diff options
| author | Ilya Zhuravlev <whatever@xyz.is> | 2022-07-11 18:29:50 -0600 |
|---|---|---|
| committer | Ilya Zhuravlev <whatever@xyz.is> | 2022-07-11 18:40:32 -0600 |
| commit | fde0c10baed61e99abd026bfefee485262b57c2d (patch) | |
| tree | 0b2f220cfe17a2168f0e60ecbb0299a00ca46a56 /quantum/process_keycode/process_secure.c | |
| parent | b37649af364ce4c827e9b32bb1f745c12f0ef984 (diff) | |
| parent | 2714c70bd774489f039b7c60a2f8634a64ff40c3 (diff) | |
Merge remote-tracking branch 'qmk/master' into merge-2022-07-11
Diffstat (limited to 'quantum/process_keycode/process_secure.c')
| -rw-r--r-- | quantum/process_keycode/process_secure.c | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/quantum/process_keycode/process_secure.c b/quantum/process_keycode/process_secure.c new file mode 100644 index 0000000000..3224104c99 --- /dev/null +++ b/quantum/process_keycode/process_secure.c @@ -0,0 +1,45 @@ +// Copyright 2022 QMK +// SPDX-License-Identifier: GPL-2.0-or-later + +#include "secure.h" +#include "process_secure.h" +#include "quantum_keycodes.h" + +bool preprocess_secure(uint16_t keycode, keyrecord_t *record) { + if (secure_is_unlocking()) { + // !pressed will trigger on any already held keys (such as layer keys), + // and cause the request secure check to prematurely fail. + if (record->event.pressed) { + secure_keypress_event(record->event.key.row, record->event.key.col); + } + + // Normal keypresses should be disabled until the sequence is completed + return false; + } + + return true; +} + +bool process_secure(uint16_t keycode, keyrecord_t *record) { +#ifndef SECURE_DISABLE_KEYCODES + if (!record->event.pressed) { + if (keycode == SECURE_LOCK) { + secure_lock(); + return false; + } + if (keycode == SECURE_UNLOCK) { + secure_unlock(); + return false; + } + if (keycode == SECURE_TOGGLE) { + secure_is_locked() ? secure_unlock() : secure_lock(); + return false; + } + if (keycode == SECURE_REQUEST) { + secure_request_unlock(); + return false; + } + } +#endif + return true; +} |
