diff options
author | Marcel Holtmann <marcel@holtmann.org> | 2008-07-14 14:13:45 -0400 |
---|---|---|
committer | Marcel Holtmann <marcel@holtmann.org> | 2008-07-14 14:13:45 -0400 |
commit | 9719f8afce34d3d04e884873a8a5e3483e30974c (patch) | |
tree | aee26f7df7e2d92aa54d4b9da88c4ff5987191dd /net/bluetooth | |
parent | 77db1980565626471a980f0d2d17299e4bd5e7a5 (diff) |
[Bluetooth] Disconnect when encryption gets disabled
The Bluetooth specification allows to enable or disable the encryption
of an ACL link at any time by either the peer or the remote device. If
a L2CAP or RFCOMM connection requested an encrypted link, they will now
disconnect that link if the encryption gets disabled. Higher protocols
that don't care about encryption (like SDP) are not affected.
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Diffstat (limited to 'net/bluetooth')
-rw-r--r-- | net/bluetooth/l2cap.c | 13 | ||||
-rw-r--r-- | net/bluetooth/rfcomm/core.c | 8 |
2 files changed, 20 insertions, 1 deletions
diff --git a/net/bluetooth/l2cap.c b/net/bluetooth/l2cap.c index 2e3abdfbd69d..252264062f59 100644 --- a/net/bluetooth/l2cap.c +++ b/net/bluetooth/l2cap.c | |||
@@ -2197,7 +2197,7 @@ static int l2cap_auth_cfm(struct hci_conn *hcon, u8 status) | |||
2197 | return 0; | 2197 | return 0; |
2198 | } | 2198 | } |
2199 | 2199 | ||
2200 | static int l2cap_encrypt_cfm(struct hci_conn *hcon, u8 status) | 2200 | static int l2cap_encrypt_cfm(struct hci_conn *hcon, u8 status, u8 encrypt) |
2201 | { | 2201 | { |
2202 | struct l2cap_chan_list *l; | 2202 | struct l2cap_chan_list *l; |
2203 | struct l2cap_conn *conn = hcon->l2cap_data; | 2203 | struct l2cap_conn *conn = hcon->l2cap_data; |
@@ -2215,8 +2215,19 @@ static int l2cap_encrypt_cfm(struct hci_conn *hcon, u8 status) | |||
2215 | read_lock(&l->lock); | 2215 | read_lock(&l->lock); |
2216 | 2216 | ||
2217 | for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) { | 2217 | for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) { |
2218 | struct l2cap_pinfo *pi = l2cap_pi(sk); | ||
2219 | |||
2218 | bh_lock_sock(sk); | 2220 | bh_lock_sock(sk); |
2219 | 2221 | ||
2222 | if ((pi->link_mode & (L2CAP_LM_ENCRYPT | L2CAP_LM_SECURE)) && | ||
2223 | (sk->sk_state == BT_CONNECTED || | ||
2224 | sk->sk_state == BT_CONFIG) && | ||
2225 | !status && encrypt == 0x00) { | ||
2226 | __l2cap_sock_close(sk, ECONNREFUSED); | ||
2227 | bh_unlock_sock(sk); | ||
2228 | continue; | ||
2229 | } | ||
2230 | |||
2220 | if (sk->sk_state != BT_CONNECT2) { | 2231 | if (sk->sk_state != BT_CONNECT2) { |
2221 | bh_unlock_sock(sk); | 2232 | bh_unlock_sock(sk); |
2222 | continue; | 2233 | continue; |
diff --git a/net/bluetooth/rfcomm/core.c b/net/bluetooth/rfcomm/core.c index 1f92f9ab4959..e7a6a03cea37 100644 --- a/net/bluetooth/rfcomm/core.c +++ b/net/bluetooth/rfcomm/core.c | |||
@@ -2003,6 +2003,14 @@ static void rfcomm_encrypt_cfm(struct hci_conn *conn, u8 status, u8 encrypt) | |||
2003 | list_for_each_safe(p, n, &s->dlcs) { | 2003 | list_for_each_safe(p, n, &s->dlcs) { |
2004 | d = list_entry(p, struct rfcomm_dlc, list); | 2004 | d = list_entry(p, struct rfcomm_dlc, list); |
2005 | 2005 | ||
2006 | if ((d->link_mode & (RFCOMM_LM_ENCRYPT | RFCOMM_LM_SECURE)) && | ||
2007 | (d->state == BT_CONNECTED || | ||
2008 | d->state == BT_CONFIG) && | ||
2009 | !status && encrypt == 0x00) { | ||
2010 | __rfcomm_dlc_close(d, ECONNREFUSED); | ||
2011 | continue; | ||
2012 | } | ||
2013 | |||
2006 | if (!test_and_clear_bit(RFCOMM_AUTH_PENDING, &d->flags)) | 2014 | if (!test_and_clear_bit(RFCOMM_AUTH_PENDING, &d->flags)) |
2007 | continue; | 2015 | continue; |
2008 | 2016 | ||