/btstack/test/le_device_db_tlv/ |
H A D | le_device_db_tlv_test.cpp | 239 int encryption_key_size = 10; in TEST() local 242 le_device_db_encryption_set(le_db_index, ediv, NULL, NULL, encryption_key_size, 1, 1, 1); in TEST() 259 CHECK_TRUE(expected_encryption_key_size != encryption_key_size); in TEST() 264 int encryption_key_size = 10; in TEST() local 269 le_device_db_encryption_set(le_db_index, ediv, NULL, NULL, encryption_key_size, 1, 1, 1); in TEST() 280 int encryption_key_size = 10; in TEST() local 286 le_device_db_encryption_set(le_db_index, ediv, zero_rand, sm_key, encryption_key_size, 1, 1, 1); in TEST() 304 CHECK_EQUAL(expected_encryption_key_size, encryption_key_size); in TEST()
|
/btstack/tool/ |
H A D | compile_gatt.py | 364 encryption_key_size = (flags & 0xf000) >> 12 365 if encryption_key_size > 0: 366 encryption_key_size += 1 367 return encryption_key_size 399 encryption_key_size = encryption_key_size_from_flags(flags) 413 if encryption_key_size > 0: 417 fout.write('ENCRYPTION_KEY_SIZE=%u' % encryption_key_size)
|
/btstack/test/gatt_client/ |
H A D | mock.c | 111 att_connection->encryption_key_size = 0; in att_init_connection() 256 hci_connection.att_connection.encryption_key_size = 0; in hci_setup_connection()
|
/btstack/test/gatt_server/ |
H A D | mock.c | 95 hci_connection.att_connection.encryption_key_size = 0; in hci_setup_connection() 126 hci_connection.att_connection.encryption_key_size = 0; in hci_deinit()
|
/btstack/src/ble/ |
H A D | att_server.c | 323 att_connection->encryption_key_size = 0u; in att_server_event_packet_handler() 361 att_connection->encryption_key_size = gap_encryption_key_size(con_handle); in att_server_event_packet_handler() 365 …att_connection->encryption_key_size, att_connection->authenticated, att_connection->secure_connect… in att_server_event_packet_handler() 964 att_connection->encryption_key_size = gap_encryption_key_size(con_handle); in att_server_dispatch_packet_handler() 968 …att_connection->encryption_key_size, att_connection->authenticated, att_connection->secure_connect… in att_server_dispatch_packet_handler()
|
H A D | att_db.h | 115 uint8_t encryption_key_size; member
|
H A D | att_db.c | 384 …ection->authorized, att_connection->authenticated, att_connection->encryption_key_size, att_connec… in att_validate_security() 399 …if ((required_encryption_size > 0u) && ((att_connection->encryption_key_size == 0u) || sc_missing)… in att_validate_security() 402 if (required_encryption_size > att_connection->encryption_key_size){ in att_validate_security()
|
H A D | sm.c | 2158 int encryption_key_size; in sm_load_security_info() local 2165 … &encryption_key_size, &authenticated, &authorized, &secure_connection); in sm_load_security_info() 2166 …uthorized %u, secure connetion %u", sm_connection->sm_le_db_index, encryption_key_size, authentica… in sm_load_security_info() 2167 sm_connection->sm_actual_encryption_key_size = encryption_key_size; in sm_load_security_info()
|
H A D | gatt_client.c | 172 uint8_t encryption_key_size = gap_encryption_key_size(con_handle); in gatt_client_le_security_level_for_connection() local 173 if (encryption_key_size == 0) return LEVEL_0; in gatt_client_le_security_level_for_connection() 178 return encryption_key_size == 16 ? LEVEL_4 : LEVEL_3; in gatt_client_le_security_level_for_connection()
|
/btstack/test/security_manager/ |
H A D | mock.c | 151 att_connection->encryption_key_size = 0; in att_init_connection()
|
/btstack/src/ |
H A D | gap.h | 526 void gap_set_required_encryption_key_size(uint8_t encryption_key_size);
|
H A D | hci.c | 2749 …ci_handle_read_encryption_key_size_complete(hci_connection_t * conn, uint8_t encryption_key_size) { in hci_handle_read_encryption_key_size_complete() argument 2751 conn->encryption_key_size = encryption_key_size; in hci_handle_read_encryption_key_size_complete() 4189 … uint8_t encryption_key_size = hci_event_encryption_change_v2_get_encryption_key_size(packet); in event_handler() local 4191 hci_handle_read_encryption_key_size_complete(conn, encryption_key_size); in event_handler() 5167 void gap_set_required_encryption_key_size(uint8_t encryption_key_size){ in gap_set_required_encryption_key_size() argument 5169 if (encryption_key_size < 7) return; in gap_set_required_encryption_key_size() 5170 if (encryption_key_size > 16) return; in gap_set_required_encryption_key_size() 5171 hci_stack->gap_required_encyrption_key_size = encryption_key_size; in gap_set_required_encryption_key_size() 8279 … if (connection->encryption_key_size < hci_stack->gap_required_encyrption_key_size) return LEVEL_0; in gap_security_level_for_connection() 8282 if ((security_level == LEVEL_4) && (connection->encryption_key_size < 16)){ in gap_security_level_for_connection() [all …]
|
H A D | hci.h | 565 uint8_t encryption_key_size; member
|
H A D | l2cap.c | 5403 uint8_t encryption_key_size = gap_encryption_key_size(con_handle); in l2cap_cbm_security_level_for_connection() local 5404 if (encryption_key_size == 0) return LEVEL_0; in l2cap_cbm_security_level_for_connection() 5409 return encryption_key_size == 16 ? LEVEL_4 : LEVEL_3; in l2cap_cbm_security_level_for_connection()
|