diff options
| author | John W. Linville <linville@tuxdriver.com> | 2011-09-30 14:52:16 -0400 |
|---|---|---|
| committer | John W. Linville <linville@tuxdriver.com> | 2011-09-30 14:52:29 -0400 |
| commit | 8e00f5fbb4ecbc3431fa686cba60cd76a62604af (patch) | |
| tree | 78aa3bdef892dbd1afc8969fc528e529cfc266f7 /net/bluetooth | |
| parent | 56fd49e399ce1d82200fad5b8924d4e35a587809 (diff) | |
| parent | 0874073570d9184a169a4ae2abbe8dbcb71878e9 (diff) | |
Merge branch 'master' of git://git.infradead.org/users/linville/wireless-next into for-davem
Conflicts:
drivers/net/wireless/iwlwifi/iwl-pci.c
drivers/net/wireless/wl12xx/main.c
Diffstat (limited to 'net/bluetooth')
| -rw-r--r-- | net/bluetooth/hci_conn.c | 2 | ||||
| -rw-r--r-- | net/bluetooth/hci_core.c | 57 | ||||
| -rw-r--r-- | net/bluetooth/hci_event.c | 16 | ||||
| -rw-r--r-- | net/bluetooth/hci_sock.c | 18 | ||||
| -rw-r--r-- | net/bluetooth/hci_sysfs.c | 2 | ||||
| -rw-r--r-- | net/bluetooth/hidp/core.c | 3 | ||||
| -rw-r--r-- | net/bluetooth/l2cap_core.c | 18 | ||||
| -rw-r--r-- | net/bluetooth/mgmt.c | 212 | ||||
| -rw-r--r-- | net/bluetooth/smp.c | 421 |
9 files changed, 473 insertions, 276 deletions
diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c index ea7f031f3b04..c2df7bf1d374 100644 --- a/net/bluetooth/hci_conn.c +++ b/net/bluetooth/hci_conn.c | |||
| @@ -218,7 +218,7 @@ void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __u8 rand[8], | |||
| 218 | cp.handle = cpu_to_le16(conn->handle); | 218 | cp.handle = cpu_to_le16(conn->handle); |
| 219 | memcpy(cp.ltk, ltk, sizeof(cp.ltk)); | 219 | memcpy(cp.ltk, ltk, sizeof(cp.ltk)); |
| 220 | cp.ediv = ediv; | 220 | cp.ediv = ediv; |
| 221 | memcpy(cp.rand, rand, sizeof(rand)); | 221 | memcpy(cp.rand, rand, sizeof(cp.rand)); |
| 222 | 222 | ||
| 223 | hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp); | 223 | hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp); |
| 224 | } | 224 | } |
diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index 56943add45cc..b84458dcc226 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c | |||
| @@ -1312,59 +1312,41 @@ int hci_blacklist_clear(struct hci_dev *hdev) | |||
| 1312 | int hci_blacklist_add(struct hci_dev *hdev, bdaddr_t *bdaddr) | 1312 | int hci_blacklist_add(struct hci_dev *hdev, bdaddr_t *bdaddr) |
| 1313 | { | 1313 | { |
| 1314 | struct bdaddr_list *entry; | 1314 | struct bdaddr_list *entry; |
| 1315 | int err; | ||
| 1316 | 1315 | ||
| 1317 | if (bacmp(bdaddr, BDADDR_ANY) == 0) | 1316 | if (bacmp(bdaddr, BDADDR_ANY) == 0) |
| 1318 | return -EBADF; | 1317 | return -EBADF; |
| 1319 | 1318 | ||
| 1320 | hci_dev_lock_bh(hdev); | 1319 | if (hci_blacklist_lookup(hdev, bdaddr)) |
| 1321 | 1320 | return -EEXIST; | |
| 1322 | if (hci_blacklist_lookup(hdev, bdaddr)) { | ||
| 1323 | err = -EEXIST; | ||
| 1324 | goto err; | ||
| 1325 | } | ||
| 1326 | 1321 | ||
| 1327 | entry = kzalloc(sizeof(struct bdaddr_list), GFP_KERNEL); | 1322 | entry = kzalloc(sizeof(struct bdaddr_list), GFP_KERNEL); |
| 1328 | if (!entry) { | 1323 | if (!entry) |
| 1329 | err = -ENOMEM; | 1324 | return -ENOMEM; |
| 1330 | goto err; | ||
| 1331 | } | ||
| 1332 | 1325 | ||
| 1333 | bacpy(&entry->bdaddr, bdaddr); | 1326 | bacpy(&entry->bdaddr, bdaddr); |
| 1334 | 1327 | ||
| 1335 | list_add(&entry->list, &hdev->blacklist); | 1328 | list_add(&entry->list, &hdev->blacklist); |
| 1336 | 1329 | ||
| 1337 | err = 0; | 1330 | return mgmt_device_blocked(hdev->id, bdaddr); |
| 1338 | |||
| 1339 | err: | ||
| 1340 | hci_dev_unlock_bh(hdev); | ||
| 1341 | return err; | ||
| 1342 | } | 1331 | } |
| 1343 | 1332 | ||
| 1344 | int hci_blacklist_del(struct hci_dev *hdev, bdaddr_t *bdaddr) | 1333 | int hci_blacklist_del(struct hci_dev *hdev, bdaddr_t *bdaddr) |
| 1345 | { | 1334 | { |
| 1346 | struct bdaddr_list *entry; | 1335 | struct bdaddr_list *entry; |
| 1347 | int err = 0; | ||
| 1348 | |||
| 1349 | hci_dev_lock_bh(hdev); | ||
| 1350 | 1336 | ||
| 1351 | if (bacmp(bdaddr, BDADDR_ANY) == 0) { | 1337 | if (bacmp(bdaddr, BDADDR_ANY) == 0) { |
| 1352 | hci_blacklist_clear(hdev); | 1338 | return hci_blacklist_clear(hdev); |
| 1353 | goto done; | ||
| 1354 | } | 1339 | } |
| 1355 | 1340 | ||
| 1356 | entry = hci_blacklist_lookup(hdev, bdaddr); | 1341 | entry = hci_blacklist_lookup(hdev, bdaddr); |
| 1357 | if (!entry) { | 1342 | if (!entry) { |
| 1358 | err = -ENOENT; | 1343 | return -ENOENT; |
| 1359 | goto done; | ||
| 1360 | } | 1344 | } |
| 1361 | 1345 | ||
| 1362 | list_del(&entry->list); | 1346 | list_del(&entry->list); |
| 1363 | kfree(entry); | 1347 | kfree(entry); |
| 1364 | 1348 | ||
| 1365 | done: | 1349 | return mgmt_device_unblocked(hdev->id, bdaddr); |
| 1366 | hci_dev_unlock_bh(hdev); | ||
| 1367 | return err; | ||
| 1368 | } | 1350 | } |
| 1369 | 1351 | ||
| 1370 | static void hci_clear_adv_cache(unsigned long arg) | 1352 | static void hci_clear_adv_cache(unsigned long arg) |
| @@ -1523,11 +1505,6 @@ int hci_register_dev(struct hci_dev *hdev) | |||
| 1523 | if (!hdev->workqueue) | 1505 | if (!hdev->workqueue) |
| 1524 | goto nomem; | 1506 | goto nomem; |
| 1525 | 1507 | ||
| 1526 | hdev->tfm = crypto_alloc_blkcipher("ecb(aes)", 0, CRYPTO_ALG_ASYNC); | ||
| 1527 | if (IS_ERR(hdev->tfm)) | ||
| 1528 | BT_INFO("Failed to load transform for ecb(aes): %ld", | ||
| 1529 | PTR_ERR(hdev->tfm)); | ||
| 1530 | |||
| 1531 | hci_register_sysfs(hdev); | 1508 | hci_register_sysfs(hdev); |
| 1532 | 1509 | ||
| 1533 | hdev->rfkill = rfkill_alloc(hdev->name, &hdev->dev, | 1510 | hdev->rfkill = rfkill_alloc(hdev->name, &hdev->dev, |
| @@ -1576,9 +1553,6 @@ int hci_unregister_dev(struct hci_dev *hdev) | |||
| 1576 | !test_bit(HCI_SETUP, &hdev->flags)) | 1553 | !test_bit(HCI_SETUP, &hdev->flags)) |
| 1577 | mgmt_index_removed(hdev->id); | 1554 | mgmt_index_removed(hdev->id); |
| 1578 | 1555 | ||
| 1579 | if (!IS_ERR(hdev->tfm)) | ||
| 1580 | crypto_free_blkcipher(hdev->tfm); | ||
| 1581 | |||
| 1582 | hci_notify(hdev, HCI_DEV_UNREG); | 1556 | hci_notify(hdev, HCI_DEV_UNREG); |
| 1583 | 1557 | ||
| 1584 | if (hdev->rfkill) { | 1558 | if (hdev->rfkill) { |
| @@ -2074,6 +2048,9 @@ static inline struct hci_conn *hci_low_sent(struct hci_dev *hdev, __u8 type, int | |||
| 2074 | min = c->sent; | 2048 | min = c->sent; |
| 2075 | conn = c; | 2049 | conn = c; |
| 2076 | } | 2050 | } |
| 2051 | |||
| 2052 | if (hci_conn_num(hdev, type) == num) | ||
| 2053 | break; | ||
| 2077 | } | 2054 | } |
| 2078 | 2055 | ||
| 2079 | if (conn) { | 2056 | if (conn) { |
| @@ -2131,6 +2108,9 @@ static inline void hci_sched_acl(struct hci_dev *hdev) | |||
| 2131 | 2108 | ||
| 2132 | BT_DBG("%s", hdev->name); | 2109 | BT_DBG("%s", hdev->name); |
| 2133 | 2110 | ||
| 2111 | if (!hci_conn_num(hdev, ACL_LINK)) | ||
| 2112 | return; | ||
| 2113 | |||
| 2134 | if (!test_bit(HCI_RAW, &hdev->flags)) { | 2114 | if (!test_bit(HCI_RAW, &hdev->flags)) { |
| 2135 | /* ACL tx timeout must be longer than maximum | 2115 | /* ACL tx timeout must be longer than maximum |
| 2136 | * link supervision timeout (40.9 seconds) */ | 2116 | * link supervision timeout (40.9 seconds) */ |
| @@ -2162,6 +2142,9 @@ static inline void hci_sched_sco(struct hci_dev *hdev) | |||
| 2162 | 2142 | ||
| 2163 | BT_DBG("%s", hdev->name); | 2143 | BT_DBG("%s", hdev->name); |
| 2164 | 2144 | ||
| 2145 | if (!hci_conn_num(hdev, SCO_LINK)) | ||
| 2146 | return; | ||
| 2147 | |||
| 2165 | while (hdev->sco_cnt && (conn = hci_low_sent(hdev, SCO_LINK, "e))) { | 2148 | while (hdev->sco_cnt && (conn = hci_low_sent(hdev, SCO_LINK, "e))) { |
| 2166 | while (quote-- && (skb = skb_dequeue(&conn->data_q))) { | 2149 | while (quote-- && (skb = skb_dequeue(&conn->data_q))) { |
| 2167 | BT_DBG("skb %p len %d", skb, skb->len); | 2150 | BT_DBG("skb %p len %d", skb, skb->len); |
