/linux-6.3-rc2/net/bluetooth/rfcomm/ |
A D | sock.c | 250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init() 257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init() 261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init() 411 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect() 650 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old() 652 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old() 654 rfcomm_pi(sk)->sec_level = BT_SECURITY_HIGH; in rfcomm_sock_setsockopt_old() 707 rfcomm_pi(sk)->sec_level = sec.level; in rfcomm_sock_setsockopt() 755 switch (rfcomm_pi(sk)->sec_level) { in rfcomm_sock_getsockopt_old() 838 sec.level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_getsockopt()
|
A D | core.c | 70 u8 sec_level, 219 switch (d->sec_level) { in rfcomm_check_security() 232 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security() 295 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state() 388 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open() 765 u8 sec_level, in rfcomm_session_create() argument 793 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create() 2158 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm() 2162 } else if (d->sec_level == BT_SECURITY_HIGH || in rfcomm_security_cfm() 2163 d->sec_level == BT_SECURITY_FIPS) { in rfcomm_security_cfm() [all …]
|
/linux-6.3-rc2/net/bluetooth/ |
A D | hci_conn.c | 1333 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le() 1505 u8 dst_type, u8 sec_level, in hci_connect_le_scan() argument 1549 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan() 1562 u8 sec_level, u8 auth_type, in hci_connect_acl() argument 1585 acl->sec_level = BT_SECURITY_LOW; in hci_connect_acl() 2245 if (sec_level > conn->sec_level) in hci_conn_auth() 2298 if (sec_level == BT_SECURITY_SDP) in hci_conn_security() 2313 sec_level == BT_SECURITY_FIPS) in hci_conn_security() 2327 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW)) in hci_conn_security() 2335 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW || in hci_conn_security() [all …]
|
A D | smp.c | 635 switch (sec_level) { in seclevel_to_authreq() 1737 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1816 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req() 1818 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req() 2265 if (sec_level == BT_SECURITY_LOW) in smp_sufficient_security() 2279 if (hcon->sec_level >= sec_level) in smp_sufficient_security() 2292 u8 sec_level, auth; in smp_cmd_security_req() local 2308 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_security_req() 2322 hcon->pending_sec_level = sec_level; in smp_cmd_security_req() 2358 sec_level); in smp_conn_security() [all …]
|
A D | smp.h | 186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, 188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
|
A D | l2cap_sock.c | 145 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 150 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 153 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 513 switch (chan->sec_level) { in l2cap_sock_getsockopt_old() 605 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt() 610 sec.level = chan->sec_level; in l2cap_sock_getsockopt() 832 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old() 834 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old() 836 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old() 943 chan->sec_level = sec.level; in l2cap_sock_setsockopt() [all …]
|
A D | l2cap_core.c | 873 switch (chan->sec_level) { in l2cap_get_auth_type() 5608 int err, sec_level; in l2cap_le_connect_rsp() local 5664 sec_level = hcon->sec_level + 1; in l2cap_le_connect_rsp() 5665 if (chan->sec_level < sec_level) in l2cap_le_connect_rsp() 5666 chan->sec_level = sec_level; in l2cap_le_connect_rsp() 6116 int err = 0, sec_level; in l2cap_ecred_conn_rsp() local 6184 sec_level = hcon->sec_level + 1; in l2cap_ecred_conn_rsp() 6185 if (chan->sec_level < sec_level) in l2cap_ecred_conn_rsp() 6186 chan->sec_level = sec_level; in l2cap_ecred_conn_rsp() 7993 chan->sec_level, in l2cap_chan_connect() [all …]
|
A D | hci_event.c | 3496 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt() 3607 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt() 5165 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt() 5919 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
|
A D | mgmt.c | 3450 u8 sec_level, auth_type; in pair_device() local 3486 sec_level = BT_SECURITY_MEDIUM; in pair_device() 3490 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, in pair_device() 3511 sec_level, HCI_LE_CONN_TIMEOUT, in pair_device() 3563 hci_conn_security(conn, sec_level, auth_type, true)) { in pair_device()
|
/linux-6.3-rc2/include/net/bluetooth/ |
A D | rfcomm.h | 186 u8 sec_level; member 309 u8 sec_level; member
|
A D | hci_core.h | 708 __u8 sec_level; member 1315 u8 dst_type, u8 sec_level, 1319 u8 dst_type, bool dst_resolved, u8 sec_level, 1322 u8 sec_level, u8 auth_type, 1338 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level); 1339 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, 1844 if (conn->sec_level == BT_SECURITY_SDP) in hci_encrypt_cfm() 1845 conn->sec_level = BT_SECURITY_LOW; in hci_encrypt_cfm() 1847 if (conn->pending_sec_level > conn->sec_level) in hci_encrypt_cfm() 1848 conn->sec_level = conn->pending_sec_level; in hci_encrypt_cfm()
|
A D | l2cap.h | 565 __u8 sec_level; member
|
/linux-6.3-rc2/drivers/net/wireless/intel/ipw2x00/ |
A D | ipw2100.c | 5462 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local 5486 sec_level = SEC_LEVEL_0; in ipw2100_configure_security() 5488 sec_level = priv->ieee->sec.level; in ipw2100_configure_security() 5495 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()
|