/packages/modules/Bluetooth/system/stack/gatt/ |
D | gatt_db.cc | 89 uint8_t key_size) { in gatts_check_attr_readability() argument 120 (key_size < min_key_size)) { in gatts_check_attr_readability() 132 if (key_size < min_key_size) { in gatts_check_attr_readability() 180 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { in read_attr_value() argument 188 sec_flag, key_size); in read_attr_value() 287 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument 304 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 489 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument 497 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 528 uint8_t key_size) { in gatts_read_attr_perm_check() argument [all …]
|
D | gatt_sr.cc | 427 uint8_t key_size; in gatt_process_read_multi_req() local 434 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req() 459 key_size); in gatt_process_read_multi_req() 494 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req() 918 uint8_t key_size; in gatts_process_read_by_type_req() local 919 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_read_by_type_req() 923 sec_flag, key_size, 0, &err_hdl); in gatts_process_read_by_type_req() 964 uint8_t key_size, *p = p_data; in gatts_process_write_req() local 1001 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req() 1005 sec_flag, key_size); in gatts_process_write_req() [all …]
|
D | gatt_int.h | 677 uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle); 681 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id); 686 uint8_t key_size); 690 uint8_t key_size);
|
/packages/modules/Bluetooth/system/gd/security/ |
D | pairing_handler_le.cc | 71 uint8_t key_size = in PairingMain() local 73 if (key_size < 7 || key_size > 16) { in PairingMain() 74 LOG_WARN("Resulting key size is bad %d", key_size); in PairingMain() 79 if (key_size != 16) { in PairingMain() 126 std::fill(ltk.begin() + key_size, ltk.end(), 0x00); in PairingMain() 156 std::fill(stk.begin() + key_size, stk.end(), 0x00); in PairingMain() 212 .key_size = key_size, in PairingMain() 289 uint8_t key_size = pairing_request->GetMaximumEncryptionKeySize(); in ExchangePairingFeature() local 290 if (key_size < 7 || key_size > 16) { in ExchangePairingFeature() 291 LOG_WARN("Resulting key size is bad %d", key_size); in ExchangePairingFeature()
|
D | initial_informations.h | 60 uint8_t key_size; member
|
/packages/modules/adb/pairing_auth/ |
D | pairing_auth.cpp | 123 size_t key_size = 0; in PairingAuthCtx() local 125 int status = SPAKE2_generate_msg(spake2_ctx_.get(), key, &key_size, SPAKE2_MAX_MSG_SIZE, in PairingAuthCtx() 127 if (status != 1 || key_size == 0) { in PairingAuthCtx() 131 our_msg_.assign(key, key + key_size); in PairingAuthCtx()
|
/packages/modules/Bluetooth/system/stack/btu/ |
D | btu_hcif.cc | 702 uint8_t key_size; in btu_hcif_log_command_complete_metrics() local 705 STREAM_TO_UINT8(key_size, p_return_params); in btu_hcif_log_command_complete_metrics() 707 status, reason, key_size); in btu_hcif_log_command_complete_metrics() 893 uint8_t key_size) { in read_encryption_key_size_complete_after_encryption_change() argument 910 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_encryption_change() 912 << " key_size: " << +key_size; in read_encryption_key_size_complete_after_encryption_change() 1479 …encryption_key_size_complete_after_key_refresh(uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_key_refresh() argument 1495 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_key_refresh() 1497 << " key_size: " << +key_size; in read_encryption_key_size_complete_after_key_refresh()
|
/packages/modules/Bluetooth/system/stack/btm/ |
D | btm_ble.cc | 1124 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key() 1178 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key() 1184 p_rec->ble.key_type, p_rec->ble.keys.div, p_rec->ble.keys.key_size, in btm_sec_save_le_key() 1512 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted() 1562 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply() 1564 BTM_TRACE_ERROR("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply() 1589 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
|
D | btm_int_types.h | 233 uint8_t key_size{0};
|
D | security_device_record.h | 87 uint8_t key_size; /* key size of the LTK delivered to peer device */ member
|
/packages/modules/adb/tls/tests/ |
D | tls_connection_test.cpp | 416 const size_t key_size = 64; in TEST_F() local 417 auto client_key_material = client_->ExportKeyingMaterial(key_size); in TEST_F() 419 auto server_key_material = server_->ExportKeyingMaterial(key_size); in TEST_F() 421 ASSERT_EQ(client_key_material.size(), key_size); in TEST_F()
|
/packages/modules/Virtualization/libs/devicemapper/src/ |
D | crypt.rs | 58 fn validata_key_size(&self, key_size: usize) -> bool { in validata_key_size() 59 key_size == self.get_required_key_size() in validata_key_size()
|
/packages/modules/Bluetooth/system/stack/test/gatt/ |
D | gatt_sr_test.cc | 91 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument 104 uint8_t key_size) { in gatts_read_attr_perm_check() argument 110 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument 118 uint8_t key_size) { in gatts_write_attr_perm_check() argument
|
/packages/modules/Bluetooth/system/stack/include/ |
D | btm_ble_api_types.h | 523 uint8_t key_size; member 537 uint8_t key_size; member
|
/packages/modules/Bluetooth/tools/rootcanal/rust/test/ENC/ |
D | BV-26-C.in | 13 key_size: 0x10,
|
D | BV-01-C.in | 13 key_size: 0x10,
|
D | BV-34-C.in | 21 key_size: 0x10,
|
D | BV-05-C.in | 21 key_size: 0x10,
|
/packages/modules/Bluetooth/system/gd/security/record/ |
D | security_record_storage.cc | 72 penc_keys[27] = record->key_size; in SetLeData() 167 record->key_size = peer_encryption_keys->data()[27]; in LoadSecurityRecords()
|
D | security_record.h | 130 uint8_t key_size; variable
|
D | security_record_storage_test.cc | 96 record->key_size = 16; in TEST_F()
|
/packages/modules/Bluetooth/tools/rootcanal/rust/src/lmp/procedure/ |
D | encryption.rs | 32 lmp::EncryptionKeySizeReqBuilder { transaction_id: 0, key_size: 16 }.build(), in initiate()
|
D | secure_simple_pairing.rs | 108 let key_size: usize = in receive_public_key() localVariable 110 let mut key = PublicKey::new(key_size).unwrap(); in receive_public_key()
|
/packages/modules/Bluetooth/tools/rootcanal/rust/ |
D | lmp_packets.pdl | 192 key_size: 8,
|
/packages/modules/Bluetooth/system/stack/eatt/ |
D | eatt_impl.h | 265 auto key_size = btm_ble_read_sec_key_size(bda); in upper_tester_l2cap_connect_ind() local 266 if (key_size < min_key_size) { in upper_tester_l2cap_connect_ind() 268 LOG_ERROR("Insufficient key size (%d<%d) for device %s", key_size, in upper_tester_l2cap_connect_ind()
|