| @@ -2182,6 +2165,9 @@ static inline void hci_sched_esco(struct hci_dev *hdev) | |||
| 2182 | 2165 | ||
| 2183 | BT_DBG("%s", hdev->name); | 2166 | BT_DBG("%s", hdev->name); |
| 2184 | 2167 | ||
| 2168 | if (!hci_conn_num(hdev, ESCO_LINK)) | ||
| 2169 | return; | ||
| 2170 | |||
| 2185 | while (hdev->sco_cnt && (conn = hci_low_sent(hdev, ESCO_LINK, "e))) { | 2171 | while (hdev->sco_cnt && (conn = hci_low_sent(hdev, ESCO_LINK, "e))) { |
| 2186 | while (quote-- && (skb = skb_dequeue(&conn->data_q))) { | 2172 | while (quote-- && (skb = skb_dequeue(&conn->data_q))) { |
| 2187 | BT_DBG("skb %p len %d", skb, skb->len); | 2173 | BT_DBG("skb %p len %d", skb, skb->len); |
| @@ -2202,6 +2188,9 @@ static inline void hci_sched_le(struct hci_dev *hdev) | |||
| 2202 | 2188 | ||
| 2203 | BT_DBG("%s", hdev->name); | 2189 | BT_DBG("%s", hdev->name); |
| 2204 | 2190 | ||
| 2191 | if (!hci_conn_num(hdev, LE_LINK)) | ||
| 2192 | return; | ||
| 2193 | |||
| 2205 | if (!test_bit(HCI_RAW, &hdev->flags)) { | 2194 | if (!test_bit(HCI_RAW, &hdev->flags)) { |
| 2206 | /* LE tx timeout must be longer than maximum | 2195 | /* LE tx timeout must be longer than maximum |
| 2207 | * link supervision timeout (40.9 seconds) */ | 2196 | * link supervision timeout (40.9 seconds) */ |
diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c index 7ef4eb4435fb..35083f2aa2ea 100644 --- a/net/bluetooth/hci_event.c +++ b/net/bluetooth/hci_event.c | |||
| @@ -898,16 +898,15 @@ static void hci_cc_le_set_scan_enable(struct hci_dev *hdev, | |||
| 898 | if (!cp) | 898 | if (!cp) |
| 899 | return; | 899 | return; |
| 900 | 900 | ||
| 901 | hci_dev_lock(hdev); | ||
| 902 | |||
| 903 | if (cp->enable == 0x01) { | 901 | if (cp->enable == 0x01) { |
| 904 | del_timer(&hdev->adv_timer); | 902 | del_timer(&hdev->adv_timer); |
| 903 | |||
| 904 | hci_dev_lock(hdev); | ||
| 905 | hci_adv_entries_clear(hdev); | 905 | hci_adv_entries_clear(hdev); |
| 906 | hci_dev_unlock(hdev); | ||
| 906 | } else if (cp->enable == 0x00) { | 907 | } else if (cp->enable == 0x00) { |
| 907 | mod_timer(&hdev->adv_timer, jiffies + ADV_CLEAR_TIMEOUT); | 908 | mod_timer(&hdev->adv_timer, jiffies + ADV_CLEAR_TIMEOUT); |
| 908 | } | 909 | } |
| 909 | |||
| 910 | hci_dev_unlock(hdev); | ||
| 911 | } | 910 | } |
| 912 | 911 | ||
| 913 | static void hci_cc_le_ltk_reply(struct hci_dev *hdev, struct sk_buff *skb) | 912 | static void hci_cc_le_ltk_reply(struct hci_dev *hdev, struct sk_buff *skb) |
| @@ -1103,9 +1102,10 @@ static int hci_outgoing_auth_needed(struct hci_dev *hdev, | |||
| 1103 | return 0; | 1102 | return 0; |
| 1104 | 1103 | ||
| 1105 | /* Only request authentication for SSP connections or non-SSP | 1104 | /* Only request authentication for SSP connections or non-SSP |
| 1106 | * devices with sec_level HIGH */ | 1105 | * devices with sec_level HIGH or if MITM protection is requested */ |
| 1107 | if (!(hdev->ssp_mode > 0 && conn->ssp_mode > 0) && | 1106 | if (!(hdev->ssp_mode > 0 && conn->ssp_mode > 0) && |
| 1108 | conn->pending_sec_level != BT_SECURITY_HIGH) | 1107 | conn->pending_sec_level != BT_SECURITY_HIGH && |
| 1108 | !(conn->auth_type & 0x01)) | ||
| 1109 | return 0; | 1109 | return 0; |
| 1110 | 1110 | ||
| 1111 | return 1; | 1111 | return 1; |
| @@ -1412,7 +1412,7 @@ static inline void hci_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *s | |||
| 1412 | conn->state = BT_CONFIG; | 1412 | conn->state = BT_CONFIG; |
| 1413 | hci_conn_hold(conn); | 1413 | hci_conn_hold(conn); |
| 1414 | conn->disc_timeout = HCI_DISCONN_TIMEOUT; | 1414 | conn->disc_timeout = HCI_DISCONN_TIMEOUT; |
| 1415 | mgmt_connected(hdev->id, &ev->bdaddr); | 1415 | mgmt_connected(hdev->id, &ev->bdaddr, conn->type); |
| 1416 | } else | 1416 | } else |
| 1417 | conn->state = BT_CONNECTED; | 1417 | conn->state = BT_CONNECTED; |
| 1418 | 1418 | ||
| @@ -2816,7 +2816,7 @@ static inline void hci_le_conn_complete_evt(struct hci_dev *hdev, struct sk_buff | |||
| 2816 | goto unlock; | 2816 | goto unlock; |
| 2817 | } | 2817 | } |
| 2818 | 2818 | ||
| 2819 | mgmt_connected(hdev->id, &ev->bdaddr); | 2819 | mgmt_connected(hdev->id, &ev->bdaddr, conn->type); |
| 2820 | 2820 | ||
| 2821 | conn->sec_level = BT_SECURITY_LOW; | 2821 | conn->sec_level = BT_SECURITY_LOW; |
| 2822 | conn->handle = __le16_to_cpu(ev->handle); | 2822 | conn->handle = __le16_to_cpu(ev->handle); |
diff --git a/net/bluetooth/hci_sock.c b/net/bluetooth/hci_sock.c index ff02cf5e77cc..f6afe3d76a66 100644 --- a/net/bluetooth/hci_sock.c +++ b/net/bluetooth/hci_sock.c | |||
| @@ -183,21 +183,35 @@ static int hci_sock_release(struct socket *sock) | |||
| 183 | static int hci_sock_blacklist_add(struct hci_dev *hdev, void __user *arg) | 183 | static int hci_sock_blacklist_add(struct hci_dev *hdev, void __user *arg) |
| 184 | { | 184 | { |
| 185 | bdaddr_t bdaddr; | 185 | bdaddr_t bdaddr; |
| 186 | int err; | ||
| 186 | 187 | ||
| 187 | if (copy_from_user(&bdaddr, arg, sizeof(bdaddr))) | 188 | if (copy_from_user(&bdaddr, arg, sizeof(bdaddr))) |
| 188 | return -EFAULT; | 189 | return -EFAULT; |
| 189 | 190 | ||
| 190 | return hci_blacklist_add(hdev, &bdaddr); | 191 | hci_dev_lock_bh(hdev); |
| 192 | |||
| 193 | err = hci_blacklist_add(hdev, &bdaddr); | ||
| 194 | |||
| 195 | hci_dev_unlock_bh(hdev); | ||
| 196 | |||
| 197 | return err; | ||
| 191 | } | 198 | } |
| 192 | 199 | ||
| 193 | static int hci_sock_blacklist_del(struct hci_dev *hdev, void __user *arg) | 200 | static int hci_sock_blacklist_del(struct hci_dev *hdev, void __user *arg) |
| 194 | { | 201 | { |
| 195 | bdaddr_t bdaddr; | 202 | bdaddr_t bdaddr; |
| 203 | int err; | ||
| 196 | 204 | ||
| 197 | if (copy_from_user(&bdaddr, arg, sizeof(bdaddr))) | 205 | if (copy_from_user(&bdaddr, arg, sizeof(bdaddr))) |
| 198 | return -EFAULT; | 206 | return -EFAULT; |
| 199 | 207 | ||
| 200 | return hci_blacklist_del(hdev, &bdaddr); | 208 | hci_dev_lock_bh(hdev); |
| 209 | |||
| 210 | err = hci_blacklist_del(hdev, &bdaddr); | ||
| 211 | |||
| 212 | hci_dev_unlock_bh(hdev); | ||
| 213 | |||
| 214 | return err; | ||
| 201 | } | 215 | } |
| 202 | 216 | ||
| 203 | /* Ioctls that require bound socket */ | 217 | /* Ioctls that require bound socket */ |
diff --git a/net/bluetooth/hci_sysfs.c b/net/bluetooth/hci_sysfs.c index a6c3aa8be1f7..22f1a6c87035 100644 --- a/net/bluetooth/hci_sysfs.c +++ b/net/bluetooth/hci_sysfs.c | |||
| @@ -23,6 +23,8 @@ static inline char *link_typetostr(int type) | |||
| 23 | return "SCO"; | 23 | return "SCO"; |
| 24 | case ESCO_LINK: | 24 | case ESCO_LINK: |
| 25 | return "eSCO"; | 25 | return "eSCO"; |
| 26 | case LE_LINK: | ||
| 27 | return "LE"; | ||
| 26 | default: | 28 | default: |
| 27 | return "UNKNOWN"; | 29 | return "UNKNOWN"; |
| 28 | } | 30 | } |
diff --git a/net/bluetooth/hidp/core.c b/net/bluetooth/hidp/core.c index fb68f344c34a..b83979c548b2 100644 --- a/net/bluetooth/hidp/core.c +++ b/net/bluetooth/hidp/core.c | |||
| @@ -872,6 +872,9 @@ static int hidp_start(struct hid_device *hid) | |||
| 872 | struct hidp_session *session = hid->driver_data; | 872 | struct hidp_session *session = hid->driver_data; |
| 873 | struct hid_report *report; | 873 | struct hid_report *report; |
| 874 | 874 | ||
| 875 | if (hid->quirks & HID_QUIRK_NO_INIT_REPORTS) | ||
| 876 | return 0; | ||
| 877 | |||
| 875 | list_for_each_entry(report, &hid->report_enum[HID_INPUT_REPORT]. | 878 | list_for_each_entry(report, &hid->report_enum[HID_INPUT_REPORT]. |
| 876 | report_list, list) | 879 | report_list, list) |
| 877 | hidp_send_report(session, report); | 880 | hidp_send_report(session, report); |
diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c index b3bdb482bbe6..1611b3544bb1 100644 --- a/net/bluetooth/l2cap_core.c +++ b/net/bluetooth/l2cap_core.c | |||
| @@ -907,6 +907,9 @@ static void l2cap_conn_ready(struct l2cap_conn *conn) | |||
