Home
last modified time | relevance | path

Searched refs:sec_level (Results 1 – 25 of 33) sorted by relevance

12

/packages/modules/Bluetooth/system/stack/btm/
Dbtm_sec_cb.cc202 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, in AddService() argument
209 log::verbose("sec_level:0x{:x}", sec_level); in AddService()
265 sec_level &= ~(BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_MITM | in AddService()
269 if (sec_level & BTM_SEC_OUT_AUTHENTICATE) { in AddService()
270 sec_level |= BTM_SEC_OUT_MITM; in AddService()
275 if (sec_level & BTM_SEC_OUT_ENCRYPT) { in AddService()
276 sec_level |= BTM_SEC_OUT_AUTHENTICATE; in AddService()
294 sec_level &= ~(BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_MITM); in AddService()
297 if (sec_level & BTM_SEC_IN_AUTHENTICATE) { in AddService()
298 sec_level |= BTM_SEC_IN_MITM; in AddService()
[all …]
Dbtm_ble_sec.cc909 p_rec->sec_rec.ble_keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key()
914 if (p_keys->penc_key.sec_level == SMP_SEC_AUTHENTICATED) { in btm_sec_save_le_key()
921 p_rec->sec_rec.ble_keys.sec_level); in btm_sec_save_le_key()
942 p_rec->sec_rec.ble_keys.srk_sec_level = p_keys->pcsrk_key.sec_level; in btm_sec_save_le_key()
947 if (p_keys->pcsrk_key.sec_level == SMP_SEC_AUTHENTICATED) { in btm_sec_save_le_key()
964 p_rec->sec_rec.ble_keys.sec_level = p_keys->lenc_key.sec_level; in btm_sec_save_le_key()
972 p_rec->sec_rec.ble_keys.key_size, p_rec->sec_rec.ble_keys.sec_level); in btm_sec_save_le_key()
978 p_rec->sec_rec.ble_keys.local_csrk_sec_level = p_keys->lcsrk_key.sec_level; in btm_sec_save_le_key()
1103 cur_sec_level = p_dev_rec->sec_rec.ble_keys.sec_level; in btm_ble_link_sec_check()
1432 p_dev_rec->sec_rec.ble_keys.sec_level == SMP_SEC_AUTHENTICATED) { in btm_ble_get_auth_req()
[all …]
Dbtm_sec_cb.h94 bool AddService(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level,
/packages/modules/Bluetooth/system/test/mock/
Dmock_stack_l2cap_api.h49 uint16_t required_remote_mtu, uint16_t sec_level)>
56 uint16_t sec_level) { in operator()
57 return body(psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in operator()
68 uint16_t required_remote_mtu, uint16_t sec_level)>
75 uint16_t sec_level) { in operator()
76 return body(psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in operator()
108 std::function<uint16_t(uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level)> body{
112 uint16_t operator()(uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in operator()
113 return body(psm, p_bd_addr, sec_level); in operator()
130 std::function<uint16_t(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level,
[all …]
Dmock_stack_l2cap_api.cc88 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument
91 psm, p_cb_info, enable_snoop, p_ertm_info, my_mtu, required_remote_mtu, sec_level); in L2CA_RegisterWithSecurity()
95 uint16_t sec_level) { in L2CA_Register() argument
98 my_mtu, required_remote_mtu, sec_level); in L2CA_Register()
113 uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument
115 return test::mock::stack_l2cap_api::L2CA_ConnectReqWithSecurity(psm, p_bd_addr, sec_level); in L2CA_ConnectReqWithSecurity()
121 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument
124 return test::mock::stack_l2cap_api::L2CA_RegisterLECoc(psm, p_cb_info, sec_level, cfg); in L2CA_RegisterLECoc()
131 uint16_t sec_level) { in L2CA_ConnectLECocReq() argument
133 return test::mock::stack_l2cap_api::L2CA_ConnectLECocReq(psm, p_bd_addr, p_cfg, sec_level); in L2CA_ConnectLECocReq()
Dmock_stack_l2cap_interface.h37 uint16_t sec_level));
41 uint16_t sec_level));
48 (uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level,
61 (uint16_t psm, const RawAddress& bd_addr, uint16_t sec_level));
80 uint16_t sec_level));
Dmock_stack_btm_sec.h309 std::function<bool(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level,
314 bool operator()(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level, in operator()
316 return body(is_originator, p_name, service_id, sec_level, psm, mx_proto_id, mx_chan_id); in operator()
/packages/modules/Bluetooth/system/stack/l2cap/
Dl2cap_api.cc29 uint16_t sec_level) { in L2CA_Register() argument
31 sec_level); in L2CA_Register()
37 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument
39 required_remote_mtu, sec_level); in L2CA_RegisterWithSecurity()
56 uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument
57 return ::L2CA_ConnectReqWithSecurity(psm, p_bd_addr, sec_level); in L2CA_ConnectReqWithSecurity()
61 uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument
63 return ::L2CA_RegisterLECoc(psm, p_cb_info, sec_level, cfg); in L2CA_RegisterLECoc()
71 uint16_t psm, const RawAddress& p_bd_addr, tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level) { in L2CA_ConnectLECocReq() argument
72 return ::L2CA_ConnectLECocReq(psm, p_bd_addr, p_cfg, sec_level); in L2CA_ConnectLECocReq()
