Lines Matching refs:req
376 struct bt_smp_pairing *req, *rsp; in get_pair_method() local
378 req = (struct bt_smp_pairing *)&smp->preq[1]; in get_pair_method()
381 if ((req->auth_req & rsp->auth_req) & BT_SMP_AUTH_SC) { in get_pair_method()
383 if ((req->oob_flag | rsp->oob_flag) & BT_SMP_OOB_DATA_MASK) { in get_pair_method()
393 if (!((req->auth_req | rsp->auth_req) & BT_SMP_AUTH_MITM)) { in get_pair_method()
723 struct bt_smp_pairing *req, *rsp; in get_encryption_key_size() local
725 req = (struct bt_smp_pairing *)&smp->preq[1]; in get_encryption_key_size()
733 return MIN(req->max_key_size, rsp->max_key_size); in get_encryption_key_size()
1282 struct bt_smp_pairing *req = (void *)buf->data; in smp_br_pairing_req() local
1306 if (req->max_key_size != max_key_size) { in smp_br_pairing_req()
1330 rsp->init_key_dist = (req->init_key_dist & BR_RECV_KEYS_SC); in smp_br_pairing_req()
1331 rsp->resp_key_dist = (req->resp_key_dist & BR_RECV_KEYS_SC); in smp_br_pairing_req()
1421 struct bt_smp_pairing_fail *req = (void *)buf->data; in smp_br_pairing_failed() local
1423 BT_ERR("reason 0x%x", req->reason); in smp_br_pairing_failed()
1425 smp_pairing_br_complete(smp, req->reason); in smp_br_pairing_failed()
1434 struct bt_smp_ident_info *req = (void *)buf->data; in smp_br_ident_info() local
1456 memcpy(keys->irk.val, req->irk, sizeof(keys->irk.val)); in smp_br_ident_info()
1467 struct bt_smp_ident_addr_info *req = (void *)buf->data; in smp_br_ident_addr_info() local
1470 BT_DBG("identity %s", bt_addr_le_str(&req->addr)); in smp_br_ident_addr_info()
1481 if (bt_addr_le_cmp(&addr, &req->addr)) { in smp_br_ident_addr_info()
1506 struct bt_smp_signing_info *req = (void *)buf->data; in smp_br_signing_info() local
1526 memcpy(keys->remote_csrk.val, req->csrk, sizeof(keys->remote_csrk.val)); in smp_br_signing_info()
1708 struct bt_smp_pairing *req; in bt_smp_br_send_pairing_req() local
1747 req_buf = smp_br_create_pdu(smp, BT_SMP_CMD_PAIRING_REQ, sizeof(*req)); in bt_smp_br_send_pairing_req()
1752 req = net_buf_add(req_buf, sizeof(*req)); in bt_smp_br_send_pairing_req()
1761 req->auth_req = 0x00; in bt_smp_br_send_pairing_req()
1762 req->io_capability = 0x00; in bt_smp_br_send_pairing_req()
1763 req->oob_flag = 0x00; in bt_smp_br_send_pairing_req()
1764 req->max_key_size = max_key_size; in bt_smp_br_send_pairing_req()
1765 req->init_key_dist = BR_SEND_KEYS_SC; in bt_smp_br_send_pairing_req()
1766 req->resp_key_dist = BR_RECV_KEYS_SC; in bt_smp_br_send_pairing_req()
1908 struct bt_smp_pairing_random *req; in smp_send_pairing_random() local
1911 rsp_buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_RANDOM, sizeof(*req)); in smp_send_pairing_random()
1916 req = net_buf_add(rsp_buf, sizeof(*req)); in smp_send_pairing_random()
1917 memcpy(req->val, smp->prnd, sizeof(req->val)); in smp_send_pairing_random()
1982 struct bt_smp_pairing_confirm *req; in smp_send_pairing_confirm() local
2007 buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_CONFIRM, sizeof(*req)); in smp_send_pairing_confirm()
2012 req = net_buf_add(buf, sizeof(*req)); in smp_send_pairing_confirm()
2014 if (smp_f4(sc_public_key, smp->pkey, smp->prnd, r, req->val)) { in smp_send_pairing_confirm()
