Searched defs:passkey (Results 1 - 13 of 13) sorted by relevance

/system/bt/stack/smp/
H A Dsmp_api.cc284 * passkey request to the application.
286 * Parameters: bd_addr - Address of the device for which passkey was
289 * passkey - numeric value in the range of
295 uint32_t passkey) {
298 SMP_TRACE_EVENT("SMP_PasskeyReply: Key: %d Result:%d", passkey, res);
316 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) {
318 "SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail",
319 passkey);
328 smp_int_data.passkey = passkey;
294 SMP_PasskeyReply(const RawAddress& bd_addr, uint8_t res, uint32_t passkey) argument
[all...]
H A Dsmp_keys.cc168 * Description This function is called to process a passkey.
175 uint32_t passkey; /* 19655 test number; */ local
179 STREAM_TO_UINT32(passkey, pp);
180 passkey &= ~SMP_PASSKEY_MASK;
183 while (passkey > BTM_MAX_PASSKEY_VAL) passkey >>= 1;
187 UINT32_TO_STREAM(tt, passkey);
191 smp_evt_data.passkey = passkey;
198 smp_int_data.passkey
[all...]
H A Dsmp_utils.cc787 void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey) { argument
791 UINT32_TO_STREAM(p, passkey);
1297 * commitment calculation for SC passkey entry association mode
H A Dsmp_int.h226 uint32_t passkey; member in union:__anon1344
284 BT_OCTET16 local_random; /* local randomizer - passkey or OOB randomizer */
285 BT_OCTET16 peer_random; /* peer randomizer - passkey or OOB randomizer */
308 round; /* authentication stage 1 round for passkey association model */
474 extern void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey);
/system/bt/btif/src/
H A Dbluetooth.cc299 uint8_t accept, uint32_t passkey) {
303 return btif_dm_ssp_reply(bd_addr, variant, accept, passkey);
298 ssp_reply(const RawAddress* bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument
H A Dbtif_dm.cc1028 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey);
2350 uint32_t passkey = 0; local
2353 passkey += (multi[i] * (pin_code->pin[i] - '0'));
2355 BTIF_TRACE_DEBUG("btif_dm_pin_reply: passkey: %d", passkey);
2356 BTA_DmBlePasskeyReply(*bd_addr, accept, passkey);
2377 UNUSED_ATTR uint32_t passkey) {
2792 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey);
3044 BT_SSP_VARIANT_PASSKEY_CONFIRMATION, p_notif_req->passkey);
2375 btif_dm_ssp_reply(const RawAddress* bd_addr, bt_ssp_variant_t variant, uint8_t accept, UNUSED_ATTR uint32_t passkey) argument
/system/bt/bta/dm/
H A Dbta_dm_api.cc475 * Description Send BLE SMP passkey reply.
478 * accept - passkey entry sucessful or declined.
479 * passkey - passkey value, must be a 6 digit number,
486 uint32_t passkey) {
488 accept, accept ? passkey : 0));
485 BTA_DmBlePasskeyReply(const RawAddress& bd_addr, bool accept, uint32_t passkey) argument
H A Dbta_dm_act.cc2279 sec_event.key_notif.passkey =
2306 sec_event.key_notif.passkey =
2498 bta_dm_cb.num_val = sec_event.key_notif.passkey =
2499 p_data->key_notif.passkey;
3795 sec_event.key_notif.passkey = p_data->key_notif;
3813 sec_event.key_notif.passkey = p_data->key_notif;
3947 uint32_t passkey) {
3949 passkey);
3946 bta_dm_ble_passkey_reply(const RawAddress& bd_addr, bool accept, uint32_t passkey) argument
/system/bt/stack/include/
H A Dsmp_api_types.h49 #define SMP_PASSKEY_NOTIF_EVT 3 /* passkey notification event */
50 #define SMP_PASSKEY_REQ_EVT 4 /* passkey request event */
194 #define SMP_SC_KEY_STARTED 0 /* passkey entry started */
195 #define SMP_SC_KEY_ENTERED 1 /* passkey digit entered */
196 #define SMP_SC_KEY_ERASED 2 /* passkey digit erased */
197 #define SMP_SC_KEY_CLEARED 3 /* passkey cleared */
198 #define SMP_SC_KEY_COMPLT 4 /* passkey entry completed */
252 uint32_t passkey; member in union:__anon1278
H A Dbtm_api_types.h1459 uint32_t passkey; /* passkey */ member in struct:__anon1150
1463 BTM_SP_KEY_STARTED, /* 0 - passkey entry started */
1464 BTM_SP_KEY_ENTERED, /* 1 - passkey digit entered */
1465 BTM_SP_KEY_ERASED, /* 2 - passkey digit erased */
1466 BTM_SP_KEY_CLEARED, /* 3 - passkey cleared */
1467 BTM_SP_KEY_COMPLT, /* 4 - passkey entry completed */
/system/bt/stack/btm/
H A Dbtm_ble.cc363 * passkey request to the application.
365 * Parameters: bd_addr - Address of the device for which passkey was
369 * p_passkey - pointer to array with the passkey
375 uint32_t passkey) {
387 SMP_PasskeyReply(bd_addr, res_smp, passkey);
374 BTM_BlePasskeyReply(const RawAddress& bd_addr, uint8_t res, uint32_t passkey) argument
H A Dbtm_sec.cc1425 * Description This function is called to provide the passkey for
1430 * passkey - numeric value in the range of
1437 uint32_t passkey) {
1468 if (passkey > BTM_MAX_PASSKEY_VAL) res = BTM_ILLEGAL_VALUE;
1479 btsnd_hcic_user_passkey_reply(bd_addr, passkey);
1488 * Description This function is used during the passkey entry model
3391 /* Numeric confirmation. Need user to conf the passkey */
3436 STREAM_TO_UINT32(evt_data.key_notif.passkey, p);
3437 BTM_TRACE_DEBUG("BTM_SP_KEY_NOTIF_EVT: passkey: %u",
3438 evt_data.key_notif.passkey);
1436 BTM_PasskeyReqReply(tBTM_STATUS res, const RawAddress& bd_addr, uint32_t passkey) argument
[all...]
/system/bt/bta/include/
H A Dbta_api.h376 #define BTA_DM_BLE_PASSKEY_NOTIF_EVT 17 /* SMP passkey notification event */
377 #define BTA_DM_BLE_PASSKEY_REQ_EVT 18 /* SMP passkey request event */
634 BTA_SP_KEY_STARTED, /* passkey entry started */
635 BTA_SP_KEY_ENTERED, /* passkey digit entered */
636 BTA_SP_KEY_ERASED, /* passkey digit erased */
637 BTA_SP_KEY_CLEARED, /* passkey cleared */
638 BTA_SP_KEY_COMPLT /* passkey entry completed */
655 uint32_t passkey; /* the numeric value for comparison. If just_works, do not member in struct:__anon249
683 tBTA_DM_SP_KEY_NOTIF key_notif; /* passkey notification */
1388 * Description Send BLE SMP passkey repl
[all...]

Completed in 247 milliseconds