@@ -112,9 +112,9 @@ struct smp_chan {
112
112
u8 id_addr_type ;
113
113
u8 irk [16 ];
114
114
struct smp_csrk * csrk ;
115
- struct smp_csrk * slave_csrk ;
115
+ struct smp_csrk * responder_csrk ;
116
116
struct smp_ltk * ltk ;
117
- struct smp_ltk * slave_ltk ;
117
+ struct smp_ltk * responder_ltk ;
118
118
struct smp_irk * remote_irk ;
119
119
u8 * link_key ;
120
120
unsigned long flags ;
@@ -754,7 +754,7 @@ static void smp_chan_destroy(struct l2cap_conn *conn)
754
754
mgmt_smp_complete (hcon , complete );
755
755
756
756
kfree_sensitive (smp -> csrk );
757
- kfree_sensitive (smp -> slave_csrk );
757
+ kfree_sensitive (smp -> responder_csrk );
758
758
kfree_sensitive (smp -> link_key );
759
759
760
760
crypto_free_shash (smp -> tfm_cmac );
@@ -777,9 +777,9 @@ static void smp_chan_destroy(struct l2cap_conn *conn)
777
777
kfree_rcu (smp -> ltk , rcu );
778
778
}
779
779
780
- if (smp -> slave_ltk ) {
781
- list_del_rcu (& smp -> slave_ltk -> list );
782
- kfree_rcu (smp -> slave_ltk , rcu );
780
+ if (smp -> responder_ltk ) {
781
+ list_del_rcu (& smp -> responder_ltk -> list );
782
+ kfree_rcu (smp -> responder_ltk , rcu );
783
783
}
784
784
785
785
if (smp -> remote_irk ) {
@@ -980,7 +980,7 @@ static u8 smp_random(struct smp_chan *smp)
980
980
int ret ;
981
981
982
982
bt_dev_dbg (conn -> hcon -> hdev , "conn %p %s" , conn ,
983
- conn -> hcon -> out ? "master " : "slave " );
983
+ conn -> hcon -> out ? "initiator " : "responder " );
984
984
985
985
ret = smp_c1 (smp -> tk , smp -> rrnd , smp -> preq , smp -> prsp ,
986
986
hcon -> init_addr_type , & hcon -> init_addr ,
@@ -1022,8 +1022,8 @@ static u8 smp_random(struct smp_chan *smp)
1022
1022
else
1023
1023
auth = 0 ;
1024
1024
1025
- /* Even though there's no _SLAVE suffix this is the
1026
- * slave STK we're adding for later lookup (the master
1025
+ /* Even though there's no _RESPONDER suffix this is the
1026
+ * responder STK we're adding for later lookup (the initiator
1027
1027
* STK never needs to be stored).
1028
1028
*/
1029
1029
hci_add_ltk (hcon -> hdev , & hcon -> dst , hcon -> dst_type ,
@@ -1078,10 +1078,10 @@ static void smp_notify_keys(struct l2cap_conn *conn)
1078
1078
mgmt_new_csrk (hdev , smp -> csrk , persistent );
1079
1079
}
1080
1080
1081
- if (smp -> slave_csrk ) {
1082
- smp -> slave_csrk -> bdaddr_type = hcon -> dst_type ;
1083
- bacpy (& smp -> slave_csrk -> bdaddr , & hcon -> dst );
1084
- mgmt_new_csrk (hdev , smp -> slave_csrk , persistent );
1081
+ if (smp -> responder_csrk ) {
1082
+ smp -> responder_csrk -> bdaddr_type = hcon -> dst_type ;
1083
+ bacpy (& smp -> responder_csrk -> bdaddr , & hcon -> dst );
1084
+ mgmt_new_csrk (hdev , smp -> responder_csrk , persistent );
1085
1085
}
1086
1086
1087
1087
if (smp -> ltk ) {
@@ -1090,10 +1090,10 @@ static void smp_notify_keys(struct l2cap_conn *conn)
1090
1090
mgmt_new_ltk (hdev , smp -> ltk , persistent );
1091
1091
}
1092
1092
1093
- if (smp -> slave_ltk ) {
1094
- smp -> slave_ltk -> bdaddr_type = hcon -> dst_type ;
1095
- bacpy (& smp -> slave_ltk -> bdaddr , & hcon -> dst );
1096
- mgmt_new_ltk (hdev , smp -> slave_ltk , persistent );
1093
+ if (smp -> responder_ltk ) {
1094
+ smp -> responder_ltk -> bdaddr_type = hcon -> dst_type ;
1095
+ bacpy (& smp -> responder_ltk -> bdaddr , & hcon -> dst );
1096
+ mgmt_new_ltk (hdev , smp -> responder_ltk , persistent );
1097
1097
}
1098
1098
1099
1099
if (smp -> link_key ) {
@@ -1273,7 +1273,7 @@ static void smp_distribute_keys(struct smp_chan *smp)
1273
1273
1274
1274
if (* keydist & SMP_DIST_ENC_KEY ) {
1275
1275
struct smp_cmd_encrypt_info enc ;
1276
- struct smp_cmd_master_ident ident ;
1276
+ struct smp_cmd_initiator_ident ident ;
1277
1277
struct smp_ltk * ltk ;
1278
1278
u8 authenticated ;
1279
1279
__le16 ediv ;
@@ -1294,14 +1294,15 @@ static void smp_distribute_keys(struct smp_chan *smp)
1294
1294
1295
1295
authenticated = hcon -> sec_level == BT_SECURITY_HIGH ;
1296
1296
ltk = hci_add_ltk (hdev , & hcon -> dst , hcon -> dst_type ,
1297
- SMP_LTK_SLAVE , authenticated , enc .ltk ,
1297
+ SMP_LTK_RESPONDER , authenticated , enc .ltk ,
1298
1298
smp -> enc_key_size , ediv , rand );
1299
- smp -> slave_ltk = ltk ;
1299
+ smp -> responder_ltk = ltk ;
1300
1300
1301
1301
ident .ediv = ediv ;
1302
1302
ident .rand = rand ;
1303
1303
1304
- smp_send_cmd (conn , SMP_CMD_MASTER_IDENT , sizeof (ident ), & ident );
1304
+ smp_send_cmd (conn , SMP_CMD_INITIATOR_IDENT , sizeof (ident ),
1305
+ & ident );
1305
1306
1306
1307
* keydist &= ~SMP_DIST_ENC_KEY ;
1307
1308
}
@@ -1344,7 +1345,7 @@ static void smp_distribute_keys(struct smp_chan *smp)
1344
1345
csrk -> type = MGMT_CSRK_LOCAL_UNAUTHENTICATED ;
1345
1346
memcpy (csrk -> val , sign .csrk , sizeof (csrk -> val ));
1346
1347
}
1347
- smp -> slave_csrk = csrk ;
1348
+ smp -> responder_csrk = csrk ;
1348
1349
1349
1350
smp_send_cmd (conn , SMP_CMD_SIGN_INFO , sizeof (sign ), & sign );
1350
1351
@@ -2049,7 +2050,7 @@ static int fixup_sc_false_positive(struct smp_chan *smp)
2049
2050
struct smp_cmd_pairing * req , * rsp ;
2050
2051
u8 auth ;
2051
2052
2052
- /* The issue is only observed when we're in slave role */
2053
+ /* The issue is only observed when we're in responder role */
