summaryrefslogtreecommitdiff
path: root/emulator/smp.c
diff options
context:
space:
mode:
authorJohan Hedberg <johan.hedberg@intel.com>2014-09-19 11:08:32 +0300
committerJohan Hedberg <johan.hedberg@intel.com>2014-09-19 11:09:01 +0300
commit2c8a8da492a49add65a34ce4af4d3f7a7c122e1d (patch)
treeb3dd32c50a7795d166c8681f2efeccc4e24b0cac /emulator/smp.c
parent64d4e42135f9d75dc4a0dec71acee3bc9da0be35 (diff)
downloadbluez-2c8a8da492a49add65a34ce4af4d3f7a7c122e1d.tar.gz
emulator/smp: Use proper defines for SMP opcodes
Diffstat (limited to 'emulator/smp.c')
-rw-r--r--emulator/smp.c21
1 files changed, 10 insertions, 11 deletions
diff --git a/emulator/smp.c b/emulator/smp.c
index 6cb9f3b0d..8da704383 100644
--- a/emulator/smp.c
+++ b/emulator/smp.c
@@ -101,7 +101,7 @@ static void pairing_req(struct smp_conn *conn, const void *data, uint16_t len)
memcpy(conn->preq, data, sizeof(conn->preq));
- rsp[0] = 0x02; /* Pairing Response */
+ rsp[0] = BT_L2CAP_SMP_PAIRING_RESPONSE;
rsp[1] = bthost_get_io_capability(bthost);
rsp[2] = 0x00; /* OOB Flag */
rsp[3] = bthost_get_auth_req(bthost);
@@ -121,7 +121,7 @@ static void pairing_rsp(struct smp_conn *conn, const void *data, uint16_t len)
memcpy(conn->prsp, data, sizeof(conn->prsp));
- cfm[0] = 0x03;
+ cfm[0] = BT_L2CAP_SMP_PAIRING_CONFIRM;
bt_crypto_c1(smp->crypto, conn->tk, conn->prnd, conn->prsp,
conn->preq, conn->ia_type, conn->ia,
conn->ra_type, conn->ra, &cfm[1]);
@@ -137,10 +137,10 @@ static void pairing_cfm(struct smp_conn *conn, const void *data, uint16_t len)
memcpy(conn->pcnf, data + 1, 16);
if (conn->out) {
- rsp[0] = 0x04;
+ rsp[0] = BT_L2CAP_SMP_PAIRING_RANDOM;
memset(&rsp[1], 0, 16);
} else {
- rsp[0] = 0x03;
+ rsp[0] = BT_L2CAP_SMP_PAIRING_CONFIRM;
bt_crypto_c1(conn->smp->crypto, conn->tk, conn->prnd,
conn->prsp, conn->preq, conn->ia_type,
conn->ia, conn->ra_type, conn->ra, &rsp[1]);
@@ -152,7 +152,6 @@ static void pairing_cfm(struct smp_conn *conn, const void *data, uint16_t len)
static void pairing_rnd(struct smp_conn *conn, const void *data, uint16_t len)
{
struct bthost *bthost = conn->smp->bthost;
- const uint8_t *rnd = data;
uint8_t rsp[17];
memcpy(conn->rrnd, data + 1, 16);
@@ -163,7 +162,7 @@ static void pairing_rnd(struct smp_conn *conn, const void *data, uint16_t len)
if (conn->out)
return;
- rsp[0] = rnd[0];
+ rsp[0] = BT_L2CAP_SMP_PAIRING_RANDOM;
memset(&rsp[1], 0, 16);
bthost_send_cid(bthost, conn->handle, SMP_CID, rsp, sizeof(rsp));
@@ -173,7 +172,7 @@ void smp_pair(void *conn_data, uint8_t io_cap, uint8_t auth_req)
{
struct smp_conn *conn = conn_data;
struct bthost *bthost = conn->smp->bthost;
- const uint8_t smp_pair_req[] = { 0x01, /* Pairing Request */
+ const uint8_t smp_pair_req[] = { BT_L2CAP_SMP_PAIRING_REQUEST,
io_cap, /* IO Capability */
0x00, /* OOB Flag */
auth_req, /* Auth requirement */
@@ -201,16 +200,16 @@ void smp_data(void *conn_data, const void *data, uint16_t len)
opcode = *((const uint8_t *) data);
switch (opcode) {
- case 0x01: /* Pairing Request */
+ case BT_L2CAP_SMP_PAIRING_REQUEST:
pairing_req(conn, data, len);
break;
- case 0x02: /* Pairing Response */
+ case BT_L2CAP_SMP_PAIRING_RESPONSE:
pairing_rsp(conn, data, len);
break;
- case 0x03: /* Pairing Confirm */
+ case BT_L2CAP_SMP_PAIRING_CONFIRM:
pairing_cfm(conn, data, len);
break;
- case 0x04: /* Pairing Random */
+ case BT_L2CAP_SMP_PAIRING_RANDOM:
pairing_rnd(conn, data, len);
break;
default: