Home
last modified time | relevance | path

Searched refs:sec_flag (Results 1 – 12 of 12) sorted by relevance

/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/
Dgatt_auth.c169 UINT8 sec_flag; in gatt_enc_cmpl_cback() local
183 BTM_GetSecurityFlagsByTransport(bd_addr, &sec_flag, transport); in gatt_enc_cmpl_cback()
185 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_enc_cmpl_cback()
300 UINT8 sec_flag; in gatt_determine_sec_act() local
314 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_clcb->p_tcb->transport); in gatt_determine_sec_act()
327 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED | BTM_SEC_FLAG_LKEY_KNOWN)) { in gatt_determine_sec_act()
328 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in gatt_determine_sec_act()
334 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_determine_sec_act()
407 UINT8 sec_flag = 0; in gatt_get_link_encrypt_status() local
409 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_tcb->transport); in gatt_get_link_encrypt_status()
[all …]
Dgatt_db.c121 tGATT_SEC_FLAG sec_flag, in gatts_check_attr_readability() argument
142 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && in gatts_check_attr_readability()
143 !(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability()
148 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) { in gatts_check_attr_readability()
153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability()
158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability()
163 …if ((perm & GATT_READ_AUTHORIZATION) && (!(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED) || !(sec_flag & G… in gatts_check_attr_readability()
213 tGATT_SEC_FLAG sec_flag, in read_attr_value() argument
224 sec_flag, in read_attr_value()
228 …status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_siz… in read_attr_value()
[all …]
Dgatt_sr.c481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local
489 &sec_flag, in gatt_process_read_multi_req()
514 sec_flag, in gatt_process_read_multi_req()
557 sec_flag, in gatt_process_read_multi_req()
1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local
1047 &sec_flag, in gatts_process_read_by_type_req()
1058 sec_flag, in gatts_process_read_by_type_req()
1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local
1138 &sec_flag, in gatts_process_write_req()
1147 sec_flag, in gatts_process_write_req()
[all …]
Dgatt_utils.c1477 UINT8 sec_flag = 0; in gatt_sr_get_sec_info() local
1479 BTM_GetSecurityFlagsByTransport(rem_bda, &sec_flag, transport); in gatt_sr_get_sec_info()
1481sec_flag &= (GATT_SEC_FLAG_LKEY_UNAUTHED | GATT_SEC_FLAG_LKEY_AUTHED | GATT_SEC_FLAG_ENCRYPTED | G… in gatt_sr_get_sec_info()
1485 *p_sec_flag = sec_flag; in gatt_sr_get_sec_info()
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/hh/
Dbta_hh_le.c1325 UINT8 sec_flag = 0; in bta_hh_start_security() local
1340 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_start_security()
1343 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in bta_hh_start_security()
1347 else if (sec_flag & BTM_SEC_FLAG_LKEY_KNOWN) { in bta_hh_start_security()
1348 sec_flag = BTM_BLE_SEC_ENCRYPT; in bta_hh_start_security()
1350 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security()
1354 sec_flag = BTM_BLE_SEC_ENCRYPT_NO_MITM; in bta_hh_start_security()
1357 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security()
2590 UINT8 sec_flag = 0; in bta_hh_le_add_dev_bg_conn() local
2596 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_le_add_dev_bg_conn()
[all …]
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/include/
Dgatt_int.h745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra…
747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i…
752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
/device/soc/hisilicon/hi3751v350/sdk_linux/source/common/drv/mmz/
Ddrv_media_mem.h155 int sec_flag; /* 1: means the mem is sec mem 0: the mem is no sec mem */ member
Ddrv_media_mem.c1486 mmb->sec_flag = 1; in set_sec_mmb_flag()
1501 mmb->sec_flag = 0; in clr_sec_mmb_flag()
1519 ret = mmb->sec_flag; in is_sec_mem()
Ddrv_mmz_userdev.c1095 if (mmb->sec_flag) { in force_secmem_free()
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c959 UINT8 sec_flag = 0; in btm_ble_determine_security_act() local
960 BTM_GetSecurityFlagsByTransport(bdaddr, &sec_flag, BT_TRANSPORT_LE); in btm_ble_determine_security_act()
964 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED| BTM_SEC_FLAG_LKEY_KNOWN)) in btm_ble_determine_security_act()
966 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in btm_ble_determine_security_act()
970 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in btm_ble_determine_security_act()
Dbtm_sec.c6301 UINT8 sec_flag = 0; in btm_sec_dev_authorization() local
6304 sec_flag = (UINT8)(p_dev_rec->sec_flags >> 8); in btm_sec_dev_authorization()
6305 if (!(sec_flag & BTM_SEC_LINK_KEY_AUTHED)) { in btm_sec_dev_authorization()
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/l2cap/
Dl2c_ble.c1463 UINT8 sec_flag; in l2cble_sec_comp() local
1493 BTM_GetSecurityFlagsByTransport(p_bda, &sec_flag, transport); in l2cble_sec_comp()
1494 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in l2cble_sec_comp()