| 907 | if (!conn->hcon->out && conn->hcon->type == LE_LINK) | 907 | if (!conn->hcon->out && conn->hcon->type == LE_LINK) |
| 908 | l2cap_le_conn_ready(conn); | 908 | l2cap_le_conn_ready(conn); |
| 909 | 909 | ||
| 910 | if (conn->hcon->out && conn->hcon->type == LE_LINK) | ||
| 911 | smp_conn_security(conn, conn->hcon->pending_sec_level); | ||
| 912 | |||
| 910 | read_lock(&conn->chan_lock); | 913 | read_lock(&conn->chan_lock); |
| 911 | 914 | ||
| 912 | list_for_each_entry(chan, &conn->chan_l, list) { | 915 | list_for_each_entry(chan, &conn->chan_l, list) { |
| @@ -986,8 +989,10 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err) | |||
| 986 | if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) | 989 | if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) |
| 987 | del_timer_sync(&conn->info_timer); | 990 | del_timer_sync(&conn->info_timer); |
| 988 | 991 | ||
| 989 | if (test_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend)) | 992 | if (test_and_clear_bit(HCI_CONN_LE_SMP_PEND, &hcon->pend)) { |
| 990 | del_timer(&conn->security_timer); | 993 | del_timer(&conn->security_timer); |
| 994 | smp_chan_destroy(conn); | ||
| 995 | } | ||
| 991 | 996 | ||
| 992 | hcon->l2cap_data = NULL; | 997 | hcon->l2cap_data = NULL; |
| 993 | kfree(conn); | 998 | kfree(conn); |
| @@ -1519,7 +1524,9 @@ struct sk_buff *l2cap_create_basic_pdu(struct l2cap_chan *chan, struct msghdr *m | |||
| 1519 | return skb; | 1524 | return skb; |
| 1520 | } | 1525 | } |
| 1521 | 1526 | ||
| 1522 | struct sk_buff *l2cap_create_iframe_pdu(struct l2cap_chan *chan, struct msghdr *msg, size_t len, u16 control, u16 sdulen) | 1527 | static struct sk_buff *l2cap_create_iframe_pdu(struct l2cap_chan *chan, |
| 1528 | struct msghdr *msg, size_t len, | ||
| 1529 | u16 control, u16 sdulen) | ||
| 1523 | { | 1530 | { |
| 1524 | struct sock *sk = chan->sk; | 1531 | struct sock *sk = chan->sk; |
| 1525 | struct l2cap_conn *conn = chan->conn; | 1532 | struct l2cap_conn *conn = chan->conn; |
| @@ -4093,6 +4100,11 @@ static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt) | |||
| 4093 | 4100 | ||
| 4094 | BT_DBG("conn %p", conn); | 4101 | BT_DBG("conn %p", conn); |
| 4095 | 4102 | ||
| 4103 | if (hcon->type == LE_LINK) { | ||
| 4104 | smp_distribute_keys(conn, 0); | ||
| 4105 | del_timer(&conn->security_timer); | ||
| 4106 | } | ||
| 4107 | |||
| 4096 | read_lock(&conn->chan_lock); | 4108 | read_lock(&conn->chan_lock); |
| 4097 | 4109 | ||
| 4098 | list_for_each_entry(chan, &conn->chan_l, list) { | 4110 | list_for_each_entry(chan, &conn->chan_l, list) { |
| @@ -4105,9 +4117,7 @@ static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt) | |||
| 4105 | if (chan->scid == L2CAP_CID_LE_DATA) { | 4117 | if (chan->scid == L2CAP_CID_LE_DATA) { |
| 4106 | if (!status && encrypt) { | 4118 | if (!status && encrypt) { |
| 4107 | chan->sec_level = hcon->sec_level; | 4119 | chan->sec_level = hcon->sec_level; |
| 4108 | del_timer(&conn->security_timer); | ||
| 4109 | l2cap_chan_ready(sk); | 4120 | l2cap_chan_ready(sk); |
| 4110 | smp_distribute_keys(conn, 0); | ||
| 4111 | } | 4121 | } |
| 4112 | 4122 | ||
| 4113 | bh_unlock_sock(sk); | 4123 | bh_unlock_sock(sk); |
diff --git a/net/bluetooth/mgmt.c b/net/bluetooth/mgmt.c index 53e109eb043e..5a94eec06caa 100644 --- a/net/bluetooth/mgmt.c +++ b/net/bluetooth/mgmt.c | |||
| @@ -908,7 +908,7 @@ static int load_keys(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 908 | struct hci_dev *hdev; | 908 | struct hci_dev *hdev; |
| 909 | struct mgmt_cp_load_keys *cp; | 909 | struct mgmt_cp_load_keys *cp; |
| 910 | u16 key_count, expected_len; | 910 | u16 key_count, expected_len; |
| 911 | int i, err; | 911 | int i; |
| 912 | 912 | ||
| 913 | cp = (void *) data; | 913 | cp = (void *) data; |
| 914 | 914 | ||
| @@ -918,9 +918,9 @@ static int load_keys(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 918 | key_count = get_unaligned_le16(&cp->key_count); | 918 | key_count = get_unaligned_le16(&cp->key_count); |
| 919 | 919 | ||
| 920 | expected_len = sizeof(*cp) + key_count * sizeof(struct mgmt_key_info); | 920 | expected_len = sizeof(*cp) + key_count * sizeof(struct mgmt_key_info); |
| 921 | if (expected_len > len) { | 921 | if (expected_len != len) { |
| 922 | BT_ERR("load_keys: expected at least %u bytes, got %u bytes", | 922 | BT_ERR("load_keys: expected %u bytes, got %u bytes", |
| 923 | expected_len, len); | 923 | len, expected_len); |
| 924 | return -EINVAL; | 924 | return -EINVAL; |
| 925 | } | 925 | } |
| 926 | 926 | ||
| @@ -942,36 +942,17 @@ static int load_keys(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 942 | else | 942 | else |
| 943 | clear_bit(HCI_DEBUG_KEYS, &hdev->flags); | 943 | clear_bit(HCI_DEBUG_KEYS, &hdev->flags); |
| 944 | 944 | ||
| 945 | len -= sizeof(*cp); | 945 | for (i = 0; i < key_count; i++) { |
| 946 | i = 0; | 946 | struct mgmt_key_info *key = &cp->keys[i]; |
| 947 | |||
| 948 | while (i < len) { | ||
| 949 | struct mgmt_key_info *key = (void *) cp->keys + i; | ||
| 950 | |||
| 951 | i += sizeof(*key) + key->dlen; | ||
| 952 | |||
| 953 | if (key->type == HCI_LK_SMP_LTK) { | ||
| 954 | struct key_master_id *id = (void *) key->data; | ||
| 955 | |||
| 956 | if (key->dlen != sizeof(struct key_master_id)) | ||
| 957 | continue; | ||
| 958 | |||
| 959 | hci_add_ltk(hdev, 0, &key->bdaddr, key->pin_len, | ||
| 960 | id->ediv, id->rand, key->val); | ||
| 961 | |||
| 962 | continue; | ||
| 963 | } | ||
| 964 | 947 | ||
| 965 | hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type, | 948 | hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type, |
| 966 | key->pin_len); | 949 | key->pin_len); |
| 967 | } | 950 | } |
| 968 | 951 | ||
| 969 | err = cmd_complete(sk, index, MGMT_OP_LOAD_KEYS, NULL, 0); | ||
| 970 | |||
| 971 | hci_dev_unlock_bh(hdev); | 952 | hci_dev_unlock_bh(hdev); |
| 972 | hci_dev_put(hdev); | 953 | hci_dev_put(hdev); |
| 973 | 954 | ||
| 974 | return err; | 955 | return 0; |
| 975 | } | 956 | } |
| 976 | 957 | ||
| 977 | static int remove_key(struct sock *sk, u16 index, unsigned char *data, u16 len) | 958 | static int remove_key(struct sock *sk, u16 index, unsigned char *data, u16 len) |
| @@ -1347,6 +1328,7 @@ static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 1347 | struct hci_dev *hdev; | 1328 | struct hci_dev *hdev; |
| 1348 | struct mgmt_cp_pair_device *cp; | 1329 | struct mgmt_cp_pair_device *cp; |
| 1349 | struct pending_cmd *cmd; | 1330 | struct pending_cmd *cmd; |
| 1331 | struct adv_entry *entry; | ||
| 1350 | u8 sec_level, auth_type; | 1332 | u8 sec_level, auth_type; |
| 1351 | struct hci_conn *conn; | 1333 | struct hci_conn *conn; |
| 1352 | int err; | 1334 | int err; |
| @@ -1364,15 +1346,20 @@ static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 1364 | 1346 | ||
| 1365 | hci_dev_lock_bh(hdev); | 1347 | hci_dev_lock_bh(hdev); |
| 1366 | 1348 | ||
| 1367 | if (cp->io_cap == 0x03) { | 1349 | sec_level = BT_SECURITY_MEDIUM; |
| 1368 | sec_level = BT_SECURITY_MEDIUM; | 1350 | if (cp->io_cap == 0x03) |
| 1369 | auth_type = HCI_AT_DEDICATED_BONDING; | 1351 | auth_type = HCI_AT_DEDICATED_BONDING; |
| 1370 | } else { | 1352 | else |
| 1371 | sec_level = BT_SECURITY_HIGH; | ||
| 1372 | auth_type = HCI_AT_DEDICATED_BONDING_MITM; | 1353 | auth_type = HCI_AT_DEDICATED_BONDING_MITM; |
| 1373 | } | ||
| 1374 | 1354 | ||
| 1375 | conn = hci_connect(hdev, ACL_LINK, &cp->bdaddr, sec_level, auth_type); | 1355 | entry = hci_find_adv_entry(hdev, &cp->bdaddr); |
| 1356 | if (entry) | ||
| 1357 | conn = hci_connect(hdev, LE_LINK, &cp->bdaddr, sec_level, | ||
| 1358 | auth_type); | ||
| 1359 | else | ||
| 1360 | conn = hci_connect(hdev, ACL_LINK, &cp->bdaddr, sec_level, | ||
| 1361 | auth_type); | ||
| 1362 | |||
