diff options
| author | 2011-01-19 12:06:49 +0530 | |
|---|---|---|
| committer | 2011-01-19 14:40:43 -0200 | |
| commit | 65cf686ee102b7eb0477a4bab82ff227071a0258 (patch) | |
| tree | e710dde434f53139dd11b9d61d5a0c33f17f1e3a /tools/perf/scripts/python/check-perf-trace.py | |
| parent | Revert "Bluetooth: Update sec_level/auth_type for already existing connections" (diff) | |
| download | linux-dev-65cf686ee102b7eb0477a4bab82ff227071a0258.tar.xz linux-dev-65cf686ee102b7eb0477a4bab82ff227071a0258.zip | |
Bluetooth: Fix MITM protection requirement preservation
If an existing connection has a MITM protection requirement (the first
bit of the auth_type) then that requirement should not be cleared by new
sockets that reuse the ACL but don't have that requirement.
Signed-off-by: Johan Hedberg <johan.hedberg@nokia.com>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
Diffstat (limited to 'tools/perf/scripts/python/check-perf-trace.py')
0 files changed, 0 insertions, 0 deletions
