#include <bluetooth/sdp.h>
#include "att.h"
+#include "btio.h"
#include "gattrib.h"
struct _GAttrib {
return evt->id - id;
}
+gboolean g_attrib_is_encrypted(GAttrib *attrib)
+{
+ BtIOSecLevel sec_level;
+
+ if (!bt_io_get(attrib->io, BT_IO_L2CAP, NULL,
+ BT_IO_OPT_SEC_LEVEL, &sec_level,
+ BT_IO_OPT_INVALID))
+ return FALSE;
+
+ return sec_level > BT_IO_SEC_LOW;
+}
+
gboolean g_attrib_unregister(GAttrib *attrib, guint id)
{
struct event *evt;
GAttribNotifyFunc func, gpointer user_data,
GDestroyNotify notify);
+gboolean g_attrib_is_encrypted(GAttrib *attrib);
+
gboolean g_attrib_unregister(GAttrib *attrib, guint id);
gboolean g_attrib_unregister_all(GAttrib *attrib);
/* FIXME: currently, it is assumed an encrypted link is enough for
* authentication. This will allow to enable the SMP negotiation once
* it is on upstream kernel. */
+ if (!channel->encrypted)
+ channel->encrypted = g_attrib_is_encrypted(channel->attrib);
if (reqs == ATT_AUTHENTICATION && !channel->encrypted)
return ATT_ECODE_INSUFF_ENC;
{
struct gatt_channel *channel;
GError *gerr = NULL;
- int sec_level;
if (err) {
error("%s", err->message);
bt_io_get(io, BT_IO_L2CAP, &gerr,
BT_IO_OPT_SOURCE_BDADDR, &channel->src,
BT_IO_OPT_DEST_BDADDR, &channel->dst,
- BT_IO_OPT_SEC_LEVEL, &sec_level,
BT_IO_OPT_INVALID);
if (gerr) {
error("bt_io_get: %s", gerr->message);
channel->attrib = g_attrib_new(io);
channel->mtu = ATT_DEFAULT_MTU;
- /* FIXME: the security level needs to checked on every request. */
- channel->encrypted = sec_level > BT_IO_SEC_LOW;
-
channel->id = g_attrib_register(channel->attrib, GATTRIB_ALL_EVENTS,
channel_handler, channel, NULL);