Home
last modified time | relevance | path

Searched refs:tk (Results 1 – 14 of 14) sorted by relevance

/system/bt/gd/security/
Dpairing_handler_le_legacy.cc109 Octet16 tk{0}; in LegacyPasskeyEntry() local
110 tk[0] = (uint8_t)(passkey); in LegacyPasskeyEntry()
111 tk[1] = (uint8_t)(passkey >> 8); in LegacyPasskeyEntry()
112 tk[2] = (uint8_t)(passkey >> 16); in LegacyPasskeyEntry()
113 tk[3] = (uint8_t)(passkey >> 24); in LegacyPasskeyEntry()
116 return tk; in LegacyPasskeyEntry()
124 … const PairingResponseView& pairing_response, const Octet16& tk) { in DoLegacyStage2() argument
139 tk, in DoLegacyStage2()
173 tk, in DoLegacyStage2()
195 tk, in DoLegacyStage2()
[all …]
Dpairing_handler_le.cc146 Octet16 tk = std::get<Octet16>(stage1result); in PairingMain() local
147 StkOrFailure stage2result = DoLegacyStage2(i, pairing_request, pairing_response, tk); in PairingMain()
Dpairing_handler_le.h251 const PairingResponseView& pairing_response, const Octet16& tk);
/system/bt/stack/smp/
Dsmp_api.cc296 key.p_data = smp_cb.tk.data(); in SMP_SecurityGrant()
299 smp_cb.tk = {0}; in SMP_SecurityGrant()
395 smp_convert_string_to_tk(&p_cb->tk, passkey); in SMP_PasskeyReply()
481 memcpy(p_cb->tk.data(), p_data, len); in SMP_OobDataReply()
484 key.p_data = p_cb->tk.data(); in SMP_OobDataReply()
Dsmp_keys.cc90 uint8_t* tt = p_cb->tk.data(); in smp_proc_passkey()
102 p_cb->tk = {0}; in smp_proc_passkey()
119 key.p_data = p_cb->tk.data(); in smp_proc_passkey()
337 smp_debug_print_nbyte_little_endian(p_cb->tk.data(), "TK", 16); in smp_calculate_comfirm()
338 Octet16 e1 = aes_128(p_cb->tk, p1); in smp_calculate_comfirm()
346 *output = aes_128(p_cb->tk, p2); in smp_calculate_comfirm()
573 return aes_128(p_cb->tk, text); in smp_calculate_legacy_short_term_key()
Dsmp_int.h285 Octet16 tk; member
419 extern void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey);
Dsmp_utils.cc822 void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey) { in smp_convert_string_to_tk() argument
823 uint8_t* p = tk->data(); in smp_convert_string_to_tk()
829 key.p_data = tk->data(); in smp_convert_string_to_tk()
Dsmp_act.cc1017 STREAM_TO_ARRAY(p_cb->tk.data(), p, OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info()
1040 pid_key.pid_key.irk = p_cb->tk; in smp_proc_id_addr()
1352 key.p_data = p_cb->tk.data(); in smp_decide_association_model()
1355 p_cb->tk = {0}; in smp_decide_association_model()
/system/keymaster/tests/
Dwrapped_key_test.cpp71 KeymasterKeyBlob tk = {reinterpret_cast<const uint8_t*>(test_transit_key.c_str()), in TEST() local
79 build_wrapped_key(tk, iv, KM_KEY_FORMAT_RAW, secure_key, tag, authorization_list, &asn1), in TEST()
/system/bt/stack/test/
Dstack_smp_test.cc136 p_cb_.tk = {0}; in SetUp()
194 Octet16 output = crypto_toolbox::aes_128(p_cb_.tk, p1.data(), OCTET16_LEN); in TEST_F()
/system/timezone/output_data/android/
Dtzids.prototxt1648 isoCode: "tk"
/system/timezone/input_data/android/
Dcountryzones.txt3089 isoCode:"tk"
/system/libprocinfo/testdata/
Dmaps1299 …0-70e9941000 r--s 00000000 fc:00 1129 /system/usr/hyphen-data/hyph-tk.hyb
/system/memory/libmeminfo/testdata1/
Dsmaps42343 …000-7007f937c000 r--s 00000000 fe:00 1018 /system/usr/hyphen-data/hyph-tk.hyb