History log of /btstack/src/hci.c (Results 1176 – 1200 of 1410)
Revision Date Author Comments
# 52d34f98 12-Feb-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

disconnect with 0x13 after dedicated bonding


# 8e618f72 06-Feb-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

add gap_set_local_name and mark local_name as const


# e80b2cf9 28-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

trigger hci_run after setting auth req bonding flag


# 82d8f825 28-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

fix condition for ssp io cap negative reply


# caaa388c 27-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

removed debug printf


# 66fb9560 27-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

add hci_disable_l2cap_timeout_check() for testing


# 62bda3fb 23-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

added hci_connection_for_bd_addr


# 9e61646f 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

added hci_set_class_of_device


# 3a9fb326 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

alloc hci_stack structure if malloc is provided - reduces static memory consumption and saves RAM if BTstack isn't activated


# bde315ce 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

renamed btstack config.h to btstack-config.h to allow for better integration with other projects


# 63048403 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

use SSP_IO_AUTHREQ_MITM_PROTECTION_NOT_REQUIRED_GENERAL_BONDING as default


# 9faad3ab 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

don't modify ssp auth req for gap_request_security_level


# 106d6d11 19-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

don't modify ssp authreq for dedicated bonding


# ad83dc6a 18-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

support dedicated bonding and provide example for it


# 6724cd9e 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

track legacy and ssp pairing, new implementation for hci_authentication_active_for_handle based on that


# 899283ea 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

rename HANDLE_PIN_CODE_REQUEST TO DENY_PIN_CODE_REQUEST


# b5cb6874 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

don't send encryption command if authentication failed


# df3354fc 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

if both devices support SSP, initiator shall setup unauthenticated link unless connecting to SDP


# fb8ba0db 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

GAP update to higher security level working


# 1eb2563e 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

reject l2cap connection if secruity level not reached after auhentication


# a00031e2 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

successfully enable encryption if security level 2 is requested for l2cap service


# dce78009 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

allow to send connection encryption command


# 34d2123c 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

fix sending of Connection Result - Pending, request authentication if security level isn't enough


# f85a9399 17-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

request security level 0 for l2cap services


# 2bd8b7e7 16-Jan-2014 [email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e>

reject connection (0x03 security block) if both have SSP, PSM != SDP, and connection is not ecncrypted


1...<<41424344454647484950>>...57