/system/bt/bta/dm/ |
H A D | bta_dm_ci.cc | 44 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) 54 p_msg->auth_req = auth_req; 43 bta_dm_ci_io_req(const RawAddress& bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
H A D | bta_dm_act.cc | 1077 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 1078 if (p_data->ci_io_req.auth_req) auth_req = BTM_AUTH_AP_YES; 1080 p_data->ci_io_req.oob_data, auth_req); 2632 /* translate auth_req */ 2634 &p_data->io_req.oob_data, &p_data->io_req.auth_req, 2636 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, 2641 p_data->io_rsp.oob_data, p_data->io_rsp.auth_req); 4019 &p_data->io_req.auth_req, &p_data->io_req.max_key_size, 4022 APPL_TRACE_EVENT("io mitm: %d oob_data:%d", p_data->io_req.auth_req, [all...] |
H A D | bta_dm_int.h | 218 tBTA_AUTH_REQ auth_req; member in struct:__anon85
|
/system/bt/bta/gatt/ |
H A D | bta_gattc_api.cc | 351 tBTA_GATT_AUTH_REQ auth_req, 358 p_buf->auth_req = auth_req; 372 tBTA_GATT_AUTH_REQ auth_req, 379 p_buf->auth_req = auth_req; 403 tBTA_GATT_AUTH_REQ auth_req, 410 p_buf->auth_req = auth_req; 432 tBTA_GATT_AUTH_REQ auth_req) { 350 BTA_GATTC_ReadCharacteristic(uint16_t conn_id, uint16_t handle, tBTA_GATT_AUTH_REQ auth_req, GATT_READ_OP_CB callback, void* cb_data) argument 370 BTA_GATTC_ReadUsingCharUuid(uint16_t conn_id, tBT_UUID uuid, uint16_t s_handle, uint16_t e_handle, tBTA_GATT_AUTH_REQ auth_req, GATT_READ_OP_CB callback, void* cb_data) argument 402 BTA_GATTC_ReadCharDescr(uint16_t conn_id, uint16_t handle, tBTA_GATT_AUTH_REQ auth_req, GATT_READ_OP_CB callback, void* cb_data) argument 431 BTA_GATTC_ReadMultiple(uint16_t conn_id, tBTA_GATTC_MULTI* p_read_multi, tBTA_GATT_AUTH_REQ auth_req) argument 462 BTA_GATTC_WriteCharValue(uint16_t conn_id, uint16_t handle, tBTA_GATTC_WRITE_TYPE write_type, std::vector<uint8_t> value, tBTA_GATT_AUTH_REQ auth_req, GATT_WRITE_OP_CB callback, void* cb_data) argument 500 BTA_GATTC_WriteCharDescr(uint16_t conn_id, uint16_t handle, std::vector<uint8_t> value, tBTA_GATT_AUTH_REQ auth_req, GATT_WRITE_OP_CB callback, void* cb_data) argument 539 BTA_GATTC_PrepareWrite(uint16_t conn_id, uint16_t handle, uint16_t offset, std::vector<uint8_t> value, tBTA_GATT_AUTH_REQ auth_req, GATT_WRITE_OP_CB callback, void* cb_data) argument [all...] |
H A D | bta_gattc_int.h | 98 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon136 115 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon137 151 tBTA_GATT_AUTH_REQ auth_req; member in struct:__anon142
|
/system/bt/btif/co/ |
H A D | bta_dm_co.cc | 95 * auth_req - true, if MITM protection is required. 101 tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) { 102 btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); 100 bta_dm_co_io_rsp(const RawAddress& bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument
|
/system/bt/stack/gatt/ |
H A D | gatt_auth.cc | 271 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; local 278 if (auth_req == GATT_AUTH_REQ_NONE) return act; 283 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act); 286 if (sec_act == BTM_BLE_SEC_REQ_ACT_DISCARD && auth_req != GATT_AUTH_REQ_NONE) 298 switch (auth_req) { 324 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) || 325 (auth_req == GATT_AUTH_REQ_SIGNED_MITM))) {
|
H A D | gatt_int.h | 317 tGATT_AUTH_REQ auth_req; /* authentication requirement */ member in struct:tGATT_CLCB
|
/system/bt/stack/smp/ |
