Searched refs:tk (Results 1 – 14 of 14) sorted by relevance
/system/bt/gd/security/ |
D | pairing_handler_le_legacy.cc | 109 Octet16 tk{0}; in LegacyPasskeyEntry() local 110 tk[0] = (uint8_t)(passkey); in LegacyPasskeyEntry() 111 tk[1] = (uint8_t)(passkey >> 8); in LegacyPasskeyEntry() 112 tk[2] = (uint8_t)(passkey >> 16); in LegacyPasskeyEntry() 113 tk[3] = (uint8_t)(passkey >> 24); in LegacyPasskeyEntry() 116 return tk; in LegacyPasskeyEntry() 124 … const PairingResponseView& pairing_response, const Octet16& tk) { in DoLegacyStage2() argument 139 tk, in DoLegacyStage2() 173 tk, in DoLegacyStage2() 195 tk, in DoLegacyStage2() [all …]
|
D | pairing_handler_le.cc | 146 Octet16 tk = std::get<Octet16>(stage1result); in PairingMain() local 147 StkOrFailure stage2result = DoLegacyStage2(i, pairing_request, pairing_response, tk); in PairingMain()
|
D | pairing_handler_le.h | 251 const PairingResponseView& pairing_response, const Octet16& tk);
|
/system/bt/stack/smp/ |
D | smp_api.cc | 296 key.p_data = smp_cb.tk.data(); in SMP_SecurityGrant() 299 smp_cb.tk = {0}; in SMP_SecurityGrant() 395 smp_convert_string_to_tk(&p_cb->tk, passkey); in SMP_PasskeyReply() 481 memcpy(p_cb->tk.data(), p_data, len); in SMP_OobDataReply() 484 key.p_data = p_cb->tk.data(); in SMP_OobDataReply()
|
D | smp_keys.cc | 90 uint8_t* tt = p_cb->tk.data(); in smp_proc_passkey() 102 p_cb->tk = {0}; in smp_proc_passkey() 119 key.p_data = p_cb->tk.data(); in smp_proc_passkey() 337 smp_debug_print_nbyte_little_endian(p_cb->tk.data(), "TK", 16); in smp_calculate_comfirm() 338 Octet16 e1 = aes_128(p_cb->tk, p1); in smp_calculate_comfirm() 346 *output = aes_128(p_cb->tk, p2); in smp_calculate_comfirm() 573 return aes_128(p_cb->tk, text); in smp_calculate_legacy_short_term_key()
|
D | smp_int.h | 285 Octet16 tk; member 419 extern void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey);
|
D | smp_utils.cc | 822 void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey) { in smp_convert_string_to_tk() argument 823 uint8_t* p = tk->data(); in smp_convert_string_to_tk() 829 key.p_data = tk->data(); in smp_convert_string_to_tk()
|
D | smp_act.cc | 1017 STREAM_TO_ARRAY(p_cb->tk.data(), p, OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info() 1040 pid_key.pid_key.irk = p_cb->tk; in smp_proc_id_addr() 1352 key.p_data = p_cb->tk.data(); in smp_decide_association_model() 1355 p_cb->tk = {0}; in smp_decide_association_model()
|
/system/keymaster/tests/ |
D | wrapped_key_test.cpp | 71 KeymasterKeyBlob tk = {reinterpret_cast<const uint8_t*>(test_transit_key.c_str()), in TEST() local 79 build_wrapped_key(tk, iv, KM_KEY_FORMAT_RAW, secure_key, tag, authorization_list, &asn1), in TEST()
|
/system/bt/stack/test/ |
D | stack_smp_test.cc | 136 p_cb_.tk = {0}; in SetUp() 194 Octet16 output = crypto_toolbox::aes_128(p_cb_.tk, p1.data(), OCTET16_LEN); in TEST_F()
|
/system/timezone/output_data/android/ |
D | tzids.prototxt | 1648 isoCode: "tk"
|
/system/timezone/input_data/android/ |
D | countryzones.txt | 3089 isoCode:"tk"
|
/system/libprocinfo/testdata/ |
D | maps | 1299 …0-70e9941000 r--s 00000000 fc:00 1129 /system/usr/hyphen-data/hyph-tk.hyb
|
/system/memory/libmeminfo/testdata1/ |
D | smaps | 42343 …000-7007f937c000 r--s 00000000 fe:00 1018 /system/usr/hyphen-data/hyph-tk.hyb
|