|
@@ -187,6 +187,8 @@ static void smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
|
|
|
BT_DBG("conn %p", conn);
|
|
|
|
|
|
+ conn->preq[0] = SMP_CMD_PAIRING_REQ;
|
|
|
+ memcpy(&conn->preq[1], rp, sizeof(*rp));
|
|
|
skb_pull(skb, sizeof(*rp));
|
|
|
|
|
|
rp->io_capability = 0x00;
|
|
@@ -196,17 +198,25 @@ static void smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
rp->resp_key_dist = 0x00;
|
|
|
rp->auth_req &= (SMP_AUTH_BONDING | SMP_AUTH_MITM);
|
|
|
|
|
|
+ conn->prsp[0] = SMP_CMD_PAIRING_RSP;
|
|
|
+ memcpy(&conn->prsp[1], rp, sizeof(*rp));
|
|
|
+
|
|
|
smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(*rp), rp);
|
|
|
}
|
|
|
|
|
|
static void smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
{
|
|
|
+ struct smp_cmd_pairing *rp = (void *) skb->data;
|
|
|
struct smp_cmd_pairing_confirm cp;
|
|
|
|
|
|
BT_DBG("conn %p", conn);
|
|
|
|
|
|
memset(&cp, 0, sizeof(cp));
|
|
|
|
|
|
+ conn->prsp[0] = SMP_CMD_PAIRING_RSP;
|
|
|
+ memcpy(&conn->prsp[1], rp, sizeof(*rp));
|
|
|
+ skb_pull(skb, sizeof(*rp));
|
|
|
+
|
|
|
smp_send_cmd(conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp);
|
|
|
}
|
|
|
|
|
@@ -266,6 +276,9 @@ static void smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
cp.resp_key_dist = 0x00;
|
|
|
cp.auth_req = rp->auth_req & (SMP_AUTH_BONDING | SMP_AUTH_MITM);
|
|
|
|
|
|
+ conn->preq[0] = SMP_CMD_PAIRING_REQ;
|
|
|
+ memcpy(&conn->preq[1], &cp, sizeof(cp));
|
|
|
+
|
|
|
smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
|
|
|
}
|
|
|
|
|
@@ -303,6 +316,10 @@ int smp_conn_security(struct l2cap_conn *conn, __u8 sec_level)
|
|
|
cp.init_key_dist = 0x00;
|
|
|
cp.resp_key_dist = 0x00;
|
|
|
cp.auth_req = authreq;
|
|
|
+
|
|
|
+ conn->preq[0] = SMP_CMD_PAIRING_REQ;
|
|
|
+ memcpy(&conn->preq[1], &cp, sizeof(cp));
|
|
|
+
|
|
|
smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
|
|
|
} else {
|
|
|
struct smp_cmd_security_req cp;
|