24 Dec, 2011

1 commit

  • This patch fixes incorrect address storage while storing
    Long Term Key for LE Devices using SMP (Security Manager Protocol).
    The address stored should be of remote device and not of source device.

    Signed-off-by: Hemant Gupta
    Acked-by: Marcel Holtmann
    Signed-off-by: Gustavo F. Padovan

    Hemant Gupta
     

23 Dec, 2011

1 commit

  • To achive Man-In-The-Middle (MITM) level security with Low Energy,
    we have to enable User Passkey Comparison. This commit modifies the
    hard-coded JUST-WORKS pairing mechanism to support query via the MGMT
    interface of Passkey comparison and User Confirmation.

    Signed-off-by: Brian Gix
    Acked-by: Marcel Holtmann
    Signed-off-by: Gustavo F. Padovan

    Brian Gix
     

21 Dec, 2011

1 commit


01 Dec, 2011

2 commits


08 Nov, 2011

1 commit

  • This implement priority based scheduler using skbuffer priority set via
    SO_PRIORITY socket option.

    It introduces hci_chan_hash (list of HCI Channel/hci_chan) per connection,
    each item in this list refer to a L2CAP connection and it is used to
    queue the data for transmission.

    Signed-off-by: Luiz Augusto von Dentz
    Acked-by: Marcel Holtmann
    Signed-off-by: Gustavo F. Padovan

    Luiz Augusto von Dentz
     

21 Sep, 2011

8 commits


09 Jul, 2011

7 commits


07 Jul, 2011

1 commit


25 Jun, 2011

1 commit

  • net/bluetooth/smp.c: In function 'smp_e':
    net/bluetooth/smp.c:49:21: error: storage size of 'sg' isn't known
    net/bluetooth/smp.c:67:2: error: implicit declaration of function 'sg_init_one'
    net/bluetooth/smp.c:49:21: warning: unused variable 'sg'

    Caused by commit d22ef0bc83c5 ("Bluetooth: Add LE SMP Cryptoolbox
    functions"). Missing include file, presumably. This batch has been in
    the bluetooth tree since June 14, so it may have been exposed by the
    removal of linux/mm.h from netdevice.h ...

    Signed-off-by: Stephen Rothwell
    Signed-off-by: John W. Linville

    Stephen Rothwell
     

15 Jun, 2011

2 commits

  • This patch implements a check in smp cmd pairing request and pairing
    response to verify if encryption key maximum size is compatible in both
    slave and master when SMP Pairing is requested. Keys are also masked to
    the correct negotiated size.

    Signed-off-by: Vinicius Costa Gomes
    Signed-off-by: Anderson Briglia
    Signed-off-by: Gustavo F. Padovan

    Vinicius Costa Gomes
     
  • This patch adds support for disconnecting the link when SMP procedure
    takes more than 30 seconds.

    SMP begins when either the Pairing Request command is sent or the
    Pairing Response is received, and it ends when the link is encrypted
    (or terminated). Vol 3, Part H Section 3.4.

    Signed-off-by: Vinicius Costa Gomes
    Signed-off-by: Gustavo F. Padovan

    Vinicius Costa Gomes
     

14 Jun, 2011

11 commits