diff options
Diffstat (limited to 'net/bluetooth/hci_event.c')
| -rw-r--r-- | net/bluetooth/hci_event.c | 25 | 
1 files changed, 13 insertions, 12 deletions
diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c index 20408d386268..0a591be8b0ae 100644 --- a/net/bluetooth/hci_event.c +++ b/net/bluetooth/hci_event.c @@ -2539,16 +2539,17 @@ static void hci_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)  				bt_dev_err(hdev, "no memory for new conn");  				goto unlock;  			} -		} - -		if (ev->link_type != SCO_LINK) -			goto unlock; +		} else { +			if (ev->link_type != SCO_LINK) +				goto unlock; -		conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr); -		if (!conn) -			goto unlock; +			conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, +						       &ev->bdaddr); +			if (!conn) +				goto unlock; -		conn->type = SCO_LINK; +			conn->type = SCO_LINK; +		}  	}  	if (!ev->status) { @@ -2962,14 +2963,14 @@ static void read_enc_key_size_complete(struct hci_dev *hdev, u8 status,  	if (!conn)  		goto unlock; -	/* If we fail to read the encryption key size, assume maximum -	 * (which is the same we do also when this HCI command isn't -	 * supported. +	/* While unexpected, the read_enc_key_size command may fail. The most +	 * secure approach is to then assume the key size is 0 to force a +	 * disconnection.  	 */  	if (rp->status) {  		bt_dev_err(hdev, "failed to read key size for handle %u",  			   handle); -		conn->enc_key_size = HCI_LINK_KEY_SIZE; +		conn->enc_key_size = 0;  	} else {  		conn->enc_key_size = rp->key_size;  	}  | 
