Lines Matching defs:key

3027 		bt_dev_err(hdev, "invalid read key size response");
3041 * secure approach is to then assume the key size is 0 to force a
3045 bt_dev_err(hdev, "failed to read key size for handle %u",
3078 /* P-256 authentication key implies FIPS */
3118 /* Try reading the encryption key size for encrypted ACL links */
3138 bt_dev_err(hdev, "sending read key size failed");
4003 struct link_key *key;
4012 key = hci_find_link_key(hdev, &ev->bdaddr);
4013 if (!key) {
4014 BT_DBG("%s link key not found for %pMR", hdev->name,
4019 BT_DBG("%s found key type %u for %pMR", hdev->name, key->type,
4026 if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 ||
4027 key->type == HCI_LK_UNAUTH_COMBINATION_P256) &&
4029 BT_DBG("%s ignoring unauthenticated key", hdev->name);
4033 if (key->type == HCI_LK_COMBINATION && key->pin_len < 16 &&
4036 BT_DBG("%s ignoring key unauthenticated for high security",
4041 conn_set_key(conn, key->type, key->pin_len);
4045 memcpy(cp.link_key, key->val, HCI_LINK_KEY_SIZE);
4062 struct link_key *key;
4074 /* Ignore NULL link key against CVE-2020-26555 */
4076 bt_dev_dbg(hdev, "Ignore NULL link key (ZERO KEY) for %pMR",
4093 key = hci_add_link_key(hdev, conn, &ev->bdaddr, ev->link_key,
4095 if (!key)
4098 /* Update connection information since adding the key will have
4102 conn_set_key(conn, key->type, key->pin_len);
4104 mgmt_new_link_key(hdev, key, persistent);
4107 * is set. If it's not set simply remove the key from the kernel
4111 if (key->type == HCI_LK_DEBUG_COMBINATION &&
4113 list_del_rcu(&key->list);
4114 kfree_rcu(key, rcu);
4749 /* If there already exists link key in local host, leave the
4754 bt_dev_dbg(hdev, "Local host already has link key");
5874 * temporary key used to encrypt a connection following