Home
last modified time | relevance | path

Searched full:pairing (Results 1 – 25 of 25) sorted by relevance

/nrf52832-nimble/packages/NimBLE-latest/docs/
H A Dble_sec.rst8 - **Pairing**: The process for creating one or more shared secret keys.
10 each device into a link key used during pairing.
12 - **Bonding**: The act of storing the keys created during pairing for
38 or transfer cryptographic numbers used in the pairing process.
H A Dindex.rst89 for pairing and transport specific key distribution for securing
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/include/host/
H A Dble_hs.h208 * If set proper flag in Pairing Request/Response will be set.
214 * If set proper flag in Pairing Request/Response will be set. This results
221 * If set proper flag in Pairing Request/Response will be set. This results
222 * in requiring Man-In-The-Middle protection when pairing.
228 * If set proper flag in Pairing Request/Response will be set. This results
229 * in using LE Secure Connections for pairing if also supported by remote
230 * device. Fallback to legacy pairing if not supported by remote.
H A Dble_gap.h319 * Properties of the imminent secure link if the pairing procedure is
534 * Represents a passkey query needed to complete a pairing procedure.
668 * successful pairing when Identity Address Information was received.
683 * been deleted and continue the pairing procedure. If
687 * silently ignore the pairing request.
1145 * will start appropriate security procedure (pairing or encryption).
1160 * Initiates the GAP pairing procedure as a master. This is for testing only and
1164 * start pairing on.
1169 * BLE_HS_EALREADY if an pairing procedure for
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/
H A Dsyscfg.yml116 description: 'Security manager legacy pairing.'
128 The IO capabilities to report during pairing. Valid values are:
137 Whether the out-of-band pairing algorithm is advertised. (0/1)
146 pairing. (0/1)
150 Whether keypress support is advertised during pairing. (0/1)
154 A bitmap indicating which keys to distribute during pairing. The
163 A bitmap indicating which keys to accept during pairing. The
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/
H A Dble_sm_test_util.c38 /** Handle reported in previous repeat pairing event. */
589 /* Verify new pairing request is reported correctly. */ in ble_sm_test_util_repeat_pairing_cb()
1655 /* Pairing should now be complete. */ in ble_sm_test_util_peer_bonding_good()
1779 /* Pairing should now be complete. */ in ble_sm_test_util_us_bonding_good()
2128 /* Initiate the pairing procedure. */ in ble_sm_test_util_us_lgcy_good_once_no_init()
2187 /* Pairing should now be complete. */ in ble_sm_test_util_us_lgcy_good_once_no_init()
2228 /* We initiate pairing. */ in ble_sm_test_util_us_lgcy_good()
2333 /* Pairing should now be complete. */ in ble_sm_test_util_peer_lgcy_good_once_no_init()
2375 /* Peer performs IO first; peer initiates pairing. */ in ble_sm_test_util_peer_lgcy_good()
2385 /* We perform IO first; peer initiates pairing. */ in ble_sm_test_util_peer_lgcy_good()
[all …]
H A Dble_sm_lgcy_test.c34 * Legacy pairing
168 * Legacy pairing
303 * Legacy pairing
426 * Legacy pairing
550 * Legacy pairing
688 * Legacy pairing
H A Dble_sm_test.c149 /* Initiate the pairing procedure. */ in TEST_CASE()
309 /*** Pairing already in progress; ignore security request. */ in TEST_CASE()
H A Dble_sm_sc_test.c34 * Secure connections pairing
176 * Secure connections pairing
781 * Secure connections pairing
1386 * Secure connections pairing
1530 * Secure connections pairing
1672 * Secure connections pairing
2277 * Secure connections pairing
2882 * Secure connections pairing
3026 * Secure connections pairing
3188 * Secure connections pairing
[all …]
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/
H A Dble_sm.c830 * pairing request was received.
