2016-09-26 13:37:39 +00:00
|
|
|
/******************************************************************************
|
|
|
|
*
|
|
|
|
* Copyright (C) 2009-2012 Broadcom Corporation
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*
|
|
|
|
******************************************************************************/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
2018-04-08 04:10:50 +00:00
|
|
|
#include "bta/bta_api.h"
|
|
|
|
#include "bta/bta_sys.h"
|
|
|
|
#include "bta/bta_dm_co.h"
|
|
|
|
#include "bta/bta_dm_ci.h"
|
|
|
|
#include "btc/btc_dm.h"
|
2016-09-26 13:37:39 +00:00
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
2018-04-08 04:10:50 +00:00
|
|
|
#include "common/bt_defs.h"
|
2016-09-26 13:37:39 +00:00
|
|
|
#if (BTM_OOB_INCLUDED == TRUE)
|
|
|
|
#include "btif_dm.h"
|
|
|
|
#endif
|
|
|
|
#endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE && SMP_INCLUDED == TRUE)
|
2018-04-08 04:10:50 +00:00
|
|
|
#include "common/bte_appl.h"
|
2018-09-27 08:22:31 +00:00
|
|
|
|
|
|
|
#define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE 0
|
|
|
|
#define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE 1
|
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
tBTE_APPL_CFG bte_appl_cfg = {
|
2016-09-26 13:37:39 +00:00
|
|
|
#if SMP_INCLUDED == TRUE
|
|
|
|
BTA_LE_AUTH_REQ_SC_MITM_BOND, // Authentication requirements
|
|
|
|
#else
|
|
|
|
BTM_AUTH_SPGB_YES, // Authentication requirements
|
|
|
|
#endif
|
|
|
|
BTM_LOCAL_IO_CAPS_BLE,
|
|
|
|
BTM_BLE_INITIATOR_KEY_SIZE,
|
|
|
|
BTM_BLE_RESPONDER_KEY_SIZE,
|
2018-09-27 08:22:31 +00:00
|
|
|
BTM_BLE_MAX_KEY_SIZE,
|
|
|
|
BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE
|
2016-09-26 13:37:39 +00:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_get_compress_memory
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to get memory for compression
|
|
|
|
|
|
|
|
** Parameters id - BTA SYS ID
|
|
|
|
** memory_p - memory return by callout
|
|
|
|
** memory_size - memory size
|
|
|
|
**
|
|
|
|
** Returns TRUE for success, FALSE for fail.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
BOOLEAN bta_dm_co_get_compress_memory(tBTA_SYS_ID id, UINT8 **memory_p, UINT32 *memory_size)
|
|
|
|
{
|
|
|
|
UNUSED(id);
|
|
|
|
UNUSED(memory_p);
|
|
|
|
UNUSED(memory_size);
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_io_req
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to get IO capabilities
|
|
|
|
** of the local device for the Simple Pairing process
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
** *p_io_cap - The local Input/Output capabilities
|
|
|
|
** *p_oob_data - TRUE, if OOB data is available for the peer device.
|
|
|
|
** *p_auth_req - TRUE, if MITM protection is required.
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data,
|
|
|
|
tBTA_AUTH_REQ *p_auth_req, BOOLEAN is_orig)
|
|
|
|
{
|
|
|
|
UNUSED(bd_addr);
|
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
|
|
|
#if (BTM_OOB_INCLUDED == TRUE)
|
|
|
|
btif_dm_set_oob_for_io_req(p_oob_data);
|
|
|
|
#endif
|
|
|
|
btif_dm_proc_io_req(bd_addr, p_io_cap, p_oob_data, p_auth_req, is_orig);
|
|
|
|
#else
|
2017-05-07 12:01:45 +00:00
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_req: func not ported\n");
|
2016-09-26 13:37:39 +00:00
|
|
|
#endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_oob_data = %d", *p_oob_data);
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_io_cap = %d", *p_io_cap);
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_auth_req = %d", *p_auth_req);
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_req is_orig = %d", is_orig);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_io_rsp
