Skip to content

BLE: call secure connections versions of ltk functions #7688

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Aug 9, 2018

Conversation

paul-szczepanek-arm
Copy link
Member

Description

NRF implementation of the security manager called legacy pairing functions for storing the ltk instead of the secure connections versions which need to be called for correct flags to be set.

Pull request type

[x] Fix
[ ] Refactor
[ ] New target
[ ] Feature
[ ] Breaking change

@0xc0170
Copy link
Contributor

0xc0170 commented Aug 3, 2018

/morph build

@cmonr
Copy link
Contributor

cmonr commented Aug 3, 2018

/morph build

@mbed-ci
Copy link

mbed-ci commented Aug 4, 2018

Build : FAILURE

Build number : 2733
Build artifacts/logs : http://mbed-os.s3-website-eu-west-1.amazonaws.com/?prefix=builds/7688/

@NirSonnenschein
Copy link
Contributor

seems to fail to the ci-morph-build on the NRF52840_DK. Since the changes seem to affect this board I'm assuming this is not coincidental.

@paul-szczepanek-arm
Copy link
Member Author

that sdk doesn't support that feature so replaced it with an uglier but more compatible check, should be good to go

@0xc0170
Copy link
Contributor

0xc0170 commented Aug 6, 2018

/morph build

@mbed-ci
Copy link

mbed-ci commented Aug 6, 2018

Build : SUCCESS

Build number : 2737
Build artifacts/logs : http://mbed-os.s3-website-eu-west-1.amazonaws.com/?prefix=builds/7688/

Triggering tests

/morph test
/morph uvisor-test
/morph export-build
/morph mbed2-build

@@ -948,34 +956,44 @@ bool nRF5xSecurityManager::sm_handler(const ble_evt_t *evt)
peer_dist = pairing_cb->initiator_dist;
}

if (own_dist.get_encryption()) {
handler->on_keys_distributed_local_ltk(
uint8_t invalid_rand[BLE_GAP_SEC_RAND_LEN] = { 0 };
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you factorize the test in a function ? It is used to handle BLE_GAP_EVT_SEC_INFO_REQUEST too.
Note that if it is in a function a for loop can be used to minimize stack allocation.

@mbed-ci
Copy link

mbed-ci commented Aug 6, 2018

@mbed-ci
Copy link

mbed-ci commented Aug 6, 2018

@cmonr
Copy link
Contributor

cmonr commented Aug 8, 2018

/morph build

@cmonr
Copy link
Contributor

cmonr commented Aug 8, 2018

/morph build

@mbed-ci
Copy link

mbed-ci commented Aug 8, 2018

Build : SUCCESS

Build number : 2765
Build artifacts/logs : http://mbed-os.s3-website-eu-west-1.amazonaws.com/?prefix=builds/7688/

Triggering tests

/morph test
/morph uvisor-test
/morph export-build
/morph mbed2-build

@mbed-ci
Copy link

mbed-ci commented Aug 8, 2018

@mbed-ci
Copy link

mbed-ci commented Aug 9, 2018

@cmonr cmonr merged commit 2b92b26 into ARMmbed:master Aug 9, 2018
pan- pushed a commit to pan-/mbed that referenced this pull request Aug 22, 2018
BLE: call secure connections versions of ltk functions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants