#
52d34f98 |
| 12-Feb-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
disconnect with 0x13 after dedicated bonding
|
#
8e618f72 |
| 06-Feb-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
add gap_set_local_name and mark local_name as const
|
#
e80b2cf9 |
| 28-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
trigger hci_run after setting auth req bonding flag
|
#
82d8f825 |
| 28-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
fix condition for ssp io cap negative reply
|
#
caaa388c |
| 27-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
removed debug printf
|
#
66fb9560 |
| 27-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
add hci_disable_l2cap_timeout_check() for testing
|
#
62bda3fb |
| 23-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
added hci_connection_for_bd_addr
|
#
9e61646f |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
added hci_set_class_of_device
|
#
3a9fb326 |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
alloc hci_stack structure if malloc is provided - reduces static memory consumption and saves RAM if BTstack isn't activated
|
#
bde315ce |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
renamed btstack config.h to btstack-config.h to allow for better integration with other projects
|
#
63048403 |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
use SSP_IO_AUTHREQ_MITM_PROTECTION_NOT_REQUIRED_GENERAL_BONDING as default
|
#
9faad3ab |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
don't modify ssp auth req for gap_request_security_level
|
#
106d6d11 |
| 19-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
don't modify ssp authreq for dedicated bonding
|
#
ad83dc6a |
| 18-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
support dedicated bonding and provide example for it
|
#
6724cd9e |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
track legacy and ssp pairing, new implementation for hci_authentication_active_for_handle based on that
|
#
899283ea |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
rename HANDLE_PIN_CODE_REQUEST TO DENY_PIN_CODE_REQUEST
|
#
b5cb6874 |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
don't send encryption command if authentication failed
|
#
df3354fc |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
if both devices support SSP, initiator shall setup unauthenticated link unless connecting to SDP
|
#
fb8ba0db |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
GAP update to higher security level working
|
#
1eb2563e |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
reject l2cap connection if secruity level not reached after auhentication
|
#
a00031e2 |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
successfully enable encryption if security level 2 is requested for l2cap service
|
#
dce78009 |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
allow to send connection encryption command
|
#
34d2123c |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
fix sending of Connection Result - Pending, request authentication if security level isn't enough
|
#
f85a9399 |
| 17-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
request security level 0 for l2cap services
|
#
2bd8b7e7 |
| 16-Jan-2014 |
[email protected] <[email protected]@1a0a8af8-31b5-11de-8e0c-53a27eea117e> |
reject connection (0x03 security block) if both have SSP, PSM != SDP, and connection is not ecncrypted
|