|
@@ -706,6 +706,16 @@ static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
if (sec_level > conn->hcon->pending_sec_level)
|
|
|
conn->hcon->pending_sec_level = sec_level;
|
|
|
|
|
|
+ /* If we need MITM check that it can be acheived */
|
|
|
+ if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
|
|
|
+ u8 method;
|
|
|
+
|
|
|
+ method = get_auth_method(smp, conn->hcon->io_capability,
|
|
|
+ req->io_capability);
|
|
|
+ if (method == JUST_WORKS || method == JUST_CFM)
|
|
|
+ return SMP_AUTH_REQUIREMENTS;
|
|
|
+ }
|
|
|
+
|
|
|
build_pairing_cmd(conn, req, &rsp, auth);
|
|
|
|
|
|
key_size = min(req->max_key_size, rsp.max_key_size);
|
|
@@ -752,6 +762,16 @@ static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
|
|
|
if (check_enc_key_size(conn, key_size))
|
|
|
return SMP_ENC_KEY_SIZE;
|
|
|
|
|
|
+ /* If we need MITM check that it can be acheived */
|
|
|
+ if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
|
|
|
+ u8 method;
|
|
|
+
|
|
|
+ method = get_auth_method(smp, req->io_capability,
|
|
|
+ rsp->io_capability);
|
|
|
+ if (method == JUST_WORKS || method == JUST_CFM)
|
|
|
+ return SMP_AUTH_REQUIREMENTS;
|
|
|
+ }
|
|
|
+
|
|
|
get_random_bytes(smp->prnd, sizeof(smp->prnd));
|
|
|
|
|
|
smp->prsp[0] = SMP_CMD_PAIRING_RSP;
|