Searched refs:sec_level (Results 1 - 11 of 11) sorted by relevance

/external/bluetooth/bluedroid/btif/include/
H A Dbtif_dm.h67 UINT8 sec_level; member in struct:__anon1003
75 UINT8 sec_level; member in struct:__anon1004
82 UINT8 sec_level; member in struct:__anon1005
89 UINT8 sec_level; member in struct:__anon1006
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_act.c245 le_key.sec_level = p_cb->sec_level;
285 key.lcsrk_key.sec_level = p_cb->sec_level;
496 le_key.sec_level = p_cb->sec_level;
548 le_key.sec_level = p_cb->sec_level;
817 p_cb->sec_level = SMP_SEC_AUTHENTICATED;
818 SMP_TRACE_EVENT ("p_cb->sec_level
[all...]
H A Dsmp_utils.c600 evt_data.cmplt.sec_level = p_cb->sec_level;
608 SMP_TRACE_DEBUG ("send SMP_COMPLT_EVT reason=0x%0x sec_level=0x%0x",
610 evt_data.cmplt.sec_level );
H A Dsmp_int.h173 tSMP_SEC_LEVEL sec_level; member in struct:__anon1720
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_ble.c898 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level;
903 if (p_keys->penc_key.sec_level == SMP_SEC_AUTHENTICATED)
910 p_rec->ble.keys.sec_level);
928 p_rec->ble.keys.srk_sec_level = p_keys->pcsrk_key.sec_level;
932 if ( p_keys->pcsrk_key.sec_level== SMP_SEC_AUTHENTICATED)
937 BTM_TRACE_DEBUG("BTM_LE_KEY_PCSRK key_type=0x%x sec_flags=0x%x sec_level=0x%x peer_counter=%d",
946 p_rec->ble.keys.sec_level = p_keys->lenc_key.sec_level;
950 BTM_TRACE_DEBUG("BTM_LE_KEY_LENC key_type=0x%x DIV=0x%x key_size=0x%x sec_level
[all...]
H A Dbtm_sec.c88 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
519 ** sec_level - bit mask of the security features
528 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
540 sec_level, psm, mx_proto_id, mx_chan_id));
545 UNUSED(sec_level);
564 ** sec_level - bit mask of the security features
573 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
585 sec_level, psm, mx_proto_id, mx_chan_id));
588 sec_level, psm, mx_proto_id, mx_chan_id));
603 ** sec_level
527 BTM_SetUCDSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument
572 BTM_SetSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument
611 btm_sec_set_security_level(CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument
[all...]
H A Dbtm_int.h496 UINT8 sec_level; /* local pairing security level */ member in struct:__anon1248
/external/bluetooth/bluedroid/stack/include/
H A Dsmp_api.h138 tSMP_SEC_LEVEL sec_level; member in struct:__anon1614
H A Dbtm_api.h1643 UINT8 sec_level; member in struct:__anon1444
1655 UINT8 sec_level; member in struct:__anon1445
1664 UINT8 sec_level; member in struct:__anon1446
1672 UINT8 sec_level; member in struct:__anon1447
1680 UINT8 sec_level; member in struct:__anon1448
3752 UINT8 service_id, UINT16 sec_level,
3769 UINT8 service_id, UINT16 sec_level,
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_dm.c1750 pairing_cb.ble.penc_key.sec_level = p_data->ble_key.key_value.penc_key.sec_level;
1761 BTIF_TRACE_DEBUG("pairing_cb.ble.penc_key.sec_level=0x%02x",pairing_cb.ble.penc_key.sec_level);
1788 pairing_cb.ble.pcsrk_key.sec_level = p_data->ble_key.key_value.pcsrk_key.sec_level;
1796 BTIF_TRACE_DEBUG("pairing_cb.ble.pcsrk_key.sec_level=0x%02x",pairing_cb.ble.pcsrk_key.sec_level);
1804 pairing_cb.ble.lenc_key.sec_level = p_data->ble_key.key_value.lenc_key.sec_level;
[all...]
H A Dbtif_storage.c1217 BTIF_TRACE_DEBUG("p->penc_key.sec_level=0x%02x",p->penc_key.sec_level);
1275 BTIF_TRACE_DEBUG("p->pcsrk_key.sec_level=0x%02x",p->psrk_key.sec_level);
1298 BTIF_TRACE_DEBUG("p->lenc_key.sec_level=0x%02x",p->lenc_key.sec_level);
1321 BTIF_TRACE_DEBUG("p->lcsrk_key.sec_level=0x%02x",p->lcsrk_key.sec_level);

Completed in 3145 milliseconds