summaryrefslogtreecommitdiffstats
path: root/net/bluetooth/smp.c
diff options
context:
space:
mode:
authorJohan Hedberg <johan.hedberg@intel.com>2014-06-01 09:33:39 -0400
committerMarcel Holtmann <marcel@holtmann.org>2014-12-03 10:51:19 -0500
commite3befab970a0230a80f7732fd59bc19df26f805f (patch)
tree0eab18aa376e232a7833edf8b4fedd1e4267b5fa /net/bluetooth/smp.c
parentdddd3059e3bdd02c4850b14b925b3bb37c23f248 (diff)
Bluetooth: Fix BR/EDR Link Key type when derived through LE SC
We need to set the correct Link Key type based on the properties of the LE SC pairing that it was derived from. If debug keys were used the type should be a debug key, and the authenticated vs unauthenticated information should be set on what kind of security level was reached. Signed-off-by: Johan Hedberg <johan.hedberg@intel.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Diffstat (limited to 'net/bluetooth/smp.c')
-rw-r--r--net/bluetooth/smp.c27
1 files changed, 24 insertions, 3 deletions
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c
index b6cdb553ccd3..a322019610eb 100644
--- a/net/bluetooth/smp.c
+++ b/net/bluetooth/smp.c
@@ -965,9 +965,30 @@ static void smp_notify_keys(struct l2cap_conn *conn)
965 } 965 }
966 966
967 if (smp->link_key) { 967 if (smp->link_key) {
968 hci_add_link_key(hdev, smp->conn->hcon, &hcon->dst, 968 struct link_key *key;
969 smp->link_key, HCI_LK_AUTH_COMBINATION_P256, 969 u8 type;
970 0, NULL); 970
971 if (test_bit(SMP_FLAG_DEBUG_KEY, &smp->flags))
972 type = HCI_LK_DEBUG_COMBINATION;
973 else if (hcon->sec_level == BT_SECURITY_FIPS)
974 type = HCI_LK_AUTH_COMBINATION_P256;
975 else
976 type = HCI_LK_UNAUTH_COMBINATION_P256;
977
978 key = hci_add_link_key(hdev, smp->conn->hcon, &hcon->dst,
979 smp->link_key, type, 0, &persistent);
980 if (key) {
981 mgmt_new_link_key(hdev, key, persistent);
982
983 /* Don't keep debug keys around if the relevant
984 * flag is not set.
985 */
986 if (!test_bit(HCI_KEEP_DEBUG_KEYS, &hdev->dev_flags) &&
987 key->type == HCI_LK_DEBUG_COMBINATION) {
988 list_del_rcu(&key->list);
989 kfree_rcu(key, rcu);
990 }
991 }
971 } 992 }
972} 993}
973 994