Lines Matching refs:req

437 	struct bt_smp_pairing *req, *rsp;  in get_pair_method()  local
439 req = (struct bt_smp_pairing *)&smp->preq[1]; in get_pair_method()
442 if ((req->auth_req & rsp->auth_req) & BT_SMP_AUTH_SC) { in get_pair_method()
444 if ((req->oob_flag | rsp->oob_flag) & BT_SMP_OOB_DATA_MASK) { in get_pair_method()
454 if (!((req->auth_req | rsp->auth_req) & BT_SMP_AUTH_MITM)) { in get_pair_method()
614 struct bt_smp_pairing *req, *rsp; in get_encryption_key_size() local
616 req = (struct bt_smp_pairing *)&smp->preq[1]; in get_encryption_key_size()
624 return MIN(req->max_key_size, rsp->max_key_size); in get_encryption_key_size()
1311 struct bt_smp_pairing *req = (void *)buf->data; in smp_br_pairing_req() local
1319 req->io_capability, req->oob_flag, req->auth_req, in smp_br_pairing_req()
1320 req->max_key_size, req->init_key_dist, req->resp_key_dist); in smp_br_pairing_req()
1339 if (req->max_key_size != max_key_size) { in smp_br_pairing_req()
1363 rsp->init_key_dist = (req->init_key_dist & BR_RECV_KEYS_SC); in smp_br_pairing_req()
1364 rsp->resp_key_dist = (req->resp_key_dist & BR_SEND_KEYS_SC); in smp_br_pairing_req()
1380 (req->auth_req & BT_SMP_AUTH_CT2)) { in smp_br_pairing_req()
1477 struct bt_smp_pairing_fail *req = (void *)buf->data; in smp_br_pairing_failed() local
1479 LOG_ERR("pairing failed (peer reason 0x%x)", req->reason); in smp_br_pairing_failed()
1481 smp_pairing_br_complete(smp, req->reason); in smp_br_pairing_failed()
1490 struct bt_smp_ident_info *req = (void *)buf->data; in smp_br_ident_info() local
1512 memcpy(keys->irk.val, req->irk, sizeof(keys->irk.val)); in smp_br_ident_info()
1543 struct bt_smp_ident_addr_info *req = (void *)buf->data; in smp_br_ident_addr_info() local
1547 LOG_DBG("identity %s", bt_addr_le_str(&req->addr)); in smp_br_ident_addr_info()
1558 if (!bt_addr_le_eq(&addr, &req->addr)) { in smp_br_ident_addr_info()
1596 struct bt_smp_signing_info *req = (void *)buf->data; in smp_br_signing_info() local
1616 memcpy(keys->remote_csrk.val, req->csrk, sizeof(keys->remote_csrk.val)); in smp_br_signing_info()
1800 struct bt_smp_pairing *req; in bt_smp_br_send_pairing_req() local
1846 req_buf = smp_br_create_pdu(smp, BT_SMP_CMD_PAIRING_REQ, sizeof(*req)); in bt_smp_br_send_pairing_req()
1851 req = net_buf_add(req_buf, sizeof(*req)); in bt_smp_br_send_pairing_req()
1860 req->auth_req = BT_SMP_AUTH_CT2; in bt_smp_br_send_pairing_req()
1861 req->io_capability = 0x00; in bt_smp_br_send_pairing_req()
1862 req->oob_flag = 0x00; in bt_smp_br_send_pairing_req()
1863 req->max_key_size = max_key_size; in bt_smp_br_send_pairing_req()
1864 req->init_key_dist = BR_SEND_KEYS_SC; in bt_smp_br_send_pairing_req()
1865 req->resp_key_dist = BR_RECV_KEYS_SC; in bt_smp_br_send_pairing_req()
2102 struct bt_smp_pairing_random *req; in smp_send_pairing_random() local
2105 rsp_buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_RANDOM, sizeof(*req)); in smp_send_pairing_random()
2110 req = net_buf_add(rsp_buf, sizeof(*req)); in smp_send_pairing_random()
2111 memcpy(req->val, smp->prnd, sizeof(req->val)); in smp_send_pairing_random()
2167 struct bt_smp_pairing_confirm *req; in smp_send_pairing_confirm() local
2193 buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_CONFIRM, sizeof(*req)); in smp_send_pairing_confirm()
2198 req = net_buf_add(buf, sizeof(*req)); in smp_send_pairing_confirm()
2200 if (bt_crypto_f4(sc_public_key, smp->pkey, smp->prnd, r, req->val)) { in smp_send_pairing_confirm()
2429 struct bt_smp_pairing *req, *rsp; in legacy_get_pair_method() local
2436 req = (struct bt_smp_pairing *)&smp->preq[1]; in legacy_get_pair_method()
2440 if ((req->oob_flag & rsp->oob_flag) & BT_SMP_OOB_DATA_MASK) { in legacy_get_pair_method()
2445 if (!((req->auth_req | rsp->auth_req) & BT_SMP_AUTH_MITM)) { in legacy_get_pair_method()
2539 struct bt_smp_pairing_confirm *req; in legacy_send_pairing_confirm() local
2542 buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_CONFIRM, sizeof(*req)); in legacy_send_pairing_confirm()
2547 req = net_buf_add(buf, sizeof(*req)); in legacy_send_pairing_confirm()
2550 &conn->le.init_addr, &conn->le.resp_addr, req->val)) { in legacy_send_pairing_confirm()
2739 struct bt_smp_encrypt_info *req = (void *)buf->data; in smp_encrypt_info() local
2749 memcpy(keys->ltk.val, req->ltk, 16); in smp_encrypt_info()
2765 struct bt_smp_central_ident *req = (void *)buf->data; in smp_central_ident() local
2774 memcpy(keys->ltk.ediv, req->ediv, sizeof(keys->ltk.ediv)); in smp_central_ident()
2775 memcpy(keys->ltk.rand, req->rand, sizeof(req->rand)); in smp_central_ident()
3084 struct bt_smp_security_request *req; in smp_send_security_req() local
3125 sizeof(*req)); in smp_send_security_req()
3130 req = net_buf_add(req_buf, sizeof(*req)); in smp_send_security_req()
3131 req->auth_req = get_auth(smp, BT_SMP_AUTH_DEFAULT); in smp_send_security_req()
3151 struct bt_smp_pairing *req = (void *)buf->data; in smp_pairing_req() local
3157 req->io_capability, req->oob_flag, req->auth_req, in smp_pairing_req()
3158 req->max_key_size, req->init_key_dist, req->resp_key_dist); in smp_pairing_req()
3160 if ((req->max_key_size > BT_SMP_MAX_ENC_KEY_SIZE) || in smp_pairing_req()
3161 (req->max_key_size < BT_SMP_MIN_ENC_KEY_SIZE)) { in smp_pairing_req()
3186 memcpy(smp->preq + 1, req, sizeof(*req)); in smp_pairing_req()
3192 rsp->auth_req = get_auth(smp, req->auth_req); in smp_pairing_req()
3195 rsp->init_key_dist = (req->init_key_dist & RECV_KEYS); in smp_pairing_req()
3196 rsp->resp_key_dist = (req->resp_key_dist & SEND_KEYS); in smp_pairing_req()
3199 (req->auth_req & BT_SMP_AUTH_SC)) { in smp_pairing_req()
3215 (req->auth_req & BT_SMP_AUTH_CT2)) { in smp_pairing_req()
3220 (req->auth_req & BT_SMP_AUTH_BONDING)) { in smp_pairing_req()
3236 smp->method = get_pair_method(smp, req->io_capability); in smp_pairing_req()
3252 err = smp_pairing_accept_query(smp, req); in smp_pairing_req()
3263 err = smp_pairing_accept_query(smp, req); in smp_pairing_req()
3296 struct bt_smp_public_key *req; in sc_send_public_key() local
3299 req_buf = smp_create_pdu(smp, BT_SMP_CMD_PUBLIC_KEY, sizeof(*req)); in sc_send_public_key()
3304 req = net_buf_add(req_buf, sizeof(*req)); in sc_send_public_key()
3306 memcpy(req->x, sc_public_key, sizeof(req->x)); in sc_send_public_key()
3307 memcpy(req->y, &sc_public_key[32], sizeof(req->y)); in sc_send_public_key()
3322 struct bt_smp_pairing *req; in smp_send_pairing_req() local
3370 req_buf = smp_create_pdu(smp, BT_SMP_CMD_PAIRING_REQ, sizeof(*req)); in smp_send_pairing_req()
3375 req = net_buf_add(req_buf, sizeof(*req)); in smp_send_pairing_req()
3377 req->auth_req = get_auth(smp, BT_SMP_AUTH_DEFAULT); in smp_send_pairing_req()
3378 req->io_capability = get_io_capa(smp); in smp_send_pairing_req()
3384 req->oob_flag = (legacy_oobd_present || sc_oobd_present) ? in smp_send_pairing_req()
3387 req->max_key_size = BT_SMP_MAX_ENC_KEY_SIZE; in smp_send_pairing_req()
3389 if (req->auth_req & BT_SMP_AUTH_BONDING) { in smp_send_pairing_req()
3390 req->init_key_dist = SEND_KEYS; in smp_send_pairing_req()
3391 req->resp_key_dist = RECV_KEYS; in smp_send_pairing_req()
3393 req->init_key_dist = 0; in smp_send_pairing_req()
3394 req->resp_key_dist = 0; in smp_send_pairing_req()
3397 smp->local_dist = req->init_key_dist; in smp_send_pairing_req()
