36
36
static struct k_poll_signal pair_signal ;
37
37
static struct k_poll_event events [K_POOL_EVENTS_CNT ];
38
38
39
- static bool use_remote_tk ;
40
39
static struct bt_le_oob oob_local ;
41
- static uint8_t tk_value [NFC_NDEF_LE_OOB_REC_TK_LEN ];
42
- static uint8_t remote_tk_value [NFC_NDEF_LE_OOB_REC_TK_LEN ];
43
40
static struct bt_le_oob oob_remote ;
44
41
static struct bt_conn * default_conn ;
45
42
46
- static int tk_value_generate (void )
47
- {
48
- int err ;
49
-
50
- err = bt_rand (tk_value , sizeof (tk_value ));
51
- if (err ) {
52
- printk ("Random TK value generation failed: %d\n" , err );
53
- }
54
-
55
- return err ;
56
- }
57
-
58
43
static void pair_key_generate_init (void )
59
44
{
60
45
k_poll_signal_init (& pair_signal );
@@ -74,7 +59,7 @@ static int paring_key_generate(void)
74
59
printk ("Error while fetching local OOB data: %d\n" , err );
75
60
}
76
61
77
- return tk_value_generate () ;
62
+ return err ;
78
63
}
79
64
80
65
static void paring_key_process (void )
@@ -268,31 +253,13 @@ static void lesc_oob_data_set(struct bt_conn *conn,
268
253
}
269
254
}
270
255
271
- static void legacy_tk_value_set (struct bt_conn * conn )
272
- {
273
- int err ;
274
- const uint8_t * tk = use_remote_tk ? remote_tk_value : tk_value ;
275
-
276
- err = bt_le_oob_set_legacy_tk (conn , tk );
277
- if (err ) {
278
- printk ("TK value set error: %d\n" , err );
279
- }
280
-
281
- use_remote_tk = false;
282
- }
283
-
284
256
static void auth_oob_data_request (struct bt_conn * conn ,
285
257
struct bt_conn_oob_info * info )
286
258
{
287
259
if (info -> type == BT_CONN_OOB_LE_SC ) {
288
260
printk ("LESC OOB data requested\n" );
289
261
lesc_oob_data_set (conn , info );
290
262
}
291
-
292
- if (info -> type == BT_CONN_OOB_LE_LEGACY ) {
293
- printk ("Legacy TK value requested\n" );
294
- legacy_tk_value_set (conn );
295
- }
296
263
}
297
264
298
265
static void auth_cancel (struct bt_conn * conn )
@@ -315,7 +282,6 @@ static void pairing_complete(struct bt_conn *conn, bool bonded)
315
282
316
283
k_poll_signal_raise (& pair_signal , 0 );
317
284
bt_le_oob_set_sc_flag (false);
318
- bt_le_oob_set_legacy_flag (false);
319
285
}
320
286
321
287
@@ -330,7 +296,6 @@ static void pairing_failed(struct bt_conn *conn, enum bt_security_err reason)
330
296
331
297
k_poll_signal_raise (& pair_signal , 0 );
332
298
bt_le_oob_set_sc_flag (false);
333
- bt_le_oob_set_legacy_flag (false);
334
299
}
335
300
336
301
static struct bt_conn_auth_cb conn_auth_callbacks = {
@@ -419,12 +384,6 @@ static int oob_le_data_handle(const struct nfc_ndef_record_desc *rec,
419
384
bt_addr_le_copy (& oob_remote .addr , oob -> addr );
420
385
}
421
386
422
- if (oob -> tk_value ) {
423
- bt_le_oob_set_legacy_flag (true);
424
- memcpy (remote_tk_value , oob -> tk_value , sizeof (remote_tk_value ));
425
- use_remote_tk = request ;
426
- }
427
-
428
387
/* Remove all scanning filters. */
429
388
bt_scan_filter_remove_all ();
430
389
@@ -453,7 +412,6 @@ static int carrier_prepare(void)
453
412
454
413
rec_payload .addr = & oob_local .addr ;
455
414
rec_payload .le_sc_data = & oob_local .le_sc_data ;
456
- rec_payload .tk_value = tk_value ;
457
415
rec_payload .local_name = bt_get_name ();
458
416
rec_payload .le_role = NFC_NDEF_LE_OOB_REC_LE_ROLE (
459
417
NFC_NDEF_LE_OOB_REC_LE_ROLE_CENTRAL_ONLY );
0 commit comments