l2cap.c (1eb2563e8a879e8d115d41616c44ad3f5871ea12) | l2cap.c (fb8ba0dbcd59b0f55263e5be12c95aa6e35ceca0) |
---|---|
1/* 2 * Copyright (C) 2009-2012 by Matthias Ringwald 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright --- 826 unchanged lines hidden (view full) --- 835 log_error("no hci_connection for handle %u\n", handle); 836 return; 837 } 838 839 // reject connection (0x03 security block) and disconnect if both have SSP, connection is not encrypted and PSM != SDP 840 if (psm != PSM_SDP 841 && hci_local_ssp_activated() 842 && hci_remote_ssp_supported(handle) | 1/* 2 * Copyright (C) 2009-2012 by Matthias Ringwald 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright --- 826 unchanged lines hidden (view full) --- 835 log_error("no hci_connection for handle %u\n", handle); 836 return; 837 } 838 839 // reject connection (0x03 security block) and disconnect if both have SSP, connection is not encrypted and PSM != SDP 840 if (psm != PSM_SDP 841 && hci_local_ssp_activated() 842 && hci_remote_ssp_supported(handle) |
843 && gap_security_level(handle) == LEVEL_0){ | 843 && gap_security_level(handle) == LEVEL_3){ |
844 845 // 0x0003 Security Block 846 l2cap_register_signaling_response(handle, CONNECTION_REQUEST, sig_id, 0x0003); 847 return; 848 } 849 850 851 // alloc structure --- 489 unchanged lines hidden --- | 844 845 // 0x0003 Security Block 846 l2cap_register_signaling_response(handle, CONNECTION_REQUEST, sig_id, 0x0003); 847 return; 848 } 849 850 851 // alloc structure --- 489 unchanged lines hidden --- |