/external/bluetooth/bluedroid/bta/dm/ |
H A D | bta_dm_ci.c | 47 tBTA_AUTH_REQ auth_req) 58 p_msg->auth_req = auth_req; 46 bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
H A D | bta_dm_act.c | 1160 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 1161 if(p_data->ci_io_req.auth_req) 1162 auth_req = BTM_AUTH_AP_YES; 1164 p_data->ci_io_req.oob_data, auth_req); 3050 /* translate auth_req */ 3052 &p_data->io_req.oob_data, &p_data->io_req.auth_req, p_data->io_req.is_orig); 3058 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_data->io_req.oob_data); 3063 p_data->io_rsp.oob_data, p_data->io_rsp.auth_req ); 4858 &p_data->io_req.auth_req, 4866 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_dat [all...] |
H A D | bta_dm_int.h | 322 tBTA_AUTH_REQ auth_req; member in struct:__anon487
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_dm_co.c | 102 ** auth_req - TRUE, if MITM protection is required. 108 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) 110 btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); 107 bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_auth.c | 318 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; local 325 if (auth_req == GATT_AUTH_REQ_NONE ) 330 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act); 334 auth_req != GATT_AUTH_REQ_NONE) 349 switch (auth_req) 380 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) || 381 (auth_req == GATT_AUTH_REQ_SIGNED_MITM)))
|
H A D | gatt_int.h | 408 tGATT_AUTH_REQ auth_req; /* authentication requirement */ member in struct:__anon1292
|
/external/bluetooth/bluedroid/bta/gatt/ |
H A D | bta_gattc_api.c | 563 tBTA_GATT_AUTH_REQ auth_req) 573 p_buf->auth_req = auth_req; 598 tBTA_GATT_AUTH_REQ auth_req) 609 p_buf->auth_req = auth_req; 636 tBTA_GATT_AUTH_REQ auth_req) 650 p_buf->auth_req = auth_req; 689 tBTA_GATT_AUTH_REQ auth_req) 562 BTA_GATTC_ReadCharacteristic(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATT_AUTH_REQ auth_req) argument 596 BTA_GATTC_ReadCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_descr_id, tBTA_GATT_AUTH_REQ auth_req) argument 635 BTA_GATTC_ReadMultiple(UINT16 conn_id, tBTA_GATTC_MULTI *p_read_multi, tBTA_GATT_AUTH_REQ auth_req) argument 684 BTA_GATTC_WriteCharValue( UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATTC_WRITE_TYPE write_type, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument 731 BTA_GATTC_WriteCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_char_descr_id, tBTA_GATTC_WRITE_TYPE write_type, tBTA_GATT_UNFMT *p_data, tBTA_GATT_AUTH_REQ auth_req) argument 785 BTA_GATTC_PrepareWrite(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, UINT16 offset, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument [all...] |
H A D | bta_gattc_int.h | 129 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon556 138 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon557 180 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon562
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_act.c | 95 cb_data.io_req.auth_req = p_cb->peer_auth_req; 110 p_cb->loc_auth_req = cb_data.io_req.auth_req; 309 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ *)p_data; local 313 SMP_TRACE_DEBUG ("smp_proc_sec_req auth_req=0x%x",auth_req); 317 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act); 331 p_cb->peer_auth_req = auth_req;
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | smp_api.h | 129 tSMP_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1613
|
H A D | gatt_api.h | 316 tGATT_AUTH_REQ auth_req; /* authentication request */ member in struct:__anon1527 427 tGATT_AUTH_REQ auth_req; member in struct:__anon1536 438 tGATT_AUTH_REQ auth_req; member in struct:__anon1537 446 tGATT_AUTH_REQ auth_req; member in struct:__anon1538 453 tGATT_AUTH_REQ auth_req; member in struct:__anon1539
|
H A D | btm_api.h | 1461 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1430 1471 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member in struct:__anon1431 1632 tBTM_LE_AUTH_REQ auth_req; /* Authentication request (for local device) contain bonding and MITM info */ member in struct:__anon1443 4058 ** auth_req- MITM protection required or not. 4062 tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req);
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 1050 void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument 1055 BTM_TRACE_DEBUG ("btm_ble_link_sec_check auth_req =0x%x", auth_req); 1072 if ((auth_req == (BTM_LE_AUTH_REQ_BOND|BTM_LE_AUTH_REQ_MITM)) || 1073 (auth_req == (BTM_LE_AUTH_REQ_MITM)) ) 1453 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK_KEEP_RFU; 1458 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK; 1461 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK; 1464 BTM_TRACE_DEBUG ("btm_ble_io_capabilities_req 1: p_dev_rec->security_required = %d auth_req:%d", 1465 p_dev_rec->security_required, p_data->auth_req); [all...] |
H A D | btm_sec.c | 1829 ** auth_req- MITM protection required or not. 1832 void BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 1843 btm_cb.devcb.loc_auth_req = auth_req; 1847 auth_req = (BTM_AUTH_DD_BOND | (auth_req&BTM_AUTH_YN_BIT)); 1849 btsnd_hcic_io_cap_req_reply (bd_addr, io_cap, oob, auth_req); 3373 evt_data.auth_req = BTM_DEFAULT_AUTH_REQ; 3391 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3408 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3440 evt_data.auth_req 4934 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 4936 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_YES; local [all...] |
/external/bluetooth/bluedroid/stack/hcic/ |
H A D | hcicmds.c | 2388 UINT8 oob_present, UINT8 auth_req) 2407 UINT8_TO_STREAM (pp, auth_req); 2387 btsnd_hcic_io_cap_req_reply(BD_ADDR bd_addr, UINT8 capability, UINT8 oob_present, UINT8 auth_req) argument
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 126 UINT8 auth_req; member in struct:__anon1056 2612 ** 1. Copy over the auth_req from peer's io_rsp 2633 __FUNCTION__, pairing_cb.auth_req); 2634 *p_auth_req = (pairing_cb.auth_req & BTA_AUTH_BONDS); 2649 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) 2654 if(auth_req & BTA_AUTH_BONDS) 2656 BTIF_TRACE_DEBUG("%s auth_req:%d", __FUNCTION__, auth_req); 2657 pairing_cb.auth_req = auth_req; 2648 btif_dm_proc_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument [all...] |
H A D | btif_gatt_client.c | 200 uint8_t auth_req; member in struct:__anon1068 1302 BTA_GATTC_ReadCharacteristic(p_cb->conn_id, &in_char_id, p_cb->auth_req); 1310 BTA_GATTC_ReadCharDescr(p_cb->conn_id, &in_char_descr_id, p_cb->auth_req); 1321 p_cb->auth_req); 1334 p_cb->auth_req); 1850 btgatt_gatt_id_t* char_id, int auth_req ) 1855 btif_cb.auth_req = (uint8_t) auth_req; 1865 int auth_req ) 1870 btif_cb.auth_req 1878 btif_gattc_write_char(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_gatt_id_t* char_id, int write_type, int len, int auth_req, char* p_value) argument 1895 btif_gattc_write_char_descr(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_gatt_id_t* char_id, btgatt_gatt_id_t* descr_id, int write_type, int len, int auth_req, char* p_value) argument [all...] |