/system/bt/btif/include/ |
H A D | btif_api.h | 290 ** Description BT SSP passkey reply 296 uint8_t accept, uint32_t passkey); 309 uint32_t passkey);
|
/system/bt/stack/smp/ |
H A D | smp_api.c | 295 ** passkey request to the application. 297 ** Parameters: bd_addr - Address of the device for which passkey was requested 299 ** passkey - numeric value in the range of 303 void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 309 passkey, res); 330 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) 332 SMP_TRACE_WARNING ("SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", passkey); 339 smp_sm_event(&smp_cb, SMP_SC_KEY_READY_EVT, &passkey); 343 smp_convert_string_to_tk(p_cb->tk, passkey); [all...] |
H A D | smp_keys.c | 180 ** Description This function is called to generate passkey. 201 ** Description This function is called to process a passkey. 210 UINT32 passkey; /* 19655 test number; */ local 214 STREAM_TO_UINT32(passkey, pp); 215 passkey &= ~SMP_PASSKEY_MASK; 218 while (passkey > BTM_MAX_PASSKEY_VAL) 219 passkey >>= 1; 223 UINT32_TO_STREAM(tt, passkey); 230 (*p_cb->p_callback)(SMP_PASSKEY_NOTIF_EVT, p_cb->pairing_bda, (tSMP_EVT_DATA *)&passkey); 235 smp_sm_event(&smp_cb, SMP_KEY_READY_EVT, &passkey); [all...] |
H A D | smp_int.h | 240 UINT32 passkey; member in union:__anon1288 296 BT_OCTET16 local_random; /* local randomizer - passkey or OOB randomizer */ 297 BT_OCTET16 peer_random; /* peer randomizer - passkey or OOB randomizer */ 317 UINT8 round; /* authentication stage 1 round for passkey association model */ 481 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
H A D | smp_act.c | 164 cb_data.passkey = p_data->passkey; 1382 /* generate passkey and notify application */ 1584 /* user has to provide passkey */ 1589 /* passkey has to be provided to user */ 1858 ** Description Starts SC passkey entry verification. 1866 UINT32_TO_STREAM(p, p_data->passkey); 1869 UINT32_TO_STREAM(p, p_data->passkey);
|
H A D | smp_utils.c | 772 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) argument 777 UINT32_TO_STREAM(p, passkey); 1288 ** calculation for SC passkey entry association mode
|
/system/bt/stack/include/ |
H A D | smp_api.h | 56 #define SMP_PASSKEY_NOTIF_EVT 3 /* passkey notification event */ 57 #define SMP_PASSKEY_REQ_EVT 4 /* passkey request event */ 206 #define SMP_SC_KEY_STARTED 0 /* passkey entry started */ 207 #define SMP_SC_KEY_ENTERED 1 /* passkey digit entered */ 208 #define SMP_SC_KEY_ERASED 2 /* passkey digit erased */ 209 #define SMP_SC_KEY_CLEARED 3 /* passkey cleared */ 210 #define SMP_SC_KEY_COMPLT 4 /* passkey entry completed */ 272 UINT32 passkey; member in union:__anon1211 396 ** passkey - numeric value in the range of 400 extern void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey); [all...] |
H A D | btm_api.h | 1471 UINT32 passkey; /* passkey */ member in struct:__anon1056 1476 BTM_SP_KEY_STARTED, /* 0 - passkey entry started */ 1477 BTM_SP_KEY_ENTERED, /* 1 - passkey digit entered */ 1478 BTM_SP_KEY_ERASED, /* 2 - passkey digit erased */ 1479 BTM_SP_KEY_CLEARED, /* 3 - passkey cleared */ 1480 BTM_SP_KEY_COMPLT, /* 4 - passkey entry completed */ 3479 ** Description This function is called to provide the passkey for 3484 ** passkey - numeric value in the range of 0 - 999999(0xF423F). 3487 extern void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey); [all...] |
