| /linux/net/bluetooth/rfcomm/ |
| H A D | sock.c | 250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init() 257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init() 261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init() 405 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect() 643 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old() 645 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old() 647 rfcomm_pi(sk)->sec_level in rfcomm_sock_setsockopt_old() [all...] |
| H A D | core.c | 70 u8 sec_level, 219 switch (d->sec_level) { in rfcomm_check_security() 232 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security() 295 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state() 388 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open() 765 u8 sec_level, in rfcomm_session_create() argument 793 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create() 2159 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm() 2163 } else if (d->sec_level in rfcomm_security_cfm() [all...] |
| /linux/net/bluetooth/ |
| H A D | hci_conn.c | 1371 u8 dst_type, bool dst_resolved, u8 sec_level, in hci_connect_le() argument 1429 conn->pending_sec_level = sec_level; in hci_connect_le() 1432 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le() 1615 u8 dst_type, u8 sec_level, in hci_connect_le_scan() argument 1640 if (conn->pending_sec_level < sec_level) in hci_connect_le_scan() 1641 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1659 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan() 1660 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1672 u8 sec_level, u8 auth_type, in hci_connect_acl() argument 1707 acl->sec_level = BT_SECURITY_LOW; in hci_connect_acl() [all …]
|
| H A D | smp.c | 634 static __u8 seclevel_to_authreq(__u8 sec_level) in seclevel_to_authreq() argument 636 switch (sec_level) { in seclevel_to_authreq() 1111 else if (hcon->sec_level == BT_SECURITY_FIPS) in smp_notify_keys() 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1349 if (hcon->sec_level > BT_SECURITY_MEDIUM) in smp_distribute_keys() 1745 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1822 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req() 1824 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req() 1826 if (sec_level > conn->hcon->pending_sec_level) in smp_cmd_pairing_req() 1827 conn->hcon->pending_sec_level = sec_level; in smp_cmd_pairing_req() [all …]
|
| H A D | smp.h | 187 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, 189 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
|
| H A D | l2cap_sock.c | 146 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 151 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 154 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 497 switch (chan->sec_level) { in l2cap_sock_getsockopt_old() 589 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt() 594 sec.level = chan->sec_level; in l2cap_sock_getsockopt() 814 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old() 816 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old() 818 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old() 923 chan->sec_level in l2cap_sock_setsockopt() [all...] |
| H A D | l2cap_core.c | 426 chan->sec_level != BT_SECURITY_SDP) in l2cap_chan_timeout() 529 chan->sec_level = BT_SECURITY_LOW; in l2cap_chan_set_defaults() 864 switch (chan->sec_level) { in l2cap_get_auth_type() 876 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 877 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 879 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type() 880 chan->sec_level == BT_SECURITY_FIPS) in l2cap_get_auth_type() 887 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 888 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 890 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type() [all …]
|
| H A D | hci_event.c | 3474 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt() 3581 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt() 5182 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt() 5801 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
|
| H A D | mgmt.c | 3597 u8 sec_level, auth_type; in pair_device() local 3633 sec_level = BT_SECURITY_MEDIUM; in pair_device() 3637 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, in pair_device() 3663 sec_level, HCI_LE_CONN_TIMEOUT, in pair_device() 3715 hci_conn_security(conn, sec_level, auth_type, true)) { in pair_device()
|
| /linux/include/net/bluetooth/ |
| H A D | rfcomm.h | 186 u8 sec_level; member 309 u8 sec_level; member
|
| H A D | hci_core.h | 710 __u8 sec_level; member 1587 u8 dst_type, u8 sec_level, 1591 u8 dst_type, bool dst_resolved, u8 sec_level, 1595 u8 sec_level, u8 auth_type, 1620 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level); 1621 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, 2197 if (conn->sec_level == BT_SECURITY_SDP) in hci_encrypt_cfm() 2198 conn->sec_level = BT_SECURITY_LOW; in hci_encrypt_cfm() 2200 if (conn->pending_sec_level > conn->sec_level) in hci_encrypt_cfm() 2201 conn->sec_level = conn->pending_sec_level; in hci_encrypt_cfm()
|
| H A D | l2cap.h | 535 __u8 sec_level; member
|