/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/ |
D | gatt_auth.c | 170 UINT8 sec_flag; in gatt_enc_cmpl_cback() local 184 BTM_GetSecurityFlagsByTransport(bd_addr, &sec_flag, transport); in gatt_enc_cmpl_cback() 186 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_enc_cmpl_cback() 301 UINT8 sec_flag; in gatt_determine_sec_act() local 315 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_clcb->p_tcb->transport); in gatt_determine_sec_act() 328 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED | BTM_SEC_FLAG_LKEY_KNOWN)) { in gatt_determine_sec_act() 329 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in gatt_determine_sec_act() 335 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in gatt_determine_sec_act() 408 UINT8 sec_flag = 0; in gatt_get_link_encrypt_status() local 410 BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_tcb->transport); in gatt_get_link_encrypt_status() [all …]
|
D | gatt_db.c | 123 tGATT_SEC_FLAG sec_flag, in gatts_check_attr_readability() argument 140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && in gatts_check_attr_readability() 141 !(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability() 146 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) { in gatts_check_attr_readability() 151 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { in gatts_check_attr_readability() 156 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 161 …if ((perm & GATT_READ_AUTHORIZATION) && (!(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED) || !(sec_flag & G… in gatts_check_attr_readability() 211 tGATT_SEC_FLAG sec_flag, in read_attr_value() argument 222 sec_flag, in read_attr_value() 226 …status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_siz… in read_attr_value() [all …]
|
D | gatt_sr.c | 596 UINT8 sec_flag, key_size; in gatt_process_read_multi_req() local 604 &sec_flag, in gatt_process_read_multi_req() 629 sec_flag, in gatt_process_read_multi_req() 674 sec_flag, in gatt_process_read_multi_req() 1123 UINT8 sec_flag, key_size; in gatts_process_read_by_type_req() local 1164 &sec_flag, in gatts_process_read_by_type_req() 1175 sec_flag, in gatts_process_read_by_type_req() 1229 UINT8 sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 1255 &sec_flag, in gatts_process_write_req() 1264 sec_flag, in gatts_process_write_req() [all …]
|
D | gatt_utils.c | 1501 UINT8 sec_flag = 0; in gatt_sr_get_sec_info() local 1503 BTM_GetSecurityFlagsByTransport(rem_bda, &sec_flag, transport); in gatt_sr_get_sec_info() 1505 …sec_flag &= (GATT_SEC_FLAG_LKEY_UNAUTHED | GATT_SEC_FLAG_LKEY_AUTHED | GATT_SEC_FLAG_ENCRYPTED | G… in gatt_sr_get_sec_info() 1509 *p_sec_flag = sec_flag; in gatt_sr_get_sec_info()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/hh/ |
D | bta_hh_le.c | 1324 UINT8 sec_flag = 0; in bta_hh_start_security() local 1339 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_start_security() 1342 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in bta_hh_start_security() 1346 else if (sec_flag & BTM_SEC_FLAG_LKEY_KNOWN) { in bta_hh_start_security() 1347 sec_flag = BTM_BLE_SEC_ENCRYPT; in bta_hh_start_security() 1349 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security() 1353 sec_flag = BTM_BLE_SEC_ENCRYPT_NO_MITM; in bta_hh_start_security() 1356 BTM_SetEncryption(p_cb->addr, BTA_TRANSPORT_LE, bta_hh_le_encrypt_cback, &sec_flag); in bta_hh_start_security() 2589 UINT8 sec_flag = 0; in bta_hh_le_add_dev_bg_conn() local 2595 BTM_GetSecurityFlagsByTransport(p_cb->addr, &sec_flag, BT_TRANSPORT_LE); in bta_hh_le_add_dev_bg_conn() [all …]
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/gatt/include/ |
D | gatt_int.h | 764 …UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 tra… 766 …UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_i… 771 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 772 …check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/ |
D | btm_ble.c | 1017 UINT8 sec_flag = 0; in btm_ble_determine_security_act() local 1018 BTM_GetSecurityFlagsByTransport(bdaddr, &sec_flag, BT_TRANSPORT_LE); in btm_ble_determine_security_act() 1022 if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED| BTM_SEC_FLAG_LKEY_KNOWN)) in btm_ble_determine_security_act() 1024 if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) { in btm_ble_determine_security_act() 1028 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in btm_ble_determine_security_act()
|
D | btm_sec.c | 6354 UINT8 sec_flag = 0; in btm_sec_dev_authorization() local 6357 sec_flag = (UINT8)(p_dev_rec->sec_flags >> 8); in btm_sec_dev_authorization() 6358 if (!(sec_flag & BTM_SEC_LINK_KEY_AUTHED)) { in btm_sec_dev_authorization()
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/l2cap/ |
D | l2c_ble.c | 1577 UINT8 sec_flag; in l2cble_sec_comp() local 1607 BTM_GetSecurityFlagsByTransport(p_bda, &sec_flag, transport); in l2cble_sec_comp() 1608 if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) { in l2cble_sec_comp()
|