/aosp12/system/bt/bta/gatt/ |
H A D | bta_gattc_api.cc | 371 p_buf->auth_req = auth_req; in BTA_GATTC_ReadCharacteristic() 385 tGATT_AUTH_REQ auth_req, in BTA_GATTC_ReadUsingCharUuid() argument 392 p_buf->auth_req = auth_req; in BTA_GATTC_ReadUsingCharUuid() 423 p_buf->auth_req = auth_req; in BTA_GATTC_ReadCharDescr() 445 tGATT_AUTH_REQ auth_req) { in BTA_GATTC_ReadMultiple() argument 451 p_buf->auth_req = auth_req; in BTA_GATTC_ReadMultiple() 478 tGATT_AUTH_REQ auth_req, in BTA_GATTC_WriteCharValue() argument 485 p_buf->auth_req = auth_req; in BTA_GATTC_WriteCharValue() 515 tGATT_AUTH_REQ auth_req, in BTA_GATTC_WriteCharDescr() argument 522 p_buf->auth_req = auth_req; in BTA_GATTC_WriteCharDescr() [all …]
|
H A D | bta_gattc_int.h | 99 tGATT_AUTH_REQ auth_req; member 116 tGATT_AUTH_REQ auth_req; member 150 tGATT_AUTH_REQ auth_req; member
|
H A D | bta_gattc_act.cc | 780 read_param.by_handle.auth_req = p_data->api_read.auth_req; in bta_gattc_read() 789 read_param.char_type.auth_req = p_data->api_read.auth_req; in bta_gattc_read() 812 read_param.read_multiple.auth_req = p_data->api_read_multi.auth_req; in bta_gattc_read_multi() 839 attr.auth_req = p_data->api_write.auth_req; in bta_gattc_write()
|
/aosp12/system/bt/test/mock/ |
H A D | mock_bta_gattc_api.cc | 121 std::vector<uint8_t> value, tGATT_AUTH_REQ auth_req, in BTA_GATTC_PrepareWrite() argument 126 tGATT_AUTH_REQ auth_req, GATT_READ_OP_CB callback, in BTA_GATTC_ReadCharDescr() argument 131 tGATT_AUTH_REQ auth_req, in BTA_GATTC_ReadCharacteristic() argument 136 tGATT_AUTH_REQ auth_req) { in BTA_GATTC_ReadMultiple() argument 141 tGATT_AUTH_REQ auth_req, in BTA_GATTC_ReadUsingCharUuid() argument 157 tGATT_AUTH_REQ auth_req, in BTA_GATTC_WriteCharDescr() argument 164 tGATT_AUTH_REQ auth_req, in BTA_GATTC_WriteCharValue() argument
|
/aosp12/system/bt/stack/gatt/ |
H A D | gatt_auth.cc | 272 tGATT_AUTH_REQ auth_req = p_clcb->auth_req; in gatt_determine_sec_act() local 279 if (auth_req == GATT_AUTH_REQ_NONE) return act; in gatt_determine_sec_act() 281 btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act); in gatt_determine_sec_act() 284 if (sec_act == BTM_BLE_SEC_REQ_ACT_DISCARD && auth_req != GATT_AUTH_REQ_NONE) in gatt_determine_sec_act() 294 switch (auth_req) { in gatt_determine_sec_act() 320 ((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) || in gatt_determine_sec_act() 321 (auth_req == GATT_AUTH_REQ_SIGNED_MITM))) { in gatt_determine_sec_act()
|
H A D | gatt_api.cc | 457 indication.auth_req = GATT_AUTH_REQ_NONE; in GATTS_HandleValueIndication() 522 notif.auth_req = GATT_AUTH_REQ_NONE; in GATTS_HandleValueNotification() 764 p_clcb->auth_req = p_read->by_handle.auth_req; in GATTC_Read() 843 p_clcb->auth_req = p_write->auth_req; in GATTC_Write()
|
/aosp12/system/bt/gd/security/test/ |
H A D | pairing_handler_le_pair_test.cc | 183 … .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, in SetUp() 208 … .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, in SetUp() 374 … .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, in TEST_F() 396 … .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, in TEST_F() 449 …central_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqM… in TEST_F() 490 …central_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqM… in TEST_F() 540 …central_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqM… in TEST_F() 619 central_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm, in TEST_F() 623 peripheral_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm; in TEST_F() 648 central_setup.myPairingCapabilities.auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm, in TEST_F() [all …]
|
/aosp12/system/bt/include/hardware/ |
H A D | bt_gatt_client.h | 247 int auth_req); 254 int auth_req); 258 int write_type, int auth_req, 262 bt_status_t (*read_descriptor)(int conn_id, uint16_t handle, int auth_req); 265 bt_status_t (*write_descriptor)(int conn_id, uint16_t handle, int auth_req,
|
/aosp12/system/bt/btif/src/ |
H A D | btif_gatt_client.cc | 432 int auth_req) { in btif_gattc_read_char() argument 435 auth_req, read_char_cb, nullptr)); in btif_gattc_read_char() 459 int auth_req) { in btif_gattc_read_using_char_uuid() argument 462 s_handle, e_handle, auth_req, in btif_gattc_read_using_char_uuid() 480 int auth_req) { in btif_gattc_read_char_descr() argument 483 auth_req, read_desc_cb, nullptr)); in btif_gattc_read_char_descr() 492 int write_type, int auth_req, in btif_gattc_write_char() argument 499 write_type, std::move(value), auth_req, in btif_gattc_write_char() 509 int auth_req, in btif_gattc_write_char_descr() argument 516 std::move(value), auth_req, write_descr_cb, in btif_gattc_write_char_descr()
|
H A D | btif_gatt_util.cc | 51 p_dest->attr_value.auth_req = p_src->attr_value.auth_req; in btif_to_bta_response()
|
/aosp12/system/bt/stack/btm/ |
H A D | btm_ble.cc | 831 tBTM_LE_AUTH_REQ auth_req = 0x00; in btm_ble_determine_security_act() local 865 if (auth_req & BTM_LE_AUTH_REQ_MITM) { in btm_ble_determine_security_act() 1310 if (auth_req & BTM_LE_AUTH_REQ_MITM) { in btm_ble_link_sec_check() 1364 tBTM_LE_AUTH_REQ auth_req; in btm_ble_set_encryption() local 1597 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK; in btm_ble_io_capabilities_req() 1600 p_data->auth_req &= BTM_LE_AUTH_REQ_MASK; in btm_ble_io_capabilities_req() 1614 p_data->auth_req |= BTM_LE_AUTH_REQ_MITM; in btm_ble_io_capabilities_req() 1616 if (!(p_data->auth_req & SMP_AUTH_BOND)) { in btm_ble_io_capabilities_req() 1623 p_data->auth_req); in btm_ble_io_capabilities_req() 1629 p_data->io_cap, p_data->auth_req); in btm_ble_io_capabilities_req() [all …]
|
H A D | btm_sec.cc | 2484 evt_data.auth_req = BTM_AUTH_SP_NO; in btm_io_capabilities_req() 2512 evt_data.auth_req = BTM_AUTH_AP_YES; in btm_io_capabilities_req() 2520 evt_data.auth_req = BTM_AUTH_AP_YES; in btm_io_capabilities_req() 2567 evt_data.auth_req = BTM_AUTH_SP_YES; in btm_io_capabilities_req() 2569 evt_data.auth_req = in btm_io_capabilities_req() 2593 evt_data.auth_req = BTM_AUTH_SPGB_YES; in btm_io_capabilities_req() 2601 evt_data.auth_req = in btm_io_capabilities_req() 2608 evt_data.auth_req |= BTM_AUTH_YN_BIT; in btm_io_capabilities_req() 2645 STREAM_TO_UINT8(evt_data.auth_req, p); in btm_io_capabilities_rsp() 2672 && (evt_data.auth_req & in btm_io_capabilities_rsp() [all …]
|
/aosp12/system/bt/bta/include/ |
H A D | bta_gatt_api.h | 604 tGATT_AUTH_REQ auth_req, 613 tGATT_AUTH_REQ auth_req, 629 tGATT_AUTH_REQ auth_req, GATT_READ_OP_CB callback, 649 tGATT_AUTH_REQ auth_req, 667 tGATT_AUTH_REQ auth_req, 735 tGATT_AUTH_REQ auth_req, 768 tGATT_AUTH_REQ auth_req);
