/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_dm.h | 67 UINT8 sec_level; member in struct:__anon1003 75 UINT8 sec_level; member in struct:__anon1004 82 UINT8 sec_level; member in struct:__anon1005 89 UINT8 sec_level; member in struct:__anon1006
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_act.c | 245 le_key.sec_level = p_cb->sec_level; 285 key.lcsrk_key.sec_level = p_cb->sec_level; 496 le_key.sec_level = p_cb->sec_level; 548 le_key.sec_level = p_cb->sec_level; 817 p_cb->sec_level = SMP_SEC_AUTHENTICATED; 818 SMP_TRACE_EVENT ("p_cb->sec_level [all...] |
H A D | smp_utils.c | 600 evt_data.cmplt.sec_level = p_cb->sec_level; 608 SMP_TRACE_DEBUG ("send SMP_COMPLT_EVT reason=0x%0x sec_level=0x%0x", 610 evt_data.cmplt.sec_level );
|
H A D | smp_int.h | 173 tSMP_SEC_LEVEL sec_level; member in struct:__anon1720
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 898 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; 903 if (p_keys->penc_key.sec_level == SMP_SEC_AUTHENTICATED) 910 p_rec->ble.keys.sec_level); 928 p_rec->ble.keys.srk_sec_level = p_keys->pcsrk_key.sec_level; 932 if ( p_keys->pcsrk_key.sec_level== SMP_SEC_AUTHENTICATED) 937 BTM_TRACE_DEBUG("BTM_LE_KEY_PCSRK key_type=0x%x sec_flags=0x%x sec_level=0x%x peer_counter=%d", 946 p_rec->ble.keys.sec_level = p_keys->lenc_key.sec_level; 950 BTM_TRACE_DEBUG("BTM_LE_KEY_LENC key_type=0x%x DIV=0x%x key_size=0x%x sec_level [all...] |
H A D | btm_sec.c | 88 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 519 ** sec_level - bit mask of the security features 528 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 540 sec_level, psm, mx_proto_id, mx_chan_id)); 545 UNUSED(sec_level); 564 ** sec_level - bit mask of the security features 573 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 585 sec_level, psm, mx_proto_id, mx_chan_id)); 588 sec_level, psm, mx_proto_id, mx_chan_id)); 603 ** sec_level 527 BTM_SetUCDSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 572 BTM_SetSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 611 btm_sec_set_security_level(CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument [all...] |
H A D | btm_int.h | 496 UINT8 sec_level; /* local pairing security level */ member in struct:__anon1248
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | smp_api.h | 138 tSMP_SEC_LEVEL sec_level; member in struct:__anon1614
|
H A D | btm_api.h | 1643 UINT8 sec_level; member in struct:__anon1444 1655 UINT8 sec_level; member in struct:__anon1445 1664 UINT8 sec_level; member in struct:__anon1446 1672 UINT8 sec_level; member in struct:__anon1447 1680 UINT8 sec_level; member in struct:__anon1448 3752 UINT8 service_id, UINT16 sec_level, 3769 UINT8 service_id, UINT16 sec_level,
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 1750 pairing_cb.ble.penc_key.sec_level = p_data->ble_key.key_value.penc_key.sec_level; 1761 BTIF_TRACE_DEBUG("pairing_cb.ble.penc_key.sec_level=0x%02x",pairing_cb.ble.penc_key.sec_level); 1788 pairing_cb.ble.pcsrk_key.sec_level = p_data->ble_key.key_value.pcsrk_key.sec_level; 1796 BTIF_TRACE_DEBUG("pairing_cb.ble.pcsrk_key.sec_level=0x%02x",pairing_cb.ble.pcsrk_key.sec_level); 1804 pairing_cb.ble.lenc_key.sec_level = p_data->ble_key.key_value.lenc_key.sec_level; [all...] |
H A D | btif_storage.c | 1217 BTIF_TRACE_DEBUG("p->penc_key.sec_level=0x%02x",p->penc_key.sec_level); 1275 BTIF_TRACE_DEBUG("p->pcsrk_key.sec_level=0x%02x",p->psrk_key.sec_level); 1298 BTIF_TRACE_DEBUG("p->lenc_key.sec_level=0x%02x",p->lenc_key.sec_level); 1321 BTIF_TRACE_DEBUG("p->lcsrk_key.sec_level=0x%02x",p->lcsrk_key.sec_level);
|