r; /* Simple Pairing Randomnizer R */ 1624 BT_OCTET16 ltk; 1634 BT_OCTET16 csrk; 1640 BT_OCTET16 ltk; 1651 BT_OCTET16 csrk; 1655 BT_OCTET16 irk; 1697 BT_OCTET16 ir; 1698 BT_OCTET16 irk; 1699 BT_OCTET16 dhk; [all …]
|
D | btm_ble_api.h | 209 extern void BTM_GetDeviceIDRoot(BT_OCTET16 ir); 222 extern void BTM_GetDeviceEncRoot(BT_OCTET16 er); 234 extern void BTM_GetDeviceDHK(BT_OCTET16 dhk);
|
D | btm_api.h | 1675 BT_OCTET16 c, BT_OCTET16 r); 1696 BT_OCTET16 c, BT_OCTET16 r, uint8_t name_len);
|
D | smp_api.h | 238 bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input, uint16_t length,
|
D | bt_types.h | 562 typedef uint8_t BT_OCTET16[BT_OCTET16_LEN]; /* octet array: size 16 */ typedef
|
/system/bt/bta/dm/ |
D | bta_dm_ci.cc | 70 void bta_dm_ci_rmt_oob(bool accept, BD_ADDR bd_addr, BT_OCTET16 c, in bta_dm_ci_rmt_oob() 71 BT_OCTET16 r) { in bta_dm_ci_rmt_oob()
|
D | bta_dm_int.h | 225 BT_OCTET16 c; 226 BT_OCTET16 r;
|
/system/bt/stack/btm/ |
D | btm_int_types.h | 157 BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */ 416 BT_OCTET16 irk; /* peer diverified identity root */ 417 BT_OCTET16 pltk; /* peer long term key */ 418 BT_OCTET16 pcsrk; /* peer SRK peer device used to secured sign local data */ 420 BT_OCTET16 lltk; /* local long term key */ 421 BT_OCTET16 lcsrk; /* local SRK peer device used to secured sign local data */
|
D | btm_ble_int.h | 82 BT_OCTET16 stk); 91 BT_OCTET16 stk);
|
D | btm_ble.cc | 47 extern bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input, 189 sizeof(BT_OCTET16)); in BTM_BleLoadLocalKeys() 210 void BTM_GetDeviceEncRoot(BT_OCTET16 ble_encr_key_value) { in BTM_GetDeviceEncRoot() 227 void BTM_GetDeviceIDRoot(BT_OCTET16 irk) { in BTM_GetDeviceIDRoot() 243 void BTM_GetDeviceDHK(BT_OCTET16 dhk) { in BTM_GetDeviceDHK() 1463 tBTM_STATUS btm_ble_start_encrypt(BD_ADDR bda, bool use_stk, BT_OCTET16 stk) { in btm_ble_start_encrypt() 1552 void btm_ble_ltk_request_reply(BD_ADDR bda, bool use_stk, BT_OCTET16 stk) { in btm_ble_ltk_request_reply()
|
D | btm_sec.cc | 229 BT_OCTET16 temp_value = {0}; in BTM_SecRegister() 239 if (memcmp(btm_cb.devcb.id_keys.ir, &temp_value, sizeof(BT_OCTET16)) == 0) { in BTM_SecRegister() 1635 void BTM_RemoteOobDataReply(tBTM_STATUS res, BD_ADDR bd_addr, BT_OCTET16 c, in BTM_RemoteOobDataReply() 1636 BT_OCTET16 r) { in BTM_RemoteOobDataReply() 1674 uint16_t BTM_BuildOobData(uint8_t* p_data, uint16_t max_len, BT_OCTET16 c, in BTM_BuildOobData() 1675 BT_OCTET16 r, uint8_t name_len) { in BTM_BuildOobData() 3779 BT_OCTET16 c; in btm_rem_oob_req() 3780 BT_OCTET16 r; in btm_rem_oob_req()
|
D | btm_ble_multi_adv.cc | 189 BT_OCTET16 irk; in OnRpaGenerationComplete()
|
/system/bt/btif/src/ |
D | btif_dm.cc | 1825 sizeof(BT_OCTET16)); in btif_dm_upstreams_evt() 1827 sizeof(BT_OCTET16)); in btif_dm_upstreams_evt() 1829 sizeof(BT_OCTET16)); in btif_dm_upstreams_evt() 1840 memcpy(&ble_local_key_cb.er[0], &p_data->ble_er[0], sizeof(BT_OCTET16)); in btif_dm_upstreams_evt() 2693 void btif_dm_proc_loc_oob(bool valid, BT_OCTET16 c, BT_OCTET16 r) { in btif_dm_proc_loc_oob() 2789 bool btif_dm_proc_rmt_oob(BD_ADDR bd_addr, BT_OCTET16 p_c, BT_OCTET16 p_r) { in btif_dm_proc_rmt_oob() 2961 BT_OCTET16 er, in btif_dm_get_ble_local_keys() 2964 memcpy(&er[0], &ble_local_key_cb.er[0], sizeof(BT_OCTET16)); in btif_dm_get_ble_local_keys() 2970 sizeof(BT_OCTET16)); in btif_dm_get_ble_local_keys() 2972 sizeof(BT_OCTET16)); in btif_dm_get_ble_local_keys() [all …]
|