/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_cmac.c | 60 p[BT_OCTET16_LEN - i * 4 - 1], p[BT_OCTET16_LEN - i * 4 - 2], in print128() 61 p[BT_OCTET16_LEN - i * 4 - 3], p[BT_OCTET16_LEN - i * 4 - 4]); in print128() 82 for ( i = length ; i < BT_OCTET16_LEN; i++ ) { in padding() 83 p[BT_OCTET16_LEN - i - 1] = ( i == length ) ? 0x80 : 0; in padding() 100 for ( i = 0; i < BT_OCTET16_LEN ; i ++ ) { in leftshift_onebit() 143 smp_xor_128(&cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], x); /* Mi' := Mi (+) X */ in cmac_aes_k_calculate() 145 …if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET1… in cmac_aes_k_calculate() 150 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate() 155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate() 187 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE; in cmac_prepare_last_block() [all …]
|
D | smp_keys.c | 222 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_use_static_passkey() 291 memset(p_cb->tk, 0, BT_OCTET16_LEN); in smp_proc_passkey() 461 if (!SMP_Encrypt(er, BT_OCTET16_LEN, buffer, 4, &output)) { in smp_compute_csrk() 471 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk() 666 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm() 703 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) { in smp_calculate_comfirm_cont() 776 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm() 862 if (!SMP_Encrypt(er, BT_OCTET16_LEN, (UINT8 *)&p_cb->div, in smp_generate_ltk_cont() 869 memcpy((void *)p_cb->ltk, output.param_buf, BT_OCTET16_LEN); in smp_generate_ltk_cont() 895 if (!SMP_Encrypt(dhk, BT_OCTET16_LEN, p_cb->enc_rand, in smp_generate_y() [all …]
|
D | smp_utils.c | 42 #define SMP_CONFIRM_CMD_SIZE (BT_OCTET16_LEN + 1) 43 #define SMP_RAND_CMD_SIZE (BT_OCTET16_LEN + 1) 44 #define SMP_INIT_CMD_SIZE (BT_OCTET16_LEN + 1) 45 #define SMP_ENC_INFO_SIZE (BT_OCTET16_LEN + 1) 47 #define SMP_ID_INFO_SIZE (BT_OCTET16_LEN + 1) 49 #define SMP_SIGN_INFO_SIZE (BT_OCTET16_LEN + 1) 53 #define SMP_PAIR_COMMITM_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*Commitment*/) 54 #define SMP_PAIR_DHKEY_CHECK_SIZE (1 /* opcode */ + BT_OCTET16_LEN /*DHKey Check*/) 456 ARRAY_TO_STREAM (p, p_cb->confirm, BT_OCTET16_LEN); in smp_build_confirm_cmd() 483 ARRAY_TO_STREAM (p, p_cb->rand, BT_OCTET16_LEN); in smp_build_rand_cmd() [all …]
|
D | smp_act.c | 375 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_send_enc_info() 430 memcpy (key.csrk, p_cb->csrk, BT_OCTET16_LEN); in smp_send_csrk_info() 694 STREAM_TO_ARRAY(p_cb->rconfirm, p, BT_OCTET16_LEN); in smp_proc_confirm() 718 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); 739 STREAM_TO_ARRAY(p_cb->rrand, p, BT_OCTET16_LEN); in smp_proc_rand() 806 STREAM_TO_ARRAY(p_cb->remote_commitment, p, BT_OCTET16_LEN); in smp_process_pairing_commitment() 827 STREAM_TO_ARRAY(p_cb->remote_dhkey_check, p, BT_OCTET16_LEN); in smp_process_dhkey_check() 1016 STREAM_TO_ARRAY(p_cb->ltk, p, BT_OCTET16_LEN); in smp_proc_enc_info() 1039 memcpy(le_key.ltk, p_cb->ltk, BT_OCTET16_LEN); in smp_proc_master_id() 1063 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info() [all …]
|
D | smp_api.c | 439 if (len > BT_OCTET16_LEN) { in SMP_OobDataReply() 440 len = BT_OCTET16_LEN; in SMP_OobDataReply()
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/include/btc/ |
D | btc_dm.h | 48 uint8_t ir[BT_OCTET16_LEN]; 49 uint8_t irk[BT_OCTET16_LEN]; 50 uint8_t dhk[BT_OCTET16_LEN]; 56 uint8_t er[BT_OCTET16_LEN];
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/ |
D | bta_dm_ci.c | 80 memcpy(p_msg->c, c, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob() 81 memcpy(p_msg->r, r, BT_OCTET16_LEN); in bta_dm_ci_rmt_oob()
|
D | bta_dm_api.c | 730 if(p_value == NULL || len > BT_OCTET16_LEN) { in BTA_DmOobReply() 765 memcpy(p_msg->c, p_c, BT_OCTET16_LEN); in BTA_DmSecureConnectionOobReply() 766 memcpy(p_msg->r, p_r, BT_OCTET16_LEN); in BTA_DmSecureConnectionOobReply()
|
