Bluetooth: Mesh: Inclusive terminology
Implements the Bluetooth appropriate language mapping for the Bluetooth
mesh subsystem.
Changes the following terms:
- Master security credentials -> Flooding security credentials
- Whitelist filter -> Accept filter
- Blacklist filter -> Reject filter
- Removes CDB's NODE_BLACKLISTED, which was not in use.
Signed-off-by: Trond Einar Snekvik <Trond.Einar.Snekvik@nordicsemi.no>
diff --git a/include/bluetooth/mesh/cdb.h b/include/bluetooth/mesh/cdb.h
index 9bae861..219b23a 100644
--- a/include/bluetooth/mesh/cdb.h
+++ b/include/bluetooth/mesh/cdb.h
@@ -25,7 +25,6 @@
enum {
BT_MESH_CDB_NODE_CONFIGURED,
- BT_MESH_CDB_NODE_BLACKLISTED,
BT_MESH_CDB_NODE_FLAG_COUNT
};
diff --git a/subsys/bluetooth/mesh/friend.c b/subsys/bluetooth/mesh/friend.c
index 4d533c1..20459d6 100644
--- a/subsys/bluetooth/mesh/friend.c
+++ b/subsys/bluetooth/mesh/friend.c
@@ -461,14 +461,14 @@
}
static int encrypt_friend_pdu(struct bt_mesh_friend *frnd, struct net_buf *buf,
- bool master_cred)
+ bool flooding_cred)
{
const struct bt_mesh_net_cred *cred;
uint32_t iv_index;
uint16_t src;
int err;
- if (master_cred) {
+ if (flooding_cred) {
cred = &frnd->subnet->keys[SUBNET_KEY_TX_IDX(frnd->subnet)]
.msg;
} else {
diff --git a/subsys/bluetooth/mesh/gatt_services.c b/subsys/bluetooth/mesh/gatt_services.c
index 0a03ba8..02eb28e 100644
--- a/subsys/bluetooth/mesh/gatt_services.c
+++ b/subsys/bluetooth/mesh/gatt_services.c
@@ -88,8 +88,8 @@
uint16_t filter[CONFIG_BT_MESH_PROXY_FILTER_SIZE];
enum __packed {
NONE,
- WHITELIST,
- BLACKLIST,
+ ACCEPT,
+ REJECT,
PROV,
} filter_type;
#if defined(CONFIG_BT_MESH_GATT_PROXY)
@@ -180,11 +180,11 @@
switch (type) {
case 0x00:
(void)memset(client->filter, 0, sizeof(client->filter));
- client->filter_type = WHITELIST;
+ client->filter_type = ACCEPT;
break;
case 0x01:
(void)memset(client->filter, 0, sizeof(client->filter));
- client->filter_type = BLACKLIST;
+ client->filter_type = REJECT;
break;
default:
BT_WARN("Prohibited Filter Type 0x%02x", type);
@@ -256,7 +256,7 @@
net_buf_simple_add_u8(buf, CFG_FILTER_STATUS);
- if (client->filter_type == WHITELIST) {
+ if (client->filter_type == ACCEPT) {
net_buf_simple_add_u8(buf, 0x00);
} else {
net_buf_simple_add_u8(buf, 0x01);
@@ -666,7 +666,7 @@
__ASSERT(client, "No client for connection");
if (client->filter_type == NONE) {
- client->filter_type = WHITELIST;
+ client->filter_type = ACCEPT;
k_work_submit(&client->send_beacons);
}
@@ -714,7 +714,7 @@
for (i = 0; i < ARRAY_SIZE(clients); i++) {
if (clients[i].cli.conn) {
- clients[i].filter_type = WHITELIST;
+ clients[i].filter_type = ACCEPT;
}
}
@@ -730,8 +730,8 @@
for (i = 0; i < ARRAY_SIZE(clients); i++) {
struct bt_mesh_proxy_client *client = &clients[i];
- if (client->cli.conn && (client->filter_type == WHITELIST ||
- client->filter_type == BLACKLIST)) {
+ if (client->cli.conn && (client->filter_type == ACCEPT ||
+ client->filter_type == REJECT)) {
client->filter_type = NONE;
bt_conn_disconnect(client->cli.conn,
BT_HCI_ERR_REMOTE_USER_TERM_CONN);
@@ -766,9 +766,9 @@
BT_DBG("filter_type %u addr 0x%04x", client->filter_type, addr);
- if (client->filter_type == WHITELIST) {
+ if (client->filter_type == ACCEPT) {
filter_add(client, addr);
- } else if (client->filter_type == BLACKLIST) {
+ } else if (client->filter_type == REJECT) {
filter_remove(client, addr);
}
}
@@ -780,7 +780,7 @@
BT_DBG("filter_type %u addr 0x%04x", client->filter_type, addr);
- if (client->filter_type == BLACKLIST) {
+ if (client->filter_type == REJECT) {
for (i = 0; i < ARRAY_SIZE(client->filter); i++) {
if (client->filter[i] == addr) {
return false;
@@ -794,7 +794,7 @@
return true;
}
- if (client->filter_type == WHITELIST) {
+ if (client->filter_type == ACCEPT) {
for (i = 0; i < ARRAY_SIZE(client->filter); i++) {
if (client->filter[i] == addr) {
return true;
diff --git a/subsys/bluetooth/mesh/lpn.c b/subsys/bluetooth/mesh/lpn.c
index ab41d26..684099e 100644
--- a/subsys/bluetooth/mesh/lpn.c
+++ b/subsys/bluetooth/mesh/lpn.c
@@ -992,7 +992,7 @@
if (!lpn->established) {
/* This is normally checked on the transport layer, however
- * in this state we're also still accepting master
+ * in this state we're also still accepting flooding
* credentials so we need to ensure the right ones (Friend
* Credentials) were used for this message.
*/
diff --git a/subsys/bluetooth/mesh/net.c b/subsys/bluetooth/mesh/net.c
index 31603c4..79aa9d7 100644
--- a/subsys/bluetooth/mesh/net.c
+++ b/subsys/bluetooth/mesh/net.c
@@ -698,7 +698,7 @@
}
/* When the Friend node relays message for lpn, the message will be
- * retransmitted using the managed master security credentials and
+ * retransmitted using the managed flooding security credentials and
* the Network PDU shall be retransmitted to all network interfaces.
*/
if (IS_ENABLED(CONFIG_BT_MESH_GATT_PROXY) &&