summaryrefslogtreecommitdiffstats
path: root/stack/smp
diff options
context:
space:
mode:
authorSatya Calloji <satyac@broadcom.com>2015-04-30 13:58:59 -0700
committerAndre Eisenbach <eisenbach@google.com>2015-05-20 23:09:59 -0700
commitc0a4342caa940e4d214d748c09583e7c8bff7c74 (patch)
tree98335900e25b02dbea3d43618764697f64fba5e8 /stack/smp
parentd0aa8e53aa7ac1137a47570e08c2b963aaa49141 (diff)
downloadandroid_system_bt-c0a4342caa940e4d214d748c09583e7c8bff7c74.tar.gz
android_system_bt-c0a4342caa940e4d214d748c09583e7c8bff7c74.tar.bz2
android_system_bt-c0a4342caa940e4d214d748c09583e7c8bff7c74.zip
Fixed cross key for LE when paired over BR-EDR
SMP state machine was resending security request and waiting for a response when paired over BR-EDR. The state machine state timed out due to this and SMP failed while doing cross key pairing. Thus, user was asked for pairing again. Original author: Priti Aghera <paghera@broadcom.com> Change-Id: I568f936bb7bee21fb78e8454469ecad3445f026f
Diffstat (limited to 'stack/smp')
-rw-r--r--stack/smp/smp_act.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/stack/smp/smp_act.c b/stack/smp/smp_act.c
index f4e81dcb0..4adde966d 100644
--- a/stack/smp/smp_act.c
+++ b/stack/smp/smp_act.c
@@ -810,7 +810,8 @@ void smp_br_process_pairing_command(tSMP_CB *p_cb, tSMP_INT_DATA *p_data)
if (p_cb->role == HCI_ROLE_SLAVE)
{
p_dev_rec->new_encryption_key_is_p256 = FALSE;
- p_cb->cb_evt = SMP_SEC_REQUEST_EVT;
+ /* shortcut to skip Security Grant step */
+ p_cb->cb_evt = SMP_BR_KEYS_REQ_EVT;
}
else /* Master receives pairing response */
{