304 Commits

Author SHA1 Message Date
matthias.ringwald@gmail.com
2126dff7b6 fix example compile 2014-01-04 20:49:46 +00:00
matthias.ringwald@gmail.com
f4220df52c switch to rpetrich's theos fork for now, build armv6+arm64 binaries 2014-01-04 20:37:31 +00:00
matthias.ringwald@gmail.com
679c88d115 split packet handler into sm_event_packet_handler and app_packet_handler 2014-01-03 20:12:49 +00:00
matthias.ringwald@gmail.com
c0712fc68a start sorting Security Manager code 2014-01-03 19:19:37 +00:00
matthias.ringwald@gmail.com
5820a0e7ca signed write should be working 2014-01-02 23:02:04 +00:00
matthias.ringwald@gmail.com
69eb61b2f0 added callback to sm_cmac_start, handle cmac complete in att handler, validate signature counter, update signature counter 2014-01-02 22:40:26 +00:00
matthias.ringwald@gmail.com
3aa9c8727a get CSRK from Central Device DB 2014-01-02 22:02:59 +00:00
matthias.ringwald@gmail.com
674bf319ae added code removed prematurley 2014-01-02 21:45:18 +00:00
matthias.ringwald@gmail.com
75d58b6577 use address type and address from HCI 2014-01-02 21:42:21 +00:00
matthias.ringwald@gmail.com
5f7d6dec88 remove unused code 2014-01-02 21:10:06 +00:00
matthias.ringwald@gmail.com
ae829d8f67 identify non-resolvable private address by means of Indentity Resolving Key 2014-01-02 19:48:31 +00:00
matthias.ringwald@gmail.com
21b4066797 store bonding info in central device db 2014-01-01 23:21:02 +00:00
matthias.ringwald@gmail.com
0cc354176a also store IRK 2014-01-01 22:28:09 +00:00
matthias.ringwald@gmail.com
d5e21d27a0 sketched API for a central device persistent db 2014-01-01 22:23:19 +00:00
matthias.ringwald@gmail.com
d5359ecc0b fix typo 2014-01-01 20:46:25 +00:00
matthias.ringwald@gmail.com
f781679a14 remove c aes128 code 2014-01-01 20:05:39 +00:00
matthias.ringwald@gmail.com
bf764d2b4f store encryption size in 4 lowest bis of s_rand if max != min ecnryption size to get along without explicit remote device db 2014-01-01 19:58:34 +00:00
matthias.ringwald@gmail.com
1664d53b41 use 16 as min/max encryption size, use fixed encryption size for re-connections 2014-01-01 19:42:17 +00:00
matthias.ringwald@gmail.com
cb220d641c use #defines 2013-12-28 10:36:44 +00:00
matthias.ringwald@gmail.com
c0cb54544a fix value of SM_AUTHREQ_MITM_PROTECTION 2013-12-27 23:28:08 +00:00
matthias.ringwald@gmail.com
6413c62205 cache ATT Server Request instead of ATT Server Response to allow for signed write signature validation 2013-12-22 23:03:06 +00:00
matthias.ringwald@gmail.com
c934fd0d78 calculate CMAC using AES128 engine 2013-12-22 00:00:14 +00:00
matthias.ringwald@gmail.com
6ebbe91aaf return full MAC 2013-12-21 22:31:22 +00:00
matthias.ringwald@gmail.com
29634d544e use latest cc2564 init script 2013-12-21 22:31:04 +00:00
matthias.ringwald@gmail.com
f9a84882e4 added CLIENT_CONFIGURATION to test profile 2013-12-21 22:30:34 +00:00
matthias.ringwald@gmail.com
3624b7d954 CMAC implementation finished and tested 2013-12-21 21:47:03 +00:00
matthias.ringwald@gmail.com
0dfc5dea2b start implementing CMAC for signed writes, first step: generate subkeys 2013-12-21 21:01:18 +00:00
matthias.ringwald@gmail.com
10297a1983 generate resolvable and non-resolvable random addresses 2013-12-20 20:40:38 +00:00
matthias.ringwald@gmail.com
2b7ae8fa57 add gap_random_adress_set_mode() to start/stop/choose type of random private adress 2013-12-20 20:14:21 +00:00
matthias.ringwald@gmail.com
9012c5085a added sm_register_packet_handler to allow for user interaction during bonding 2013-12-19 23:26:45 +00:00
matthias.ringwald@gmail.com
ec1531682d first implementation of random adresses 2013-12-13 22:24:49 +00:00
matthias.ringwald@gmail.com
219e15bf19 provided API to enable random address updates / privacy 2013-12-13 21:25:53 +00:00
matthias.ringwald@gmail.com
0ea4fcb96d extracted sm_aes128_start to trigger aes128 operation 2013-12-13 20:54:43 +00:00
matthias.ringwald@gmail.com
2ff0111162 moved sm_d1 to other aes128 c implementation only functions 2013-12-13 20:46:02 +00:00
matthias.ringwald@gmail.com
7f767c8433 remove DHK calculation from LTK calc path 2013-12-13 20:42:05 +00:00
matthias.ringwald@gmail.com
25815557c1 also calculate DHK durign startup 2013-12-13 20:34:28 +00:00
matthias.ringwald@gmail.com
833c40cbea calculate IRK after HCI startup 2013-12-13 20:25:27 +00:00
matthias.ringwald@gmail.com
f5a7b8eea0 protect aes128 engine with mutex 2013-12-13 17:37:25 +00:00
mila@ringwald.ch
04118274b2 ble client: query charcteristic draft implementation 2013-12-09 09:53:45 +00:00
matthias.ringwald@gmail.com
29ebd0071f use min encrytion key size, truncate key before using or distribution 2013-12-06 22:19:32 +00:00
matthias.ringwald@gmail.com
fd4c6f057c assert max encryption size above our minimum 2013-12-06 16:15:22 +00:00
matthias.ringwald@gmail.com
ae8cec9a27 use configurable max encrypted key size 2013-12-06 16:11:46 +00:00
matthias.ringwald@gmail.com
af11092cb3 add setters for max/min encrypted key size 2013-12-06 16:10:01 +00:00
matthias.ringwald@gmail.com
51c0b90d25 added sm_set_accepted_stk_generation_method and checks to abort pairing if resulting method is not listed 2013-12-06 14:00:33 +00:00
matthias.ringwald@gmail.com
e6691d32ca use Initiator No MITM AND Responder No MITM => Just Works 2013-12-06 13:36:34 +00:00
matthias.ringwald@gmail.com
a93c825714 assert correct state before handing SM PDUs 2013-12-06 11:05:03 +00:00
mila@ringwald.ch
68494c4897 ble client: get charachteristics from included services with max search depth predefined 2013-12-05 09:29:19 +00:00
matthias.ringwald@gmail.com
3462f8724a add sm_set_authentication_requirements to request bonding 2013-11-29 23:44:12 +00:00
matthias.ringwald@gmail.com
3e1e0aede8 fix confirm calculation 2013-11-29 23:14:01 +00:00
matthias.ringwald@gmail.com
9383decc66 store sm_s_stk in sm_s_ltk 2013-11-29 22:53:26 +00:00