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to report IO capabilities
|
|
|
|
** of the peer device for the Simple Pairing process
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
** io_cap - The remote Input/Output capabilities
|
|
|
|
** oob_data - TRUE, if OOB data is available for the peer device.
|
|
|
|
** auth_req - TRUE, if MITM protection is required.
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap,
|
|
|
|
tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req)
|
|
|
|
{
|
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
|
|
|
btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req);
|
|
|
|
#else
|
2017-05-07 12:01:45 +00:00
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_io_rsp: func not ported\n");
|
2016-09-26 13:37:39 +00:00
|
|
|
#endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_lk_upgrade
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to check if the
|
|
|
|
** platform wants allow link key upgrade
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
** *p_upgrade - TRUE, if link key upgrade is desired.
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade )
|
|
|
|
{
|
|
|
|
UNUSED(bd_addr);
|
|
|
|
UNUSED(p_upgrade);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if (BTM_OOB_INCLUDED == TRUE)
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_loc_oob
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to report the OOB
|
|
|
|
** data of the local device for the Simple Pairing process
|
|
|
|
**
|
|
|
|
** Parameters valid - TRUE, if the local OOB data is retrieved from LM
|
|
|
|
** c - Simple Pairing Hash C
|
|
|
|
** r - Simple Pairing Randomnizer R
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_loc_oob(BOOLEAN valid, BT_OCTET16 c, BT_OCTET16 r)
|
|
|
|
{
|
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_loc_oob, valid = %d", valid);
|
|
|
|
#ifdef BTIF_DM_OOB_TEST
|
|
|
|
btif_dm_proc_loc_oob(valid, c, r);
|
|
|
|
#endif
|
|
|
|
#else
|
2017-05-07 12:01:45 +00:00
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_loc_oob: func not ported\n");
|
2016-09-26 13:37:39 +00:00
|
|
|
#endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_rmt_oob
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to request the OOB
|
|
|
|
** data for the remote device for the Simple Pairing process
|
|
|
|
** Need to call bta_dm_ci_rmt_oob() in response
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_rmt_oob(BD_ADDR bd_addr)
|
|
|
|
{
|
|
|
|
BT_OCTET16 p_c;
|
|
|
|
BT_OCTET16 p_r;
|
|
|
|
BOOLEAN result = FALSE;
|
|
|
|
|
|
|
|
#ifdef BTIF_DM_OOB_TEST
|
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
|
|
|
result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r);
|
|
|
|
#else
|
2017-05-07 12:01:45 +00:00
|
|
|
BTIF_TRACE_DEBUG("bta_dm_rmt_oob: func not ported\n");
|
2016-09-26 13:37:39 +00:00
|
|
|
#endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */
|
|
|
|
#endif
|
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_rmt_oob: result=%d", result);
|
2016-09-26 13:37:39 +00:00
|
|
|
bta_dm_ci_rmt_oob(result, bd_addr, p_c, p_r);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* BTM_OOB_INCLUDED */
|
|
|
|
|
|
|
|
|
|
|
|
// REMOVE FOR BLUEDROID ?
|
|
|
|
|
|
|
|
#if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE)
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_le_io_key_req
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to get BLE key information
|
|
|
|
** before SMP pairing gets going.
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
** *p_max_key_size - max key size local device supported.
|
|
|
|
** *p_init_key - initiator keys.
|
|
|
|
** *p_resp_key - responder keys.
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size,
|
|
|
|
tBTA_LE_KEY_TYPE *p_init_key,
|
|
|
|
tBTA_LE_KEY_TYPE *p_resp_key )
|
|
|
|
{
|
|
|
|
UNUSED(bd_addr);
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-05-07 12:01:45 +00:00
|
|
|
BTIF_TRACE_DEBUG("##################################");
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_le_io_key_req: only setting max size to 16");
|
|
|
|
BTIF_TRACE_DEBUG("##################################");
|
2016-09-26 13:37:39 +00:00
|
|
|
*p_max_key_size = 16;
|
|
|
|
*p_init_key = *p_resp_key =
|
2016-11-24 18:10:15 +00:00
|
|
|
(BTA_LE_KEY_PENC | BTA_LE_KEY_PID | BTA_LE_KEY_PCSRK | BTA_LE_KEY_LENC | BTA_LE_KEY_LID | BTA_LE_KEY_LCSRK);
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2016-09-26 13:37:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_ble_local_key_reload
