Hi Howard, > When kernel find out that the incoming Just-Works pairing is > initiated by a paired device, it is user space's responsibility to > decide the next action. > > This patch includes the following: > - add JustWorksRepairing policy as an option in main.conf > - handle the confirmation request from kernel > > --- > The Just-Works repairing policy could be one of the following: > - never: default; reject the repairing immediately. > - confirm: prompt a confirmation dialog to user. > - always: always accept the repairing. > > Note that the confirmation dialog is only available in command > line for now. > > client/agent.c | 22 +++++++++++++++++++ > src/adapter.c | 13 +++++++++++ > src/agent.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++ > src/agent.h | 4 ++++ > src/device.c | 14 +++++++++--- > src/hcid.h | 8 +++++++ > src/main.c | 27 +++++++++++++++++++++++ > src/main.conf | 5 +++++ > 8 files changed, 149 insertions(+), 3 deletions(-) you also need to document this in doc/agent-api.txt and we normally split patches into doc/, src/ and client/ changes. > > diff --git a/client/agent.c b/client/agent.c > index 4def1b478..544344c46 100644 > --- a/client/agent.c > +++ b/client/agent.c > @@ -239,6 +239,25 @@ static DBusMessage *request_authorization(DBusConnection *conn, > return NULL; > } > > +static DBusMessage *request_drop_old_key(DBusConnection *conn, > + DBusMessage *msg, void *user_data) > +{ > + const char *device; > + > + bt_shell_printf("Request drop old key\n"); > + > + dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &device, > + DBUS_TYPE_INVALID); > + > + bt_shell_prompt_input("agent", > + "Drop the old key and accept pairing (yes/no):", > + confirm_response, conn); > + > + pending_message = dbus_message_ref(msg); > + > + return NULL; > +} > + > static DBusMessage *authorize_service(DBusConnection *conn, > DBusMessage *msg, void *user_data) > { > @@ -292,6 +311,9 @@ static const GDBusMethodTable methods[] = { > { GDBUS_ASYNC_METHOD("RequestAuthorization", > GDBUS_ARGS({ "device", "o" }), > NULL, request_authorization) }, > + { GDBUS_ASYNC_METHOD("RequestDropOldKey", > + GDBUS_ARGS({ "device", "o" }), > + NULL, request_drop_old_key) }, > { GDBUS_ASYNC_METHOD("AuthorizeService", > GDBUS_ARGS({ "device", "o" }, { "uuid", "s" }), I am not fully convinced with the name yet. Can we start with a patch that just has the policy in main.conf for always and never. > NULL, authorize_service) }, > diff --git a/src/adapter.c b/src/adapter.c > index 329c3ae0b..cecd80ea1 100644 > --- a/src/adapter.c > +++ b/src/adapter.c > @@ -6909,6 +6909,19 @@ static void user_confirm_request_callback(uint16_t index, uint16_t length, > return; > } > > + /*Just-Works repairing policy*/ Please follow our coding style for comments. > + if (ev->confirm_hint == 2) { > + if (main_opts.jw_repairing == JW_REPAIRING_NEVER) { > + btd_adapter_confirm_reply(adapter, &ev->addr.bdaddr, > + ev->addr.type, FALSE); > + return; > + } else if (main_opts.jw_repairing == JW_REPAIRING_ALWAYS) { > + btd_adapter_confirm_reply(adapter, &ev->addr.bdaddr, > + ev->addr.type, TRUE); > + return; > + } > + } > + > err = device_confirm_passkey(device, ev->addr.type, btohl(ev->value), > ev->confirm_hint); > if (err < 0) { > diff --git a/src/agent.c b/src/agent.c > index e0ffcd22f..3a75e3b00 100644 > --- a/src/agent.c > +++ b/src/agent.c > @@ -60,6 +60,7 @@ typedef enum { > AGENT_REQUEST_PASSKEY, > AGENT_REQUEST_CONFIRMATION, > AGENT_REQUEST_AUTHORIZATION, > + AGENT_REQUEST_DROP_OLD_KEY, > AGENT_REQUEST_PINCODE, > AGENT_REQUEST_AUTHORIZE_SERVICE, > AGENT_REQUEST_DISPLAY_PINCODE, > @@ -239,6 +240,7 @@ void agent_unref(struct agent *agent) > break; > case AGENT_REQUEST_CONFIRMATION: > case AGENT_REQUEST_AUTHORIZATION: > + case AGENT_REQUEST_DROP_OLD_KEY: > case AGENT_REQUEST_AUTHORIZE_SERVICE: > case AGENT_REQUEST_DISPLAY_PINCODE: > default: > @@ -798,6 +800,63 @@ failed: > return err; > } > > +static int drop_old_key_request_new(struct agent_request *req, > + const char *device_path) > +{ > + struct agent *agent = req->agent; > + > + req->msg = dbus_message_new_method_call(agent->owner, agent->path, > + AGENT_INTERFACE, "RequestDropOldKey"); > + if (req->msg == NULL) { > + error("Couldn't allocate D-Bus message"); > + return -ENOMEM; > + } > + > + dbus_message_append_args(req->msg, > + DBUS_TYPE_OBJECT_PATH, &device_path, > + DBUS_TYPE_INVALID); > + > + if (g_dbus_send_message_with_reply(btd_get_dbus_connection(), req->msg, > + &req->call, REQUEST_TIMEOUT) == FALSE) { > + error("D-Bus send failed"); > + return -EIO; > + } > + > + dbus_pending_call_set_notify(req->call, simple_agent_reply, req, NULL); > + > + return 