76 Commits

Author SHA1 Message Date
matthias.ringwald@gmail.com
9012c5085a added sm_register_packet_handler to allow for user interaction during bonding 2013-12-19 23:26:45 +00:00
matthias.ringwald@gmail.com
ec1531682d first implementation of random adresses 2013-12-13 22:24:49 +00:00
matthias.ringwald@gmail.com
219e15bf19 provided API to enable random address updates / privacy 2013-12-13 21:25:53 +00:00
matthias.ringwald@gmail.com
0ea4fcb96d extracted sm_aes128_start to trigger aes128 operation 2013-12-13 20:54:43 +00:00
matthias.ringwald@gmail.com
2ff0111162 moved sm_d1 to other aes128 c implementation only functions 2013-12-13 20:46:02 +00:00
matthias.ringwald@gmail.com
7f767c8433 remove DHK calculation from LTK calc path 2013-12-13 20:42:05 +00:00
matthias.ringwald@gmail.com
25815557c1 also calculate DHK durign startup 2013-12-13 20:34:28 +00:00
matthias.ringwald@gmail.com
833c40cbea calculate IRK after HCI startup 2013-12-13 20:25:27 +00:00
matthias.ringwald@gmail.com
f5a7b8eea0 protect aes128 engine with mutex 2013-12-13 17:37:25 +00:00
matthias.ringwald@gmail.com
29ebd0071f use min encrytion key size, truncate key before using or distribution 2013-12-06 22:19:32 +00:00
matthias.ringwald@gmail.com
fd4c6f057c assert max encryption size above our minimum 2013-12-06 16:15:22 +00:00
matthias.ringwald@gmail.com
ae8cec9a27 use configurable max encrypted key size 2013-12-06 16:11:46 +00:00
matthias.ringwald@gmail.com
af11092cb3 add setters for max/min encrypted key size 2013-12-06 16:10:01 +00:00
matthias.ringwald@gmail.com
51c0b90d25 added sm_set_accepted_stk_generation_method and checks to abort pairing if resulting method is not listed 2013-12-06 14:00:33 +00:00
matthias.ringwald@gmail.com
e6691d32ca use Initiator No MITM AND Responder No MITM => Just Works 2013-12-06 13:36:34 +00:00
matthias.ringwald@gmail.com
a93c825714 assert correct state before handing SM PDUs 2013-12-06 11:05:03 +00:00
matthias.ringwald@gmail.com
3462f8724a add sm_set_authentication_requirements to request bonding 2013-11-29 23:44:12 +00:00
matthias.ringwald@gmail.com
3e1e0aede8 fix confirm calculation 2013-11-29 23:14:01 +00:00
matthias.ringwald@gmail.com
9383decc66 store sm_s_stk in sm_s_ltk 2013-11-29 22:53:26 +00:00
matthias.ringwald@gmail.com
eabb4ec387 sort vars 2013-11-29 22:19:10 +00:00
matthias.ringwald@gmail.com
9b80a8b850 replaced individual vars for key distribution with single set variable 2013-11-29 22:05:35 +00:00
matthias.ringwald@gmail.com
78390e1e97 fix set of keys to distribute 2013-11-29 21:52:00 +00:00
matthias.ringwald@gmail.com
8c2a45628d add comment on master=intiator, slave=responder 2013-11-29 21:45:43 +00:00
matthias.ringwald@gmail.com
e79a28b681 sort code a bit 2013-11-29 21:27:56 +00:00
matthias.ringwald@gmail.com
5b768555c5 add sm_set_request_security to toggle security request from responding device 2013-11-29 21:15:13 +00:00
matthias.ringwald@gmail.com
08066884c0 add SMP Timeout 2013-11-29 20:57:55 +00:00
matthias.ringwald@gmail.com
f556090f1c add functions to accept, decline, and return passkey 2013-11-29 13:57:12 +00:00
matthias.ringwald@gmail.com
8225f33562 add event types for security manager events, define sm_event_t 2013-11-29 11:43:49 +00:00
matthias.ringwald@gmail.com
63360865c4 added sm_set_io_capability 2013-11-29 11:09:40 +00:00
matthias.ringwald@gmail.com
e6810e9947 send sm_persistent_irk during key distribution 2013-11-29 10:47:58 +00:00
matthias.ringwald@gmail.com
86452e281a enable key distribution again, check for empty ediv and random in ltk request, work around sending set advertise enable twice in a row 2013-11-29 10:38:59 +00:00
matthias.ringwald@gmail.com
7c514653f2 add io_capability_t enumeration 2013-11-28 22:16:28 +00:00
matthias.ringwald@gmail.com
45bd1e2497 handle unknown io capabilities 2013-11-28 21:23:01 +00:00
matthias.ringwald@gmail.com
c64f33c72c add printf when app should display/hide passkey 2013-11-28 21:17:20 +00:00
matthias.ringwald@gmail.com
6585cf39bf generate passkey 0-999999 if we need to display it 2013-11-28 21:13:49 +00:00
matthias.ringwald@gmail.com
1bebac1147 implement stk generation method decision 2013-11-28 20:19:21 +00:00
matthias.ringwald@gmail.com
98dc099930 only use OOB if initiator also indicates that it has OOB data 2013-11-28 15:50:00 +00:00
matthias.ringwald@gmail.com
03435b99d8 added 'get oob data' callback support 2013-11-28 15:34:11 +00:00
matthias.ringwald@gmail.com
1573cd5f74 move key distribution into explicit state, use state for send security request and send pairing failed 2013-11-16 22:49:43 +00:00
matthias.ringwald@gmail.com
fb0d10171a use state for send pairing failed 2013-11-16 22:35:25 +00:00
matthias.ringwald@gmail.com
09e2372ddd add state for sending pairing response and remove generic response buffer 2013-11-16 22:29:08 +00:00
matthias.ringwald@gmail.com
d0cd2e022f add swap64, extract swapX, fix endianess for all keys used in SM PDUs 2013-11-16 22:17:17 +00:00
matthias.ringwald@gmail.com
6d9fe37763 also calculate IRK during bonding 2013-11-16 21:32:57 +00:00
matthias.ringwald@gmail.com
e2b20dde9e use print_key and print_hex16, move code not needed for final aes128 engine toward the end 2013-11-12 23:22:31 +00:00
matthias.ringwald@gmail.com
0d64013b1f use aes128 engine for setup of previously established ltk and ediv 2013-11-12 23:01:05 +00:00
matthias.ringwald@gmail.com
d09da6b9a8 use aes128 engine for dhk, y, ediv, ltk calculation after bonding 2013-11-12 22:36:13 +00:00
matthias.ringwald@gmail.com
0573ccc143 calc s1 using aes128 engine 2013-11-12 19:41:31 +00:00
matthias.ringwald@gmail.com
70ddf9cf63 use aes128 engine for c1 calculation of master and slave 2013-11-11 23:11:16 +00:00
matthias.ringwald@gmail.com
63dbd537f8 use aes128 engine to calculat sm_s_confirm 2013-11-11 22:47:28 +00:00
matthias.ringwald@gmail.com
9168dfeb6e extract sm_c1_t3 in preparation to use AES128 engine 2013-11-11 21:45:29 +00:00