Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 92559382 authored by Calvin On's avatar Calvin On
Browse files

Fix bit inversion in RFCOMM event handler.

The bit-flip seems to have broken the authentication sequence
for incoming RFCOMM connections.

Bug: 268273571
Test: Manual (see comment#1 in bug)
Ignore-AOSP-First: This branch is unreachable from AOSP.
Pending-CP-To-Master: ag/22446590
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:23e155d25cf425a319fff2049a3e932fd266cc98)
Merged-In: I52b4c2f8d595e3d7be3fb18818f8b7f93271fb32
Change-Id: I52b4c2f8d595e3d7be3fb18818f8b7f93271fb32
parent f89d1c6f
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -150,7 +150,7 @@ void rfc_port_sm_state_closed(tPORT* p_port, tRFC_PORT_EVENT event,

      /* Open will be continued after security checks are passed */
      p_port->rfc.state = RFC_STATE_TERM_WAIT_SEC_CHECK;
      btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, true,
      btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, false,
                                p_port->sec_mask, &rfc_sec_check_complete,
                                p_port);
      return;