[20/24] Canonical form tBTM_STATUS::BTM_NOT_AUTHORIZED

Prepare for class enum-ify tBTM_STATUS

Bug: 358402071
Test: m .
Flag: EXEMPT, Mechanical Refactor

Change-Id: I2f7660171acf15f533712ed2c9795f0eb5469134
diff --git a/system/bta/dm/bta_dm_sec.cc b/system/bta/dm/bta_dm_sec.cc
index 3831aad..0247752 100644
--- a/system/bta/dm/bta_dm_sec.cc
+++ b/system/bta/dm/bta_dm_sec.cc
@@ -80,7 +80,7 @@
 void bta_dm_ble_sirk_confirm_device_reply(const RawAddress& bd_addr, bool accept) {
   log::debug("addr:{}", bd_addr);
   get_btm_client_interface().security.BTM_BleSirkConfirmDeviceReply(
-          bd_addr, accept ? tBTM_STATUS::BTM_SUCCESS : BTM_NOT_AUTHORIZED);
+          bd_addr, accept ? tBTM_STATUS::BTM_SUCCESS : tBTM_STATUS::BTM_NOT_AUTHORIZED);
 }
 
 void bta_dm_consolidate(const RawAddress& identity_addr, const RawAddress& rpa) {
@@ -169,21 +169,23 @@
     get_btm_client_interface().security.BTM_PINCodeReply(msg->bd_addr, tBTM_STATUS::BTM_SUCCESS,
                                                          msg->pin_len, msg->p_pin);
   } else {
-    get_btm_client_interface().security.BTM_PINCodeReply(msg->bd_addr, BTM_NOT_AUTHORIZED, 0, NULL);
+    get_btm_client_interface().security.BTM_PINCodeReply(msg->bd_addr,
+                                                         tBTM_STATUS::BTM_NOT_AUTHORIZED, 0, NULL);
   }
 }
 
 /** Send the user confirm request reply in response to a request from BTM */
 void bta_dm_confirm(const RawAddress& bd_addr, bool accept) {
   get_btm_client_interface().security.BTM_SecConfirmReqReply(
-          accept ? tBTM_STATUS::BTM_SUCCESS : BTM_NOT_AUTHORIZED, BT_TRANSPORT_BR_EDR, bd_addr);
+          accept ? tBTM_STATUS::BTM_SUCCESS : tBTM_STATUS::BTM_NOT_AUTHORIZED, BT_TRANSPORT_BR_EDR,
+          bd_addr);
 }
 
 /** respond to the OOB data request for the remote device from BTM */
 void bta_dm_ci_rmt_oob_act(std::unique_ptr<tBTA_DM_CI_RMT_OOB> msg) {
   get_btm_client_interface().security.BTM_RemoteOobDataReply(
-          msg->accept ? tBTM_STATUS::BTM_SUCCESS : BTM_NOT_AUTHORIZED, msg->bd_addr, msg->c,
-          msg->r);
+          msg->accept ? tBTM_STATUS::BTM_SUCCESS : tBTM_STATUS::BTM_NOT_AUTHORIZED, msg->bd_addr,
+          msg->c, msg->r);
 }
 
 /*******************************************************************************
@@ -254,7 +256,7 @@
 static tBTM_STATUS bta_dm_pin_cback(const RawAddress& bd_addr, DEV_CLASS dev_class,
                                     const BD_NAME bd_name, bool min_16_digit) {
   if (!bta_dm_sec_cb.p_sec_cback) {
-    return BTM_NOT_AUTHORIZED;
+    return tBTM_STATUS::BTM_NOT_AUTHORIZED;
   }
 
   /* If the device name is not known, save bdaddr and devclass and initiate a
@@ -395,7 +397,7 @@
 
   log::verbose("event:{}", sp_evt_to_text(event));
   if (!bta_dm_sec_cb.p_sec_cback) {
-    return BTM_NOT_AUTHORIZED;
+    return tBTM_STATUS::BTM_NOT_AUTHORIZED;
   }
 
   bool sp_rmt_result = false;
@@ -509,7 +511,7 @@
     }
 
     default:
-      status = BTM_NOT_AUTHORIZED;
+      status = tBTM_STATUS::BTM_NOT_AUTHORIZED;
       break;
   }
   log::verbose("dm status:{}", status);
@@ -660,7 +662,7 @@
   log::debug("addr:{},event:{}", bda, ble_evt_to_text(event));
 
   if (!bta_dm_sec_cb.p_sec_cback) {
-    return BTM_NOT_AUTHORIZED;
+    return tBTM_STATUS::BTM_NOT_AUTHORIZED;
   }
 
   memset(&sec_event, 0, sizeof(tBTA_DM_SEC));
@@ -774,7 +776,7 @@
       break;
 
