/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/ |
D | smp_api.c | 303 void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in SMP_PasskeyReply() argument 309 passkey, res); in SMP_PasskeyReply() 327 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 328 SMP_TRACE_WARNING ("SMP_PasskeyReply() - Wrong key len: %d or passkey entry fail", passkey); in SMP_PasskeyReply() 333 smp_sm_event(&smp_cb, SMP_SC_KEY_READY_EVT, &passkey); in SMP_PasskeyReply() 335 smp_convert_string_to_tk(p_cb->tk, passkey); in SMP_PasskeyReply() 354 void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey) in SMP_SetStaticPasskey() argument 356 SMP_TRACE_DEBUG("static passkey %6d", passkey); in SMP_SetStaticPasskey() 359 p_cb->static_passkey = passkey; in SMP_SetStaticPasskey()
|
D | smp_keys.c | 194 UINT32 passkey = p_cb->static_passkey; in smp_use_static_passkey() local 197 UINT32_TO_STREAM(tt, passkey); in smp_use_static_passkey() 203 (*p_cb->p_callback)(SMP_PASSKEY_NOTIF_EVT, p_cb->pairing_bda, (tSMP_EVT_DATA *)&passkey); in smp_use_static_passkey() 207 smp_sm_event(&smp_cb, SMP_KEY_READY_EVT, &passkey); in smp_use_static_passkey() 252 UINT32 passkey; /* 19655 test number; */ in smp_proc_passkey() local 256 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey() 257 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey() 260 while (passkey > BTM_MAX_PASSKEY_VAL) { in smp_proc_passkey() 261 passkey >>= 1; in smp_proc_passkey() 266 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey() [all …]
|
D | smp_act.c | 132 cb_data.passkey = p_data->passkey; in smp_send_app_cback() 1864 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification() 1867 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/include/stack/ |
D | smp_api.h | 264 UINT32 passkey; member 403 extern void SMP_PasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey); 418 extern void SMP_SetStaticPasskey (BOOLEAN add, UINT32 passkey);
|
D | btm_ble_api.h | 1764 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey); 1779 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey);
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/ |
D | ble_sm_alg.c | 332 …m_alg_g2(const uint8_t *u, const uint8_t *v, const uint8_t *x, const uint8_t *y, uint32_t *passkey) in ble_sm_alg_g2() argument 352 *passkey = get_be32(xs + 12) % 1000000; // 12:byte alignment in ble_sm_alg_g2() 353 BLE_HS_LOG(DEBUG, " passkey=%u\n", *passkey); in ble_sm_alg_g2()
|
D | ble_sm_priv.h | 309 const uint8_t *y, uint32_t *passkey);
|
D | ble_sm.c | 2395 if (pkey->passkey > 999999) { // 99999:Analyzing conditions in ble_sm_inject_io() 2400 proc->tk[0] = (pkey->passkey >> 0) & 0xff; in ble_sm_inject_io() 2401 proc->tk[1] = (pkey->passkey >> 8) & 0xff; // 8:byte alignment in ble_sm_inject_io() 2402 … proc->tk[2] = (pkey->passkey >> 16) & 0xff; // 16:byte alignment, 2:array element in ble_sm_inject_io() 2403 … proc->tk[3] = (pkey->passkey >> 24) & 0xff; // 24:byte alignment, 3:array element in ble_sm_inject_io()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/core/ |
D | btc_dm.c | 477 param.key_notif.passkey = p_key_notif->passkey; in btc_dm_sp_key_notif_evt() 835 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler() 890 param.ble_security.key_notif.passkey = p_data->key_notif.passkey; in btc_dm_sec_cb_handler()
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/include/host/ |
D | ble_sm.h | 101 uint32_t passkey; member
|
D | ble_gap.h | 669 } passkey; member
|
/device/soc/esp/esp32/components/bt/host/bluedroid/api/include/api/ |
D | esp_gap_bt_api.h | 327 uint32_t passkey; /*!< the numeric value for passkey entry. */ member 711 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
|
D | esp_gap_ble_api.h | 532 …uint32_t passkey; /*!< the numeric value for comparison. If just_works, do not show t… member 1707 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey);
