5668 Commits

Author SHA1 Message Date
Matthias Ringwald
d3bd960056 sm: use mbedtls's memory allocator with 5k buffer if HAVE_MALLOC is not defined 2016-06-01 12:15:41 +02:00
Matthias Ringwald
6643eff824 sm: track calloc/free in mbedtls 2016-06-01 10:43:47 +02:00
Matthias Ringwald
891bb64a19 sm: call mbedtls_x_free functions 2016-05-31 23:16:52 +02:00
Matthias Ringwald
3764b5516a sm: use LK from LE Device DB for SC in initiator role 2016-05-31 22:31:20 +02:00
Matthias Ringwald
7dbe5dcf89 sm: release setup context after sending LTK negative reply 2016-05-31 19:14:25 +02:00
Matthias Ringwald
cfd5ff7427 sm: don't send encryption info for SC 2016-05-31 19:07:47 +02:00
Matthias Ringwald
bbf8db22e4 sm: don't generate rand and LTK in SC 2016-05-31 19:03:44 +02:00
Matthias Ringwald
5829ebe2e7 sm: use LTK from LE Device DB for SC in responder role 2016-05-31 18:39:26 +02:00
Matthias Ringwald
1f9d84e930 sm: fix transition to calculate local confirm in responder role 2016-05-31 17:12:48 +02:00
Matthias Ringwald
07036a0473 sm: wait for passkey entry if neccessarry 2016-05-30 11:01:17 +02:00
Matthias Ringwald
b35a3de2a3 sm: use LE Random for local nonce before confirmation calculation 2016-05-29 20:42:37 +02:00
Matthias Ringwald
f1c1783e41 sm: use LE Random for initiator/jw_nk 2016-05-29 20:22:11 +02:00
Matthias Ringwald
945888f5ea sm: fix local nonce generation 2016-05-29 19:59:02 +02:00
Matthias Ringwald
1c516d8ff1 sm: use fresh nonce for each passkey round 2016-05-29 19:23:10 +02:00
Matthias Ringwald
2886623dc7 sm: fix sc passkey entry in responder role 2016-05-29 19:00:07 +02:00
Matthias Ringwald
7df18c15c3 sm: use LE Random command to generate EC keypair 2016-05-29 16:21:14 +02:00
Matthias Ringwald
901c000fcc sm: use state var to track DHKEY_CHECK_COMMAND received 2016-05-29 14:40:50 +02:00
Matthias Ringwald
bd57ffebb0 sm: use AES CMAC Engine to calculate g2 for numeric comparison 2016-05-28 23:42:47 +02:00
Matthias Ringwald
f92edc8e3a sm: extract g2_calculate 2016-05-28 20:09:19 +02:00
Matthias Ringwald
0346c37cbe sm: use AES CMAC Engine to calculate f5 for dhkey check verification 2016-05-27 23:09:08 +02:00
Matthias Ringwald
019005a057 sm: use AES CMAC Engine to calculate f6 for dhkey check verification 2016-05-27 21:54:28 +02:00
Matthias Ringwald
271630022c sm: use AES CMAC Engine to calculate f6 for dhkey check send 2016-05-27 21:23:04 +02:00
Matthias Ringwald
dc30084780 sm: prepare dhkey check to use AES CMAC Engine 2016-05-27 21:06:16 +02:00
Matthias Ringwald
e083ca230a sm: extract sm_sc_calculate_dhkey 2016-05-27 20:23:45 +02:00
Matthias Ringwald
b042cbd999 Merge branch 'le-secure-connection' of https://github.com/bluekitchen/btstack into le-secure-connection 2016-05-27 20:02:56 +02:00
Matthias Ringwald
688a08f9c2 sm: use AES Engine for f4 (confirm validation) 2016-05-27 18:57:59 +02:00
Matthias Ringwald
aec9414068 sm: use AES Engine for f4 2016-05-27 18:01:39 +02:00
Matthias Ringwald
9af0f475f6 sm: extract sm_sc_calculate_local_confirm 2016-05-27 17:26:02 +02:00
Matthias Ringwald
514d35fc5d sm: add sm_cmac_general_start for aes_cmac calculation in secure connection functions 2016-05-27 16:40:53 +02:00
Matthias Ringwald
74c92e7149 test/sm: added cmac signing test 2016-05-27 16:40:53 +02:00
Matthias Ringwald
b6a6a351f8 test/sm: extract aes_cmac implementation 2016-05-27 16:40:53 +02:00
Matthias Ringwald
c6b7cbd9f9 sm: use SM_SC_ for SC states 2016-05-27 16:40:53 +02:00
Matthias Ringwald
5a293e6e96 sm: verify confirm value with passkey entry in responder role 2016-05-27 16:40:53 +02:00
Matthias Ringwald
de2fd182e5 sm: send 'numeric comparison failed' on decline by app 2016-05-27 16:40:53 +02:00
Matthias Ringwald
a9f2976821 sm: validate peer DHKey Check value 2016-05-27 16:40:53 +02:00
Matthias Ringwald
6f52a19684 sm: validate Cb during passkey modes 2016-05-27 16:40:53 +02:00
Matthias Ringwald
b7674abee2 sm: validate Cb during just works/numeric comparison 2016-05-27 16:40:53 +02:00
Matthias Ringwald
625f00b244 sm: don't calc random numbers for legacy pairing key distribution when using secure connections 2016-05-27 16:40:53 +02:00
Matthias Ringwald
a1e31e9cdc sm: passkey entry for secure connections in initiator role 2016-05-27 16:40:53 +02:00
Matthias Ringwald
a068cdf483 tool: state_enums.sh enumerates SM and RFCOMM states 2016-05-27 16:40:53 +02:00
Matthias Ringwald
8cba5ca323 sm: numeric comparison for secure connections in initiator role 2016-05-27 16:40:53 +02:00
Matthias Ringwald
136d331afb sm: just works for secure connections in initiator role 2016-05-27 16:40:53 +02:00
Matthias Ringwald
83b3ae5f87 sm: auto confirm pairing in gap_le_connect_to_1111 example 2016-05-27 16:40:53 +02:00
Matthias Ringwald
e88b296181 sm: keep track of security request before sm received connection complete 2016-05-27 16:40:53 +02:00
Matthias Ringwald
7cef8eada7 libusb: add gap_le_connect_to_1111 example for testing outgoing le secure connection pairing 2016-05-27 16:40:53 +02:00
Matthias Ringwald
bccf5e67f5 sm: verify peer Q lies on elliptic curve 2016-05-27 16:40:53 +02:00
Matthias Ringwald
c8c46d5108 sm: add sm_numeric_comparison_confirm(..) and use in le_counter 2016-05-27 16:40:53 +02:00
Matthias Ringwald
8362d86ace sm: add SM_EVENT_NUMERIC_COMPARISON_REQUEST and SM_EVENT_NUMERIC_COMPARISON_CANCEL events for Numeric Comparison 2016-05-27 16:40:53 +02:00
Matthias Ringwald
b434342875 sm: add SM_STK_GENERATION_METHOD_NUMERIC_COMPARISON 2016-05-27 16:40:53 +02:00
Matthias Ringwald
52f9cf635b sm: clear requests for Encryption Key distribution when using SC 2016-05-27 16:40:53 +02:00