Home
last modified time | relevance | path

Searched refs:required_sec_level (Results 1 – 21 of 21) sorted by relevance

/Zephyr-latest/include/zephyr/bluetooth/classic/
Drfcomm.h96 bt_security_t required_sec_level; member
/Zephyr-latest/include/zephyr/bluetooth/
Dl2cap.h248 bt_security_t required_sec_level; member
298 bt_security_t required_sec_level; member
Diso.h207 bt_security_t required_sec_level; member
/Zephyr-latest/subsys/bluetooth/host/classic/
Dssp.c99 if (conn->required_sec_level == BT_SECURITY_L3 && len < 16) { in bt_conn_auth_pincode_entry()
121 if (conn->required_sec_level == BT_SECURITY_L3) { in pin_code_req()
254 if (conn->required_sec_level > BT_SECURITY_L2 && in ssp_auth()
359 conn->required_sec_level > BT_SECURITY_L2) { in bt_ssp_start_security()
586 conn->required_sec_level > BT_SECURITY_L2) { in bt_hci_link_key_req()
712 if (conn->required_sec_level < BT_SECURITY_L3) { in bt_hci_io_capa_req()
Dl2cap_br.c777 if (br_chan->required_sec_level == BT_SECURITY_L0) { in l2cap_br_conn_security()
785 if (br_chan->required_sec_level == BT_SECURITY_L1 && in l2cap_br_conn_security()
790 switch (br_chan->required_sec_level) { in l2cap_br_conn_security()
803 br_chan->required_sec_level = BT_SECURITY_L2; in l2cap_br_conn_security()
808 check = bt_conn_set_security(chan->conn, br_chan->required_sec_level); in l2cap_br_conn_security()
817 chan->conn->sec_level >= br_chan->required_sec_level) { in l2cap_br_conn_security()
1048 br_chan->required_sec_level = server->sec_level; in l2cap_br_conn_req()
1692 if (br_chan->required_sec_level > BT_SECURITY_L4) { in bt_l2cap_br_chan_connect()
1694 } else if (br_chan->required_sec_level == BT_SECURITY_L0 && in bt_l2cap_br_chan_connect()
1696 br_chan->required_sec_level = BT_SECURITY_L1; in bt_l2cap_br_chan_connect()
Davctp.c143 session->br_chan.required_sec_level = BT_SECURITY_L2; in bt_avctp_connect()
Drfcomm.c826 if (conn->sec_level >= dlc->required_sec_level) { in rfcomm_dlc_security()
830 if (!bt_conn_set_security(conn, dlc->required_sec_level)) { in rfcomm_dlc_security()
1590 conn->sec_level < dlc->required_sec_level) { in rfcomm_encrypt_change()
1708 BR_CHAN(chan)->required_sec_level = dlc->required_sec_level; in bt_rfcomm_dlc_connect()
Davdtp.c207 sep->chan.required_sec_level = BT_SECURITY_L2; in avdtp_media_connect()
1179 session->br_chan.required_sec_level = BT_SECURITY_L2; in bt_avdtp_connect()
1229 session->current_sep->chan.required_sec_level = BT_SECURITY_L2; in bt_avdtp_l2cap_accept()
Dbr.c175 if (conn->required_sec_level > conn->sec_level) { in bt_br_update_sec_level()
/Zephyr-latest/tests/bsim/bluetooth/host/iso/cis/src/
Dcis_peripheral.c131 iso_chan.required_sec_level = BT_SECURITY_L2, in init()
Dcis_central.c176 iso_chans[i].required_sec_level = BT_SECURITY_L2; in init()
/Zephyr-latest/samples/bluetooth/iso_central/src/
Dmain.c257 iso_chan.required_sec_level = BT_SECURITY_L2, in main()
/Zephyr-latest/subsys/bluetooth/host/shell/
Dl2cap.c350 l2ch_chan.ch.required_sec_level = sec; in cmd_ecred_connect()
386 l2ch_chan.ch.required_sec_level = sec; in cmd_connect()
Diso.c454 iso_chan.required_sec_level = *argv[1] - '0'; in cmd_connect()
/Zephyr-latest/subsys/bluetooth/host/
Dconn_internal.h226 bt_security_t required_sec_level; member
Dl2cap.c1386 le_chan->required_sec_level = server->sec_level; in l2cap_chan_accept()
2854 if (conn->sec_level < ch->required_sec_level) { in l2cap_le_connect()
2855 err = bt_conn_set_security(conn, ch->required_sec_level); in l2cap_le_connect()
3151 if (le_chan->required_sec_level > BT_SECURITY_L4) { in bt_l2cap_chan_connect()
3153 } else if (le_chan->required_sec_level == BT_SECURITY_L0) { in bt_l2cap_chan_connect()
3154 le_chan->required_sec_level = BT_SECURITY_L1; in bt_l2cap_chan_connect()
Dconn.c2622 conn->required_sec_level = conn->sec_level; in reset_pairing()
2698 if (!force_pair && (conn->sec_level >= sec || conn->required_sec_level >= sec)) { in bt_conn_set_security()
2703 conn->required_sec_level = sec; in bt_conn_set_security()
2709 conn->required_sec_level = conn->sec_level; in bt_conn_set_security()
2783 conn->required_sec_level = BT_SECURITY_L1; in bt_conn_add_le()
Dsmp.c396 if (conn->required_sec_level >= BT_SECURITY_L3 && in smp_keys_check()
401 if (conn->required_sec_level >= BT_SECURITY_L4 && in smp_keys_check()
1813 if (conn->state == BT_CONN_CONNECTED && conn->sec_level != conn->required_sec_level) { in smp_pairing_complete()
2689 (conn->required_sec_level < BT_SECURITY_L3))) { in get_auth()
2716 bt_security_t sec = smp->chan.chan.conn->required_sec_level; in remote_sec_level_reachable()
2754 switch (smp->chan.chan.conn->required_sec_level) { in sec_level_reachable()
Diso.c1422 chan->required_sec_level = iso_server->sec_level; in iso_accept()
2518 if (acl->sec_level < iso_chan->required_sec_level) { in iso_chan_connect_security()
2522 err = bt_conn_set_security(acl, iso_chan->required_sec_level); in iso_chan_connect_security()
Dhci_core.c2138 return !(conn->required_sec_level > conn->sec_level); in update_sec_level()
/Zephyr-latest/tests/bsim/bluetooth/ll/cis/src/
Dmain.c393 iso_chan[i].required_sec_level = BT_SECURITY_L2,