/nrf52832-nimble/packages/NimBLE-latest/docs/ |
H A D | ble_sec.rst | 8 - **Pairing**: The process for creating one or more shared secret keys. 10 each device into a link key used during pairing. 12 - **Bonding**: The act of storing the keys created during pairing for 38 or transfer cryptographic numbers used in the pairing process.
|
H A D | index.rst | 89 for pairing and transport specific key distribution for securing
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/include/host/ |
H A D | ble_hs.h | 208 * If set proper flag in Pairing Request/Response will be set. 214 * If set proper flag in Pairing Request/Response will be set. This results 221 * If set proper flag in Pairing Request/Response will be set. This results 222 * in requiring Man-In-The-Middle protection when pairing. 228 * If set proper flag in Pairing Request/Response will be set. This results 229 * in using LE Secure Connections for pairing if also supported by remote 230 * device. Fallback to legacy pairing if not supported by remote.
|
H A D | ble_gap.h | 319 * Properties of the imminent secure link if the pairing procedure is 534 * Represents a passkey query needed to complete a pairing procedure. 668 * successful pairing when Identity Address Information was received. 683 * been deleted and continue the pairing procedure. If 687 * silently ignore the pairing request. 1145 * will start appropriate security procedure (pairing or encryption). 1160 * Initiates the GAP pairing procedure as a master. This is for testing only and 1164 * start pairing on. 1169 * BLE_HS_EALREADY if an pairing procedure for
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/ |
H A D | syscfg.yml | 116 description: 'Security manager legacy pairing.' 128 The IO capabilities to report during pairing. Valid values are: 137 Whether the out-of-band pairing algorithm is advertised. (0/1) 146 pairing. (0/1) 150 Whether keypress support is advertised during pairing. (0/1) 154 A bitmap indicating which keys to distribute during pairing. The 163 A bitmap indicating which keys to accept during pairing. The
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/ |
H A D | ble_sm_test_util.c | 38 /** Handle reported in previous repeat pairing event. */ 589 /* Verify new pairing request is reported correctly. */ in ble_sm_test_util_repeat_pairing_cb() 1655 /* Pairing should now be complete. */ in ble_sm_test_util_peer_bonding_good() 1779 /* Pairing should now be complete. */ in ble_sm_test_util_us_bonding_good() 2128 /* Initiate the pairing procedure. */ in ble_sm_test_util_us_lgcy_good_once_no_init() 2187 /* Pairing should now be complete. */ in ble_sm_test_util_us_lgcy_good_once_no_init() 2228 /* We initiate pairing. */ in ble_sm_test_util_us_lgcy_good() 2333 /* Pairing should now be complete. */ in ble_sm_test_util_peer_lgcy_good_once_no_init() 2375 /* Peer performs IO first; peer initiates pairing. */ in ble_sm_test_util_peer_lgcy_good() 2385 /* We perform IO first; peer initiates pairing. */ in ble_sm_test_util_peer_lgcy_good() [all …]
|
H A D | ble_sm_lgcy_test.c | 34 * Legacy pairing 168 * Legacy pairing 303 * Legacy pairing 426 * Legacy pairing 550 * Legacy pairing 688 * Legacy pairing
|
H A D | ble_sm_test.c | 149 /* Initiate the pairing procedure. */ in TEST_CASE() 309 /*** Pairing already in progress; ignore security request. */ in TEST_CASE()
|
H A D | ble_sm_sc_test.c | 34 * Secure connections pairing 176 * Secure connections pairing 781 * Secure connections pairing 1386 * Secure connections pairing 1530 * Secure connections pairing 1672 * Secure connections pairing 2277 * Secure connections pairing 2882 * Secure connections pairing 3026 * Secure connections pairing 3188 * Secure connections pairing [all …]
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/ |
H A D | ble_sm.c | 830 * pairing request was received. 848 /* If the peer isn't bonded, indicate that the pairing procedure should in ble_sm_chk_repeat_pairing() 968 /* Encryption info and master ID are only sent in legacy pairing. */ in ble_sm_key_dist() 1110 /* We are completing a pairing procedure; keys may need to be in ble_sm_enc_event_rx() 1136 * procedure. Keys were exchanged during pairing; they don't in ble_sm_enc_event_rx() 1372 /* Legacy pairing just completed. Send the short term key to the in ble_sm_ltk_req_rx() 1753 /* XXX: Ensure enough time has passed since the previous failed pairing in ble_sm_pair_req_rx() 1758 /* Pairing already in progress; abort old procedure and start new. */ in ble_sm_pair_req_rx() 1798 /* The request looks good. Precalculate our pairing response and in ble_sm_pair_req_rx() 1800 * information in case this is a repeated pairing attempt (i.e., we in ble_sm_pair_req_rx() [all …]
|
H A D | ble_sm_sc.c | 198 /* Initiator does not send a confirm when pairing algorithm is any of: 212 /* Responder does not verify the initiator's random number when pairing 457 /* Ensure the ltk gets persisted when the pairing procedure succeeds. */ in ble_sm_sc_random_rx()
|
H A D | ble_gap.c | 4318 * is found, perform the encryption procedure rather than the pairing in ble_gap_security_initiate()
|
/nrf52832-nimble/packages/NimBLE-latest/apps/btshell/ |
H A D | syscfg.yml | 31 # Disable security manager (pairing and bonding).