H A D | smp_act.cc | 101 cb_data.io_req.auth_req = p_cb->peer_auth_req; 121 cb_data.io_req.auth_req = 0; 142 p_cb->loc_auth_req = cb_data.io_req.auth_req; 156 "rcvd auth_req: 0x%02x, io_cap: %d " 183 "set auth_req: 0x%02x, local_i_key: 0x%02x, local_r_key: 0x%02x", 417 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ*)p_data; local 421 SMP_TRACE_DEBUG("%s: auth_req=0x%x", __func__, auth_req); 425 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act); 441 (auth_req [all...] |
/system/bt/stack/hcic/ |
H A D | hcicmds.cc | 1000 uint8_t oob_present, uint8_t auth_req) { 1013 UINT8_TO_STREAM(pp, auth_req); 999 btsnd_hcic_io_cap_req_reply(const RawAddress& bd_addr, uint8_t capability, uint8_t oob_present, uint8_t auth_req) argument
|
/system/bt/stack/include/ |
H A D | smp_api_types.h | 210 tSMP_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1183
|
H A D | gatt_api.h | 325 tGATT_AUTH_REQ auth_req; /* authentication request */ member in struct:__anon1113 434 tGATT_AUTH_REQ auth_req; member in struct:__anon1122 445 tGATT_AUTH_REQ auth_req; member in struct:__anon1123 452 tGATT_AUTH_REQ auth_req; member in struct:__anon1124 458 tGATT_AUTH_REQ auth_req; member in struct:__anon1125
|
H A D | btm_api_types.h | 1435 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member in struct:__anon1056 1445 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member in struct:__anon1057 1631 tBTM_LE_AUTH_REQ auth_req; member in struct:__anon1068
|
/system/bt/stack/btm/ |
H A D | btm_ble.cc | 1007 tBTM_LE_AUTH_REQ auth_req = 0x00; local 1017 if (security_required & BTM_SEC_OUT_MITM) auth_req |= BTM_LE_AUTH_REQ_MITM; 1026 if (security_required & BTM_SEC_IN_MITM) auth_req |= BTM_LE_AUTH_REQ_MITM; 1030 btm_ble_link_sec_check(bdaddr, auth_req, &ble_sec_act); 1049 if (auth_req & BTM_LE_AUTH_REQ_MITM) { 1451 tBTM_LE_AUTH_REQ auth_req, 1456 BTM_TRACE_DEBUG("btm_ble_link_sec_check auth_req =0x%x", auth_req); 1470 if (auth_req & BTM_LE_AUTH_REQ_MITM) { 1524 tBTM_LE_AUTH_REQ auth_req; local 1450 btm_ble_link_sec_check(const RawAddress& bd_addr, tBTM_LE_AUTH_REQ auth_req, tBTM_BLE_SEC_REQ_ACT* p_sec_req_act) argument [all...] |
H A D | btm_sec.cc | 1587 * auth_req- MITM protection required or not. 1591 tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) { 1600 btm_cb.devcb.loc_auth_req = auth_req; 1604 auth_req = (BTM_AUTH_DD_BOND | (auth_req & BTM_AUTH_YN_BIT)); 1606 btsnd_hcic_io_cap_req_reply(bd_addr, io_cap, oob, auth_req); 3275 evt_data.auth_req = BTM_DEFAULT_AUTH_REQ; 3319 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3327 evt_data.auth_req = BTM_DEFAULT_DD_AUTH_REQ; 3374 evt_data.auth_req 1590 BTM_IoCapRsp(const RawAddress& bd_addr, tBTM_IO_CAP io_cap, tBTM_OOB_DATA oob, tBTM_AUTH_REQ auth_req) argument 4865 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_NO; local 4867 tBTM_AUTH_REQ auth_req = BTM_AUTH_AP_YES; local [all...] |
/system/bt/btif/src/ |
H A D | btif_dm.cc | 117 uint8_t auth_req; member in struct:__anon621 2548 ** 1. Copy over the auth_req from peer's io_rsp 2563 pairing_cb.auth_req); 2564 *p_auth_req = (pairing_cb.auth_req & BTA_AUTH_BONDS); 2579 tBTA_AUTH_REQ auth_req) { 2580 if (auth_req & BTA_AUTH_BONDS) { 2581 BTIF_TRACE_DEBUG("%s auth_req:%d", __func__, auth_req); 2582 pairing_cb.auth_req = auth_req; 2577 btif_dm_proc_io_rsp(UNUSED_ATTR const RawAddress& bd_addr, tBTA_IO_CAP io_cap, UNUSED_ATTR tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) argument [all...] |