Bluetooth: host: Log security keys needed by sniffer
Log the security keys that the sniffer needs in order to sucessfully decrypt the connection. This option allows the sniffer to work in the cases where enabling using the SMP debug keys is not wanted, either because it changes the way the peer behaves or is denied by the peer. It also enables the sniffer to decrypt a connection where the bond already exists. Signed-off-by: Joakim Andersson <joakim.andersson@nordicsemi.no>
This commit is contained in:
parent
ecfda097d1
commit
200f4687e0
8 changed files with 123 additions and 7 deletions
|
@ -76,9 +76,9 @@ if(CONFIG_BT_HCI_HOST)
|
|||
endif()
|
||||
endif()
|
||||
|
||||
if(CONFIG_BT_DEBUG_SMP OR CONFIG_BT_DEBUG_KEYS)
|
||||
message(WARNING "One or both these options are enabled:
|
||||
CONFIG_BT_DEBUG_SMP CONFIG_BT_DEBUG_KEYS.
|
||||
if(CONFIG_BT_DEBUG_SMP OR CONFIG_BT_DEBUG_KEYS OR CONFIG_BT_LOG_SNIFFER_INFO)
|
||||
message(WARNING "One of these options are enabled:
|
||||
CONFIG_BT_DEBUG_SMP CONFIG_BT_DEBUG_KEYS CONFIG_BT_LOG_SNIFFER_INFO.
|
||||
Private security keys such as the LTK will be printed out, do not use in
|
||||
production."
|
||||
)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue