Home
last modified time | relevance | path

Searched refs:sec_level (Results 1 – 13 of 13) sorted by relevance

/linux/net/bluetooth/
A Dhci_conn.c1240 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le()
1365 u8 dst_type, u8 sec_level, in hci_connect_le_scan() argument
1409 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan()
1422 u8 sec_level, u8 auth_type, in hci_connect_acl() argument
1445 acl->sec_level = BT_SECURITY_LOW; in hci_connect_acl()
1547 if (sec_level > conn->sec_level) in hci_conn_auth()
1600 if (sec_level == BT_SECURITY_SDP) in hci_conn_security()
1615 sec_level == BT_SECURITY_FIPS) in hci_conn_security()
1629 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW)) in hci_conn_security()
1637 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW || in hci_conn_security()
[all …]
A Dsmp.c635 switch (sec_level) { in seclevel_to_authreq()
1737 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local
1816 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req()
1818 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req()
2265 if (sec_level == BT_SECURITY_LOW) in smp_sufficient_security()
2279 if (hcon->sec_level >= sec_level) in smp_sufficient_security()
2292 u8 sec_level, auth; in smp_cmd_security_req() local
2308 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_security_req()
2322 hcon->pending_sec_level = sec_level; in smp_cmd_security_req()
2358 sec_level); in smp_conn_security()
[all …]
A Dsmp.h186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level,
188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
A Dl2cap_sock.c144 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
149 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
152 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
485 switch (chan->sec_level) { in l2cap_sock_getsockopt_old()
577 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt()
582 sec.level = chan->sec_level; in l2cap_sock_getsockopt()
804 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old()
806 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old()
808 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old()
913 chan->sec_level = sec.level; in l2cap_sock_setsockopt()
[all …]
A Dl2cap_core.c844 switch (chan->sec_level) { in l2cap_get_auth_type()
5588 int err, sec_level; in l2cap_le_connect_rsp() local
5644 sec_level = hcon->sec_level + 1; in l2cap_le_connect_rsp()
5645 if (chan->sec_level < sec_level) in l2cap_le_connect_rsp()
5646 chan->sec_level = sec_level; in l2cap_le_connect_rsp()
6070 int err = 0, sec_level; in l2cap_ecred_conn_rsp() local
6138 sec_level = hcon->sec_level + 1; in l2cap_ecred_conn_rsp()
6139 if (chan->sec_level < sec_level) in l2cap_ecred_conn_rsp()
6140 chan->sec_level = sec_level; in l2cap_ecred_conn_rsp()
7911 chan->sec_level, in l2cap_chan_connect()
[all …]
A Dhci_event.c3040 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt()
3190 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt()
4635 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt()
5361 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
A Dmgmt.c2914 u8 sec_level, auth_type; in pair_device() local
2950 sec_level = BT_SECURITY_MEDIUM; in pair_device()
2954 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, in pair_device()
2975 sec_level, HCI_LE_CONN_TIMEOUT, in pair_device()
3027 hci_conn_security(conn, sec_level, auth_type, true)) { in pair_device()
/linux/net/bluetooth/rfcomm/
A Dsock.c250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init()
257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init()
261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init()
410 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect()
645 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old()
647 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old()
649 rfcomm_pi(sk)->sec_level = BT_SECURITY_HIGH; in rfcomm_sock_setsockopt_old()
702 rfcomm_pi(sk)->sec_level = sec.level; in rfcomm_sock_setsockopt()
750 switch (rfcomm_pi(sk)->sec_level) { in rfcomm_sock_getsockopt_old()
833 sec.level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_getsockopt()
A Dcore.c68 u8 sec_level,
215 switch (d->sec_level) { in rfcomm_check_security()
228 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security()
291 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state()
384 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open()
761 u8 sec_level, in rfcomm_session_create() argument
789 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create()
2154 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm()
2158 } else if (d->sec_level == BT_SECURITY_HIGH || in rfcomm_security_cfm()
2159 d->sec_level == BT_SECURITY_FIPS) { in rfcomm_security_cfm()
[all …]
/linux/include/net/bluetooth/
A Dhci_core.h663 __u8 sec_level; member
1117 u8 dst_type, u8 sec_level,
1121 u8 dst_type, bool dst_resolved, u8 sec_level,
1125 u8 sec_level, u8 auth_type,
1130 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level);
1131 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type,
1594 if (conn->sec_level == BT_SECURITY_SDP) in hci_encrypt_cfm()
1595 conn->sec_level = BT_SECURITY_LOW; in hci_encrypt_cfm()
1597 if (conn->pending_sec_level > conn->sec_level) in hci_encrypt_cfm()
1598 conn->sec_level = conn->pending_sec_level; in hci_encrypt_cfm()
A Drfcomm.h186 u8 sec_level; member
309 u8 sec_level; member
A Dl2cap.h565 __u8 sec_level; member
/linux/drivers/net/wireless/intel/ipw2x00/
A Dipw2100.c5473 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local
5497 sec_level = SEC_LEVEL_0; in ipw2100_configure_security()
5499 sec_level = priv->ieee->sec.level; in ipw2100_configure_security()
5506 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()

Completed in 94 milliseconds