0; > +} > + > +int agent_request_drop_old_key(struct agent *agent, struct btd_device *device, > + agent_cb cb, void *user_data, > + GDestroyNotify destroy) > +{ > + struct agent_request *req; > + const char *dev_path = device_get_path(device); > + int err; > + > + if (agent->request) > + return -EBUSY; > + > + DBG("Calling Agent.DropOldKey: name=%s, path=%s", > + agent->owner, agent->path); > + > + req = agent_request_new(agent, device, AGENT_REQUEST_DROP_OLD_KEY, cb, > + user_data, destroy); > + > + err = drop_old_key_request_new(req, dev_path); > + if (err < 0) > + goto failed; > + > + agent->request = req; > + > + return 0; > + > +failed: > + agent_request_free(req, FALSE); > + return err; > +} > + You need to build in a graceful fallback for agents that are not capable of handling the new agent callbacks. > int agent_display_passkey(struct agent *agent, struct btd_device *device, > uint32_t passkey, uint16_t entered) > { > diff --git a/src/agent.h b/src/agent.h > index 1438b9e6d..ccc651dba 100644 > --- a/src/agent.h > +++ b/src/agent.h > @@ -65,6 +65,10 @@ int agent_request_authorization(struct agent *agent, struct btd_device *device, > agent_cb cb, void *user_data, > GDestroyNotify destroy); > > +int agent_request_drop_old_key(struct agent *agent, struct btd_device *device, > + agent_cb cb, void *user_data, > + GDestroyNotify destroy); > + > int agent_display_passkey(struct agent *agent, struct btd_device *device, > uint32_t passkey, uint16_t entered); > > diff --git a/src/device.c b/src/device.c > index a4fe10980..e460e034f 100644 > --- a/src/device.c > +++ b/src/device.c > @@ -6147,12 +6147,20 @@ int device_confirm_passkey(struct btd_device *device, uint8_t type, > > auth->passkey = passkey; > > - if (confirm_hint) > + switch (confirm_hint) { > + case 0: > + err = agent_request_confirmation(auth->agent, device, passkey, > + confirm_cb, auth, NULL); > + break; > + case 1: > err = agent_request_authorization(auth->agent, device, > confirm_cb, auth, NULL); > - else > - err = agent_request_confirmation(auth->agent, device, passkey, > + break; > + case 2: > + err = agent_request_drop_old_key(auth->agent, device, > confirm_cb, auth, NULL); > + break; > + } > > if (err < 0) { > if (err == -EINPROGRESS) { > diff --git a/src/hcid.h b/src/hcid.h > index adea85ce2..bcd2b9fa1 100644 > --- a/src/hcid.h > +++ b/src/hcid.h > @@ -35,6 +35,12 @@ typedef enum { > BT_GATT_CACHE_NO, > } bt_gatt_cache_t; > > +enum { > + JW_REPAIRING_NEVER, > + JW_REPAIRING_CONFIRM, > + JW_REPAIRING_ALWAYS, > +} jw_repairing_t; > + > struct main_opts { > char *name; > uint32_t class; > @@ -58,6 +64,8 @@ struct main_opts { > uint16_t gatt_mtu; > > uint8_t key_size; > + > + jw_repairing_t jw_repairing; > }; > > extern struct main_opts main_opts; > diff --git a/src/main.c b/src/main.c > index 1a6ab36a3..d67f469f1 100644 > --- a/src/main.c > +++ b/src/main.c > @@ -93,6 +93,7 @@ static const char *supported_options[] = { > "MultiProfile", > "FastConnectable", > "Privacy", > + "JustWorksRepairing", > NULL > }; > > @@ -193,6 +194,20 @@ static bt_gatt_cache_t parse_gatt_cache(const char *cache) > } > } > > +static jw_repairing_t parse_jw_repairing(const char *jw_repairing) > +{ > + if (!strcmp(jw_repairing, "never")) { > + return JW_REPAIRING_NEVER; > + } else if (!strcmp(jw_repairing, "confirm")) { > + return JW_REPAIRING_CONFIRM; > + } else if (!strcmp(jw_repairing, "always")) { > + return JW_REPAIRING_ALWAYS; > + } else { > + return JW_REPAIRING_NEVER; > + } > +} > + > + > static void check_options(GKeyFile *config, const char *group, > const char **options) > { > @@ -331,6 +346,18 @@ static void parse_config(GKeyFile *config) > g_free(str); > } > > + str = g_key_file_get_string(config, "General", > + "JustWorksRepairing", &err); > + if (err) { > + DBG("%s", err->message); > + g_clear_error(&err); > + main_opts.jw_repairing = JW_REPAIRING_NEVER; > + } else { > + DBG("just_works_repairing=%s", str); > + main_opts.jw_repairing = parse_jw_repairing(str); > + g_free(str); > + } > + > str = g_key_file_get_string(config, "General", "Name", &err); > if (err) { > DBG("%s", err->message); > diff --git a/src/main.conf b/src/main.conf > index 40687a755..bb5ff5b15 100644 > --- a/src/main.conf > +++ b/src/main.conf > @@ -72,6 +72,11 @@ > # Defaults to "off" > # Privacy = off > > +# Specify the policy to the JUST-WORKS repairing initiated by peer > +# Possible values: "never", "confirm", "always" > +# Defaults to "never" > +#JustWorksRepairing = never > + > [GATT] > # GATT attribute cache. > # Possible values: The word “repairing” always makes me question if that is the best name. I leave this open for comments from others. Regards Marcel