Matthias Ringwald
|
57a91edd49
|
sm: track max use in custom allocator
|
2016-06-03 17:15:05 +02:00 |
|
Matthias Ringwald
|
68437d838a
|
sm: use custom memory allocator for mbedtls if not HAVE_MALLOC
|
2016-06-03 17:05:38 +02:00 |
|
Matthias Ringwald
|
e01675d351
|
sm: provide basic memory allocator for use with mbedtls
|
2016-06-03 16:59:29 +02:00 |
|
Matthias Ringwald
|
7892c5a79a
|
test: enable le secure connections
|
2016-06-03 16:58:41 +02:00 |
|
Milanka Ringwald
|
287eecff9a
|
example: add void
|
2016-06-03 15:58:50 +02:00 |
|
Milanka Ringwald
|
0f09bd9698
|
battery example: add round-robin blacklist for devices that do not have battery service
|
2016-06-03 15:54:29 +02:00 |
|
Milanka Ringwald
|
969fc1c501
|
util: fix docu to match function return value
|
2016-06-03 15:52:59 +02:00 |
|
Milanka Ringwald
|
3e40861c0c
|
util: fix sscanf_bd_addr
|
2016-06-03 12:06:02 +02:00 |
|
Matthias Ringwald
|
e722521ad6
|
sm: split mbedtls keypair into group. point, and value
|
2016-06-01 20:39:31 +02:00 |
|
Matthias Ringwald
|
05299751b9
|
sm: cache local ec key
|
2016-06-01 16:49:26 +02:00 |
|
Matthias Ringwald
|
d3bd960056
|
sm: use mbedtls's memory allocator with 5k buffer if HAVE_MALLOC is not defined
|
2016-06-01 12:15:41 +02:00 |
|
Matthias Ringwald
|
6643eff824
|
sm: track calloc/free in mbedtls
|
2016-06-01 10:43:47 +02:00 |
|
Matthias Ringwald
|
891bb64a19
|
sm: call mbedtls_x_free functions
|
2016-05-31 23:16:52 +02:00 |
|
Matthias Ringwald
|
3764b5516a
|
sm: use LK from LE Device DB for SC in initiator role
|
2016-05-31 22:31:20 +02:00 |
|
Matthias Ringwald
|
7dbe5dcf89
|
sm: release setup context after sending LTK negative reply
|
2016-05-31 19:14:25 +02:00 |
|
Matthias Ringwald
|
cfd5ff7427
|
sm: don't send encryption info for SC
|
2016-05-31 19:07:47 +02:00 |
|
Matthias Ringwald
|
bbf8db22e4
|
sm: don't generate rand and LTK in SC
|
2016-05-31 19:03:44 +02:00 |
|
Matthias Ringwald
|
5829ebe2e7
|
sm: use LTK from LE Device DB for SC in responder role
|
2016-05-31 18:39:26 +02:00 |
|
Matthias Ringwald
|
1f9d84e930
|
sm: fix transition to calculate local confirm in responder role
|
2016-05-31 17:12:48 +02:00 |
|
Matthias Ringwald
|
07036a0473
|
sm: wait for passkey entry if neccessarry
|
2016-05-30 11:01:17 +02:00 |
|
Matthias Ringwald
|
b35a3de2a3
|
sm: use LE Random for local nonce before confirmation calculation
|
2016-05-29 20:42:37 +02:00 |
|
Matthias Ringwald
|
f1c1783e41
|
sm: use LE Random for initiator/jw_nk
|
2016-05-29 20:22:11 +02:00 |
|
Matthias Ringwald
|
945888f5ea
|
sm: fix local nonce generation
|
2016-05-29 19:59:02 +02:00 |
|
Matthias Ringwald
|
1c516d8ff1
|
sm: use fresh nonce for each passkey round
|
2016-05-29 19:23:10 +02:00 |
|
Matthias Ringwald
|
2886623dc7
|
sm: fix sc passkey entry in responder role
|
2016-05-29 19:00:07 +02:00 |
|
Matthias Ringwald
|
7df18c15c3
|
sm: use LE Random command to generate EC keypair
|
2016-05-29 16:21:14 +02:00 |
|
Matthias Ringwald
|
901c000fcc
|
sm: use state var to track DHKEY_CHECK_COMMAND received
|
2016-05-29 14:40:50 +02:00 |
|
Matthias Ringwald
|
bd57ffebb0
|
sm: use AES CMAC Engine to calculate g2 for numeric comparison
|
2016-05-28 23:42:47 +02:00 |
|
Matthias Ringwald
|
f92edc8e3a
|
sm: extract g2_calculate
|
2016-05-28 20:09:19 +02:00 |
|
Matthias Ringwald
|
0346c37cbe
|
sm: use AES CMAC Engine to calculate f5 for dhkey check verification
|
2016-05-27 23:09:08 +02:00 |
|
Matthias Ringwald
|
019005a057
|
sm: use AES CMAC Engine to calculate f6 for dhkey check verification
|
2016-05-27 21:54:28 +02:00 |
|
Matthias Ringwald
|
271630022c
|
sm: use AES CMAC Engine to calculate f6 for dhkey check send
|
2016-05-27 21:23:04 +02:00 |
|
Matthias Ringwald
|
dc30084780
|
sm: prepare dhkey check to use AES CMAC Engine
|
2016-05-27 21:06:16 +02:00 |
|
Matthias Ringwald
|
e083ca230a
|
sm: extract sm_sc_calculate_dhkey
|
2016-05-27 20:23:45 +02:00 |
|
Matthias Ringwald
|
b042cbd999
|
Merge branch 'le-secure-connection' of https://github.com/bluekitchen/btstack into le-secure-connection
|
2016-05-27 20:02:56 +02:00 |
|
Matthias Ringwald
|
688a08f9c2
|
sm: use AES Engine for f4 (confirm validation)
|
2016-05-27 18:57:59 +02:00 |
|
Matthias Ringwald
|
aec9414068
|
sm: use AES Engine for f4
|
2016-05-27 18:01:39 +02:00 |
|
Matthias Ringwald
|
9af0f475f6
|
sm: extract sm_sc_calculate_local_confirm
|
2016-05-27 17:26:02 +02:00 |
|
Matthias Ringwald
|
514d35fc5d
|
sm: add sm_cmac_general_start for aes_cmac calculation in secure connection functions
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
74c92e7149
|
test/sm: added cmac signing test
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
b6a6a351f8
|
test/sm: extract aes_cmac implementation
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
c6b7cbd9f9
|
sm: use SM_SC_ for SC states
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
5a293e6e96
|
sm: verify confirm value with passkey entry in responder role
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
de2fd182e5
|
sm: send 'numeric comparison failed' on decline by app
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
a9f2976821
|
sm: validate peer DHKey Check value
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
6f52a19684
|
sm: validate Cb during passkey modes
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
b7674abee2
|
sm: validate Cb during just works/numeric comparison
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
625f00b244
|
sm: don't calc random numbers for legacy pairing key distribution when using secure connections
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
a1e31e9cdc
|
sm: passkey entry for secure connections in initiator role
|
2016-05-27 16:40:53 +02:00 |
|
Matthias Ringwald
|
a068cdf483
|
tool: state_enums.sh enumerates SM and RFCOMM states
|
2016-05-27 16:40:53 +02:00 |
|