Home
last modified time | relevance | path

Searched refs:BT_OCTET16_LEN (Results 1 – 21 of 21) sorted by relevance

/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_cmac.c60 p[BT_OCTET16_LEN - i * 4 - 1], p[BT_OCTET16_LEN - i * 4 - 2], in print128()
61 p[BT_OCTET16_LEN - i * 4 - 3], p[BT_OCTET16_LEN - i * 4 - 4]); in print128()
82 for ( i = length ; i < BT_OCTET16_LEN; i++ ) { in padding()
83 p[BT_OCTET16_LEN - i - 1] = ( i == length ) ? 0x80 : 0; in padding()
100 for ( i = 0; i < BT_OCTET16_LEN ; i ++ ) { in leftshift_onebit()
143 smp_xor_128(&cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], x); /* Mi' := Mi (+) X */ in cmac_aes_k_calculate()
145 …if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET1… in cmac_aes_k_calculate()
150 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate()
155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate()
187 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE; in cmac_prepare_last_block()
[all …]
Dsmp_keys.c222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_use_static_passkey()
291 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey()
461 if (!SMP_Encrypt(er, BT_OCTET16_LEN, buffer, 4, &output)) { in smp_compute_csrk()
471 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk()
666 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm()
703 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm_cont()
776 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm()
862 if (!SMP_Encrypt(er, BT_OCTET16_LEN, (UINT8 *)&p_cb->div, in smp_generate_ltk_cont()
869 memcpy((void *)p_cb->ltk, output.param_buf, BT_OCTET16_LEN); in smp_generate_ltk_cont()
895 if (!SMP_Encrypt(dhk, BT_OCTET16_LEN, p_cb->enc_rand, in smp_generate_y()
[all …]
Dsmp_utils.c42 #define SMP_CONFIRM_CMD_SIZE (BT_OCTET16_LEN + 1)
43 #define SMP_RAND_CMD_SIZE (BT_OCTET16_LEN + 1)
44 #define SMP_INIT_CMD_SIZE (BT_OCTET16_LEN + 1)
45 #define SMP_ENC_INFO_SIZE (BT_OCTET16_LEN + 1)
47 #define SMP_ID_INFO_SIZE (BT_OCTET16_LEN + 1)
49 #define SMP_SIGN_INFO_SIZE (BT_OCTET16_LEN + 1)
53 #define SMP_PAIR_COMMITM_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*Commitment*/)
54 #define SMP_PAIR_DHKEY_CHECK_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*DHKey Check*/)
456 ARRAY_TO_STREAM (p, p_cb->confirm, BT_OCTET16_LEN); in smp_build_confirm_cmd()
483 ARRAY_TO_STREAM (p, p_cb->rand, BT_OCTET16_LEN); in smp_build_rand_cmd()
[all …]
Dsmp_act.c375 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_send_enc_info()
430 memcpy (key.csrk, p_cb->csrk, BT_OCTET16_LEN); in smp_send_csrk_info()
694 STREAM_TO_ARRAY(p_cb->rconfirm, p, BT_OCTET16_LEN); in smp_proc_confirm()
718 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN);
739 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_rand()
806 STREAM_TO_ARRAY(p_cb->remote_commitment, p, BT_OCTET16_LEN); in smp_process_pairing_commitment()
827 STREAM_TO_ARRAY(p_cb->remote_dhkey_check, p, BT_OCTET16_LEN); in smp_process_dhkey_check()
1016 STREAM_TO_ARRAY(p_cb->ltk, p, BT_OCTET16_LEN); in smp_proc_enc_info()
1039 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_proc_master_id()
1063 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info()
[all …]
Dsmp_api.c439 if (len > BT_OCTET16_LEN) { in SMP_OobDataReply()
440 len = BT_OCTET16_LEN; in SMP_OobDataReply()
/hal_espressif-latest/components/bt/host/bluedroid/btc/include/btc/
Dbtc_dm.h48 uint8_t ir[BT_OCTET16_LEN];
49 uint8_t irk[BT_OCTET16_LEN];
50 uint8_t dhk[BT_OCTET16_LEN];
56 uint8_t er[BT_OCTET16_LEN];
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/
Dbta_dm_ci.c80 memcpy(p_msg->c, c, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
81 memcpy(p_msg->r, r, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
Dbta_dm_api.c730 if(p_value == NULL || len > BT_OCTET16_LEN) { in BTA_DmOobReply()
765 memcpy(p_msg->c, p_c, BT_OCTET16_LEN); in BTA_DmSecureConnectionOobReply()
766 memcpy(p_msg->r, p_r, BT_OCTET16_LEN); in BTA_DmSecureConnectionOobReply()
Dbta_dm_act.c4843 … memcpy(sec_event.local_oob_data.local_oob_c, p_data->local_oob_data.commitment, BT_OCTET16_LEN); in bta_dm_ble_smp_cback()
