manager.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866
  1. // SPDX-License-Identifier: LGPL-2.1-or-later
  2. /*
  3. *
  4. * BlueZ - Bluetooth protocol stack for Linux
  5. *
  6. * Copyright (C) 2019 Intel Corporation. All rights reserved.
  7. *
  8. *
  9. */
  10. #ifdef HAVE_CONFIG_H
  11. #include <config.h>
  12. #endif
  13. #define _GNU_SOURCE
  14. #include <ell/ell.h>
  15. #include "mesh/mesh-defs.h"
  16. #include "mesh/dbus.h"
  17. #include "mesh/error.h"
  18. #include "mesh/mesh.h"
  19. #include "mesh/mesh-io.h"
  20. #include "mesh/node.h"
  21. #include "mesh/net.h"
  22. #include "mesh/keyring.h"
  23. #include "mesh/agent.h"
  24. #include "mesh/provision.h"
  25. #include "mesh/manager.h"
  26. struct add_data{
  27. struct l_dbus_message *msg;
  28. struct mesh_agent *agent;
  29. struct mesh_node *node;
  30. uint32_t disc_watch;
  31. uint16_t primary;
  32. uint16_t net_idx;
  33. uint8_t num_ele;
  34. uint8_t uuid[16];
  35. };
  36. static int8_t scan_rssi;
  37. static uint8_t scan_uuid[16];
  38. static struct mesh_node *scan_node;
  39. static struct l_timeout *scan_timeout;
  40. static struct add_data *add_pending;
  41. static const uint8_t prvb[2] = {MESH_AD_TYPE_BEACON, 0x00};
  42. static void scan_cancel(struct l_timeout *timeout, void *user_data)
  43. {
  44. struct mesh_node *node = user_data;
  45. struct mesh_io *io;
  46. struct mesh_net *net;
  47. l_debug("");
  48. if (scan_timeout)
  49. l_timeout_remove(scan_timeout);
  50. net = node_get_net(node);
  51. io = mesh_net_get_io(net);
  52. mesh_io_deregister_recv_cb(io, prvb, sizeof(prvb));
  53. scan_node = NULL;
  54. scan_timeout = NULL;
  55. }
  56. static void free_pending_add_call()
  57. {
  58. if (!add_pending)
  59. return;
  60. if (add_pending->disc_watch)
  61. l_dbus_remove_watch(dbus_get_bus(),
  62. add_pending->disc_watch);
  63. if (add_pending->msg)
  64. l_dbus_message_unref(add_pending->msg);
  65. l_free(add_pending);
  66. add_pending = NULL;
  67. }
  68. static void prov_disc_cb(struct l_dbus *bus, void *user_data)
  69. {
  70. if (!add_pending)
  71. return;
  72. initiator_cancel(add_pending);
  73. add_pending->disc_watch = 0;
  74. free_pending_add_call();
  75. }
  76. static void send_add_failed(const char *owner, const char *path,
  77. uint8_t status)
  78. {
  79. struct l_dbus *dbus = dbus_get_bus();
  80. struct l_dbus_message_builder *builder;
  81. struct l_dbus_message *msg;
  82. msg = l_dbus_message_new_method_call(dbus, owner, path,
  83. MESH_PROVISIONER_INTERFACE,
  84. "AddNodeFailed");
  85. builder = l_dbus_message_builder_new(msg);
  86. dbus_append_byte_array(builder, add_pending->uuid, 16);
  87. l_dbus_message_builder_append_basic(builder, 's',
  88. mesh_prov_status_str(status));
  89. l_dbus_message_builder_finalize(builder);
  90. l_dbus_message_builder_destroy(builder);
  91. l_dbus_send(dbus, msg);
  92. free_pending_add_call();
  93. }
  94. static bool add_cmplt(void *user_data, uint8_t status,
  95. struct mesh_prov_node_info *info)
  96. {
  97. struct add_data *pending = user_data;
  98. struct mesh_node *node = pending->node;
  99. struct l_dbus *dbus = dbus_get_bus();
  100. struct l_dbus_message_builder *builder;
  101. struct l_dbus_message *msg;
  102. bool result;
  103. if (pending != add_pending)
  104. return false;
  105. if (status != PROV_ERR_SUCCESS) {
  106. send_add_failed(node_get_owner(node), node_get_app_path(node),
