Lines Matching +full:0 +full:x99
47 0x3f, 0x49, 0xf6, 0xd4, 0xa3, 0xc5, 0x5f, 0x38,
48 0x74, 0xc9, 0xb3, 0xe3, 0xd2, 0x10, 0x3f, 0x50,
49 0x4a, 0xff, 0x60, 0x7b, 0xeb, 0x40, 0xb7, 0x99,
50 0x58, 0x99, 0xb8, 0xa6, 0xcd, 0x3c, 0x1a, 0xbd,
80 LOG_DBG("opcode %x status 0x%02x %s", opcode, status, bt_hci_err_to_str(status)); in send_cmd_status()
124 /* secp256r1 PSA exported public key has an extra 0x04 predefined byte at in generate_keys()
141 return 0; in generate_keys()
169 (void)memset(evt->key, 0, sizeof(evt->key)); in emulate_le_p256_public_key_cmd()
190 int ret = 0; in emulate_le_generate_dhkey()
195 /* PSA expects secp256r1 public key to start with a predefined 0x04 byte in emulate_le_generate_dhkey()
198 uint8_t tmp_pub_key_buf[BT_PUB_KEY_LEN + 1] = { 0x04 }; in emulate_le_generate_dhkey()
236 if (ret != 0) { in emulate_le_generate_dhkey()
238 (void)memset(evt->dhkey, 0xff, sizeof(evt->dhkey)); in emulate_le_generate_dhkey()
240 evt->status = 0U; in emulate_le_generate_dhkey()
259 __ASSERT(0, "Unhandled ECC command"); in ecc_process()
273 cmd->events[0] &= ~0x80; /* LE Read Local P-256 PKey Compl */ in clear_ecc_events()
274 cmd->events[1] &= ~0x01; /* LE Generate DHKey Compl Event */ in clear_ecc_events()
357 return 0; in bt_hci_ecc_send()
361 return 0; in bt_hci_ecc_send()
365 return 0; in bt_hci_ecc_send()