2053
2054
if (hcon -> out )
2054
2055
return SMP_UNSPECIFIED ;
2055
2056
@@ -2085,7 +2086,8 @@ static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb)
2085
2086
struct hci_conn * hcon = conn -> hcon ;
2086
2087
struct hci_dev * hdev = hcon -> hdev ;
2087
2088
2088
- bt_dev_dbg (hdev , "conn %p %s" , conn , hcon -> out ? "master" : "slave" );
2089
+ bt_dev_dbg (hdev , "conn %p %s" , conn ,
2090
+ hcon -> out ? "initiator" : "responder" );
2089
2091
2090
2092
if (skb -> len < sizeof (smp -> pcnf ))
2091
2093
return SMP_INVALID_PARAMS ;
@@ -2252,7 +2254,7 @@ static bool smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level)
2252
2254
hci_le_start_enc (hcon , key -> ediv , key -> rand , key -> val , key -> enc_size );
2253
2255
hcon -> enc_key_size = key -> enc_size ;
2254
2256
2255
- /* We never store STKs for master role, so clear this flag */
2257
+ /* We never store STKs for initiator role, so clear this flag */
2256
2258
clear_bit (HCI_CONN_STK_ENCRYPT , & hcon -> flags );
2257
2259
2258
2260
return true;
@@ -2468,7 +2470,7 @@ int smp_cancel_and_remove_pairing(struct hci_dev *hdev, bdaddr_t *bdaddr,
2468
2470
/* Set keys to NULL to make sure smp_failure() does not try to
2469
2471
* remove and free already invalidated rcu list entries. */
2470
2472
smp -> ltk = NULL ;
2471
- smp -> slave_ltk = NULL ;
2473
+ smp -> responder_ltk = NULL ;
2472
2474
smp -> remote_irk = NULL ;
2473
2475
2474
2476
if (test_bit (SMP_FLAG_COMPLETE , & smp -> flags ))
@@ -2504,7 +2506,7 @@ static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb)
2504
2506
return SMP_INVALID_PARAMS ;
2505
2507
}
2506
2508
2507
- SMP_ALLOW_CMD (smp , SMP_CMD_MASTER_IDENT );
2509
+ SMP_ALLOW_CMD (smp , SMP_CMD_INITIATOR_IDENT );
2508
2510
2509
2511
skb_pull (skb , sizeof (* rp ));
2510
2512
@@ -2513,9 +2515,9 @@ static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb)
2513
2515
return 0 ;
2514
2516
}
2515
2517
2516
- static int smp_cmd_master_ident (struct l2cap_conn * conn , struct sk_buff * skb )
2518
+ static int smp_cmd_initiator_ident (struct l2cap_conn * conn , struct sk_buff * skb )
2517
2519
{
2518
- struct smp_cmd_master_ident * rp = (void * ) skb -> data ;
2520
+ struct smp_cmd_initiator_ident * rp = (void * )skb -> data ;
2519
2521
struct l2cap_chan * chan = conn -> smp ;
2520
2522
struct smp_chan * smp = chan -> data ;
2521
2523
struct hci_dev * hdev = conn -> hcon -> hdev ;
@@ -2914,7 +2916,7 @@ static int smp_cmd_dhkey_check(struct l2cap_conn *conn, struct sk_buff *skb)
2914
2916
return 0 ;
2915
2917
}
2916
2918
2917
- /* Slave sends DHKey check as response to master */
2919
+ /* Responder sends DHKey check as response to initiator */
2918
2920
sc_dhkey_check (smp );
2919
2921
}
2920
2922
@@ -3001,8 +3003,8 @@ static int smp_sig_channel(struct l2cap_chan *chan, struct sk_buff *skb)
3001
3003
reason = smp_cmd_encrypt_info (conn , skb );
3002
3004
break ;
3003
3005
3004
- case SMP_CMD_MASTER_IDENT :
3005
- reason = smp_cmd_master_ident (conn , skb );
3006
+ case SMP_CMD_INITIATOR_IDENT :
3007
+ reason = smp_cmd_initiator_ident (conn , skb );
3006
3008
break ;
3007
3009
3008
3010
case SMP_CMD_IDENT_INFO :
0 commit comments