Home
last modified time | relevance | path

Searched refs:sec_level (Results 1 - 25 of 26) sorted by relevance

12

/kernel/linux/linux-5.10/net/bluetooth/
H A Dhci_conn.c997 u8 dst_type, u8 sec_level, u16 conn_timeout, in hci_connect_le()
1057 conn->pending_sec_level = sec_level; in hci_connect_le()
1061 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le()
1181 u8 dst_type, u8 sec_level, in hci_connect_le_scan()
1206 if (conn->pending_sec_level < sec_level) in hci_connect_le_scan()
1207 conn->pending_sec_level = sec_level; in hci_connect_le_scan()
1225 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan()
1226 conn->pending_sec_level = sec_level; in hci_connect_le_scan()
1238 u8 sec_level, u8 auth_type, in hci_connect_acl()
1270 acl->sec_level in hci_connect_acl()
996 hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, u8 role, bdaddr_t *direct_rpa) hci_connect_le() argument
1180 hci_connect_le_scan(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, enum conn_reasons conn_reason) hci_connect_le_scan() argument
1237 hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst, u8 sec_level, u8 auth_type, enum conn_reasons conn_reason) hci_connect_acl() argument
1364 hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type) hci_conn_auth() argument
1413 hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, bool initiator) hci_conn_security() argument
1498 hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level) hci_conn_check_secure() argument
[all...]
H A Dsmp.c634 static __u8 seclevel_to_authreq(__u8 sec_level) in seclevel_to_authreq() argument
636 switch (sec_level) { in seclevel_to_authreq()
1110 else if (hcon->sec_level == BT_SECURITY_FIPS) in smp_notify_keys()
1302 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys()
1349 if (hcon->sec_level > BT_SECURITY_MEDIUM) in smp_distribute_keys()
1745 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local
1824 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req()
1826 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req()
1828 if (sec_level > conn->hcon->pending_sec_level) in smp_cmd_pairing_req()
1829 conn->hcon->pending_sec_level = sec_level; in smp_cmd_pairing_req()
2246 smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level) smp_ltk_encrypt() argument
2270 smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, enum smp_key_pref key_pref) smp_sufficient_security() argument
2300 u8 sec_level, auth; smp_cmd_security_req() local
2357 smp_conn_security(struct hci_conn *hcon, __u8 sec_level) smp_conn_security() argument
[all...]
H A Dsmp.h186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level,
188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
H A Dl2cap_sock.c145 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
150 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
153 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
513 switch (chan->sec_level) { in l2cap_sock_getsockopt_old()
605 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt()
610 sec.level = chan->sec_level; in l2cap_sock_getsockopt()
832 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old()
834 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old()
836 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old()
943 chan->sec_level in l2cap_sock_setsockopt()
[all...]
H A Dl2cap_core.c450 chan->sec_level != BT_SECURITY_SDP) in l2cap_chan_timeout()
549 chan->sec_level = BT_SECURITY_LOW; in l2cap_chan_set_defaults()
875 switch (chan->sec_level) { in l2cap_get_auth_type()
887 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type()
888 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type()
890 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type()
891 chan->sec_level == BT_SECURITY_FIPS) in l2cap_get_auth_type()
898 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type()
899 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type()
901 if (chan->sec_level in l2cap_get_auth_type()
5646 int err, sec_level; l2cap_le_connect_rsp() local
6155 int err = 0, sec_level; l2cap_ecred_conn_rsp() local
[all...]
H A Dhci_event.c1978 * devices with sec_level MEDIUM or HIGH or if MITM protection in hci_outgoing_auth_needed()
2928 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt()
3076 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt()
4517 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt()
5249 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
H A Dmgmt.c2909 u8 sec_level, auth_type; in pair_device() local
2945 sec_level = BT_SECURITY_MEDIUM; in pair_device()
