Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp619199ybb; Fri, 3 Apr 2020 08:49:06 -0700 (PDT) X-Google-Smtp-Source: APiQypKuGetjUiMjtu+3RekeBL8MD5Q9atPYkEVuYFTSk1Xq18mqOWhPtjE5B7hQ+R4H4mSVCYOU X-Received: by 2002:a05:6830:19ee:: with SMTP id t14mr7296106ott.287.1585928945843; Fri, 03 Apr 2020 08:49:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585928945; cv=none; d=google.com; s=arc-20160816; b=a3oqgvzNSTL774qoW6llYsG/9/ogE0bgHjWI04PAiqeL83sU8SYjdlrswKf2q93pZK mCVyigAlojd+Nh7mFzFLGvgWpriOJ2JuVPxXSpfUAymU9Tjwu3KnxD57Miwx9+PScnaW ncujT8pGNRhSAXaJIN1TInoMR2HUWZWDrSz1fKuaA04XNkRlVrPBYU2wbYm6jCQ939t7 3DSlZaWeCS+jO5+5LNn7TKnbHjK2c49EFgLOzHWl7kXWaaJ6vRXtAQ46j42QlafwxlTy APxjARhTzRWJCkw8jUJjsY1EsPOb2QRfQT5gzLTUTHm3BfzNVrRB1kHWzUn1XCbqStA3 Jsmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=o9OIp6dbRHBVsH9fZHGiOK95mjakmTUESbJGhHNFhds=; b=BtgX7CXClV3wyG8S/BP+D+XmSCYumAz7zD3ACWAIxkdqfSMdUpSSHbWLI3zLN1MWBT DX3+++t2ZzRly2CiKCZDnj7f82MpnY0qhYdumFYAKw1UdQeQihHIY2GO71CIOy4ZO8HK fG6l1c4uW7ivyYsgngbtA/Ng3RqohqfDvtB3V+5mDRS4MfKu4Z8goF8twGfiAgm9E1MM zbfES6kPO3gya9W8/i2XE0l3d8bL5msWf2TOppKR3qEKQdefNx/RpwflC4bWKteFxB37 TrjQDRTQk7TAQLPWJ26Vs6kvb+hNMGa0HRmLw90FcqIR26QbCAB6T4oudFi2VsXPa2VS CQ/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=wMLRbEZb; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x13si3802773oto.105.2020.04.03.08.48.46; Fri, 03 Apr 2020 08:49:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=wMLRbEZb; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728099AbgDCPo0 (ORCPT + 99 others); Fri, 3 Apr 2020 11:44:26 -0400 Received: from mail-lf1-f65.google.com ([209.85.167.65]:43876 "EHLO mail-lf1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727998AbgDCPoZ (ORCPT ); Fri, 3 Apr 2020 11:44:25 -0400 Received: by mail-lf1-f65.google.com with SMTP id n20so6138475lfl.10 for ; Fri, 03 Apr 2020 08:44:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=o9OIp6dbRHBVsH9fZHGiOK95mjakmTUESbJGhHNFhds=; b=wMLRbEZbgJ+TNy3NeKgNDHwFO5inFqTCh3Mry6NYyDhZO++cizzKZ63shOw1frrJUr 8RO5uphh24C2RKoYAF+5mfHIdJAmdkwqy9hgIT813L6/4Z0k9kzuVUwaA+GUhZebIGWD 8HAlusXkpHVTiHzFt16i7RvOg1FFxOaK36gxBPF8CFq/8VH3Jjrxzhpa/V9s1tcIjYwS C4JnFQ46Rssv6RTQ9AiPNMe6eF6Cr5hTbUAJV6Yy8C2+p1Tjlhq4EmT6gnf4PrgmK674 t/qmk1LXGs5DQ+r4auh8VwDmidflWCUb/q23kE1nNHSnnaVxBx9QtgOLwJ0AIedzuElA pMIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=o9OIp6dbRHBVsH9fZHGiOK95mjakmTUESbJGhHNFhds=; b=OszkDUs9TLZKT+uSZ183JlzWP+hfIJDTNXNLoOjIN7Yka66qGPT/IsMiZAYx329Ynu NKuplqyrXulHkiRhzQaXSbJ/4AOwLtqJOJYQLAnzaxmGPnxmbpriVKTFmYBxF1BpVPyL SxnsHWD7D9cZ29rwubBI41DgnRyW4JzkK5TElk+ji/dplcN10gIuiF0AQkh2TlwAl8xW zWlD9+hxKW89uchOj4e9lft4M55lkdCnlPZ3eZtrUyMgRS6TWqDg2FEJAgj2G4OmwPKv ZYLRgRbz1XcfS2DwBrMBPuMrYRq7Eb+ZB8SH1+kYzqADKmWw8U3Zl37VnYSWHENxbAgx qQ7g== X-Gm-Message-State: AGi0PubC12PAoHK9y+jZO1K4jybwCxKYnQn5FAF/0c3GdWpXcXqfCIlX iB9xPAXmp+4WEYmU3pi+tVWuznlcFzCwJ3VOSp8liDOz X-Received: by 2002:ac2:539a:: with SMTP id g26mr1554161lfh.129.1585928662339; Fri, 03 Apr 2020 08:44:22 -0700 (PDT) MIME-Version: 1.0 References: <20200402132956.642267-1-marcel@holtmann.org> In-Reply-To: <20200402132956.642267-1-marcel@holtmann.org> From: Alain Michaud Date: Fri, 3 Apr 2020 11:44:11 -0400 Message-ID: Subject: Re: [PATCH 1/2] Bluetooth: Add support for reading security information To: Marcel Holtmann Cc: BlueZ Content-Type: text/plain; charset="UTF-8" Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org HI Marcel, On Thu, Apr 2, 2020 at 9:30 AM Marcel Holtmann wrote: > > To allow userspace to make correcty security policy decision, the kernel > needs to export a few details of the supported security features