/system/bt/stack/smp/ |
D | smp_api.cc | 295 uint32_t passkey) { in SMP_PasskeyReply() argument 298 SMP_TRACE_EVENT("SMP_PasskeyReply: Key: %d Result:%d", passkey, res); in SMP_PasskeyReply() 316 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 319 passkey); in SMP_PasskeyReply() 328 smp_int_data.passkey = passkey; in SMP_PasskeyReply() 331 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply()
|
D | smp_keys.cc | 175 uint32_t passkey; /* 19655 test number; */ in smp_proc_passkey() local 179 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey() 180 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey() 183 while (passkey > BTM_MAX_PASSKEY_VAL) passkey >>= 1; in smp_proc_passkey() 187 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey() 191 smp_evt_data.passkey = passkey; in smp_proc_passkey() 198 smp_int_data.passkey = passkey; in smp_proc_passkey() 1087 smp_int_data.passkey = p_cb->number_to_display; in smp_calculate_numeric_comparison_display_number()
|
D | smp_int.h | 226 uint32_t passkey; member 474 extern void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey);
|
D | smp_act.cc | 116 cb_data.passkey = p_data->passkey; in smp_send_app_cback() 1756 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification() 1759 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
|
D | smp_utils.cc | 787 void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey) { in smp_convert_string_to_tk() argument 791 UINT32_TO_STREAM(p, passkey); in smp_convert_string_to_tk()
|
/system/bt/btif/include/ |
D | btif_api.h | 296 uint32_t passkey); 310 uint32_t passkey);
|
/system/bt/stack/include/ |
D | smp_api.h | 134 uint32_t passkey);
|
D | smp_api_types.h | 252 uint32_t passkey; member
|
D | btm_ble_api.h | 269 uint32_t passkey);
|
D | btm_api.h | 1604 uint32_t passkey);
|
D | btm_api_types.h | 1459 uint32_t passkey; /* passkey */ member
|
/system/bt/btif/src/ |
D | bluetooth.cc | 299 uint8_t accept, uint32_t passkey) { in ssp_reply() argument 303 return btif_dm_ssp_reply(bd_addr, variant, accept, passkey); in ssp_reply()
|
D | btif_dm.cc | 1028 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); in btif_dm_ssp_key_notif_evt() 2350 uint32_t passkey = 0; in btif_dm_pin_reply() local 2353 passkey += (multi[i] * (pin_code->pin[i] - '0')); in btif_dm_pin_reply() 2355 BTIF_TRACE_DEBUG("btif_dm_pin_reply: passkey: %d", passkey); in btif_dm_pin_reply() 2356 BTA_DmBlePasskeyReply(*bd_addr, accept, passkey); in btif_dm_pin_reply() 2377 UNUSED_ATTR uint32_t passkey) { in btif_dm_ssp_reply() argument 2792 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); in btif_dm_ble_key_notif_evt() 3044 BT_SSP_VARIANT_PASSKEY_CONFIRMATION, p_notif_req->passkey); in btif_dm_ble_key_nc_req_evt()
|
/system/bt/binder/android/bluetooth/ |
D | IBluetooth.aidl | 87 passkey); in setPasskey() argument
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 486 uint32_t passkey) { in BTA_DmBlePasskeyReply() argument 488 accept, accept ? passkey : 0)); in BTA_DmBlePasskeyReply()
|
D | bta_dm_act.cc | 2279 sec_event.key_notif.passkey = in bta_dm_pinname_cback() 2306 sec_event.key_notif.passkey = in bta_dm_pinname_cback() 2498 bta_dm_cb.num_val = sec_event.key_notif.passkey = in bta_dm_sp_cback() 2499 p_data->key_notif.passkey; in bta_dm_sp_cback() 3795 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 3813 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 3947 uint32_t passkey) { in bta_dm_ble_passkey_reply() argument 3949 passkey); in bta_dm_ble_passkey_reply()
|
D | bta_dm_int.h | 502 uint32_t passkey);
|
/system/bt/include/hardware/ |
D | bluetooth.h | 526 uint8_t accept, uint32_t passkey);
|
/system/bt/bta/include/ |
D | bta_api.h | 655 uint32_t passkey; /* the numeric value for comparison. If just_works, do not member 1399 uint32_t passkey);
|
/system/bt/stack/btm/ |
D | btm_sec.cc | 1437 uint32_t passkey) { in BTM_PasskeyReqReply() argument 1468 if (passkey > BTM_MAX_PASSKEY_VAL) res = BTM_ILLEGAL_VALUE; in BTM_PasskeyReqReply() 1479 btsnd_hcic_user_passkey_reply(bd_addr, passkey); in BTM_PasskeyReqReply() 3436 STREAM_TO_UINT32(evt_data.key_notif.passkey, p); in btm_proc_sp_req_evt() 3438 evt_data.key_notif.passkey); in btm_proc_sp_req_evt()
|
D | btm_ble.cc | 375 uint32_t passkey) { in BTM_BlePasskeyReply() argument 387 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply()
|