|
@@ -649,7 +649,7 @@ static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
|
|
|
auth |= (req->auth_req | rsp->auth_req) & SMP_AUTH_MITM;
|
|
|
|
|
|
- ret = tk_request(conn, 0, auth, rsp->io_capability, req->io_capability);
|
|
|
+ ret = tk_request(conn, 0, auth, req->io_capability, rsp->io_capability);
|
|
|
if (ret)
|
|
|
return SMP_UNSPECIFIED;
|
|
|
|
|
@@ -704,7 +704,7 @@ static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
-static u8 smp_ltk_encrypt(struct l2cap_conn *conn)
|
|
|
+static u8 smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level)
|
|
|
{
|
|
|
struct smp_ltk *key;
|
|
|
struct hci_conn *hcon = conn->hcon;
|
|
@@ -713,6 +713,9 @@ static u8 smp_ltk_encrypt(struct l2cap_conn *conn)
|
|
|
if (!key)
|
|
|
return 0;
|
|
|
|
|
|
+ if (sec_level > BT_SECURITY_MEDIUM && !key->authenticated)
|
|
|
+ return 0;
|
|
|
+
|
|
|
if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags))
|
|
|
return 1;
|
|
|
|
|
@@ -733,7 +736,7 @@ static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
|
|
|
hcon->pending_sec_level = authreq_to_seclevel(rp->auth_req);
|
|
|
|
|
|
- if (smp_ltk_encrypt(conn))
|
|
|
+ if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
|
|
|
return 0;
|
|
|
|
|
|
if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
|
|
@@ -772,7 +775,7 @@ int smp_conn_security(struct l2cap_conn *conn, __u8 sec_level)
|
|
|
return 1;
|
|
|
|
|
|
if (hcon->link_mode & HCI_LM_MASTER)
|
|
|
- if (smp_ltk_encrypt(conn))
|
|
|
+ if (smp_ltk_encrypt(conn, sec_level))
|
|
|
goto done;
|
|
|
|
|
|
if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
|