bluetooth: host: smp: unauth bond overwrite on different identity
Added a new Kconfig option for the Bluetooth Host to allow unauthenticated pairing attempts made by the peer where an unauthenticated bond already exists on other local identity. Signed-off-by: Kamil Piszczek <Kamil.Piszczek@nordicsemi.no>
This commit is contained in:
parent
56284d7017
commit
916e02563c
2 changed files with 15 additions and 1 deletions
|
@ -501,6 +501,17 @@ config BT_ID_UNPAIR_MATCHING_BONDS
|
|||
link-layer. The Host does not have control over this acknowledgment,
|
||||
and the order of distribution is fixed by the specification.
|
||||
|
||||
config BT_ID_ALLOW_UNAUTH_OVERWRITE
|
||||
bool "Allow unauthenticated pairing with same peer with other local identity"
|
||||
depends on !BT_SMP_ALLOW_UNAUTH_OVERWRITE
|
||||
help
|
||||
This option allows unauthenticated pairing attempts made by the
|
||||
peer where an unauthenticated bond already exists on other local
|
||||
identity. This configuration still blocks unauthenticated pairing
|
||||
attempts on the same local identity. To allow the pairing procedure
|
||||
unconditionally, please see the BT_SMP_ALLOW_UNAUTH_OVERWRITE
|
||||
configuration.
|
||||
|
||||
config BT_SMP_USB_HCI_CTLR_WORKAROUND
|
||||
bool "Workaround for USB HCI controller out-of-order events"
|
||||
depends on BT_TESTING
|
||||
|
|
|
@ -565,8 +565,11 @@ static bool update_keys_check(struct bt_smp *smp, struct bt_keys *keys)
|
|||
if (!IS_ENABLED(CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE) &&
|
||||
(!(keys->flags & BT_KEYS_AUTHENTICATED)
|
||||
&& smp->method == JUST_WORKS)) {
|
||||
if (!IS_ENABLED(CONFIG_BT_ID_ALLOW_UNAUTH_OVERWRITE) ||
|
||||
(keys->id == smp->chan.chan.conn->id)) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue