Searched refs:sec_rec (Results 1 – 15 of 15) sorted by relevance
/packages/modules/Bluetooth/system/stack/btm/ |
D | btm_sec.cc | 182 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_AUTHENTICATED; in btm_dev_authenticated() 195 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_ENCRYPTED; in btm_dev_encrypted() 209 return p_dev_rec->sec_rec.sec_flags & BTM_SEC_16_DIGIT_PIN_AUTHED; in btm_dev_16_digit_authenticated() 216 if (p_dev_rec->sec_rec.classic_link == *state) { in is_sec_state_equal() 331 p_dev_rec->sec_rec.is_bond_type_temporary(); in access_secure_service_from_temp_bond() 540 p_dev_rec->sec_rec.security_required = BTM_SEC_NONE; in BTM_PINCodeReply() 545 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_AUTHED; in BTM_PINCodeReply() 546 p_dev_rec->sec_rec.pin_code_length = pin_len; in BTM_PINCodeReply() 548 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_16_DIGIT_PIN_AUTHED; in BTM_PINCodeReply() 581 p_dev_rec->sec_rec.sec_flags &= ~BTM_SEC_LINK_KEY_AUTHED; in BTM_PINCodeReply() [all …]
|
D | btm_ble_sec.cc | 108 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in BTM_SecAddBleDevice() 295 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BlePasskeyReply() 325 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleConfirmReply() 356 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleOobDataReply() 383 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LE_AUTHENTICATED; in BTM_BleSecureConnectionOobDataReply() 852 *p_key_types = p_dev_rec->sec_rec.ble_keys.key_type; in btm_ble_get_enc_key_type() 873 if (p_dev_rec && p_dev_rec->sec_rec.ble_keys.div) { in btm_get_local_div() 875 *p_div = p_dev_rec->sec_rec.ble_keys.div; in btm_get_local_div() 907 p_rec->sec_rec.ble_keys.pltk = p_keys->penc_key.ltk; in btm_sec_save_le_key() 908 memcpy(p_rec->sec_rec.ble_keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key() [all …]
|
D | btm_dev.cc | 63 p_dev_rec->sec_rec.link_key.fill(0); in wipe_secrets_and_remove() 64 memset(&p_dev_rec->sec_rec.ble_keys, 0, sizeof(tBTM_SEC_BLE_KEYS)); in wipe_secrets_and_remove() 110 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in BTM_SecAddDevice() 126 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_KNOWN; in BTM_SecAddDevice() 127 p_dev_rec->sec_rec.link_key = link_key; in BTM_SecAddDevice() 128 p_dev_rec->sec_rec.link_key_type = key_type; in BTM_SecAddDevice() 129 p_dev_rec->sec_rec.pin_code_length = pin_length; in BTM_SecAddDevice() 131 p_dev_rec->sec_rec.bond_type = BOND_TYPE_PERSISTENT; in BTM_SecAddDevice() 137 p_dev_rec->sec_rec.sec_flags |= BTM_SEC_16_DIGIT_PIN_AUTHED | BTM_SEC_LINK_KEY_AUTHED; in BTM_SecAddDevice() 140 p_dev_rec->sec_rec.rmt_io_caps = BTM_IO_CAP_OUT; in BTM_SecAddDevice() [all …]
|
D | btm_sec_cb.cc | 122 return &p_dev_rec->sec_rec; in getSecRec() 128 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsDeviceEncrypted() local 129 if (sec_rec) { in IsDeviceEncrypted() 131 return sec_rec->is_device_encrypted(); in IsDeviceEncrypted() 133 return sec_rec->is_le_device_encrypted(); in IsDeviceEncrypted() 144 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsLinkKeyAuthenticated() local 145 if (sec_rec) { in IsLinkKeyAuthenticated() 147 return sec_rec->is_link_key_authenticated(); in IsLinkKeyAuthenticated() 149 return sec_rec->is_le_link_key_authenticated(); in IsLinkKeyAuthenticated() 160 tBTM_SEC_REC* sec_rec = getSecRec(bd_addr); in IsDeviceAuthenticated() local [all …]
|