3398 smp->remote_dist = req->resp_key_dist; in smp_send_pairing_req()
3402 memcpy(smp->preq + 1, req, sizeof(*req)); in smp_send_pairing_req()
3406 req->io_capability, req->oob_flag, req->auth_req, in smp_send_pairing_req()
3407 req->max_key_size, req->init_key_dist, req->resp_key_dist); in smp_send_pairing_req()
3422 struct bt_smp_pairing *req = (struct bt_smp_pairing *)&smp->preq[1]; in smp_pairing_rsp() local
3443 (req->auth_req & BT_SMP_AUTH_SC)) { in smp_pairing_rsp()
3448 (req->auth_req & BT_SMP_AUTH_CT2)) { in smp_pairing_rsp()
3453 (req->auth_req & BT_SMP_AUTH_BONDING)) { in smp_pairing_rsp()
3540 struct bt_smp_pairing_confirm *req = (void *)buf->data; in smp_pairing_confirm() local
3546 memcpy(smp->pcnf, req->val, sizeof(smp->pcnf)); in smp_pairing_confirm()
3586 struct bt_smp_dhkey_check *req; in sc_smp_send_dhkey_check() local
3591 buf = smp_create_pdu(smp, BT_SMP_DHKEY_CHECK, sizeof(*req)); in sc_smp_send_dhkey_check()
3596 req = net_buf_add(buf, sizeof(*req)); in sc_smp_send_dhkey_check()
3597 memcpy(req->e, e, sizeof(req->e)); in sc_smp_send_dhkey_check()
3858 struct bt_smp_pairing *req = (struct bt_smp_pairing *)&smp->preq[1]; in le_sc_oob_data_req_check() local
3860 return ((req->oob_flag & BT_SMP_OOB_DATA_MASK) == BT_SMP_OOB_PRESENT); in le_sc_oob_data_req_check()
3904 struct bt_smp_pairing_random *req = (void *)buf->data; in smp_pairing_random() local
3910 memcpy(smp->rrnd, req->val, sizeof(smp->rrnd)); in smp_pairing_random()
4050 struct bt_smp_pairing_fail *req = (void *)buf->data; in smp_pairing_failed() local
4052 LOG_ERR("pairing failed (peer reason 0x%x)", req->reason); in smp_pairing_failed()
4061 smp_pairing_complete(smp, req->reason); in smp_pairing_failed()
4072 struct bt_smp_ident_info *req = (void *)buf->data; in smp_ident_info() local
4082 memcpy(keys->irk.val, req->irk, 16); in smp_ident_info()
4152 struct bt_smp_ident_addr_info *req = (void *)buf->data; in smp_ident_addr_info() local
4155 LOG_DBG("identity %s", bt_addr_le_str(&req->addr)); in smp_ident_addr_info()
4159 if (!bt_addr_le_is_identity(&req->addr)) { in smp_ident_addr_info()
4160 LOG_ERR("Invalid identity %s", bt_addr_le_str(&req->addr)); in smp_ident_addr_info()
4165 if (!bt_addr_le_eq(&conn->le.dst, &req->addr)) { in smp_ident_addr_info()
4166 struct bt_keys *keys = bt_keys_find_addr(conn->id, &req->addr); in smp_ident_addr_info()
4212 .id_addr = &req->addr, in smp_ident_addr_info()
4219 bt_addr_le_copy(&keys->addr, &req->addr); in smp_ident_addr_info()
4260 struct bt_smp_signing_info *req = (void *)buf->data; in smp_signing_info() local
4270 memcpy(keys->remote_csrk.val, req->csrk, in smp_signing_info()
4302 struct bt_smp_security_request *req = (void *)buf->data; in smp_security_request() local
4325 auth = req->auth_req & BT_SMP_AUTH_MASK_SC; in smp_security_request()
4327 auth = req->auth_req & BT_SMP_AUTH_MASK; in smp_security_request()
4514 struct bt_smp_public_key *req = (void *)buf->data; in smp_public_key() local
4519 memcpy(smp->pkey, req->x, BT_PUB_KEY_COORD_LEN); in smp_public_key()
4520 memcpy(&smp->pkey[BT_PUB_KEY_COORD_LEN], req->y, BT_PUB_KEY_COORD_LEN); in smp_public_key()
4630 struct bt_smp_dhkey_check *req = (void *)buf->data; in smp_dhkey_check() local
4666 if (memcmp(e, req->e, 16)) { in smp_dhkey_check()
4699 memcpy(smp->e, req->e, sizeof(smp->e)); in smp_dhkey_check()
5731 struct bt_smp_keypress_notif *req; in smp_send_keypress_notif() local
5734 buf = smp_create_pdu(smp, BT_SMP_KEYPRESS_NOTIFICATION, sizeof(*req)); in smp_send_keypress_notif()
5739 req = net_buf_add(buf, sizeof(*req)); in smp_send_keypress_notif()
5740 req->type = type; in smp_send_keypress_notif()