Home
last modified time | relevance | path

Searched refs:sec_rec (Results 1 – 15 of 15) sorted by relevance

/packages/modules/Bluetooth/system/stack/btm/
Dbtm_sec.cc182 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_AUTHENTICATED; in btm_dev_authenticated()
195 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_ENCRYPTED; in btm_dev_encrypted()
209 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_16_DIGIT_PIN_AUTHED; in btm_dev_16_digit_authenticated()
216 if (p_dev_rec->sec_rec.classic_link == *state) { in is_sec_state_equal()
331 p_dev_rec->sec_rec.is_bond_type_temporary(); in access_secure_service_from_temp_bond()
540 p_dev_rec->sec_rec.security_required = BTM_SEC_NONE; in BTM_PINCodeReply()
545 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_AUTHED; in BTM_PINCodeReply()
546 p_dev_rec->sec_rec.pin_code_length = pin_len; in BTM_PINCodeReply()
548 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_16_DIGIT_PIN_AUTHED; in BTM_PINCodeReply()
581 p_dev_rec->sec_rec.sec_flags &= ~BTM_SEC_LINK_KEY_AUTHED; in BTM_PINCodeReply()
[all …]
Dbtm_ble_sec.cc108 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in BTM_SecAddBleDevice()
295 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BlePasskeyReply()
325 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleConfirmReply()
356 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleOobDataReply()
383 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleSecureConnectionOobDataReply()
852 *p_key_types = p_dev_rec->sec_rec.ble_keys.key_type; in btm_ble_get_enc_key_type()
873 if (p_dev_rec && p_dev_rec->sec_rec.ble_keys.div) { in btm_get_local_div()
875 *p_div = p_dev_rec->sec_rec.ble_keys.div; in btm_get_local_div()
907 p_rec->sec_rec.ble_keys.pltk = p_keys->penc_key.ltk; in btm_sec_save_le_key()
908 memcpy(p_rec->sec_rec.ble_keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key()
[all …]
Dbtm_dev.cc63 p_dev_rec->sec_rec.link_key.fill(0); in wipe_secrets_and_remove()
64 memset(&p_dev_rec->sec_rec.ble_keys, 0, sizeof(tBTM_SEC_BLE_KEYS)); in wipe_secrets_and_remove()
110 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in BTM_SecAddDevice()
126 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_KNOWN; in BTM_SecAddDevice()
127 p_dev_rec->sec_rec.link_key = link_key; in BTM_SecAddDevice()
128 p_dev_rec->sec_rec.link_key_type = key_type; in BTM_SecAddDevice()
129 p_dev_rec->sec_rec.pin_code_length = pin_length; in BTM_SecAddDevice()
131 p_dev_rec->sec_rec.bond_type = BOND_TYPE_PERSISTENT; in BTM_SecAddDevice()
137 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_16_DIGIT_PIN_AUTHED | BTM_SEC_LINK_KEY_AUTHED; in BTM_SecAddDevice()
140 p_dev_rec->sec_rec.rmt_io_caps = BTM_IO_CAP_OUT; in BTM_SecAddDevice()
[all …]
Dbtm_sec_cb.cc122 return &p_dev_rec->sec_rec; in getSecRec()
128 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsDeviceEncrypted() local
129 if (sec_rec) { in IsDeviceEncrypted()
131 return sec_rec->is_device_encrypted(); in IsDeviceEncrypted()
133 return sec_rec->is_le_device_encrypted(); in IsDeviceEncrypted()
144 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsLinkKeyAuthenticated() local
145 if (sec_rec) { in IsLinkKeyAuthenticated()
147 return sec_rec->is_link_key_authenticated(); in IsLinkKeyAuthenticated()
149 return sec_rec->is_le_link_key_authenticated(); in IsLinkKeyAuthenticated()
160 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsDeviceAuthenticated() local
[all …]