D | bta_dm_act.c | 4843 … memcpy(sec_event.local_oob_data.local_oob_c, p_data->local_oob_data.commitment, BT_OCTET16_LEN); in bta_dm_ble_smp_cback() 4844 … memcpy(sec_event.local_oob_data.local_oob_r, p_data->local_oob_data.randomizer, BT_OCTET16_LEN); in bta_dm_ble_smp_cback()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/gatt/ |
D | bta_gatts_co.c | 205 btc_storage_set_gatt_db_hash(&bd_addr, db_hash, BT_OCTET16_LEN); in bta_gatts_co_db_hash_save() 247 btc_storage_get_gatt_db_hash(&bd_addr, db_hash, BT_OCTET16_LEN); in bta_gatts_co_db_hash_load()
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/core/ |
D | btc_dm.c | 136 BT_OCTET16_LEN)== BT_STATUS_SUCCESS) { in btc_dm_load_ble_local_keys() 142 BT_OCTET16_LEN)== BT_STATUS_SUCCESS )&& in btc_dm_load_ble_local_keys() 144 BT_OCTET16_LEN)== BT_STATUS_SUCCESS)&& in btc_dm_load_ble_local_keys() 146 BT_OCTET16_LEN)== BT_STATUS_SUCCESS)) { in btc_dm_load_ble_local_keys() 985 … memcpy(param.ble_security.oob_data.oob_c, p_data->local_oob_data.local_oob_c, BT_OCTET16_LEN); in btc_dm_sec_cb_handler() 986 … memcpy(param.ble_security.oob_data.oob_r, p_data->local_oob_data.local_oob_r, BT_OCTET16_LEN); in btc_dm_sec_cb_handler() 1003 BT_OCTET16_LEN); in btc_dm_sec_cb_handler() 1006 BT_OCTET16_LEN); in btc_dm_sec_cb_handler() 1009 BT_OCTET16_LEN); in btc_dm_sec_cb_handler() 1021 BT_OCTET16_LEN); in btc_dm_sec_cb_handler()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 240 memcpy (ble_encr_key_value, btm_cb.devcb.ble_encryption_key_value, BT_OCTET16_LEN); in BTM_GetDeviceEncRoot() 258 memcpy (irk, btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN); in BTM_GetDeviceIDRoot() 274 memcpy (dhk, btm_cb.devcb.id_keys.dhk, BT_OCTET16_LEN); in BTM_GetDeviceDHK() 530 memcpy(&oob.peer_oob_data.commitment, p_c, BT_OCTET16_LEN); in BTM_BleSecureConnectionOobDataReply() 531 memcpy(&oob.peer_oob_data.randomizer, p_r, BT_OCTET16_LEN); in BTM_BleSecureConnectionOobDataReply() 1163 params.param_len = BT_OCTET16_LEN; in btm_ble_rand_enc_complete() 1295 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1314 for (i = 0; i < BT_OCTET16_LEN; i++) { in btm_sec_save_le_key() 1330 memcpy(p_rec->ble.keys.pcsrk, p_keys->pcsrk_key.csrk, BT_OCTET16_LEN); in btm_sec_save_le_key() 1349 memcpy(p_rec->ble.keys.lltk, p_keys->lenc_key.ltk, BT_OCTET16_LEN); in btm_sec_save_le_key() [all …]
|
D | btm_ble_addr.c | 114 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_gen_resolve_paddr_low() 314 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_addr_resolvable() 363 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, in btm_ble_match_random_bda()
|
D | btm_ble_multi_adv.c | 409 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_ble_multi_adv_gen_rpa_cmpl()
|
D | btm_ble_privacy.c | 916 ARRAY_TO_STREAM(p, p_dev_rec->ble.keys.irk, BT_OCTET16_LEN); in btm_ble_resolving_list_load_dev()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_attr.c | 227 p_rsp->attr_value.len = BT_OCTET16_LEN; in gatt_proc_read() 228 memcpy(p_rsp->attr_value.value, gatt_cb.database_hash, BT_OCTET16_LEN); in gatt_proc_read() 757 …->is_robust_cache_change_aware = (memcmp(stored_hash, gatt_cb.database_hash, BT_OCTET16_LEN) == 0); in gatt_sr_init_cl_status()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/ |
D | smp_api.h | 277 UINT8 param_buf[BT_OCTET16_LEN];
|
D | bt_types.h | 317 #define BT_OCTET16_LEN 16 macro 318 typedef UINT8 BT_OCTET16[BT_OCTET16_LEN]; /* octet array: size 16 */
|
D | btm_ble_api.h | 283 UINT8 param_buf[BT_OCTET16_LEN];
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/include/ |
D | bta_dm_int.h | 441 UINT8 value[BT_OCTET16_LEN]; 442 UINT8 c[BT_OCTET16_LEN]; 443 UINT8 r[BT_OCTET16_LEN]; 450 UINT8 c[BT_OCTET16_LEN]; 451 UINT8 r[BT_OCTET16_LEN];
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 1662 dst->sc_oob_req_reply.p_c = osi_malloc(BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy() 1664 memcpy(dst->sc_oob_req_reply.p_c, src->sc_oob_req_reply.p_c, BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy() 1670 dst->sc_oob_req_reply.p_r = osi_malloc(BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy() 1672 memcpy(dst->sc_oob_req_reply.p_r, src->sc_oob_req_reply.p_r, BT_OCTET16_LEN); in btc_gap_ble_arg_deep_copy()
|