H A D | btm_ble_api.h | 1201 ** passkey request to the application. 1203 ** Parameters: bd_addr - Address of the device for which passkey was requested 1205 ** passkey - numeric value in the range of 1209 extern void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey);
|
/system/bt/btif/src/ |
H A D | bluetooth.c | 322 uint8_t accept, uint32_t passkey) 328 return btif_dm_ssp_reply(bd_addr, variant, accept, passkey); 321 ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument
|
H A D | btif_dm.c | 1083 p_ssp_key_notif->passkey); 2523 UINT32 passkey = 0; local 2529 passkey += (multi[i] * (pin_code->pin[i] - '0')); 2531 BTIF_TRACE_DEBUG("btif_dm_pin_reply: passkey: %d", passkey); 2532 BTA_DmBlePasskeyReply(remote_bd_addr, accept, passkey); 2561 uint32_t passkey) 2563 UNUSED(passkey); 3033 p_ssp_key_notif->passkey); 3322 p_notif_req->passkey); 2559 btif_dm_ssp_reply(const bt_bdaddr_t *bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument [all...] |
/system/bt/bta/dm/ |
H A D | bta_dm_api.c | 691 ** Description Send BLE SMP passkey reply. 694 ** accept - passkey entry sucessful or declined. 695 ** passkey - passkey value, must be a 6 digit number, 701 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) argument 712 p_msg->passkey = passkey;
|
H A D | bta_dm_act.c | 2658 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ 2680 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ 2898 bta_dm_cb.num_val = sec_event.key_notif.passkey = p_data->key_notif.passkey; 4369 sec_event.key_notif.passkey = p_data->key_notif; 4386 sec_event.key_notif.passkey = p_data->key_notif; 4538 BTM_BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_SUCCESS, p_data->ble_passkey_reply.passkey); 4542 BTM_BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_NOT_AUTHORIZED, p_data->ble_passkey_reply.passkey);
|
H A D | bta_dm_int.h | 412 UINT32 passkey; member in struct:__anon102
|
/system/bt/bta/include/ |
H A D | bta_api.h | 584 #define BTA_DM_BLE_PASSKEY_NOTIF_EVT 17 /* SMP passkey notification event */ 585 #define BTA_DM_BLE_PASSKEY_REQ_EVT 18 /* SMP passkey request event */ 831 BTA_SP_KEY_STARTED, /* passkey entry started */ 832 BTA_SP_KEY_ENTERED, /* passkey digit entered */ 833 BTA_SP_KEY_ERASED, /* passkey digit erased */ 834 BTA_SP_KEY_CLEARED, /* passkey cleared */ 835 BTA_SP_KEY_COMPLT /* passkey entry completed */ 853 UINT32 passkey; /* the numeric value for comparison. If just_works, do not show this number to UI */ member in struct:__anon309 882 tBTA_DM_SP_KEY_NOTIF key_notif; /* passkey notification */ 1726 ** Description Send BLE SMP passkey repl [all...] |
/system/bt/stack/btm/ |
H A D | btm_sec.c | 1563 ** Description This function is called to provide the passkey for 1568 ** passkey - numeric value in the range of 1573 void BTM_PasskeyReqReply(tBTM_STATUS res, BD_ADDR bd_addr, UINT32 passkey) argument 1606 if (passkey > BTM_MAX_PASSKEY_VAL) 1618 btsnd_hcic_user_passkey_reply (bd_addr, passkey); 1627 ** Description This function is used during the passkey entry model 3641 /* Numeric confirmation. Need user to conf the passkey */ 3672 STREAM_TO_UINT32 (evt_data.key_notif.passkey, p); 3674 BTM_TRACE_DEBUG ("BTM_SP_KEY_NOTIF_EVT: passkey: %u", evt_data.key_notif.passkey); [all...] |
H A D | btm_ble.c | 385 ** passkey request to the application. 387 ** Parameters: bd_addr - Address of the device for which passkey was requested 390 ** p_passkey - pointer to array with the passkey 394 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) argument 408 SMP_PasskeyReply(bd_addr, res_smp, passkey);
|