|
|
|
|
**
|
|
|
|
** Description This callout function is to load the local BLE keys if available
|
|
|
|
** on the device.
|
|
|
|
**
|
|
|
|
** Parameters none
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_ble_load_local_keys(tBTA_DM_BLE_LOCAL_KEY_MASK *p_key_mask, BT_OCTET16 er,
|
|
|
|
tBTA_BLE_LOCAL_ID_KEYS *p_id_keys)
|
|
|
|
{
|
|
|
|
#if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE)
|
|
|
|
BTIF_TRACE_DEBUG("##################################");
|
|
|
|
BTIF_TRACE_DEBUG("bta_dm_co_ble_load_local_keys: Load local keys if any are persisted");
|
|
|
|
BTIF_TRACE_DEBUG("##################################");
|
|
|
|
btif_dm_get_ble_local_keys( p_key_mask, er, p_id_keys);
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE
|
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-04-13 14:14:28 +00:00
|
|
|
btc_dm_get_ble_local_keys( p_key_mask, er, p_id_keys);
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2016-09-26 13:37:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
**
|
|
|
|
** Function bta_dm_co_ble_io_req
|
|
|
|
**
|
|
|
|
** Description This callout function is executed by DM to get BLE IO capabilities
|
|
|
|
** before SMP pairing gets going.
|
|
|
|
**
|
|
|
|
** Parameters bd_addr - The peer device
|
|
|
|
** *p_io_cap - The local Input/Output capabilities
|
|
|
|
** *p_oob_data - TRUE, if OOB data is available for the peer device.
|
|
|
|
** *p_auth_req - Auth request setting (Bonding and MITM required or not)
|
|
|
|
** *p_max_key_size - max key size local device supported.
|
|
|
|
** *p_init_key - initiator keys.
|
|
|
|
** *p_resp_key - responder keys.
|
|
|
|
**
|
|
|
|
** Returns void.
|
|
|
|
**
|
|
|
|
*******************************************************************************/
|
|
|
|
void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap,
|
|
|
|
tBTA_OOB_DATA *p_oob_data,
|
|
|
|
tBTA_LE_AUTH_REQ *p_auth_req,
|
|
|
|
UINT8 *p_max_key_size,
|
|
|
|
tBTA_LE_KEY_TYPE *p_init_key,
|
|
|
|
tBTA_LE_KEY_TYPE *p_resp_key )
|
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2016-09-26 13:37:39 +00:00
|
|
|
UNUSED(bd_addr);
|
|
|
|
/* if OOB is not supported, this call-out function does not need to do anything
|
|
|
|
* otherwise, look for the OOB data associated with the address and set *p_oob_data accordingly
|
|
|
|
* If the answer can not be obtained right away,
|
|
|
|
* set *p_oob_data to BTA_OOB_UNKNOWN and call bta_dm_ci_io_req() when the answer is available */
|
|
|
|
|
|
|
|
*p_oob_data = FALSE;
|
|
|
|
|
|
|
|
/* *p_auth_req by default is FALSE for devices with NoInputNoOutput; TRUE for other devices. */
|
|
|
|
|
2017-09-30 08:05:21 +00:00
|
|
|
*p_auth_req = bte_appl_cfg.ble_auth_req | (bte_appl_cfg.ble_auth_req & BTA_LE_AUTH_REQ_MITM) | ((*p_auth_req) & BTA_LE_AUTH_REQ_MITM);
|
2016-09-26 13:37:39 +00:00
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
if (bte_appl_cfg.ble_io_cap <= 4) {
|
2016-09-26 13:37:39 +00:00
|
|
|
*p_io_cap = bte_appl_cfg.ble_io_cap;
|
2016-11-24 18:10:15 +00:00
|
|
|
}
|
2016-09-26 13:37:39 +00:00
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
if (bte_appl_cfg.ble_init_key <= BTM_BLE_INITIATOR_KEY_SIZE) {
|
2016-09-26 13:37:39 +00:00
|
|
|
*p_init_key = bte_appl_cfg.ble_init_key;
|
2016-11-24 18:10:15 +00:00
|
|
|
}
|
2016-09-26 13:37:39 +00:00
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
if (bte_appl_cfg.ble_resp_key <= BTM_BLE_RESPONDER_KEY_SIZE) {
|
2016-09-26 13:37:39 +00:00
|
|
|
