Searched refs:rmt_io_caps (Results 1 - 7 of 7) sorted by relevance
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_dev.c | 157 p_dev_rec->rmt_io_caps = io_cap;
|
H A D | btm_sec.c | 2135 BTM_TRACE_DEBUG ("btm_sec_is_upgrade_possible id:%d, link_key_typet:%d, rmt_io_caps:%d, chk flags:x%x, flags:x%x", 2136 p_dev_rec->p_cur_service->service_id, p_dev_rec->link_key_type, p_dev_rec->rmt_io_caps, 2141 BTM_TRACE_DEBUG ("btm_sec_is_upgrade_possible link_key_typet:%d, rmt_io_caps:%d, chk flags:x%x, ", 2142 p_dev_rec->link_key_type, p_dev_rec->rmt_io_caps, mtm_check); 2149 && (p_dev_rec->rmt_io_caps < BTM_IO_CAP_MAX) /* a valid peer IO cap */ 2150 && (btm_sec_io_map[p_dev_rec->rmt_io_caps][btm_cb.devcb.loc_io_caps])) /* authenticated link key is possible */ 3554 p_dev_rec->rmt_io_caps = evt_data.io_cap; 3609 if ( (p_dev_rec->rmt_io_caps == BTM_IO_CAP_IO) 3619 evt_data.cfm_req.just_works, btm_cb.devcb.loc_io_caps, p_dev_rec->rmt_io_caps, 3625 evt_data.cfm_req.rmt_io_caps [all...] |
H A D | btm_int.h | 601 tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */ member in struct:__anon1250
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 953 (p_ssp_cfm_req->rmt_io_caps == 0x00 || p_ssp_cfm_req->rmt_io_caps == 0x03))) 955 BTIF_TRACE_EVENT("%s: User consent needed for incoming pairing request. loc_io_caps: %d, rmt_io_caps: %d", 956 __FUNCTION__, p_ssp_cfm_req->loc_io_caps, p_ssp_cfm_req->rmt_io_caps);
|
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_api.h | 873 tBTA_AUTH_REQ rmt_io_caps; /* IO Capabilities of remote device */ member in struct:__anon714
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | btm_api.h | 1485 tBTM_IO_CAP rmt_io_caps; /* IO Capabilities of the remot device */ member in struct:__anon1432
|
/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_act.c | 3073 sec_event.cfm_req.rmt_io_caps = p_data->cfm_req.rmt_io_caps;
|
Completed in 252 milliseconds