Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6491224ybv; Wed, 12 Feb 2020 13:20:08 -0800 (PST) X-Google-Smtp-Source: APXvYqzqEXC81plSlTJk248QA7HxDGdIt7yVBgvDfbY3R57PQVJafiweS3MnGyVG130xhsTthG/s X-Received: by 2002:a9d:48d:: with SMTP id 13mr10123996otm.249.1581542408120; Wed, 12 Feb 2020 13:20:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581542408; cv=none; d=google.com; s=arc-20160816; b=Ciy0LuxyRgcVCzoqI72BJlTthpu5LgjV+KUY6f/o4xd1ZPJtwHGW/k0N40TmoFqGYi aYrEtRFeZlgD77e/JwMoOPeVcPfulybPf+KjTpjR/NqXcOv3p2MNOljWp8QpyVye0jYV +yt20Tf16iqBybaICVxwsP055XEfF1urMnIM4zNvH7JRaCpGevY/95l+dNN2jruzLsn/ 1nJMljE+XV4bDvZ84gMTMjYTZLevdSHrB7Mbpl71ZRgXaeaWkAjMgzHUchFbr44y+f8y m+VEwjZ/TPOAhxy6xhpS70dUkuI507qWJWWLp1dycVAL7jnKjKG0RJUvNVz8OWt+eFsX OI0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=kMa21Giv+GY1ft1XzVP4imOruGEaQE8XM4+rjwpZrT8=; b=qlzFKK9TpSVwBD2ayszO9R2yEHdxUIo4OqI7Wgkf6SBTT3RS0+KIBps9dQ/lmpvmUH eYd0fnH+Fc+Ab7z2OotwCkWJ1fCTLPlnTCOlim4U6U7zihyZIxUzaddj8BLEmhFdQgF5 gi5+KExikOxpOeih+6lH/6eSqUi3+Sczl5xzujtCgZc8Sg8ds0lCOos/H+rARtMHlVha 1g6gs5R9KMWJKD6ejQ2mfOfpU/4eYwtSS6lX4gx7pMWJiu3bxdcctbD5QLsym4Jge06E y4w996Qa3elRA4CD3luwGTEsBb20RftzZ4PifCAjdMoP62JGGlZgZbQ7iYYgMAhdG9If hPog== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=i2yza1Uk; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p83si140952oih.198.2020.02.12.13.19.42; Wed, 12 Feb 2020 13:20:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=i2yza1Uk; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728674AbgBLVTK (ORCPT + 99 others); Wed, 12 Feb 2020 16:19:10 -0500 Received: from mail-ot1-f65.google.com ([209.85.210.65]:46369 "EHLO mail-ot1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727548AbgBLVTK (ORCPT ); Wed, 12 Feb 2020 16:19:10 -0500 Received: by mail-ot1-f65.google.com with SMTP id g64so3392440otb.13 for ; Wed, 12 Feb 2020 13:19:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kMa21Giv+GY1ft1XzVP4imOruGEaQE8XM4+rjwpZrT8=; b=i2yza1UkLnLyNz3CfT/vt+lbSC0kxE0pVhMXI0+fyGX1yiGZYu7SyWIruKVMjrLDDS Ujn1smJdNFQzLMRcY9CRZJK9Spzx78pDF35Z3IruK4DAtXLtD/BWyW+wqMAhfSX/ScrK 8Cp2qN+XyIghX4bhnu6bytX3+jCBBwaQA51K5SqOmsrjb4DNLp/TwjVOnHcvLvwStNj6 JFDf9Ii9OeIjE3Mdfn2nBWl8U6GlyrooPBAsDsHXOgArzJuruIq83WpjHcjxc+wTJmuL QEkjo+cbpUvvXtVehf0w1Z0V8qdGNIojITSDyIEiAfTUCfX8X9FNX0fxSyzc60bCmg3Y t3bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kMa21Giv+GY1ft1XzVP4imOruGEaQE8XM4+rjwpZrT8=; b=AmedbtUZSs/AMHdB9sV6x/w8jBwWgobObjSMzawdFC5EYTetvotdKNtatOdvCYCiLh QZ4XGfrVmDYiwMTsYB4z+qhT8RzPhTKA1Ap1zu1rtsF3TR4aMM8mbDsz5Oeqf7hoLglS QzNO7/5LMmq4T/JXJSmcsZyaomjdWMqP0m0InR6NU6jThtu5vS7JdqouVH16xGhv26Jr w3Xw+8OZOnEcGBrLbBCXy9DIsLbhit/CqD1E9CBliGAygJWZm+BogMXTkuymxWOMt8G9 kNoDJSyzjwCybMSiHgI18/QTk5JlW44e09hzt+Qfep+v6eCXMTl69uI3SA5y1oh0pgAB RcMw== X-Gm-Message-State: APjAAAUi6QMly98sHj751yR3aJHTGZsNEj8jqGxHuqkaDPBAQicQs/4R PLrwFAcZDWnv409Tjt2ApW7HmFgbjno4l/FAu0I= X-Received: by 2002:a9d:3cf:: with SMTP id f73mr10953570otf.11.1581542348751; Wed, 12 Feb 2020 13:19:08 -0800 (PST) MIME-Version: 1.0 References: <20200212212729.Bluez.v2.1.I333a90ad3c75882c6f008c94a28ca7d3e8f6c76e@changeid> In-Reply-To: <20200212212729.Bluez.v2.1.I333a90ad3c75882c6f008c94a28ca7d3e8f6c76e@changeid> From: Luiz Augusto von Dentz Date: Wed, 12 Feb 2020 13:18:56 -0800 Message-ID: Subject: Re: [Bluez PATCH v2] core: Add new policy for Just-Works repairing To: Howard Chung Cc: "linux-bluetooth@vger.kernel.org" , Luiz Augusto Von Dentz , chromeos-bluetooth-upstreaming@chromium.org Content-Type: text/plain; charset="UTF-8" Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi Howard, On Wed, Feb 12, 2020 at 5:30 AM Howard Chung wrote: > > From: "howardchung@google.com" > > When kernel find out that the incoming Just-Works pairing is > initiated by a paired device, it is user space's responsibility to > decide the next action. > > This patch includes the following: > - add JustWorksRepairing policy as an option in main.conf > - handle the confirmation request