| 1376 | if (IS_ERR(conn)) { | 1363 | if (IS_ERR(conn)) { |
| 1377 | err = PTR_ERR(conn); | 1364 | err = PTR_ERR(conn); |
| 1378 | goto unlock; | 1365 | goto unlock; |
| @@ -1391,7 +1378,10 @@ static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len) | |||
| 1391 | goto unlock; | 1378 | goto unlock; |
| 1392 | } | 1379 | } |
| 1393 | 1380 | ||
| 1394 | conn->connect_cfm_cb = pairing_complete_cb; | 1381 | /* For LE, just connecting isn't a proof that the pairing finished */ |
| 1382 | if (!entry) | ||
| 1383 | conn->connect_cfm_cb = pairing_complete_cb; | ||
| 1384 | |||
| 1395 | conn->security_cfm_cb = pairing_complete_cb; | 1385 | conn->security_cfm_cb = pairing_complete_cb; |
| 1396 | conn->disconn_cfm_cb = pairing_complete_cb; | 1386 | conn->disconn_cfm_cb = pairing_complete_cb; |
| 1397 | conn->io_capability = cp->io_cap; | 1387 | conn->io_capability = cp->io_cap; |
| @@ -1689,13 +1679,12 @@ static int block_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1689 | u16 len) | 1679 | u16 len) |
| 1690 | { | 1680 | { |
| 1691 | struct hci_dev *hdev; | 1681 | struct hci_dev *hdev; |
| 1692 | struct mgmt_cp_block_device *cp; | 1682 | struct pending_cmd *cmd; |
| 1683 | struct mgmt_cp_block_device *cp = (void *) data; | ||
| 1693 | int err; | 1684 | int err; |
| 1694 | 1685 | ||
| 1695 | BT_DBG("hci%u", index); | 1686 | BT_DBG("hci%u", index); |
| 1696 | 1687 | ||
| 1697 | cp = (void *) data; | ||
| 1698 | |||
| 1699 | if (len != sizeof(*cp)) | 1688 | if (len != sizeof(*cp)) |
| 1700 | return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE, | 1689 | return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE, |
| 1701 | EINVAL); | 1690 | EINVAL); |
| @@ -1705,6 +1694,14 @@ static int block_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1705 | return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE, | 1694 | return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE, |
| 1706 | ENODEV); | 1695 | ENODEV); |
| 1707 | 1696 | ||
| 1697 | hci_dev_lock_bh(hdev); | ||
| 1698 | |||
| 1699 | cmd = mgmt_pending_add(sk, MGMT_OP_BLOCK_DEVICE, index, NULL, 0); | ||
| 1700 | if (!cmd) { | ||
| 1701 | err = -ENOMEM; | ||
| 1702 | goto failed; | ||
| 1703 | } | ||
| 1704 | |||
| 1708 | err = hci_blacklist_add(hdev, &cp->bdaddr); | 1705 | err = hci_blacklist_add(hdev, &cp->bdaddr); |
| 1709 | 1706 | ||
| 1710 | if (err < 0) | 1707 | if (err < 0) |
| @@ -1712,6 +1709,11 @@ static int block_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1712 | else | 1709 | else |
| 1713 | err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE, | 1710 | err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE, |
| 1714 | NULL, 0); | 1711 | NULL, 0); |
| 1712 | |||
| 1713 | mgmt_pending_remove(cmd); | ||
| 1714 | |||
| 1715 | failed: | ||
| 1716 | hci_dev_unlock_bh(hdev); | ||
| 1715 | hci_dev_put(hdev); | 1717 | hci_dev_put(hdev); |
| 1716 | 1718 | ||
| 1717 | return err; | 1719 | return err; |
| @@ -1721,13 +1723,12 @@ static int unblock_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1721 | u16 len) | 1723 | u16 len) |
| 1722 | { | 1724 | { |
| 1723 | struct hci_dev *hdev; | 1725 | struct hci_dev *hdev; |
| 1724 | struct mgmt_cp_unblock_device *cp; | 1726 | struct pending_cmd *cmd; |
| 1727 | struct mgmt_cp_unblock_device *cp = (void *) data; | ||
| 1725 | int err; | 1728 | int err; |
| 1726 | 1729 | ||
| 1727 | BT_DBG("hci%u", index); | 1730 | BT_DBG("hci%u", index); |
| 1728 | 1731 | ||
| 1729 | cp = (void *) data; | ||
| 1730 | |||
| 1731 | if (len != sizeof(*cp)) | 1732 | if (len != sizeof(*cp)) |
| 1732 | return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE, | 1733 | return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE, |
| 1733 | EINVAL); | 1734 | EINVAL); |
| @@ -1737,6 +1738,14 @@ static int unblock_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1737 | return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE, | 1738 | return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE, |
| 1738 | ENODEV); | 1739 | ENODEV); |
| 1739 | 1740 | ||
| 1741 | hci_dev_lock_bh(hdev); | ||
| 1742 | |||
| 1743 | cmd = mgmt_pending_add(sk, MGMT_OP_UNBLOCK_DEVICE, index, NULL, 0); | ||
| 1744 | if (!cmd) { | ||
| 1745 | err = -ENOMEM; | ||
| 1746 | goto failed; | ||
| 1747 | } | ||
| 1748 | |||
| 1740 | err = hci_blacklist_del(hdev, &cp->bdaddr); | 1749 | err = hci_blacklist_del(hdev, &cp->bdaddr); |
| 1741 | 1750 | ||
| 1742 | if (err < 0) | 1751 | if (err < 0) |
| @@ -1744,6 +1753,67 @@ static int unblock_device(struct sock *sk, u16 index, unsigned char *data, | |||
| 1744 | else | 1753 | else |
| 1745 | err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE, | 1754 | err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE, |
| 1746 | NULL, 0); | 1755 | NULL, 0); |
| 1756 | |||
| 1757 | mgmt_pending_remove(cmd); | ||
| 1758 | |||
| 1759 | failed: | ||
| 1760 | hci_dev_unlock_bh(hdev); | ||
| 1761 | hci_dev_put(hdev); | ||
| 1762 | |||
| 1763 | return err; | ||
| 1764 | } | ||
| 1765 | |||
| 1766 | static int set_fast_connectable(struct sock *sk, u16 index, | ||
| 1767 | unsigned char *data, u16 len) | ||
| 1768 | { | ||
| 1769 | struct hci_dev *hdev; | ||
| 1770 | struct mgmt_cp_set_fast_connectable *cp = (void *) data; | ||
| 1771 | struct hci_cp_write_page_scan_activity acp; | ||
| 1772 | u8 type; | ||
| 1773 | int err; | ||
| 1774 | |||
| 1775 | BT_DBG("hci%u", index); | ||
| 1776 | |||
| 1777 | if (len != sizeof(*cp)) | ||
| 1778 | return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE, | ||
| 1779 | EINVAL); | ||
| 1780 | |||
| 1781 | hdev = hci_dev_get(index); | ||
| 1782 | if (!hdev) | ||
| 1783 | return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE, | ||
| 1784 | ENODEV); | ||
| 1785 | |||
| 1786 | hci_dev_lock(hdev); | ||
| 1787 | |||
| 1788 | if (cp->enable) { | ||
| 1789 | type = PAGE_SCAN_TYPE_INTERLACED; | ||
| 1790 | acp.interval = 0x0024; /* 22.5 msec page scan interval */ | ||
| 1791 | } else { | ||
| 1792 | type = PAGE_SCAN_TYPE_STANDARD; /* default */ | ||
| 1793 | acp.interval = 0x0800; /* default 1.28 sec page scan */ | ||
| 1794 | } | ||
| 1795 | |||
| 1796 | acp.window = 0x0012; /* default 11.25 msec page scan window */ | ||
| 1797 | |||
| 1798 | err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY, | ||
| 1799 | sizeof(acp), &acp); | ||
| 1800 | if (err < 0) { | ||
| 1801 | err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE, | ||
| 1802 | -err); | ||
| 1803 | goto done; | ||
| 1804 | } | ||
| 1805 | |||
| 1806 | err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type); | ||
| 1807 | if (err < 0) { | ||
| 1808 | err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE, | ||
| 1809 | -err); | ||
| 1810 | goto done; | ||
| 1811 | } | ||
| 1812 | |||
| 1813 | err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE, | ||
| 1814 | NULL, 0); | ||
| 1815 | done: | ||
| 1816 | hci_dev_unlock(hdev); | ||
| 1747 | hci_dev_put(hdev); | 1817 | hci_dev_put(hdev); |
| 1748 | 1818 | ||
| 1749 | return err; | 1819 | return err; |
| @@ -1869,6 +1939,10 @@ int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen) | |||
| 1869 | case MGMT_OP_UNBLOCK_DEVICE: | 1939 | case MGMT_OP_UNBLOCK_DEVICE: |
| 1870 | err = unblock_device(sk, index, buf + sizeof(*hdr), len); | 1940 | err = unblock_device(sk, index, buf + sizeof(*hdr), len); |
| 1871 | break; | 1941 | break; |
| 1942 | case MGMT_OP_SET_FAST_CONNECTABLE: | ||
| 1943 | err = set_fast_connectable(sk, index, buf + sizeof(*hdr), | ||
| 1944 | len); | ||
| 1945 | break; | ||
| 1872 | default: | 1946 | default: |
| 1873 | BT_DBG("Unknown op %u", opcode); | 1947 | BT_DBG("Unknown op %u", opcode); |
| 1874 | err = cmd_status(sk, index, opcode, 0x01); | 1948 | err = cmd_status(sk, index, opcode, 0x01); |
