summaryrefslogtreecommitdiff
path: root/apps/iap/iap-lingo0.c
diff options
context:
space:
mode:
Diffstat (limited to 'apps/iap/iap-lingo0.c')
-rw-r--r--apps/iap/iap-lingo0.c23
1 files changed, 21 insertions, 2 deletions
diff --git a/apps/iap/iap-lingo0.c b/apps/iap/iap-lingo0.c
index 9e0355cb3f..e69b42beae 100644
--- a/apps/iap/iap-lingo0.c
+++ b/apps/iap/iap-lingo0.c
@@ -603,8 +603,27 @@ void iap_handlepkt_mode0(const unsigned int len, const unsigned char *buf)
603 break; 603 break;
604 } 604 }
605 605
606 /* We only support version 2.0 */ 606 device.auth.version = (buf[2] << 8) | buf[3];
607 if ((buf[2] != 2) || (buf[3] != 0)) { 607
608 /* We support authentication versions 1.0 and 2.0 */
609 if (device.auth.version == 0x100) {
610 /* If we could really do authentication we'd have to
611 * check the certificate here. Since we can't, just acknowledge
612 * the packet with an "everything OK" AckDevAuthenticationInfo
613 *
614 * Skip GetAccessoryInfo process, this command together with
615 * authentication level 2 were added in iAP release 24, it is
616 * not be supported by devices authenticating at level 1.
617 */
618 IAP_TX_INIT(0x00, 0x16);
619 IAP_TX_PUT(0x00);
620
621 iap_send_tx();
622 device.auth.state = AUST_CERTDONE;
623 break;
624 }
625
626 if (device.auth.version != 0x200) {
608 /* Version mismatches are signalled by AckDevAuthenticationInfo 627 /* Version mismatches are signalled by AckDevAuthenticationInfo
609 * with the status set to Authentication Information unsupported 628 * with the status set to Authentication Information unsupported
610 */ 629 */