and > encryption key size information. This command exports this information > and also allows future extensions if needed. > > Signed-off-by: Marcel Holtmann > --- > include/net/bluetooth/mgmt.h | 7 +++++ > net/bluetooth/mgmt.c | 53 ++++++++++++++++++++++++++++++++++++ > 2 files changed, 60 insertions(+) > > diff --git a/include/net/bluetooth/mgmt.h b/include/net/bluetooth/mgmt.h > index f41cd87550dc..65dd6fd1fff3 100644 > --- a/include/net/bluetooth/mgmt.h > +++ b/include/net/bluetooth/mgmt.h > @@ -674,6 +674,13 @@ struct mgmt_cp_set_blocked_keys { > > #define MGMT_OP_SET_WIDEBAND_SPEECH 0x0047 > > +#define MGMT_OP_READ_SECURITY_INFO 0x0048 > +#define MGMT_READ_SECURITY_INFO_SIZE 0 > +struct mgmt_rp_read_security_info { > + __le16 sec_len; > + __u8 sec[0]; > +} __packed; > + > #define MGMT_EV_CMD_COMPLETE 0x0001 > struct mgmt_ev_cmd_complete { > __le16 opcode; > diff --git a/net/bluetooth/mgmt.c b/net/bluetooth/mgmt.c > index 6552003a170e..7b9eac339c87 100644 > --- a/net/bluetooth/mgmt.c > +++ b/net/bluetooth/mgmt.c > @@ -108,6 +108,7 @@ static const u16 mgmt_commands[] = { > MGMT_OP_SET_APPEARANCE, > MGMT_OP_SET_BLOCKED_KEYS, > MGMT_OP_SET_WIDEBAND_SPEECH, > + MGMT_OP_READ_SECURITY_INFO, > }; > > static const u16 mgmt_events[] = { > @@ -155,6 +156,7 @@ static const u16 mgmt_untrusted_commands[] = { > MGMT_OP_READ_CONFIG_INFO, > MGMT_OP_READ_EXT_INDEX_LIST, > MGMT_OP_READ_EXT_INFO, > + MGMT_OP_READ_SECURITY_INFO, > }; > > static const u16 mgmt_untrusted_events[] = { > @@ -3659,6 +3661,55 @@ static int set_wideband_speech(struct sock *sk, struct hci_dev *hdev, > return err; > } > > +static int read_security_info(struct sock *sk, struct hci_dev *hdev, > + void *data, u16 data_len) > +{ > + char buf[16]; > + struct mgmt_rp_read_security_info *rp = (void *)buf; > + u16 sec_len = 0; > + u8 flags = 0; > + > + bt_dev_dbg(hdev, "sock %p", sk); > + > + memset(&buf, 0, sizeof(buf)); > + > + hci_dev_lock(hdev); > + > + /* When the Read Simple Pairing Options command is supported, then > + * the remote public key validation is supported. > + */ > + if (hdev->commands[41] & 0x08) > + flags |= 0x01; /* Remote public key validation (BR/EDR) */ > + > + flags |= 0x02; /* Remote public key validation (LE) */ > + > + /* When the Read Encryption Key Size command is supported, then the > + * encryption key size is enforced. > + */ > + if (hdev->commands[20] & 0x10) > + flags |= 0x04; /* Encryption key size enforcement (BR/EDR) */ > + > + flags |= 0x08; /* Encryption key size enforcement (LE) */ > + > + sec_len = eir_append_data(rp->sec, sec_len, 0x01, &flags, 1); > + > + /* When the Read Simple Pairing Options command is supported, then > + * also max encryption key size information is provided. > + */ > + if (hdev->commands[41] & 0x08) > + sec_len = eir_append_le16(rp->sec, sec_len, 0x02, > + hdev->max_enc_key_size); > + > + sec_len = eir_append_le16(rp->sec, sec_len, 0x03, SMP_MAX_ENC_KEY_SIZE); > + > + rp->sec_len = cpu_to_le16(sec_len); > + > + hci_dev_unlock(hdev); > + > + return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_SECURITY_INFO, 0, > + rp, sizeof(*rp) + sec_len); > +} > + > static void read_local_oob_data_complete(struct hci_dev *hdev, u8 status, > u16 opcode, struct sk_buff *skb) > { > @@ -7099,6 +7150,8 @@ static const struct hci_mgmt_handler mgmt_handlers[] = { > { set_blocked_keys, MGMT_OP_SET_BLOCKED_KEYS_SIZE, > HCI_MGMT_VAR_LEN }, > { set_wideband_speech, MGMT_SETTING_SIZE }, > + { read_security_info, MGMT_READ_SECURITY_INFO_SIZE, > + HCI_MGMT_UNTRUSTED }, > }; > > void mgmt_index_added(struct hci_dev *hdev) > -- > 2.25.1 > LGTM.