@@ -87,6 +87,8 @@ struct bt_att {
struct sign_info *local_sign;
struct sign_info *remote_sign;
+
+ bool retry_on_sec_error;
};
struct sign_info {
@@ -786,6 +788,9 @@ static bool handle_error_rsp(struct bt_att_chan *chan, uint8_t *pdu,
*opcode = rsp->opcode;
+ if (!att->retry_on_sec_error)
+ return false;
+
/* If operation has already been marked as retry don't attempt to change
* the security again.
*/
@@ -1262,6 +1267,7 @@ struct bt_att *bt_att_new(int fd, bool ext_signed)
att = new0(struct bt_att, 1);
att->chans = queue_new();
att->mtu = chan->mtu;
+ att->retry_on_sec_error = true;
/* crypto is optional, if not available leave it NULL */
if (!ext_signed)
@@ -2042,3 +2048,11 @@ bool bt_att_has_crypto(struct bt_att *att)
return att->crypto ? true : false;
}
+
+void bt_att_set_retry_on_sec_error(struct bt_att *att, bool retry_on_sec_error)
+{
+ if (!att)
+ return;
+
+ att->retry_on_sec_error = retry_on_sec_error;
+}
@@ -110,3 +110,4 @@ bool bt_att_set_local_key(struct bt_att *att, uint8_t sign_key[16],
bool bt_att_set_remote_key(struct bt_att *att, uint8_t sign_key[16],
bt_att_counter_func_t func, void *user_data);
bool bt_att_has_crypto(struct bt_att *att);
+void bt_att_set_retry_on_sec_error(struct bt_att *att, bool retry_on_sec_error);
@@ -3818,3 +3818,12 @@ bool bt_gatt_client_idle_unregister(struct bt_gatt_client *client,
return false;
}
+
+void bt_gatt_client_set_retry_on_sec_error(struct bt_gatt_client *client,
+ bool retry_on_sec_error)
+{
+ if (!client)
+ return;
+
+ bt_att_set_retry_on_sec_error(client->att, retry_on_sec_error);
+}
@@ -134,3 +134,5 @@ unsigned int bt_gatt_client_idle_register(struct bt_gatt_client *client,
bt_gatt_client_destroy_func_t destroy);
bool bt_gatt_client_idle_unregister(struct bt_gatt_client *client,
unsigned int id);
+void bt_gatt_client_set_retry_on_sec_error(struct bt_gatt_client *client,
+ bool retry_on_sec_error);
@@ -1295,6 +1295,42 @@ static void cmd_set_sign_key(struct client *cli, char *cmd_str)
set_sign_key_usage();
}
+static void set_retry_on_sec_error_usage(void)
+{
+ printf("Usage: set-retry-on-sec-error <y/n>\n"
+ "e.g.:\n"
+ "\tset-retry-on-sec-error n\n");
+}
+
+static void cmd_set_retry_on_sec_error(struct client *cli, char *cmd_str)
+{
+ char *argv[2];
+ int argc = 0;
+
+ if (!bt_gatt_client_is_ready(cli->gatt)) {
+ printf("GATT client not initialized\n");
+ return;
+ }
+
+ if (!parse_args(cmd_str, 1, argv, &argc)) {
+ printf("Too many arguments\n");
+ set_retry_on_sec_error_usage();
+ return;
+ }
+
+ if (argc < 1) {
+ set_retry_on_sec_error_usage();
+ return;
+ }
+
+ if (argv[0][0] == 'y')
+ bt_gatt_client_set_retry_on_sec_error(cli->gatt, true);
+ else if (argv[0][0] == 'n')
+ bt_gatt_client_set_retry_on_sec_error(cli->gatt, false);
+ else
+ printf("Invalid argument: %s\n", argv[0]);
+}
+
static void cmd_help(struct client *cli, char *cmd_str);
typedef void (*command_func_t)(struct client *cli, char *cmd_str);
@@ -1329,6 +1365,8 @@ static struct {
"\tGet security level on le connection"},
{ "set-sign-key", cmd_set_sign_key,
"\tSet signing key for signed write command"},
+ { "set-retry-on-sec-error", cmd_set_retry_on_sec_error,
+ "\tSet retry on security error by elevating security"},
{ }
};