/packages/modules/Bluetooth/system/stack/btm/ |
D | btm_sec_cb.cc | 202 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, in AddService() argument 209 log::verbose("sec_level:0x{:x}", sec_level); in AddService() 265 sec_level &= ~(BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_MITM | in AddService() 269 if (sec_level & BTM_SEC_OUT_AUTHENTICATE) { in AddService() 270 sec_level |= BTM_SEC_OUT_MITM; in AddService() 275 if (sec_level & BTM_SEC_OUT_ENCRYPT) { in AddService() 276 sec_level |= BTM_SEC_OUT_AUTHENTICATE; in AddService() 294 sec_level &= ~(BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_MITM); in AddService() 297 if (sec_level & BTM_SEC_IN_AUTHENTICATE) { in AddService() 298 sec_level |= BTM_SEC_IN_MITM; in AddService() [all …]
|
D | btm_ble_sec.cc | 909 p_rec->sec_rec.ble_keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key() 914 if (p_keys->penc_key.sec_level == SMP_SEC_AUTHENTICATED) { in btm_sec_save_le_key() 921 p_rec->sec_rec.ble_keys.sec_level); in btm_sec_save_le_key() 942 p_rec->sec_rec.ble_keys.srk_sec_level = p_keys->pcsrk_key.sec_level; in btm_sec_save_le_key() 947 if (p_keys->pcsrk_key.sec_level == SMP_SEC_AUTHENTICATED) { in btm_sec_save_le_key() 964 p_rec->sec_rec.ble_keys.sec_level = p_keys->lenc_key.sec_level; in btm_sec_save_le_key() 972 p_rec->sec_rec.ble_keys.key_size, p_rec->sec_rec.ble_keys.sec_level); in btm_sec_save_le_key() 978 p_rec->sec_rec.ble_keys.local_csrk_sec_level = p_keys->lcsrk_key.sec_level; in btm_sec_save_le_key() 1103 cur_sec_level = p_dev_rec->sec_rec.ble_keys.sec_level; in btm_ble_link_sec_check() 1432 p_dev_rec->sec_rec.ble_keys.sec_level == SMP_SEC_AUTHENTICATED) { in btm_ble_get_auth_req() [all …]
|
D | btm_sec_cb.h | 94 bool AddService(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level,
|
/packages/modules/Bluetooth/system/test/mock/ |
D | mock_stack_l2cap_api.h | 49 uint16_t required_remote_mtu, uint16_t sec_level)> 56 uint16_t sec_level) { in operator() 57 return body(psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in operator() 68 uint16_t required_remote_mtu, uint16_t sec_level)> 75 uint16_t sec_level) { in operator() 76 return body(psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in operator() 108 std::function<uint16_t(uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level)> body{ 112 uint16_t operator()(uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in operator() 113 return body(psm, p_bd_addr, sec_level); in operator() 130 std::function<uint16_t(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, [all …]
|
D | mock_stack_l2cap_api.cc | 88 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument 91 psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in L2CA_RegisterWithSecurity() 95 uint16_t sec_level) { in L2CA_Register() argument 98 my_mtu, required_remote_mtu, sec_level); in L2CA_Register() 113 uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument 115 return test::mock::stack_l2cap_api::L2CA_ConnectReqWithSecurity(psm, p_bd_addr, sec_level); in L2CA_ConnectReqWithSecurity() 121 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument 124 return test::mock::stack_l2cap_api::L2CA_RegisterLECoc(psm, p_cb_info, sec_level, cfg); in L2CA_RegisterLECoc() 131 uint16_t sec_level) { in L2CA_ConnectLECocReq() argument 133 return test::mock::stack_l2cap_api::L2CA_ConnectLECocReq(psm, p_bd_addr, p_cfg, sec_level); in L2CA_ConnectLECocReq()
|
D | mock_stack_l2cap_interface.h | 37 uint16_t sec_level)); 41 uint16_t sec_level)); 48 (uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, 61 (uint16_t psm, const RawAddress& bd_addr, uint16_t sec_level)); 80 uint16_t sec_level));
|
D | mock_stack_btm_sec.h | 309 std::function<bool(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level, 314 bool operator()(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level, in operator() 316 return body(is_originator, p_name, service_id, sec_level, psm, mx_proto_id, mx_chan_id); in operator()
|
/packages/modules/Bluetooth/system/stack/l2cap/ |
D | l2cap_api.cc | 29 uint16_t sec_level) { in L2CA_Register() argument 31 sec_level); in L2CA_Register() 37 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument 39 required_remote_mtu, sec_level); in L2CA_RegisterWithSecurity() 56 uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument 57 return ::L2CA_ConnectReqWithSecurity(psm, p_bd_addr, sec_level); in L2CA_ConnectReqWithSecurity() 61 uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument 63 return ::L2CA_RegisterLECoc(psm, p_cb_info, sec_level, cfg); in L2CA_RegisterLECoc() 71 uint16_t psm, const RawAddress& p_bd_addr, tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level) { in L2CA_ConnectLECocReq() argument 72 return ::L2CA_ConnectLECocReq(psm, p_bd_addr, p_cfg, sec_level); in L2CA_ConnectLECocReq()
|
