Loading system/stack/btm/btm_sec.cc +0 −16 Original line number Diff line number Diff line Loading @@ -3309,22 +3309,6 @@ void btm_sec_encrypt_change(uint16_t handle, tHCI_STATUS status, BTM_TRACE_DEBUG("%s start SM over BR/EDR", __func__); SMP_BR_PairWith(p_dev_rec->bd_addr); } } else { // BR/EDR is successfully encrypted. Correct LK type if needed // (BR/EDR LK derived from LE LTK was used for encryption) if ((encr_enable == 1) && /* encryption is ON for SSP */ /* LK type is for BR/EDR SC */ (p_dev_rec->link_key_type == BTM_LKEY_TYPE_UNAUTH_COMB_P_256 || p_dev_rec->link_key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256)) { if (p_dev_rec->link_key_type == BTM_LKEY_TYPE_UNAUTH_COMB_P_256) p_dev_rec->link_key_type = BTM_LKEY_TYPE_UNAUTH_COMB; else /* BTM_LKEY_TYPE_AUTH_COMB_P_256 */ p_dev_rec->link_key_type = BTM_LKEY_TYPE_AUTH_COMB; BTM_TRACE_DEBUG("updated link key type to %d", p_dev_rec->link_key_type); btm_send_link_key_notif(p_dev_rec); } } } Loading Loading
system/stack/btm/btm_sec.cc +0 −16 Original line number Diff line number Diff line Loading @@ -3309,22 +3309,6 @@ void btm_sec_encrypt_change(uint16_t handle, tHCI_STATUS status, BTM_TRACE_DEBUG("%s start SM over BR/EDR", __func__); SMP_BR_PairWith(p_dev_rec->bd_addr); } } else { // BR/EDR is successfully encrypted. Correct LK type if needed // (BR/EDR LK derived from LE LTK was used for encryption) if ((encr_enable == 1) && /* encryption is ON for SSP */ /* LK type is for BR/EDR SC */ (p_dev_rec->link_key_type == BTM_LKEY_TYPE_UNAUTH_COMB_P_256 || p_dev_rec->link_key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256)) { if (p_dev_rec->link_key_type == BTM_LKEY_TYPE_UNAUTH_COMB_P_256) p_dev_rec->link_key_type = BTM_LKEY_TYPE_UNAUTH_COMB; else /* BTM_LKEY_TYPE_AUTH_COMB_P_256 */ p_dev_rec->link_key_type = BTM_LKEY_TYPE_AUTH_COMB; BTM_TRACE_DEBUG("updated link key type to %d", p_dev_rec->link_key_type); btm_send_link_key_notif(p_dev_rec); } } } Loading