|
/device/soc/esp/esp32/components/bt/host/bluedroid/api/ |
D | esp_gap_bt_api.c | 339 esp_err_t esp_bt_gap_ssp_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_bt_gap_ssp_passkey_reply() argument 352 arg.passkey_reply.passkey = passkey; in esp_bt_gap_ssp_passkey_reply()
|
D | esp_gap_ble_api.c | 562 uint32_t passkey = 0; in esp_ble_gap_set_security_param() local 565 passkey += (((uint8_t *)value)[i]<<(8*i)); in esp_ble_gap_set_security_param() 567 if(passkey > 999999) { in esp_ble_gap_set_security_param() 623 esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey) in esp_ble_passkey_reply() argument 634 arg.enc_passkey_replay.passkey = passkey; in esp_ble_passkey_reply()
|
/device/soc/winnermicro/wm800/board/include/bt/ |
D | wm_bt.h | 81 uint8_t accept, uint32_t passkey);
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/include/ |
D | btc_gap_bt.h | 130 uint32_t passkey; member
|
D | btc_gap_ble.h | 198 uint32_t passkey; member
|
/device/soc/chipsea/cst85/liteos_m/sdk/modules/btdm/ble/ble_stack/hl/inc/ |
D | hal_smpc.h | 236 uint32_t passkey; member
|
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/dm/ |
D | bta_dm_api.c | 712 void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey) in BTA_DmPasskeyReqReply() argument 719 p_msg->passkey = passkey; in BTA_DmPasskeyReqReply() 1004 void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey) in BTA_DmBlePasskeyReply() argument 1016 p_msg->passkey = passkey; in BTA_DmBlePasskeyReply() 1022 void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey) in BTA_DmBleSetStaticPasskey() argument 1031 p_msg->static_passkey = passkey; in BTA_DmBleSetStaticPasskey()
|
D | bta_dm_act.c | 1391 BTM_PasskeyReqReply(res, p_data->key_req.bd_addr, p_data->key_req.passkey); in bta_dm_key_req() 2931 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback() 2950 sec_event.key_notif.passkey = bta_dm_cb.num_val; /* get PIN code numeric number */ in bta_dm_pinname_cback() 3157 bta_dm_cb.num_val = sec_event.key_notif.passkey = p_data->key_notif.passkey; in bta_dm_sp_cback() 4653 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 4671 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 4815 …BlePasskeyReply(p_data->ble_passkey_reply.bd_addr, BTM_SUCCESS, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply() 4817 …keyReply(p_data->ble_passkey_reply.bd_addr, BTM_NOT_AUTHORIZED, p_data->ble_passkey_reply.passkey); in bta_dm_ble_passkey_reply()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/include/bta/ |
D | bta_api.h | 929 …UINT32 passkey; /* the numeric value for comparison. If just_works, do not show th… member 1924 extern void BTA_DmPasskeyReqReply(BOOLEAN accept, BD_ADDR bd_addr, UINT32 passkey); 2124 extern void BTA_DmBlePasskeyReply(BD_ADDR bd_addr, BOOLEAN accept, UINT32 passkey); 2140 extern void BTA_DmBleSetStaticPasskey(bool add, uint32_t passkey);
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/include/ |
D | smp_int.h | 236 UINT32 passkey; member 479 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 403 void BTM_BlePasskeyReply (BD_ADDR bd_addr, UINT8 res, UINT32 passkey) in BTM_BlePasskeyReply() argument 416 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply() 433 void BTM_BleSetStaticPasskey(BOOLEAN add, UINT32 passkey) in BTM_BleSetStaticPasskey() argument 436 SMP_SetStaticPasskey(add, passkey); in BTM_BleSetStaticPasskey()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/btc/profile/std/gap/ |
D | btc_gap_ble.c | 1569 uint32_t passkey = 0; in btc_gap_ble_call_handler() local 1572 passkey += (((uint8_t *)value)[i]<<(8*i)); in btc_gap_ble_call_handler() 1574 BTA_DmBleSetStaticPasskey(true, passkey); in btc_gap_ble_call_handler() 1614 … BTA_DmBlePasskeyReply(bd_addr, arg->enc_passkey_replay.accept, arg->enc_passkey_replay.passkey); in btc_gap_ble_call_handler()
|