2949 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, in pair_device()
2974 sec_level, HCI_LE_CONN_TIMEOUT, in pair_device()
3026 hci_conn_security(conn, sec_level, auth_type, true)) { in pair_device()
/kernel/linux/linux-5.10/net/bluetooth/rfcomm/
H A Dsock.c250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init()
257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init()
261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init()
410 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect()
645 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old()
647 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old()
649 rfcomm_pi(sk)->sec_level in rfcomm_sock_setsockopt_old()
[all...]
H A Dcore.c68 u8 sec_level,
215 switch (d->sec_level) { in rfcomm_check_security()
228 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security()
291 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state()
384 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open()
761 u8 sec_level, in rfcomm_session_create()
789 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create()
2154 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm()
2158 } else if (d->sec_level in rfcomm_security_cfm()
759 rfcomm_session_create(bdaddr_t *src, bdaddr_t *dst, u8 sec_level, int *err) rfcomm_session_create() argument
[all...]
/kernel/linux/linux-6.6/net/bluetooth/rfcomm/
H A Dsock.c250 pi->sec_level = rfcomm_pi(parent)->sec_level; in rfcomm_sock_init()
257 pi->sec_level = BT_SECURITY_LOW; in rfcomm_sock_init()
261 pi->dlc->sec_level = pi->sec_level; in rfcomm_sock_init()
404 d->sec_level = rfcomm_pi(sk)->sec_level; in rfcomm_sock_connect()
643 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW; in rfcomm_sock_setsockopt_old()
645 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM; in rfcomm_sock_setsockopt_old()
647 rfcomm_pi(sk)->sec_level in rfcomm_sock_setsockopt_old()
[all...]
H A Dcore.c70 u8 sec_level,
219 switch (d->sec_level) { in rfcomm_check_security()
232 return hci_conn_security(conn->hcon, d->sec_level, auth_type, in rfcomm_check_security()
295 d->sec_level = BT_SECURITY_LOW; in rfcomm_dlc_clear_state()
388 s = rfcomm_session_create(src, dst, d->sec_level, &err); in __rfcomm_dlc_open()
765 u8 sec_level, in rfcomm_session_create()
793 l2cap_pi(sk)->chan->sec_level = sec_level; in rfcomm_session_create()
2158 if (d->sec_level == BT_SECURITY_MEDIUM) { in rfcomm_security_cfm()
2162 } else if (d->sec_level in rfcomm_security_cfm()
763 rfcomm_session_create(bdaddr_t *src, bdaddr_t *dst, u8 sec_level, int *err) rfcomm_session_create() argument
[all...]
/kernel/linux/linux-6.6/net/bluetooth/
H A Dhci_conn.c1332 u8 dst_type, bool dst_resolved, u8 sec_level, in hci_connect_le()
1390 conn->pending_sec_level = sec_level; in hci_connect_le()
1394 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le()
1563 u8 dst_type, u8 sec_level, in hci_connect_le_scan()
1588 if (conn->pending_sec_level < sec_level) in hci_connect_le_scan()
1589 conn->pending_sec_level = sec_level; in hci_connect_le_scan()
1607 conn->sec_level = BT_SECURITY_LOW; in hci_connect_le_scan()
1608 conn->pending_sec_level = sec_level; in hci_connect_le_scan()
1620 u8 sec_level, u8 auth_type, in hci_connect_acl()
1652 acl->sec_level in hci_connect_acl()
1331 hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, bool dst_resolved, u8 sec_level, u16 conn_timeout, u8 role) hci_connect_le() argument
1562 hci_connect_le_scan(struct hci_dev *hdev, bdaddr_t *dst, u8 dst_type, u8 sec_level, u16 conn_timeout, enum conn_reasons conn_reason) hci_connect_le_scan() argument
1619 hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst, u8 sec_level, u8 auth_type, enum conn_reasons conn_reason) hci_connect_acl() argument
2355 hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type) hci_conn_auth() argument
2404 hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, bool initiator) hci_conn_security() argument
2489 hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level) hci_conn_check_secure() argument
[all...]
H A Dsmp.c635 static __u8 seclevel_to_authreq(__u8 sec_level) in seclevel_to_authreq() argument
637 switch (sec_level) { in seclevel_to_authreq()
1116 else if (hcon->sec_level == BT_SECURITY_FIPS) in smp_notify_keys()
1308 authenticated = hcon->sec_level == BT_SECURITY_HIGH; in smp_distribute_keys()
1355 if (hcon->sec_level > BT_SECURITY_MEDIUM) in smp_distribute_keys()
1751 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local
1830 sec_level = BT_SECURITY_MEDIUM; in smp_cmd_pairing_req()
1832 sec_level = authreq_to_seclevel(auth); in smp_cmd_pairing_req()
