/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_dm_ci.h | 49 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req);
|
H A D | bta_gatt_api.h | 825 tBTA_GATT_AUTH_REQ auth_req); 841 tBTA_GATT_AUTH_REQ auth_req); 863 tBTA_GATT_AUTH_REQ auth_req); 883 tBTA_GATT_AUTH_REQ auth_req); 954 tBTA_GATT_AUTH_REQ auth_req); 984 tBTA_GATT_AUTH_REQ auth_req);
|
H A D | bta_dm_co.h | 86 ** auth_req - TRUE, if MITM protection is required. 92 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req);
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_ci.c | 47 tBTA_AUTH_REQ auth_req) 58 p_msg->auth_req = auth_req; 46 bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
H A D | bta_dm_act.c | 1139 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 1140 if(p_data->ci_io_req.auth_req) 1141 auth_req = BTM_AUTH_AP_YES; 1143 p_data->ci_io_req.oob_data, auth_req); 2988 /* translate auth_req */ 2990 &p_data->io_req.oob_data, &p_data->io_req.auth_req, p_data->io_req.is_orig); 2996 APPL_TRACE_EVENT2("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_data->io_req.oob_data); 3001 p_data->io_rsp.oob_data, p_data->io_rsp.auth_req ); 4648 &p_data->io_req.auth_req, 4656 APPL_TRACE_EVENT2("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_dat [all...] |
H A D | bta_dm_int.h | 295 tBTA_AUTH_REQ auth_req; member in struct:__anon483
|
/external/bluetooth/bluedroid/bta/gatt/ |
H A D | bta_gattc_api.c | 523 tBTA_GATT_AUTH_REQ auth_req) 533 p_buf->auth_req = auth_req; 557 tBTA_GATT_AUTH_REQ auth_req) 567 p_buf->auth_req = auth_req; 592 tBTA_GATT_AUTH_REQ auth_req) 606 p_buf->auth_req = auth_req; 645 tBTA_GATT_AUTH_REQ auth_req) 522 BTA_GATTC_ReadCharacteristic(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATT_AUTH_REQ auth_req) argument 555 BTA_GATTC_ReadCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_descr_id, tBTA_GATT_AUTH_REQ auth_req) argument 591 BTA_GATTC_ReadMultiple(UINT16 conn_id, tBTA_GATTC_MULTI *p_read_multi, tBTA_GATT_AUTH_REQ auth_req) argument 640 BTA_GATTC_WriteCharValue( UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATTC_WRITE_TYPE write_type, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument 687 BTA_GATTC_WriteCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_char_descr_id, tBTA_GATTC_WRITE_TYPE write_type, tBTA_GATT_UNFMT *p_data, tBTA_GATT_AUTH_REQ auth_req) argument 740 BTA_GATTC_PrepareWrite(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, UINT16 offset, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument [all...] |
H A D | bta_gattc_int.h | 124 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon537 133 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon538 175 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon543
|
H A D | bta_gattc_act.c | 946 read_param.by_handle.auth_req = p_data->api_read.auth_req; 1017 read_param.read_multiple.auth_req = p_data->api_read_multi.auth_req; 1065 attr.auth_req = p_data->api_write.auth_req;
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_auth.c | 307 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; local 316 if (auth_req == GATT_AUTH_REQ_NONE ) 321 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act); 325 auth_req != GATT_AUTH_REQ_NONE) 349 switch (auth_req) 380 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) || 381 (auth_req == GATT_AUTH_REQ_SIGNED_MITM)))
|
H A D | gatt_api.c | 618 indication.auth_req = GATT_AUTH_REQ_NONE; 690 notif.auth_req = GATT_AUTH_REQ_NONE;; 914 p_clcb->auth_req = p_read->by_handle.auth_req; 1000 p_clcb->auth_req = p_write->auth_req;
|
H A D | gatt_int.h | 393 tGATT_AUTH_REQ auth_req; /* authentication requirement */ member in struct:__anon1153
