#
1ae74bf3 |
| 23-Aug-2021 |
Matthias Ringwald <[email protected]> |
gap: assert pairing complete event for OOB if user does not provide OOB data
|
#
cc15bb2c |
| 23-Aug-2021 |
Matthias Ringwald <[email protected]> |
gap: emit gap pairing complete after calling gap_pin_code_negative
also asserts event for SSP pairing decline
|
#
a800d95e |
| 12-Aug-2021 |
Matthias Ringwald <[email protected]> |
gap: reject pin code request if security level 4 required
|
#
4159a80b |
| 12-Aug-2021 |
Matthias Ringwald <[email protected]> |
hci: fix crash on sending GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE
|
#
bfaf6993 |
| 10-Aug-2021 |
Matthias Ringwald <[email protected]> |
GAP: correct field order in GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE
|
#
50f49832 |
| 20-Jul-2021 |
Matthias Ringwald <[email protected]> |
gap: detect SC->Legacy downgrade on encryption change
|
#
f3aafff1 |
| 19-Jul-2021 |
Matthias Ringwald <[email protected]> |
fix build
|
#
aa2fe986 |
| 19-Jul-2021 |
Matthias Ringwald <[email protected]> |
gap: treat newly paired connection and aes-ccm encrypted connections as authenticated
|
#
ac973fd6 |
| 15-Jul-2021 |
Matthias Ringwald <[email protected]> |
hci.c: fix len field of GAP_EVENT_INQUIRY_RESULT
|
#
3c439ac4 |
| 13-Jul-2021 |
Matthias Ringwald <[email protected]> |
gap: reset requested_security_level on pairing complete
|
#
e76bd685 |
| 12-Jul-2021 |
Matthias Ringwald <[email protected]> |
gap: reset requested_security_level on pairing complete
|
#
2a75353a |
| 12-Jul-2021 |
Matthias Ringwald <[email protected]> |
gap: send hci authentication required after remote features are available
|
#
ddbec4ce |
| 08-Jul-2021 |
Matthias Ringwald <[email protected]> |
hci: avoid assert sending sco via timers
|
#
7ca4a7ed |
| 28-Jun-2021 |
Matthias Ringwald <[email protected]> |
gap: emit GAP_EVENT_PAIRING_STARTED and GAP_EVENT_PAIRING_COMPLETE for OOB Pairing
|
#
3817f9df |
| 22-Jun-2021 |
Matthias Ringwald <[email protected]> |
CVE-2020-26555: ignore NULL link key
|
#
79e0fa07 |
| 22-Jun-2021 |
Matthias Ringwald <[email protected]> |
CVE-2020-26555: reject connections to and from devices with same BD ADDR (fix)
|
#
72cf8859 |
| 22-Jun-2021 |
Matthias Ringwald <[email protected]> |
CVE-2020-26555: reject connections to and from devices with same BD ADDR
|
#
acadfdd0 |
| 21-Jun-2021 |
Matthias Ringwald <[email protected]> |
hci: fix c++ build
|
#
23e56ace |
| 20-Jun-2021 |
Matthias Ringwald <[email protected]> |
hci: fix c++ build
|
#
5a561920 |
| 20-Jun-2021 |
Matthias Ringwald <[email protected]> |
gap: check if minimal service security level can be reached in responder role
|
#
8ad4dfff |
| 20-Jun-2021 |
Matthias Ringwald <[email protected]> |
l2cap: track minimal security level
|
#
d7387af3 |
| 20-Jun-2021 |
Matthias Ringwald <[email protected]> |
l2cap: streamline secure connections only mode
If SC Only Mode is enabled, map all security levels to level 4 unless it is level 0
|
#
bc00e12c |
| 20-Jun-2021 |
Matthias Ringwald <[email protected]> |
gap: secure connections only mode requires level 4 for all non-secure services
|
#
367aedc0 |
| 19-Jun-2021 |
Matthias Ringwald <[email protected]> |
gap: send user confirmation negative reply if required security level cannot be met
|
#
9671e615 |
| 19-Jun-2021 |
Matthias Ringwald <[email protected]> |
gap: send IO Capabilities Negative Reply if Level 4 required but remote does not support SC
|