/foundation/communication/bluetooth_service/services/bluetooth/stack/src/smp/ |
H A D | smp_cmd.c | 39 PacketPayloadWrite(pkt, &pairReqParam->authReq, offset, sizeof(pairReqParam->authReq)); in SMP_SendPairingRequest() 40 offset += sizeof(pairReqParam->authReq); in SMP_SendPairingRequest() 70 PacketPayloadWrite(pkt, &pairRspParam->authReq, offset, sizeof(pairRspParam->authReq)); in SMP_SendPairingResponse() 71 offset += sizeof(pairRspParam->authReq); in SMP_SendPairingResponse() 334 int SMP_SendSecurityRequest(uint16_t handle, uint8_t authReq, SMP_SendDataCb cb) in SMP_SendSecurityRequest() argument 346 PacketPayloadWrite(pkt, &authReq, offset, sizeof(authReq)); in SMP_SendSecurityRequest()
|
H A D | smp_tool.c | 238 param->preq[PAIR_REQ_3] = SMP_GetPairMng()->local.pairParam.authReq; in SMP_ConstituteC1Step1Param() 245 param->pres[PAIR_RES_3] = SMP_GetPairMng()->peer.pairParam.authReq; in SMP_ConstituteC1Step1Param() 255 param->preq[PAIR_REQ_3] = SMP_GetPairMng()->peer.pairParam.authReq; in SMP_ConstituteC1Step1Param() 262 param->pres[PAIR_RES_3] = SMP_GetPairMng()->local.pairParam.authReq; in SMP_ConstituteC1Step1Param() 423 cryptF6Param->IOcap[offset] = SMP_GetPairMng()->peer.pairParam.authReq; in SMP_ConstituteF6Param() 424 offset += sizeof(SMP_GetPairMng()->peer.pairParam.authReq); in SMP_ConstituteF6Param() 440 cryptF6Param->IOcap[offset] = SMP_GetPairMng()->local.pairParam.authReq; in SMP_ConstituteF6Param() 441 offset += sizeof(SMP_GetPairMng()->local.pairParam.authReq); in SMP_ConstituteF6Param() 713 if ((mng->local.pairParam.authReq & SMP_AUTH_REQ_BIT_SC) && (mng->peer.pairParam.authReq in SMP_CalculatePairType() [all...] |
H A D | smp.h | 137 uint8_t authReq; member 175 void (*SMP_CallbackRemoteSecurityRequest)(uint16_t handle, uint8_t authReq); 239 * @param authReq Authentication Requirements Flags. 242 int SMP_SendSecurityRequestToRemote(uint16_t handle, uint8_t authReq);
|
H A D | smp_cmd.h | 43 int SMP_SendSecurityRequest(uint16_t handle, uint8_t authReq, SMP_SendDataCb cb);
|
H A D | smp_common.h | 40 void SMP_NotifyCbSecReq(uint16_t handle, uint8_t authReq);
|
H A D | smp_receive.c | 200 pairParamTemp.authReq = pData[offset]; in SMP_ReceivePairingRequest() 201 offset += sizeof(pairParamTemp.authReq); in SMP_ReceivePairingRequest() 246 if (SMP_GetSecureConnOnlyMode() && (!(pairParam->authReq & SMP_AUTH_REQ_BIT_SC))) { in SMP_RecvPairReqJudgeException() 247 LOG_ERROR("SC bit is not set in authReq."); in SMP_RecvPairReqJudgeException() 311 if (SMP_GetSecureConnOnlyMode() && (!(pairParam->authReq & SMP_AUTH_REQ_BIT_SC))) { in SMP_RecvPairRspJudgeException() 312 LOG_ERROR("SC bit is not set in authReq."); in SMP_RecvPairRspJudgeException() 548 uint8_t authReq = *((uint8_t *)BufferPtr(buffer)); in SMP_ReceiveSecurityRequest() local 554 if (SMP_GetSecureConnOnlyMode() && (!(authReq & SMP_AUTH_REQ_BIT_SC))) { in SMP_ReceiveSecurityRequest() 555 LOG_ERROR("SC bit is not set in authReq."); in SMP_ReceiveSecurityRequest() 559 SMP_NotifyCbSecReq(handle, authReq); in SMP_ReceiveSecurityRequest() [all...] |
