/system/bt/gd/security/ |
D | pairing_handler_le_legacy.cc | 88 uint32_t passkey; in LegacyPasskeyEntry() local 91 passkey = GenerateRandom(); in LegacyPasskeyEntry() 92 passkey &= 0x0fffff; /* maximum 20 significant bits */ in LegacyPasskeyEntry() 94 if (passkey > PASSKEY_MAX) passkey >>= 1; in LegacyPasskeyEntry() 96 ConfirmationData data(i.remote_connection_address, i.remote_name, passkey); in LegacyPasskeyEntry() 106 passkey = response->ui_value; in LegacyPasskeyEntry() 110 tk[0] = (uint8_t)(passkey); in LegacyPasskeyEntry() 111 tk[1] = (uint8_t)(passkey >> 8); in LegacyPasskeyEntry() 112 tk[2] = (uint8_t)(passkey >> 16); in LegacyPasskeyEntry() 113 tk[3] = (uint8_t)(passkey >> 24); in LegacyPasskeyEntry()
|
D | pairing_handler_le_secure_connections.cc | 287 uint32_t passkey; in SecureConnectionsPasskeyEntry() local 291 passkey = GenerateRandom(); in SecureConnectionsPasskeyEntry() 292 passkey &= 0x0fffff; /* maximum 20 significant bytes */ in SecureConnectionsPasskeyEntry() 294 while (passkey > PASSKEY_MAX) passkey >>= 1; in SecureConnectionsPasskeyEntry() 296 ConfirmationData data(i.remote_connection_address, i.remote_name, passkey); in SecureConnectionsPasskeyEntry() 306 passkey = response->ui_value; in SecureConnectionsPasskeyEntry() 319 bool bit_set = ((bitmask & passkey) != 0); in SecureConnectionsPasskeyEntry() 395 ra[0] = (uint8_t)(passkey); in SecureConnectionsPasskeyEntry() 396 ra[1] = (uint8_t)(passkey >> 8); in SecureConnectionsPasskeyEntry() 397 ra[2] = (uint8_t)(passkey >> 16); in SecureConnectionsPasskeyEntry() [all …]
|
D | security_manager.cc | 116 …SecurityManager::OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) { in OnPasskeyEntry() argument 118 … common::Unretained(security_manager_impl_), address, passkey)); in OnPasskeyEntry()
|
D | security_manager.h | 126 void OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) override;
|
D | ui.h | 131 virtual void OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) = 0;
|
/system/bt/stack/smp/ |
D | smp_api.cc | 356 uint32_t passkey) { in SMP_PasskeyReply() argument 362 SMP_TRACE_EVENT("SMP_PasskeyReply: Key: %d Result:%d", passkey, res); in SMP_PasskeyReply() 380 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 383 passkey); in SMP_PasskeyReply() 392 smp_int_data.passkey = passkey; in SMP_PasskeyReply() 395 smp_convert_string_to_tk(&p_cb->tk, passkey); in SMP_PasskeyReply()
|
D | smp_keys.cc | 91 uint32_t passkey; /* 19655 test number; */ in smp_proc_passkey() local 95 STREAM_TO_UINT32(passkey, pp); in smp_proc_passkey() 96 passkey &= ~SMP_PASSKEY_MASK; in smp_proc_passkey() 99 while (passkey > BTM_MAX_PASSKEY_VAL) passkey >>= 1; in smp_proc_passkey() 103 UINT32_TO_STREAM(tt, passkey); in smp_proc_passkey() 107 smp_evt_data.passkey = passkey; in smp_proc_passkey() 114 smp_int_data.passkey = passkey; in smp_proc_passkey() 851 smp_int_data.passkey = p_cb->number_to_display; in smp_calculate_numeric_comparison_display_number()
|
/system/bt/gd/security/pairing/ |
D | classic_pairing_handler.h | 89 void OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) override; 96 void OnPasskeyInput(uint32_t passkey); 99 void NotifyUiDisplayPasskey(uint32_t passkey);
|
