/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_auth.c | 169 UINT8 sec_flag; in gatt_enc_cmpl_cback() local 183 BTM_GetSecurityFlagsByTransport(bd_addr, &sec_flag, transport); in gatt_enc_cmpl_cback() 185 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_enc_cmpl_cback() 300 UINT8 sec_flag; in gatt_determine_sec_act() local 314 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_clcb->p_tcb->transport); in gatt_determine_sec_act() 327 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED | BTM_SEC_FLAG_LKEY_KNOWN)) { in gatt_determine_sec_act() 328 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in gatt_determine_sec_act() 334 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_determine_sec_act() 407 UINT8 sec_flag = 0; in gatt_get_link_encrypt_status() local 409 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_tcb->transport); in gatt_get_link_encrypt_status() [all …]
|
D | gatt_db.c | 121 tGATT_SEC_FLAG sec_flag, in gatts_check_attr_readability() argument 142 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && in gatts_check_attr_readability() 143 !(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability() 148 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) { in gatts_check_attr_readability() 153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability() 158 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 163 …if ((perm & GATT_READ_AUTHORIZATION) && (!(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED) || !(sec_flag & G… in gatts_check_attr_readability() 213 tGATT_SEC_FLAG sec_flag, in read_attr_value() argument 224 sec_flag, in read_attr_value() 228 …status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_siz… in read_attr_value() [all …]
|
D | gatt_sr.c | 481 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local 489 &sec_flag, in gatt_process_read_multi_req() 514 sec_flag, in gatt_process_read_multi_req() 557 sec_flag, in gatt_process_read_multi_req() 1006 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local 1047 &sec_flag, in gatts_process_read_by_type_req() 1058 sec_flag, in gatts_process_read_by_type_req() 1112 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 1138 &sec_flag, in gatts_process_write_req() 1147 sec_flag, in gatts_process_write_req() [all …]
|
D | gatt_utils.c | 1477 UINT8 sec_flag = 0; in gatt_sr_get_sec_info() local 1479 BTM_GetSecurityFlagsByTransport(rem_bda, &sec_flag, transport); in gatt_sr_get_sec_info() 1481 …sec_flag &= (GATT_SEC_FLAG_LKEY_UNAUTHED | GATT_SEC_FLAG_LKEY_AUTHED | GATT_SEC_FLAG_ENCRYPTED | G… in gatt_sr_get_sec_info() 1485 *p_sec_flag = sec_flag; in gatt_sr_get_sec_info()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/bta/hh/ |
D | bta_hh_le.c | 1325 UINT8 sec_flag = 0; in bta_hh_start_security() local 1340 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_start_security() 1343 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in bta_hh_start_security() 1347 else if (sec_flag & BTM_SEC_FLAG_LKEY_KNOWN) { in bta_hh_start_security() 1348 sec_flag = BTM_BLE_SEC_ENCRYPT; in bta_hh_start_security() 1350 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security() 1354 sec_flag = BTM_BLE_SEC_ENCRYPT_NO_MITM; in bta_hh_start_security() 1357 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security() 2590 UINT8 sec_flag = 0; in bta_hh_le_add_dev_bg_conn() local 2596 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_le_add_dev_bg_conn() [all …]
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/gatt/include/ |
D | gatt_int.h | 745 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra… 747 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i… 752 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 753 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
|
/device/soc/hisilicon/hi3751v350/sdk_linux/source/common/drv/mmz/ |
D | drv_media_mem.h | 155 int sec_flag; /* 1: means the mem is sec mem 0: the mem is no sec mem */ member
|
D | drv_media_mem.c | 1486 mmb->sec_flag = 1; in set_sec_mmb_flag() 1501 mmb->sec_flag = 0; in clr_sec_mmb_flag() 1519 ret = mmb->sec_flag; in is_sec_mem()
|
D | drv_mmz_userdev.c | 1095 if (mmb->sec_flag) { in force_secmem_free()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 959 UINT8 sec_flag = 0; in btm_ble_determine_security_act() local 960 BTM_GetSecurityFlagsByTransport(bdaddr, &sec_flag, BT_TRANSPORT_LE); in btm_ble_determine_security_act() 964 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED| BTM_SEC_FLAG_LKEY_KNOWN)) in btm_ble_determine_security_act() 966 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in btm_ble_determine_security_act() 970 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in btm_ble_determine_security_act()
|
D | btm_sec.c | 6301 UINT8 sec_flag = 0; in btm_sec_dev_authorization() local 6304 sec_flag = (UINT8)(p_dev_rec->sec_flags >> 8); in btm_sec_dev_authorization() 6305 if (!(sec_flag & BTM_SEC_LINK_KEY_AUTHED)) { in btm_sec_dev_authorization()
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/l2cap/ |
D | l2c_ble.c | 1463 UINT8 sec_flag; in l2cble_sec_comp() local 1493 BTM_GetSecurityFlagsByTransport(p_bda, &sec_flag, transport); in l2cble_sec_comp() 1494 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in l2cble_sec_comp()
|