2180 Commits

Author SHA1 Message Date
matthias.ringwald@gmail.com
61f369be3c basic l2cap test tool 2014-01-22 23:29:16 +00:00
matthias.ringwald@gmail.com
0e37e41729 added l2cap_send_echo_request with fixed sig id 2014-01-22 22:59:55 +00:00
matthias.ringwald@gmail.com
9644a07dd9 funny example to bond with all devices found 2014-01-22 22:38:52 +00:00
matthias.ringwald@gmail.com
bd03b42fda added gap_inquiry 2014-01-22 22:25:56 +00:00
matthias.ringwald@gmail.com
a684d8b953 show numeric value, use BTstack SPP Counter 2014-01-22 22:17:51 +00:00
matthias.ringwald
ce5a7b2028 use libusb from /usr/local 2014-01-22 14:00:23 +00:00
matthias.ringwald@gmail.com
9e61646f3e added hci_set_class_of_device 2014-01-19 17:44:56 +00:00
matthias.ringwald@gmail.com
ffb495ea4a replace sprintf with custom loop 2014-01-19 17:38:12 +00:00
matthias.ringwald@gmail.com
2e97921ee0 only compile SDP DES Dump functionality if SDP_DES_DUMP is defined 2014-01-19 17:23:08 +00:00
matthias.ringwald@gmail.com
c42e2ff226 clear ATT and SM protocol handlers on l2cap_init() 2014-01-19 17:14:03 +00:00
matthias.ringwald@gmail.com
3a9fb326c0 alloc hci_stack structure if malloc is provided - reduces static memory consumption and saves RAM if BTstack isn't activated 2014-01-19 16:59:02 +00:00
matthias.ringwald@gmail.com
bde315ce6c renamed btstack config.h to btstack-config.h to allow for better integration with other projects 2014-01-19 16:45:57 +00:00
matthias.ringwald@gmail.com
f471afd896 replaced #pragma once with old style #include guards to allow use of older compilers 2014-01-19 16:30:17 +00:00
matthias.ringwald@gmail.com
63048403cc use SSP_IO_AUTHREQ_MITM_PROTECTION_NOT_REQUIRED_GENERAL_BONDING as default 2014-01-19 15:08:44 +00:00
matthias.ringwald@gmail.com
9faad3ab0d don't modify ssp auth req for gap_request_security_level 2014-01-19 15:06:35 +00:00
matthias.ringwald@gmail.com
106d6d11cb don't modify ssp authreq for dedicated bonding 2014-01-19 15:04:04 +00:00
matthias.ringwald@gmail.com
ad83dc6a89 support dedicated bonding and provide example for it 2014-01-18 20:23:15 +00:00
matthias.ringwald@gmail.com
6724cd9e0e track legacy and ssp pairing, new implementation for hci_authentication_active_for_handle based on that 2014-01-17 19:28:03 +00:00
matthias.ringwald@gmail.com
899283eaa9 rename HANDLE_PIN_CODE_REQUEST TO DENY_PIN_CODE_REQUEST 2014-01-17 19:11:53 +00:00
matthias.ringwald@gmail.com
b5cb6874c1 don't send encryption command if authentication failed 2014-01-17 16:32:54 +00:00
matthias.ringwald@gmail.com
df3354fc67 if both devices support SSP, initiator shall setup unauthenticated link unless connecting to SDP 2014-01-17 16:30:31 +00:00
matthias.ringwald@gmail.com
f01ad3fb0d allow to set rfcomm security level with rfcomm_set_required_security_level 2014-01-17 14:25:13 +00:00
matthias.ringwald@gmail.com
62f901df97 add security level to l2cap service registration 2014-01-17 13:58:37 +00:00
matthias.ringwald@gmail.com
fb8ba0dbcd GAP update to higher security level working 2014-01-17 12:01:32 +00:00
matthias.ringwald@gmail.com
1eb2563e8a reject l2cap connection if secruity level not reached after auhentication 2014-01-17 11:33:22 +00:00
matthias.ringwald@gmail.com
a00031e215 successfully enable encryption if security level 2 is requested for l2cap service 2014-01-17 10:37:42 +00:00
matthias.ringwald@gmail.com
dce7800923 allow to send connection encryption command 2014-01-17 09:45:07 +00:00
matthias.ringwald@gmail.com
34d2123c9e fix sending of Connection Result - Pending, request authentication if security level isn't enough 2014-01-17 09:30:07 +00:00
matthias.ringwald@gmail.com
ea8b28d601 fix compile 2014-01-17 08:41:36 +00:00
matthias.ringwald@gmail.com
9382667d3f store connection handle on connection complete, don't reset authorization flag on encryption change 2014-01-17 07:58:30 +00:00
matthias.ringwald@gmail.com
f85a9399b2 request security level 0 for l2cap services 2014-01-16 23:15:21 +00:00
matthias.ringwald@gmail.com
2bd8b7e7f3 reject connection (0x03 security block) if both have SSP, PSM != SDP, and connection is not ecncrypted 2014-01-16 22:42:21 +00:00
matthias.ringwald@gmail.com
e00caf9ce9 fix handling of IO Capability Request if non-bondable 2014-01-16 21:36:05 +00:00
matthias.ringwald@gmail.com
ad67156049 use state_var to store Connection Pending task 2014-01-16 20:11:45 +00:00
matthias.ringwald@gmail.com
fd48b8f79d send l2cap connection response pending if accept/deny isn't instant 2014-01-16 19:55:00 +00:00
matthias.ringwald@gmail.com
3c68dfa952 implemented gap_security_level getter 2014-01-16 19:43:21 +00:00
matthias.ringwald@gmail.com
9ab95c9023 use link_key_type_t as defined in Link Notification Event 2014-01-16 19:12:38 +00:00
matthias.ringwald@gmail.com
536f9994f0 track link keys from PIN request as authenticated 2014-01-16 18:19:38 +00:00
matthias.ringwald@gmail.com
34f9eab8a3 list gap security rqeuirements 2014-01-16 18:18:58 +00:00
matthias.ringwald@gmail.com
c77e88389f add link_key_type to remote device db using LINK_KEY_TYPE_UNAUTHENTICATED as default 2014-01-16 17:52:22 +00:00
matthias.ringwald@gmail.com
7fb4c304ce define link_key_type_t 2014-01-16 17:51:30 +00:00
matthias.ringwald@gmail.com
f0944df2d0 track encryption status 2014-01-16 16:16:28 +00:00
matthias.ringwald@gmail.com
cb230b9da5 prototype gap security level API 2014-01-16 15:53:36 +00:00
matthias.ringwald@gmail.com
afd4e962dc read remote supported features and check for SSP on new connections 2014-01-16 14:47:36 +00:00
matthias.ringwald@gmail.com
f8fb5f6e47 respond with hci_io_capability_request_negative_reply in non-bondable mode to io cap request 2014-01-16 11:39:34 +00:00
matthias.ringwald@gmail.com
4c57c146cc respond with pin code negative reply if in non-bondable mode 2014-01-16 11:17:17 +00:00
matthias.ringwald@gmail.com
74d716b5f5 answer link key request in non-bonadable mode 2014-01-16 11:07:39 +00:00
matthias.ringwald@gmail.com
458bf4e848 add bondable flag to hci and provide gap_set_bondable_mode 2014-01-16 10:58:52 +00:00
matthias.ringwald@gmail.com
cfe3d8e0db fix compile with clang 2014-01-14 19:33:00 +00:00
matthias.ringwald
411360027a use fixed size array for RFCOMM Test Response 2014-01-14 10:28:10 +00:00