| @@ -1977,35 +2051,25 @@ int mgmt_connectable(u16 index, u8 connectable) | |||
| 1977 | 2051 | ||
| 1978 | int mgmt_new_key(u16 index, struct link_key *key, u8 persistent) | 2052 | int mgmt_new_key(u16 index, struct link_key *key, u8 persistent) |
| 1979 | { | 2053 | { |
| 1980 | struct mgmt_ev_new_key *ev; | 2054 | struct mgmt_ev_new_key ev; |
| 1981 | int err, total; | ||
| 1982 | |||
| 1983 | total = sizeof(struct mgmt_ev_new_key) + key->dlen; | ||
| 1984 | ev = kzalloc(total, GFP_ATOMIC); | ||
| 1985 | if (!ev) | ||
| 1986 | return -ENOMEM; | ||
| 1987 | |||
| 1988 | bacpy(&ev->key.bdaddr, &key->bdaddr); | ||
| 1989 | ev->key.type = key->type; | ||
| 1990 | memcpy(ev->key.val, key->val, 16); | ||
| 1991 | ev->key.pin_len = key->pin_len; | ||
| 1992 | ev->key.dlen = key->dlen; | ||
| 1993 | ev->store_hint = persistent; | ||
| 1994 | 2055 | ||
| 1995 | memcpy(ev->key.data, key->data, key->dlen); | 2056 | memset(&ev, 0, sizeof(ev)); |
| 1996 | |||
| 1997 | err = mgmt_event(MGMT_EV_NEW_KEY, index, ev, total, NULL); | ||
| 1998 | 2057 | ||
| 1999 | kfree(ev); | 2058 | ev.store_hint = persistent; |
| 2059 | bacpy(&ev.key.bdaddr, &key->bdaddr); | ||
| 2060 | ev.key.type = key->type; | ||
| 2061 | memcpy(ev.key.val, key->val, 16); | ||
| 2062 | ev.key.pin_len = key->pin_len; | ||
| 2000 | 2063 | ||
| 2001 | return err; | 2064 | return mgmt_event(MGMT_EV_NEW_KEY, index, &ev, sizeof(ev), NULL); |
| 2002 | } | 2065 | } |
| 2003 | 2066 | ||
| 2004 | int mgmt_connected(u16 index, bdaddr_t *bdaddr) | 2067 | int mgmt_connected(u16 index, bdaddr_t *bdaddr, u8 link_type) |
| 2005 | { | 2068 | { |
| 2006 | struct mgmt_ev_connected ev; | 2069 | struct mgmt_ev_connected ev; |
| 2007 | 2070 | ||
| 2008 | bacpy(&ev.bdaddr, bdaddr); | 2071 | bacpy(&ev.bdaddr, bdaddr); |
| 2072 | ev.link_type = link_type; | ||
| 2009 | 2073 | ||
| 2010 | return mgmt_event(MGMT_EV_CONNECTED, index, &ev, sizeof(ev), NULL); | 2074 | return mgmt_event(MGMT_EV_CONNECTED, index, &ev, sizeof(ev), NULL); |
| 2011 | } | 2075 | } |
| @@ -2260,12 +2324,14 @@ int mgmt_device_found(u16 index, bdaddr_t *bdaddr, u8 *dev_class, s8 rssi, | |||
| 2260 | memset(&ev, 0, sizeof(ev)); | 2324 | memset(&ev, 0, sizeof(ev)); |
| 2261 | 2325 | ||
| 2262 | bacpy(&ev.bdaddr, bdaddr); | 2326 | bacpy(&ev.bdaddr, bdaddr); |
| 2263 | memcpy(ev.dev_class, dev_class, sizeof(ev.dev_class)); | ||
| 2264 | ev.rssi = rssi; | 2327 | ev.rssi = rssi; |
| 2265 | 2328 | ||
| 2266 | if (eir) | 2329 | if (eir) |
| 2267 | memcpy(ev.eir, eir, sizeof(ev.eir)); | 2330 | memcpy(ev.eir, eir, sizeof(ev.eir)); |
| 2268 | 2331 | ||
| 2332 | if (dev_class) | ||
| 2333 | memcpy(ev.dev_class, dev_class, sizeof(ev.dev_class)); | ||
| 2334 | |||
| 2269 | return mgmt_event(MGMT_EV_DEVICE_FOUND, index, &ev, sizeof(ev), NULL); | 2335 | return mgmt_event(MGMT_EV_DEVICE_FOUND, index, &ev, sizeof(ev), NULL); |
| 2270 | } | 2336 | } |
| 2271 | 2337 | ||
| @@ -2286,3 +2352,29 @@ int mgmt_discovering(u16 index, u8 discovering) | |||
| 2286 | return mgmt_event(MGMT_EV_DISCOVERING, index, &discovering, | 2352 | return mgmt_event(MGMT_EV_DISCOVERING, index, &discovering, |
| 2287 | sizeof(discovering), NULL); | 2353 | sizeof(discovering), NULL); |
| 2288 | } | 2354 | } |
| 2355 | |||
| 2356 | int mgmt_device_blocked(u16 index, bdaddr_t *bdaddr) | ||
| 2357 | { | ||
| 2358 | struct pending_cmd *cmd; | ||
| 2359 | struct mgmt_ev_device_blocked ev; | ||
| 2360 | |||
| 2361 | cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, index); | ||
| 2362 | |||
| 2363 | bacpy(&ev.bdaddr, bdaddr); | ||
| 2364 | |||
| 2365 | return mgmt_event(MGMT_EV_DEVICE_BLOCKED, index, &ev, sizeof(ev), | ||
| 2366 | cmd ? cmd->sk : NULL); | ||
| 2367 | } | ||
| 2368 | |||
| 2369 | int mgmt_device_unblocked(u16 index, bdaddr_t *bdaddr) | ||
| 2370 | { | ||
| 2371 | struct pending_cmd *cmd; | ||
| 2372 | struct mgmt_ev_device_unblocked ev; | ||
| 2373 | |||
| 2374 | cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, index); | ||
| 2375 | |||
| 2376 | bacpy(&ev.bdaddr, bdaddr); | ||
| 2377 | |||
| 2378 | return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, index, &ev, sizeof(ev), | ||
| 2379 | cmd ? cmd->sk : NULL); | ||
| 2380 | } | ||
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c index 391888b88a92..759b63572641 100644 --- a/net/bluetooth/smp.c +++ b/net/bluetooth/smp.c | |||
| @@ -182,18 +182,9 @@ static void smp_send_cmd(struct l2cap_conn *conn, u8 code, u16 len, void *data) | |||
| 182 | return; | 182 | return; |
| 183 | 183 | ||
| 184 | hci_send_acl(conn->hcon, skb, 0); | 184 | hci_send_acl(conn->hcon, skb, 0); |
| 185 | } | ||
| 186 | |||
| 187 | static __u8 seclevel_to_authreq(__u8 level) | ||
| 188 | { | ||
| 189 | switch (level) { | ||
| 190 | case BT_SECURITY_HIGH: | ||
| 191 | /* Right now we don't support bonding */ | ||
| 192 | return SMP_AUTH_MITM; | ||
| 193 | 185 | ||
| 194 | default: | 186 | mod_timer(&conn->security_timer, jiffies + |
| 195 | return SMP_AUTH_NONE; | 187 | msecs_to_jiffies(SMP_TIMEOUT)); |
| 196 | } | ||
| 197 | } | 188 | } |
| 198 | 189 | ||
| 199 | static void build_pairing_cmd(struct l2cap_conn *conn, | 190 | static void build_pairing_cmd(struct l2cap_conn *conn, |
| @@ -205,7 +196,7 @@ static void build_pairing_cmd(struct l2cap_conn *conn, | |||
| 205 | 196 | ||
| 206 | dist_keys = 0; | 197 | dist_keys = 0; |
| 207 | if (test_bit(HCI_PAIRABLE, &conn->hcon->hdev->flags)) { | 198 | if (test_bit(HCI_PAIRABLE, &conn->hcon->hdev->flags)) { |
| 208 | dist_keys = SMP_DIST_ENC_KEY | SMP_DIST_ID_KEY | SMP_DIST_SIGN; | 199 | dist_keys = SMP_DIST_ENC_KEY; |
| 209 | authreq |= SMP_AUTH_BONDING; | 200 | authreq |= SMP_AUTH_BONDING; |
| 210 | } | 201 | } |
| 211 | 202 | ||
| @@ -229,24 +220,184 @@ static void build_pairing_cmd(struct l2cap_conn *conn, | |||
| 229 | 220 | ||
| 230 | static u8 check_enc_key_size(struct l2cap_conn *conn, __u8 max_key_size) | 221 | static u8 check_enc_key_size(struct l2cap_conn *conn, __u8 max_key_size) |
| 231 | { | 222 | { |
| 223 | struct smp_chan *smp = conn->smp_chan; | ||
| 224 | |||
| 232 | if ((max_key_size > SMP_MAX_ENC_KEY_SIZE) || | 225 | if ((max_key_size > SMP_MAX_ENC_KEY_SIZE) || |
| 233 | (max_key_size < SMP_MIN_ENC_KEY_SIZE)) | 226 | (max_key_size < SMP_MIN_ENC_KEY_SIZE)) |
| 234 | return SMP_ENC_KEY_SIZE; | 227 | return SMP_ENC_KEY_SIZE; |
| 235 | 228 | ||
| 236 | conn->smp_key_size = max_key_size; | 229 | smp->smp_key_size = max_key_size; |
| 237 | 230 | ||
| 238 | return 0; | 231 | return 0; |
| 239 | } | 232 | } |
| 240 | 233 | ||
| 234 | static void confirm_work(struct work_struct *work) | ||
| 235 | { | ||
| 236 | struct smp_chan *smp = container_of(work, struct smp_chan, confirm); | ||
| 237 | struct l2cap_conn *conn = smp->conn; | ||
| 238 | struct crypto_blkcipher *tfm; | ||
| 239 | struct smp_cmd_pairing_confirm cp; | ||
| 240 | int ret; | ||
| 241 | u8 res[16], reason; | ||
| 242 | |||
| 243 | BT_DBG("conn %p", conn); | ||
| 244 | |||
| 245 | tfm = crypto_alloc_blkcipher("ecb(aes)", 0, CRYPTO_ALG_ASYNC); | ||
| 246 | if (IS_ERR(tfm)) { | ||
| 247 | reason = SMP_UNSPECIFIED; | ||
| 248 | goto error; | ||
| 249 | } | ||
| 250 | |||
| 251 | smp->tfm = tfm; | ||
| 252 | |||
| 253 | if (conn->hcon->out) | ||
| 254 | ret = smp_c1(tfm, smp->tk, smp->prnd, smp->preq, smp->prsp, 0, | ||
| 255 | conn->src, conn->hcon->dst_type, conn->dst, | ||
| 256 | res); | ||
| 257 | else | ||
| 258 | ret = smp_c1(tfm, smp->tk, smp->prnd, smp->preq, smp->prsp, | ||
| 259 | conn->hcon->dst_type, conn->dst, 0, conn->src, | ||
| 260 | res); | ||
| 261 | if (ret) { | ||
| 262 | reason = SMP_UNSPECIFIED; | ||
| 263 | goto error; | ||
| 264 | } | ||
| 265 | |||
| 266 | swap128(res, cp.confirm_val); | ||
| 267 | smp_send_cmd(smp->conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp); | ||
| 268 | |||