1834 if (sec_level > conn->hcon->pending_sec_level) in smp_cmd_pairing_req()
1835 conn->hcon->pending_sec_level = sec_level; in smp_cmd_pairing_req()
2252 smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level) smp_ltk_encrypt() argument
2276 smp_sufficient_security(struct hci_conn *hcon, u8 sec_level, enum smp_key_pref key_pref) smp_sufficient_security() argument
2306 u8 sec_level, auth; smp_cmd_security_req() local
2363 smp_conn_security(struct hci_conn *hcon, __u8 sec_level) smp_conn_security() argument
[all...]
H A Dsmp.h186 bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level,
188 int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
H A Dl2cap_core.c427 chan->sec_level != BT_SECURITY_SDP) in l2cap_chan_timeout()
526 chan->sec_level = BT_SECURITY_LOW; in l2cap_chan_set_defaults()
839 switch (chan->sec_level) { in l2cap_get_auth_type()
851 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type()
852 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type()
854 if (chan->sec_level == BT_SECURITY_HIGH || in l2cap_get_auth_type()
855 chan->sec_level == BT_SECURITY_FIPS) in l2cap_get_auth_type()
862 if (chan->sec_level == BT_SECURITY_LOW) in l2cap_get_auth_type()
863 chan->sec_level = BT_SECURITY_SDP; in l2cap_get_auth_type()
865 if (chan->sec_level in l2cap_get_auth_type()
4669 int err, sec_level; l2cap_le_connect_rsp() local
5157 int err = 0, sec_level; l2cap_ecred_conn_rsp() local
[all...]
H A Dl2cap_sock.c146 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
151 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
154 chan->sec_level = BT_SECURITY_SDP; in l2cap_sock_bind()
495 switch (chan->sec_level) { in l2cap_sock_getsockopt_old()
587 sec.level = chan->conn->hcon->sec_level; in l2cap_sock_getsockopt()
592 sec.level = chan->sec_level; in l2cap_sock_getsockopt()
814 chan->sec_level = BT_SECURITY_LOW; in l2cap_sock_setsockopt_old()
816 chan->sec_level = BT_SECURITY_MEDIUM; in l2cap_sock_setsockopt_old()
818 chan->sec_level = BT_SECURITY_HIGH; in l2cap_sock_setsockopt_old()
925 chan->sec_level in l2cap_sock_setsockopt()
[all...]
H A Dhci_event.c2463 * devices with sec_level MEDIUM or HIGH or if MITM protection in hci_outgoing_auth_needed()
3500 conn->sec_level = conn->pending_sec_level; in hci_auth_complete_evt()
3607 conn->sec_level = conn->pending_sec_level; in hci_encrypt_change_evt()
5234 conn->sec_level = conn->pending_sec_level; in hci_key_refresh_complete_evt()
5990 conn->sec_level = BT_SECURITY_LOW; in le_conn_complete_evt()
/kernel/linux/linux-5.10/include/net/bluetooth/
H A Dhci_core.h621 __u8 sec_level;
1072 u8 dst_type, u8 sec_level,
1076 u8 dst_type, u8 sec_level, u16 conn_timeout,
1079 u8 sec_level, u8 auth_type,
1084 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level);
1085 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type,
1511 if (conn->sec_level == BT_SECURITY_SDP)
1512 conn->sec_level = BT_SECURITY_LOW;
1514 if (conn->pending_sec_level > conn->sec_level)
1515 conn->sec_level
[all...]
H A Drfcomm.h186 u8 sec_level; member
309 u8 sec_level; member
H A Dl2cap.h564 __u8 sec_level; member
/kernel/linux/linux-6.6/include/net/bluetooth/
H A Drfcomm.h186 u8 sec_level; member
309 u8 sec_level; member
H A Dhci_core.h721 __u8 sec_level; member
1472 u8 dst_type, u8 sec_level,
1476 u8 dst_type, bool dst_resolved, u8 sec_level,
1479 u8 sec_level, u8 auth_type,
1499 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level);
1500 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type,
2033 if (conn->sec_level == BT_SECURITY_SDP) in hci_encrypt_cfm()
2034 conn->sec_level = BT_SECURITY_LOW; in hci_encrypt_cfm()
2036 if (conn->pending_sec_level > conn->sec_level) in hci_encrypt_cfm()
2037 conn->sec_level in hci_encrypt_cfm()
[all...]
H A Dl2cap.h529 __u8 sec_level; member
/kernel/linux/linux-5.10/drivers/net/wireless/intel/ipw2x00/
H A Dipw2100.c5473 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local
5497 sec_level = SEC_LEVEL_0; in ipw2100_configure_security()
5499 sec_level = priv->ieee->sec.level; in ipw2100_configure_security()
5506 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()
/kernel/linux/linux-6.6/drivers/net/wireless/intel/ipw2x00/
H A Dipw2100.c5462 int i, err, auth_mode, sec_level, use_group; in ipw2100_configure_security() local
5486 sec_level = SEC_LEVEL_0; in ipw2100_configure_security()
5488 sec_level = priv->ieee->sec.level; in ipw2100_configure_security()
5495 ipw2100_set_security_information(priv, auth_mode, sec_level, in ipw2100_configure_security()

Completed in 84 milliseconds

12