From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Subject: Re: [Bluez-users] sniffing others devices - noob From: Marcel Holtmann To: tpeyrin@cpe.fr Cc: BlueZ Mailing List In-Reply-To: <1081425934.4075400e59f4f@webmail.cpe.fr> References: <20040408114459.19348.qmail@web60309.mail.yahoo.com> <1081425612.2970.25.camel@pegasus> <1081425934.4075400e59f4f@webmail.cpe.fr> Content-Type: text/plain Message-Id: <1081426395.2970.27.camel@pegasus> Mime-Version: 1.0 Sender: bluez-users-admin@lists.sourceforge.net Errors-To: bluez-users-admin@lists.sourceforge.net List-Unsubscribe: , List-Id: List-Post: List-Help: List-Subscribe: , List-Archive: Date: Thu, 08 Apr 2004 14:13:15 +0200 Hi Thomas, > on the net I saw example of output of hcidump and after a link key request, the > response is a 16 bytes value ... this is not the in_rand value in the > authentification ?? the 16 bytes you have seen must be the 128 bit link key. Read the Bluetooth HCI specification. Regards Marcel ------------------------------------------------------- This SF.Net email is sponsored by: IBM Linux Tutorials Free Linux tutorial presented by Daniel Robbins, President and CEO of GenToo technologies. Learn everything from fundamentals to system administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click _______________________________________________ Bluez-users mailing list Bluez-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bluez-users