1. 26 Sep, 2014 4 commits
  2. 25 Sep, 2014 1 commit
  3. 24 Sep, 2014 18 commits
  4. 23 Sep, 2014 5 commits
  5. 21 Sep, 2014 10 commits
  6. 18 Sep, 2014 2 commits
    • Johan Hedberg's avatar
      Bluetooth: Fix setting correct security level when initiating SMP · 5eb596f5
      Johan Hedberg authored
      We can only determine the final security level when both pairing request
      and response have been exchanged. When initiating pairing the starting
      target security level is set to MEDIUM unless explicitly specified to be
      HIGH, so that we can still perform pairing even if the remote doesn't
      have MITM capabilities. However, once we've received the pairing
      response we should re-consult the remote and local IO capabilities and
      upgrade the target security level if necessary.
      
      Without this patch the resulting Long Term Key will occasionally be
      reported to be unauthenticated when it in reality is an authenticated
      one.
      Signed-off-by: default avatarJohan Hedberg <johan.hedberg@intel.com>
      Signed-off-by: default avatarMarcel Holtmann <marcel@holtmann.org>
      Cc: stable@vger.kernel.org
      5eb596f5
    • Kalle Valo's avatar
      ath10k: use ether_addr_copy() · b25f32cb
      Kalle Valo authored
      As suggeested by checkpatch:
      
      WARNING: Prefer ether_addr_copy() over memcpy() if the Ethernet addresses are __aligned(2)
      
      In wmi.c I had to change due to sparse warnings copying of struct wmi_mac_addr
      from form &cmd->peer_macaddr.addr to cmd->peer_macaddr.addr. In
      ath10k_wmi_set_ap_ps_param() I also added the missing ".addr" to the copy
      command.
      Signed-off-by: default avatarKalle Valo <kvalo@qca.qualcomm.com>
      b25f32cb