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_gatt_client.c | 114 uint8_t auth_req; member in struct:__anon970 637 BTA_GATTC_ReadCharacteristic(p_cb->conn_id, &in_char_id, p_cb->auth_req); 645 BTA_GATTC_ReadCharDescr(p_cb->conn_id, &in_char_descr_id, p_cb->auth_req); 656 p_cb->auth_req); 669 p_cb->auth_req); 845 btgatt_char_id_t* char_id, int auth_req ) 850 btif_cb.auth_req = (uint8_t) auth_req; 859 int auth_req ) 864 btif_cb.auth_req 872 btif_gattc_write_char(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_char_id_t* char_id, int write_type, int len, int auth_req, char* p_value) argument 889 btif_gattc_write_char_descr(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_char_id_t* char_id, bt_uuid_t* descr_id, int write_type, int len, int auth_req, char* p_value) argument [all...] |
H A D | btif_gatt_util.c | 135 p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | gatt_api.h | 307 tGATT_AUTH_REQ auth_req; /* authentication request */ member in struct:__anon1359 421 tGATT_AUTH_REQ auth_req; member in struct:__anon1369 432 tGATT_AUTH_REQ auth_req; member in struct:__anon1370 440 tGATT_AUTH_REQ auth_req; member in struct:__anon1371 447 tGATT_AUTH_REQ auth_req; member in struct:__anon1372
|
H A D | smp_api.h | 129 tSMP_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1446
|
H A D | btm_api.h | 1429 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1290 1439 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member in struct:__anon1291 1599 tBTM_LE_AUTH_REQ auth_req; /* Authentication request (for local device) contain bonding and MITM info */ member in struct:__anon1303 4037 ** auth_req- MITM protection required or not. 4041 tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req);
|
H A D | hcimsgs.h | 507 UINT8 oob_present, UINT8 auth_req);
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 1004 void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument 1009 BTM_TRACE_DEBUG1 ("btm_ble_link_sec_check auth_req =0x%x", auth_req); 1026 if ((auth_req == (BTM_LE_AUTH_REQ_BOND|BTM_LE_AUTH_REQ_MITM)) || 1027 (auth_req == (BTM_LE_AUTH_REQ_MITM)) ) 1382 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK; 1384 BTM_TRACE_DEBUG2 ("btm_ble_io_capabilities_req 1: p_dev_rec->security_required = %d auth_req:%d", 1385 p_dev_rec->security_required, p_data->auth_req); 1392 p_data->auth_req |= BTM_LE_AUTH_REQ_MITM; 1394 if (!(p_data->auth_req [all...] |
H A D | btm_sec.c | 1692 ** auth_req- MITM protection required or not. 1695 void BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 1706 btm_cb.devcb.loc_auth_req = auth_req; 1710 auth_req = (BTM_AUTH_DD_BOND | (auth_req&BTM_AUTH_YN_BIT)); 1712 btsnd_hcic_io_cap_req_reply (bd_addr, io_cap, oob, auth_req); 3209 evt_data.auth_req = BTM_DEFAULT_AUTH_REQ; 3227 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3244 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3276 evt_data.auth_req 4703 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 4705 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_YES; local [all...] |
H A D | btm_ble_int.h | 265 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act);
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_dm_co.c | 89 ** auth_req - TRUE, if MITM protection is required. 95 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) 94 bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_act.c | 91 cb_data.io_req.auth_req = p_cb->peer_auth_req; 106 p_cb->loc_auth_req = cb_data.io_req.auth_req; 288 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ *)p_data; local 292 SMP_TRACE_DEBUG1 ("smp_proc_sec_req auth_req=0x%x",auth_req); 296 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act); 310 p_cb->peer_auth_req = auth_req;
|
/external/bluetooth/bluedroid/stack/gap/ |
H A D | gap_ble.c | 752 param.service.auth_req = 0;
|
/external/bluetooth/bluedroid/stack/hcic/ |
H A D | hcicmds.c | 2387 UINT8 oob_present, UINT8 auth_req) 2406 UINT8_TO_STREAM (pp, auth_req); 2386 btsnd_hcic_io_cap_req_reply(BD_ADDR bd_addr, UINT8 capability, UINT8 oob_present, UINT8 auth_req) argument
|