diff options
author | Johan Hedberg <johan.hedberg@intel.com> | 2014-09-10 20:37:45 -0400 |
---|---|---|
committer | Marcel Holtmann <marcel@holtmann.org> | 2014-09-10 20:45:24 -0400 |
commit | a6f7833ca353d50de46e3532afebe4abfc5dc4d9 (patch) | |
tree | 81813ae82ad5069a9880b2918de7548ccbd9a61b /net | |
parent | 1afc2a1ab6612dcc3f26db7ca1afba9cff359f1c (diff) |
Bluetooth: Add smp_ltk_sec_level() helper function
There are several places that need to determine the security level that
an LTK can provide. This patch adds a convenience function for this to
help make the code more readable.
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Diffstat (limited to 'net')
-rw-r--r-- | net/bluetooth/hci_event.c | 5 | ||||
-rw-r--r-- | net/bluetooth/smp.c | 2 | ||||
-rw-r--r-- | net/bluetooth/smp.h | 8 |
3 files changed, 10 insertions, 5 deletions
diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c index 3a8381ab992f..603a17cc52ac 100644 --- a/net/bluetooth/hci_event.c +++ b/net/bluetooth/hci_event.c | |||
@@ -4506,10 +4506,7 @@ static void hci_le_ltk_request_evt(struct hci_dev *hdev, struct sk_buff *skb) | |||
4506 | memcpy(cp.ltk, ltk->val, sizeof(ltk->val)); | 4506 | memcpy(cp.ltk, ltk->val, sizeof(ltk->val)); |
4507 | cp.handle = cpu_to_le16(conn->handle); | 4507 | cp.handle = cpu_to_le16(conn->handle); |
4508 | 4508 | ||
4509 | if (ltk->authenticated) | 4509 | conn->pending_sec_level = smp_ltk_sec_level(ltk); |
4510 | conn->pending_sec_level = BT_SECURITY_HIGH; | ||
4511 | else | ||
4512 | conn->pending_sec_level = BT_SECURITY_MEDIUM; | ||
4513 | 4510 | ||
4514 | conn->enc_key_size = ltk->enc_size; | 4511 | conn->enc_key_size = ltk->enc_size; |
4515 | 4512 | ||
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c index a08b077cb725..3700dd8d9d0b 100644 --- a/net/bluetooth/smp.c +++ b/net/bluetooth/smp.c | |||
@@ -1114,7 +1114,7 @@ static bool smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level) | |||
1114 | if (!key) | 1114 | if (!key) |
1115 | return false; | 1115 | return false; |
1116 | 1116 | ||
1117 | if (sec_level > BT_SECURITY_MEDIUM && !key->authenticated) | 1117 | if (smp_ltk_sec_level(key) < sec_level) |
1118 | return false; | 1118 | return false; |
1119 | 1119 | ||
1120 | if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags)) | 1120 | if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags)) |
diff --git a/net/bluetooth/smp.h b/net/bluetooth/smp.h index 5240537efde3..86a683a8b491 100644 --- a/net/bluetooth/smp.h +++ b/net/bluetooth/smp.h | |||
@@ -125,6 +125,14 @@ enum { | |||
125 | SMP_LTK_SLAVE, | 125 | SMP_LTK_SLAVE, |
126 | }; | 126 | }; |
127 | 127 | ||
128 | static inline u8 smp_ltk_sec_level(struct smp_ltk *key) | ||
129 | { | ||
130 | if (key->authenticated) | ||
131 | return BT_SECURITY_HIGH; | ||
132 | |||
133 | return BT_SECURITY_MEDIUM; | ||
134 | } | ||
135 | |||
128 | /* SMP Commands */ | 136 | /* SMP Commands */ |
129 | bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level); | 137 | bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level); |
130 | int smp_conn_security(struct hci_conn *hcon, __u8 sec_level); | 138 | int smp_conn_security(struct hci_conn *hcon, __u8 sec_level); |