| 269 | return; | ||
| 270 | |||
| 271 | error: | ||
| 272 | smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason), &reason); | ||
| 273 | smp_chan_destroy(conn); | ||
| 274 | } | ||
| 275 | |||
| 276 | static void random_work(struct work_struct *work) | ||
| 277 | { | ||
| 278 | struct smp_chan *smp = container_of(work, struct smp_chan, random); | ||
| 279 | struct l2cap_conn *conn = smp->conn; | ||
| 280 | struct hci_conn *hcon = conn->hcon; | ||
| 281 | struct crypto_blkcipher *tfm = smp->tfm; | ||
| 282 | u8 reason, confirm[16], res[16], key[16]; | ||
| 283 | int ret; | ||
| 284 | |||
| 285 | if (IS_ERR_OR_NULL(tfm)) { | ||
| 286 | reason = SMP_UNSPECIFIED; | ||
| 287 | goto error; | ||
| 288 | } | ||
| 289 | |||
| 290 | BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave"); | ||
| 291 | |||
| 292 | if (hcon->out) | ||
| 293 | ret = smp_c1(tfm, smp->tk, smp->rrnd, smp->preq, smp->prsp, 0, | ||
| 294 | conn->src, hcon->dst_type, conn->dst, | ||
| 295 | res); | ||
| 296 | else | ||
| 297 | ret = smp_c1(tfm, smp->tk, smp->rrnd, smp->preq, smp->prsp, | ||
| 298 | hcon->dst_type, conn->dst, 0, conn->src, | ||
| 299 | res); | ||
| 300 | if (ret) { | ||
| 301 | reason = SMP_UNSPECIFIED; | ||
| 302 | goto error; | ||
| 303 | } | ||
| 304 | |||
| 305 | swap128(res, confirm); | ||
| 306 | |||
| 307 | if (memcmp(smp->pcnf, confirm, sizeof(smp->pcnf)) != 0) { | ||
| 308 | BT_ERR("Pairing failed (confirmation values mismatch)"); | ||
| 309 | reason = SMP_CONFIRM_FAILED; | ||
| 310 | goto error; | ||
| 311 | } | ||
| 312 | |||
| 313 | if (hcon->out) { | ||
| 314 | u8 stk[16], rand[8]; | ||
| 315 | __le16 ediv; | ||
| 316 | |||
| 317 | memset(rand, 0, sizeof(rand)); | ||
| 318 | ediv = 0; | ||
| 319 | |||
| 320 | smp_s1(tfm, smp->tk, smp->rrnd, smp->prnd, key); | ||
| 321 | swap128(key, stk); | ||
| 322 | |||
| 323 | memset(stk + smp->smp_key_size, 0, | ||
| 324 | SMP_MAX_ENC_KEY_SIZE - smp->smp_key_size); | ||
| 325 | |||
| 326 | if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend)) { | ||
| 327 | reason = SMP_UNSPECIFIED; | ||
| 328 | goto error; | ||
| 329 | } | ||
| 330 | |||
| 331 | hci_le_start_enc(hcon, ediv, rand, stk); | ||
| 332 | hcon->enc_key_size = smp->smp_key_size; | ||
| 333 | } else { | ||
| 334 | u8 stk[16], r[16], rand[8]; | ||
| 335 | __le16 ediv; | ||
| 336 | |||
| 337 | memset(rand, 0, sizeof(rand)); | ||
| 338 | ediv = 0; | ||
| 339 | |||
| 340 | swap128(smp->prnd, r); | ||
| 341 | smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(r), r); | ||
| 342 | |||
| 343 | smp_s1(tfm, smp->tk, smp->prnd, smp->rrnd, key); | ||
| 344 | swap128(key, stk); | ||
| 345 | |||
| 346 | memset(stk + smp->smp_key_size, 0, | ||
| 347 | SMP_MAX_ENC_KEY_SIZE - smp->smp_key_size); | ||
| 348 | |||
| 349 | hci_add_ltk(hcon->hdev, 0, conn->dst, smp->smp_key_size, | ||
| 350 | ediv, rand, stk); | ||
| 351 | } | ||
| 352 | |||
| 353 | return; | ||
| 354 | |||
| 355 | error: | ||
| 356 | smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason), &reason); | ||
| 357 | smp_chan_destroy(conn); | ||
| 358 | } | ||
| 359 | |||
| 360 | static struct smp_chan *smp_chan_create(struct l2cap_conn *conn) | ||
| 361 | { | ||
| 362 | struct smp_chan *smp; | ||
| 363 | |||
| 364 | smp = kzalloc(sizeof(struct smp_chan), GFP_ATOMIC); | ||
| 365 | if (!smp) | ||
| 366 | return NULL; | ||
| 367 | |||
| 368 | INIT_WORK(&smp->confirm, confirm_work); | ||
| 369 | INIT_WORK(&smp->random, random_work); | ||
| 370 | |||
| 371 | smp->conn = conn; | ||
| 372 | conn->smp_chan = smp; | ||
| 373 | |||
| 374 | hci_conn_hold(conn->hcon); | ||
| 375 | |||
| 376 | return smp; | ||
| 377 | } | ||
| 378 | |||
| 379 | void smp_chan_destroy(struct l2cap_conn *conn) | ||
| 380 | { | ||
| 381 | kfree(conn->smp_chan); | ||
| 382 | hci_conn_put(conn->hcon); | ||
| 383 | } | ||
| 384 | |||
| 241 | static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb) | 385 | static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb) |
| 242 | { | 386 | { |
| 243 | struct smp_cmd_pairing rsp, *req = (void *) skb->data; | 387 | struct smp_cmd_pairing rsp, *req = (void *) skb->data; |
| 388 | struct smp_chan *smp; | ||
| 244 | u8 key_size; | 389 | u8 key_size; |
| 390 | int ret; | ||
| 245 | 391 | ||
| 246 | BT_DBG("conn %p", conn); | 392 | BT_DBG("conn %p", conn); |
| 247 | 393 | ||
| 248 | conn->preq[0] = SMP_CMD_PAIRING_REQ; | 394 | if (!test_and_set_bit(HCI_CONN_LE_SMP_PEND, &conn->hcon->pend)) |
| 249 | memcpy(&conn->preq[1], req, sizeof(*req)); | 395 | smp = smp_chan_create(conn); |
| 396 | |||
| 397 | smp = conn->smp_chan; | ||
| 398 | |||
| 399 | smp->preq[0] = SMP_CMD_PAIRING_REQ; | ||
| 400 | memcpy(&smp->preq[1], req, sizeof(*req)); | ||
| 250 | skb_pull(skb, sizeof(*req)); | 401 | skb_pull(skb, sizeof(*req)); |
| 251 | 402 | ||
| 252 | if (req->oob_flag) | 403 | if (req->oob_flag) |
| @@ -260,32 +411,33 @@ static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb) | |||
| 260 | return SMP_ENC_KEY_SIZE; | 411 | return SMP_ENC_KEY_SIZE; |
| 261 | 412 | ||
| 262 | /* Just works */ | 413 | /* Just works */ |
| 263 | memset(conn->tk, 0, sizeof(conn->tk)); | 414 | memset(smp->tk, 0, sizeof(smp->tk)); |
| 415 | |||
| 416 | ret = smp_rand(smp->prnd); | ||
| 417 | if (ret) | ||
| 418 | return SMP_UNSPECIFIED; | ||
| 264 | 419 | ||
| 265 | conn->prsp[0] = SMP_CMD_PAIRING_RSP; | 420 | smp->prsp[0] = SMP_CMD_PAIRING_RSP; |
| 266 | memcpy(&conn->prsp[1], &rsp, sizeof(rsp)); | 421 | memcpy(&smp->prsp[1], &rsp, sizeof(rsp)); |
| 267 | 422 | ||
| 268 | smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(rsp), &rsp); | 423 | smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(rsp), &rsp); |
| 269 | 424 | ||
| 270 | mod_timer(&conn->security_timer, jiffies + | ||
| 271 | msecs_to_jiffies(SMP_TIMEOUT)); | ||
| 272 | |||
| 273 | return 0; | 425 | return 0; |
| 274 | } | 426 | } |
| 275 | 427 | ||
| 276 | static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb) | 428 | static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb) |
| 277 | { | 429 | { |
| 278 | struct smp_cmd_pairing *req, *rsp = (void *) skb->data; | 430 | struct smp_cmd_pairing *req, *rsp = (void *) skb->data; |
| 279 | struct smp_cmd_pairing_confirm cp; | 431 | struct smp_chan *smp = conn->smp_chan; |
| 280 | struct crypto_blkcipher *tfm = conn->hcon->hdev->tfm; | 432 | struct hci_dev *hdev = conn->hcon->hdev; |
| 433 | u8 key_size; | ||
| 281 | int ret; | 434 | int ret; |
| 282 | u8 res[16], key_size; | ||
| 283 | 435 | ||
| 284 | BT_DBG("conn %p", conn); | 436 | BT_DBG("conn %p", conn); |
| 285 | 437 | ||
| 286 | skb_pull(skb, sizeof(*rsp)); | 438 | skb_pull(skb, sizeof(*rsp)); |
| 287 | 439 | ||
| 288 | req = (void *) &conn->preq[1]; | 440 | req = (void *) &smp->preq[1]; |
| 289 | 441 | ||
| 290 | key_size = min(req->max_key_size, rsp->max_key_size); | 442 | key_size = min(req->max_key_size, rsp->max_key_size); |
| 291 | if (check_enc_key_size(conn, key_size)) | 443 | if (check_enc_key_size(conn, key_size)) |
| @@ -295,222 +447,154 @@ static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb) | |||
| 295 | return SMP_OOB_NOT_AVAIL; | 447 | return SMP_OOB_NOT_AVAIL; |
| 296 | 448 | ||
| 297 | /* Just works */ | 449 | /* Just works */ |
| 298 | memset(conn->tk, 0, sizeof(conn->tk)); | 450 | memset(smp->tk, 0, sizeof(smp->tk)); |
| 299 | |||
| 300 | conn->prsp[0] = SMP_CMD_PAIRING_RSP; | ||
| 301 | memcpy(&conn->prsp[1], rsp, sizeof(*rsp)); | ||
| 302 | |||
| 303 | ret = smp_rand(conn->prnd); | ||
| 304 | if (ret) | ||
| 305 | return SMP_UNSPECIFIED; | ||
| 306 | 451 | ||
| 307 | ret = smp_c1(tfm, conn->tk, conn->prnd, conn->preq, conn->prsp, 0, | 452 | ret = smp_rand(smp->prnd); |
| 308 | conn->src, conn->hcon->dst_type, conn->dst, res); | ||
| 309 | if (ret) | 453 | if (ret) |
| 310 | return SMP_UNSPECIFIED; | 454 | return SMP_UNSPECIFIED; |
| 311 | 455 | ||
| 312 | swap128(res, cp.confirm_val); | 456 | smp->prsp[0] = SMP_CMD_PAIRING_RSP; |
| 457 | memcpy(&smp->prsp[1], rsp, sizeof(*rsp)); | ||
| 313 | 458 | ||
| 314 | smp_send_cmd(conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp); | 459 | queue_work(hdev->workqueue, &smp->confirm); |
| 315 | 460 | ||
| 316 | return 0; | 461 | return 0; |
| 317 | } | 462 | } |
| 318 | 463 | ||
| 319 | static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb) | 464 | static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb) |
| 320 | { | 465 | { |
| 321 | struct crypto_blkcipher *tfm = conn->hcon->hdev->tfm; | 466 | struct smp_chan *smp = conn->smp_chan; |
| 467 | struct hci_dev *hdev = conn->hcon->hdev; | ||
| 322 | 468 | ||
| 323 | BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave"); | 469 | BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave"); |
| 324 | 470 | ||
| 325 | memcpy(conn->pcnf, skb->data, sizeof(conn->pcnf)); | 471 | memcpy(smp->pcnf, skb->data, sizeof(smp->pcnf)); |
| 326 | skb_pull(skb, sizeof(conn->pcnf)); | 472 | skb_pull(skb, sizeof(smp->pcnf)); |
| 327 | 473 | ||
| 328 | if (conn->hcon->out) { | 474 | if (conn->hcon->out) { |
| 329 | u8 random[16]; | 475 | u8 random[16]; |
| 330 | 476 | ||
| 331 | swap128(conn->prnd, random); | 477 | swap128(smp->prnd, random); |
| 332 | smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(random), | 478 | smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(random), |
| 333 | random); | 479 | random); |
| 334 | } else { | 480 | } else { |
| 335 | struct smp_cmd_pairing_confirm cp; | 481 | queue_work(hdev->workqueue, &smp->confirm); |
| 336 | int ret; | ||
| 337 | u8 res[16]; | ||
| 338 | |||
| 339 | ret = smp_rand(conn->prnd); | ||
| 340 | if (ret) | ||
| 341 | return SMP_UNSPECIFIED; | ||
| 342 | |||
| 343 | ret = smp_c1(tfm, conn->tk, conn->prnd, conn->preq, conn->prsp, | ||
| 344 | conn->hcon->dst_type, conn->dst, | ||
| 345 | 0, conn->src, res); | ||
| 346 | if (ret) | ||
| 347 | return SMP_CONFIRM_FAILED; | ||
| 348 | |||
| 349 | swap128(res, cp.confirm_val); | ||
| 350 | |||
| 351 | smp_send_cmd(conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp); | ||
| 352 | } | 482 | } |
| 353 | 483 | ||
| 354 | mod_timer(&conn->security_timer, jiffies + | ||
| 355 | msecs_to_jiffies(SMP_TIMEOUT)); | ||
| 356 | |||
| 357 | return 0; | 484 | return 0; |
| 358 | } | 485 | } |
| 359 | 486 | ||
| 360 | static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb) | 487 | static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb) |
| 361 | { | 488 | { |
| 362 | struct hci_conn *hcon = conn->hcon; | 489 | struct smp_chan *smp = conn->smp_chan; |
| 363 | struct crypto_blkcipher *tfm = hcon->hdev->tfm; | 490 | struct hci_dev *hdev = conn->hcon->hdev; |
| 364 | int ret; | ||
| 365 | u8 key[16], res[16], random[16], confirm[16]; | ||
| 366 | 491 | ||
| 367 | swap128(skb->data, random); | 492 | BT_DBG("conn %p", conn); |
| 368 | skb_pull(skb, sizeof(random)); | ||
| 369 | |||
| 370 | if (conn->hcon->out) | ||
| 371 | ret = smp_c1(tfm, conn->tk, random, conn->preq, conn->prsp, 0, | ||
| 372 | conn->src, conn->hcon->dst_type, conn->dst, | ||
| 373 | res); | ||
| 374 | else | ||
| 375 | ret = smp_c1(tfm, conn->tk, random, conn->preq, conn->prsp, | ||
| 376 | conn->hcon->dst_type, conn->dst, 0, conn->src, | ||
| 377 | res); | ||
| 378 | if (ret) | ||
| 379 | return SMP_UNSPECIFIED; | ||
| 380 | |||
| 381 | BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave"); | ||
| 382 | |||
| 383 | swap128(res, confirm); | ||
| 384 | |||
| 385 | if (memcmp(conn->pcnf, confirm, sizeof(conn->pcnf)) != 0) { | ||
| 386 | BT_ERR("Pairing failed (confirmation values mismatch)"); | ||
| 387 | return SMP_CONFIRM_FAILED; | ||
| 388 | } | ||
| 389 | |||
| 390 | if (conn->hcon->out) { | ||
| 391 | u8 stk[16], rand[8]; | ||
| 392 | __le16 ediv; | ||
| 393 | |||
| 394 | memset(rand, 0, sizeof(rand)); | ||
| 395 | ediv = 0; | ||
| 396 | 493 | ||
| 397 | smp_s1(tfm, conn->tk, random, conn->prnd, key); | 494 | swap128(skb->data, smp->rrnd); |
| 398 | swap128(key, stk); | 495 | skb_pull(skb, sizeof(smp->rrnd)); |
| 399 | 496 | ||
| 400 | memset(stk + conn->smp_key_size, 0, | 497 | queue_work(hdev->workqueue, &smp->random); |
| 401 | SMP_MAX_ENC_KEY_SIZE - conn->smp_key_size); | ||
| 402 | 498 | ||
| 403 | hci_le_start_enc(hcon, ediv, rand, stk); | 499 | return 0; |
| 404 | hcon->enc_key_size = conn->smp_key_size; | 500 | } |
| 405 | } else { | ||
| 406 | u8 stk[16], r[16], rand[8]; | ||
| 407 | __le16 ediv; | ||
| 408 | 501 | ||
| 409 | memset(rand, 0, sizeof(rand)); | 502 | static u8 smp_ltk_encrypt(struct l2cap_conn *conn) |
| 410 | ediv = 0; | 503 | { |
| 504 | struct link_key *key; | ||
| 505 | struct key_master_id *master; | ||
| 506 | struct hci_conn *hcon = conn->hcon; | ||
| 411 | 507 | ||
| 412 | swap128(conn->prnd, r); | 508 | key = hci_find_link_key_type(hcon->hdev, conn->dst, |
| 413 | smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(r), r); | 509 | HCI_LK_SMP_LTK); |
| 510 | if (!key) | ||
| 511 | return 0; | ||
| 414 | 512 | ||
| 415 | smp_s1(tfm, conn->tk, conn->prnd, random, key); | 513 | if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, |
| 416 | swap128(key, stk); | 514 | &hcon->pend)) |
| 515 | return 1; | ||
| 417 | 516 | ||
| 418 | memset(stk + conn->smp_key_size, 0, | 517 | master = (void *) key->data; |
| 419 | SMP_MAX_ENC_KEY_SIZE - conn->smp_key_size); | 518 | hci_le_start_enc(hcon, master->ediv, master->rand, |
| 519 | key->val); | ||
| 520 | hcon->enc_key_size = key->pin_len; | ||
| 420 | 521 | ||
| 421 | hci_add_ltk(conn->hcon->hdev, 0, conn->dst, conn->smp_key_size, | 522 | return 1; |
| 422 | ediv, rand, stk); | ||
| 423 | } | ||
| 424 | 523 | ||
| 425 | return 0; | ||
| 426 | } | 524 | } |
| 427 | |||
| 428 | static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb) | 525 | static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb) |
| 429 | { | 526 | { |
| 430 | struct smp_cmd_security_req *rp = (void *) skb->data; | 527 | struct smp_cmd_security_req *rp = (void *) skb->data; |
| 431 | struct smp_cmd_pairing cp; | 528 | struct smp_cmd_pairing cp; |
| 432 | struct hci_conn *hcon = conn->hcon; | 529 | struct hci_conn *hcon = conn->hcon; |
| 530 | struct smp_chan *smp; | ||
| 433 | 531 | ||
| 434 | BT_DBG("conn %p", conn); | 532 | BT_DBG("conn %p", conn); |
| 435 | 533 | ||
| 436 | if (test_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend)) | 534 | hcon->pending_sec_level = BT_SECURITY_MEDIUM; |
| 535 | |||
| 536 | if (smp_ltk_encrypt(conn)) | ||
| 437 | return 0; | 537 | return 0; |
| 438 | 538 | ||
| 539 | if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->pend)) | ||
| 540 | return 0; | ||
| 541 | |||
| 542 | smp = smp_chan_create(conn); | ||
| 543 | |||
| 439 | skb_pull(skb, sizeof(*rp)); | 544 | skb_pull(skb, sizeof(*rp)); |
| 440 | 545 | ||
| 441 | memset(&cp, 0, sizeof(cp)); | 546 | memset(&cp, 0, sizeof(cp)); |
| 442 | build_pairing_cmd(conn, &cp, NULL, rp->auth_req); | 547 | build_pairing_cmd(conn, &cp, NULL, rp->auth_req); |
| 443 | 548 | ||
| 444 | conn->preq[0] = SMP_CMD_PAIRING_REQ; | 549 | smp->preq[0] = SMP_CMD_PAIRING_REQ; |
| 445 | memcpy(&conn->preq[1], &cp, sizeof(cp)); | 550 | memcpy(&smp->preq[1], &cp, sizeof(cp)); |
| 446 | 551 | ||
| 447 | smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp); | 552 | smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp); |
| 448 | 553 | ||
| 449 | mod_timer(&conn->security_timer, jiffies + | ||
| 450 | msecs_to_jiffies(SMP_TIMEOUT)); | ||
| 451 | |||
| 452 | set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend); | ||
| 453 | |||
| 454 | return 0; | 554 | return 0; |
| 455 | } | 555 | } |