Dbtm_ble_addr.cc106 (p_dev_rec->sec_rec.ble_keys.key_type & BTM_LE_KEY_PID)) { in btm_ble_addr_resolvable()
107 if (rpa_matches_irk(rpa, p_dev_rec->sec_rec.ble_keys.irk)) { in btm_ble_addr_resolvable()
123 !(p_dev_rec->sec_rec.ble_keys.key_type & BTM_LE_KEY_PID)) { in btm_ble_match_random_bda()
128 if (rpa_matches_irk(*random_bda, p_dev_rec->sec_rec.ble_keys.irk)) { in btm_ble_match_random_bda()
Dbtm_ble_privacy.cc534 ARRAY_TO_STREAM(p, p_dev_rec->sec_rec.ble_keys.irk, OCTET16_LEN); in btm_ble_ble_unsupported_resolving_list_load_dev()
547 return dev_rec.sec_rec.ble_keys.key_type & BTM_LE_KEY_PID; in is_peer_identity_key_valid()
578 const Octet16& peer_irk = dev_rec.sec_rec.ble_keys.irk; in btm_ble_resolving_list_load_dev()
Dsecurity_device_record.h331 reinterpret_cast<char const*>(sec_bd_name), sec_rec.ToString()); in ToString()
372 tBTM_SEC_REC sec_rec; variable
Dbtm_devctl.cc138 p_dev_rec->sec_rec.le_link = tSECURITY_STATE::IDLE; in set_sec_state_idle()
139 p_dev_rec->sec_rec.classic_link = tSECURITY_STATE::IDLE; in set_sec_state_idle()
/packages/modules/Bluetooth/system/stack/test/btm/
Dstack_btm_sec_test.cc130 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F()
138 device_record->sec_rec.sec_flags); in TEST_F()
142 ASSERT_EQ(BTM_SEC_IN_USE | BTM_SEC_AUTHENTICATED, device_record->sec_rec.sec_flags); in TEST_F()
143 device_record->sec_rec.sec_flags = BTM_SEC_IN_USE; in TEST_F()
147 ASSERT_EQ(BTM_SEC_IN_USE | BTM_SEC_LE_ENCRYPTED, device_record->sec_rec.sec_flags); in TEST_F()
151 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F()
152 device_record->sec_rec.sec_flags = BTM_SEC_IN_USE; in TEST_F()
250 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F()
293 device_record->sec_rec.sec_flags |= BTM_SEC_AUTHENTICATED; in TEST_F()
294 device_record->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in TEST_F()
[all …]
/packages/modules/Bluetooth/system/stack/test/gatt/
Dgatt_api_test.cc32 dev->sec_rec.sec_flags |= BTM_SEC_LE_LINK_KEY_KNOWN; in make_bonded_ble_device()
35 dev->sec_rec.ble_keys.key_type = BTM_LE_KEY_PID | BTM_LE_KEY_PENC | BTM_LE_KEY_LENC; in make_bonded_ble_device()
41 dev->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_KNOWN; in make_bonded_dual_device()
/packages/modules/Bluetooth/system/stack/smp/
Dsmp_act.cc559 if (p_rec != NULL && p_rec->sec_rec.is_le_link_key_known() && in smp_proc_pair_cmd()
560 !p_rec->sec_rec.is_le_device_encrypted()) { in smp_proc_pair_cmd()
846 if (!p_dev_rec->sec_rec.new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_PERIPHERAL) { in smp_br_process_pairing_command()
888 p_dev_rec->sec_rec.new_encryption_key_is_p256 = false; in smp_br_process_pairing_command()
1363 if (!(p_dev_rec->sec_rec.sec_flags & BTM_SEC_LE_LINK_KEY_AUTHED) && in smp_key_distribution()
1364 (p_dev_rec->sec_rec.sec_flags & BTM_SEC_LINK_KEY_AUTHED)) { in smp_key_distribution()
Dsmp_l2c.cc280 (p_dev_rec && p_dev_rec->sec_rec.is_link_key_known()) && in smp_br_connect_callback()
Dsmp_keys.cc1011 std::reverse_copy(p_dev_rec->sec_rec.link_key.begin(), p_dev_rec->sec_rec.link_key.end(), in smp_calculate_long_term_key_from_link_key()
/packages/modules/Bluetooth/system/stack/rnr/
Dremote_name_request.cc63 return (p_dev_rec == nullptr) ? false : p_dev_rec->sec_rec.is_name_known(); in BTM_IsRemoteNameKnown()
/packages/modules/Bluetooth/system/stack/gatt/
Dgatt_api.cc1678 if (p_dev_rec->sec_rec.is_link_key_known()) { in gatt_load_bonded()
1682 if (p_dev_rec->sec_rec.is_le_link_key_known()) { in gatt_load_bonded()