Home | History | Annotate | Download | only in btm

Lines Matching refs:sm4

1057         else if (p_dev_rec->sm4 & BTM_SM4_CONN_PEND)
1269 BTM_TRACE_EVENT ("BTM_SecBond: Remote sm4: 0x%x HCI Handle: 0x%04x", p_dev_rec->sm4, p_dev_rec->hci_handle);
1288 BTM_TRACE_DEBUG ("sec mode: %d sm4:x%x", btm_cb.security_mode, p_dev_rec->sm4);
1290 || (p_dev_rec->sm4 == BTM_SM4_KNOWN))
1295 if (BTM_SEC_MODE_SP == btm_cb.security_mode && BTM_SEC_IS_SM4_UNKNOWN(p_dev_rec->sm4))
1298 if ((p_dev_rec->sm4 & BTM_SM4_CONN_PEND) == 0)
1311 BTM_TRACE_DEBUG ("State:%s sm4: 0x%x sec_state:%d",
1312 btm_pair_state_descr (btm_cb.pairing_state), p_dev_rec->sm4, p_dev_rec->sec_state);
2196 p_dev_rec->sm4 |= BTM_SM4_UPGRADE;
2325 BTM_TRACE_EVENT ("btm_sec_l2cap_access_req() - busy - PSM:%d delayed state: %s mode:%d, sm4:0x%x",
2326 psm, btm_pair_state_descr(btm_cb.pairing_state), btm_cb.security_mode, p_dev_rec->sm4);
2330 || ((BTM_SEC_MODE_SP == btm_cb.security_mode) && (BTM_SM4_KNOWN == p_dev_rec->sm4))
2331 || (BTM_SEC_IS_SM4(p_dev_rec->sm4) && (btm_sec_is_upgrade_possible(p_dev_rec, is_originator) == FALSE))
2335 * or SM4 with no possibility of link key upgrade */
2382 if (BTM_SEC_IS_SM4(p_dev_rec->sm4))
2384 /* SM4 to SM4 -> always authenticate & encrypt */
2389 if ( !(BTM_SM4_KNOWN & p_dev_rec->sm4))
2393 p_dev_rec->sm4 |= BTM_SM4_REQ_PEND;
2402 if (BTM_SEC_IS_SM4(p_dev_rec->sm4))
2404 /* SM4 to SM4: the acceptor needs to make sure the authentication is already done */
2406 /* SM4 to SM4 -> always authenticate & encrypt */
2411 if ( !(BTM_SM4_KNOWN & p_dev_rec->sm4))
2415 p_dev_rec->sm4 |= BTM_SM4_REQ_PEND;
2423 BTM_TRACE_DEBUG ("btm_sec_l2cap_access_req() sm4:0x%x, sec_flags:0x%x, security_required:0x%x chk:%d",
2424 p_dev_rec->sm4, p_dev_rec->sec_flags, security_required, chk_acp_auth_done);
2448 BTM_TRACE_DEBUG ("no next_serv sm4:0x%x, chk:%d", p_dev_rec->sm4, chk_acp_auth_done);
2449 if (!BTM_SEC_IS_SM4(p_dev_rec->sm4))
2464 if (is_originator && (btm_cb.security_mode != BTM_SEC_MODE_SP || !BTM_SEC_IS_SM4(p_dev_rec->sm4)) && (psm >= 0x1001))
2478 BTM_TRACE_DEBUG ("(SM4 to SM4) btm_sec_l2cap_access_req rspd. authenticated: x%x, enc: x%x",
2480 /* SM4, but we do not know for sure which level of security we need.