from kernel > > --- > The Just-Works repairing policy could be one of the following: > - never: default; reject the repairing immediately. > - confirm: prompt a confirmation dialog to user. > - always: always accept the repairing. > > Changes in v2: > - let RequestAuthorization handle the situation > - remove the changes in client/ > > src/agent.c | 16 ++++++++++++++++ > src/hcid.h | 8 ++++++++ > src/main.c | 27 +++++++++++++++++++++++++++ > src/main.conf | 5 +++++ > 4 files changed, 56 insertions(+) > > diff --git a/src/agent.c b/src/agent.c > index e0ffcd22f..e013ec85f 100644 > --- a/src/agent.c > +++ b/src/agent.c > @@ -773,12 +773,28 @@ int agent_request_authorization(struct agent *agent, struct btd_device *device, > GDestroyNotify destroy) > { > struct agent_request *req; > + DBusError dbus_err; > int err; > > err = agent_has_request(agent, device, AGENT_REQUEST_AUTHORIZATION); > if (err) > return err; > > + /* Just-Works repairing policy */ > + if (device_is_paired(device, BDADDR_BREDR) || > + device_is_paired(device, BDADDR_LE_PUBLIC)) { > + if (main_opts.jw_repairing == JW_REPAIRING_NEVER) { > + dbus_error_init(&dbus_err); > + dbus_set_error_const(&dbus_err, > + ERROR_INTERFACE ".Rejected", NULL); > + cb(agent, &dbus_err, user_data); > + return 0; Can't we just return an error here instead of creating a D-Bus error just to call the callback? > + } else if (main_opts.jw_repairing == JW_REPAIRING_ALWAYS) { > + cb(agent, NULL, user_data); > + return 0; > + } > + } > + > DBG("Calling Agent.RequestAuthorization: name=%s, path=%s", > agent->owner, agent->path); > > diff --git a/src/hcid.h b/src/hcid.h > index adea85ce2..bcd2b9fa1 100644 > --- a/src/hcid.h > +++ b/src/hcid.h > @@ -35,6 +35,12 @@ typedef enum { > BT_GATT_CACHE_NO, > } bt_gatt_cache_t; > > +enum { > + JW_REPAIRING_NEVER, > + JW_REPAIRING_CONFIRM, > + JW_REPAIRING_ALWAYS, > +} jw_repairing_t; > + > struct main_opts { > char *name; > uint32_t class; > @@ -58,6 +64,8 @@ struct main_opts { > uint16_t gatt_mtu; > > uint8_t key_size; > + > + jw_repairing_t jw_repairing; > }; > > extern struct main_opts main_opts; > diff --git a/src/main.c b/src/main.c > index 1a6ab36a3..d67f469f1 100644 > --- a/src/main.c > +++ b/src/main.c > @@ -93,6 +93,7 @@ static const char *supported_options[] = { > "MultiProfile", > "FastConnectable", > "Privacy", > + "JustWorksRepairing", > NULL > }; > > @@ -193,6 +194,20 @@ static bt_gatt_cache_t parse_gatt_cache(const char *cache) > } > } > > +static jw_repairing_t parse_jw_repairing(const char *jw_repairing) > +{ > + if (!strcmp(jw_repairing, "never")) { > + return JW_REPAIRING_NEVER; > + } else if (!strcmp(jw_repairing, "confirm")) { > + return JW_REPAIRING_CONFIRM; > + } else if (!strcmp(jw_repairing, "always")) { > + return JW_REPAIRING_ALWAYS; > + } else { > + return JW_REPAIRING_NEVER; > + } > +} > + > + > static void check_options(GKeyFile *config, const char *group, > const char **options) > { > @@ -331,6 +346,18 @@ static void parse_config(GKeyFile *config) > g_free(str); > } > > + str = g_key_file_get_string(config, "General", > + "JustWorksRepairing", &err); > + if (err) { > + DBG("%s", err->message); > + g_clear_error(&err); > + main_opts.jw_repairing = JW_REPAIRING_NEVER; > + } else { > + DBG("just_works_repairing=%s", str); > + main_opts.jw_repairing = parse_jw_repairing(str); > + g_free(str); > + } > + > str = g_key_file_get_string(config, "General", "Name", &err); > if (err) { > DBG("%s", err->message); > diff --git a/src/main.conf b/src/main.conf > index 40687a755..bb5ff5b15 100644 > --- a/src/main.conf > +++ b/src/main.conf > @@ -72,6 +72,11 @@ > # Defaults to "off" > # Privacy = off > > +# Specify the policy to the JUST-WORKS repairing initiated by peer > +# Possible values: "never", "confirm", "always" > +# Defaults to "never" > +#JustWorksRepairing = never > + > [GATT] > # GATT attribute cache. > # Possible values: > -- > 2.25.0.225.g125e21ebc7-goog > -- Luiz Augusto von Dentz