|
@@ -3024,17 +3024,20 @@ unlock:
|
|
|
static u8 hci_get_auth_req(struct hci_conn *conn)
|
|
|
{
|
|
|
/* If remote requests dedicated bonding follow that lead */
|
|
|
- if (conn->remote_auth == 0x02 || conn->remote_auth == 0x03) {
|
|
|
+ if (conn->remote_auth == HCI_AT_DEDICATED_BONDING ||
|
|
|
+ conn->remote_auth == HCI_AT_DEDICATED_BONDING_MITM) {
|
|
|
/* If both remote and local IO capabilities allow MITM
|
|
|
* protection then require it, otherwise don't */
|
|
|
- if (conn->remote_cap == 0x03 || conn->io_capability == 0x03)
|
|
|
- return 0x02;
|
|
|
+ if (conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT ||
|
|
|
+ conn->io_capability == HCI_IO_NO_INPUT_OUTPUT)
|
|
|
+ return HCI_AT_DEDICATED_BONDING;
|
|
|
else
|
|
|
- return 0x03;
|
|
|
+ return HCI_AT_DEDICATED_BONDING_MITM;
|
|
|
}
|
|
|
|
|
|
/* If remote requests no-bonding follow that lead */
|
|
|
- if (conn->remote_auth == 0x00 || conn->remote_auth == 0x01)
|
|
|
+ if (conn->remote_auth == HCI_AT_NO_BONDING ||
|
|
|
+ conn->remote_auth == HCI_AT_NO_BONDING_MITM)
|
|
|
return conn->remote_auth | (conn->auth_type & 0x01);
|
|
|
|
|
|
return conn->auth_type;
|