Gilles Boccon-Gibod
7aba36302a
use isort when formatting
2025-08-21 16:38:58 -07:00
Josh Wu
4a88e9a0cf
Always log exception using logging.exception
2025-08-18 16:03:58 +08:00
Josh Wu
19d3616032
Migrate SMP commands to dataclasses
2025-08-12 12:36:35 +08:00
Gilles Boccon-Gibod
a7111d0107
send public keys earlier
2025-08-04 19:18:12 -07:00
Gilles Boccon-Gibod
a1eff958e6
do not wait for display
2025-08-02 21:10:45 -07:00
Gilles Boccon-Gibod
1a05eebfdb
fix legacy pairing with oob
2025-06-23 07:05:21 +02:00
Gilles Boccon-Gibod
8137caf37b
use cancel_on_disconnection helper
2025-06-10 13:28:08 -04:00
Gilles Boccon-Gibod
d631156f6c
add passkey delegate
2025-06-09 12:20:06 -04:00
Josh Wu
8a0cd5d0d1
Replace deprecated typing aliases
2025-06-07 23:39:35 +08:00
Josh Wu
bb8dcaf63e
Move connection.link_key_type to keystore
2025-05-06 02:11:25 +08:00
Josh Wu
22d6a7bf05
Declare emitted events as constants
2025-04-26 03:55:31 +08:00
Josh Wu
55801bc2ca
Make all event emitters async
...
* Also remove AbortableEventEmitter
2025-04-16 12:40:57 +08:00
Josh Wu
a57cf13e2e
Cleanup relative imports
2025-04-12 23:06:52 +08:00
Josh Wu
7569da37e4
Replace legacy transport and role constants
2025-04-09 19:04:02 +08:00
Josh Wu
637224d5bc
Enum: PhysicalTransport, Role, AddressType
2025-03-09 23:34:01 +08:00
Josh Wu
745e107849
Channel Sounding device handlers
2025-01-22 23:38:44 +08:00
Jan-Marcel Dietrich
07f9997a49
Add maximum encryption key size to PairingDelegate
...
So far the maxmium encryption key size has been hardcoded to 16 bytes in
'send_pairing_request_command()' and 'send_pairing_response_comman()'. By
making this configurable via the PairingDelegate, one can test how devices
respond to smaller encryption key sizes. Default remains 16 bytes.
2024-11-28 14:15:51 +01:00
Gilles Boccon-Gibod
9d3d5495ce
only use __bytes__ when not argument is needed.
2024-11-23 15:56:14 -08:00
Gilles Boccon-Gibod
b2864dac2d
fix #580
2024-11-02 10:29:40 -07:00
zxzxwu
4394a36332
Merge pull request #526 from Gopi-SB/oob
...
DH Key compute check modification for OOB Pairing
2024-08-29 16:56:45 +08:00
Gopi Sakshihally Bhuthaiah
0c9fd64434
DH Key compute check modification for OOB Pairing
2024-08-29 08:46:53 +00:00
Gopi Sakshihally Bhuthaiah
c44c89cc6e
DH Key compute check modification for OOB Pairing
2024-08-13 02:10:41 +00:00
Josh Wu
c6b3deb8df
Fix CTKD failure introduced by Host RPA generation
2024-08-12 15:13:40 +08:00
Gopi Sakshihally Bhuthaiah
414f2f3efb
DH Key compute check modification for OOB Pairing
2024-08-12 07:00:51 +00:00
Gopi Sakshihally Bhuthaiah
ed00d44ae1
DH Key compute check modification for OOB Pairing
2024-08-09 17:30:19 +00:00
Gopi Sakshihally Bhuthaiah
b164524380
DH Key compute check modification for OOB Pairing
2024-08-08 10:31:26 +00:00
Gopi Sakshihally Bhuthaiah
29e4a843df
DH Key compute check modification for OOB Pairing
2024-08-08 08:48:58 +00:00
Gopi Sakshihally Bhuthaiah
619b32d36e
DH Key compute check modification for OOB Pairing
2024-08-08 07:53:05 +00:00
Gilles Boccon-Gibod
312fc8db36
support controller-generated rpa
2024-08-05 08:59:05 -07:00
Gilles Boccon-Gibod
615691ec81
add basic RPA support
2024-08-01 15:37:11 -07:00
Josh Wu
f8a2d4f0e0
Reorganize exceptions
...
* Add BaseBumbleException as a "real" root error
* Add several core error classes and properly replace builtin errors
with them
* Add several error classes for specific modules (transport, device)
2024-06-11 16:13:08 +08:00
Gilles Boccon-Gibod
58d4ab913a
update black formatter to version 24
2024-04-01 14:44:46 -07:00
Josh Wu
c40824e51c
Support non-directed address generation offload
2024-01-26 16:02:40 +08:00
Josh Wu
acd9d994c3
Save link_key in CTKD over BR/EDR
...
Since keystore.update() overwrites all existing keys, the existing link
key will be wiped out. To avoid this, SMP also need to keep the key.
2024-01-17 19:30:02 +08:00
Josh Wu
10a3833893
Remove # type: ignore[call-arg] in HCI_Command builders
2023-12-02 19:18:54 +08:00
Josh Wu
80d34a226d
Slightly refactor and fix CTKD
...
It seems sample input data provided in the spec is big-endian (just
like other AES-CMAC-based functions), but all keys are in little-endian(
HCI standard), so they need to be reverse before and after applying
AES-CMAC.
2023-11-26 16:55:10 +08:00
Gilles Boccon-Gibod
4ae612090b
wip
2023-11-06 13:19:13 -08:00
Josh Wu
2491b686fa
Handle SMP_Security_Request
2023-09-20 23:13:08 +02:00
Gilles Boccon-Gibod
640b9cd53a
refactor pyiodide support and add examples
2023-08-15 13:36:58 -07:00
Josh Wu
6399c5fb04
Auto add device to resolving list after pairing
2023-08-03 20:51:00 +08:00
Josh Wu
cbbada4748
SMP: Delegate distributed address type
2023-08-01 08:38:03 -07:00
Josh Wu
dbf878dc3f
SMP: Remove PairingMethod.__str__
2023-07-27 08:00:36 -07:00
Josh Wu
f6c0bd88d7
SMP: Do not send phase 2 commands in CTKD
2023-07-27 08:00:36 -07:00
Josh Wu
8440b7fbf1
SMP: Refactor pairing method as enum
2023-07-27 08:00:36 -07:00
Lucas Abel
a84df469cd
pairing: handle user errors from all delegate calls
2023-07-12 11:03:21 -07:00
Gilles Boccon-Gibod
6826f68478
fix linter warnings
2023-05-05 16:16:55 -07:00
Gilles Boccon-Gibod
3de35193bc
rebase
2023-05-05 16:09:01 -07:00
uael
5d4f811a65
smp: add simple Session proxy
...
This allow modifying the SMP behavior at runtime for testing purpose.
2023-05-04 04:33:50 +00:00
uael
3c81b248a3
smp: add type hints
2023-05-04 04:33:50 +00:00
Gilles Boccon-Gibod
3442358dea
refactor PairingDelegate
2023-04-18 15:04:53 -07:00