@@ -1812,6 +1812,8 @@ static void smp_reset(struct bt_smp *smp)
18121812 */
18131813static void smp_pairing_complete (struct bt_smp * smp , uint8_t status )
18141814{
1815+ struct bt_conn * conn = smp -> chan .chan .conn ;
1816+
18151817 BT_DBG ("status 0x%x" , status );
18161818
18171819 if (!status ) {
@@ -1829,12 +1831,11 @@ static void smp_pairing_complete(struct bt_smp *smp, uint8_t status)
18291831 bool bond_flag = atomic_test_bit (smp -> flags , SMP_FLAG_BOND );
18301832
18311833 if (bond_flag ) {
1832- bt_keys_store (smp -> chan . chan . conn -> le .keys );
1834+ bt_keys_store (conn -> le .keys );
18331835 }
18341836
18351837 if (bt_auth && bt_auth -> pairing_complete ) {
1836- bt_auth -> pairing_complete (smp -> chan .chan .conn ,
1837- bond_flag );
1838+ bt_auth -> pairing_complete (conn , bond_flag );
18381839 }
18391840 } else {
18401841 uint8_t auth_err = auth_err_get (status );
@@ -1843,20 +1844,19 @@ static void smp_pairing_complete(struct bt_smp *smp, uint8_t status)
18431844 * keys already existed before the pairing procedure or the
18441845 * pairing failed during key distribution.
18451846 */
1846- if (smp -> chan . chan . conn -> le .keys &&
1847- (!smp -> chan . chan . conn -> le .keys -> enc_size ||
1847+ if (conn -> le .keys &&
1848+ (!conn -> le .keys -> enc_size ||
18481849 atomic_test_bit (smp -> flags , SMP_FLAG_KEYS_DISTR ))) {
1849- bt_keys_clear (smp -> chan . chan . conn -> le .keys );
1850- smp -> chan . chan . conn -> le .keys = NULL ;
1850+ bt_keys_clear (conn -> le .keys );
1851+ conn -> le .keys = NULL ;
18511852 }
18521853
18531854 if (!atomic_test_bit (smp -> flags , SMP_FLAG_KEYS_DISTR )) {
1854- bt_conn_security_changed (smp -> chan .chan .conn , status ,
1855- auth_err );
1855+ bt_conn_security_changed (conn , status , auth_err );
18561856 }
18571857
18581858 if (bt_auth && bt_auth -> pairing_failed ) {
1859- bt_auth -> pairing_failed (smp -> chan . chan . conn , auth_err );
1859+ bt_auth -> pairing_failed (conn , auth_err );
18601860 }
18611861 }
18621862
@@ -3173,8 +3173,7 @@ static uint8_t smp_pairing_rsp(struct bt_smp *smp, struct net_buf *buf)
31733173 if (IS_ENABLED (CONFIG_BT_SMP_APP_PAIRING_ACCEPT )) {
31743174 uint8_t err ;
31753175
3176- err = smp_pairing_accept_query (smp -> chan .chan .conn ,
3177- rsp );
3176+ err = smp_pairing_accept_query (conn , rsp );
31783177 if (err ) {
31793178 return err ;
31803179 }
@@ -3202,7 +3201,7 @@ static uint8_t smp_pairing_rsp(struct bt_smp *smp, struct net_buf *buf)
32023201 if (IS_ENABLED (CONFIG_BT_SMP_APP_PAIRING_ACCEPT )) {
32033202 uint8_t err ;
32043203
3205- err = smp_pairing_accept_query (smp -> chan . chan . conn , rsp );
3204+ err = smp_pairing_accept_query (conn , rsp );
32063205 if (err ) {
32073206 return err ;
32083207 }
@@ -3212,7 +3211,7 @@ static uint8_t smp_pairing_rsp(struct bt_smp *smp, struct net_buf *buf)
32123211 atomic_test_bit (smp -> flags , SMP_FLAG_SEC_REQ ) &&
32133212 bt_auth && bt_auth -> pairing_confirm ) {
32143213 atomic_set_bit (smp -> flags , SMP_FLAG_USER );
3215- bt_auth -> pairing_confirm (smp -> chan . chan . conn );
3214+ bt_auth -> pairing_confirm (conn );
32163215 return 0 ;
32173216 }
32183217
0 commit comments