Home
last modified time | relevance | path

Searched refs:param_buf (Results 1 – 7 of 7) sorted by relevance

/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble_addr.c56 p_cb->private_addr[5] = p->param_buf[0]; in btm_gen_resolve_paddr_cmpl()
57 p_cb->private_addr[4] = p->param_buf[1]; in btm_gen_resolve_paddr_cmpl()
58 p_cb->private_addr[3] = p->param_buf[2]; in btm_gen_resolve_paddr_cmpl()
106 p->param_buf[2] &= (~BLE_RESOLVE_ADDR_MASK); in btm_gen_resolve_paddr_low()
107 p->param_buf[2] |= BLE_RESOLVE_ADDR_MSB; in btm_gen_resolve_paddr_low()
109 p_cb->private_addr[2] = p->param_buf[0]; in btm_gen_resolve_paddr_low()
110 p_cb->private_addr[1] = p->param_buf[1]; in btm_gen_resolve_paddr_low()
111 p_cb->private_addr[0] = p->param_buf[2]; in btm_gen_resolve_paddr_low()
114 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_gen_resolve_paddr_low()
162 pp = p->param_buf; in btm_gen_non_resolve_paddr_cmpl()
[all …]
Dbtm_ble_multi_adv.c402 p->param_buf[2] &= (~BLE_RESOLVE_ADDR_MASK); in btm_ble_multi_adv_gen_rpa_cmpl()
403 p->param_buf[2] |= BLE_RESOLVE_ADDR_MSB; in btm_ble_multi_adv_gen_rpa_cmpl()
405 p_inst->rpa[2] = p->param_buf[0]; in btm_ble_multi_adv_gen_rpa_cmpl()
406 p_inst->rpa[1] = p->param_buf[1]; in btm_ble_multi_adv_gen_rpa_cmpl()
407 p_inst->rpa[0] = p->param_buf[2]; in btm_ble_multi_adv_gen_rpa_cmpl()
409 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) { in btm_ble_multi_adv_gen_rpa_cmpl()
413 p_inst->rpa[5] = output.param_buf[0]; in btm_ble_multi_adv_gen_rpa_cmpl()
414 p_inst->rpa[4] = output.param_buf[1]; in btm_ble_multi_adv_gen_rpa_cmpl()
415 p_inst->rpa[3] = output.param_buf[2]; in btm_ble_multi_adv_gen_rpa_cmpl()
Dbtm_ble.c1146 UINT8 *p_dest = params.param_buf; in btm_ble_rand_enc_complete()
2604 memcpy(&btm_cb.devcb.ble_encryption_key_value[8], p->param_buf, BT_OCTET8_LEN);
2627 memcpy(&btm_cb.devcb.ble_encryption_key_value[0], p->param_buf, BT_OCTET8_LEN);
2652 memcpy(btm_cb.devcb.id_keys.irk, p->param_buf, BT_OCTET16_LEN);
2695 memcpy(btm_cb.devcb.id_keys.dhk, p->param_buf, BT_OCTET16_LEN);
2732 memcpy(&btm_cb.devcb.id_keys.ir[8], p->param_buf, BT_OCTET8_LEN);
2763 memcpy(btm_cb.devcb.id_keys.ir, p->param_buf, BT_OCTET8_LEN);
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_keys.c200 p = p_out->param_buf; in smp_encrypt_data()
203 …smp_debug_print_nbyte_little_endian(p_out->param_buf, (const UINT8 *)"Encrypted text", SMP_ENCRYT_… in smp_encrypt_data()
279 UINT8 *pp = p->param_buf; in smp_proc_passkey()
333 memcpy(output.param_buf, p_cb->ltk, SMP_ENCRYT_DATA_SIZE); in smp_generate_stk()
471 memcpy((void *)p_cb->csrk, output.param_buf, BT_OCTET16_LEN); in smp_compute_csrk()
693 smp_debug_print_nbyte_little_endian (p->param_buf, (const UINT8 *)"C1", 16); in smp_calculate_comfirm_cont()
699 smp_xor_128(p2, p->param_buf); in smp_calculate_comfirm_cont()
776 memcpy(p_cb->confirm, p->param_buf, BT_OCTET16_LEN); in smp_process_confirm()
784 key.p_data = p->param_buf; in smp_process_confirm()
807 smp_debug_print_nbyte_little_endian (p->param_buf, (const UINT8 *)"Compare", 16); in smp_process_compare()
[all …]
Dsmp_cmac.c150 memcpy(x, output.param_buf, BT_OCTET16_LEN); in cmac_aes_k_calculate()
155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate()
212 UINT8 *pp = p->param_buf; in cmac_subkey_cont()
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/
Dsmp_api.h277 UINT8 param_buf[BT_OCTET16_LEN]; member
Dbtm_ble_api.h283 UINT8 param_buf[BT_OCTET16_LEN]; member