  107. status);
  108. return false;
  109. }
  110. result = keyring_put_remote_dev_key(add_pending->node, info->unicast,
  111. info->num_ele, info->device_key);
  112. if (!result) {
  113. send_add_failed(node_get_owner(node), node_get_app_path(node),
  114. PROV_ERR_CANT_ASSIGN_ADDR);
  115. return false;
  116. }
  117. msg = l_dbus_message_new_method_call(dbus, node_get_owner(node),
  118. node_get_app_path(node),
  119. MESH_PROVISIONER_INTERFACE,
  120. "AddNodeComplete");
  121. builder = l_dbus_message_builder_new(msg);
  122. dbus_append_byte_array(builder, add_pending->uuid, 16);
  123. l_dbus_message_builder_append_basic(builder, 'q', &info->unicast);
  124. l_dbus_message_builder_append_basic(builder, 'y', &info->num_ele);
  125. l_dbus_message_builder_finalize(builder);
  126. l_dbus_message_builder_destroy(builder);
  127. l_dbus_send(dbus, msg);
  128. free_pending_add_call();
  129. return true;
  130. }
  131. static void mgr_prov_data (struct l_dbus_message *reply, void *user_data)
  132. {
  133. struct add_data *pending = user_data;
  134. uint16_t net_idx;
  135. uint16_t primary;
  136. if (pending != add_pending)
  137. return;
  138. if (l_dbus_message_is_error(reply))
  139. return;
  140. if (!l_dbus_message_get_arguments(reply, "qq", &net_idx, &primary))
  141. return;
  142. add_pending->primary = primary;
  143. add_pending->net_idx = net_idx;
  144. initiator_prov_data(net_idx, primary, add_pending);
  145. }
  146. static bool add_data_get(void *user_data, uint8_t num_ele)
  147. {
  148. struct add_data *pending = user_data;
  149. struct l_dbus_message *msg;
  150. struct l_dbus *dbus;
  151. const char *app_path;
  152. const char *sender;
  153. if (pending != add_pending)
  154. return false;
  155. dbus = dbus_get_bus();
  156. app_path = node_get_app_path(add_pending->node);
  157. sender = node_get_owner(add_pending->node);
  158. msg = l_dbus_message_new_method_call(dbus, sender, app_path,
  159. MESH_PROVISIONER_INTERFACE,
  160. "RequestProvData");
  161. l_dbus_message_set_arguments(msg, "y", num_ele);
  162. l_dbus_send_with_reply(dbus, msg, mgr_prov_data, add_pending, NULL);
  163. add_pending->num_ele = num_ele;
  164. return true;
  165. }
  166. static void add_start(void *user_data, int err)
  167. {
  168. struct l_dbus_message *reply;
  169. l_debug("Start callback");
  170. if (err == MESH_ERROR_NONE)
  171. reply = l_dbus_message_new_method_return(add_pending->msg);
  172. else
  173. reply = dbus_error(add_pending->msg, MESH_ERROR_FAILED,
  174. "Failed to start provisioning initiator");
  175. l_dbus_send(dbus_get_bus(), reply);
  176. l_dbus_message_unref(add_pending->msg);
  177. add_pending->msg = NULL;
  178. }
  179. static struct l_dbus_message *add_node_call(struct l_dbus *dbus,
  180. struct l_dbus_message *msg,
  181. void *user_data)
  182. {
  183. struct mesh_node *node = user_data;
  184. struct l_dbus_message_iter iter_uuid, options;
  185. struct l_dbus_message *reply;
  186. uint8_t *uuid;
  187. uint32_t n = 22;
  188. l_debug("AddNode request");
  189. if (!l_dbus_message_get_arguments(msg, "aya{sv}", &iter_uuid, &options))
  190. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  191. if (!l_dbus_message_iter_get_fixed_array(&iter_uuid, &uuid, &n)
  192. || n != 16)
  193. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  194. "Bad device UUID");
  195. /* Allow AddNode to cancel Scanning if from the same node */
