Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Optional Key storage #7

Open
unknownconstant opened this issue Jan 4, 2021 · 1 comment · Fixed by #16
Open

Optional Key storage #7

unknownconstant opened this issue Jan 4, 2021 · 1 comment · Fixed by #16
Milestone

Comments

@unknownconstant
Copy link
Owner

The developer should not need to implement storage and retrieval of IRK and LTK values for MAC addresses. The library should work out of the box without callbacks being defined for the storage and retrieval functions.

Not storing IRK & LTK means that devices will be paired but not bonded so the pairing Authreq value needs updating to reflect this so that centrals do not store LTK / IRK values and cause reconnection issues.

@unknownconstant unknownconstant added this to the Stable milestone Jan 4, 2021
@unknownconstant unknownconstant linked a pull request Jan 4, 2021 that will close this issue
@unknownconstant
Copy link
Owner Author

I tried modifying the authreq / iocap parameters but the behaviour I've seen is that android expects the bonding process to complete regardless.

You suggested on the orignal thread that it could store IRK/LTK/MACs in ram as a default option - this could be implemented by having default storage/retreival callbacks which are overriden if the developer wants to. The merge above rejects unknown LTKs & will function without storage of keys until a device attempts to reconnect.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant