Lines Matching refs:rand

999 	(void)memset(keys->ltk.rand, 0, sizeof(keys->ltk.rand));  in smp_br_derive_ltk()
2032 uint8_t rand[8]; in legacy_distribute_keys() member
2034 } rand; in legacy_distribute_keys() local
2036 if (bt_rand((void *)&rand, sizeof(rand))) { in legacy_distribute_keys()
2051 memcpy(info->ltk, rand.key, keys->enc_size); in legacy_distribute_keys()
2067 memcpy(ident->rand, rand.rand, sizeof(ident->rand)); in legacy_distribute_keys()
2068 memcpy(ident->ediv, rand.ediv, sizeof(ident->ediv)); in legacy_distribute_keys()
2075 memcpy(keys->periph_ltk.val, rand.key, in legacy_distribute_keys()
2077 memcpy(keys->periph_ltk.rand, rand.rand, in legacy_distribute_keys()
2078 sizeof(keys->periph_ltk.rand)); in legacy_distribute_keys()
2079 memcpy(keys->periph_ltk.ediv, rand.ediv, in legacy_distribute_keys()
2414 uint8_t ediv[2], rand[8]; in legacy_pairing_random() local
2424 (void)memset(rand, 0, sizeof(rand)); in legacy_pairing_random()
2425 if (bt_conn_le_start_encryption(conn, rand, ediv, tmp, in legacy_pairing_random()
2562 memcpy(keys->ltk.rand, req->rand, sizeof(req->rand)); in smp_central_ident()
2782 bool bt_smp_request_ltk(struct bt_conn *conn, uint64_t rand, uint16_t ediv, uint8_t *ltk) in bt_smp_request_ltk() argument
2796 if (ediv == 0U && rand == 0U && in bt_smp_request_ltk()
2824 if (ediv == 0U && rand == 0U && in bt_smp_request_ltk()
2840 !memcmp(conn->le.keys->periph_ltk.rand, &rand, 8) && in bt_smp_request_ltk()
4160 if (bt_conn_le_start_encryption(conn, conn->le.keys->ltk.rand, in smp_security_request()
4418 uint8_t ediv[2], rand[8]; in smp_dhkey_check() local
4455 (void)memset(rand, 0, sizeof(rand)); in smp_dhkey_check()
4456 if (bt_conn_le_start_encryption(smp->chan.chan.conn, rand, ediv, in smp_dhkey_check()
5940 conn->le.keys->ltk.rand, in bt_smp_start_security()
6032 (void)memset(conn->le.keys->ltk.rand, 0, in bt_smp_update_keys()
6033 sizeof(conn->le.keys->ltk.rand)); in bt_smp_update_keys()