CHANGELOG.md (1046568c8fed82922390eaa81b0675f1224490aa) CHANGELOG.md (6857ad8fd242d15c19df7d0905dfff96795f95a2)
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8

--- 7 unchanged lines hidden (view full) ---

16
17### Fixed
18- AVRCP/AVCTP: report AVRCP 1.6 and AVCTP 1.4 in SDP record
19- SM: only trigger Cross-Transport Key Derivation (CTKD) when bonding is enabled
20
21### Added
22
23### Changed
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8

--- 7 unchanged lines hidden (view full) ---

16
17### Fixed
18- AVRCP/AVCTP: report AVRCP 1.6 and AVCTP 1.4 in SDP record
19- SM: only trigger Cross-Transport Key Derivation (CTKD) when bonding is enabled
20
21### Added
22
23### Changed
24- SM: Cross-Transport Key Derivation requires ENABLE_CROSS_TRANSPORT_KEY_DERIVATION now
24
25
25
26## Changes September 2020
27
28### Fixed
29- HFP: fix parsing of ranges e.g. in +CIND responses
30- AVDTP, AVRCP: fix bugs due to transaction id overrun
31- A2DP Source: fix issues with stream configuration by sink
32- hci_dump: fix tv_us calculation for non-posix / embedded systems with binary output
33

--- 50 unchanged lines hidden (view full) ---

84### Changed
85- GAP: set minimum required encryption key size for Classic connections back from 16 to 7, matching the Core spec
86
87
88## Changes June 2020
89
90### Fixed
91- HFP: Fix parsing of empty fields, e.g. phone number in +CLCC and other AT commands
26## Changes September 2020
27
28### Fixed
29- HFP: fix parsing of ranges e.g. in +CIND responses
30- AVDTP, AVRCP: fix bugs due to transaction id overrun
31- A2DP Source: fix issues with stream configuration by sink
32- hci_dump: fix tv_us calculation for non-posix / embedded systems with binary output
33

--- 50 unchanged lines hidden (view full) ---

84### Changed
85- GAP: set minimum required encryption key size for Classic connections back from 16 to 7, matching the Core spec
86
87
88## Changes June 2020
89
90### Fixed
91- HFP: Fix parsing of empty fields, e.g. phone number in +CLCC and other AT commands
92- sm: Fix validation of confirm value for secure connection Passkey entry
92- SM: Fix validation of confirm value for secure connection Passkey entry
93- AVRCP: handle concurrent signaling establishment with reject and retry
94
95### Added
96- GAP: Detect Secure Connection -> Legacy Connection Downgrade Attack by remote features and actual encryption type (BIAS)
97- GAP: Mutual authentication: request authentication after Classic connection got encrypted (BIAS)
98- Windows port for Dialog DA14585 connected via serial port
99
100## Changes
101- CVSD PLC: treat zero frames as good and allow to mark data as bad, e.g. if reported by Controller as erroneous
102
103## Changes May 2020
104
105### Fixed
106- hfp_hf, hsp_hs: use eSCO params in accept sco connection only for incoming eSCO connections
107- pbap_client: fix PBAP UUID len on connect message
93- AVRCP: handle concurrent signaling establishment with reject and retry
94
95### Added
96- GAP: Detect Secure Connection -> Legacy Connection Downgrade Attack by remote features and actual encryption type (BIAS)
97- GAP: Mutual authentication: request authentication after Classic connection got encrypted (BIAS)
98- Windows port for Dialog DA14585 connected via serial port
99
100## Changes
101- CVSD PLC: treat zero frames as good and allow to mark data as bad, e.g. if reported by Controller as erroneous
102
103## Changes May 2020
104
105### Fixed
106- hfp_hf, hsp_hs: use eSCO params in accept sco connection only for incoming eSCO connections
107- pbap_client: fix PBAP UUID len on connect message
108- sm: fix secure connection pairing as peripheral when local user confirmation happens after remote one
108- SM: fix secure connection pairing as peripheral when local user confirmation happens after remote one
109- A2DP Source: only connect to remote sink stream endpoints
110- btstack_hal_flash_memory: fix write of 0xff bytes to simulated flash
111- hsp_hs: fix disconnect if audio not connected
112- hsp_ag: fix accept incoming connection
113
114### Added
115- example/le_mitm: MITM implementation that forwards ATT PDUs and allows for pairing
116- GAP: gap_set_security_level sets required security level for incoming and outgoing connections
117- cc256x: allow to specify power vector for each modulation type
118- FreeRTOS: btstack_run_loop_freertos_trigger_exit allows to request run loop exit
109- A2DP Source: only connect to remote sink stream endpoints
110- btstack_hal_flash_memory: fix write of 0xff bytes to simulated flash
111- hsp_hs: fix disconnect if audio not connected
112- hsp_ag: fix accept incoming connection
113
114### Added
115- example/le_mitm: MITM implementation that forwards ATT PDUs and allows for pairing
116- GAP: gap_set_security_level sets required security level for incoming and outgoing connections
117- cc256x: allow to specify power vector for each modulation type
118- FreeRTOS: btstack_run_loop_freertos_trigger_exit allows to request run loop exit
119- sm: support LE Secure Connections Only mode with sm_set_secure_connections_only_mode
119- SM: support LE Secure Connections Only mode with sm_set_secure_connections_only_mode
120- GAP: enable BR/EDR Secure Connections if supported, add gap_secure_connections_enable
121
122### Changed
123- L2CAP ERTM: send extended features request only once per HCI connection
124
125
126## Changes April 2020
127

--- 511 unchanged lines hidden ---
120- GAP: enable BR/EDR Secure Connections if supported, add gap_secure_connections_enable
121
122### Changed
123- L2CAP ERTM: send extended features request only once per HCI connection
124
125
126## Changes April 2020
127

--- 511 unchanged lines hidden ---