376 Commits

Author SHA1 Message Date
Matthias Ringwald
b8f6dc99f1 add gatt write tests - untested 2015-10-05 12:32:57 +02:00
Matthias Ringwald
5a93002a1d add gatt_client_read_multiple_characteristic_values 2015-10-02 14:59:23 +02:00
Matthias Ringwald
3f4e6e214e add gatt_client_read_value_of_characteristics_by_uuid16/128 2015-10-02 12:20:53 +02:00
Matthias Ringwald
5050a2d5f6 add gatt_client_read_long_characteristic_descriptor_using_descriptor_handler_with_offset 2015-10-01 22:16:37 +02:00
Matthias Ringwald
986515be23 add gatt_client_read_long_value_of_characteristic_using_value_handle_with_offset 2015-10-01 22:00:09 +02:00
Matthias Ringwald
62b9b53a36 add gatt_client_read_characteristic_descriptor_using_descriptor_handle and gatt_client_read_long_characteristic_descriptor_using_descriptor_handler 2015-10-01 21:09:23 +02:00
Matthias Ringwald
5838a2ed38 use PRIu32 for printf of 32-bit integers 2015-09-21 18:10:47 +02:00
Matthias Ringwald
69fd3b4b73 fix docu for gatt_client_discover_characteristic_descriptors 2015-09-18 15:14:34 +02:00
Matthias Ringwald
c647ce341a GATT Client: fix included services query with multiple rounds 2015-09-17 22:42:23 +02:00
Matthias Ringwald
264e3be687 rename sm_request_authorization to sm_request_pairing 2015-08-20 22:00:54 +02:00
Matthias Ringwald
87f8c30bce sm: sm_request_authorization triggers security request as slave 2015-08-20 21:50:20 +02:00
Matthias Ringwald
c84488c5b7 sm: fixes stall in responder role when initiator does not send any keys 2015-08-20 21:37:06 +02:00
Matthias Ringwald
5243c6c843 sm: fixes stall in initiator role when responder does not send any keys 2015-08-20 21:20:50 +02:00
Matthias Ringwald
5d1c139e0e gatt_client: allow writes with maximal MTU 2015-08-20 16:42:46 +02:00
Matthias Ringwald
cbb46e2f9c sm: fixed OOB for responder 2015-08-20 16:24:57 +02:00
Matthias Ringwald
778b54252f sm: reset tk if OOB data cannot be used for pairing 2015-08-20 15:35:45 +02:00
Matthias Ringwald
c2e7aa62b4 sm: notify client for 'both sides input passkey', handle OOB without user notification 2015-08-20 15:07:09 +02:00
Matthias Ringwald
39e3b4c0e6 sm: notify client about pairing request even if there's no input capabilites 2015-08-20 12:18:59 +02:00
Matthias Ringwald
e7409fd6e2 sm: document sm_cmac_start result 2015-08-19 22:44:03 +02:00
Matthias Ringwald
03679531e4 sm: flip message data before calculating CMAC, also store hash result as little endian 2015-08-19 22:39:19 +02:00
Matthias Ringwald
12e4aa3c16 sm: use CSRK of Peripheral to save persistent memory, fix CMAC calculation 2015-08-19 16:47:23 +02:00
Matthias Ringwald
db894f169e Revert "sm: manage global signing counter"
This reverts commit 9f9b1721e11470e7d01a3673ec902fdf325c8da2.
2015-08-19 15:11:44 +02:00
Matthias Ringwald
7b8f2e5c7a sm: use IRK prefix for address resolution state 2015-08-19 15:03:15 +02:00
Matthias Ringwald
9f9b1721e1 sm: manage global signing counter 2015-08-19 14:43:41 +02:00
Matthias Ringwald
4a2d13bbab log valid cmac signature check, too 2015-08-19 12:58:04 +02:00
Matthias Ringwald
5fcb62a185 reset state after CMAC calculation 2015-08-19 12:57:38 +02:00
Matthias Ringwald
78b8321e18 sm: central uses stored ltk only when requested by client or peripheral 2015-08-14 18:36:44 +02:00
Matthias Ringwald
5b1061f9e8 fix bug retrieving encryption info 2015-08-14 18:33:14 +02:00
Matthias Ringwald
acae6a5093 sm: use public address for le device db lookup 2015-08-14 16:00:07 +02:00
Matthias Ringwald
ec0f2af932 use SM_RESPONDER_PH1_W4_PAIRING_REQUEST only after sending security request 2015-08-13 14:28:39 +02:00
Matthias Ringwald
0db5c26b03 sm: prefix all ph4 states with responder, finished sorting sm_general_idle 2015-08-13 14:23:36 +02:00
Matthias Ringwald
5f62024dd4 handle encryption key refresh event 2015-08-13 13:04:27 +02:00
Matthias Ringwald
9b3c2e0ccc sm: map most sm_general_idle to sm_initiator_connected or sm_responder_idle 2015-08-13 12:41:05 +02:00
Matthias Ringwald
67f4e4579f sm: prepare replacing sm_general_idle with sm_responder_idle 2015-08-13 12:36:02 +02:00
Matthias Ringwald
2b91d5f501 store encryption key size, authenticated, authorized in le_device_db and provide for current connection 2015-08-13 11:00:41 +02:00
Matthias Ringwald
30fdc0d7f4 sm: continue after trigger user response in master role 2015-08-12 17:26:13 +02:00
Matthias Ringwald
c4a9be5e1b support l2cap le conn param update request via l2cap_run in l2cap_le.c 2015-08-12 14:42:12 +02:00
Matthias Ringwald
b68d7bc3c3 Add gap_request_connection_parameter_update
l2cap_le_request_connection_parameter_update is obsolete.
It calls gap_request_connection_parameteir_update now.
The l2cap conn param update req ist sent by l2cap_run.
2015-08-12 14:27:30 +02:00
Matthias Ringwald
264d2bd80e fix build 2015-08-07 23:38:17 +02:00
Matthias Ringwald
3f6c2cdd26 sm: only request encryption information if bonding enabled 2015-08-07 23:34:01 +02:00
Matthias Ringwald
6191541dd0 sm: handle security request in master role 2015-08-07 22:39:57 +02:00
Matthias Ringwald
2374cc5aed fix debug messages 2015-08-07 22:35:04 +02:00
Matthias Ringwald
e8d5dc2445 sm: update existing le device db entry, fix use of ediv/rand/ltk of bonded connections 2015-08-05 15:48:53 +02:00
Matthias Ringwald
fbf1e48df0 log ediv get/set 2015-08-05 15:46:47 +02:00
Matthias Ringwald
68b0e067d4 sm: use peer address in client notifications instead of master address 2015-08-05 12:11:31 +02:00
Matthias Ringwald
46452f47d3 sm: remove debug message 2015-08-04 14:40:43 +02:00
Matthias Ringwald
2de22786db sm: implement general address resolution using linked list 2015-08-04 13:59:51 +02:00
Matthias Ringwald
d3862db066 sm: convert address resolution into state machine 2015-08-04 12:13:14 +02:00
Matthias Ringwald
2e71710150 sm: introduce address resolution events and mode 2015-08-04 11:28:53 +02:00
Matthias Ringwald
53544995a3 extract sm_address_resolution_succeeded and _failed 2015-08-03 17:43:34 +02:00