<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/include/net/bluetooth, branch v3.1</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/include/net/bluetooth?h=v3.1</id>
<link rel='self' href='https://git.amat.us/linux/atom/include/net/bluetooth?h=v3.1'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-07-15T14:05:24Z</updated>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-next-2.6 into for-davem</title>
<updated>2011-07-15T14:05:24Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2011-07-15T14:05:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=95a943c162d74b20d869917bdf5df11293c35b63'/>
<id>urn:sha1:95a943c162d74b20d869917bdf5df11293c35b63</id>
<content type='text'>
Conflicts:
	net/bluetooth/l2cap_core.c
</content>
</entry>
<entry>
<title>Bluetooth: Fixes l2cap "command reject" reply according to spec</title>
<updated>2011-07-11T04:43:25Z</updated>
<author>
<name>Ilia Kolomisnky</name>
<email>iliak@ti.com</email>
</author>
<published>2011-07-10T05:47:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e2fd318e3a9208245ee1041f6d413c8593fba29d'/>
<id>urn:sha1:e2fd318e3a9208245ee1041f6d413c8593fba29d</id>
<content type='text'>
There can 3 reasons for the "command reject" reply produced
by the stack. Each such reply should be accompanied by the
relevand data ( as defined in spec. ). Currently there is one
instance of "command reject" reply with reason "invalid cid"
wich is fixed. Also, added clean-up definitions related to the
"command reject" replies.

Signed-off-by: Ilia Kolomisnky &lt;iliak@ti.com&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Add support for returning the encryption key size</title>
<updated>2011-07-08T21:39:31Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-08T21:31:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8f360119243c214eb5c5549c61981d51a276154a'/>
<id>urn:sha1:8f360119243c214eb5c5549c61981d51a276154a</id>
<content type='text'>
This will be useful when userspace wants to restrict some kinds of
operations based on the length of the key size used to encrypt the
link.

Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Add support for storing the key size</title>
<updated>2011-07-08T21:39:19Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-08T21:31:45Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=726b4ffcaa450d9593b9b6ac8605967ce9f3e506'/>
<id>urn:sha1:726b4ffcaa450d9593b9b6ac8605967ce9f3e506</id>
<content type='text'>
In some cases it will be useful having the key size used for
encrypting the link. For example, some profiles may restrict
some operations depending on the key length.

The key size is stored in the key that is passed to userspace
using the pin_length field in the key structure.

For now this field is only valid for LE controllers. 3.0+HS
controllers define the Read Encryption Key Size command, this
field is intended for storing the value returned by that
command.

Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Remove unused field in hci_conn</title>
<updated>2011-07-08T20:37:22Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-07T21:59:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0eb08e339836989557ea3aa4c427377bd32ce19c'/>
<id>urn:sha1:0eb08e339836989557ea3aa4c427377bd32ce19c</id>
<content type='text'>
Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Add functions to manipulate the link key list for SMP</title>
<updated>2011-07-08T20:36:31Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-07T21:59:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=75d262c2ad927751bb5f096f3a6a37d81e7784f2'/>
<id>urn:sha1:75d262c2ad927751bb5f096f3a6a37d81e7784f2</id>
<content type='text'>
As the LTK (the new type of key being handled now) has more data
associated with it, we need to store this extra data and retrieve
the keys based on that data.

Methods for searching for a key and for adding a new LTK are
introduced here.

Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Add new structures for supporting SM key distribution</title>
<updated>2011-07-08T20:36:25Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-07T21:59:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=34918cd71b953905e5f832537ead436bcd57e8f9'/>
<id>urn:sha1:34918cd71b953905e5f832537ead436bcd57e8f9</id>
<content type='text'>
We need these changes because SMP keys may have more information
associated with them, for example, in the LTK case, it has an
encrypted diversifier (ediv) and a random number (rand).

Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Add support for SMP phase 3 (key distribution)</title>
<updated>2011-07-08T20:07:43Z</updated>
<author>
<name>Vinicius Costa Gomes</name>
<email>vinicius.gomes@openbossa.org</email>
</author>
<published>2011-07-07T21:59:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7034b911af1aa571995b56db3ed71a25daf00373'/>
<id>urn:sha1:7034b911af1aa571995b56db3ed71a25daf00373</id>
<content type='text'>
This adds support for generating and distributing all the keys
specified in the third phase of SMP.

This will make possible to re-establish secure connections, resolve
private addresses and sign commands.

For now, the values generated are random.

Signed-off-by: Vinicius Costa Gomes &lt;vinicius.gomes@openbossa.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Remove L2CAP busy queue</title>
<updated>2011-07-07T18:29:06Z</updated>
<author>
<name>Mat Martineau</name>
<email>mathewm@codeaurora.org</email>
</author>
<published>2011-07-07T16:39:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fadd192e81b0a8d8086531b8c11bd88b311b68c2'/>
<id>urn:sha1:fadd192e81b0a8d8086531b8c11bd88b311b68c2</id>
<content type='text'>
The ERTM receive buffer is now handled in a way that does not require
the busy queue and the associated polling code.

Signed-off-by: Mat Martineau &lt;mathewm@codeaurora.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
<entry>
<title>Bluetooth: Use event-driven approach for handling ERTM receive buffer</title>
<updated>2011-07-07T18:28:56Z</updated>
<author>
<name>Mat Martineau</name>
<email>mathewm@codeaurora.org</email>
</author>
<published>2011-07-07T16:39:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e328140fdacbba43292a59a22fb55d9185288318'/>
<id>urn:sha1:e328140fdacbba43292a59a22fb55d9185288318</id>
<content type='text'>
This change moves most L2CAP ERTM receive buffer handling out of the
L2CAP core and in to the socket code.  It's up to the higher layer
(the socket code, in this case) to tell the core when its buffer is
full or has space available.  The recv op should always accept
incoming ERTM data or else the connection will go down.

Within the socket layer, an skb that does not fit in the socket
receive buffer will be temporarily stored.  When the socket is read
from, that skb will be placed in the receive buffer if possible.  Once
adequate buffer space becomes available, the L2CAP core is informed
and the ERTM local busy state is cleared.

Receive buffer management for non-ERTM modes is unchanged.

Signed-off-by: Mat Martineau &lt;mathewm@codeaurora.org&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
</content>
</entry>
</feed>