  196. if (scan_node) {
  197. if (scan_node != node)
  198. return dbus_error(msg, MESH_ERROR_BUSY, NULL);
  199. scan_cancel(NULL, node);
  200. }
  201. /* Invoke Prov Initiator */
  202. add_pending = l_new(struct add_data, 1);
  203. memcpy(add_pending->uuid, uuid, 16);
  204. add_pending->node = node;
  205. add_pending->agent = node_get_agent(node);
  206. if (!node_is_provisioner(node) || (add_pending->agent == NULL)) {
  207. l_debug("Provisioner: %d", node_is_provisioner(node));
  208. l_debug("Agent: %p", add_pending->agent);
  209. reply = dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED,
  210. "Missing Interfaces");
  211. goto fail;
  212. }
  213. add_pending->msg = l_dbus_message_ref(msg);
  214. initiator_start(PB_ADV, uuid, 99, 60, add_pending->agent, add_start,
  215. add_data_get, add_cmplt, node, add_pending);
  216. add_pending->disc_watch = l_dbus_add_disconnect_watch(dbus,
  217. node_get_owner(node),
  218. prov_disc_cb, NULL, NULL);
  219. return NULL;
  220. fail:
  221. l_free(add_pending);
  222. add_pending = NULL;
  223. return reply;
  224. }
  225. static struct l_dbus_message *import_node_call(struct l_dbus *dbus,
  226. struct l_dbus_message *msg,
  227. void *user_data)
  228. {
  229. struct mesh_node *node = user_data;
  230. struct l_dbus_message_iter iter_key;
  231. uint16_t primary;
  232. uint8_t num_ele;
  233. uint8_t *key;
  234. uint32_t n;
  235. const char *sender = l_dbus_message_get_sender(msg);
  236. if (strcmp(sender, node_get_owner(node)))
  237. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  238. if (!l_dbus_message_get_arguments(msg, "qyay", &primary, &num_ele,
  239. &iter_key))
  240. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  241. if (!l_dbus_message_iter_get_fixed_array(&iter_key, &key, &n)
  242. || n != 16)
  243. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  244. "Bad device key");
  245. if (!keyring_put_remote_dev_key(node, primary, num_ele, key))
  246. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  247. return l_dbus_message_new_method_return(msg);
  248. }
  249. static struct l_dbus_message *delete_node_call(struct l_dbus *dbus,
  250. struct l_dbus_message *msg,
  251. void *user_data)
  252. {
  253. struct mesh_node *node = user_data;
  254. struct mesh_net *net = node_get_net(node);
  255. uint16_t primary;
  256. uint8_t num_ele;
  257. const char *sender = l_dbus_message_get_sender(msg);
  258. if (strcmp(sender, node_get_owner(node)))
  259. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  260. if (!l_dbus_message_get_arguments(msg, "qy", &primary, &num_ele))
  261. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  262. if (mesh_net_is_local_address(net, primary, num_ele))
  263. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  264. "Cannot remove local device key");
  265. keyring_del_remote_dev_key(node, primary, num_ele);
  266. return l_dbus_message_new_method_return(msg);
  267. }
  268. static void prov_beacon_recv(void *user_data, struct mesh_io_recv_info *info,
  269. const uint8_t *data, uint16_t len)
  270. {
  271. struct mesh_node *node = user_data;
  272. struct l_dbus_message_builder *builder;
  273. struct l_dbus_message *msg;
  274. struct l_dbus *dbus;
  275. int16_t rssi;
  276. if (scan_node != node || len < sizeof(scan_uuid) + 2 || data[1] != 0x00)
  277. return;
  278. if (!memcmp(data + 2, scan_uuid, sizeof(scan_uuid))) {
  279. if (info->rssi <= scan_rssi)
  280. return;
  281. }
  282. memcpy(scan_uuid, data + 2, sizeof(scan_uuid));
  283. scan_rssi = info->rssi;
  284. rssi = info->rssi;
  285. dbus = dbus_get_bus();
  286. msg = l_dbus_message_new_method_call(dbus, node_get_owner(node),
  287. node_get_app_path(node),
  288. MESH_PROVISIONER_INTERFACE,
  289. "ScanResult");
  290. builder = l_dbus_message_builder_new(msg);
  291. l_dbus_message_builder_append_basic(builder, 'n', &rssi);
  292. dbus_append_byte_array(builder, data + 2, len -2);
  293. l_dbus_message_builder_enter_array(builder, "{sv}");
  294. /* TODO: populate with options when defined */
  295. l_dbus_message_builder_leave_array(builder);
  296. l_dbus_message_builder_finalize(builder);
  297. l_dbus_message_builder_destroy(builder);
  298. l_dbus_send(dbus, msg);
  299. }
  300. static struct l_dbus_message *start_scan_call(struct l_dbus *dbus,
  301. struct l_dbus_message *msg,
  302. void *user_data)
  303. {
  304. struct mesh_node *node = user_data;
  305. uint16_t duration = 0;
  306. struct mesh_io *io;
  307. struct mesh_net *net;
  308. const char *key;
  309. struct l_dbus_message_iter options, var;
  310. const char *sender = l_dbus_message_get_sender(msg);
  311. if (strcmp(sender, node_get_owner(node)))
  312. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  313. if (!l_dbus_message_get_arguments(msg, "a{sv}", &options))
  314. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  315. while (l_dbus_message_iter_next_entry(&options, &key, &var)) {
  316. bool failed = true;
  317. if (!strcmp(key, "Seconds")) {
  318. if (l_dbus_message_iter_get_variant(&var, "q",
  319. &duration)) {
  320. failed = false;
  321. }
  322. }
  323. if (failed)
  324. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  325. "Invalid options");
  326. }
  327. if (scan_node && scan_node != node)
  328. return dbus_error(msg, MESH_ERROR_BUSY, NULL);
  329. if (!node_is_provisioner(node))
  330. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  331. if (scan_timeout)
  332. l_timeout_remove(scan_timeout);
  333. memset(scan_uuid, 0, sizeof(scan_uuid));
  334. scan_rssi = -128;
  335. scan_timeout = NULL;
  336. net = node_get_net(node);
  337. io = mesh_net_get_io(net);
  338. scan_node = node;
  339. mesh_io_register_recv_cb(io, prvb, sizeof(prvb),
  340. prov_beacon_recv, node);
  341. if (duration)
  342. scan_timeout = l_timeout_create(duration, scan_cancel,
  343. node, NULL);
  344. return l_dbus_message_new_method_return(msg);
  345. }
  346. static struct l_dbus_message *cancel_scan_call(struct l_dbus *dbus,
  347. struct l_dbus_message *msg,
  348. void *user_data)
  349. {
  350. struct mesh_node *node = user_data;
  351. const char *sender = l_dbus_message_get_sender(msg);
  352. if (strcmp(sender, node_get_owner(node)) || !node_is_provisioner(node))
  353. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  354. if (scan_node) {
  355. if (scan_node != node)
  356. return dbus_error(msg, MESH_ERROR_BUSY, NULL);
  357. scan_cancel(NULL, node);
  358. }
  359. return l_dbus_message_new_method_return(msg);
  360. }
  361. static struct l_dbus_message *store_new_subnet(struct mesh_node *node,
  362. struct l_dbus_message *msg,
  363. uint16_t net_idx, uint8_t *new_key)
  364. {
  365. struct keyring_net_key key;
  366. if (net_idx > MAX_KEY_IDX)
  367. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  368. if (keyring_get_net_key(node, net_idx, &key)) {