|
/nrf52832-nimble/packages/NimBLE-latest/docs/ble_hs/ |
H A D | ble_hs_return_codes.rst | 29 …procedure and sent a Pairing Failed command to the peer. The return code corresponds to the value … 31 …because the peer sent us a Pairing Failed command. The return code corresponds to the value of the… 69 …ypothetical *my\_blocking\_enc\_proc()* function, which blocks until the pairing operation has com… 279 | 0x0218 | 0x18 | BLE\_ERR\_NO\_PAIRING | Pairing Not Allowed … 313 | 0x0229 | 0x29 | BLE\_ERR\_UNIT\_KEY\_PAIRING | Pairing With Unit Key Not … 335 | 0x0237 | 0x37 | BLE\_ERR\_SEC\_SIMPLE\_PAIR | Secure Simple Pairing Not … 337 | 0x0238 | 0x38 | BLE\_ERR\_HOST\_BUSY\_PAIR | Host Busy - Pairing … 379 | 0x0403 | 0x03 | BLE\_SM\_ERR\_AUTHREQ | The pairing procedure canno… 383 | 0x0405 | 0x05 | BLE\_SM\_ERR\_PAIR\_NOT\_SUPP | Pairing is not supported by… 389 | 0x0408 | 0x08 | BLE\_SM\_ERR\_UNSPECIFIED | Pairing failed due to an un… [all …]
|
/nrf52832-nimble/ |
H A D | README.md | 11 - 安全管理(SM),支持 LE Legacy Pairing, LE Secure Connections, Transport Specific Key Distribution
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/test/unit/arch/ |
H A D | sys_arch.c | 179 /* we count up just to check the correct pairing of lock/unlock */ in sys_mutex_lock() 190 /* we count down just to check the correct pairing of lock/unlock */ in sys_mutex_unlock()
|
/nrf52832-nimble/packages/NimBLE-latest/ |
H A D | README.md | 13 - 安全管理(SM),支持传统配对(LE Legacy Pairing),安全连接(LE Secure Connections),特定秘钥分发(Transport Specific Key Dist…
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/pts/ |
H A D | pts-gap.txt | 211 pairing for read 218 pairing for read
|
/nrf52832-nimble/packages/NimBLE-latest/apps/bleuart/src/ |
H A D | bleuart.c | 175 * continue with the pairing operation. in bleuart_gap_event()
|
/nrf52832-nimble/packages/NimBLE-latest/apps/bleprph/src/ |
H A D | bleprph.c | 253 * continue with the pairing operation. in bleprph_gap_event()
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/tools/ |
H A D | log2smtest.rb | 23 ### input log must contain the connection establishment and complete pairing 74 * #{$ctxt[:sc] ? 'Secure connections' : 'Legacy'} pairing
|
/nrf52832-nimble/packages/NimBLE-latest/apps/blecent/src/ |
H A D | blecent.c | 458 * continue with the pairing operation. in blecent_gap_event()
|
/nrf52832-nimble/packages/NimBLE-latest/apps/btshell/src/ |
H A D | btshell.c | 1210 * continue with the pairing operation. in btshell_gap_event()
|
H A D | cmd.c | 2631 console_printf("error initiating pairing; rc=%d\n", rc); in cmd_security_pair() 2645 .summary = "start pairing procedure for connection",
|
/nrf52832-nimble/packages/NimBLE-latest/docs/btshell/ |
H A D | btshell_GAP.rst | 313 | **security-pair** | | | Start pairing proce… 327 … | Start security procedure (This starts either pairing or encryption dep…
|