Searched defs:auth_req (Results 1 - 17 of 17) sorted by relevance

/external/bluetooth/bluedroid/bta/dm/
H A Dbta_dm_ci.c47 tBTA_AUTH_REQ auth_req)
58 p_msg->auth_req = auth_req;
46 bta_dm_ci_io_req(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
H A Dbta_dm_act.c1160 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local
1161 if(p_data->ci_io_req.auth_req)
1162 auth_req = BTM_AUTH_AP_YES;
1164 p_data->ci_io_req.oob_data, auth_req);
3050 /* translate auth_req */
3052 &p_data->io_req.oob_data, &p_data->io_req.auth_req, p_data->io_req.is_orig);
3058 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_data->io_req.oob_data);
3063 p_data->io_rsp.oob_data, p_data->io_rsp.auth_req );
4858 &p_data->io_req.auth_req,
4866 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, p_dat
[all...]
H A Dbta_dm_int.h322 tBTA_AUTH_REQ auth_req; member in struct:__anon487
/external/bluetooth/bluedroid/btif/co/
H A Dbta_dm_co.c102 ** auth_req - TRUE, if MITM protection is required.
108 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req)
110 btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req);
107 bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
/external/bluetooth/bluedroid/stack/gatt/
H A Dgatt_auth.c318 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; local
325 if (auth_req == GATT_AUTH_REQ_NONE )
330 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act);
334 auth_req != GATT_AUTH_REQ_NONE)
349 switch (auth_req)
380 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) ||
381 (auth_req == GATT_AUTH_REQ_SIGNED_MITM)))
H A Dgatt_int.h408 tGATT_AUTH_REQ auth_req; /* authentication requirement */ member in struct:__anon1292
/external/bluetooth/bluedroid/bta/gatt/
H A Dbta_gattc_api.c563 tBTA_GATT_AUTH_REQ auth_req)
573 p_buf->auth_req = auth_req;
598 tBTA_GATT_AUTH_REQ auth_req)
609 p_buf->auth_req = auth_req;
636 tBTA_GATT_AUTH_REQ auth_req)
650 p_buf->auth_req = auth_req;
689 tBTA_GATT_AUTH_REQ auth_req)
562 BTA_GATTC_ReadCharacteristic(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATT_AUTH_REQ auth_req) argument
596 BTA_GATTC_ReadCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_descr_id, tBTA_GATT_AUTH_REQ auth_req) argument
635 BTA_GATTC_ReadMultiple(UINT16 conn_id, tBTA_GATTC_MULTI *p_read_multi, tBTA_GATT_AUTH_REQ auth_req) argument
684 BTA_GATTC_WriteCharValue( UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, tBTA_GATTC_WRITE_TYPE write_type, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument
731 BTA_GATTC_WriteCharDescr(UINT16 conn_id, tBTA_GATTC_CHAR_DESCR_ID *p_char_descr_id, tBTA_GATTC_WRITE_TYPE write_type, tBTA_GATT_UNFMT *p_data, tBTA_GATT_AUTH_REQ auth_req) argument
785 BTA_GATTC_PrepareWrite(UINT16 conn_id, tBTA_GATTC_CHAR_ID *p_char_id, UINT16 offset, UINT16 len, UINT8 *p_value, tBTA_GATT_AUTH_REQ auth_req) argument
[all...]
H A Dbta_gattc_int.h129 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon556
138 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon557
180 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon562
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_act.c95 cb_data.io_req.auth_req = p_cb->peer_auth_req;
110 p_cb->loc_auth_req = cb_data.io_req.auth_req;
309 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ *)p_data; local
313 SMP_TRACE_DEBUG ("smp_proc_sec_req auth_req=0x%x",auth_req);
317 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act);
331 p_cb->peer_auth_req = auth_req;
/external/bluetooth/bluedroid/stack/include/
H A Dsmp_api.h129 tSMP_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1613
H A Dgatt_api.h316 tGATT_AUTH_REQ auth_req; /* authentication request */ member in struct:__anon1527
427 tGATT_AUTH_REQ auth_req; member in struct:__anon1536
438 tGATT_AUTH_REQ auth_req; member in struct:__anon1537
446 tGATT_AUTH_REQ auth_req; member in struct:__anon1538
453 tGATT_AUTH_REQ auth_req; member in struct:__anon1539
H A Dbtm_api.h1461 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1430
1471 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member in struct:__anon1431
1632 tBTM_LE_AUTH_REQ auth_req; /* Authentication request (for local device) contain bonding and MITM info */ member in struct:__anon1443
4058 ** auth_req- MITM protection required or not.
