@@ -335,7 +335,7 @@ void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, UINT8 bdn[BTM_MAX_REM_BD_NAME_L
335335#if (CLASSIC_BT_INCLUDED == TRUE )
336336 const UINT8 req_pend = (p_dev_rec -> sm4 & BTM_SM4_REQ_PEND );
337337#endif ///CLASSIC_BT_INCLUDED == TRUE
338- /* Store the Peer Security Capabilites (in SM4 and rmt_sec_caps) */
338+ /* Store the Peer Security Capabilities (in SM4 and rmt_sec_caps) */
339339#if (SMP_INCLUDED == TRUE )
340340 btm_sec_set_peer_sec_caps (p , p_dev_rec );
341341#endif ///SMP_INCLUDED == TRUE
@@ -350,7 +350,7 @@ void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, UINT8 bdn[BTM_MAX_REM_BD_NAME_L
350350 return ;
351351 }
352352 } else {
353- /* If remote features indicated secure connection (SC) mode, check the remote feautres again*/
353+ /* If remote features indicated secure connection (SC) mode, check the remote features again*/
354354 /* this is to prevent from BIAS attack where attacker can downgrade SC mode*/
355355 btm_read_remote_features (p -> hci_handle );
356356 }
@@ -474,7 +474,7 @@ void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport)
474474 BTM_TRACE_DEBUG ("Bonded\n" );
475475 }
476476 } else {
477- BTM_TRACE_DEBUG ("Bletooth link down\n" );
477+ BTM_TRACE_DEBUG ("Bluetooth link down\n" );
478478 p_dev_rec -> sec_flags &= ~(BTM_SEC_AUTHORIZED | BTM_SEC_AUTHENTICATED
479479 | BTM_SEC_ENCRYPTED | BTM_SEC_ROLE_SWITCHED );
480480 }
@@ -1016,7 +1016,7 @@ void btm_process_remote_ext_features (tACL_CONN *p_acl_cb, UINT8 num_read_pages)
10161016
10171017 const UINT8 req_pend = (p_dev_rec -> sm4 & BTM_SM4_REQ_PEND );
10181018#if (SMP_INCLUDED == TRUE )
1019- /* Store the Peer Security Capabilites (in SM4 and rmt_sec_caps) */
1019+ /* Store the Peer Security Capabilities (in SM4 and rmt_sec_caps) */
10201020 btm_sec_set_peer_sec_caps (p_acl_cb , p_dev_rec );
10211021#endif ///SMP_INCLUDED == TRUE
10221022 BTM_TRACE_API ("%s: pend:%d\n" , __FUNCTION__ , req_pend );
@@ -1455,7 +1455,7 @@ void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset)
14551455**
14561456** Function btm_acl_role_changed
14571457**
1458- ** Description This function is called whan a link's master/slave role change
1458+ ** Description This function is called when a link's master/slave role change
14591459** event or command status event (with error) is received.
14601460** It updates the link control block, and calls
14611461** the registered callback with status and role (if registered).
@@ -2705,7 +2705,7 @@ void btm_acl_connected(BD_ADDR bda, UINT16 handle, UINT8 link_type, UINT8 enc_mo
27052705 l2c_link_hci_conn_comp (status , handle , bda );
27062706 }
27072707#if BTM_SCO_INCLUDED == TRUE
2708- else {
2708+ else if ( link_type == HCI_LINK_TYPE_SCO ) {
27092709 memset (& esco_data , 0 , sizeof (tBTM_ESCO_DATA ));
27102710 esco_data .link_type = HCI_LINK_TYPE_SCO ;
27112711 memcpy (esco_data .bd_addr , bda , BD_ADDR_LEN );
0 commit comments