Home
last modified time | relevance | path

Searched refs:passkey (Results 1 – 23 of 23) sorted by relevance

/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_api.c303 void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in SMP_PasskeyReply() argument
309 passkey, res); in SMP_PasskeyReply()
327 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply()
328 SMP_TRACE_WARNING ("SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", passkey); in SMP_PasskeyReply()
333 smp_sm_event(&smp_cb, SMP_SC_KEY_READY_EVT, &passkey); in SMP_PasskeyReply()
335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply()
354 void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey) in SMP_SetStaticPasskey() argument
356 SMP_TRACE_DEBUG("static passkey %6d", passkey); in SMP_SetStaticPasskey()
359 p_cb->static_passkey = passkey; in SMP_SetStaticPasskey()
Dsmp_keys.c220 UINT32 passkey = p_cb->static_passkey; in smp_use_static_passkey() local
223 UINT32_TO_STREAM(tt, passkey); in smp_use_static_passkey()
229 (*p_cb->p_callback)(SMP_PASSKEY_NOTIF_EVT, p_cb->pairing_bda, (tSMP_EVT_DATA *)&passkey); in smp_use_static_passkey()
233 smp_sm_event(&smp_cb, SMP_KEY_READY_EVT, &passkey); in smp_use_static_passkey()
278 UINT32 passkey; /* 19655 test number; */ in smp_proc_passkey() local
282 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey()
283 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey()
286 while (passkey > BTM_MAX_PASSKEY_VAL) { in smp_proc_passkey()
287 passkey >>= 1; in smp_proc_passkey()
292 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey()
[all …]
Dsmp_act.c132 cb_data.passkey = p_data->passkey; in smp_send_app_cback()
1864 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
1867 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
Dsmp_utils.c833 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) in smp_convert_string_to_tk() argument
838 UINT32_TO_STREAM(p, passkey); in smp_convert_string_to_tk()
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/
Dsmp_api.h264 UINT32 passkey; member
403 extern void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey);
418 extern void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey);
Dbtm_ble_api.h1839 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey);
1854 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey);
Dbtm_api.h1571 UINT32 passkey; /* passkey */ member
3702 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey);
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/include/
Dbtc_gap_bt.h124 uint32_t passkey; member
Dbtc_gap_ble.h226 uint32_t passkey; member
/hal_espressif-latest/components/bt/host/bluedroid/api/
Desp_gap_bt_api.c333 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument
346 arg.passkey_reply.passkey = passkey; in esp_bt_gap_ssp_passkey_reply()
Desp_gap_ble_api.c662 uint32_t passkey = 0; in esp_ble_gap_set_security_param() local
665 passkey += (((uint8_t *)value)[i]<<(8*i)); in esp_ble_gap_set_security_param()
667 if(passkey > 999999) { in esp_ble_gap_set_security_param()
731 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument
742 arg.enc_passkey_replay.passkey = passkey; in esp_ble_passkey_reply()
/hal_espressif-latest/components/bt/host/bluedroid/api/include/api/
Desp_gap_bt_api.h379 uint32_t passkey; /*!< the numeric value for passkey entry. */ member
794 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
Desp_gap_ble_api.h594 …uint32_t passkey; /*!< the numeric value for comparison. If just_works, do not show t… member
2099 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
/hal_espressif-latest/components/bt/host/bluedroid/btc/core/
Dbtc_dm.c515 param.key_notif.passkey = p_key_notif->passkey; in btc_dm_sp_key_notif_evt()
960 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
1028 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/
Dbta_dm_api.c824 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument
831 p_msg->passkey = passkey; in BTA_DmPasskeyReqReply()
1161 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument
1173 p_msg->passkey = passkey; in BTA_DmBlePasskeyReply()
1179 void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey) in BTA_DmBleSetStaticPasskey() argument
1188 p_msg->static_passkey = passkey; in BTA_DmBleSetStaticPasskey()
Dbta_dm_act.c1452 BTM_PasskeyReqReply(res, p_data->key_req.bd_addr, p_data->key_req.passkey); in bta_dm_key_req()
3028 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback()
3237 bta_dm_cb.num_val = sec_event.key_notif.passkey = p_data->key_notif.passkey; in bta_dm_sp_cback()
4823 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback()
4852 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback()
4997 …BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_SUCCESS, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
4999 …keyReply(p_data->ble_passkey_reply.bd_addr, BTM_NOT_AUTHORIZED, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/
Dsmp_int.h236 UINT32 passkey; member
479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
/hal_espressif-latest/components/bt/host/bluedroid/bta/include/bta/
Dbta_api.h978 …UINT32 passkey; /* the numeric value for comparison. If just_works, do not show th… member
2070 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey);
2281 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey);
2297 extern void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey);
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c404 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in BTM_BlePasskeyReply() argument
417 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply()
434 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey) in BTM_BleSetStaticPasskey() argument
437 SMP_SetStaticPasskey(add, passkey); in BTM_BleSetStaticPasskey()
Dbtm_sec.c1558 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) in BTM_PasskeyReqReply() argument
1590 if (passkey > BTM_MAX_PASSKEY_VAL) { in BTM_PasskeyReqReply()
1602 btsnd_hcic_user_passkey_reply (bd_addr, passkey); in BTM_PasskeyReqReply()
3572 STREAM_TO_UINT32 (evt_data.key_notif.passkey, p); in btm_proc_sp_req_evt()
3574 BTM_TRACE_DEBUG ("BTM_SP_KEY_NOTIF_EVT: passkey: %u\n", evt_data.key_notif.passkey); in btm_proc_sp_req_evt()
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/include/
Dbta_dm_int.h471 UINT32 passkey; member
627 UINT32 passkey; member
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c2076 uint32_t passkey = 0; in btc_gap_ble_call_handler() local
2079 passkey += (((uint8_t *)value)[i]<<(8*i)); in btc_gap_ble_call_handler()
2081 BTA_DmBleSetStaticPasskey(true, passkey); in btc_gap_ble_call_handler()
2115 … BTA_DmBlePasskeyReply(bd_addr, arg->enc_passkey_replay.accept, arg->enc_passkey_replay.passkey); in btc_gap_ble_call_handler()
Dbtc_gap_bt.c678 …keyReqReply(arg->passkey_reply.accept, arg->passkey_reply.bda.address, arg->passkey_reply.passkey); in btc_gap_bt_ssp_passkey_reply()