We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent b6cfb45 commit 141da30Copy full SHA for 141da30
subsys/bluetooth/host/shell/bt.c
@@ -4224,12 +4224,16 @@ static void auth_pincode_entry(struct bt_conn *conn, bool highsec)
4224
enum bt_security_err pairing_accept(struct bt_conn *conn,
4225
const struct bt_conn_pairing_feat *const feat)
4226
{
4227
- bt_shell_print("Remote pairing features: "
4228
- "IO: 0x%02x, OOB: %d, AUTH: 0x%02x, Key: %d, "
4229
- "Init Kdist: 0x%02x, Resp Kdist: 0x%02x",
4230
- feat->io_capability, feat->oob_data_flag,
4231
- feat->auth_req, feat->max_enc_key_size,
4232
- feat->init_key_dist, feat->resp_key_dist);
+ if (feat != NULL) {
+ bt_shell_print("Remote pairing features: "
+ "IO: 0x%02x, OOB: %d, AUTH: 0x%02x, Key: %d, "
+ "Init Kdist: 0x%02x, Resp Kdist: 0x%02x",
+ feat->io_capability, feat->oob_data_flag,
+ feat->auth_req, feat->max_enc_key_size,
4233
+ feat->init_key_dist, feat->resp_key_dist);
4234
+ } else {
4235
+ bt_shell_print("Remote pairing");
4236
+ }
4237
4238
return BT_SECURITY_ERR_SUCCESS;
4239
}
0 commit comments