2234 struct bt_smp_pairing *req, *rsp; in legacy_get_pair_method() local
2241 req = (struct bt_smp_pairing *)&smp->preq[1]; in legacy_get_pair_method()
2245 if ((req->oob_flag & rsp->oob_flag) & BT_SMP_OOB_DATA_MASK) { in legacy_get_pair_method()
2250 if (!((req->auth_req | rsp->auth_req) & BT_SMP_AUTH_MITM)) { in legacy_get_pair_method()
2339 struct bt_smp_pairing_confirm *req; in legacy_send_pairing_confirm() local
2342 buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_CONFIRM, sizeof(*req)); in legacy_send_pairing_confirm()
2347 req = net_buf_add(buf, sizeof(*req)); in legacy_send_pairing_confirm()
2350 &conn->le.init_addr, &conn->le.resp_addr, req->val)) { in legacy_send_pairing_confirm()
2524 struct bt_smp_encrypt_info *req = (void *)buf->data; in smp_encrypt_info() local
2535 memcpy(keys->ltk.val, req->ltk, 16); in smp_encrypt_info()
2551 struct bt_smp_master_ident *req = (void *)buf->data; in smp_master_ident() local
2561 memcpy(keys->ltk.ediv, req->ediv, sizeof(keys->ltk.ediv)); in smp_master_ident()
2562 memcpy(keys->ltk.rand, req->rand, sizeof(req->rand)); in smp_master_ident()
2810 struct bt_smp_security_request *req; in smp_send_security_req() local
2850 sizeof(*req)); in smp_send_security_req()
2855 req = net_buf_add(req_buf, sizeof(*req)); in smp_send_security_req()
2856 req->auth_req = get_auth(conn, BT_SMP_AUTH_DEFAULT); in smp_send_security_req()
2870 struct bt_smp_pairing *req = (void *)buf->data; in smp_pairing_req() local
2875 if ((req->max_key_size > BT_SMP_MAX_ENC_KEY_SIZE) || in smp_pairing_req()
2876 (req->max_key_size < BT_SMP_MIN_ENC_KEY_SIZE)) { in smp_pairing_req()
2900 memcpy(smp->preq + 1, req, sizeof(*req)); in smp_pairing_req()
2906 rsp->auth_req = get_auth(conn, req->auth_req); in smp_pairing_req()
2911 rsp->init_key_dist = (req->init_key_dist & RECV_KEYS); in smp_pairing_req()
2912 rsp->resp_key_dist = (req->resp_key_dist & SEND_KEYS); in smp_pairing_req()
2915 (req->auth_req & BT_SMP_AUTH_SC)) { in smp_pairing_req()
2923 (req->auth_req & BT_SMP_AUTH_CT2)) { in smp_pairing_req()
2931 (req->auth_req & BT_SMP_AUTH_BONDING)) { in smp_pairing_req()
2940 smp->method = get_pair_method(smp, req->io_capability); in smp_pairing_req()
2954 req); in smp_pairing_req()
2979 err = smp_pairing_accept_query(smp->chan.chan.conn, req); in smp_pairing_req()
3005 struct bt_smp_public_key *req; in sc_send_public_key() local
3008 req_buf = smp_create_pdu(smp, BT_SMP_CMD_PUBLIC_KEY, sizeof(*req)); in sc_send_public_key()
3013 req = net_buf_add(req_buf, sizeof(*req)); in sc_send_public_key()
3015 memcpy(req->x, sc_public_key, sizeof(req->x)); in sc_send_public_key()
3016 memcpy(req->y, &sc_public_key[32], sizeof(req->y)); in sc_send_public_key()
3031 struct bt_smp_pairing *req; in smp_send_pairing_req() local
3072 req_buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_REQ, sizeof(*req)); in smp_send_pairing_req()
3077 req = net_buf_add(req_buf, sizeof(*req)); in smp_send_pairing_req()
3079 req->auth_req = get_auth(conn, BT_SMP_AUTH_DEFAULT); in smp_send_pairing_req()
3080 req->io_capability = get_io_capa(); in smp_send_pairing_req()