  369. /* Allow redundant calls only if key values match */
  370. if (!memcmp(key.old_key, new_key, 16))
  371. return l_dbus_message_new_method_return(msg);
  372. return dbus_error(msg, MESH_ERROR_ALREADY_EXISTS, NULL);
  373. }
  374. memcpy(key.old_key, new_key, 16);
  375. memcpy(key.new_key, new_key, 16);
  376. key.net_idx = net_idx;
  377. key.phase = KEY_REFRESH_PHASE_NONE;
  378. if (!keyring_put_net_key(node, net_idx, &key))
  379. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  380. return l_dbus_message_new_method_return(msg);
  381. }
  382. static struct l_dbus_message *create_subnet_call(struct l_dbus *dbus,
  383. struct l_dbus_message *msg,
  384. void *user_data)
  385. {
  386. struct mesh_node *node = user_data;
  387. uint8_t key[16];
  388. uint16_t net_idx;
  389. const char *sender = l_dbus_message_get_sender(msg);
  390. if (strcmp(sender, node_get_owner(node)))
  391. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  392. if (!l_dbus_message_get_arguments(msg, "q", &net_idx) ||
  393. net_idx == PRIMARY_NET_IDX)
  394. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  395. /* Generate key and store */
  396. l_getrandom(key, sizeof(key));
  397. return store_new_subnet(node, msg, net_idx, key);
  398. }
  399. static struct l_dbus_message *update_subnet_call(struct l_dbus *dbus,
  400. struct l_dbus_message *msg,
  401. void *user_data)
  402. {
  403. struct mesh_node *node = user_data;
  404. struct keyring_net_key key;
  405. uint16_t net_idx;
  406. const char *sender = l_dbus_message_get_sender(msg);
  407. if (strcmp(sender, node_get_owner(node)))
  408. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  409. if (!l_dbus_message_get_arguments(msg, "q", &net_idx) ||
  410. net_idx > MAX_KEY_IDX)
  411. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  412. if (!keyring_get_net_key(node, net_idx, &key))
  413. return dbus_error(msg, MESH_ERROR_DOES_NOT_EXIST, NULL);
  414. switch (key.phase) {
  415. case KEY_REFRESH_PHASE_NONE:
  416. /* Generate Key and update phase */
  417. l_getrandom(key.new_key, sizeof(key.new_key));
  418. key.phase = KEY_REFRESH_PHASE_ONE;
  419. if (!keyring_put_net_key(node, net_idx, &key))
  420. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  421. /* Fall Through */
  422. case KEY_REFRESH_PHASE_ONE:
  423. /* Allow redundant calls to start Key Refresh */
  424. return l_dbus_message_new_method_return(msg);
  425. default:
  426. break;
  427. }
  428. /* All other phases mean KR already in progress over-the-air */
  429. return dbus_error(msg, MESH_ERROR_IN_PROGRESS,
  430. "Key Refresh in progress");
  431. }
  432. static struct l_dbus_message *delete_subnet_call(struct l_dbus *dbus,
  433. struct l_dbus_message *msg,
  434. void *user_data)
  435. {
  436. struct mesh_node *node = user_data;
  437. uint16_t net_idx;
  438. const char *sender = l_dbus_message_get_sender(msg);
  439. if (strcmp(sender, node_get_owner(node)))
  440. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  441. if (!l_dbus_message_get_arguments(msg, "q", &net_idx) ||
  442. net_idx > MAX_KEY_IDX)
  443. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  444. keyring_del_net_key(node, net_idx);
  445. return l_dbus_message_new_method_return(msg);
  446. }
  447. static struct l_dbus_message *import_subnet_call(struct l_dbus *dbus,
  448. struct l_dbus_message *msg,
  449. void *user_data)
  450. {