| 456 | 556 | ||
| 457 | int smp_conn_security(struct l2cap_conn *conn, __u8 sec_level) | 557 | int smp_conn_security(struct l2cap_conn *conn, __u8 sec_level) |
| 458 | { | 558 | { |
| 459 | struct hci_conn *hcon = conn->hcon; | 559 | struct hci_conn *hcon = conn->hcon; |
| 460 | __u8 authreq; | 560 | struct smp_chan *smp = conn->smp_chan; |
| 461 | 561 | ||
| 462 | BT_DBG("conn %p hcon %p level 0x%2.2x", conn, hcon, sec_level); | 562 | BT_DBG("conn %p hcon %p level 0x%2.2x", conn, hcon, sec_level); |
| 463 | 563 | ||
| 464 | if (!lmp_host_le_capable(hcon->hdev)) | 564 | if (!lmp_host_le_capable(hcon->hdev)) |
| 465 | return 1; | 565 | return 1; |
| 466 | 566 | ||
| 467 | if (IS_ERR(hcon->hdev->tfm)) | ||
| 468 | return 1; | ||
| 469 | |||
| 470 | if (test_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend)) | ||
| 471 | return 0; | ||
| 472 | |||
| 473 | if (sec_level == BT_SECURITY_LOW) | 567 | if (sec_level == BT_SECURITY_LOW) |
| 474 | return 1; | 568 | return 1; |
| 475 | 569 | ||
| 476 | if (hcon->sec_level >= sec_level) | 570 | if (hcon->sec_level >= sec_level) |
| 477 | return 1; | 571 | return 1; |
| 478 | 572 | ||
| 479 | authreq = seclevel_to_authreq(sec_level); | 573 | if (hcon->link_mode & HCI_LM_MASTER) |
| 480 | 574 | if (smp_ltk_encrypt(conn)) | |
| 481 | if (hcon->link_mode & HCI_LM_MASTER) { | 575 | goto done; |
| 482 | struct smp_cmd_pairing cp; | ||
| 483 | struct link_key *key; | ||
| 484 | 576 | ||
| 485 | key = hci_find_link_key_type(hcon->hdev, conn->dst, | 577 | if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->pend)) |
| 486 | HCI_LK_SMP_LTK); | 578 | return 0; |
| 487 | if (key) { | ||
| 488 | struct key_master_id *master = (void *) key->data; | ||
| 489 | 579 | ||
| 490 | hci_le_start_enc(hcon, master->ediv, master->rand, | 580 | smp = smp_chan_create(conn); |
| 491 | key->val); | ||
| 492 | hcon->enc_key_size = key->pin_len; | ||
| 493 | 581 | ||
| 494 | goto done; | 582 | if (hcon->link_mode & HCI_LM_MASTER) { |
| 495 | } | 583 | struct smp_cmd_pairing cp; |
| 496 | |||
| 497 | build_pairing_cmd(conn, &cp, NULL, authreq); | ||
| 498 | conn->preq[0] = SMP_CMD_PAIRING_REQ; | ||
| 499 | memcpy(&conn->preq[1], &cp, sizeof(cp)); | ||
| 500 | 584 | ||
| 501 | mod_timer(&conn->security_timer, jiffies + | 585 | build_pairing_cmd(conn, &cp, NULL, SMP_AUTH_NONE); |
| 502 | msecs_to_jiffies(SMP_TIMEOUT)); | 586 | smp->preq[0] = SMP_CMD_PAIRING_REQ; |
| 587 | memcpy(&smp->preq[1], &cp, sizeof(cp)); | ||
| 503 | 588 | ||
| 504 | smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp); | 589 | smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp); |
| 505 | } else { | 590 | } else { |
| 506 | struct smp_cmd_security_req cp; | 591 | struct smp_cmd_security_req cp; |
| 507 | cp.auth_req = authreq; | 592 | cp.auth_req = SMP_AUTH_NONE; |
| 508 | smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp); | 593 | smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp); |
| 509 | } | 594 | } |
| 510 | 595 | ||
| 511 | done: | 596 | done: |
| 512 | hcon->pending_sec_level = sec_level; | 597 | hcon->pending_sec_level = sec_level; |
| 513 | set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend); | ||
| 514 | 598 | ||
| 515 | return 0; | 599 | return 0; |
| 516 | } | 600 | } |
| @@ -518,10 +602,11 @@ done: | |||
| 518 | static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb) | 602 | static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb) |
| 519 | { | 603 | { |
| 520 | struct smp_cmd_encrypt_info *rp = (void *) skb->data; | 604 | struct smp_cmd_encrypt_info *rp = (void *) skb->data; |
| 605 | struct smp_chan *smp = conn->smp_chan; | ||
| 521 | 606 | ||
| 522 | skb_pull(skb, sizeof(*rp)); | 607 | skb_pull(skb, sizeof(*rp)); |
| 523 | 608 | ||
| 524 | memcpy(conn->tk, rp->ltk, sizeof(conn->tk)); | 609 | memcpy(smp->tk, rp->ltk, sizeof(smp->tk)); |
| 525 | 610 | ||
| 526 | return 0; | 611 | return 0; |
| 527 | } | 612 | } |
| @@ -529,11 +614,12 @@ static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb) | |||
| 529 | static int smp_cmd_master_ident(struct l2cap_conn *conn, struct sk_buff *skb) | 614 | static int smp_cmd_master_ident(struct l2cap_conn *conn, struct sk_buff *skb) |
| 530 | { | 615 | { |
| 531 | struct smp_cmd_master_ident *rp = (void *) skb->data; | 616 | struct smp_cmd_master_ident *rp = (void *) skb->data; |
| 617 | struct smp_chan *smp = conn->smp_chan; | ||
| 532 | 618 | ||
| 533 | skb_pull(skb, sizeof(*rp)); | 619 | skb_pull(skb, sizeof(*rp)); |
| 534 | 620 | ||
| 535 | hci_add_ltk(conn->hcon->hdev, 1, conn->src, conn->smp_key_size, | 621 | hci_add_ltk(conn->hcon->hdev, 1, conn->src, smp->smp_key_size, |
| 536 | rp->ediv, rp->rand, conn->tk); | 622 | rp->ediv, rp->rand, smp->tk); |
| 537 | 623 | ||
| 538 | smp_distribute_keys(conn, 1); | 624 | smp_distribute_keys(conn, 1); |
| 539 | 625 | ||
| @@ -552,12 +638,6 @@ int smp_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb) | |||
| 552 | goto done; | 638 | goto done; |
| 553 | } | 639 | } |
| 554 | 640 | ||
| 555 | if (IS_ERR(conn->hcon->hdev->tfm)) { | ||
| 556 | err = PTR_ERR(conn->hcon->hdev->tfm); | ||
| 557 | reason = SMP_PAIRING_NOTSUPP; | ||
| 558 | goto done; | ||
| 559 | } | ||
| 560 | |||
| 561 | skb_pull(skb, sizeof(code)); | 641 | skb_pull(skb, sizeof(code)); |
| 562 | 642 | ||
| 563 | switch (code) { | 643 | switch (code) { |
| @@ -621,20 +701,21 @@ done: | |||
| 621 | int smp_distribute_keys(struct l2cap_conn *conn, __u8 force) | 701 | int smp_distribute_keys(struct l2cap_conn *conn, __u8 force) |
| 622 | { | 702 | { |
| 623 | struct smp_cmd_pairing *req, *rsp; | 703 | struct smp_cmd_pairing *req, *rsp; |
| 704 | struct smp_chan *smp = conn->smp_chan; | ||
| 624 | __u8 *keydist; | 705 | __u8 *keydist; |
| 625 | 706 | ||
| 626 | BT_DBG("conn %p force %d", conn, force); | 707 | BT_DBG("conn %p force %d", conn, force); |
| 627 | 708 | ||
| 628 | if (IS_ERR(conn->hcon->hdev->tfm)) | 709 | if (!test_bit(HCI_CONN_LE_SMP_PEND, &conn->hcon->pend)) |
| 629 | return PTR_ERR(conn->hcon->hdev->tfm); | 710 | return 0; |
| 630 | 711 | ||
| 631 | rsp = (void *) &conn->prsp[1]; | 712 | rsp = (void *) &smp->prsp[1]; |
| 632 | 713 | ||
| 633 | /* The responder sends its keys first */ | 714 | /* The responder sends its keys first */ |
| 634 | if (!force && conn->hcon->out && (rsp->resp_key_dist & 0x07)) | 715 | if (!force && conn->hcon->out && (rsp->resp_key_dist & 0x07)) |
| 635 | return 0; | 716 | return 0; |
| 636 | 717 | ||
| 637 | req = (void *) &conn->preq[1]; | 718 | req = (void *) &smp->preq[1]; |
| 638 | 719 | ||
| 639 | if (conn->hcon->out) { | 720 | if (conn->hcon->out) { |
| 640 | keydist = &rsp->init_key_dist; | 721 | keydist = &rsp->init_key_dist; |
| @@ -658,7 +739,7 @@ int smp_distribute_keys(struct l2cap_conn *conn, __u8 force) | |||
| 658 | 739 | ||
| 659 | smp_send_cmd(conn, SMP_CMD_ENCRYPT_INFO, sizeof(enc), &enc); | 740 | smp_send_cmd(conn, SMP_CMD_ENCRYPT_INFO, sizeof(enc), &enc); |
| 660 | 741 | ||
| 661 | hci_add_ltk(conn->hcon->hdev, 1, conn->dst, conn->smp_key_size, | 742 | hci_add_ltk(conn->hcon->hdev, 1, conn->dst, smp->smp_key_size, |
| 662 | ediv, ident.rand, enc.ltk); | 743 | ediv, ident.rand, enc.ltk); |
| 663 | 744 | ||
| 664 | ident.ediv = cpu_to_le16(ediv); | 745 | ident.ediv = cpu_to_le16(ediv); |
| @@ -698,5 +779,11 @@ int smp_distribute_keys(struct l2cap_conn *conn, __u8 force) | |||
| 698 | *keydist &= ~SMP_DIST_SIGN; | 779 | *keydist &= ~SMP_DIST_SIGN; |
| 699 | } | 780 | } |
| 700 | 781 | ||
| 782 | if (conn->hcon->out || force) { | ||
| 783 | clear_bit(HCI_CONN_LE_SMP_PEND, &conn->hcon->pend); | ||
| 784 | del_timer(&conn->security_timer); | ||
| 785 | smp_chan_destroy(conn); | ||
| 786 | } | ||
| 787 | |||
| 701 | return 0; | 788 | return 0; |
| 702 | } | 789 | } |