|
H A D | bta_dm_co.h | 79 tBTM_OOB_DATA oob_data, tBTM_AUTH_REQ auth_req);
|
/aosp12/system/bt/gd/security/ |
H A D | facade_configuration_api.cc | 46 void FacadeConfigurationApi::SetLeAuthRequirements(uint8_t auth_req) { in SetLeAuthRequirements() argument 47 …_->CallOn(security_manager_impl_, &internal::SecurityManagerImpl::SetLeAuthRequirements, auth_req); in SetLeAuthRequirements()
|
H A D | smp_packets.pdl | 48 auth_req: 8, 120 auth_req: 8,
|
H A D | facade.cc | 247 uint8_t auth_req = request->bond() ? AUTH_REQ_BOND : AUTH_REQ_NO_BOND; in SetLeAuthRequirements() local 249 if (request->mitm()) auth_req |= AUTH_REQ_MITM_MASK; in SetLeAuthRequirements() 250 if (request->secure_connections()) auth_req |= AUTH_REQ_SECURE_CONNECTIONS_MASK; in SetLeAuthRequirements() 251 if (request->keypress()) auth_req |= AUTH_REQ_KEYPRESS_MASK; in SetLeAuthRequirements() 252 if (request->ct2()) auth_req |= AUTH_REQ_CT2_MASK; in SetLeAuthRequirements() 253 … if (request->reserved_bits()) auth_req |= (((request->reserved_bits()) << 6) & AUTH_REQ_RFU_MASK); in SetLeAuthRequirements() 255 security_module_->GetFacadeConfigurationApi()->SetLeAuthRequirements(auth_req); in SetLeAuthRequirements()
|
H A D | pairing_handler_le_unittest.cc | 143 .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, 283 .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc, 325 .auth_req = AuthReqMaskBondingFlag | AuthReqMaskMitm | AuthReqMaskSc,
|
H A D | facade_configuration_api.h | 50 void SetLeAuthRequirements(uint8_t auth_req);
|
H A D | pairing_handler_le.cc | 225 …PairingRequestBuilder::Create(x.io_capability, x.oob_data_flag, x.auth_req, x.maximum_encryption_k… in ExchangePairingFeature() 276 SendL2capPacket(i, SecurityRequestBuilder::Create(i.myPairingCapabilities.auth_req)); in ExchangePairingFeature() 302 …PairingResponseBuilder::Create(x.io_capability, x.oob_data_flag, x.auth_req, x.maximum_encryption_… in ExchangePairingFeature()
|
H A D | initial_informations.h | 89 uint8_t auth_req; member
|
/aosp12/system/bt/stack/include/ |
H A D | gatt_api.h | 430 tGATT_AUTH_REQ auth_req; /* authentication request */ member 524 tGATT_AUTH_REQ auth_req; member 535 tGATT_AUTH_REQ auth_req; member 543 tGATT_AUTH_REQ auth_req; member 549 tGATT_AUTH_REQ auth_req; member
|
H A D | btm_api_types.h | 662 tBTM_AUTH_REQ auth_req; /* Authentication required (for local device) */ member 672 tBTM_AUTH_REQ auth_req; /* Authentication required for peer device */ member 828 tBTM_LE_AUTH_REQ auth_req; member
|
/aosp12/system/bt/btif/include/ |
H A D | btif_dm.h | 51 tBTM_OOB_DATA oob_data, tBTM_AUTH_REQ auth_req);
|
/aosp12/system/bt/stack/smp/ |
H A D | smp_act.cc | 106 cb_data.io_req.auth_req = p_cb->peer_auth_req; in smp_send_app_cback() 126 cb_data.io_req.auth_req = 0; in smp_send_app_cback() 145 p_cb->loc_auth_req = cb_data.io_req.auth_req; in smp_send_app_cback() 435 tBTM_LE_AUTH_REQ auth_req = *(tBTM_LE_AUTH_REQ*)p_data->p_data; in smp_proc_sec_req() local 438 SMP_TRACE_DEBUG("%s: auth_req=0x%x", __func__, auth_req); in smp_proc_sec_req() 442 btm_ble_link_sec_check(p_cb->pairing_bda, auth_req, &sec_req_act); in smp_proc_sec_req() 458 (auth_req & SMP_SC_SUPPORT_BIT) == 0) { in smp_proc_sec_req() 464 p_cb->peer_auth_req = auth_req; in smp_proc_sec_req()
|