Select one of the symbols to view example projects that use it.
 
Outline
#include <stdio.h>
#include <stdlib.h>
#include "bta/bta_api.h"
#include "bta/bta_sys.h"
#include "bta/bta_dm_co.h"
#include "bta/bta_dm_ci.h"
#include "btc/btc_dm.h"
#include "common/bt_defs.h"
#include "btif_dm.h"
#include "common/bte_appl.h"
#define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE
#define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE
#define BTM_BLE_OOB_DISABLE
#define BTM_BLE_OOB_ENABLE
bte_appl_cfg
bta_dm_co_security_param_init()
#include "btm_int.h"
bta_dm_co_get_compress_memory(tBTA_SYS_ID, UINT8 **, UINT32 *)
bta_dm_co_io_req(UINT8 *, tBTA_IO_CAP *, tBTA_OOB_DATA *, tBTA_AUTH_REQ *, BOOLEAN)
bta_dm_co_io_rsp(UINT8 *, tBTA_IO_CAP, tBTA_OOB_DATA, tBTA_AUTH_REQ)
bta_dm_co_lk_upgrade(UINT8 *, BOOLEAN *)
bta_dm_co_loc_oob(BOOLEAN, UINT8 *, UINT8 *)
bta_dm_co_rmt_oob(UINT8 *)
bta_dm_co_le_io_key_req(UINT8 *, UINT8 *, tBTA_LE_KEY_TYPE *, tBTA_LE_KEY_TYPE *)
bta_dm_co_ble_load_local_keys(tBTA_DM_BLE_LOCAL_KEY_MASK *, UINT8 *, tBTA_BLE_LOCAL_ID_KEYS *)
bta_dm_co_ble_io_req(UINT8 *, tBTA_IO_CAP *, tBTA_OOB_DATA *, tBTA_LE_AUTH_REQ *, UINT8 *, tBTA_LE_KEY_TYPE *, tBTA_LE_KEY_TYPE *)
bta_dm_co_ble_set_io_cap(UINT8)
bta_dm_co_ble_set_auth_req(UINT8)
bta_dm_co_ble_set_init_key_req(UINT8)
bta_dm_co_ble_set_rsp_key_req(UINT8)
bta_dm_co_ble_set_max_key_size(UINT8)
bta_dm_co_ble_set_min_key_size(UINT8)
bta_dm_co_ble_set_accept_auth_enable(UINT8)
bta_dm_co_ble_get_accept_auth_enable()
bta_dm_co_ble_get_auth_req()
bta_dm_co_ble_oob_support(UINT8)
Files
loading (2/5)...
SourceVuESP-IDF Framework and ExamplesESP-IDFcomponents/bt/host/bluedroid/bta/dm/bta_dm_co.c
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
/****************************************************************************** * * Copyright (C) 2009-2012 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************//* ... */ #include <stdio.h> #include <stdlib.h> #include "bta/bta_api.h" #include "bta/bta_sys.h" #include "bta/bta_dm_co.h" #include "bta/bta_dm_ci.h" #include "btc/btc_dm.h"7 includes #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) #include "common/bt_defs.h" #if (BTM_OOB_INCLUDED == TRUE) #include "btif_dm.h" #endif/* ... */ #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE && SMP_INCLUDED == TRUE) #include "common/bte_appl.h" #define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE 0 #define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE 1 #define BTM_BLE_OOB_DISABLE 0 #define BTM_BLE_OOB_ENABLE 1 tBTE_APPL_CFG bte_appl_cfg = { #if SMP_INCLUDED == TRUE BTA_LE_AUTH_REQ_SC_MITM_BOND, // Authentication requirements #else BTM_AUTH_SPGB_YES, // Authentication requirements #endif BTM_LOCAL_IO_CAPS_BLE, BTM_BLE_INITIATOR_KEY_SIZE, BTM_BLE_RESPONDER_KEY_SIZE, BTM_BLE_MAX_KEY_SIZE, BTM_BLE_MIN_KEY_SIZE, BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE, BTM_BLE_OOB_DISABLE, }{...}; void bta_dm_co_security_param_init(void) { bte_appl_cfg.ble_auth_req = BTA_LE_AUTH_REQ_SC_MITM_BOND; bte_appl_cfg.ble_io_cap = BTM_LOCAL_IO_CAPS_BLE; bte_appl_cfg.ble_init_key = BTM_BLE_INITIATOR_KEY_SIZE; bte_appl_cfg.ble_resp_key = BTM_BLE_RESPONDER_KEY_SIZE; bte_appl_cfg.ble_max_key_size = BTM_BLE_MAX_KEY_SIZE; bte_appl_cfg.ble_min_key_size = BTM_BLE_MIN_KEY_SIZE; bte_appl_cfg.ble_accept_auth_enable = BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE; bte_appl_cfg.oob_support = BTM_BLE_OOB_DISABLE; }{ ... }; /* ... */#endif #if (defined CLASSIC_BT_INCLUDED && CLASSIC_BT_INCLUDED == TRUE) #include "btm_int.h" #endif /******************************************************************************* ** ** Function bta_dm_co_get_compress_memory ** ** Description This callout function is executed by DM to get memory for compression ** Parameters id - BTA SYS ID ** memory_p - memory return by callout ** memory_size - memory size ** ** Returns TRUE for success, FALSE for fail. ** *******************************************************************************//* ... */ BOOLEAN bta_dm_co_get_compress_memory(tBTA_SYS_ID id, UINT8 **memory_p, UINT32 *memory_size) { UNUSED(id); UNUSED(memory_p); UNUSED(memory_size); return TRUE; }{ ... } /******************************************************************************* ** ** Function bta_dm_co_bt_set_io_cap ** ** Description This function is used to set IO capabilities ** ** Parameters bt_io_cap - IO capabilities ** ** @return - ESP_BT_STATUS_SUCCESS : success ** - other : failed ** *******************************************************************************//* ... */ #if (CLASSIC_BT_INCLUDED == TRUE) esp_err_t bta_dm_co_bt_set_io_cap(UINT8 bt_io_cap) { esp_err_t ret = ESP_BT_STATUS_SUCCESS; if(bt_io_cap < BTM_IO_CAP_MAX ) { btm_cb.devcb.loc_io_caps = bt_io_cap; ret = ESP_BT_STATUS_SUCCESS; }{...} else { ret = ESP_BT_STATUS_FAIL; APPL_TRACE_ERROR("%s error:Invalid io cap value.",__func__); }{...} return ret; }{...} /* ... */#endif /* (CLASSIC_BT_INCLUDED == TRUE) */ /******************************************************************************* ** ** Function bta_dm_co_io_req ** ** Description This callout function is executed by DM to get IO capabilities ** of the local device for the Simple Pairing process ** ** Parameters bd_addr - The peer device ** *p_io_cap - The local Input/Output capabilities ** *p_oob_data - TRUE, if OOB data is available for the peer device. ** *p_auth_req - TRUE, if MITM protection is required. ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_AUTH_REQ *p_auth_req, BOOLEAN is_orig) { UNUSED(bd_addr); #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) #if (BTM_OOB_INCLUDED == TRUE) btif_dm_set_oob_for_io_req(p_oob_data); #endif btif_dm_proc_io_req(bd_addr, p_io_cap, p_oob_data, p_auth_req, is_orig);/* ... */ #else BTIF_TRACE_DEBUG("bta_dm_co_io_req: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_oob_data = %d", *p_oob_data); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_io_cap = %d", *p_io_cap); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_auth_req = %d", *p_auth_req); BTIF_TRACE_DEBUG("bta_dm_co_io_req is_orig = %d", is_orig); }{ ... } /******************************************************************************* ** ** Function bta_dm_co_io_rsp ** ** Description This callout function is executed by DM to report IO capabilities ** of the peer device for the Simple Pairing process ** ** Parameters bd_addr - The peer device ** io_cap - The remote Input/Output capabilities ** oob_data - TRUE, if OOB data is available for the peer device. ** auth_req - TRUE, if MITM protection is required. ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); #else BTIF_TRACE_DEBUG("bta_dm_co_io_rsp: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ }{ ... } /******************************************************************************* ** ** Function bta_dm_co_lk_upgrade ** ** Description This callout function is executed by DM to check if the ** platform wants allow link key upgrade ** ** Parameters bd_addr - The peer device ** *p_upgrade - TRUE, if link key upgrade is desired. ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) { UNUSED(bd_addr); UNUSED(p_upgrade); }{ ... } #if (BTM_OOB_INCLUDED == TRUE) /******************************************************************************* ** ** Function bta_dm_co_loc_oob ** ** Description This callout function is executed by DM to report the OOB ** data of the local device for the Simple Pairing process ** ** Parameters valid - TRUE, if the local OOB data is retrieved from LM ** c - Simple Pairing Hash C ** r - Simple Pairing Randomnizer R ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_loc_oob(BOOLEAN valid, BT_OCTET16 c, BT_OCTET16 r) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) BTIF_TRACE_DEBUG("bta_dm_co_loc_oob, valid = %d", valid); #ifdef BTIF_DM_OOB_TEST btif_dm_proc_loc_oob(valid, c, r); #endif/* ... */ #else BTIF_TRACE_DEBUG("bta_dm_co_loc_oob: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ }{ ... } /******************************************************************************* ** ** Function bta_dm_co_rmt_oob ** ** Description This callout function is executed by DM to request the OOB ** data for the remote device for the Simple Pairing process ** Need to call bta_dm_ci_rmt_oob() in response ** ** Parameters bd_addr - The peer device ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_rmt_oob(BD_ADDR bd_addr) { BT_OCTET16 p_c = {0}; BT_OCTET16 p_r = {0}; BOOLEAN result = FALSE; #ifdef BTIF_DM_OOB_TEST #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r); #else BTIF_TRACE_DEBUG("bta_dm_rmt_oob: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) *//* ... */ #endif BTIF_TRACE_DEBUG("bta_dm_co_rmt_oob: result=%d", result); bta_dm_ci_rmt_oob(result, bd_addr, p_c, p_r); }{ ... } /* ... */#endif /* BTM_OOB_INCLUDED */ // REMOVE FOR BLUEDROID ? #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE) /******************************************************************************* ** ** Function bta_dm_co_le_io_key_req ** ** Description This callout function is executed by DM to get BLE key information ** before SMP pairing gets going. ** ** Parameters bd_addr - The peer device ** *p_max_key_size - max key size local device supported. ** *p_init_key - initiator keys. ** *p_resp_key - responder keys. ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) { UNUSED(bd_addr); #if (SMP_INCLUDED == TRUE) BTIF_TRACE_DEBUG("##################################"); BTIF_TRACE_DEBUG("bta_dm_co_le_io_key_req: only setting max size to 16"); BTIF_TRACE_DEBUG("##################################"); *p_max_key_size = 16; *p_init_key = *p_resp_key = (BTA_LE_KEY_PENC | BTA_LE_KEY_PID | BTA_LE_KEY_PCSRK | BTA_LE_KEY_LENC | BTA_LE_KEY_LID | BTA_LE_KEY_LCSRK);/* ... */ #endif ///SMP_INCLUDED == TRUE }{ ... } /******************************************************************************* ** ** Function bta_dm_co_ble_local_key_reload ** ** Description This callout function is to load the local BLE keys if available ** on the device. ** ** Parameters none ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_ble_load_local_keys(tBTA_DM_BLE_LOCAL_KEY_MASK *p_key_mask, BT_OCTET16 er, tBTA_BLE_LOCAL_ID_KEYS *p_id_keys) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) BTIF_TRACE_DEBUG("##################################"); BTIF_TRACE_DEBUG("bta_dm_co_ble_load_local_keys: Load local keys if any are persisted"); BTIF_TRACE_DEBUG("##################################"); btif_dm_get_ble_local_keys( p_key_mask, er, p_id_keys);/* ... */ #endif ///defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE #if (SMP_INCLUDED == TRUE) btc_dm_get_ble_local_keys( p_key_mask, er, p_id_keys); #endif ///SMP_INCLUDED == TRUE }{ ... } /******************************************************************************* ** ** Function bta_dm_co_ble_io_req ** ** Description This callout function is executed by DM to get BLE IO capabilities ** before SMP pairing gets going. ** ** Parameters bd_addr - The peer device ** *p_io_cap - The local Input/Output capabilities ** *p_oob_data - TRUE, if OOB data is available for the peer device. ** *p_auth_req - Auth request setting (Bonding and MITM required or not) ** *p_max_key_size - max key size local device supported. ** *p_init_key - initiator keys. ** *p_resp_key - responder keys. ** ** Returns void. ** *******************************************************************************//* ... */ void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) { #if (SMP_INCLUDED == TRUE) UNUSED(bd_addr); /* if OOB is not supported, this call-out function does not need to do anything * otherwise, look for the OOB data associated with the address and set *p_oob_data accordingly * If the answer can not be obtained right away, * set *p_oob_data to BTA_OOB_UNKNOWN and call bta_dm_ci_io_req() when the answer is available *//* ... */ *p_oob_data = bte_appl_cfg.oob_support; /* *p_auth_req by default is FALSE for devices with NoInputNoOutput; TRUE for other devices. */ *p_auth_req = bte_appl_cfg.ble_auth_req | (bte_appl_cfg.ble_auth_req & BTA_LE_AUTH_REQ_MITM) | ((*p_auth_req) & BTA_LE_AUTH_REQ_MITM); if (bte_appl_cfg.ble_io_cap <= 4) { *p_io_cap = bte_appl_cfg.ble_io_cap; }{...} if (bte_appl_cfg.ble_init_key <= BTM_BLE_INITIATOR_KEY_SIZE) { *p_init_key = bte_appl_cfg.ble_init_key; }{...} if (bte_appl_cfg.ble_resp_key <= BTM_BLE_RESPONDER_KEY_SIZE) { *p_resp_key = bte_appl_cfg.ble_resp_key; }{...} if (bte_appl_cfg.ble_max_key_size >= 7 && bte_appl_cfg.ble_max_key_size <= 16) { *p_max_key_size = bte_appl_cfg.ble_max_key_size; }{...} #endif/* ... */ ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_io_cap(UINT8 ble_io_cap) { #if (SMP_INCLUDED == TRUE) if(ble_io_cap < BTM_IO_CAP_MAX ) { bte_appl_cfg.ble_io_cap = ble_io_cap; }{...} else { APPL_TRACE_ERROR("%s error:Invalid io cap value.",__func__); }{...} #endif/* ... */ ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_auth_req(UINT8 ble_auth_req) { #if (SMP_INCLUDED == TRUE) bte_appl_cfg.ble_auth_req = ble_auth_req; #endif ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_init_key_req(UINT8 init_key) { #if (SMP_INCLUDED == TRUE) init_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit bte_appl_cfg.ble_init_key = init_key;/* ... */ #endif ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_rsp_key_req(UINT8 rsp_key) { #if (SMP_INCLUDED == TRUE) rsp_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit bte_appl_cfg.ble_resp_key = rsp_key;/* ... */ #endif ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_max_key_size(UINT8 ble_key_size) { #if (SMP_INCLUDED == TRUE) if(ble_key_size >= bte_appl_cfg.ble_min_key_size && ble_key_size <= BTM_BLE_MAX_KEY_SIZE) { bte_appl_cfg.ble_max_key_size = ble_key_size; }{...} else { APPL_TRACE_ERROR("%s error:Invalid key size value, key_size =%d",__func__, ble_key_size); }{...} #endif/* ... */ ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_min_key_size(UINT8 ble_key_size) { #if (SMP_INCLUDED == TRUE) if(ble_key_size >= BTM_BLE_MIN_KEY_SIZE && ble_key_size <= bte_appl_cfg.ble_max_key_size) { bte_appl_cfg.ble_min_key_size = ble_key_size; }{...} else { APPL_TRACE_ERROR("%s error:Invalid key size value, key_size =%d",__func__, ble_key_size); }{...} #endif/* ... */ ///SMP_INCLUDED == TRUE }{ ... } void bta_dm_co_ble_set_accept_auth_enable(UINT8 enable) { #if (SMP_INCLUDED == TRUE) if (enable) { enable = BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE; }{...} bte_appl_cfg.ble_accept_auth_enable = enable;/* ... */ #endif ///SMP_INCLUDED == TRUE }{ ... } UINT8 bta_dm_co_ble_get_accept_auth_enable(void) { #if (SMP_INCLUDED == TRUE) return bte_appl_cfg.ble_accept_auth_enable; #endif ///SMP_INCLUDED == TRUE return 0; }{ ... } UINT8 bta_dm_co_ble_get_auth_req(void) { #if (SMP_INCLUDED == TRUE) return bte_appl_cfg.ble_auth_req; #endif ///SMP_INCLUDED == TRUE return 0; }{ ... } void bta_dm_co_ble_oob_support(UINT8 enable) { #if (SMP_INCLUDED == TRUE) if (enable) { bte_appl_cfg.oob_support = BTM_BLE_OOB_ENABLE; }{...} else { bte_appl_cfg.oob_support = BTM_BLE_OOB_DISABLE; }{...} #endif/* ... */ ///SMP_INCLUDED == TRUE }{ ... } /* ... */#endif
Details
Show:
from
Types: Columns:
This file uses the notable symbols shown below. Click anywhere in the file to view more details.