Matthias Ringwald
|
b6df12b64a
|
att_server: access att_connection via att_connection_for_hci_connection
|
2020-12-28 23:08:43 +01:00 |
|
Matthias Ringwald
|
68591e36e9
|
att_server: use hci_connection_t instead of att_server_t as function param
|
2020-12-28 23:01:42 +01:00 |
|
Matthias Ringwald
|
47a155880c
|
l2cap: support ENABLE_EXPLICIT_CONNECTABLE_MODE_CONTROL
|
2020-12-18 15:17:31 +01:00 |
|
Matthias Ringwald
|
f38f43d729
|
att_dispatch: fix ATT_EVENT_MTU_EXCHANGE_COMPLETE emit
|
2020-12-17 17:44:16 +01:00 |
|
Matthias Ringwald
|
ef6e8e6376
|
avrcp_target: avoid warning without bstack_assert
|
2020-12-14 11:49:57 +01:00 |
|
Matthias Ringwald
|
cc92f22bee
|
hfp/goep_client/avdtp/a2dp: return SDP_SERVICE_NOT_FOUND if no suitable SDP record is found
|
2020-12-14 11:39:43 +01:00 |
|
Matthias Ringwald
|
e55c05e30d
|
hfp/hsp: validate remote role is present in SDP Service Class List ID
Avoids HFP AG/HSP AG connecting to same service on remote device
|
2020-12-11 22:21:17 +01:00 |
|
Matthias Ringwald
|
18aab41867
|
sdp_client_rfcomm: add sdp_client_query_rfcomm_channel_and_name_for_service_class_uuid
|
2020-12-11 22:07:25 +01:00 |
|
Matthias Ringwald
|
17b0e9ff31
|
l2cap: fix packet size check for incoming classic basic channels (regression introduced in v1.2.1)
|
2020-12-11 17:09:45 +01:00 |
|
Matthias Ringwald
|
3721a23546
|
hfp: support CC256x assisted hfp
|
2020-12-10 15:38:26 +01:00 |
|
Matthias Ringwald
|
365a7dd12b
|
hci_cmd: add ti vs commands for assisted hfp
|
2020-12-10 15:23:47 +01:00 |
|
Matthias Ringwald
|
1ec112deb9
|
hfp_ag: release audio connection on CHUP from HF
|
2020-12-10 11:52:05 +01:00 |
|
Matthias Ringwald
|
4a2e058f9c
|
hfp_ag: extract hfp_ag_transfer_indicator
|
2020-12-10 11:52:05 +01:00 |
|
Matthias Ringwald
|
46f073f23a
|
hfp_hf: call hfp_hf_run for all events from hfp_handle_hci_event
|
2020-12-10 11:52:05 +01:00 |
|
Matthias Ringwald
|
1c6a0fc0fa
|
hfp: use hfp_ag/hfp_hf prefix
|
2020-12-10 11:38:19 +01:00 |
|
Matthias Ringwald
|
12cbbeeeee
|
hfp_ag: remove excessive braces
|
2020-12-09 21:34:24 +01:00 |
|
Matthias Ringwald
|
7a50df221c
|
fix docu on expected status codes in SM_EVENT_REENCRYPTION_COMPLETE
|
2020-12-09 11:28:10 +01:00 |
|
Milanka Ringwald
|
9b037397d7
|
plc: avoid cppcheck warnings
|
2020-12-08 12:03:54 +01:00 |
|
Matthias Ringwald
|
2f7137db90
|
mesh: annotate incorrect cpp nullpointer warning
|
2020-12-08 11:59:40 +01:00 |
|
Matthias Ringwald
|
f8737b81da
|
hfp_ag: inline wrapper around hfp_gsm_handler to help static analyzer
|
2020-12-08 11:57:21 +01:00 |
|
Matthias Ringwald
|
df842b645f
|
avrcp_target: fix compile warning using invalid pointers in memcpy with len == 0
|
2020-12-08 11:18:27 +01:00 |
|
Matthias Ringwald
|
5c1ef14e99
|
Revert "sm: abort pairing if bonding information is not deleted in re-erncryption failed handler with ENABLE_LE_PROACTIVE_AUTHENTICATION"
This reverts commit 19a4077283fa3d57318bfca7160559a2adc3fd5a.
