Skip to main content

Master Controller SDK - Android Kotlin - v15.13

Release Notes for
KOBIL GmbH
Master Controller SDK - Android
These notes are for internal and external usage

Requirements for current version

CPU/ABI: ARMv7a, ARMv8; x86, x86_64 Operating system (Standard Support): v12, v13, v14, v15, v16
Operating system (Purchased Extended Support): v10, v11, v12, v13, v14, v15, v16
SSMS: v3.7.x, v3.9.x
KOBIL Shift charts: 0.208.0+
KOBIL IDP: core 5.2.1+, core 4.29.0+
Development environment: Android Studio v2025.2.3; Android SDK Build Tools v36; Android Gradle plugin v8.12.1; Java included in Android Studio installation or minimum Java 17 (21+ recommended);

Test notes

Tested updates from MC SDK (KOBIL Digitanium, KOBIL Digitanium+): v15.9, v15.10, v15.11, v15.12
Tested updates from MC SDK (KOBIL Shift): v15.9, v15.10, v15.11, v15.12
NOTE: Update from mAST MS8b SDK to MCSDK is no longer tested from this release onwards.

Documentation

See https://developer.kobil.com/docs/mcsdk-docs/introduction/kobil_app_security

Notes for SSL

  • AST protocol uses TLS ciphers defined by OpenSSL 3.0.0 with "HIGH:!SSLv2:!SSLv3:!TLSv1:!aNULL:!eNULL:!3DES:@STRENGTH" (OpenSSL 3.0.0 is not the version this MC SDK uses):
  • TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-CCM8:ECDHE-ECDSA-AES256-CCM:DHE-RSA-AES256-CCM8:DHE-RSA-AES256-CCM:ECDHE-ECDSA-ARIA256-GCM-SHA384:ECDHE-ARIA256-GCM-SHA384:DHE-DSS-ARIA256-GCM-SHA384:DHE-RSA-ARIA256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA256:ECDHE-ECDSA-CAMELLIA256-SHA384:ECDHE-RSA-CAMELLIA256-SHA384:DHE-RSA-CAMELLIA256-SHA256:DHE-DSS-CAMELLIA256-SHA256:RSA-PSK-AES256-GCM-SHA384:DHE-PSK-AES256-GCM-SHA384:RSA-PSK-CHACHA20-POLY1305:DHE-PSK-CHACHA20-POLY1305:ECDHE-PSK-CHACHA20-POLY1305:DHE-PSK-AES256-CCM8:DHE-PSK-AES256-CCM:RSA-PSK-ARIA256-GCM-SHA384:DHE-PSK-ARIA256-GCM-SHA384:AES256-GCM-SHA384:AES256-CCM8:AES256-CCM:ARIA256-GCM-SHA384:PSK-AES256-GCM-SHA384:PSK-CHACHA20-POLY1305:PSK-AES256-CCM8:PSK-AES256-CCM:PSK-ARIA256-GCM-SHA384:AES256-SHA256:CAMELLIA256-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-CCM8:ECDHE-ECDSA-AES128-CCM:DHE-RSA-AES128-CCM8:DHE-RSA-AES128-CCM:ECDHE-ECDSA-ARIA128-GCM-SHA256:ECDHE-ARIA128-GCM-SHA256:DHE-DSS-ARIA128-GCM-SHA256:DHE-RSA-ARIA128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:DHE-DSS-AES128-SHA256:ECDHE-ECDSA-CAMELLIA128-SHA256:ECDHE-RSA-CAMELLIA128-SHA256:DHE-RSA-CAMELLIA128-SHA256:DHE-DSS-CAMELLIA128-SHA256:RSA-PSK-AES128-GCM-SHA256:DHE-PSK-AES128-GCM-SHA256:DHE-PSK-AES128-CCM8:DHE-PSK-AES128-CCM:RSA-PSK-ARIA128-GCM-SHA256:DHE-PSK-ARIA128-GCM-SHA256:AES128-GCM-SHA256:AES128-CCM8:AES128-CCM:ARIA128-GCM-SHA256:PSK-AES128-GCM-SHA256:PSK-AES128-CCM8:PSK-AES128-CCM:PSK-ARIA128-GCM-SHA256:AES128-SHA256:CAMELLIA128-SHA256

Known issues

  • Some devices (e.g. Google Pixel 6 with Android 13) blocks unlocking keystore via biometric authentication after 'wrong finger/face where presented too often'. This is a limitation of the device. In those cases app has to do a online login to IDP with his online credentials. MCSDK-1463
  • Digitanium Offline Function OTP: If MC triggers a RestartEvent internally i.e app will get a RestartResultEvent over the event bus (this can happen for example if there is some RuntimeErrorEvent), then the offline functions won't be supported and to mitigate the issue the app just needs to trigger a RestartEvent with the correct mc_config and offline functions will be available again.