     default:
-      status = BTM_NOT_AUTHORIZED;
+      status = tBTM_STATUS::BTM_NOT_AUTHORIZED;
       break;
   }
   return status;
@@ -966,14 +968,15 @@
  ******************************************************************************/
 void bta_dm_ble_passkey_reply(const RawAddress& bd_addr, bool accept, uint32_t passkey) {
   get_btm_client_interface().security.BTM_BlePasskeyReply(
-          bd_addr, accept ? tBTM_STATUS::BTM_SUCCESS : BTM_NOT_AUTHORIZED, passkey);
+          bd_addr, accept ? tBTM_STATUS::BTM_SUCCESS : tBTM_STATUS::BTM_NOT_AUTHORIZED, passkey);
 }
 
 /** This is response to SM numeric comparison request submitted to application.
  */
 void bta_dm_ble_confirm_reply(const RawAddress& bd_addr, bool accept) {
   get_btm_client_interface().security.BTM_SecConfirmReqReply(
-          accept ? tBTM_STATUS::BTM_SUCCESS : BTM_NOT_AUTHORIZED, BT_TRANSPORT_LE, bd_addr);
+          accept ? tBTM_STATUS::BTM_SUCCESS : tBTM_STATUS::BTM_NOT_AUTHORIZED, BT_TRANSPORT_LE,
+          bd_addr);
 }
 
 /** This function set the local device LE privacy settings. */
diff --git a/system/stack/btm/btm_sec.cc b/system/stack/btm/btm_sec.cc
index d5ca8b3..6a0ca9e 100644
--- a/system/stack/btm/btm_sec.cc
+++ b/system/stack/btm/btm_sec.cc
@@ -889,7 +889,7 @@
         l2cu_update_lcb_4_bonding(bd_addr, false);
       }
 
-      return BTM_NOT_AUTHORIZED;
+      return tBTM_STATUS::BTM_NOT_AUTHORIZED;
     } else /*HCI link is not up */
     {
       /* If the HCI link creation was started by Bonding process */
@@ -905,7 +905,7 @@
         btm_sec_cb.pairing_flags |= BTM_PAIR_FLAGS_WE_CANCEL_DD;
         return tBTM_STATUS::BTM_CMD_STARTED;
       }
-      return BTM_NOT_AUTHORIZED;
+      return tBTM_STATUS::BTM_NOT_AUTHORIZED;
     }
   }
 
@@ -2748,10 +2748,10 @@
 
     if (btm_sec_cb.api.p_sp_callback) {
       status = (*btm_sec_cb.api.p_sp_callback)(event, &evt_data);
-      if (status != BTM_NOT_AUTHORIZED) {
+      if (status != tBTM_STATUS::BTM_NOT_AUTHORIZED) {
         return;
       }
-      /* else BTM_NOT_AUTHORIZED means when the app wants to reject the req
+      /* else tBTM_STATUS::BTM_NOT_AUTHORIZED means when the app wants to reject the req
        * right now */
     } else if ((event == BTM_SP_CFM_REQ_EVT) && (evt_data.cfm_req.just_works)) {
       /* automatically reply with just works if no sp_cback */
@@ -2873,7 +2873,7 @@
 
     btm_sec_cb.change_pairing_state(BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP);
     if ((*btm_sec_cb.api.p_sp_callback)(BTM_SP_RMT_OOB_EVT, (tBTM_SP_EVT_DATA*)&evt_data) ==
-        BTM_NOT_AUTHORIZED) {
+        tBTM_STATUS::BTM_NOT_AUTHORIZED) {
       BTM_RemoteOobDataReply(static_cast<tBTM_STATUS>(true), p_bda, c, r);
     }
     return;
diff --git a/system/stack/l2cap/l2c_ble.cc b/system/stack/l2cap/l2c_ble.cc
index 1cb661b..d4bb7c5 100644
--- a/system/stack/l2cap/l2c_ble.cc
+++ b/system/stack/l2cap/l2c_ble.cc
@@ -1352,7 +1352,7 @@
       return L2CAP_LE_RESULT_INSUFFICIENT_AUTHENTICATION;
     case BTM_NOT_ENCRYPTED:
       return L2CAP_LE_RESULT_INSUFFICIENT_ENCRYP;
-    case BTM_NOT_AUTHORIZED:
+    case tBTM_STATUS::BTM_NOT_AUTHORIZED:
       return L2CAP_LE_RESULT_INSUFFICIENT_AUTHORIZATION;
     case tBTM_STATUS::BTM_INSUFFICIENT_ENCRYPT_KEY_SIZE:
       return L2CAP_LE_RESULT_INSUFFICIENT_ENCRYP_KEY_SIZE;