/system/bt/stack/smp/ |
D | smp_api.cc | 295 uint32_t passkey) { in SMP_PasskeyReply() argument 298 SMP_TRACE_EVENT("SMP_PasskeyReply: Key: %d Result:%d", passkey, res); in SMP_PasskeyReply() 316 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 319 passkey); in SMP_PasskeyReply() 328 smp_int_data.passkey = passkey; in SMP_PasskeyReply() 331 smp_convert_string_to_tk(&p_cb->tk, passkey); in SMP_PasskeyReply()
|
D | smp_keys.cc | 113 uint32_t passkey; /* 19655 test number; */ in smp_proc_passkey() local 117 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey() 118 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey() 121 while (passkey > BTM_MAX_PASSKEY_VAL) passkey >>= 1; in smp_proc_passkey() 125 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey() 129 smp_evt_data.passkey = passkey; in smp_proc_passkey() 136 smp_int_data.passkey = passkey; in smp_proc_passkey() 857 smp_int_data.passkey = p_cb->number_to_display; in smp_calculate_numeric_comparison_display_number()
|
D | smp_int.h | 227 uint32_t passkey; member 449 extern void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey);
|
D | smp_act.cc | 119 cb_data.passkey = p_data->passkey; in smp_send_app_cback() 1794 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification() 1797 UINT32_TO_STREAM(p, p_data->passkey); in smp_start_passkey_verification()
|
D | smp_utils.cc | 810 void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey) { in smp_convert_string_to_tk() argument 814 UINT32_TO_STREAM(p, passkey); in smp_convert_string_to_tk()
|
/system/bt/btif/include/ |
D | btif_api.h | 309 uint32_t passkey); 323 uint32_t passkey);
|
/system/bt/stack/include/ |
D | smp_api.h | 134 uint32_t passkey);
|
D | smp_api_types.h | 248 uint32_t passkey; member
|
D | btm_ble_api.h | 224 uint32_t passkey);
|
D | btm_api.h | 1605 uint32_t passkey);
|
/system/bt/service/common/android/bluetooth/ |
D | IBluetooth.aidl | 49 int passkey); in SspReply() argument
|
/system/bt/btif/src/ |
D | bluetooth.cc | 295 uint8_t accept, uint32_t passkey) { in ssp_reply() argument 299 return btif_dm_ssp_reply(bd_addr, variant, accept, passkey); in ssp_reply()
|
D | btif_dm.cc | 1029 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); in btif_dm_ssp_key_notif_evt() 2380 uint32_t passkey = 0; in btif_dm_pin_reply() local 2383 passkey += (multi[i] * (pin_code->pin[i] - '0')); in btif_dm_pin_reply() 2385 BTIF_TRACE_DEBUG("btif_dm_pin_reply: passkey: %d", passkey); in btif_dm_pin_reply() 2386 BTA_DmBlePasskeyReply(*bd_addr, accept, passkey); in btif_dm_pin_reply() 2407 UNUSED_ATTR uint32_t passkey) { in btif_dm_ssp_reply() argument 2836 BT_SSP_VARIANT_PASSKEY_NOTIFICATION, p_ssp_key_notif->passkey); in btif_dm_ble_key_notif_evt() 3098 BT_SSP_VARIANT_PASSKEY_CONFIRMATION, p_notif_req->passkey); in btif_dm_ble_key_nc_req_evt()
|
/system/bt/binder/android/bluetooth/ |
D | IBluetooth.aidl | 93 passkey); in setPasskey() argument
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 484 uint32_t passkey) { in BTA_DmBlePasskeyReply() argument 486 accept, accept ? passkey : 0)); in BTA_DmBlePasskeyReply()
|
D | bta_dm_int.h | 502 uint32_t passkey);
|
D | bta_dm_act.cc | 2297 sec_event.key_notif.passkey = in bta_dm_pinname_cback() 2324 sec_event.key_notif.passkey = in bta_dm_pinname_cback() 2518 bta_dm_cb.num_val = sec_event.key_notif.passkey = in bta_dm_sp_cback() 2519 p_data->key_notif.passkey; in bta_dm_sp_cback() 3817 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 3835 sec_event.key_notif.passkey = p_data->key_notif; in bta_dm_ble_smp_cback() 3983 uint32_t passkey) { in bta_dm_ble_passkey_reply() argument 3985 passkey); in bta_dm_ble_passkey_reply()
|
/system/bt/service/ipc/binder/ |
D | bluetooth_binder_server.cc | 129 int32_t passkey, bool* _aidl_return) { in SspReply() argument 132 accept, passkey); in SspReply()
|
D | bluetooth_binder_server.h | 86 bool accept, int32_t passkey, bool* _aidl_return) override;
|
/system/bt/include/hardware/ |
D | bluetooth.h | 553 uint8_t accept, uint32_t passkey);
|
/system/bt/bta/include/ |
D | bta_api.h | 653 uint32_t passkey; /* the numeric value for comparison. If just_works, do not member 1400 uint32_t passkey);
|
/system/bt/vendor_libs/test_vendor_lib/packets/hci/ |
D | event_packet_builder.h | 228 …_ptr<EventPacketBuilder> CreateUserPasskeyNotificationEvent(const Address& peer, uint32_t passkey);
|
D | event_packet_builder.cc | 542 … uint32_t passkey) { in CreateUserPasskeyNotificationEvent() argument 547 CHECK(evt_ptr->AddPayloadOctets4(passkey)); in CreateUserPasskeyNotificationEvent()
|
/system/bt/stack/btm/ |
D | btm_sec.cc | 1446 uint32_t passkey) { in BTM_PasskeyReqReply() argument 1477 if (passkey > BTM_MAX_PASSKEY_VAL) res = BTM_ILLEGAL_VALUE; in BTM_PasskeyReqReply() 1488 btsnd_hcic_user_passkey_reply(bd_addr, passkey); in BTM_PasskeyReqReply() 3457 STREAM_TO_UINT32(evt_data.key_notif.passkey, p); in btm_proc_sp_req_evt() 3459 evt_data.key_notif.passkey); in btm_proc_sp_req_evt()
|
D | btm_ble.cc | 332 uint32_t passkey) { in BTM_BlePasskeyReply() argument 344 SMP_PasskeyReply(bd_addr, res_smp, passkey); in BTM_BlePasskeyReply()
|