Searched refs:auth_req (Results 1 - 25 of 25) sorted by relevance

/external/bluetooth/bluedroid/bta/include/
H A Dbta_dm_ci.h49 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req);
H A Dbta_gatt_api.h825 tBTA_GATT_AUTH_REQ auth_req);
841 tBTA_GATT_AUTH_REQ auth_req);
863 tBTA_GATT_AUTH_REQ auth_req);
883 tBTA_GATT_AUTH_REQ auth_req);
954 tBTA_GATT_AUTH_REQ auth_req);
984 tBTA_GATT_AUTH_REQ auth_req);
H A Dbta_dm_co.h86 ** auth_req - TRUE, if MITM protection is required.
92 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req);
/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_ci.c47 tBTA_AUTH_REQ auth_req)
58 p_msg->auth_req = auth_req;
46 bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
H A Dbta_dm_act.c1139 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local
1140 if(p_data->ci_io_req.auth_req)
1141 auth_req = BTM_AUTH_AP_YES;
1143 p_data->ci_io_req.oob_data, auth_req);
2988 /* translate auth_req */
2990 &p_data->io_req.oob_data, &p_data->io_req.auth_req, p_data->io_req.is_orig);
2996 APPL_TRACE_EVENT2("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_data->io_req.oob_data);
3001 p_data->io_rsp.oob_data, p_data->io_rsp.auth_req );
4648 &p_data->io_req.auth_req,
4656 APPL_TRACE_EVENT2("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_dat
[all...]
H A Dbta_dm_int.h295 tBTA_AUTH_REQ auth_req; member in struct:__anon483
/external/bluetooth/bluedroid/bta/gatt/
H A Dbta_gattc_api.c523 tBTA_GATT_AUTH_REQ auth_req)
533 p_buf->auth_req = auth_req;
557 tBTA_GATT_AUTH_REQ auth_req)
567 p_buf->auth_req = auth_req;
592 tBTA_GATT_AUTH_REQ auth_req)
606 p_buf->auth_req = auth_req;
645 tBTA_GATT_AUTH_REQ auth_req)
522 BTA_GATTC_ReadCharacteristic(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATT_AUTH_REQ auth_req) argument
555 BTA_GATTC_ReadCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_descr_id, tBTA_GATT_AUTH_REQ auth_req) argument
591 BTA_GATTC_ReadMultiple(UINT16 conn_id, tBTA_GATTC_MULTI *p_read_multi, tBTA_GATT_AUTH_REQ auth_req) argument
640 BTA_GATTC_WriteCharValue( UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATTC_WRITE_TYPE write_type, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument
687 BTA_GATTC_WriteCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_char_descr_id, tBTA_GATTC_WRITE_TYPE write_type, tBTA_GATT_UNFMT *p_data, tBTA_GATT_AUTH_REQ auth_req) argument
740 BTA_GATTC_PrepareWrite(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, UINT16 offset, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument
[all...]
H A Dbta_gattc_int.h124 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon537
133 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon538
175 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon543
H A Dbta_gattc_act.c946 read_param.by_handle.auth_req = p_data->api_read.auth_req;
1017 read_param.read_multiple.auth_req = p_data->api_read_multi.auth_req;
1065 attr.auth_req = p_data->api_write.auth_req;
/external/bluetooth/bluedroid/stack/gatt/
H A Dgatt_auth.c307 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; local
316 if (auth_req == GATT_AUTH_REQ_NONE )
321 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act);
325 auth_req != GATT_AUTH_REQ_NONE)
349 switch (auth_req)
380 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) ||
381 (auth_req == GATT_AUTH_REQ_SIGNED_MITM)))
H A Dgatt_api.c618 indication.auth_req = GATT_AUTH_REQ_NONE;
690 notif.auth_req = GATT_AUTH_REQ_NONE;;
914 p_clcb->auth_req = p_read->by_handle.auth_req;
1000 p_clcb->auth_req = p_write->auth_req;
H A Dgatt_int.h393 tGATT_AUTH_REQ auth_req; /* authentication requirement */ member in struct:__anon1153
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_gatt_client.c114 uint8_t auth_req; member in struct:__anon970
637 BTA_GATTC_ReadCharacteristic(p_cb->conn_id, &in_char_id, p_cb->auth_req);
645 BTA_GATTC_ReadCharDescr(p_cb->conn_id, &in_char_descr_id, p_cb->auth_req);
656 p_cb->auth_req);
669 p_cb->auth_req);
845 btgatt_char_id_t* char_id, int auth_req )
850 btif_cb.auth_req = (uint8_t) auth_req;
859 int auth_req )
864 btif_cb.auth_req
872 btif_gattc_write_char(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_char_id_t* char_id, int write_type, int len, int auth_req, char* p_value) argument
889 btif_gattc_write_char_descr(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_char_id_t* char_id, bt_uuid_t* descr_id, int write_type, int len, int auth_req, char* p_value) argument
[all...]
