Home
last modified time | relevance | path

Searched refs:required_sec_level (Results 1 – 21 of 21) sorted by relevance

/Zephyr-latest/include/zephyr/bluetooth/
Dl2cap.h248 bt_security_t required_sec_level; member
298 bt_security_t required_sec_level; member
Diso.h207 bt_security_t required_sec_level; member
/Zephyr-latest/include/zephyr/bluetooth/classic/
Drfcomm.h113 bt_security_t required_sec_level; member
/Zephyr-latest/subsys/bluetooth/host/classic/
Dssp.c103 if (conn->required_sec_level == BT_SECURITY_L3 && len < 16) { in bt_conn_auth_pincode_entry()
125 if (conn->required_sec_level == BT_SECURITY_L3) { in pin_code_req()
267 if (conn->required_sec_level > BT_SECURITY_L2 && in ssp_auth()
372 conn->required_sec_level > BT_SECURITY_L2) { in bt_ssp_start_security()
599 conn->required_sec_level > BT_SECURITY_L2) { in bt_hci_link_key_req()
717 if (conn->required_sec_level < BT_SECURITY_L3) { in bt_hci_io_capa_req()
Dl2cap_br.c792 if (br_chan->required_sec_level == BT_SECURITY_L0) { in l2cap_br_conn_security()
800 if (br_chan->required_sec_level == BT_SECURITY_L1 && in l2cap_br_conn_security()
805 switch (br_chan->required_sec_level) { in l2cap_br_conn_security()
818 br_chan->required_sec_level = BT_SECURITY_L2; in l2cap_br_conn_security()
823 if (chan->conn->sec_level < br_chan->required_sec_level && in l2cap_br_conn_security()
835 check = bt_conn_set_security(chan->conn, br_chan->required_sec_level); in l2cap_br_conn_security()
844 chan->conn->sec_level >= br_chan->required_sec_level) { in l2cap_br_conn_security()
1092 br_chan->required_sec_level = server->sec_level; in l2cap_br_conn_req()
1806 if (br_chan->required_sec_level > BT_SECURITY_L4) { in bt_l2cap_br_chan_connect()
1808 } else if (br_chan->required_sec_level == BT_SECURITY_L0 && in bt_l2cap_br_chan_connect()
[all …]
Davctp.c150 session->br_chan.required_sec_level = BT_SECURITY_L2; in bt_avctp_connect()
Drfcomm.c843 if (conn->sec_level >= dlc->required_sec_level) { in rfcomm_dlc_security()
847 if (!bt_conn_set_security(conn, dlc->required_sec_level)) { in rfcomm_dlc_security()
1607 conn->sec_level < dlc->required_sec_level) { in rfcomm_encrypt_change()
1725 BR_CHAN(chan)->required_sec_level = dlc->required_sec_level; in bt_rfcomm_dlc_connect()
Davdtp.c212 sep->chan.required_sec_level = BT_SECURITY_L2; in avdtp_media_connect()
1261 session->br_chan.required_sec_level = BT_SECURITY_L2; in bt_avdtp_connect()
1313 session->current_sep->chan.required_sec_level = BT_SECURITY_L2; in bt_avdtp_l2cap_accept()
Dbr.c177 if (conn->required_sec_level > conn->sec_level) { in bt_br_update_sec_level()
/Zephyr-latest/tests/bsim/bluetooth/host/iso/cis/src/
Dcis_peripheral.c133 iso_chan.required_sec_level = BT_SECURITY_L2, in init()
Dcis_central.c178 iso_chans[i].required_sec_level = BT_SECURITY_L2; in init()
/Zephyr-latest/samples/bluetooth/iso_central/src/
Dmain.c257 iso_chan.required_sec_level = BT_SECURITY_L2, in main()
/Zephyr-latest/subsys/bluetooth/host/shell/
Dl2cap.c350 l2ch_chan.ch.required_sec_level = sec; in cmd_ecred_connect()
386 l2ch_chan.ch.required_sec_level = sec; in cmd_connect()
Diso.c455 iso_chan.required_sec_level = *argv[1] - '0'; in cmd_connect()
/Zephyr-latest/subsys/bluetooth/host/
Dconn_internal.h226 bt_security_t required_sec_level; member
Dl2cap.c1391 le_chan->required_sec_level = server->sec_level; in l2cap_chan_accept()
2859 if (conn->sec_level < ch->required_sec_level) { in l2cap_le_connect()
2860 err = bt_conn_set_security(conn, ch->required_sec_level); in l2cap_le_connect()
3156 if (le_chan->required_sec_level > BT_SECURITY_L4) { in bt_l2cap_chan_connect()
3158 } else if (le_chan->required_sec_level == BT_SECURITY_L0) { in bt_l2cap_chan_connect()
3159 le_chan->required_sec_level = BT_SECURITY_L1; in bt_l2cap_chan_connect()
Dconn.c2634 conn->required_sec_level = conn->sec_level; in reset_pairing()
2715 if (!force_pair && (conn->sec_level >= sec || conn->required_sec_level >= sec)) { in bt_conn_set_security()
2720 conn->required_sec_level = sec; in bt_conn_set_security()
2726 conn->required_sec_level = conn->sec_level; in bt_conn_set_security()
2805 conn->required_sec_level = BT_SECURITY_L1; in bt_conn_add_le()
Dsmp.c402 if (conn->required_sec_level >= BT_SECURITY_L3 && in smp_keys_check()
407 if (conn->required_sec_level >= BT_SECURITY_L4 && in smp_keys_check()
1850 if (conn->state == BT_CONN_CONNECTED && conn->sec_level != conn->required_sec_level) { in smp_pairing_complete()
2726 (conn->required_sec_level < BT_SECURITY_L3))) { in get_auth()
2753 bt_security_t sec = smp->chan.chan.conn->required_sec_level; in remote_sec_level_reachable()
2791 switch (smp->chan.chan.conn->required_sec_level) { in sec_level_reachable()
Diso.c1422 chan->required_sec_level = iso_server->sec_level; in iso_accept()
2518 if (acl->sec_level < iso_chan->required_sec_level) { in iso_chan_connect_security()
2522 err = bt_conn_set_security(acl, iso_chan->required_sec_level); in iso_chan_connect_security()
Dhci_core.c2144 return !(conn->required_sec_level > conn->sec_level); in update_sec_level()
/Zephyr-latest/tests/bsim/bluetooth/ll/cis/src/
Dmain.c393 iso_chan[i].required_sec_level = BT_SECURITY_L2,