62 Commits

Author SHA1 Message Date
matthias.ringwald@gmail.com
e6691d32ca use Initiator No MITM AND Responder No MITM => Just Works 2013-12-06 13:36:34 +00:00
matthias.ringwald@gmail.com
a93c825714 assert correct state before handing SM PDUs 2013-12-06 11:05:03 +00:00
matthias.ringwald@gmail.com
3462f8724a add sm_set_authentication_requirements to request bonding 2013-11-29 23:44:12 +00:00
matthias.ringwald@gmail.com
3e1e0aede8 fix confirm calculation 2013-11-29 23:14:01 +00:00
matthias.ringwald@gmail.com
9383decc66 store sm_s_stk in sm_s_ltk 2013-11-29 22:53:26 +00:00
matthias.ringwald@gmail.com
eabb4ec387 sort vars 2013-11-29 22:19:10 +00:00
matthias.ringwald@gmail.com
9b80a8b850 replaced individual vars for key distribution with single set variable 2013-11-29 22:05:35 +00:00
matthias.ringwald@gmail.com
78390e1e97 fix set of keys to distribute 2013-11-29 21:52:00 +00:00
matthias.ringwald@gmail.com
8c2a45628d add comment on master=intiator, slave=responder 2013-11-29 21:45:43 +00:00
matthias.ringwald@gmail.com
e79a28b681 sort code a bit 2013-11-29 21:27:56 +00:00
matthias.ringwald@gmail.com
5b768555c5 add sm_set_request_security to toggle security request from responding device 2013-11-29 21:15:13 +00:00
matthias.ringwald@gmail.com
08066884c0 add SMP Timeout 2013-11-29 20:57:55 +00:00
matthias.ringwald@gmail.com
f556090f1c add functions to accept, decline, and return passkey 2013-11-29 13:57:12 +00:00
matthias.ringwald@gmail.com
8225f33562 add event types for security manager events, define sm_event_t 2013-11-29 11:43:49 +00:00
matthias.ringwald@gmail.com
63360865c4 added sm_set_io_capability 2013-11-29 11:09:40 +00:00
matthias.ringwald@gmail.com
e6810e9947 send sm_persistent_irk during key distribution 2013-11-29 10:47:58 +00:00
matthias.ringwald@gmail.com
86452e281a enable key distribution again, check for empty ediv and random in ltk request, work around sending set advertise enable twice in a row 2013-11-29 10:38:59 +00:00
matthias.ringwald@gmail.com
7c514653f2 add io_capability_t enumeration 2013-11-28 22:16:28 +00:00
matthias.ringwald@gmail.com
45bd1e2497 handle unknown io capabilities 2013-11-28 21:23:01 +00:00
matthias.ringwald@gmail.com
c64f33c72c add printf when app should display/hide passkey 2013-11-28 21:17:20 +00:00
matthias.ringwald@gmail.com
6585cf39bf generate passkey 0-999999 if we need to display it 2013-11-28 21:13:49 +00:00
matthias.ringwald@gmail.com
1bebac1147 implement stk generation method decision 2013-11-28 20:19:21 +00:00
matthias.ringwald@gmail.com
98dc099930 only use OOB if initiator also indicates that it has OOB data 2013-11-28 15:50:00 +00:00
matthias.ringwald@gmail.com
03435b99d8 added 'get oob data' callback support 2013-11-28 15:34:11 +00:00
matthias.ringwald@gmail.com
1573cd5f74 move key distribution into explicit state, use state for send security request and send pairing failed 2013-11-16 22:49:43 +00:00
matthias.ringwald@gmail.com
fb0d10171a use state for send pairing failed 2013-11-16 22:35:25 +00:00
matthias.ringwald@gmail.com
09e2372ddd add state for sending pairing response and remove generic response buffer 2013-11-16 22:29:08 +00:00
matthias.ringwald@gmail.com
d0cd2e022f add swap64, extract swapX, fix endianess for all keys used in SM PDUs 2013-11-16 22:17:17 +00:00
matthias.ringwald@gmail.com
6d9fe37763 also calculate IRK during bonding 2013-11-16 21:32:57 +00:00
matthias.ringwald@gmail.com
e2b20dde9e use print_key and print_hex16, move code not needed for final aes128 engine toward the end 2013-11-12 23:22:31 +00:00
matthias.ringwald@gmail.com
0d64013b1f use aes128 engine for setup of previously established ltk and ediv 2013-11-12 23:01:05 +00:00
matthias.ringwald@gmail.com
d09da6b9a8 use aes128 engine for dhk, y, ediv, ltk calculation after bonding 2013-11-12 22:36:13 +00:00
matthias.ringwald@gmail.com
0573ccc143 calc s1 using aes128 engine 2013-11-12 19:41:31 +00:00
matthias.ringwald@gmail.com
70ddf9cf63 use aes128 engine for c1 calculation of master and slave 2013-11-11 23:11:16 +00:00
matthias.ringwald@gmail.com
63dbd537f8 use aes128 engine to calculat sm_s_confirm 2013-11-11 22:47:28 +00:00
matthias.ringwald@gmail.com
9168dfeb6e extract sm_c1_t3 in preparation to use AES128 engine 2013-11-11 21:45:29 +00:00
matthias.ringwald@gmail.com
eb71d41a8d extract sm_c1_t1 in preparation to use AES128 engine 2013-11-11 21:38:07 +00:00
matthias.ringwald@gmail.com
552dcccdf8 remove unused le_rand command 2013-11-11 21:08:37 +00:00
matthias.ringwald@gmail.com
fceccb23c6 sm_s1 returns big endian, too 2013-11-10 00:08:52 +00:00
matthias.ringwald@gmail.com
bca65ea822 adapt sm_s1 to use big endian r1 and r2 2013-11-09 23:52:17 +00:00
matthias.ringwald@gmail.com
45c3b63f47 store m/s_random as big endian 2013-11-09 23:31:39 +00:00
matthias.ringwald@gmail.com
125e483a63 sort endianess in sm_c1 2013-11-09 23:20:11 +00:00
matthias.ringwald@gmail.com
311a7e6675 basic pairing with key distribution and reconnects mostly works 2013-11-09 22:14:32 +00:00
matthias.ringwald@gmail.com
07b7ce8880 implemented all security mangager crypto functions 2013-11-09 19:59:05 +00:00
matthias.ringwald@gmail.com
c686dfc823 added diversification function d1 2013-11-08 21:12:51 +00:00
matthias.ringwald@gmail.com
dadf87d336 calculate and send s_confirm 2013-11-08 15:31:09 +00:00
matthias.ringwald@gmail.com
0e1aa0ece6 validate m_confirm 2013-11-08 15:18:45 +00:00
matthias.ringwald@gmail.com
3eaa957fae added second test for confirm value, correct calculation of Mconfirm 2013-11-08 14:40:49 +00:00
matthias.ringwald@gmail.com
691fc7bb7d start calculation Srandom 2013-11-01 21:50:43 +00:00
matthias.ringwald@gmail.com
ebf961b51d added sm_c1 for confirm value 2013-11-01 17:54:33 +00:00