/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | smp_api.c | 303 void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in SMP_PasskeyReply() argument 309 passkey, res); in SMP_PasskeyReply() 327 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 328 SMP_TRACE_WARNING ("SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", passkey); in SMP_PasskeyReply() 333 smp_sm_event(&smp_cb, SMP_SC_KEY_READY_EVT, &passkey); in SMP_PasskeyReply() 335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply() 354 void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey) in SMP_SetStaticPasskey() argument 356 SMP_TRACE_DEBUG("static passkey %6d", passkey); in SMP_SetStaticPasskey() 359 p_cb->static_passkey = passkey; in SMP_SetStaticPasskey()
|
D | smp_keys.c | 220 UINT32 passkey = p_cb->static_passkey; in smp_use_static_passkey() local 223 UINT32_TO_STREAM(tt, passkey); in smp_use_static_passkey() 229 (*p_cb->p_callback)(SMP_PASSKEY_NOTIF_EVT, p_cb->pairing_bda, (tSMP_EVT_DATA *)&passkey); in smp_use_static_passkey() 233 smp_sm_event(&smp_cb, SMP_KEY_READY_EVT, &passkey); in smp_use_static_passkey() 278 UINT32 passkey; /* 19655 test number; */ in smp_proc_passkey() local 282 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey() 283 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey() 286 while (passkey > BTM_MAX_PASSKEY_VAL) { in smp_proc_passkey() 287 passkey >>= 1; in smp_proc_passkey() 292 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey() [all …]
|
D | smp_act.c | 132 cb_data.passkey = p_data->passkey; in smp_send_app_cback() 1864 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification() 1867 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
|
D | smp_utils.c | 833 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) in smp_convert_string_to_tk() argument 838 UINT32_TO_STREAM(p, passkey); in smp_convert_string_to_tk()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/ |
D | smp_api.h | 264 UINT32 passkey; member 403 extern void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey); 418 extern void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey);
|
D | btm_ble_api.h | 1839 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey); 1854 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey);
|
D | btm_api.h | 1571 UINT32 passkey; /* passkey */ member 3702 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey);
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/include/ |
D | btc_gap_bt.h | 124 uint32_t passkey; member
|
D | btc_gap_ble.h | 226 uint32_t passkey; member
|
/hal_espressif-latest/components/bt/host/bluedroid/api/ |
D | esp_gap_bt_api.c | 333 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument 346 arg.passkey_reply.passkey = passkey; in esp_bt_gap_ssp_passkey_reply()
|
D | esp_gap_ble_api.c | 662 uint32_t passkey = 0; in esp_ble_gap_set_security_param() local 665 passkey += (((uint8_t *)value)[i]<<(8*i)); in esp_ble_gap_set_security_param() 667 if(passkey > 999999) { in esp_ble_gap_set_security_param() 731 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument 742 arg.enc_passkey_replay.passkey = passkey; in esp_ble_passkey_reply()
|
/hal_espressif-latest/components/bt/host/bluedroid/api/include/api/ |
D | esp_gap_bt_api.h | 379 uint32_t passkey; /*!< the numeric value for passkey entry. */ member 794 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
|
D | esp_gap_ble_api.h | 594 …uint32_t passkey; /*!< the numeric value for comparison. If just_works, do not show t… member 2099 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/core/ |
D | btc_dm.c | 515 param.key_notif.passkey = p_key_notif->passkey; in btc_dm_sp_key_notif_evt() 960 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler() 1028 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/ |
D | bta_dm_api.c | 824 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument 831 p_msg->passkey = passkey; in BTA_DmPasskeyReqReply() 1161 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument 1173 p_msg->passkey = passkey; in BTA_DmBlePasskeyReply() 1179 void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey) in BTA_DmBleSetStaticPasskey() argument 1188 p_msg->static_passkey = passkey; in BTA_DmBleSetStaticPasskey()
|
D | bta_dm_act.c | 1452 BTM_PasskeyReqReply(res, p_data->key_req.bd_addr, p_data->key_req.passkey); in bta_dm_key_req() 3028 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback() 3237 bta_dm_cb.num_val = sec_event.key_notif.passkey = p_data->key_notif.passkey; in bta_dm_sp_cback() 4823 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 4852 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 4997 …BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_SUCCESS, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply() 4999 …keyReply(p_data->ble_passkey_reply.bd_addr, BTM_NOT_AUTHORIZED, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/ |
D | smp_int.h | 236 UINT32 passkey; member 479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/include/bta/ |
D | bta_api.h | 978 …UINT32 passkey; /* the numeric value for comparison. If just_works, do not show th… member 2070 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey); 2281 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey); 2297 extern void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 404 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in BTM_BlePasskeyReply() argument 417 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply() 434 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey) in BTM_BleSetStaticPasskey() argument 437 SMP_SetStaticPasskey(add, passkey); in BTM_BleSetStaticPasskey()
|
D | btm_sec.c | 1558 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) in BTM_PasskeyReqReply() argument 1590 if (passkey > BTM_MAX_PASSKEY_VAL) { in BTM_PasskeyReqReply() 1602 btsnd_hcic_user_passkey_reply (bd_addr, passkey); in BTM_PasskeyReqReply() 3572 STREAM_TO_UINT32 (evt_data.key_notif.passkey, p); in btm_proc_sp_req_evt() 3574 BTM_TRACE_DEBUG ("BTM_SP_KEY_NOTIF_EVT: passkey: %u\n", evt_data.key_notif.passkey); in btm_proc_sp_req_evt()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/dm/include/ |
D | bta_dm_int.h | 471 UINT32 passkey; member 627 UINT32 passkey; member
|
/hal_espressif-latest/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 2076 uint32_t passkey = 0; in btc_gap_ble_call_handler() local 2079 passkey += (((uint8_t *)value)[i]<<(8*i)); in btc_gap_ble_call_handler() 2081 BTA_DmBleSetStaticPasskey(true, passkey); in btc_gap_ble_call_handler() 2115 … BTA_DmBlePasskeyReply(bd_addr, arg->enc_passkey_replay.accept, arg->enc_passkey_replay.passkey); in btc_gap_ble_call_handler()
|
D | btc_gap_bt.c | 678 …keyReqReply(arg->passkey_reply.accept, arg->passkey_reply.bda.address, arg->passkey_reply.passkey); in btc_gap_bt_ssp_passkey_reply()
|