D | classic_pairing_handler.cc | 45 void ClassicPairingHandler::NotifyUiDisplayPasskey(uint32_t passkey) { in NotifyUiDisplayPasskey() argument 47 ConfirmationData data(*GetRecord()->GetPseudoAddress(), device_name_, passkey); in NotifyUiDisplayPasskey() 92 …cPairingHandler::OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) { in OnPasskeyEntry() argument 93 …Channel()->SendCommand(hci::UserPasskeyRequestReplyBuilder::Create(address.GetAddress(), passkey)); in OnPasskeyEntry() 652 void ClassicPairingHandler::OnPasskeyInput(uint32_t passkey) { in OnPasskeyInput() argument 653 passkey_ = passkey; in OnPasskeyInput()
|
D | pairing_handler.h | 79 virtual void OnPasskeyEntry(const bluetooth::hci::AddressWithType& address, uint32_t passkey) = 0;
|
/system/bt/gd/cert/ |
D | py_security.py | 176 passkey = -1 180 nonlocal passkey 181 passkey = event.numeric_value 187 return passkey
|
/system/bt/stack/include/ |
D | smp_api.h | 135 uint32_t passkey);
|
D | smp_api_types.h | 252 uint32_t passkey; member
|
D | btm_ble_api.h | 212 uint32_t passkey);
|
/system/bt/test/mock/ |
D | mock_stack_smp_api.cc | 72 uint32_t passkey) { in SMP_PasskeyReply() argument
|
D | mock_bta_dm_api.cc | 80 uint32_t passkey) { in BTA_DmBlePasskeyReply() argument
|
/system/bt/stack/test/common/ |
D | mock_smp_smp_api.cc | 72 uint32_t passkey) { in SMP_PasskeyReply() argument
|
/system/bt/service/common/android/bluetooth/ |
D | IBluetooth.aidl | 49 int passkey); in SspReply() argument
|
/system/bt/gd/rust/topshim/btif/ |
D | btif_shim.h | 66 …int SspReply(const RustRawAddress& address, int ssp_variant, uint8_t accept, uint32_t passkey) con…
|
D | btif_shim.cc | 321 …:SspReply(const RustRawAddress& address, int ssp_variant, uint8_t accept, uint32_t passkey) const { in SspReply() 324 return intf_->ssp_reply(&addr, static_cast<bt_ssp_variant_t>(ssp_variant), accept, passkey); in SspReply()
|
/system/bt/btif/include/ |
D | btif_api.h | 287 uint32_t passkey);
|
/system/bt/gd/security/cert/ |
D | le_security_test.py | 662 passkey = self.dut_security.wait_for_ui_event_passkey() 664 if passkey == 0: 670 …message_type=UiCallbackType.PASSKEY, numeric_value=passkey, unique_id=1, address=self.dut_address)) 709 passkey = self.dut_security.wait_for_ui_event_passkey() 711 if passkey == 0: 720 …message_type=UiCallbackType.PASSKEY, numeric_value=passkey, unique_id=1, address=self.dut_address)) 760 passkey = self.cert_security.wait_for_ui_event_passkey() 762 if passkey == 0: 770 …message_type=UiCallbackType.PASSKEY, numeric_value=passkey, unique_id=1, address=self.cert_address… 813 passkey = self.dut_security.wait_for_ui_event_passkey() [all …]
|
D | cert_security.py | 198 def input_passkey(self, address, passkey): argument 204 logging.info("Cert: Send user input passkey %d for %s" % (passkey, address)) 233 self._enqueue_hci_command(hci_packets.UserPasskeyRequestReplyBuilder(peer, passkey), True)
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 449 uint32_t passkey) { in BTA_DmBlePasskeyReply() argument 451 accept, accept ? passkey : 0)); in BTA_DmBlePasskeyReply()
|
/system/bt/bta/include/ |
D | bta_api.h | 350 uint32_t passkey; /* the numeric value for comparison. If just_works, do not member 971 uint32_t passkey);
|