H A D | smp.c | 318 } else if (SMP_GetSecureConnOnlyMode() && (!(param->param.authReq & SMP_AUTH_REQ_BIT_SC))) { in SMP_StartPairTask() 319 LOG_ERROR("SC bit is not set in authReq."); in SMP_StartPairTask() 726 int SMP_SendSecurityRequestToRemote(uint16_t handle, uint8_t authReq) in SMP_SendSecurityRequestToRemote() argument 736 ctx->authReq = authReq; in SMP_SendSecurityRequestToRemote() 749 SMP_SendSecurityRequest(param->handle, param->authReq, SMP_SendSecurityRequestCallback); in SMP_SendSecReqToRemoteTask() 1323 if (SMP_GetSecureConnOnlyMode() && (!(param->authReq & SMP_AUTH_REQ_BIT_SC))) { in SMP_PairReqReplyJudgeException() 1324 LOG_ERROR("SC bit is not set in authReq."); in SMP_PairReqReplyJudgeException() 1573 if ((g_smpPairMng.local.pairParam.authReq & SMP_AUTH_REQ_BONDING) && in SMP_GenPairRetNormal() 1574 (g_smpPairMng.peer.pairParam.authReq in SMP_GenPairRetNormal() 1772 SMP_NotifyCbSecReq(uint16_t handle, uint8_t authReq) SMP_NotifyCbSecReq() argument [all...] |
H A D | smp_def.h | 241 uint8_t authReq; member
|
H A D | smp_send.c | 544 if (!((SMP_GetPairMng()->local.pairParam.authReq & SMP_AUTH_REQ_BONDING) && in SMP_SendKeysToRemoteCbProcess() 545 (SMP_GetPairMng()->peer.pairParam.authReq & SMP_AUTH_REQ_BONDING))) { in SMP_SendKeysToRemoteCbProcess()
|
/foundation/communication/bluetooth_service/services/bluetooth/stack/src/gap/ |
H A D | gap_sm_receive.c | 50 uint8_t authReq; member 192 LOG_INFO("%{public}s: handle:0x%04x ioCapability:%hhu authReq:0x%02x initKeyDist:0x%02x respKeyDist:0x%02x", in GapRecvLeRemotePairRequest() 196 param->authReq, in GapRecvLeRemotePairRequest() 222 LOG_INFO("%{public}s: handle:0x%04x ioCapability:%hhu authReq:0x%02x initKeyDist:0x%02x respKeyDist:0x%02x", in GapRecvLeRemotePairResponse() 226 param->authReq, in GapRecvLeRemotePairResponse() 247 GapLeRemoteSecurityRequest(param->handle, param->authReq); in GapLeRemoteSecurityRequestTask() 250 static void GapRecvLeRemoteSecurityRequest(uint16_t handle, uint8_t authReq) in GapRecvLeRemoteSecurityRequest() argument 252 LOG_INFO("%{public}s: handle:0x%04x authReq:0x%02x", __FUNCTION__, handle, authReq); in GapRecvLeRemoteSecurityRequest() 260 smParam->authReq in GapRecvLeRemoteSecurityRequest() [all...] |
H A D | gap_le_sec.c | 463 if (GapLeSecurityNeedAuthentication(localInfo) && !(param->authReq & SMP_AUTH_REQ_BIT_MITM)) { in GapLeRemotePairResponse() 473 void GapLeRemoteSecurityRequest(uint16_t handle, uint8_t authReq) in GapLeRemoteSecurityRequest() argument 713 uint8_t authReq = AUTH_REQ_DEFAULT; in GapLeRequestSecurityProcess() local 726 authReq &= GapIsLeBondableMode() ? ~0 : ~SMP_AUTH_REQ_BONDING; in GapLeRequestSecurityProcess() 728 authReq &= GapIsLeBondableMode() ? ~0 : ~SMP_AUTH_REQ_BONDING; in GapLeRequestSecurityProcess() 729 authReq &= SMP_AUTH_REQ_BIT_MITM; in GapLeRequestSecurityProcess() 733 ret = SMP_SendSecurityRequestToRemote(deviceInfo->handle, authReq); in GapLeRequestSecurityProcess() 812 uint8_t authReq = AUTH_REQ_DEFAULT; in GapLePair() local 817 authReq &= ~SMP_AUTH_REQ_BIT_SC; in GapLePair() 829 SMP_SendSecurityRequestToRemote(deviceInfo->handle, authReq); in GapLePair() [all...] |
H A D | gap.h | 197 * @param[in] authReq Authentication Requirements: MITM protection 202 const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq);
|
