CHANGELOG.md (72cf8859b1e1fd6d954b0d294cc004d0375f8055) CHANGELOG.md (3817f9dfcd08534cc44884987ba917f15d47a150)
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8
9## Unreleased
1# Change Log
2All notable changes to this project will be documented in this file.
3
4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
7---
8
9## Unreleased
10### Added
11### Fixed
12### Changed
10
13
14
15## Release v1.4.1
16
11### Added
12- GAP: emit GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE
13
14### Fixed
15- GAP: store link key in hci connection struct to allow authenticate after pairing without bonding
16- GAP: avoid requesting authentication twice
17- GAP: cache own address on start advertising and connecting, provide getters
18- GAP: stop LE connecting if create connection fails (e.g. connectable adv active and multiple roles not supported)

--- 5 unchanged lines hidden (view full) ---

24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding
25- GAP: return status for `gap_set_security_mode`
26- GAP: abort legacy pairing if Level 4 is required
27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote
28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible
29- GAP: validate minimal service security level can be reached during pairing in responder role
30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient
31- CVE-2020-26555: reject connections to and from devices with same BD ADDR
17### Added
18- GAP: emit GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE
19
20### Fixed
21- GAP: store link key in hci connection struct to allow authenticate after pairing without bonding
22- GAP: avoid requesting authentication twice
23- GAP: cache own address on start advertising and connecting, provide getters
24- GAP: stop LE connecting if create connection fails (e.g. connectable adv active and multiple roles not supported)

--- 5 unchanged lines hidden (view full) ---

30- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding
31- GAP: return status for `gap_set_security_mode`
32- GAP: abort legacy pairing if Level 4 is required
33- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote
34- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible
35- GAP: validate minimal service security level can be reached during pairing in responder role
36- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient
37- CVE-2020-26555: reject connections to and from devices with same BD ADDR
38- CVE-2020-26555: ignore NULL link key
32- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key
33
34## Release v1.4
35
36### Added
37- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`)
38- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge
39- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`:

--- 797 unchanged lines hidden ---
39- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key
40
41## Release v1.4
42
43### Added
44- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`)
45- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge
46- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`:

--- 797 unchanged lines hidden ---