CHANGELOG.md (026587490746caba523909998b442a2ae1c06bb5) CHANGELOG.md (72cf8859b1e1fd6d954b0d294cc004d0375f8055)
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8

--- 14 unchanged lines hidden (view full) ---

23- HCI: update advertising data without stopping advertising first
24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding
25- GAP: return status for `gap_set_security_mode`
26- GAP: abort legacy pairing if Level 4 is required
27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote
28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible
29- GAP: validate minimal service security level can be reached during pairing in responder role
30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8

--- 14 unchanged lines hidden (view full) ---

23- HCI: update advertising data without stopping advertising first
24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding
25- GAP: return status for `gap_set_security_mode`
26- GAP: abort legacy pairing if Level 4 is required
27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote
28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible
29- GAP: validate minimal service security level can be reached during pairing in responder role
30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient
31- CVE-2020-26555: reject connections to and from devices with same BD ADDR
31- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key
32
33## Release v1.4
34
35### Added
36- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`)
37- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge
38- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`:

--- 797 unchanged lines hidden ---
32- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key
33
34## Release v1.4
35
36### Added
37- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`)
38- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge
39- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`:

--- 797 unchanged lines hidden ---