CHANGELOG.md (72cf8859b1e1fd6d954b0d294cc004d0375f8055) | CHANGELOG.md (3817f9dfcd08534cc44884987ba917f15d47a150) |
---|---|
1# Change Log 2All notable changes to this project will be documented in this file. 3 4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) 5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). 6 7--- 8 9## Unreleased | 1# Change Log 2All notable changes to this project will be documented in this file. 3 4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) 5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). 6 7--- 8 9## Unreleased |
10### Added 11### Fixed 12### Changed |
|
10 | 13 |
14 15## Release v1.4.1 16 |
|
11### Added 12- GAP: emit GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE 13 14### Fixed 15- GAP: store link key in hci connection struct to allow authenticate after pairing without bonding 16- GAP: avoid requesting authentication twice 17- GAP: cache own address on start advertising and connecting, provide getters 18- GAP: stop LE connecting if create connection fails (e.g. connectable adv active and multiple roles not supported) --- 5 unchanged lines hidden (view full) --- 24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding 25- GAP: return status for `gap_set_security_mode` 26- GAP: abort legacy pairing if Level 4 is required 27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote 28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible 29- GAP: validate minimal service security level can be reached during pairing in responder role 30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient 31- CVE-2020-26555: reject connections to and from devices with same BD ADDR | 17### Added 18- GAP: emit GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE 19 20### Fixed 21- GAP: store link key in hci connection struct to allow authenticate after pairing without bonding 22- GAP: avoid requesting authentication twice 23- GAP: cache own address on start advertising and connecting, provide getters 24- GAP: stop LE connecting if create connection fails (e.g. connectable adv active and multiple roles not supported) --- 5 unchanged lines hidden (view full) --- 30- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding 31- GAP: return status for `gap_set_security_mode` 32- GAP: abort legacy pairing if Level 4 is required 33- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote 34- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible 35- GAP: validate minimal service security level can be reached during pairing in responder role 36- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient 37- CVE-2020-26555: reject connections to and from devices with same BD ADDR |
38- CVE-2020-26555: ignore NULL link key |
|
32- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key 33 34## Release v1.4 35 36### Added 37- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`) 38- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge 39- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`: --- 797 unchanged lines hidden --- | 39- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key 40 41## Release v1.4 42 43### Added 44- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`) 45- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge 46- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`: --- 797 unchanged lines hidden --- |