  451. struct mesh_node *node = user_data;
  452. struct l_dbus_message_iter iter_key;
  453. uint16_t net_idx;
  454. uint8_t *key;
  455. uint32_t n;
  456. const char *sender = l_dbus_message_get_sender(msg);
  457. if (strcmp(sender, node_get_owner(node)))
  458. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  459. if (!l_dbus_message_get_arguments(msg, "qay", &net_idx, &iter_key))
  460. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  461. if (!l_dbus_message_iter_get_fixed_array(&iter_key, &key, &n)
  462. || n != 16)
  463. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  464. "Bad network key");
  465. return store_new_subnet(node, msg, net_idx, key);
  466. }
  467. static struct l_dbus_message *store_new_appkey(struct mesh_node *node,
  468. struct l_dbus_message *msg,
  469. uint16_t net_idx, uint16_t app_idx,
  470. uint8_t *new_key)
  471. {
  472. struct keyring_net_key net_key;
  473. struct keyring_app_key app_key;
  474. if (net_idx > MAX_KEY_IDX || app_idx > MAX_KEY_IDX)
  475. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  476. if (!keyring_get_net_key(node, net_idx, &net_key))
  477. return dbus_error(msg, MESH_ERROR_DOES_NOT_EXIST,
  478. "Bound net key not found");
  479. if (keyring_get_app_key(node, app_idx, &app_key)) {
  480. /* Allow redundant calls with identical values */
  481. if (!memcmp(app_key.old_key, new_key, 16) &&
  482. app_key.net_idx == net_idx)
  483. return l_dbus_message_new_method_return(msg);
  484. return dbus_error(msg, MESH_ERROR_ALREADY_EXISTS, NULL);
  485. }
  486. memcpy(app_key.old_key, new_key, 16);
  487. memcpy(app_key.new_key, new_key, 16);
  488. app_key.net_idx = net_idx;
  489. app_key.app_idx = app_idx;
  490. if (!keyring_put_app_key(node, app_idx, net_idx, &app_key))
  491. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  492. return l_dbus_message_new_method_return(msg);
  493. }
  494. static struct l_dbus_message *create_appkey_call(struct l_dbus *dbus,
  495. struct l_dbus_message *msg,
  496. void *user_data)
  497. {
  498. struct mesh_node *node = user_data;
  499. uint16_t net_idx, app_idx;
  500. uint8_t key[16];
  501. const char *sender = l_dbus_message_get_sender(msg);
  502. if (strcmp(sender, node_get_owner(node)))
  503. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  504. if (!l_dbus_message_get_arguments(msg, "qq", &net_idx, &app_idx))
  505. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  506. l_getrandom(key, sizeof(key));
  507. return store_new_appkey(node, msg, net_idx, app_idx, key);
  508. }
  509. static struct l_dbus_message *update_appkey_call(struct l_dbus *dbus,
  510. struct l_dbus_message *msg,
  511. void *user_data)
  512. {
  513. struct mesh_node *node = user_data;
  514. struct keyring_net_key net_key;
  515. struct keyring_app_key app_key;
  516. uint16_t app_idx;
  517. const char *sender = l_dbus_message_get_sender(msg);
  518. if (strcmp(sender, node_get_owner(node)))
  519. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  520. if (!l_dbus_message_get_arguments(msg, "q", &app_idx) ||
  521. app_idx > MAX_KEY_IDX)
  522. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  523. if (!keyring_get_app_key(node, app_idx, &app_key) ||
  524. !keyring_get_net_key(node, app_key.net_idx, &net_key))
  525. return dbus_error(msg, MESH_ERROR_DOES_NOT_EXIST, NULL);
  526. if (net_key.phase != KEY_REFRESH_PHASE_ONE)
  527. return dbus_error(msg, MESH_ERROR_FAILED, "Invalid Phase");
