Searched refs:rmt_io_caps (Results 1 - 7 of 7) sorted by relevance

/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_dev.c157 p_dev_rec->rmt_io_caps = io_cap;
H A Dbtm_sec.c2135 BTM_TRACE_DEBUG ("btm_sec_is_upgrade_possible id:%d, link_key_typet:%d, rmt_io_caps:%d, chk flags:x%x, flags:x%x",
2136 p_dev_rec->p_cur_service->service_id, p_dev_rec->link_key_type, p_dev_rec->rmt_io_caps,
2141 BTM_TRACE_DEBUG ("btm_sec_is_upgrade_possible link_key_typet:%d, rmt_io_caps:%d, chk flags:x%x, ",
2142 p_dev_rec->link_key_type, p_dev_rec->rmt_io_caps, mtm_check);
2149 && (p_dev_rec->rmt_io_caps < BTM_IO_CAP_MAX) /* a valid peer IO cap */
2150 && (btm_sec_io_map[p_dev_rec->rmt_io_caps][btm_cb.devcb.loc_io_caps])) /* authenticated link key is possible */
3554 p_dev_rec->rmt_io_caps = evt_data.io_cap;
3609 if ( (p_dev_rec->rmt_io_caps == BTM_IO_CAP_IO)
3619 evt_data.cfm_req.just_works, btm_cb.devcb.loc_io_caps, p_dev_rec->rmt_io_caps,
3625 evt_data.cfm_req.rmt_io_caps
[all...]
H A Dbtm_int.h601 tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */ member in struct:__anon1250
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_dm.c953 (p_ssp_cfm_req->rmt_io_caps == 0x00 || p_ssp_cfm_req->rmt_io_caps == 0x03)))
955 BTIF_TRACE_EVENT("%s: User consent needed for incoming pairing request. loc_io_caps: %d, rmt_io_caps: %d",
956 __FUNCTION__, p_ssp_cfm_req->loc_io_caps, p_ssp_cfm_req->rmt_io_caps);
/external/bluetooth/bluedroid/bta/include/
H A Dbta_api.h873 tBTA_AUTH_REQ rmt_io_caps; /* IO Capabilities of remote device */ member in struct:__anon714
/external/bluetooth/bluedroid/stack/include/
H A Dbtm_api.h1485 tBTM_IO_CAP rmt_io_caps; /* IO Capabilities of the remot device */ member in struct:__anon1432
/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_act.c3073 sec_event.cfm_req.rmt_io_caps = p_data->cfm_req.rmt_io_caps;

Completed in 252 milliseconds