848 /* If the peer isn't bonded, indicate that the pairing procedure should in ble_sm_chk_repeat_pairing()
968 /* Encryption info and master ID are only sent in legacy pairing. */ in ble_sm_key_dist()
1110 /* We are completing a pairing procedure; keys may need to be in ble_sm_enc_event_rx()
1136 * procedure. Keys were exchanged during pairing; they don't in ble_sm_enc_event_rx()
1372 /* Legacy pairing just completed. Send the short term key to the in ble_sm_ltk_req_rx()
1753 /* XXX: Ensure enough time has passed since the previous failed pairing in ble_sm_pair_req_rx()
1758 /* Pairing already in progress; abort old procedure and start new. */ in ble_sm_pair_req_rx()
1798 /* The request looks good. Precalculate our pairing response and in ble_sm_pair_req_rx()
1800 * information in case this is a repeated pairing attempt (i.e., we in ble_sm_pair_req_rx()
[all …]
H A Dble_sm_sc.c198 /* Initiator does not send a confirm when pairing algorithm is any of:
212 /* Responder does not verify the initiator's random number when pairing
457 /* Ensure the ltk gets persisted when the pairing procedure succeeds. */ in ble_sm_sc_random_rx()
H A Dble_gap.c4318 * is found, perform the encryption procedure rather than the pairing in ble_gap_security_initiate()
/nrf52832-nimble/packages/NimBLE-latest/apps/btshell/
H A Dsyscfg.yml31 # Disable security manager (pairing and bonding).
/nrf52832-nimble/packages/NimBLE-latest/docs/ble_hs/
H A Dble_hs_return_codes.rst29 …procedure and sent a Pairing Failed command to the peer. The return code corresponds to the value …
31 …because the peer sent us a Pairing Failed command. The return code corresponds to the value of the…
69 …ypothetical *my\_blocking\_enc\_proc()* function, which blocks until the pairing operation has com…
279 | 0x0218 | 0x18 | BLE\_ERR\_NO\_PAIRING | Pairing Not Allowed …
313 | 0x0229 | 0x29 | BLE\_ERR\_UNIT\_KEY\_PAIRING | Pairing With Unit Key Not …
335 | 0x0237 | 0x37 | BLE\_ERR\_SEC\_SIMPLE\_PAIR | Secure Simple Pairing Not …
337 | 0x0238 | 0x38 | BLE\_ERR\_HOST\_BUSY\_PAIR | Host Busy - Pairing
379 | 0x0403 | 0x03 | BLE\_SM\_ERR\_AUTHREQ | The pairing procedure canno…
383 | 0x0405 | 0x05 | BLE\_SM\_ERR\_PAIR\_NOT\_SUPP | Pairing is not supported by…
389 | 0x0408 | 0x08 | BLE\_SM\_ERR\_UNSPECIFIED | Pairing failed due to an un…
[all …]
/nrf52832-nimble/
H A DREADME.md11 - 安全管理(SM),支持 LE Legacy Pairing, LE Secure Connections, Transport Specific Key Distribution
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/test/unit/arch/
H A Dsys_arch.c179 /* we count up just to check the correct pairing of lock/unlock */ in sys_mutex_lock()
190 /* we count down just to check the correct pairing of lock/unlock */ in sys_mutex_unlock()
/nrf52832-nimble/packages/NimBLE-latest/
H A DREADME.md13 - 安全管理(SM),支持传统配对(LE Legacy Pairing),安全连接(LE Secure Connections),特定秘钥分发(Transport Specific Key Dist…
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/pts/
H A Dpts-gap.txt211 pairing for read
218 pairing for read
/nrf52832-nimble/packages/NimBLE-latest/apps/bleuart/src/
H A Dbleuart.c175 * continue with the pairing operation. in bleuart_gap_event()
/nrf52832-nimble/packages/NimBLE-latest/apps/bleprph/src/
H A Dbleprph.c253 * continue with the pairing operation. in bleprph_gap_event()
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/tools/
H A Dlog2smtest.rb23 ### input log must contain the connection establishment and complete pairing
74 * #{$ctxt[:sc] ? 'Secure connections' : 'Legacy'} pairing
/nrf52832-nimble/packages/NimBLE-latest/apps/blecent/src/
H A Dblecent.c458 * continue with the pairing operation. in blecent_gap_event()
/nrf52832-nimble/packages/NimBLE-latest/apps/btshell/src/
H A Dbtshell.c1210 * continue with the pairing operation. in btshell_gap_event()
H A Dcmd.c2631 console_printf("error initiating pairing; rc=%d\n", rc); in cmd_security_pair()
2645 .summary = "start pairing procedure for connection",
/nrf52832-nimble/packages/NimBLE-latest/docs/btshell/
H A Dbtshell_GAP.rst313 | **security-pair** | | | Start pairing proce…
327 … | Start security procedure (This starts either pairing or encryption dep…