Matthias Ringwald
b8f6dc99f1
add gatt write tests - untested
2015-10-05 12:32:57 +02:00
Matthias Ringwald
5a93002a1d
add gatt_client_read_multiple_characteristic_values
2015-10-02 14:59:23 +02:00
Matthias Ringwald
3f4e6e214e
add gatt_client_read_value_of_characteristics_by_uuid16/128
2015-10-02 12:20:53 +02:00
Matthias Ringwald
5050a2d5f6
add gatt_client_read_long_characteristic_descriptor_using_descriptor_handler_with_offset
2015-10-01 22:16:37 +02:00
Matthias Ringwald
986515be23
add gatt_client_read_long_value_of_characteristic_using_value_handle_with_offset
2015-10-01 22:00:09 +02:00
Matthias Ringwald
62b9b53a36
add gatt_client_read_characteristic_descriptor_using_descriptor_handle and gatt_client_read_long_characteristic_descriptor_using_descriptor_handler
2015-10-01 21:09:23 +02:00
Matthias Ringwald
5838a2ed38
use PRIu32 for printf of 32-bit integers
2015-09-21 18:10:47 +02:00
Matthias Ringwald
69fd3b4b73
fix docu for gatt_client_discover_characteristic_descriptors
2015-09-18 15:14:34 +02:00
Matthias Ringwald
c647ce341a
GATT Client: fix included services query with multiple rounds
2015-09-17 22:42:23 +02:00
Matthias Ringwald
264e3be687
rename sm_request_authorization to sm_request_pairing
2015-08-20 22:00:54 +02:00
Matthias Ringwald
87f8c30bce
sm: sm_request_authorization triggers security request as slave
2015-08-20 21:50:20 +02:00
Matthias Ringwald
c84488c5b7
sm: fixes stall in responder role when initiator does not send any keys
2015-08-20 21:37:06 +02:00
Matthias Ringwald
5243c6c843
sm: fixes stall in initiator role when responder does not send any keys
2015-08-20 21:20:50 +02:00
Matthias Ringwald
5d1c139e0e
gatt_client: allow writes with maximal MTU
2015-08-20 16:42:46 +02:00
Matthias Ringwald
cbb46e2f9c
sm: fixed OOB for responder
2015-08-20 16:24:57 +02:00
Matthias Ringwald
778b54252f
sm: reset tk if OOB data cannot be used for pairing
2015-08-20 15:35:45 +02:00
Matthias Ringwald
c2e7aa62b4
sm: notify client for 'both sides input passkey', handle OOB without user notification
2015-08-20 15:07:09 +02:00
Matthias Ringwald
39e3b4c0e6
sm: notify client about pairing request even if there's no input capabilites
2015-08-20 12:18:59 +02:00
Matthias Ringwald
e7409fd6e2
sm: document sm_cmac_start result
2015-08-19 22:44:03 +02:00
Matthias Ringwald
03679531e4
sm: flip message data before calculating CMAC, also store hash result as little endian
2015-08-19 22:39:19 +02:00
Matthias Ringwald
12e4aa3c16
sm: use CSRK of Peripheral to save persistent memory, fix CMAC calculation
2015-08-19 16:47:23 +02:00
Matthias Ringwald
db894f169e
Revert "sm: manage global signing counter"
...
This reverts commit 9f9b1721e11470e7d01a3673ec902fdf325c8da2.
2015-08-19 15:11:44 +02:00
Matthias Ringwald
7b8f2e5c7a
sm: use IRK prefix for address resolution state
2015-08-19 15:03:15 +02:00
Matthias Ringwald
9f9b1721e1
sm: manage global signing counter
2015-08-19 14:43:41 +02:00
Matthias Ringwald
4a2d13bbab
log valid cmac signature check, too
2015-08-19 12:58:04 +02:00
Matthias Ringwald
5fcb62a185
reset state after CMAC calculation
2015-08-19 12:57:38 +02:00
Matthias Ringwald
78b8321e18
sm: central uses stored ltk only when requested by client or peripheral
2015-08-14 18:36:44 +02:00
Matthias Ringwald
5b1061f9e8
fix bug retrieving encryption info
2015-08-14 18:33:14 +02:00
Matthias Ringwald
acae6a5093
sm: use public address for le device db lookup
2015-08-14 16:00:07 +02:00
Matthias Ringwald
ec0f2af932
use SM_RESPONDER_PH1_W4_PAIRING_REQUEST only after sending security request
2015-08-13 14:28:39 +02:00
Matthias Ringwald
0db5c26b03
sm: prefix all ph4 states with responder, finished sorting sm_general_idle
2015-08-13 14:23:36 +02:00
Matthias Ringwald
5f62024dd4
handle encryption key refresh event
2015-08-13 13:04:27 +02:00
Matthias Ringwald
9b3c2e0ccc
sm: map most sm_general_idle to sm_initiator_connected or sm_responder_idle
2015-08-13 12:41:05 +02:00
Matthias Ringwald
67f4e4579f
sm: prepare replacing sm_general_idle with sm_responder_idle
2015-08-13 12:36:02 +02:00
Matthias Ringwald
2b91d5f501
store encryption key size, authenticated, authorized in le_device_db and provide for current connection
2015-08-13 11:00:41 +02:00
Matthias Ringwald
30fdc0d7f4
sm: continue after trigger user response in master role
2015-08-12 17:26:13 +02:00
Matthias Ringwald
c4a9be5e1b
support l2cap le conn param update request via l2cap_run in l2cap_le.c
2015-08-12 14:42:12 +02:00
Matthias Ringwald
b68d7bc3c3
Add gap_request_connection_parameter_update
...
l2cap_le_request_connection_parameter_update is obsolete.
It calls gap_request_connection_parameteir_update now.
The l2cap conn param update req ist sent by l2cap_run.
2015-08-12 14:27:30 +02:00
Matthias Ringwald
264d2bd80e
fix build
2015-08-07 23:38:17 +02:00
Matthias Ringwald
3f6c2cdd26
sm: only request encryption information if bonding enabled
2015-08-07 23:34:01 +02:00
Matthias Ringwald
6191541dd0
sm: handle security request in master role
2015-08-07 22:39:57 +02:00
Matthias Ringwald
2374cc5aed
fix debug messages
2015-08-07 22:35:04 +02:00
Matthias Ringwald
e8d5dc2445
sm: update existing le device db entry, fix use of ediv/rand/ltk of bonded connections
2015-08-05 15:48:53 +02:00
Matthias Ringwald
fbf1e48df0
log ediv get/set
2015-08-05 15:46:47 +02:00
Matthias Ringwald
68b0e067d4
sm: use peer address in client notifications instead of master address
2015-08-05 12:11:31 +02:00
Matthias Ringwald
46452f47d3
sm: remove debug message
2015-08-04 14:40:43 +02:00
Matthias Ringwald
2de22786db
sm: implement general address resolution using linked list
2015-08-04 13:59:51 +02:00
Matthias Ringwald
d3862db066
sm: convert address resolution into state machine
2015-08-04 12:13:14 +02:00
Matthias Ringwald
2e71710150
sm: introduce address resolution events and mode
2015-08-04 11:28:53 +02:00
Matthias Ringwald
53544995a3
extract sm_address_resolution_succeeded and _failed
2015-08-03 17:43:34 +02:00