4844 … memcpy(sec_event.local_oob_data.local_oob_r, p_data->local_oob_data.randomizer, BT_OCTET16_LEN); in bta_dm_ble_smp_cback()
/hal_espressif-latest/components/bt/host/bluedroid/bta/gatt/
Dbta_gatts_co.c205 btc_storage_set_gatt_db_hash(&bd_addr, db_hash, BT_OCTET16_LEN); in bta_gatts_co_db_hash_save()
247 btc_storage_get_gatt_db_hash(&bd_addr, db_hash, BT_OCTET16_LEN); in bta_gatts_co_db_hash_load()
/hal_espressif-latest/components/bt/host/bluedroid/btc/core/
Dbtc_dm.c136 BT_OCTET16_LEN)== BT_STATUS_SUCCESS) { in btc_dm_load_ble_local_keys()
142 BT_OCTET16_LEN)== BT_STATUS_SUCCESS )&& in btc_dm_load_ble_local_keys()
144 BT_OCTET16_LEN)== BT_STATUS_SUCCESS)&& in btc_dm_load_ble_local_keys()
146 BT_OCTET16_LEN)== BT_STATUS_SUCCESS)) { in btc_dm_load_ble_local_keys()
985 … memcpy(param.ble_security.oob_data.oob_c, p_data->local_oob_data.local_oob_c, BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
986 … memcpy(param.ble_security.oob_data.oob_r, p_data->local_oob_data.local_oob_r, BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
1003 BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
1006 BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
1009 BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
1021 BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c240 memcpy (ble_encr_key_value, btm_cb.devcb.ble_encryption_key_value, BT_OCTET16_LEN); in BTM_GetDeviceEncRoot()
258 memcpy (irk, btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN); in BTM_GetDeviceIDRoot()
274 memcpy (dhk, btm_cb.devcb.id_keys.dhk, BT_OCTET16_LEN); in BTM_GetDeviceDHK()
530 memcpy(&oob.peer_oob_data.commitment, p_c, BT_OCTET16_LEN); in BTM_BleSecureConnectionOobDataReply()
531 memcpy(&oob.peer_oob_data.randomizer, p_r, BT_OCTET16_LEN); in BTM_BleSecureConnectionOobDataReply()
1163 params.param_len = BT_OCTET16_LEN; in btm_ble_rand_enc_complete()
1295 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1314 for (i = 0; i < BT_OCTET16_LEN; i++) { in btm_sec_save_le_key()
1330 memcpy(p_rec->ble.keys.pcsrk, p_keys->pcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key()
1349 memcpy(p_rec->ble.keys.lltk, p_keys->lenc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key()
[all …]
Dbtm_ble_addr.c114 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_gen_resolve_paddr_low()
314 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_addr_resolvable()
363 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_match_random_bda()
Dbtm_ble_multi_adv.c409 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_ble_multi_adv_gen_rpa_cmpl()
Dbtm_ble_privacy.c916 ARRAY_TO_STREAM(p, p_dev_rec->ble.keys.irk, BT_OCTET16_LEN); in btm_ble_resolving_list_load_dev()
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/
Dgatt_attr.c227 p_rsp->attr_value.len = BT_OCTET16_LEN; in gatt_proc_read()
228 memcpy(p_rsp->attr_value.value, gatt_cb.database_hash, BT_OCTET16_LEN); in gatt_proc_read()
757 …->is_robust_cache_change_aware = (memcmp(stored_hash, gatt_cb.database_hash, BT_OCTET16_LEN) == 0); in gatt_sr_init_cl_status()
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/
Dsmp_api.h277 UINT8 param_buf[BT_OCTET16_LEN];
Dbt_types.h317 #define BT_OCTET16_LEN 16 macro
318 typedef UINT8 BT_OCTET16[BT_OCTET16_LEN]; /* octet array: size 16 */
Dbtm_ble_api.h283 UINT8 param_buf[BT_OCTET16_LEN];
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/include/
Dbta_dm_int.h441 UINT8 value[BT_OCTET16_LEN];
442 UINT8 c[BT_OCTET16_LEN];
443 UINT8 r[BT_OCTET16_LEN];
450 UINT8 c[BT_OCTET16_LEN];
451 UINT8 r[BT_OCTET16_LEN];
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c1662 dst->sc_oob_req_reply.p_c = osi_malloc(BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy()
1664 memcpy(dst->sc_oob_req_reply.p_c, src->sc_oob_req_reply.p_c, BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy()
1670 dst->sc_oob_req_reply.p_r = osi_malloc(BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy()
1672 memcpy(dst->sc_oob_req_reply.p_r, src->sc_oob_req_reply.p_r, BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy()