hi,
this series follows up on the private security discussion around legacy
LE pairing and BT_SECURITY_HIGH.
1/2 fixes the primary issue in tk_request(): when the local side
requires HIGH security, method selection must still consider that local
MITM requirement even if the remote auth_req does not set SMP_AUTH_MITM.
2/2 keeps the stored responder STK authentication bit aligned with the
pairing result by deriving it from the achieved MITM state rather than
from pending_sec_level. that keeps the legacy path consistent with the
existing Secure Connections handling and acts as defense in depth.
both patches carry Fixes and Cc: stable.
if anyone with recent Bluetooth qualification access can run this
against PTS as well, that would be very helpful.
thanks,
Oleh