mirror of
https://github.com/espressif/esp-idf.git
synced 2026-05-19 23:45:28 +02:00
component/bt : cleanup all the "-W-no-xx" and all the warnings
1. cleanup the warnings. 2. fix the some function called in gap 3. fix some code in btc_main
This commit is contained in:
@@ -651,7 +651,6 @@ void BTM_ReadDevInfo (BD_ADDR remote_bda, tBT_DEVICE_TYPE *p_dev_type, tBLE_ADDR
|
||||
BOOLEAN BTM_ReadConnectedTransportAddress(BD_ADDR remote_bda, tBT_TRANSPORT transport)
|
||||
{
|
||||
tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev(remote_bda);
|
||||
tACL_CONN *p = btm_bda_to_acl(remote_bda, transport);
|
||||
|
||||
/* if no device can be located, return */
|
||||
if (p_dev_rec == NULL) {
|
||||
@@ -1392,58 +1391,6 @@ void btm_ble_link_encrypted(BD_ADDR bd_addr, UINT8 encr_enable)
|
||||
gatt_notify_enc_cmpl(p_dev_rec->ble.pseudo_addr);
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
** Function btm_enc_proc_ltk
|
||||
** Description send LTK reply when it's ready.
|
||||
*******************************************************************************/
|
||||
static void btm_enc_proc_ltk(tSMP_ENC *p)
|
||||
{
|
||||
UINT8 i;
|
||||
BTM_TRACE_DEBUG ("btm_enc_proc_ltk");
|
||||
if (p && p->param_len == BT_OCTET16_LEN) {
|
||||
for (i = 0; i < (BT_OCTET16_LEN - btm_cb.key_size); i ++) {
|
||||
p->param_buf[BT_OCTET16_LEN - i - 1] = 0;
|
||||
}
|
||||
btsnd_hcic_ble_ltk_req_reply(btm_cb.enc_handle, p->param_buf);
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
** Function btm_enc_proc_slave_y
|
||||
** Description calculate LTK when Y is ready
|
||||
*******************************************************************************/
|
||||
static void btm_enc_proc_slave_y(tSMP_ENC *p)
|
||||
{
|
||||
UINT16 div, y;
|
||||
UINT8 *pp = p->param_buf;
|
||||
tBTM_CB *p_cb = &btm_cb;
|
||||
tSMP_ENC output;
|
||||
tBTM_SEC_DEV_REC *p_dev_rec;
|
||||
|
||||
BTM_TRACE_DEBUG ("btm_enc_proc_slave_y");
|
||||
if (p != NULL) {
|
||||
STREAM_TO_UINT16(y, pp);
|
||||
|
||||
div = p_cb->ediv ^ y;
|
||||
p_dev_rec = btm_find_dev_by_handle (p_cb->enc_handle);
|
||||
|
||||
if ( p_dev_rec &&
|
||||
p_dev_rec->ble.keys.div == div ) {
|
||||
BTM_TRACE_DEBUG ("LTK request OK");
|
||||
/* calculating LTK , LTK = E er(div) */
|
||||
SMP_Encrypt(p_cb->devcb.ble_encryption_key_value, BT_OCTET16_LEN, (UINT8 *)&div, 2, &output);
|
||||
btm_enc_proc_ltk(&output);
|
||||
} else {
|
||||
BTM_TRACE_DEBUG ("LTK request failed - send negative reply");
|
||||
btsnd_hcic_ble_ltk_req_neg_reply(p_cb->enc_handle);
|
||||
if (p_dev_rec) {
|
||||
btm_ble_link_encrypted(p_dev_rec->bd_addr, 0);
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
**
|
||||
** Function btm_ble_ltk_request_reply
|
||||
@@ -1458,7 +1405,6 @@ void btm_ble_ltk_request_reply(BD_ADDR bda, BOOLEAN use_stk, BT_OCTET16 stk)
|
||||
{
|
||||
tBTM_SEC_DEV_REC *p_rec = btm_find_dev (bda);
|
||||
tBTM_CB *p_cb = &btm_cb;
|
||||
tSMP_ENC output;
|
||||
|
||||
if (p_rec == NULL) {
|
||||
BTM_TRACE_ERROR("btm_ble_ltk_request_reply received for unknown device");
|
||||
@@ -1855,7 +1801,7 @@ UINT8 btm_proc_smp_cback(tSMP_EVT event, BD_ADDR bd_addr, tSMP_EVT_DATA *p_data)
|
||||
case SMP_COMPLT_EVT:
|
||||
if (btm_cb.api.p_le_callback) {
|
||||
/* the callback function implementation may change the IO capability... */
|
||||
BTM_TRACE_DEBUG ("btm_cb.api.p_le_callback=0x%x", btm_cb.api.p_le_callback );
|
||||
BTM_TRACE_DEBUG ("btm_cb.api.p_le_callback=%p", btm_cb.api.p_le_callback );
|
||||
(*btm_cb.api.p_le_callback) (event, bd_addr, (tBTM_LE_EVT_DATA *)p_data);
|
||||
}
|
||||
|
||||
@@ -1975,7 +1921,7 @@ BOOLEAN BTM_BleDataSignature (BD_ADDR bd_addr, UINT8 *p_text, UINT16 len,
|
||||
btm_ble_increment_sign_ctr(bd_addr, TRUE);
|
||||
}
|
||||
|
||||
BTM_TRACE_DEBUG("%s p_mac = %d", __func__, p_mac);
|
||||
BTM_TRACE_DEBUG("%s p_mac = %p", __func__, p_mac);
|
||||
BTM_TRACE_DEBUG("p_mac[0] = 0x%02x p_mac[1] = 0x%02x p_mac[2] = 0x%02x p_mac[3] = 0x%02x",
|
||||
*p_mac, *(p_mac + 1), *(p_mac + 2), *(p_mac + 3));
|
||||
BTM_TRACE_DEBUG("p_mac[4] = 0x%02x p_mac[5] = 0x%02x p_mac[6] = 0x%02x p_mac[7] = 0x%02x",
|
||||
|
||||
Reference in New Issue
Block a user