*p_resp_key = bte_appl_cfg.ble_resp_key;
|
2016-11-24 18:10:15 +00:00
|
|
|
}
|
2016-09-26 13:37:39 +00:00
|
|
|
|
2016-11-24 18:10:15 +00:00
|
|
|
if (bte_appl_cfg.ble_max_key_size > 7 && bte_appl_cfg.ble_max_key_size <= 16) {
|
2016-09-26 13:37:39 +00:00
|
|
|
*p_max_key_size = bte_appl_cfg.ble_max_key_size;
|
2016-11-24 18:10:15 +00:00
|
|
|
}
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2016-09-26 13:37:39 +00:00
|
|
|
}
|
|
|
|
|
2018-09-27 08:22:31 +00:00
|
|
|
void bta_dm_co_ble_set_io_cap(UINT8 ble_io_cap)
|
2017-04-13 14:14:28 +00:00
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-04-13 14:14:28 +00:00
|
|
|
if(ble_io_cap < BTM_IO_CAP_MAX ) {
|
|
|
|
bte_appl_cfg.ble_io_cap = ble_io_cap;
|
|
|
|
} else {
|
|
|
|
APPL_TRACE_ERROR("%s error:Invalid io cap value.",__func__);
|
|
|
|
}
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2017-04-13 14:14:28 +00:00
|
|
|
}
|
|
|
|
|
2018-09-27 08:22:31 +00:00
|
|
|
void bta_dm_co_ble_set_auth_req(UINT8 ble_auth_req)
|
2017-04-13 14:14:28 +00:00
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-04-13 14:14:28 +00:00
|
|
|
bte_appl_cfg.ble_auth_req = ble_auth_req;
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2017-04-13 14:14:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void bta_dm_co_ble_set_init_key_req(UINT8 init_key)
|
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-04-13 14:14:28 +00:00
|
|
|
init_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit
|
|
|
|
bte_appl_cfg.ble_init_key &= init_key;
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2017-04-13 14:14:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void bta_dm_co_ble_set_rsp_key_req(UINT8 rsp_key)
|
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-04-13 14:14:28 +00:00
|
|
|
rsp_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit
|
2017-11-26 21:24:21 +00:00
|
|
|
bte_appl_cfg.ble_resp_key &= rsp_key;
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2017-04-13 14:14:28 +00:00
|
|
|
}
|
2016-09-26 13:37:39 +00:00
|
|
|
|
2017-04-13 14:14:28 +00:00
|
|
|
void bta_dm_co_ble_set_max_key_size(UINT8 ble_key_size)
|
|
|
|
{
|
2017-04-18 02:53:43 +00:00
|
|
|
#if (SMP_INCLUDED == TRUE)
|
2017-08-08 08:51:18 +00:00
|
|
|
if(ble_key_size >= BTM_BLE_MIN_KEY_SIZE && ble_key_size <= BTM_BLE_MAX_KEY_SIZE) {
|
2017-04-13 14:14:28 +00:00
|
|
|
bte_appl_cfg.ble_max_key_size = ble_key_size;
|
|
|
|
} else {
|
|
|
|
APPL_TRACE_ERROR("%s error:Invalid key size value, key_size =%d",__func__, ble_key_size);
|
|
|
|
}
|
2017-04-18 02:53:43 +00:00
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
2017-04-13 14:14:28 +00:00
|
|
|
}
|
2018-09-27 08:22:31 +00:00
|
|
|
|
|
|
|
void bta_dm_co_ble_set_accept_auth_enable(UINT8 enable)
|
|
|
|
{
|
|
|
|
#if (SMP_INCLUDED == TRUE)
|
|
|
|
if (enable) {
|
|
|
|
enable = BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE;
|
|
|
|
}
|
|
|
|
bte_appl_cfg.ble_accept_auth_enable = enable;
|
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
|
|
|
}
|
|
|
|
|
|
|
|
UINT8 bta_dm_co_ble_get_accept_auth_enable(void)
|
|
|
|
{
|
|
|
|
#if (SMP_INCLUDED == TRUE)
|
|
|
|
return bte_appl_cfg.ble_accept_auth_enable;
|
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
UINT8 bta_dm_co_ble_get_auth_req(void)
|
|
|
|
{
|
|
|
|
#if (SMP_INCLUDED == TRUE)
|
|
|
|
return bte_appl_cfg.ble_auth_req;
|
|
|
|
#endif ///SMP_INCLUDED == TRUE
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-09-26 13:37:39 +00:00
|
|
|
#endif
|
|
|
|
|