Home | History | Annotate | Download | only in smp

Lines Matching refs:BT_OCTET16_LEN

61                            p[BT_OCTET16_LEN - i*4 -1], p[BT_OCTET16_LEN - i*4 -2],
62 p[BT_OCTET16_LEN - i*4 -3], p[BT_OCTET16_LEN - i*4 -4]);
73 ** must point to a BT_OCTET16_LEN memory space; where include
83 for ( i = length ; i < BT_OCTET16_LEN; i++ )
84 p[BT_OCTET16_LEN - i - 1] = ( i == length ) ? 0x80 : 0;
100 for ( i = 0; i < BT_OCTET16_LEN ; i ++ )
143 smp_xor_128(&cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], x); /* Mi' := Mi (+) X */
145 if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET16_LEN, &output))
151 memcpy(x, output.param_buf, BT_OCTET16_LEN);
157 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen);
189 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE;
215 UINT8 k1[BT_OCTET16_LEN], k2[BT_OCTET16_LEN];
221 if ( (pp[BT_OCTET16_LEN - 1] & 0x80) != 0 )
232 if ( (k1[BT_OCTET16_LEN - 1] & 0x80) != 0 )
267 if (SMP_Encrypt(key, BT_OCTET16_LEN, z, BT_OCTET16_LEN, &output))
295 UINT16 n = (length + BT_OCTET16_LEN - 1) / BT_OCTET16_LEN; /* n is number of rounds */
301 len = n * BT_OCTET16_LEN;