Home
last modified time | relevance | path

Searched refs:passkey (Results 1 – 25 of 32) sorted by relevance

12

/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/
Dsmp_api.c303 void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in SMP_PasskeyReply() argument
309 passkey, res); in SMP_PasskeyReply()
327 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply()
328 SMP_TRACE_WARNING ("SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", passkey); in SMP_PasskeyReply()
333 smp_sm_event(&smp_cb, SMP_SC_KEY_READY_EVT, &passkey); in SMP_PasskeyReply()
335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply()
354 void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey) in SMP_SetStaticPasskey() argument
356 SMP_TRACE_DEBUG("static passkey %6d", passkey); in SMP_SetStaticPasskey()
359 p_cb->static_passkey = passkey; in SMP_SetStaticPasskey()
Dsmp_keys.c194 UINT32 passkey = p_cb->static_passkey; in smp_use_static_passkey() local
197 UINT32_TO_STREAM(tt, passkey); in smp_use_static_passkey()
203 (*p_cb->p_callback)(SMP_PASSKEY_NOTIF_EVT, p_cb->pairing_bda, (tSMP_EVT_DATA *)&passkey); in smp_use_static_passkey()
207 smp_sm_event(&smp_cb, SMP_KEY_READY_EVT, &passkey); in smp_use_static_passkey()
252 UINT32 passkey; /* 19655 test number; */ in smp_proc_passkey() local
256 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey()
257 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey()
260 while (passkey > BTM_MAX_PASSKEY_VAL) { in smp_proc_passkey()
261 passkey >>= 1; in smp_proc_passkey()
266 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey()
[all …]
Dsmp_act.c132 cb_data.passkey = p_data->passkey; in smp_send_app_cback()
1864 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
1867 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/include/stack/
Dsmp_api.h264 UINT32 passkey; member
403 extern void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey);
418 extern void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey);
Dbtm_ble_api.h1764 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey);
1779 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey);
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/
Dble_sm_alg.c332 …m_alg_g2(const uint8_t *u, const uint8_t *v, const uint8_t *x, const uint8_t *y, uint32_t *passkey) in ble_sm_alg_g2() argument
352 *passkey = get_be32(xs + 12) % 1000000; // 12:byte alignment in ble_sm_alg_g2()
353 BLE_HS_LOG(DEBUG, " passkey=%u\n", *passkey); in ble_sm_alg_g2()
Dble_sm_priv.h309 const uint8_t *y, uint32_t *passkey);
Dble_sm.c2395 if (pkey->passkey > 999999) { // 99999:Analyzing conditions in ble_sm_inject_io()
2400 proc->tk[0] = (pkey->passkey >> 0) & 0xff; in ble_sm_inject_io()
2401 proc->tk[1] = (pkey->passkey >> 8) & 0xff; // 8:byte alignment in ble_sm_inject_io()
2402 … proc->tk[2] = (pkey->passkey >> 16) & 0xff; // 16:byte alignment, 2:array element in ble_sm_inject_io()
2403 … proc->tk[3] = (pkey->passkey >> 24) & 0xff; // 24:byte alignment, 3:array element in ble_sm_inject_io()
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/core/
Dbtc_dm.c477 param.key_notif.passkey = p_key_notif->passkey; in btc_dm_sp_key_notif_evt()
835 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
890 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/include/host/
Dble_sm.h101 uint32_t passkey; member
Dble_gap.h669 } passkey; member
/device/soc/esp/esp32/components/bt/host/bluedroid/api/include/api/
Desp_gap_bt_api.h327 uint32_t passkey; /*!< the numeric value for passkey entry. */ member
711 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
Desp_gap_ble_api.h532 …uint32_t passkey; /*!< the numeric value for comparison. If just_works, do not show t… member
1707 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
/device/soc/esp/esp32/components/bt/host/bluedroid/api/
Desp_gap_bt_api.c339 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument
352 arg.passkey_reply.passkey = passkey; in esp_bt_gap_ssp_passkey_reply()
Desp_gap_ble_api.c562 uint32_t passkey = 0; in esp_ble_gap_set_security_param() local
565 passkey += (((uint8_t *)value)[i]<<(8*i)); in esp_ble_gap_set_security_param()
567 if(passkey > 999999) { in esp_ble_gap_set_security_param()
623 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument
634 arg.enc_passkey_replay.passkey = passkey; in esp_ble_passkey_reply()
/device/soc/winnermicro/wm800/board/include/bt/
Dwm_bt.h81 uint8_t accept, uint32_t passkey);
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/include/
Dbtc_gap_bt.h130 uint32_t passkey; member
Dbtc_gap_ble.h198 uint32_t passkey; member
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/inc/
Dhal_smpc.h236 uint32_t passkey; member
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/dm/
Dbta_dm_api.c712 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument
719 p_msg->passkey = passkey; in BTA_DmPasskeyReqReply()
1004 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument
1016 p_msg->passkey = passkey; in BTA_DmBlePasskeyReply()
1022 void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey) in BTA_DmBleSetStaticPasskey() argument
1031 p_msg->static_passkey = passkey; in BTA_DmBleSetStaticPasskey()
Dbta_dm_act.c1391 BTM_PasskeyReqReply(res, p_data->key_req.bd_addr, p_data->key_req.passkey); in bta_dm_key_req()
2931 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback()
2950 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback()
3157 bta_dm_cb.num_val = sec_event.key_notif.passkey = p_data->key_notif.passkey; in bta_dm_sp_cback()
4653 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback()
4671 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback()
4815 …BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_SUCCESS, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
4817 …keyReply(p_data->ble_passkey_reply.bd_addr, BTM_NOT_AUTHORIZED, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/include/bta/
Dbta_api.h929 …UINT32 passkey; /* the numeric value for comparison. If just_works, do not show th… member
1924 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey);
2124 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey);
2140 extern void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey);
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/include/
Dsmp_int.h236 UINT32 passkey; member
479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c403 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in BTM_BlePasskeyReply() argument
416 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply()
433 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey) in BTM_BleSetStaticPasskey() argument
436 SMP_SetStaticPasskey(add, passkey); in BTM_BleSetStaticPasskey()
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/gap/
Dbtc_gap_ble.c1569 uint32_t passkey = 0; in btc_gap_ble_call_handler() local
1572 passkey += (((uint8_t *)value)[i]<<(8*i)); in btc_gap_ble_call_handler()
1574 BTA_DmBleSetStaticPasskey(true, passkey); in btc_gap_ble_call_handler()
1614 … BTA_DmBlePasskeyReply(bd_addr, arg->enc_passkey_replay.accept, arg->enc_passkey_replay.passkey); in btc_gap_ble_call_handler()

12