Dl2c_api.h44 uint16_t sec_level) override;
48 uint16_t sec_level) override;
56 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg) override;
69 uint16_t sec_level) override;
90 uint16_t sec_level) override;
Dl2c_api.cc63 uint16_t sec_level) { in L2CA_RegisterWithSecurity() argument
65 sec_level); in L2CA_RegisterWithSecurity()
66 get_btm_client_interface().security.BTM_SetSecurityLevel(false, "", 0, sec_level, psm, 0, 0); in L2CA_RegisterWithSecurity()
281 uint16_t sec_level) { in L2CA_ConnectReqWithSecurity() argument
282 get_btm_client_interface().security.BTM_SetSecurityLevel(true, "", 0, sec_level, psm, 0, 0); in L2CA_ConnectReqWithSecurity()
377 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& p_cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument
382 get_btm_client_interface().security.BTM_SetSecurityLevel(false, "", 0, sec_level, psm, 0, 0); in L2CA_RegisterLECoc()
496 uint16_t sec_level) { in L2CA_ConnectLECocReq() argument
497 get_btm_client_interface().security.BTM_SetSecurityLevel(true, "", 0, sec_level, psm, 0, 0); in L2CA_ConnectLECocReq()
/packages/modules/Bluetooth/system/stack/include/
Dbtm_ble_sec_api_types.h35 uint8_t sec_level; member
43 uint8_t sec_level; member
51 uint8_t sec_level; member
58 uint8_t sec_level; member
Dl2cap_interface.h278 uint16_t required_remote_mtu, uint16_t sec_level) = 0;
282 uint16_t sec_level) = 0;
342 uint16_t sec_level) = 0;
363 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg) = 0;
398 tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level) = 0;
Dsecurity_client_callbacks.h118 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id,
Dsmp_api_types.h168 tSMP_SEC_LEVEL sec_level; member
/packages/modules/Bluetooth/system/stack/l2cap/internal/
Dl2c_api.h228 uint16_t sec_level);
247 uint16_t sec_level);
285 uint16_t sec_level);
316 uint16_t sec_level, tL2CAP_LE_CFG_INFO cfg);
343 tL2CAP_LE_CFG_INFO* p_cfg, uint16_t sec_level);
/packages/modules/Bluetooth/system/stack/smp/
Dsmp_act.cc389 .sec_level = p_cb->sec_level, in smp_send_enc_info()
428 .sec_level = p_cb->sec_level, in smp_send_csrk_info()
1025 le_key.penc_key.sec_level = p_cb->sec_level; in smp_proc_central_id()
1110 .sec_level = p_cb->sec_level, in smp_proc_srk_info()
1421 p_cb->sec_level = SMP_SEC_UNAUTHENTICATE; in smp_decide_association_model()
1422 log::verbose("p_cb->sec_level={} (SMP_SEC_UNAUTHENTICATE)", p_cb->sec_level); in smp_decide_association_model()
1437 p_cb->sec_level = SMP_SEC_AUTHENTICATED; in smp_decide_association_model()
1438 log::verbose("p_cb->sec_level={}(SMP_SEC_AUTHENTICATED)", p_cb->sec_level); in smp_decide_association_model()
1446 p_cb->sec_level = SMP_SEC_AUTHENTICATED; in smp_decide_association_model()
1447 log::verbose("p_cb->sec_level={}(SMP_SEC_AUTHENTICATED)", p_cb->sec_level); in smp_decide_association_model()
[all …]
Dsmp_utils.cc982 .sec_level = in smp_proc_pairing_cmpl()
983 (p_cb->status == SMP_SUCCESS) ? p_cb->sec_level : SMP_SEC_NONE, in smp_proc_pairing_cmpl()
993 p_cb->pairing_bda, evt_data.cmplt.sec_level); in smp_proc_pairing_cmpl()
999 p_cb->pairing_bda, smp_status_text(evt_data.cmplt.reason), evt_data.cmplt.sec_level); in smp_proc_pairing_cmpl()
1508 .sec_level = p_cb->sec_level, in smp_save_secure_connections_long_term_key()
1518 .sec_level = p_cb->sec_level, in smp_save_secure_connections_long_term_key()
/packages/modules/Bluetooth/system/stack/test/common/
Dmock_btm_api_layer.cc30 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id, in BTM_SetSecurityLevel() argument
32 return btm_api_interface->SetSecurityLevel(is_originator, p_name, service_id, sec_level, psm, in BTM_SetSecurityLevel()
Dmock_btm_api_layer.h30 uint16_t sec_level, uint16_t psm, uint32_t mx_proto_id,
42 bool(bool is_originator, const char* p_name, uint8_t service_id, uint16_t sec_level,
Dmock_l2cap_layer.cc51 uint16_t L2CA_RegisterLECoc(uint16_t psm, const tL2CAP_APPL_INFO& cb_info, uint16_t sec_level, in L2CA_RegisterLECoc() argument
53 return l2cap_interface->RegisterLECoc(psm, cb_info, sec_level); in L2CA_RegisterLECoc()
Dmock_l2cap_layer.h44 uint16_t sec_level) = 0;
71 uint16_t(uint16_t psm, const tL2CAP_APPL_INFO& cb_info, uint16_t sec_level));
/packages/modules/Bluetooth/system/stack/fuzzers/
Dbnep_fuzzer.cc62 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeBtStack() argument
70 uint16_t sec_level) { in FakeBtStack() argument
Davrc_fuzzer.cc70 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeBtStack() argument
78 uint16_t sec_level) { in FakeBtStack() argument
Dsdp_fuzzer.cc77 [](uint16_t psm, const RawAddress& p_bd_addr, uint16_t sec_level) { in FakeL2cap() argument
90 uint16_t sec_level) { in FakeL2cap() argument
Dgatt_fuzzer.cc106 uint16_t sec_level) { in FakeBtStack() argument
111 [](uint16_t psm, const tL2CAP_APPL_INFO& p_fixed_chnl_reg, uint16_t sec_level, in FakeBtStack()

12