Home
last modified time | relevance | path

Searched refs:tk (Results 1 – 13 of 13) sorted by relevance

/system/bt/gd/security/
Dpairing_handler_le_legacy.cc108 Octet16 tk{0}; in LegacyPasskeyEntry() local
109 tk[0] = (uint8_t)(passkey); in LegacyPasskeyEntry()
110 tk[1] = (uint8_t)(passkey >> 8); in LegacyPasskeyEntry()
111 tk[2] = (uint8_t)(passkey >> 16); in LegacyPasskeyEntry()
112 tk[3] = (uint8_t)(passkey >> 24); in LegacyPasskeyEntry()
115 return tk; in LegacyPasskeyEntry()
123 … const PairingResponseView& pairing_response, const Octet16& tk) { in DoLegacyStage2() argument
138 tk, in DoLegacyStage2()
172 tk, in DoLegacyStage2()
194 tk, in DoLegacyStage2()
[all …]
Dpairing_handler_le.cc129 Octet16 tk = std::get<Octet16>(stage1result); in PairingMain() local
130 StkOrFailure stage2result = DoLegacyStage2(i, pairing_request, pairing_response, tk); in PairingMain()
Dpairing_handler_le.h220 const PairingResponseView& pairing_response, const Octet16& tk);
/system/keymaster/tests/
Dwrapped_key_test.cpp72 KeymasterKeyBlob tk = {reinterpret_cast<const uint8_t*>(test_transit_key.c_str()), in TEST() local
80 build_wrapped_key(tk, iv, KM_KEY_FORMAT_RAW, secure_key, tag, authorization_list, &asn1), in TEST()
/system/bt/stack/smp/
Dsmp_api.cc356 smp_convert_string_to_tk(&p_cb->tk, passkey); in SMP_PasskeyReply()
442 memcpy(p_cb->tk.data(), p_data, len); in SMP_OobDataReply()
445 key.p_data = p_cb->tk.data(); in SMP_OobDataReply()
Dsmp_keys.cc112 uint8_t* tt = p_cb->tk.data(); in smp_proc_passkey()
124 p_cb->tk = {0}; in smp_proc_passkey()
141 key.p_data = p_cb->tk.data(); in smp_proc_passkey()
359 smp_debug_print_nbyte_little_endian(p_cb->tk.data(), "TK", 16); in smp_calculate_comfirm()
360 Octet16 e1 = aes_128(p_cb->tk, p1); in smp_calculate_comfirm()
368 *output = aes_128(p_cb->tk, p2); in smp_calculate_comfirm()
598 return aes_128(p_cb->tk, text); in smp_calculate_legacy_short_term_key()
Dsmp_int.h315 Octet16 tk; member
449 extern void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey);
Dsmp_utils.cc810 void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey) { in smp_convert_string_to_tk() argument
811 uint8_t* p = tk->data(); in smp_convert_string_to_tk()
817 key.p_data = tk->data(); in smp_convert_string_to_tk()
Dsmp_act.cc995 STREAM_TO_ARRAY(p_cb->tk.data(), p, OCTET16_LEN); /* reuse TK for IRK */ in smp_proc_id_info()
1018 pid_key.pid_key.irk = p_cb->tk; in smp_proc_id_addr()
1310 key.p_data = p_cb->tk.data(); in smp_decide_association_model()
1313 p_cb->tk = {0}; in smp_decide_association_model()
/system/bt/stack/test/
Dstack_smp_test.cc135 p_cb_.tk = {0}; in SetUp()
193 Octet16 output = crypto_toolbox::aes_128(p_cb_.tk, p1.data(), OCTET16_LEN); in TEST_F()
/system/timezone/input_data/android/
Dcountryzones.txt3084 isoCode:"tk"
/system/core/libprocinfo/testdata/
Dmaps1299 …0-70e9941000 r--s 00000000 fc:00 1129 /system/usr/hyphen-data/hyph-tk.hyb
/system/memory/libmeminfo/testdata1/
Dsmaps42343 …000-7007f937c000 r--s 00000000 fe:00 1018 /system/usr/hyphen-data/hyph-tk.hyb