Searched refs:penc_key (Results 1 - 6 of 6) sorted by relevance
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_dm.h | 103 btif_dm_ble_penc_keys_t penc_key; /* received peer encryption key */ member in struct:__anon1008
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 1747 memcpy(pairing_cb.ble.penc_key.ltk,p_data->ble_key.key_value.penc_key.ltk, 16); 1748 memcpy(pairing_cb.ble.penc_key.rand, p_data->ble_key.key_value.penc_key.rand,8); 1749 pairing_cb.ble.penc_key.ediv = p_data->ble_key.key_value.penc_key.ediv; 1750 pairing_cb.ble.penc_key.sec_level = p_data->ble_key.key_value.penc_key.sec_level; 1754 BTIF_TRACE_DEBUG("pairing_cb.ble.penc_key.ltk[%d]=0x%02x",i,pairing_cb.ble.penc_key [all...] |
H A D | btif_storage.c | 1210 BTIF_TRACE_DEBUG("penc_key.ltk[%d]=0x%02x",i,p->penc_key.ltk[i]); 1214 BTIF_TRACE_DEBUG("penc_key.rand[%d]=0x%02x",i,p->penc_key.rand[i]); 1216 BTIF_TRACE_DEBUG("p->penc_key.ediv=0x%04x",p->penc_key.ediv); 1217 BTIF_TRACE_DEBUG("p->penc_key.sec_level=0x%02x",p->penc_key.sec_level); 1218 BTIF_TRACE_DEBUG("p->penc_key.key_size=0x%02x",p->penc_key [all...] |
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 896 memcpy(p_rec->ble.keys.ltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); 897 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); 898 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; 899 p_rec->ble.keys.ediv = p_keys->penc_key.ediv; 900 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; 903 if (p_keys->penc_key.sec_level == SMP_SEC_AUTHENTICATED)
|
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_api.h | 710 tBTA_LE_PENC_KEYS penc_key; /* received peer encryption key */ member in union:__anon703
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | btm_api.h | 1693 tBTM_LE_PENC_KEYS penc_key; /* received peer encryption key */ member in union:__anon1450
|
Completed in 1945 milliseconds