H A Dbtif_gatt_util.c135 p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
/external/bluetooth/bluedroid/stack/include/
H A Dgatt_api.h307 tGATT_AUTH_REQ auth_req; /* authentication request */ member in struct:__anon1359
421 tGATT_AUTH_REQ auth_req; member in struct:__anon1369
432 tGATT_AUTH_REQ auth_req; member in struct:__anon1370
440 tGATT_AUTH_REQ auth_req; member in struct:__anon1371
447 tGATT_AUTH_REQ auth_req; member in struct:__anon1372
H A Dsmp_api.h129 tSMP_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1446
H A Dbtm_api.h1429 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1290
1439 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member in struct:__anon1291
1599 tBTM_LE_AUTH_REQ auth_req; /* Authentication request (for local device) contain bonding and MITM info */ member in struct:__anon1303
4037 ** auth_req- MITM protection required or not.
4041 tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req);
H A Dhcimsgs.h507 UINT8 oob_present, UINT8 auth_req);
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_ble.c1004 void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument
1009 BTM_TRACE_DEBUG1 ("btm_ble_link_sec_check auth_req =0x%x", auth_req);
1026 if ((auth_req == (BTM_LE_AUTH_REQ_BOND|BTM_LE_AUTH_REQ_MITM)) ||
1027 (auth_req == (BTM_LE_AUTH_REQ_MITM)) )
1382 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK;
1384 BTM_TRACE_DEBUG2 ("btm_ble_io_capabilities_req 1: p_dev_rec->security_required = %d auth_req:%d",
1385 p_dev_rec->security_required, p_data->auth_req);
1392 p_data->auth_req |= BTM_LE_AUTH_REQ_MITM;
1394 if (!(p_data->auth_req
[all...]
H A Dbtm_sec.c1692 ** auth_req- MITM protection required or not.
1695 void BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument
1706 btm_cb.devcb.loc_auth_req = auth_req;
1710 auth_req = (BTM_AUTH_DD_BOND | (auth_req&BTM_AUTH_YN_BIT));
1712 btsnd_hcic_io_cap_req_reply (bd_addr, io_cap, oob, auth_req);
3209 evt_data.auth_req = BTM_DEFAULT_AUTH_REQ;
3227 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ;
3244 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ;
3276 evt_data.auth_req
4703 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local
4705 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_YES; local
[all...]
H A Dbtm_ble_int.h265 extern void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act);
/external/bluetooth/bluedroid/btif/co/
H A Dbta_dm_co.c89 ** auth_req - TRUE, if MITM protection is required.
95 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req)
94 bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_act.c91 cb_data.io_req.auth_req = p_cb->peer_auth_req;
106 p_cb->loc_auth_req = cb_data.io_req.auth_req;
288 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ *)p_data; local
292 SMP_TRACE_DEBUG1 ("smp_proc_sec_req auth_req=0x%x",auth_req);
296 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act);
310 p_cb->peer_auth_req = auth_req;
/external/bluetooth/bluedroid/stack/gap/
H A Dgap_ble.c752 param.service.auth_req = 0;
/external/bluetooth/bluedroid/stack/hcic/
H A Dhcicmds.c2387 UINT8 oob_present, UINT8 auth_req)
2406 UINT8_TO_STREAM (pp, auth_req);
2386 btsnd_hcic_io_cap_req_reply(BD_ADDR bd_addr, UINT8 capability, UINT8 oob_present, UINT8 auth_req) argument

Completed in 295 milliseconds