/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | hci_conn.c | 997 u8 dst_type, u8 sec_level, u16 conn_timeout, in hci_connect_le() 1057 conn->pending_sec_level = sec_level; in hci_connect_le() 1061 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le() 1181 u8 dst_type, u8 sec_level, in hci_connect_le_scan() 1206 if (conn->pending_sec_level < sec_level) in hci_connect_le_scan() 1207 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1225 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan() 1226 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1238 u8 sec_level, u8 auth_type, in hci_connect_acl() 1270 acl->sec_level in hci_connect_acl() 996 hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, u8 role, bdaddr_t *direct_rpa) hci_connect_le() argument 1180 hci_connect_le_scan(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, enum conn_reasons conn_reason) hci_connect_le_scan() argument 1237 hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst, u8 sec_level, u8 auth_type, enum conn_reasons conn_reason) hci_connect_acl() argument 1364 hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type) hci_conn_auth() argument 1413 hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, bool initiator) hci_conn_security() argument 1498 hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level) hci_conn_check_secure() argument [all...] |
H A D | smp.c | 634 static __u8 seclevel_to_authreq(__u8 sec_level) in seclevel_to_authreq() argument 636 switch (sec_level) { in seclevel_to_authreq() 1110 else if (hcon->sec_level == BT_SECURITY_FIPS) in smp_notify_keys() 1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1349 if (hcon->sec_level > BT_SECURITY_MEDIUM) in smp_distribute_keys() 1745 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1824 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req() 1826 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req() 1828 if (sec_level > conn->hcon->pending_sec_level) in smp_cmd_pairing_req() 1829 conn->hcon->pending_sec_level = sec_level; in smp_cmd_pairing_req() 2246 smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level) smp_ltk_encrypt() argument 2270 smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, enum smp_key_pref key_pref) smp_sufficient_security() argument 2300 u8 sec_level, auth; smp_cmd_security_req() local 2357 smp_conn_security(struct hci_conn *hcon, __u8 sec_level) smp_conn_security() argument [all...] |
H A D | smp.h | 186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, 188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
|
H A D | l2cap_sock.c | 145 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 150 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 153 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 513 switch (chan->sec_level) { in l2cap_sock_getsockopt_old() 605 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt() 610 sec.level = chan->sec_level; in l2cap_sock_getsockopt() 832 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old() 834 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old() 836 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old() 943 chan->sec_level in l2cap_sock_setsockopt() [all...] |
H A D | l2cap_core.c | 450 chan->sec_level != BT_SECURITY_SDP) in l2cap_chan_timeout() 549 chan->sec_level = BT_SECURITY_LOW; in l2cap_chan_set_defaults() 875 switch (chan->sec_level) { in l2cap_get_auth_type() 887 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 888 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 890 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type() 891 chan->sec_level == BT_SECURITY_FIPS) in l2cap_get_auth_type() 898 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 899 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 901 if (chan->sec_level in l2cap_get_auth_type() 5646 int err, sec_level; l2cap_le_connect_rsp() local 6155 int err = 0, sec_level; l2cap_ecred_conn_rsp() local [all...] |
H A D | hci_event.c | 1978 * devices with sec_level MEDIUM or HIGH or if MITM protection in hci_outgoing_auth_needed() 2928 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt() 3076 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt() 4517 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt() 5249 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
|
H A D | mgmt.c | 2909 u8 sec_level, auth_type; in pair_device() local 2945 sec_level = BT_SECURITY_MEDIUM; in pair_device() 2949 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, in pair_device() 2974 sec_level, HCI_LE_CONN_TIMEOUT, in pair_device() 3026 hci_conn_security(conn, sec_level, auth_type, true)) { in pair_device()
|
/kernel/linux/linux-5.10/net/bluetooth/rfcomm/ |
H A D | sock.c | 250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init() 257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init() 261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init() 410 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect() 645 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old() 647 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old() 649 rfcomm_pi(sk)->sec_level in rfcomm_sock_setsockopt_old() [all...] |
H A D | core.c | 68 u8 sec_level, 215 switch (d->sec_level) { in rfcomm_check_security() 228 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security() 291 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state() 384 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open() 761 u8 sec_level, in rfcomm_session_create() 789 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create() 2154 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm() 2158 } else if (d->sec_level in rfcomm_security_cfm() 759 rfcomm_session_create(bdaddr_t *src, bdaddr_t *dst, u8 sec_level, int *err) rfcomm_session_create() argument [all...] |
/kernel/linux/linux-6.6/net/bluetooth/rfcomm/ |
H A D | sock.c | 250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init() 257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init() 261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init() 404 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect() 643 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old() 645 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old() 647 rfcomm_pi(sk)->sec_level in rfcomm_sock_setsockopt_old() [all...] |
H A D | core.c | 70 u8 sec_level, 219 switch (d->sec_level) { in rfcomm_check_security() 232 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security() 295 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state() 388 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open() 765 u8 sec_level, in rfcomm_session_create() 793 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create() 2158 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm() 2162 } else if (d->sec_level in rfcomm_security_cfm() 763 rfcomm_session_create(bdaddr_t *src, bdaddr_t *dst, u8 sec_level, int *err) rfcomm_session_create() argument [all...] |
