Lines Matching refs:ediv
1005 (void)memset(keys->ltk.ediv, 0, sizeof(keys->ltk.ediv)); in smp_br_derive_ltk()
2070 uint8_t ediv[2]; in legacy_distribute_keys() member
2105 memcpy(ident->ediv, rand.ediv, sizeof(ident->ediv)); in legacy_distribute_keys()
2116 memcpy(keys->periph_ltk.ediv, rand.ediv, in legacy_distribute_keys()
2117 sizeof(keys->periph_ltk.ediv)); in legacy_distribute_keys()
2451 uint8_t ediv[2], rand[8]; in legacy_pairing_random() local
2460 (void)memset(ediv, 0, sizeof(ediv)); in legacy_pairing_random()
2462 if (bt_conn_le_start_encryption(conn, rand, ediv, tmp, in legacy_pairing_random()
2598 memcpy(keys->ltk.ediv, req->ediv, sizeof(keys->ltk.ediv)); in smp_central_ident()
2819 bool bt_smp_request_ltk(struct bt_conn *conn, uint64_t rand, uint16_t ediv, uint8_t *ltk) in bt_smp_request_ltk() argument
2833 if (ediv == 0U && rand == 0U && in bt_smp_request_ltk()
2861 if (ediv == 0U && rand == 0U && in bt_smp_request_ltk()
2878 !memcmp(conn->le.keys->periph_ltk.ediv, &ediv, 2)) { in bt_smp_request_ltk()
4198 conn->le.keys->ltk.ediv, in smp_security_request()
4455 uint8_t ediv[2], rand[8]; in smp_dhkey_check() local
4491 (void)memset(ediv, 0, sizeof(ediv)); in smp_dhkey_check()
4493 if (bt_conn_le_start_encryption(smp->chan.chan.conn, rand, ediv, in smp_dhkey_check()
6030 conn->le.keys->ltk.ediv, in bt_smp_start_security()
6123 (void)memset(conn->le.keys->ltk.ediv, 0, in bt_smp_update_keys()
6124 sizeof(conn->le.keys->ltk.ediv)); in bt_smp_update_keys()