Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp515396ybi; Wed, 3 Jul 2019 00:17:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqwrBpXK/lgEFpUykDKSeA3cRUZf40guvNhvDb6meJqYBpuNWRcuowZ8wGnTcCHeX9jPkIUm X-Received: by 2002:a63:5a0a:: with SMTP id o10mr36162626pgb.282.1562138248177; Wed, 03 Jul 2019 00:17:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562138248; cv=none; d=google.com; s=arc-20160816; b=AobIpP6LyjdaL/RBjsJJ/qTJ0Xt8qIz58Azdu/gNvxz70CQeWX1iwlMaqe50RZoajh H321kRMVE8qS62aEE8tHuUF9mSOnjwRKc0hxyM+hYSpPX6TEIr832KSyipJVo5DYVQfO 51hMxsNKImHIRGgYIiX/5pi+qTRc+NWNexcdm+aBrR7OfvD5R0Bq3SBCj9yEGQnUWFjv ddih6oCwXHoA1OTZ3dm9KW2A1saoVqN0Sc9qTjvXark+ElAqXknHps7Vp8uU+m5C5KSC eAn4L+sFkcssY14G55GD/MqeY5HTUd/7J40e4I9Aw6seFZFJFPU1DPda8i1HyrjcxUG1 7J2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=P5uW1D2kumbgQcxSyb54FRmc63KTpG79U53AITDME64=; b=e9fAiVSm1yqcytqEPsWG9bahz/aQXY3DwjDNhiFsq6gWPicyipD5hg8TOAaadR8BGi 50D8xayDxcpr0yExFHYnU65O0Uwd8B36ynD98SjoROEyLhzmfLMbX71JifUZVeXJZyBC mamQG6OdAE5hNVXOiYQaQS0q6mG7V3sFoviPt7Hx0BQp6J9UW0sjoNK9Y8zz7WM8oqoA cZEqdWHmSWeXqyI8L35eT5T5vf9bsnCIBqK44c2jIPgIDbBFyaJXIHB8tmb0091PTXiW 7u26zgt7pAHfsDS9rsyy8WoDZP0oGxVPG5/TIwCvWuEBi6o7ugqupFkxTknqfRKkocvj iKNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@silvair-com.20150623.gappssmtp.com header.s=20150623 header.b="U64VA/1t"; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 6si1541062pld.293.2019.07.03.00.17.13; Wed, 03 Jul 2019 00:17:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@silvair-com.20150623.gappssmtp.com header.s=20150623 header.b="U64VA/1t"; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727234AbfGCHRG (ORCPT + 99 others); Wed, 3 Jul 2019 03:17:06 -0400 Received: from mail-lj1-f193.google.com ([209.85.208.193]:39022 "EHLO mail-lj1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726490AbfGCHRF (ORCPT ); Wed, 3 Jul 2019 03:17:05 -0400 Received: by mail-lj1-f193.google.com with SMTP id v18so1214477ljh.6 for ; Wed, 03 Jul 2019 00:17:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=silvair-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=P5uW1D2kumbgQcxSyb54FRmc63KTpG79U53AITDME64=; b=U64VA/1t83Nfgfad7nezBerQFzbXhMJG4FFFgNjQ5fSqayPd63uwLr/arFd/BxfXVe va9t3bgBWAlGxiUCNK+w52/05kcPBSxu8oV8u8tVXutR7krgKhszCRlPIaeSmuM2y4yc ULtWecvimnKLfqy8ajebRoZtrYPzRZrhB9oV62jTweJnItj+jPlKD+4YaUQJpBHH730o qu7EHmCSKy2LZjyQ6tOM00qDwscO7tRHporxAxu9BzWMdhpubIrXo4r/7hVV2Xu/BrEc RxbO3XAtxiICNPDaUBuMo/qddcg8eoEP7ABY+WJ+rg7CZjtOA7mpEtPJTXRwp7m5cg2o ib8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=P5uW1D2kumbgQcxSyb54FRmc63KTpG79U53AITDME64=; b=j7Kq/PYqenZVFN5/IS+/Kcu/IhDjb2ornstW5f+ndC9OhjF8ZOQ+YaSpuV2i+X08Rs 2QU47eG6o99B3e3fOSyw1TMWN7ty/ZaNj3c7stj5m1MhyuEaLBcmi+Ftv/JyMerB1Ans kynaVx/ZVkyc2TZc6BJojjodgVZOhVedPg4Pl/Dt671Jq0joMqKqOaqRrv0r2OTPVzYJ VHpiEJdiTGrCi5CcT4sYlED5q5TWEvz5F/3KfrZZ3QjKmMtygb+h5LrTz0G7gzmU7nzY Xb5P1YRzGADP5Ye/bTFYVpvtTiQ7zagLbDqMRs2DyYPKt+3wqdltTqwVI29kDIrnMT1n buVg== X-Gm-Message-State: APjAAAXFroYniCu5WhxQsArLqHrAwEepsR5NOMhtF9YIztQbzgzXiTxp TsV2xJaWLbD0LWy8duAdvyVIsHjQfSo= X-Received: by 2002:a2e:9a19:: with SMTP id o25mr5671840lji.63.1562138223570; Wed, 03 Jul 2019 00:17:03 -0700 (PDT) Received: from mlowasrzechonek2133.silvair.lan ([217.153.94.18]) by smtp.gmail.com with ESMTPSA id l11sm281364lfc.18.2019.07.03.00.17.02 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Wed, 03 Jul 2019 00:17:03 -0700 (PDT) From: =?UTF-8?q?Micha=C5=82=20Lowas-Rzechonek?= To: linux-bluetooth@vger.kernel.org Cc: Inga Stotland Subject: [PATCH BlueZ v3 2/3] mesh: Implement DevKeySend() method on Node interface Date: Wed, 3 Jul 2019 09:16:55 +0200 Message-Id: <20190703071656.6342-3-michal.lowas-rzechonek@silvair.com> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190703071656.6342-1-michal.lowas-rzechonek@silvair.com> References: <20190703071656.6342-1-michal.lowas-rzechonek@silvair.