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | hci_conn.c | 1332 u8 dst_type, bool dst_resolved, u8 sec_level, in hci_connect_le() 1390 conn->pending_sec_level = sec_level; in hci_connect_le() 1394 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le() 1563 u8 dst_type, u8 sec_level, in hci_connect_le_scan() 1588 if (conn->pending_sec_level < sec_level) in hci_connect_le_scan() 1589 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1607 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan() 1608 conn->pending_sec_level = sec_level; in hci_connect_le_scan() 1620 u8 sec_level, u8 auth_type, in hci_connect_acl() 1652 acl->sec_level in hci_connect_acl() 1331 hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, bool dst_resolved, u8 sec_level, u16 conn_timeout, u8 role) hci_connect_le() argument 1562 hci_connect_le_scan(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, enum conn_reasons conn_reason) hci_connect_le_scan() argument 1619 hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst, u8 sec_level, u8 auth_type, enum conn_reasons conn_reason) hci_connect_acl() argument 2355 hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type) hci_conn_auth() argument 2404 hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, bool initiator) hci_conn_security() argument 2489 hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level) hci_conn_check_secure() argument [all...] |
H A D | smp.c | 635 static __u8 seclevel_to_authreq(__u8 sec_level) in seclevel_to_authreq() argument 637 switch (sec_level) { in seclevel_to_authreq() 1116 else if (hcon->sec_level == BT_SECURITY_FIPS) in smp_notify_keys() 1308 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys() 1355 if (hcon->sec_level > BT_SECURITY_MEDIUM) in smp_distribute_keys() 1751 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1830 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req() 1832 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req() 1834 if (sec_level > conn->hcon->pending_sec_level) in smp_cmd_pairing_req() 1835 conn->hcon->pending_sec_level = sec_level; in smp_cmd_pairing_req() 2252 smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level) smp_ltk_encrypt() argument 2276 smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, enum smp_key_pref key_pref) smp_sufficient_security() argument 2306 u8 sec_level, auth; smp_cmd_security_req() local 2363 smp_conn_security(struct hci_conn *hcon, __u8 sec_level) smp_conn_security() argument [all...] |
H A D | smp.h | 186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, 188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
|
H A D | l2cap_core.c | 427 chan->sec_level != BT_SECURITY_SDP) in l2cap_chan_timeout() 526 chan->sec_level = BT_SECURITY_LOW; in l2cap_chan_set_defaults() 839 switch (chan->sec_level) { in l2cap_get_auth_type() 851 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 852 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 854 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type() 855 chan->sec_level == BT_SECURITY_FIPS) in l2cap_get_auth_type() 862 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type() 863 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type() 865 if (chan->sec_level in l2cap_get_auth_type() 4669 int err, sec_level; l2cap_le_connect_rsp() local 5157 int err = 0, sec_level; l2cap_ecred_conn_rsp() local [all...] |
H A D | l2cap_sock.c | 146 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 151 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 154 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind() 495 switch (chan->sec_level) { in l2cap_sock_getsockopt_old() 587 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt() 592 sec.level = chan->sec_level; in l2cap_sock_getsockopt() 814 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old() 816 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old() 818 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old() 925 chan->sec_level in l2cap_sock_setsockopt() [all...] |
H A D | hci_event.c | 2463 * devices with sec_level MEDIUM or HIGH or if MITM protection in hci_outgoing_auth_needed() 3500 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt() 3607 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt() 5234 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt() 5990 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
|
/kernel/linux/linux-5.10/include/net/bluetooth/ |
H A D | hci_core.h | 621 __u8 sec_level; 1072 u8 dst_type, u8 sec_level, 1076 u8 dst_type, u8 sec_level, u16 conn_timeout, 1079 u8 sec_level, u8 auth_type, 1084 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level); 1085 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, 1511 if (conn->sec_level == BT_SECURITY_SDP) 1512 conn->sec_level = BT_SECURITY_LOW; 1514 if (conn->pending_sec_level > conn->sec_level) 1515 conn->sec_level [all...] |
H A D | rfcomm.h | 186 u8 sec_level; member 309 u8 sec_level; member
|
H A D | l2cap.h | 564 __u8 sec_level; member
|
/kernel/linux/linux-6.6/include/net/bluetooth/ |
H A D | rfcomm.h | 186 u8 sec_level; member 309 u8 sec_level; member
|
H A D | hci_core.h | 721 __u8 sec_level; member 1472 u8 dst_type, u8 sec_level, 1476 u8 dst_type, bool dst_resolved, u8 sec_level, 1479 u8 sec_level, u8 auth_type, 1499 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level); 1500 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, 2033 if (conn->sec_level == BT_SECURITY_SDP) in hci_encrypt_cfm() 2034 conn->sec_level = BT_SECURITY_LOW; in hci_encrypt_cfm() 2036 if (conn->pending_sec_level > conn->sec_level) in hci_encrypt_cfm() 2037 conn->sec_level in hci_encrypt_cfm() [all...] |
H A D | l2cap.h | 529 __u8 sec_level; member
|
/kernel/linux/linux-5.10/drivers/net/wireless/intel/ipw2x00/ |
H A D | ipw2100.c | 5473 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local 5497 sec_level = SEC_LEVEL_0; in ipw2100_configure_security() 5499 sec_level = priv->ieee->sec.level; in ipw2100_configure_security() 5506 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intel/ipw2x00/ |
H A D | ipw2100.c | 5462 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local 5486 sec_level = SEC_LEVEL_0; in ipw2100_configure_security() 5488 sec_level = priv->ieee->sec.level; in ipw2100_configure_security() 5495 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()
|