D | btm_ble_addr.cc | 106 (p_dev_rec->sec_rec.ble_keys.key_type & BTM_LE_KEY_PID)) { in btm_ble_addr_resolvable() 107 if (rpa_matches_irk(rpa, p_dev_rec->sec_rec.ble_keys.irk)) { in btm_ble_addr_resolvable() 123 !(p_dev_rec->sec_rec.ble_keys.key_type & BTM_LE_KEY_PID)) { in btm_ble_match_random_bda() 128 if (rpa_matches_irk(*random_bda, p_dev_rec->sec_rec.ble_keys.irk)) { in btm_ble_match_random_bda()
|
D | btm_ble_privacy.cc | 534 ARRAY_TO_STREAM(p, p_dev_rec->sec_rec.ble_keys.irk, OCTET16_LEN); in btm_ble_ble_unsupported_resolving_list_load_dev() 547 return dev_rec.sec_rec.ble_keys.key_type & BTM_LE_KEY_PID; in is_peer_identity_key_valid() 578 const Octet16& peer_irk = dev_rec.sec_rec.ble_keys.irk; in btm_ble_resolving_list_load_dev()
|
D | security_device_record.h | 331 reinterpret_cast<char const*>(sec_bd_name), sec_rec.ToString()); in ToString() 372 tBTM_SEC_REC sec_rec; variable
|
D | btm_devctl.cc | 138 p_dev_rec->sec_rec.le_link = tSECURITY_STATE::IDLE; in set_sec_state_idle() 139 p_dev_rec->sec_rec.classic_link = tSECURITY_STATE::IDLE; in set_sec_state_idle()
|
/packages/modules/Bluetooth/system/stack/test/btm/ |
D | stack_btm_sec_test.cc | 130 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F() 138 device_record->sec_rec.sec_flags); in TEST_F() 142 ASSERT_EQ(BTM_SEC_IN_USE | BTM_SEC_AUTHENTICATED, device_record->sec_rec.sec_flags); in TEST_F() 143 device_record->sec_rec.sec_flags = BTM_SEC_IN_USE; in TEST_F() 147 ASSERT_EQ(BTM_SEC_IN_USE | BTM_SEC_LE_ENCRYPTED, device_record->sec_rec.sec_flags); in TEST_F() 151 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F() 152 device_record->sec_rec.sec_flags = BTM_SEC_IN_USE; in TEST_F() 250 ASSERT_EQ(BTM_SEC_IN_USE, device_record->sec_rec.sec_flags); in TEST_F() 293 device_record->sec_rec.sec_flags |= BTM_SEC_AUTHENTICATED; in TEST_F() 294 device_record->sec_rec.sec_flags |= BTM_SEC_NAME_KNOWN; in TEST_F() [all …]
|
/packages/modules/Bluetooth/system/stack/test/gatt/ |
D | gatt_api_test.cc | 32 dev->sec_rec.sec_flags |= BTM_SEC_LE_LINK_KEY_KNOWN; in make_bonded_ble_device() 35 dev->sec_rec.ble_keys.key_type = BTM_LE_KEY_PID | BTM_LE_KEY_PENC | BTM_LE_KEY_LENC; in make_bonded_ble_device() 41 dev->sec_rec.sec_flags |= BTM_SEC_LINK_KEY_KNOWN; in make_bonded_dual_device()
|
/packages/modules/Bluetooth/system/stack/smp/ |
D | smp_act.cc | 559 if (p_rec != NULL && p_rec->sec_rec.is_le_link_key_known() && in smp_proc_pair_cmd() 560 !p_rec->sec_rec.is_le_device_encrypted()) { in smp_proc_pair_cmd() 846 if (!p_dev_rec->sec_rec.new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_PERIPHERAL) { in smp_br_process_pairing_command() 888 p_dev_rec->sec_rec.new_encryption_key_is_p256 = false; in smp_br_process_pairing_command() 1363 if (!(p_dev_rec->sec_rec.sec_flags & BTM_SEC_LE_LINK_KEY_AUTHED) && in smp_key_distribution() 1364 (p_dev_rec->sec_rec.sec_flags & BTM_SEC_LINK_KEY_AUTHED)) { in smp_key_distribution()
|
D | smp_l2c.cc | 280 (p_dev_rec && p_dev_rec->sec_rec.is_link_key_known()) && in smp_br_connect_callback()
|
D | smp_keys.cc | 1011 std::reverse_copy(p_dev_rec->sec_rec.link_key.begin(), p_dev_rec->sec_rec.link_key.end(), in smp_calculate_long_term_key_from_link_key()
|
/packages/modules/Bluetooth/system/stack/rnr/ |
D | remote_name_request.cc | 63 return (p_dev_rec == nullptr) ? false : p_dev_rec->sec_rec.is_name_known(); in BTM_IsRemoteNameKnown()
|
/packages/modules/Bluetooth/system/stack/gatt/ |
D | gatt_api.cc | 1678 if (p_dev_rec->sec_rec.is_link_key_known()) { in gatt_load_bonded() 1682 if (p_dev_rec->sec_rec.is_le_link_key_known()) { in gatt_load_bonded()
|