|
@@ -868,6 +868,14 @@ bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level)
|
|
|
if (sec_level == BT_SECURITY_LOW)
|
|
|
return true;
|
|
|
|
|
|
+ /* If we're encrypted with an STK always claim insufficient
|
|
|
+ * security. This way we allow the connection to be re-encrypted
|
|
|
+ * with an LTK, even if the LTK provides the same level of
|
|
|
+ * security.
|
|
|
+ */
|
|
|
+ if (test_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags))
|
|
|
+ return false;
|
|
|
+
|
|
|
if (hcon->sec_level >= sec_level)
|
|
|
return true;
|
|
|
|