/system/bt/stack/smp/ |
H A D | smp_api.cc | 284 * passkey request to the application. 286 * Parameters: bd_addr - Address of the device for which passkey was 289 * passkey - numeric value in the range of 295 uint32_t passkey) { 298 SMP_TRACE_EVENT("SMP_PasskeyReply: Key: %d Result:%d", passkey, res); 316 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { 318 "SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", 319 passkey); 328 smp_int_data.passkey = passkey; 294 SMP_PasskeyReply(const RawAddress& bd_addr, uint8_t res, uint32_t passkey) argument [all...] |
H A D | smp_keys.cc | 168 * Description This function is called to process a passkey. 175 uint32_t passkey; /* 19655 test number; */ local 179 STREAM_TO_UINT32(passkey, pp); 180 passkey &= ~SMP_PASSKEY_MASK; 183 while (passkey > BTM_MAX_PASSKEY_VAL) passkey >>= 1; 187 UINT32_TO_STREAM(tt, passkey); 191 smp_evt_data.passkey = passkey; 198 smp_int_data.passkey [all...] |
H A D | smp_utils.cc | 787 void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey) { argument 791 UINT32_TO_STREAM(p, passkey); 1297 * commitment calculation for SC passkey entry association mode
|
H A D | smp_int.h | 226 uint32_t passkey; member in union:__anon1344 284 BT_OCTET16 local_random; /* local randomizer - passkey or OOB randomizer */ 285 BT_OCTET16 peer_random; /* peer randomizer - passkey or OOB randomizer */ 308 round; /* authentication stage 1 round for passkey association model */ 474 extern void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey);
|
/system/bt/btif/src/ |
H A D | bluetooth.cc | 299 uint8_t accept, uint32_t passkey) { 303 return btif_dm_ssp_reply(bd_addr, variant, accept, passkey); 298 ssp_reply(const RawAddress* bd_addr, bt_ssp_variant_t variant, uint8_t accept, uint32_t passkey) argument
|
H A D | btif_dm.cc | 1028 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); 2350 uint32_t passkey = 0; local 2353 passkey += (multi[i] * (pin_code->pin[i] - '0')); 2355 BTIF_TRACE_DEBUG("btif_dm_pin_reply: passkey: %d", passkey); 2356 BTA_DmBlePasskeyReply(*bd_addr, accept, passkey); 2377 UNUSED_ATTR uint32_t passkey) { 2792 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); 3044 BT_SSP_VARIANT_PASSKEY_CONFIRMATION, p_notif_req->passkey); 2375 btif_dm_ssp_reply(const RawAddress* bd_addr, bt_ssp_variant_t variant, uint8_t accept, UNUSED_ATTR uint32_t passkey) argument
|
/system/bt/bta/dm/ |
H A D | bta_dm_api.cc | 475 * Description Send BLE SMP passkey reply. 478 * accept - passkey entry sucessful or declined. 479 * passkey - passkey value, must be a 6 digit number, 486 uint32_t passkey) { 488 accept, accept ? passkey : 0)); 485 BTA_DmBlePasskeyReply(const RawAddress& bd_addr, bool accept, uint32_t passkey) argument
|
H A D | bta_dm_act.cc | 2279 sec_event.key_notif.passkey = 2306 sec_event.key_notif.passkey = 2498 bta_dm_cb.num_val = sec_event.key_notif.passkey = 2499 p_data->key_notif.passkey; 3795 sec_event.key_notif.passkey = p_data->key_notif; 3813 sec_event.key_notif.passkey = p_data->key_notif; 3947 uint32_t passkey) { 3949 passkey); 3946 bta_dm_ble_passkey_reply(const RawAddress& bd_addr, bool accept, uint32_t passkey) argument
|
/system/bt/stack/include/ |
H A D | smp_api_types.h | 49 #define SMP_PASSKEY_NOTIF_EVT 3 /* passkey notification event */ 50 #define SMP_PASSKEY_REQ_EVT 4 /* passkey request event */ 194 #define SMP_SC_KEY_STARTED 0 /* passkey entry started */ 195 #define SMP_SC_KEY_ENTERED 1 /* passkey digit entered */ 196 #define SMP_SC_KEY_ERASED 2 /* passkey digit erased */ 197 #define SMP_SC_KEY_CLEARED 3 /* passkey cleared */ 198 #define SMP_SC_KEY_COMPLT 4 /* passkey entry completed */ 252 uint32_t passkey; member in union:__anon1278
|
H A D | btm_api_types.h | 1459 uint32_t passkey; /* passkey */ member in struct:__anon1150 1463 BTM_SP_KEY_STARTED, /* 0 - passkey entry started */ 1464 BTM_SP_KEY_ENTERED, /* 1 - passkey digit entered */ 1465 BTM_SP_KEY_ERASED, /* 2 - passkey digit erased */ 1466 BTM_SP_KEY_CLEARED, /* 3 - passkey cleared */ 1467 BTM_SP_KEY_COMPLT, /* 4 - passkey entry completed */
|
/system/bt/stack/btm/ |
H A D | btm_ble.cc | 363 * passkey request to the application. 365 * Parameters: bd_addr - Address of the device for which passkey was 369 * p_passkey - pointer to array with the passkey 375 uint32_t passkey) { 387 SMP_PasskeyReply(bd_addr, res_smp, passkey); 374 BTM_BlePasskeyReply(const RawAddress& bd_addr, uint8_t res, uint32_t passkey) argument
|
H A D | btm_sec.cc | 1425 * Description This function is called to provide the passkey for 1430 * passkey - numeric value in the range of 1437 uint32_t passkey) { 1468 if (passkey > BTM_MAX_PASSKEY_VAL) res = BTM_ILLEGAL_VALUE; 1479 btsnd_hcic_user_passkey_reply(bd_addr, passkey); 1488 * Description This function is used during the passkey entry model 3391 /* Numeric confirmation. Need user to conf the passkey */ 3436 STREAM_TO_UINT32(evt_data.key_notif.passkey, p); 3437 BTM_TRACE_DEBUG("BTM_SP_KEY_NOTIF_EVT: passkey: %u", 3438 evt_data.key_notif.passkey); 1436 BTM_PasskeyReqReply(tBTM_STATUS res, const RawAddress& bd_addr, uint32_t passkey) argument [all...] |
/system/bt/bta/include/ |
H A D | bta_api.h | 376 #define BTA_DM_BLE_PASSKEY_NOTIF_EVT 17 /* SMP passkey notification event */ 377 #define BTA_DM_BLE_PASSKEY_REQ_EVT 18 /* SMP passkey request event */ 634 BTA_SP_KEY_STARTED, /* passkey entry started */ 635 BTA_SP_KEY_ENTERED, /* passkey digit entered */ 636 BTA_SP_KEY_ERASED, /* passkey digit erased */ 637 BTA_SP_KEY_CLEARED, /* passkey cleared */ 638 BTA_SP_KEY_COMPLT /* passkey entry completed */ 655 uint32_t passkey; /* the numeric value for comparison. If just_works, do not member in struct:__anon249 683 tBTA_DM_SP_KEY_NOTIF key_notif; /* passkey notification */ 1388 * Description Send BLE SMP passkey repl [all...] |