Bluetooth: Fix setting correct authentication information for SMP STK
authorJohan Hedberg <johan.hedberg@intel.com>
Tue, 10 Jun 2014 12:19:50 +0000 (15:19 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 9 Jul 2014 18:21:27 +0000 (11:21 -0700)
commit14ec593d6bb050cf40a4ade2f9ac9ca050e0412c
tree5b3d416ea5c852b4e2932c12749c1c4d3f705f7e
parent67d0695f7f344f0ea72465d477085da29510d722
Bluetooth: Fix setting correct authentication information for SMP STK

commit fff3490f47810e2d34b91fb9e31103e923b11c2f upstream.

When we store the STK in slave role we should set the correct
authentication information for it. If the pairing is producing a HIGH
security level the STK is considered authenticated, and otherwise it's
considered unauthenticated. This patch fixes the value passed to the
hci_add_ltk() function when adding the STK on the slave side.

Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Tested-by: Marcin Kraglak <marcin.kraglak@tieto.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/bluetooth/smp.c