  528. /* Generate Key if in acceptable phase */
  529. l_getrandom(app_key.new_key, sizeof(app_key.new_key));
  530. if (!keyring_put_app_key(node, app_idx, app_key.net_idx, &app_key))
  531. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  532. return l_dbus_message_new_method_return(msg);
  533. }
  534. static struct l_dbus_message *delete_appkey_call(struct l_dbus *dbus,
  535. struct l_dbus_message *msg,
  536. void *user_data)
  537. {
  538. struct mesh_node *node = user_data;
  539. uint16_t app_idx;
  540. const char *sender = l_dbus_message_get_sender(msg);
  541. if (strcmp(sender, node_get_owner(node)))
  542. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  543. if (!l_dbus_message_get_arguments(msg, "q", &app_idx))
  544. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  545. keyring_del_app_key(node, app_idx);
  546. return l_dbus_message_new_method_return(msg);
  547. }
  548. static struct l_dbus_message *import_appkey_call(struct l_dbus *dbus,
  549. struct l_dbus_message *msg,
  550. void *user_data)
  551. {
  552. struct mesh_node *node = user_data;
  553. struct l_dbus_message_iter iter_key;
  554. uint16_t net_idx, app_idx;
  555. uint8_t *key;
  556. uint32_t n;
  557. const char *sender = l_dbus_message_get_sender(msg);
  558. if (strcmp(sender, node_get_owner(node)))
  559. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  560. if (!l_dbus_message_get_arguments(msg, "qqay", &net_idx, &app_idx,
  561. &iter_key))
  562. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  563. if (!l_dbus_message_iter_get_fixed_array(&iter_key, &key, &n)
  564. || n != 16)
  565. return dbus_error(msg, MESH_ERROR_INVALID_ARGS,
  566. "Bad application key");
  567. return store_new_appkey(node, msg, net_idx, app_idx, key);
  568. }
  569. static struct l_dbus_message *set_key_phase_call(struct l_dbus *dbus,
  570. struct l_dbus_message *msg,
  571. void *user_data)
  572. {
  573. struct mesh_node *node = user_data;
  574. struct keyring_net_key key;
  575. uint16_t net_idx;
  576. uint8_t phase;
  577. const char *sender = l_dbus_message_get_sender(msg);
  578. if (strcmp(sender, node_get_owner(node)))
  579. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  580. if (!l_dbus_message_get_arguments(msg, "qy", &net_idx, &phase) ||
  581. phase == KEY_REFRESH_PHASE_ONE ||
  582. phase > KEY_REFRESH_PHASE_THREE)
  583. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  584. if (!keyring_get_net_key(node, net_idx, &key))
  585. return dbus_error(msg, MESH_ERROR_DOES_NOT_EXIST, NULL);
  586. /* Canceling Key Refresh only valid from Phase One */
  587. if (phase == KEY_REFRESH_PHASE_NONE &&
  588. key.phase >= KEY_REFRESH_PHASE_TWO)
  589. return dbus_error(msg, MESH_ERROR_INVALID_ARGS, NULL);
  590. if (phase == KEY_REFRESH_PHASE_THREE) {
  591. /* If we are already in Phase None, then nothing to do */
  592. if (key.phase == KEY_REFRESH_PHASE_NONE)
  593. return l_dbus_message_new_method_return(msg);
  594. memcpy(key.old_key, key.new_key, 16);
  595. key.phase = KEY_REFRESH_PHASE_THREE;
  596. if (!keyring_put_net_key(node, net_idx, &key))
  597. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  598. if (!keyring_finalize_app_keys(node, net_idx))
  599. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  600. key.phase = KEY_REFRESH_PHASE_NONE;
  601. } else
  602. key.phase = phase;
  603. if (!keyring_put_net_key(node, net_idx, &key))
