1. 25 Aug, 2015 - 1 commit
  2. 13 Jul, 2015 - 4 commits
  3. 10 Jul, 2015 - 1 commit
  4. 07 Jul, 2015 - 3 commits
    • Alex Blasche's avatar
      Android: Apply QBluetoothSocket::preferredSecurityFlags during connect · 5549e27b
      Alex Blasche authored
      
      This patch permits Android clients to choose the security level
      before connecting to the server.
      
      This may also used by some older devices (Android 4.1 or lower)
      to connect if they don't support the so far predetermined secure
      way of connecting via rfcomm.
      
      Task-number: QTBUG-46377
      Change-Id: I3f72f183e7ead16bec57a0ce83e9a96324675312
      Reviewed-by: default avatarTimur Pocheptsov <Timur.Pocheptsov@digia.com>
      5549e27b
    • Alex Blasche's avatar
      Bluez: Apply QBluetoothSocket::preferredSecurityFlags during connect · 69201947
      Alex Blasche authored
      
      This permits Bluez clients to determine the security level before
      connecting to the server.
      
      Note that the server may change the sec level at runtime without the
      user noticing. If the user wants to detect such cases socketDescriptor()
      in compination with getsockopt() should be used.
      
      Task-number: QTBUG-46377
      Change-Id: I3bc4fcd62dc44d9e2e14e5a6e7416e3bb8e0d50b
      Reviewed-by: default avatarTimur Pocheptsov <Timur.Pocheptsov@digia.com>
      69201947
    • Alex Blasche's avatar
      Bluez: Improve security flag handling in QBluetoothServer · 92a82cf5
      Alex Blasche authored
      
      1.) Remove the usage SOL_RFCOMM & SOL_L2CAP. They were replaced
      by SOL_BLUEOOTH. The same applies to RFCOMM_LM & L2CAP_LM which were
      replaced by BT_SECURITY.
      
      2.) Fix securityFlags() when socket was closed already. It always
      triggered undesirable error messages as the code assumed a valid socket
      fd.
      
      3.) Fix setSecurityFlags() when calling after the server socket was
      closed. The docs state that this function shall be called before
      listen is called. However after the socket was closed for the first time
      the security level could not be set anymore because the server socket is
      invalid until the next call to listen(). To solve this problem the
      initial security level is stored and applied during listen().
      
      These changes imply a slightly different runtime behavior of securityFlags().
      While the socket is closed it returns the stored value and during
      runtime the actual runtime level is returned.
      
      Change-Id: I720e6ac94a569397c4fec0058a1d388a1f35ecae
      Reviewed-by: default avatarTimur Pocheptsov <Timur.Pocheptsov@digia.com>
      92a82cf5
  5. 03 Jul, 2015 - 1 commit
  6. 23 Jun, 2015 - 1 commit
  7. 18 Jun, 2015 - 1 commit
  8. 17 Jun, 2015 - 3 commits
  9. 16 Jun, 2015 - 1 commit
  10. 10 Jun, 2015 - 4 commits
  11. 28 May, 2015 - 1 commit
  12. 27 May, 2015 - 2 commits
  13. 26 May, 2015 - 3 commits
  14. 18 May, 2015 - 1 commit
  15. 12 May, 2015 - 2 commits
  16. 11 May, 2015 - 1 commit
    • Peter Rustler's avatar
      Bugfix: Bluetooth Le for Android need to close BluetoothGatt · 68e8dbce
      Peter Rustler authored
      
      Android can only handle a defined count of simultaneously connections to bluetooth le
      devices. Every Android device have a different defined amount of possible simultaneously connections.
      If we do not close the connection and reconnect to the device or another device,
      the count of used connections get up. If we exceed the maximum connection count we can not connect
      to bluetooth le devices anymore.
      The only way to recover is to restart the application to reset the open connection count.
      
      This patch closes the connection after it has been disconnected.
      
      Change-Id: Id96a69ef07eb973216495a0ba8e46fd639338165
      Reviewed-by: default avatarFrank Meerkoetter <frank.meerkoetter@basyskom.com>
      Reviewed-by: default avatarAlex Blasche <alexander.blasche@theqtcompany.com>
      68e8dbce
  17. 08 May, 2015 - 1 commit
    • Peter Rustler's avatar
      Bugfix Andoid Bluetooth coreConfiguration data in discoveredDevices · e686b22a
      Peter Rustler authored
      
      In current implementation of processDiscoveredDevices, if we receive the same
      device again with different coreConfiguration, the device will be just replaced.
      In Android there are 2 ways to scan for bluetooth devices. One is the scan for all
      bluetooth devices (including LE) and one for scanning just LE devices.
      Currently they are used both, which means we receive dual devices multiple times.
      
      Depending of the arrival in time of the QBluetoothDeviceInfo the coreConfiguration is different.
      In the List of discovered devices this lead to devices reported as LE only or classic only
      which is wrong.
      
      If the Application calls discoveredDevices() it will get a list with wrong coreConfiguration.
      
      This patch update the coreConfiguration of the QBluetoothDeviceInfo in list.
      
      Change-Id: I312544ca513503c5d6b31a1ca0cfbe530c0be911
      Reviewed-by: default avatarAlex Blasche <alexander.blasche@theqtcompany.com>
      Reviewed-by: default avatarFrank Meerkoetter <frank.meerkoetter@basyskom.com>
      e686b22a
  18. 05 May, 2015 - 1 commit
  19. 04 May, 2015 - 1 commit
  20. 21 Apr, 2015 - 2 commits
  21. 20 Apr, 2015 - 3 commits
  22. 15 Apr, 2015 - 2 commits