H A D | gap_br_sec.c | 912 const BtAddr *addr, uint8_t ioCapability, uint8_t authReq, uint8_t oobDataPresent) in GapIOCapabilityRequestReply() 928 authenticationRequirements = AUTHENTICATION_NO_MITM_NO_BONDING + authReq; in GapIOCapabilityRequestReply() 930 authenticationRequirements = AUTHENTICATION_NO_MITM_DEDICATED_BONDING + authReq; in GapIOCapabilityRequestReply() 932 authenticationRequirements = AUTHENTICATION_NO_MITM_GENERAL_BONDING + authReq; in GapIOCapabilityRequestReply() 1110 const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq) in GAP_IOCapabilityRsp() 1124 if (authReq == GAP_MITM_REQUIRED) { in GAP_IOCapabilityRsp() 1125 authReq = GAP_MITM_NOT_REQUIRED; in GAP_IOCapabilityRsp() 1131 ret = GapIOCapabilityRequestReply(addr, ioCapability, authReq, oobDataPresent); in GAP_IOCapabilityRsp() 911 GapIOCapabilityRequestReply( const BtAddr *addr, uint8_t ioCapability, uint8_t authReq, uint8_t oobDataPresent) GapIOCapabilityRequestReply() argument 1109 GAP_IOCapabilityRsp( const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq) GAP_IOCapabilityRsp() argument
|
H A D | gap_if.c | 99 uint8_t authReq; member 778 GAP_IOCapabilityRsp(info->addr, info->accept, info->ioCapability, info->oobDataPresent, info->authReq); in GapIOCapabilityRspTask() 782 const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq) in GAPIF_IOCapabilityRsp() 796 ctx->authReq = authReq; in GAPIF_IOCapabilityRsp() 781 GAPIF_IOCapabilityRsp( const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq) GAPIF_IOCapabilityRsp() argument
|
H A D | gap_internal.h | 186 void GapLeRemoteSecurityRequest(uint16_t handle, uint8_t authReq);
|
/foundation/communication/bluetooth_service/services/bluetooth/stack/include/ |
H A D | gap_if.h | 389 * @param[in] authReq Authentication Requirements: MITM protection 394 const BtAddr *addr, uint8_t accept, uint8_t ioCapability, uint8_t oobDataPresent, uint8_t authReq);
|
H A D | gap_le_if.h | 289 uint8_t authReq; /// Authentication requirements member
|
/foundation/communication/bluetooth_service/services/bluetooth/service/src/ble/ |
H A D | ble_security.cpp | 647 feature.authReq = GAP_LE_AUTH_REQ_BONDING | GAP_LE_AUTH_REQ_BIT_MITM | GAP_LE_AUTH_REQ_BIT_SC; in LePairFeatureReq() 649 feature.authReq = GAP_LE_AUTH_REQ_BONDING | GAP_LE_AUTH_REQ_BIT_MITM; in LePairFeatureReq() 660 feature.authReq &= ~GAP_LE_AUTH_REQ_BIT_SC; in LePairFeatureReq()
|
/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_manage/wifi_sta/ |
H A D | sta_state_machine.cpp | 2444 LOGI("%{public}s authReq: %{private}s, len: %{public}zu", __func__, authRsp.c_str(), authRsp.length()); in GetGsmAuthResponseWithoutLength() 2514 std::string authReq; in ParseAndFillUmtsAuthParam() local 2521 authReq = "UMTS-AUTH:"; in ParseAndFillUmtsAuthParam() 2552 authReq += authRsp; in ParseAndFillUmtsAuthParam() 2556 authReq = "UMTS-AUTS:"; in ParseAndFillUmtsAuthParam() 2568 authReq += authRsp; in ParseAndFillUmtsAuthParam() 2571 return authReq; in ParseAndFillUmtsAuthParam() 2614 LOGI("%{public}s: failed to send the message, authReq: %{private}s", __func__, cmd.c_str()); in DealWpaEapSimAuthEvent() 2617 LOGD("%{public}s: success to send the message, authReq: %{private}s", __func__, cmd.c_str()); in DealWpaEapSimAuthEvent() 2666 LOGI("%{public}s: failed to send the message, authReq in DealWpaEapUmtsAuthEvent() [all...] |