  604. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  605. return l_dbus_message_new_method_return(msg);
  606. }
  607. static struct l_dbus_message *export_keys_call(struct l_dbus *dbus,
  608. struct l_dbus_message *msg,
  609. void *user_data)
  610. {
  611. const char *sender = l_dbus_message_get_sender(msg);
  612. struct l_dbus_message_builder *builder;
  613. struct l_dbus_message *reply;
  614. struct mesh_node *node = user_data;
  615. l_debug("Export Keys");
  616. if (strcmp(sender, node_get_owner(node)))
  617. return dbus_error(msg, MESH_ERROR_NOT_AUTHORIZED, NULL);
  618. reply = l_dbus_message_new_method_return(msg);
  619. builder = l_dbus_message_builder_new(reply);
  620. l_dbus_message_builder_enter_array(builder, "{sv}");
  621. if (!keyring_build_export_keys_reply(node, builder)) {
  622. l_dbus_message_builder_destroy(builder);
  623. l_dbus_message_unref(reply);
  624. return dbus_error(msg, MESH_ERROR_FAILED, NULL);
  625. }
  626. l_dbus_message_builder_leave_array(builder);
  627. l_dbus_message_builder_finalize(builder);
  628. l_dbus_message_builder_destroy(builder);
  629. return reply;
  630. }
  631. static void setup_management_interface(struct l_dbus_interface *iface)
  632. {
  633. l_dbus_interface_method(iface, "AddNode", 0, add_node_call, "",
  634. "aya{sv}", "uuid", "options");
  635. l_dbus_interface_method(iface, "ImportRemoteNode", 0, import_node_call,
  636. "", "qyay", "primary", "count", "dev_key");
  637. l_dbus_interface_method(iface, "DeleteRemoteNode", 0, delete_node_call,
  638. "", "qy", "primary", "count");
  639. l_dbus_interface_method(iface, "UnprovisionedScan", 0, start_scan_call,
  640. "", "a{sv}", "options");
  641. l_dbus_interface_method(iface, "UnprovisionedScanCancel", 0,
  642. cancel_scan_call, "", "");
  643. l_dbus_interface_method(iface, "CreateSubnet", 0, create_subnet_call,
  644. "", "q", "net_index");
  645. l_dbus_interface_method(iface, "UpdateSubnet", 0, update_subnet_call,
  646. "", "q", "net_index");
  647. l_dbus_interface_method(iface, "DeleteSubnet", 0, delete_subnet_call,
  648. "", "q", "net_index");
  649. l_dbus_interface_method(iface, "ImportSubnet", 0, import_subnet_call,
  650. "", "qay", "net_index", "net_key");
  651. l_dbus_interface_method(iface, "CreateAppKey", 0, create_appkey_call,
  652. "", "qq", "net_index", "app_index");
  653. l_dbus_interface_method(iface, "UpdateAppKey", 0, update_appkey_call,
  654. "", "q", "app_index");
  655. l_dbus_interface_method(iface, "DeleteAppKey", 0, delete_appkey_call,
  656. "", "q", "app_index");
  657. l_dbus_interface_method(iface, "ImportAppKey", 0, import_appkey_call,
  658. "", "qqay", "net_index",
  659. "app_index", "app_key");
  660. l_dbus_interface_method(iface, "SetKeyPhase", 0, set_key_phase_call, "",
  661. "qy", "net_index", "phase");
  662. l_dbus_interface_method(iface, "ExportKeys", 0, export_keys_call,
  663. "a(qaya{sv})a(qay)", "",
  664. "net_keys", "dev_keys");
  665. }
  666. bool manager_dbus_init(struct l_dbus *bus)
  667. {
  668. if (!l_dbus_register_interface(bus, MESH_MANAGEMENT_INTERFACE,
  669. setup_management_interface,
  670. NULL, false)) {
  671. l_info("Unable to register %s interface",
  672. MESH_MANAGEMENT_INTERFACE);
  673. return false;
  674. }
  675. return true;
  676. }
  677. void manager_scan_cancel(struct mesh_node *node)
  678. {
  679. if (scan_node != node)
  680. return;
  681. scan_cancel(NULL, node);
  682. }