|
2020-12-08 10:36:14 +01:00 |
|
Matthias Ringwald
|
19a4077283
|
sm: abort pairing if bonding information is not deleted in re-erncryption failed handler with ENABLE_LE_PROACTIVE_AUTHENTICATION
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
9b75de03b9
|
sm: emit re-encryption start/complete(ERROR_CODE_PIN_OR_KEY_MISSING) when receiving pairing request with LTK available
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
212d735ee7
|
sm: introduce SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED_W4_IRK to wait for IRK after receiving Pairing Request
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
7af5dcd58a
|
sm: send security request after irk complete, emit pairing/re-encryption events
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
d3c122774e
|
sm: extract sm_pairing_started
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
24c20dc492
|
sm: inline sm_send_security_request_for_connection
|
2020-12-07 12:46:06 +01:00 |
|
Matthias Ringwald
|
6bc3aba4a0
|
sm: deprecated sm_send_security_request
|
2020-12-04 15:16:00 +01:00 |
|
Matthias Ringwald
|
7cd78c034e
|
sm: emit pairing started event
|
2020-12-03 20:36:45 +01:00 |
|
Matthias Ringwald
|
38c89bb1b7
|
sm: add SM_EVENT_PAIRING_STARTED
|
2020-12-03 20:25:14 +01:00 |
|
Matthias Ringwald
|
daac65637f
|
sm: emit re-encryption started in central role after receiving security request
|
2020-12-03 17:48:10 +01:00 |
|
Matthias Ringwald
|
e9af1bf650
|
sm: handle LTK request after sending Security Request as Responder without LTK
|
2020-12-03 13:46:35 +01:00 |
|
Matthias Ringwald
|
3c0e26de90
|
sm: use current peer address for re-encryption events if le device info not available
|
2020-12-02 21:11:07 +01:00 |
|
Matthias Ringwald
|
b11289a818
|
gatt_client: improve gatt_client_set_required_security_level description
|
2020-12-02 21:11:07 +01:00 |
|
Matthias Ringwald
|
97d2cfbc6f
|
fix warnings for log_info/printf
|
2020-11-30 14:26:45 +01:00 |
|
Matthias Ringwald
|
e883851f1d
|
fix warnings for log_info/printf
|
2020-11-30 11:59:26 +01:00 |
|
Matthias Ringwald
|
cf31ef9b5b
|
gatt_client: don't trigger pairing for reactive authentication without automatic pairing
|
2020-11-26 18:12:20 +01:00 |
|
Matthias Ringwald
|
fd14b2051a
|
gatt_client: rewrite sm reencryption complete handling
|
2020-11-26 18:03:55 +01:00 |
|
Matthias Ringwald
|
e4d159ba3a
|
gatt_client: improve comments
|
2020-11-26 18:03:55 +01:00 |
|
Matthias Ringwald
|
3503dc74a1
|
gatt_client: wait_for_pairing_complete -> wait_for_authentication_complete
|
2020-11-26 18:03:55 +01:00 |
|
Matthias Ringwald
|
e28291c183
|
sm: return status from encryption complete in SM_EVENT_REENCRYPTION_COMPLETE
|
2020-11-26 18:03:55 +01:00 |
|
Matthias Ringwald
|
aa9b34e571
|
sm: abort legacy pairing as initiator when responder echoes confirm
|
2020-11-25 10:30:31 +01:00 |
|
Matthias Ringwald
|
0763891b99
|
l2cap: check packet size against local mtu for classic basic channels
|
2020-11-25 09:30:13 +01:00 |
|
Matthias Ringwald
|
4fc83f45ae
|
l2cap: forward data only in open state
|
2020-11-25 09:30:13 +01:00 |
|
Matthias Ringwald
|
7d5c2f20da
|
l2cap: use connection handle for channel lookup
|
2020-11-25 09:30:13 +01:00 |
|
Matthias Ringwald
|
2cc326019e
|
bluetooth: improve comment on custom BTstackk ATT Error Codes
|
2020-11-23 16:50:04 +01:00 |
|
Matthias Ringwald
|
798530bda9
|
gatt_client: only trigger pairing/re-encryption if client request pending
|
2020-11-23 16:39:02 +01:00 |
|
Matthias Ringwald
|
645e0efae7
|
gatt_client: return missing keys if re-encryption fails for mandatory authentication
|
2020-11-20 17:41:27 +01:00 |
|
Matthias Ringwald
|
18ef5dfc3c
|
l2cap.c, hfp_ag.c: remove duplicate function defintions
|
2020-11-20 09:21:49 +01:00 |
|