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org This patch implements D-Bus DevKeySend() method of org.bluez.mesh.Node1 interface, allowing the application to send messages encrypted using a known remote device key. At the moment the call ignores net_index argument and sends messages using the primary subnet. Also, it's no longer possible to use 'magic' key_index value 0x7fff (denoting local device key) when calling regular Send(). Applications should use DevKeySend() instead. --- mesh/model.c | 9 +++++++- mesh/node.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 65 insertions(+), 3 deletions(-) diff --git a/mesh/model.c b/mesh/model.c index 598615c5e..aae913d92 100644 --- a/mesh/model.c +++ b/mesh/model.c @@ -39,6 +39,7 @@ #include "mesh/dbus.h" #include "mesh/util.h" #include "mesh/model.h" +#include "mesh/keyring.h" /* Divide and round to ceiling (up) to calculate segment count */ #define CEILDIV(val, div) (((val) + (div) - 1) / (div)) @@ -941,6 +942,7 @@ bool mesh_model_send(struct mesh_node *node, uint16_t src, uint16_t target, const void *msg, uint16_t msg_len) { uint8_t key_id; + uint8_t dev_key[16]; const uint8_t *key; /* print_packet("Mod Tx", msg, msg_len); */ @@ -959,7 +961,12 @@ bool mesh_model_send(struct mesh_node *node, uint16_t src, uint16_t target, if (!key) return false; - l_debug("(%x)", app_idx); + key_id = APP_ID_DEV; + } else if (app_idx == APP_IDX_DEV_REMOTE) { + if (!keyring_get_remote_dev_key(node, target, dev_key)) + return false; + + key = dev_key; key_id = APP_ID_DEV; } else { key = appkey_get_key(node_get_net(node), app_idx, &key_id); diff --git a/mesh/node.c b/mesh/node.c index 9acf153d9..316b889e8 100644 --- a/mesh/node.c +++ b/mesh/node.c @@ -1959,7 +1959,11 @@ static struct l_dbus_message *send_call(struct l_dbus *dbus, return dbus_error(msg, MESH_ERROR_INVALID_ARGS, "Incorrect data"); - if (!mesh_model_send(node, src, dst, app_idx, + if ((app_idx & APP_IDX_MASK) != app_idx) + return dbus_error(msg, MESH_ERROR_INVALID_ARGS, + "Invalid key_index"); + + if (!mesh_model_send(node, src, dst, app_idx & APP_IDX_MASK, mesh_net_get_default_ttl(node->net), data, len)) return dbus_error(msg, MESH_ERROR_FAILED, NULL); @@ -1969,6 +1973,53 @@ static struct l_dbus_message *send_call(struct l_dbus *dbus, return reply; } +static struct l_dbus_message *dev_key_send_call(struct l_dbus *dbus, + struct l_dbus_message *msg, + void *user_data) +{ + struct mesh_node *node = user_data; + const char *sender, *ele_path; + struct l_dbus_message_iter iter_data; + struct node_element *ele; + uint16_t dst, net_idx, src; + uint8_t *data; + uint32_t len; + struct l_dbus_message *reply; + + l_debug("DevKeySend"); + + sender = l_dbus_message_get_sender(msg); + + if (strcmp(sender, node->owner)) + return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL); + + if (!l_dbus_message_get_arguments(msg, "oqqay", &ele_path, &dst, + &net_idx, &iter_data)) + return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL); + + ele = l_queue_find(node->elements, match_element_path, ele_path); + if (!ele) + return dbus_error(msg, MESH_ERROR_NOT_FOUND, + "Element not found"); + + src = node_get_primary(node) + ele->idx; + + if (!l_dbus_message_iter_get_fixed_array(&iter_data, &data, &len) || + !len || len > MESH_MAX_ACCESS_PAYLOAD) + return dbus_error(msg, MESH_ERROR_INVALID_ARGS, + "Incorrect data"); + + /* TODO: use net_idx */ + if (!mesh_model_send(node, src, dst, APP_IDX_DEV_REMOTE, + mesh_net_get_default_ttl(node->net), data, len)) + return dbus_error(msg, MESH_ERROR_NOT_FOUND, NULL); + + reply = l_dbus_message_new_method_return(msg); + l_dbus_message_set_arguments(reply, ""); + + return reply; +} + static struct l_dbus_message *publish_call(struct l_dbus *dbus, struct l_dbus_message *msg, void *user_data) @@ -2074,7 +2125,11 @@ static void setup_node_interface(struct l_dbus_interface *iface) { l_dbus_interface_method(iface, "Send", 0, send_call, "", "oqqay", "element_path", "destination", - "key", "data"); + "key_index", "data"); + l_dbus_interface_method(iface, "DevKeySend", 0, dev_key_send_call, + "", "oqqay", "element_path", + "destination", "net_index", + "data"); l_dbus_interface_method(iface, "Publish", 0, publish_call, "", "oqay", "element_path", "model_id", "data"); l_dbus_interface_method(iface, "VendorPublish", 0, vendor_publish_call, -- 2.19.1