D | l2c_api.h | 44 uint16_t sec_level) override; 48 uint16_t sec_level) override; 56 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg) override; 69 uint16_t sec_level) override; 90 uint16_t sec_level) override;
|
D | l2c_api.cc | 63 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument 65 sec_level); in L2CA_RegisterWithSecurity() 66 get_btm_client_interface().security.BTM_SetSecurityLevel(false, "", 0, sec_level, psm, 0, 0); in L2CA_RegisterWithSecurity() 281 uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument 282 get_btm_client_interface().security.BTM_SetSecurityLevel(true, "", 0, sec_level, psm, 0, 0); in L2CA_ConnectReqWithSecurity() 377 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument 382 get_btm_client_interface().security.BTM_SetSecurityLevel(false, "", 0, sec_level, psm, 0, 0); in L2CA_RegisterLECoc() 496 uint16_t sec_level) { in L2CA_ConnectLECocReq() argument 497 get_btm_client_interface().security.BTM_SetSecurityLevel(true, "", 0, sec_level, psm, 0, 0); in L2CA_ConnectLECocReq()
|
/packages/modules/Bluetooth/system/stack/include/ |
D | btm_ble_sec_api_types.h | 35 uint8_t sec_level; member 43 uint8_t sec_level; member 51 uint8_t sec_level; member 58 uint8_t sec_level; member
|
D | l2cap_interface.h | 278 uint16_t required_remote_mtu, uint16_t sec_level) = 0; 282 uint16_t sec_level) = 0; 342 uint16_t sec_level) = 0; 363 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg) = 0; 398 tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level) = 0;
|
D | security_client_callbacks.h | 118 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id,
|
D | smp_api_types.h | 168 tSMP_SEC_LEVEL sec_level; member
|
/packages/modules/Bluetooth/system/stack/l2cap/internal/ |
D | l2c_api.h | 228 uint16_t sec_level); 247 uint16_t sec_level); 285 uint16_t sec_level); 316 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg); 343 tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level);
|
/packages/modules/Bluetooth/system/stack/smp/ |
D | smp_act.cc | 389 .sec_level = p_cb->sec_level, in smp_send_enc_info() 428 .sec_level = p_cb->sec_level, in smp_send_csrk_info() 1025 le_key.penc_key.sec_level = p_cb->sec_level; in smp_proc_central_id() 1110 .sec_level = p_cb->sec_level, in smp_proc_srk_info() 1421 p_cb->sec_level = SMP_SEC_UNAUTHENTICATE; in smp_decide_association_model() 1422 log::verbose("p_cb->sec_level={} (SMP_SEC_UNAUTHENTICATE)", p_cb->sec_level); in smp_decide_association_model() 1437 p_cb->sec_level = SMP_SEC_AUTHENTICATED; in smp_decide_association_model() 1438 log::verbose("p_cb->sec_level={}(SMP_SEC_AUTHENTICATED)", p_cb->sec_level); in smp_decide_association_model() 1446 p_cb->sec_level = SMP_SEC_AUTHENTICATED; in smp_decide_association_model() 1447 log::verbose("p_cb->sec_level={}(SMP_SEC_AUTHENTICATED)", p_cb->sec_level); in smp_decide_association_model() [all …]
|
D | smp_utils.cc | 982 .sec_level = in smp_proc_pairing_cmpl() 983 (p_cb->status == SMP_SUCCESS) ? p_cb->sec_level : SMP_SEC_NONE, in smp_proc_pairing_cmpl() 993 p_cb->pairing_bda, evt_data.cmplt.sec_level); in smp_proc_pairing_cmpl() 999 p_cb->pairing_bda, smp_status_text(evt_data.cmplt.reason), evt_data.cmplt.sec_level); in smp_proc_pairing_cmpl() 1508 .sec_level = p_cb->sec_level, in smp_save_secure_connections_long_term_key() 1518 .sec_level = p_cb->sec_level, in smp_save_secure_connections_long_term_key()
|
/packages/modules/Bluetooth/system/stack/test/common/ |
D | mock_btm_api_layer.cc | 30 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, in BTM_SetSecurityLevel() argument 32 return btm_api_interface->SetSecurityLevel(is_originator, p_name, service_id, sec_level, psm, in BTM_SetSecurityLevel()
|
D | mock_btm_api_layer.h | 30 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, 42 bool(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level,
|
D | mock_l2cap_layer.cc | 51 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument 53 return l2cap_interface->RegisterLECoc(psm, cb_info, sec_level); in L2CA_RegisterLECoc()
|
D | mock_l2cap_layer.h | 44 uint16_t sec_level) = 0; 71 uint16_t(uint16_t psm, const tL2CAP_APPL_INFO& cb_info, uint16_t sec_level));
|
/packages/modules/Bluetooth/system/stack/fuzzers/ |
D | bnep_fuzzer.cc | 62 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeBtStack() argument 70 uint16_t sec_level) { in FakeBtStack() argument
|
D | avrc_fuzzer.cc | 70 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeBtStack() argument 78 uint16_t sec_level) { in FakeBtStack() argument
|
D | sdp_fuzzer.cc | 77 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeL2cap() argument 90 uint16_t sec_level) { in FakeL2cap() argument
|
D | gatt_fuzzer.cc | 106 uint16_t sec_level) { in FakeBtStack() argument 111 [](uint16_t psm, const tL2CAP_APPL_INFO& p_fixed_chnl_reg, uint16_t sec_level, in FakeBtStack()
|