Lines Matching full:the

21  * The RSI hash function sih is used to generate a hash value that is
22 * used in RSIs - Used by the Coordinated Set Identification service and
36 * The SIRK encryption function sef is used by the server to encrypt the SIRK
37 * with a key K. The value of K depends on the transport on which the pairing
38 * between the client and the server was performed.
40 * If the pairing was performed on BR/EDR, K is equal to the Link Key shared by
41 * the server and the client.
44 * If the pairing was performed on LE, the 64 LSBs of K correspond to the 64
45 * LSBs of the IRK that the server sent to the client during the Phase 3
46 * (Transport Specific Key Distribution) of the pairing procedure (see Volume 3,
47 * Part H, Section 2.1 in [2]), and the 64 MSBs of K correspond to the 64 MSBs
48 * of the LTK shared by the server and client. That is,
52 * @param sirk The unencrypted SIRK.
53 * @param out_sirk The encrypted SIRK.
62 * The SIRK decryption function sdf is used by the client to decrypt the SIRK
63 * with a key K. The value of K depends on the transport on which the pairing
64 * between the client and the server was performed.
66 * If the pairing was performed on BR/EDR, K is equal to the Link Key shared by
67 * the server and the client.
70 * If the pairing was performed on LE, the 64 LSBs of K correspond to the 64
71 * LSBs of the IRK that the server sent to the client during the Phase 3
72 * (Transport Specific Key Distribution) of the pairing procedure (see Volume 3,
73 * Part H, Section 2.1 in [2]), and the 64 MSBs of K correspond to the 64 MSBs
74 * of the LTK shared by the server and client. That is,
78 * @param sirk The encrypted SIRK.
79 * @param out_sirk The decrypted SIRK.