Searched refs:param_buf (Results 1 – 7 of 7) sorted by relevance
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble_addr.c | 56 p_cb->private_addr[5] = p->param_buf[0]; in btm_gen_resolve_paddr_cmpl() 57 p_cb->private_addr[4] = p->param_buf[1]; in btm_gen_resolve_paddr_cmpl() 58 p_cb->private_addr[3] = p->param_buf[2]; in btm_gen_resolve_paddr_cmpl() 106 p->param_buf[2] &= (~BLE_RESOLVE_ADDR_MASK); in btm_gen_resolve_paddr_low() 107 p->param_buf[2] |= BLE_RESOLVE_ADDR_MSB; in btm_gen_resolve_paddr_low() 109 p_cb->private_addr[2] = p->param_buf[0]; in btm_gen_resolve_paddr_low() 110 p_cb->private_addr[1] = p->param_buf[1]; in btm_gen_resolve_paddr_low() 111 p_cb->private_addr[0] = p->param_buf[2]; in btm_gen_resolve_paddr_low() 114 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_gen_resolve_paddr_low() 162 pp = p->param_buf; in btm_gen_non_resolve_paddr_cmpl() [all …]
|
D | btm_ble_multi_adv.c | 402 p->param_buf[2] &= (~BLE_RESOLVE_ADDR_MASK); in btm_ble_multi_adv_gen_rpa_cmpl() 403 p->param_buf[2] |= BLE_RESOLVE_ADDR_MSB; in btm_ble_multi_adv_gen_rpa_cmpl() 405 p_inst->rpa[2] = p->param_buf[0]; in btm_ble_multi_adv_gen_rpa_cmpl() 406 p_inst->rpa[1] = p->param_buf[1]; in btm_ble_multi_adv_gen_rpa_cmpl() 407 p_inst->rpa[0] = p->param_buf[2]; in btm_ble_multi_adv_gen_rpa_cmpl() 409 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_ble_multi_adv_gen_rpa_cmpl() 413 p_inst->rpa[5] = output.param_buf[0]; in btm_ble_multi_adv_gen_rpa_cmpl() 414 p_inst->rpa[4] = output.param_buf[1]; in btm_ble_multi_adv_gen_rpa_cmpl() 415 p_inst->rpa[3] = output.param_buf[2]; in btm_ble_multi_adv_gen_rpa_cmpl()
|
D | btm_ble.c | 1146 UINT8 *p_dest = params.param_buf; in btm_ble_rand_enc_complete() 2604 memcpy(&btm_cb.devcb.ble_encryption_key_value[8], p->param_buf, BT_OCTET8_LEN); 2627 memcpy(&btm_cb.devcb.ble_encryption_key_value[0], p->param_buf, BT_OCTET8_LEN); 2652 memcpy(btm_cb.devcb.id_keys.irk, p->param_buf, BT_OCTET16_LEN); 2695 memcpy(btm_cb.devcb.id_keys.dhk, p->param_buf, BT_OCTET16_LEN); 2732 memcpy(&btm_cb.devcb.id_keys.ir[8], p->param_buf, BT_OCTET8_LEN); 2763 memcpy(btm_cb.devcb.id_keys.ir, p->param_buf, BT_OCTET8_LEN);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_keys.c | 200 p = p_out->param_buf; in smp_encrypt_data() 203 …smp_debug_print_nbyte_little_endian(p_out->param_buf, (const UINT8 *)"Encrypted text", SMP_ENCRYT_… in smp_encrypt_data() 279 UINT8 *pp = p->param_buf; in smp_proc_passkey() 333 memcpy(output.param_buf, p_cb->ltk, SMP_ENCRYT_DATA_SIZE); in smp_generate_stk() 471 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk() 693 smp_debug_print_nbyte_little_endian (p->param_buf, (const UINT8 *)"C1", 16); in smp_calculate_comfirm_cont() 699 smp_xor_128(p2, p->param_buf); in smp_calculate_comfirm_cont() 776 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm() 784 key.p_data = p->param_buf; in smp_process_confirm() 807 smp_debug_print_nbyte_little_endian (p->param_buf, (const UINT8 *)"Compare", 16); in smp_process_compare() [all …]
|
D | smp_cmac.c | 150 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate() 155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate() 212 UINT8 *pp = p->param_buf; in cmac_subkey_cont()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/ |
D | smp_api.h | 277 UINT8 param_buf[BT_OCTET16_LEN]; member
|
D | btm_ble_api.h | 283 UINT8 param_buf[BT_OCTET16_LEN]; member
|