Bluteooth: Reject SMP bonding if HCI_PAIRABLE is not set
authorJohan Hedberg <johan.hedberg@intel.com>
Thu, 10 Jul 2014 08:02:07 +0000 (11:02 +0300)
committerMarcel Holtmann <marcel@holtmann.org>
Thu, 10 Jul 2014 08:23:39 +0000 (10:23 +0200)
If the remote device tries to initiate bonding with us and we don't have
HCI_PAIRABLE set we should just flat out reject the request. This brings
SMP in line with how the flag is used for BR/EDR SSP.

Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
net/bluetooth/smp.c

index 627d683203cf7b3158d5976c03750b818dd40462..bf3568c46847f1a54b5f38e3ae29d2daeb87870f 100644 (file)
@@ -676,6 +676,7 @@ int smp_user_confirm_reply(struct hci_conn *hcon, u16 mgmt_op, __le32 passkey)
 static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
 {
        struct smp_cmd_pairing rsp, *req = (void *) skb->data;
+       struct hci_dev *hdev = conn->hcon->hdev;
        struct smp_chan *smp;
        u8 key_size, auth, sec_level;
        int ret;
@@ -696,6 +697,10 @@ static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
        if (!smp)
                return SMP_UNSPECIFIED;
 
+       if (!test_bit(HCI_PAIRABLE, &hdev->dev_flags) &&
+           (req->auth_req & SMP_AUTH_BONDING))
+               return SMP_PAIRING_NOTSUPP;
+
        smp->preq[0] = SMP_CMD_PAIRING_REQ;
        memcpy(&smp->preq[1], req, sizeof(*req));
        skb_pull(skb, sizeof(*req));
@@ -911,6 +916,10 @@ static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
        if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
                return 0;
 
+       if (!test_bit(HCI_PAIRABLE, &hcon->hdev->dev_flags) &&
+           (rp->auth_req & SMP_AUTH_BONDING))
+               return SMP_PAIRING_NOTSUPP;
+
        smp = smp_chan_create(conn);
        if (!smp)
                return SMP_UNSPECIFIED;