3081 req->oob_flag = oobd_present ? BT_SMP_OOB_PRESENT : in smp_send_pairing_req()
3083 req->max_key_size = BT_SMP_MAX_ENC_KEY_SIZE; in smp_send_pairing_req()
3084 req->init_key_dist = SEND_KEYS; in smp_send_pairing_req()
3085 req->resp_key_dist = RECV_KEYS; in smp_send_pairing_req()
3092 memcpy(smp->preq + 1, req, sizeof(*req)); in smp_send_pairing_req()
3107 struct bt_smp_pairing *req = (struct bt_smp_pairing *)&smp->preq[1]; in smp_pairing_rsp() local
3124 (req->auth_req & BT_SMP_AUTH_SC)) { in smp_pairing_rsp()
3129 (req->auth_req & BT_SMP_AUTH_CT2)) { in smp_pairing_rsp()
3134 (req->auth_req & BT_SMP_AUTH_BONDING)) { in smp_pairing_rsp()
3216 struct bt_smp_pairing_confirm *req = (void *)buf->data; in smp_pairing_confirm() local
3222 memcpy(smp->pcnf, req->val, sizeof(smp->pcnf)); in smp_pairing_confirm()
3261 struct bt_smp_dhkey_check *req; in sc_smp_send_dhkey_check() local
3266 buf = smp_create_pdu(smp, BT_SMP_DHKEY_CHECK, sizeof(*req)); in sc_smp_send_dhkey_check()
3271 req = net_buf_add(buf, sizeof(*req)); in sc_smp_send_dhkey_check()
3272 memcpy(req->e, e, sizeof(req->e)); in sc_smp_send_dhkey_check()
3498 struct bt_smp_pairing *req = (struct bt_smp_pairing *)&smp->preq[1]; in le_sc_oob_data_req_check() local
3500 return ((req->oob_flag & BT_SMP_OOB_DATA_MASK) == BT_SMP_OOB_PRESENT); in le_sc_oob_data_req_check()
3543 struct bt_smp_pairing_random *req = (void *)buf->data; in smp_pairing_random() local
3549 memcpy(smp->rrnd, req->val, sizeof(smp->rrnd)); in smp_pairing_random()
3686 struct bt_smp_pairing_fail *req = (void *)buf->data; in smp_pairing_failed() local
3688 BT_ERR("reason 0x%x", req->reason); in smp_pairing_failed()
3697 smp_pairing_complete(smp, req->reason); in smp_pairing_failed()
3708 struct bt_smp_ident_info *req = (void *)buf->data; in smp_ident_info() local
3719 memcpy(keys->irk.val, req->irk, 16); in smp_ident_info()
3730 struct bt_smp_ident_addr_info *req = (void *)buf->data; in smp_ident_addr_info() local
3733 BT_DBG("identity %s", bt_addr_le_str(&req->addr)); in smp_ident_addr_info()
3735 if (!bt_addr_le_is_identity(&req->addr)) { in smp_ident_addr_info()
3736 BT_ERR("Invalid identity %s", bt_addr_le_str(&req->addr)); in smp_ident_addr_info()
3775 bt_addr_le_copy(&keys->addr, &req->addr); in smp_ident_addr_info()
3776 bt_addr_le_copy(&conn->le.dst, &req->addr); in smp_ident_addr_info()
3816 struct bt_smp_signing_info *req = (void *)buf->data; in smp_signing_info() local
3827 memcpy(keys->remote_csrk.val, req->csrk, in smp_signing_info()
3859 struct bt_smp_security_request *req = (void *)buf->data; in smp_security_request() local
3875 auth = req->auth_req & BT_SMP_AUTH_MASK_SC; in smp_security_request()
3877 auth = req->auth_req & BT_SMP_AUTH_MASK; in smp_security_request()
4036 struct bt_smp_public_key *req = (void *)buf->data; in smp_public_key() local
4041 memcpy(smp->pkey, req->x, 32); in smp_public_key()
4042 memcpy(&smp->pkey[32], req->y, 32); in smp_public_key()
4132 struct bt_smp_dhkey_check *req = (void *)buf->data; in smp_dhkey_check() local
4167 if (memcmp(e, req->e, 16)) { in smp_dhkey_check()
4199 memcpy(smp->e, req->e, sizeof(smp->e)); in smp_dhkey_check()