4062 tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req);
/external/bluetooth/bluedroid/stack/btm/
H A Dbtm_ble.c1050 void btm_ble_link_sec_check(BD_ADDR bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT *p_sec_req_act) argument
1055 BTM_TRACE_DEBUG ("btm_ble_link_sec_check auth_req =0x%x", auth_req);
1072 if ((auth_req == (BTM_LE_AUTH_REQ_BOND|BTM_LE_AUTH_REQ_MITM)) ||
1073 (auth_req == (BTM_LE_AUTH_REQ_MITM)) )
1453 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK_KEEP_RFU;
1458 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK;
1461 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK;
1464 BTM_TRACE_DEBUG ("btm_ble_io_capabilities_req 1: p_dev_rec->security_required = %d auth_req:%d",
1465 p_dev_rec->security_required, p_data->auth_req);
[all...]
H A Dbtm_sec.c1829 ** auth_req- MITM protection required or not.
1832 void BTM_IoCapRsp(BD_ADDR bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument
1843 btm_cb.devcb.loc_auth_req = auth_req;
1847 auth_req = (BTM_AUTH_DD_BOND | (auth_req&BTM_AUTH_YN_BIT));
1849 btsnd_hcic_io_cap_req_reply (bd_addr, io_cap, oob, auth_req);
3373 evt_data.auth_req = BTM_DEFAULT_AUTH_REQ;
3391 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ;
3408 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ;
3440 evt_data.auth_req
4934 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local
4936 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_YES; local
[all...]
/external/bluetooth/bluedroid/stack/hcic/
H A Dhcicmds.c2388 UINT8 oob_present, UINT8 auth_req)
2407 UINT8_TO_STREAM (pp, auth_req);
2387 btsnd_hcic_io_cap_req_reply(BD_ADDR bd_addr, UINT8 capability, UINT8 oob_present, UINT8 auth_req) argument
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_dm.c126 UINT8 auth_req; member in struct:__anon1056
2612 ** 1. Copy over the auth_req from peer's io_rsp
2633 __FUNCTION__, pairing_cb.auth_req);
2634 *p_auth_req = (pairing_cb.auth_req & BTA_AUTH_BONDS);
2649 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req)
2654 if(auth_req & BTA_AUTH_BONDS)
2656 BTIF_TRACE_DEBUG("%s auth_req:%d", __FUNCTION__, auth_req);
2657 pairing_cb.auth_req = auth_req;
2648 btif_dm_proc_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
[all...]
H A Dbtif_gatt_client.c200 uint8_t auth_req; member in struct:__anon1068
1302 BTA_GATTC_ReadCharacteristic(p_cb->conn_id, &in_char_id, p_cb->auth_req);
1310 BTA_GATTC_ReadCharDescr(p_cb->conn_id, &in_char_descr_id, p_cb->auth_req);
1321 p_cb->auth_req);
1334 p_cb->auth_req);
1850 btgatt_gatt_id_t* char_id, int auth_req )
1855 btif_cb.auth_req = (uint8_t) auth_req;
1865 int auth_req )
1870 btif_cb.auth_req
1878 btif_gattc_write_char(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_gatt_id_t* char_id, int write_type, int len, int auth_req, char* p_value) argument
1895 btif_gattc_write_char_descr(int conn_id, btgatt_srvc_id_t* srvc_id, btgatt_gatt_id_t* char_id, btgatt_gatt_id_t* descr_id, int write_type, int len, int auth_req, char* p_value) argument
[all...]

Completed in 514 milliseconds