2490 BTM_TRACE_ERROR ("peer should have initiated security process by now (SM4 to SM4)");
2512 if (BTM_SEC_IS_SM4(p_dev_rec->sm4))
2592 || ((BTM_SEC_MODE_SP == btm_cb.security_mode) && (BTM_SM4_KNOWN == p_dev_rec->sm4))
2593 || (BTM_SEC_IS_SM4(p_dev_rec->sm4) && (btm_sec_is_upgrade_possible(p_dev_rec, is_originator) == FALSE))
2597 * or SM4 with no possibility of link key upgrade */
2634 if (BTM_SEC_IS_SM4(p_dev_rec->sm4))
2754 p_dev_rec->sm4 |= BTM_SM4_CONN_PEND;
3186 BTM_TRACE_EVENT ("btm_sec_rmt_name_request_complete() continue bonding sm4: 0x%04x, status:0x%x", p_dev_rec->sm4, status);
3204 if (BTM_SEC_IS_SM4_UNKNOWN(p_dev_rec->sm4))
3212 p_dev_rec->sm4 |= BTM_SM4_KNOWN;
3216 BTM_TRACE_DEBUG("%s, SM4 Value: %x, Legacy:%d,IS SM4:%d, Unknown:%d",__FUNCTION__,
3217 p_dev_rec->sm4, BTM_SEC_IS_SM4_LEGACY(p_dev_rec->sm4),
3218 BTM_SEC_IS_SM4(p_dev_rec->sm4),BTM_SEC_IS_SM4_UNKNOWN(p_dev_rec->sm4));
3223 if ((p_dev_rec->sm4 != BTM_SM4_KNOWN) || !btm_sec_check_prefetch_pin(p_dev_rec))
3297 if (p_dev_rec->sm4 & BTM_SM4_REQ_PEND)
3333 BTM_TRACE_EVENT ("btm_sec_rmt_host_support_feat_evt sm4: 0x%x p[0]: 0x%x", p_dev_rec->sm4, p[0]);
3335 if (BTM_SEC_IS_SM4_UNKNOWN(p_dev_rec->sm4))
3337 p_dev_rec->sm4 = BTM_SM4_KNOWN;
3341 p_dev_rec->sm4 = BTM_SM4_TRUE;
3343 BTM_TRACE_EVENT ("btm_sec_rmt_host_support_feat_evt sm4: 0x%x features[0]: 0x%x", p_dev_rec->sm4, features[0]);
3378 p_dev_rec->sm4 |= BTM_SM4_TRUE;
3459 if (p_dev_rec->sm4 & BTM_SM4_UPGRADE)
3461 p_dev_rec->sm4 &= ~BTM_SM4_UPGRADE;
3990 /* keep the old sm4 flag and clear the retry bit in control block */
3991 old_sm4 = p_dev_rec->sm4;
3992 p_dev_rec->sm4 &= ~BTM_SM4_RETRY;
4063 p_dev_rec->sm4 |= BTM_SM4_RETRY;
4064 BTM_TRACE_DEBUG ("Collision retry sm4:x%x sec_flags:0x%x", p_dev_rec->sm4, p_dev_rec->sec_flags);
4068 else if (HCI_ERR_KEY_MISSING == status && BTM_SEC_IS_SM4(p_dev_rec->sm4))
4071 p_dev_rec->sm4 |= BTM_SM4_RETRY;
4073 BTM_TRACE_DEBUG ("Retry for missing key sm4:x%x sec_flags:0x%x", p_dev_rec->sm4, p_dev_rec->sec_flags);
4080 if (p_dev_rec->sm4 & BTM_SM4_RETRY)
4356 if (p_dev_rec->sm4 & BTM_SM4_CONN_PEND)
4369 p_dev_rec->sm4 &= ~BTM_SM4_CONN_PEND;
4394 p_dev_rec->sm4 &= ~BTM_SM4_CONN_PEND;
4415 BTM_TRACE_WARNING ("Security Manager: btm_sec_connected: HCI_Conn_Comp Flags:0x%04x, sm4: 0x%x",
4416 btm_cb.pairing_flags, p_dev_rec->sm4);
4419 if (BTM_SEC_IS_SM4_UNKNOWN(p_dev_rec->sm4))
4711 p_dev_rec->sm4 &= BTM_SM4_TRUE;
5113 /* received PIN code request. must be non-sm4 */
5114 p_dev_rec->sm4 = BTM_SM4_KNOWN;