Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 4cb95659 authored by Calvin On's avatar Calvin On Committed by Cherrypicker Worker
Browse files

Fix bit inversion in RFCOMM event handler.

The bit-flip seems to have broken the authentication sequence
for incoming RFCOMM connections.

Bug: 268273571
Test: atest BluetoothInstrumentationTests
Test: Manual (see comment#1 in bug)
Ignore-AOSP-First: Security fix.
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:f0cbbdde0f34dc866cc756f4ee70d371ada33e4c)
Merged-In: I52b4c2f8d595e3d7be3fb18818f8b7f93271fb32
Change-Id: I52b4c2f8d595e3d7be3fb18818f8b7f93271fb32
parent 56d0a41f
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -147,7 +147,7 @@ void rfc_port_sm_state_closed(tPORT* p_port, tRFC_PORT_EVENT event,

      /* Open will be continued after security checks are passed */
      p_port->rfc.state = RFC_STATE_TERM_WAIT_SEC_CHECK;
      btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, true,
      btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, false,
                                p_port->sec_mask, &rfc_sec_check_complete,
                                p_port);
      return;