Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 34) sorted by relevance

12

/packages/modules/Bluetooth/system/stack/gatt/
Dgatt_db.cc89 uint8_t key_size) { in gatts_check_attr_readability() argument
120 (key_size < min_key_size)) { in gatts_check_attr_readability()
132 if (key_size < min_key_size) { in gatts_check_attr_readability()
180 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { in read_attr_value() argument
188 sec_flag, key_size); in read_attr_value()
287 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument
304 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
489 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument
497 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
528 uint8_t key_size) { in gatts_read_attr_perm_check() argument
[all …]
Dgatt_sr.cc427 uint8_t key_size; in gatt_process_read_multi_req() local
434 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req()
459 key_size); in gatt_process_read_multi_req()
494 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req()
918 uint8_t key_size; in gatts_process_read_by_type_req() local
919 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_read_by_type_req()
923 sec_flag, key_size, 0, &err_hdl); in gatts_process_read_by_type_req()
964 uint8_t key_size, *p = p_data; in gatts_process_write_req() local
1001 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req()
1005 sec_flag, key_size); in gatts_process_write_req()
[all …]
Dgatt_int.h677 uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle);
681 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id);
686 uint8_t key_size);
690 uint8_t key_size);
/packages/modules/Bluetooth/system/gd/security/
Dpairing_handler_le.cc71 uint8_t key_size = in PairingMain() local
73 if (key_size < 7 || key_size > 16) { in PairingMain()
74 LOG_WARN("Resulting key size is bad %d", key_size); in PairingMain()
79 if (key_size != 16) { in PairingMain()
126 std::fill(ltk.begin() + key_size, ltk.end(), 0x00); in PairingMain()
156 std::fill(stk.begin() + key_size, stk.end(), 0x00); in PairingMain()
212 .key_size = key_size, in PairingMain()
289 uint8_t key_size = pairing_request->GetMaximumEncryptionKeySize(); in ExchangePairingFeature() local
290 if (key_size < 7 || key_size > 16) { in ExchangePairingFeature()
291 LOG_WARN("Resulting key size is bad %d", key_size); in ExchangePairingFeature()
Dinitial_informations.h60 uint8_t key_size; member
/packages/modules/adb/pairing_auth/
Dpairing_auth.cpp123 size_t key_size = 0; in PairingAuthCtx() local
125 int status = SPAKE2_generate_msg(spake2_ctx_.get(), key, &key_size, SPAKE2_MAX_MSG_SIZE, in PairingAuthCtx()
127 if (status != 1 || key_size == 0) { in PairingAuthCtx()
131 our_msg_.assign(key, key + key_size); in PairingAuthCtx()
/packages/modules/Bluetooth/system/stack/btu/
Dbtu_hcif.cc702 uint8_t key_size; in btu_hcif_log_command_complete_metrics() local
705 STREAM_TO_UINT8(key_size, p_return_params); in btu_hcif_log_command_complete_metrics()
707 status, reason, key_size); in btu_hcif_log_command_complete_metrics()
893 uint8_t key_size) { in read_encryption_key_size_complete_after_encryption_change() argument
910 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_encryption_change()
912 << " key_size: " << +key_size; in read_encryption_key_size_complete_after_encryption_change()
1479 …encryption_key_size_complete_after_key_refresh(uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_key_refresh() argument
1495 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_key_refresh()
1497 << " key_size: " << +key_size; in read_encryption_key_size_complete_after_key_refresh()
/packages/modules/Bluetooth/system/stack/btm/
Dbtm_ble.cc1124 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; in btm_sec_save_le_key()
1178 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; in btm_sec_save_le_key()
1184 p_rec->ble.key_type, p_rec->ble.keys.div, p_rec->ble.keys.key_size, in btm_sec_save_le_key()
1512 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; in btm_ble_link_encrypted()
1562 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
1564 BTM_TRACE_ERROR("key size = %d", p_rec->ble.keys.key_size); in btm_ble_ltk_request_reply()
1589 p_cb->key_size = p_rec->ble.keys.key_size; in btm_ble_ltk_request_reply()
Dbtm_int_types.h233 uint8_t key_size{0};
Dsecurity_device_record.h87 uint8_t key_size; /* key size of the LTK delivered to peer device */ member
/packages/modules/adb/tls/tests/
Dtls_connection_test.cpp416 const size_t key_size = 64; in TEST_F() local
417 auto client_key_material = client_->ExportKeyingMaterial(key_size); in TEST_F()
419 auto server_key_material = server_->ExportKeyingMaterial(key_size); in TEST_F()
421 ASSERT_EQ(client_key_material.size(), key_size); in TEST_F()
/packages/modules/Virtualization/libs/devicemapper/src/
Dcrypt.rs58 fn validata_key_size(&self, key_size: usize) -> bool { in validata_key_size()
59 key_size == self.get_required_key_size() in validata_key_size()
/packages/modules/Bluetooth/system/stack/test/gatt/
Dgatt_sr_test.cc91 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument
104 uint8_t key_size) { in gatts_read_attr_perm_check() argument
110 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument
118 uint8_t key_size) { in gatts_write_attr_perm_check() argument
/packages/modules/Bluetooth/system/stack/include/
Dbtm_ble_api_types.h523 uint8_t key_size; member
537 uint8_t key_size; member
/packages/modules/Bluetooth/tools/rootcanal/rust/test/ENC/
DBV-26-C.in13 key_size: 0x10,
DBV-01-C.in13 key_size: 0x10,
DBV-34-C.in21 key_size: 0x10,
DBV-05-C.in21 key_size: 0x10,
/packages/modules/Bluetooth/system/gd/security/record/
Dsecurity_record_storage.cc72 penc_keys[27] = record->key_size; in SetLeData()
167 record->key_size = peer_encryption_keys->data()[27]; in LoadSecurityRecords()
Dsecurity_record.h130 uint8_t key_size; variable
Dsecurity_record_storage_test.cc96 record->key_size = 16; in TEST_F()
/packages/modules/Bluetooth/tools/rootcanal/rust/src/lmp/procedure/
Dencryption.rs32 lmp::EncryptionKeySizeReqBuilder { transaction_id: 0, key_size: 16 }.build(), in initiate()
Dsecure_simple_pairing.rs108 let key_size: usize = in receive_public_key() localVariable
110 let mut key = PublicKey::new(key_size).unwrap(); in receive_public_key()
/packages/modules/Bluetooth/tools/rootcanal/rust/
Dlmp_packets.pdl192 key_size: 8,
/packages/modules/Bluetooth/system/stack/eatt/
Deatt_impl.h265 auto key_size = btm_ble_read_sec_key_size(bda); in upper_tester_l2cap_connect_ind() local
266 if (key_size < min_key_size) { in upper_tester_l2cap_connect_ind()
268 LOG_ERROR("Insufficient key size (%d<%d) for device %s", key_size, in upper_tester_l2cap_connect_ind()

12