Searched refs:SMP_SUCCESS (Results 1 – 11 of 11) sorted by relevance
/packages/modules/Bluetooth/system/stack/smp/ |
D | smp_api.cc | 209 if (res == SMP_SUCCESS) { in SMP_SecurityGrant() 219 if (res == SMP_SUCCESS) { in SMP_SecurityGrant() 300 if (passkey > BTM_MAX_PASSKEY_VAL || res != SMP_SUCCESS) { in SMP_PasskeyReply() 344 if (res != SMP_SUCCESS) { in SMP_ConfirmReply() 378 if (res != SMP_SUCCESS || len == 0 || !p_data) { in SMP_OobDataReply() 519 if (res != SMP_SUCCESS) { in SMP_SirkConfirmDeviceReply() 525 smp_int_data.status = SMP_SUCCESS; in SMP_SirkConfirmDeviceReply()
|
D | smp_act.cc | 275 p_cb->status != SMP_SUCCESS) { in smp_send_pair_fail() 517 if (res != SMP_SUCCESS) { in smp_proc_sec_grant() 902 if (p_data->status != SMP_SUCCESS) { in smp_br_process_security_grant() 949 smp_int_data.status = SMP_SUCCESS; in smp_br_check_authorization_request() 973 smp_int_data.status = SMP_SUCCESS; in smp_br_select_next_key() 1210 smp_int_data.status = enc_enable ? SMP_SUCCESS : SMP_ENC_FAIL; in smp_enc_cmpl() 1222 if (p_data->status != SMP_SUCCESS) { in smp_sirk_verify() 1250 smp_int_data.status = SMP_SUCCESS; in smp_sirk_verify() 1303 smp_int_data.status = enc_enable ? SMP_SUCCESS : SMP_ENC_FAIL; in smp_check_auth_req() 1308 smp_int_data.status = enc_enable ? SMP_SUCCESS : SMP_ENC_FAIL; in smp_check_auth_req()
|
D | smp_utils.cc | 390 smp_int_data.status = SMP_SUCCESS; in smp_send_msg_to_L2CAP() 480 smp_int_data.status = SMP_SUCCESS; in smp_delayed_auth_complete_timeout() 1014 .sec_level = (p_cb->status == SMP_SUCCESS) ? p_cb->sec_level in smp_proc_pairing_cmpl() 1021 if (p_cb->status == SMP_SUCCESS) { in smp_proc_pairing_cmpl() 1056 if (p_cb->status == SMP_SUCCESS && p_cb->smp_over_br) { in smp_proc_pairing_cmpl()
|
D | smp_keys.cc | 359 return SMP_SUCCESS; in smp_calculate_comfirm() 378 if (status != SMP_SUCCESS) { in smp_generate_confirm() 442 if (status != SMP_SUCCESS) { in smp_generate_compare()
|
D | smp_l2c.cc | 251 smp_int_data.status = SMP_SUCCESS; in smp_tx_complete_callback()
|
/packages/modules/Bluetooth/system/test/mock/ |
D | mock_stack_smp_api.cc | 36 return SMP_SUCCESS; in SMP_BR_PairWith() 41 return SMP_SUCCESS; in SMP_Pair() 45 return SMP_SUCCESS; in SMP_Pair()
|
/packages/modules/Bluetooth/system/stack/fuzzers/ |
D | smp_fuzzer.cc | 156 SMP_PasskeyReply(kDummyAddr, SMP_SUCCESS, 1234); in smp_callback() 160 SMP_ConfirmReply(kDummyAddr, SMP_SUCCESS); in smp_callback() 164 SMP_OobDataReply(kDummyAddr, SMP_SUCCESS, sizeof(oob_data), oob_data); in smp_callback() 172 SMP_SecurityGrant(kDummyAddr, SMP_SUCCESS); in smp_callback()
|
/packages/modules/Bluetooth/system/stack/include/ |
D | smp_status.h | 30 SMP_SUCCESS = 0, enumerator 68 CASE_RETURN_TEXT(SMP_SUCCESS); in smp_status_text()
|
/packages/modules/Bluetooth/system/stack/btm/ |
D | btm_ble_sec.cc | 250 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_REPEATED_ATTEMPTS; in BTM_SecurityGrant() 283 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_PASSKEY_ENTRY_FAIL; in BTM_BlePasskeyReply() 313 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_PASSKEY_ENTRY_FAIL; in BTM_BleConfirmReply() 348 const tSMP_STATUS res_smp = (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_OOB_FAIL; in BTM_BleOobDataReply() 1618 res = (p_data->cmplt.reason == SMP_SUCCESS) ? BTM_SUCCESS in btm_proc_smp_cback() 1820 tSMP_STATUS res_smp = (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_FAIL; in BTM_BleSirkConfirmDeviceReply()
|
/packages/modules/Bluetooth/system/stack/test/ |
D | stack_smp_test.cc | 311 EXPECT_EQ(status, SMP_SUCCESS); in TEST_F() 407 std::make_pair(SMP_SUCCESS, "SMP_SUCCESS"), in TEST()
|
/packages/modules/Bluetooth/system/bta/dm/ |
D | bta_dm_sec.cc | 743 if (p_data->complt.reason != SMP_SUCCESS) { in bta_dm_ble_smp_cback()
|