2011-06-10 01:50:40 +04:00
/*
BlueZ - Bluetooth protocol stack for Linux
Copyright ( C ) 2011 Nokia Corporation and / or its subsidiary ( - ies ) .
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License version 2 as
published by the Free Software Foundation ;
THE SOFTWARE IS PROVIDED " AS IS " , WITHOUT WARRANTY OF ANY KIND , EXPRESS
OR IMPLIED , INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY ,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS .
IN NO EVENT SHALL THE COPYRIGHT HOLDER ( S ) AND AUTHOR ( S ) BE LIABLE FOR ANY
CLAIM , OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES , OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE , DATA OR PROFITS , WHETHER IN AN
ACTION OF CONTRACT , NEGLIGENCE OR OTHER TORTIOUS ACTION , ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE .
ALL LIABILITY , INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS ,
COPYRIGHTS , TRADEMARKS OR OTHER RIGHTS , RELATING TO USE OF THIS
SOFTWARE IS DISCLAIMED .
*/
2012-05-23 11:04:22 +04:00
# include <linux/crypto.h>
# include <linux/scatterlist.h>
# include <crypto/b128ops.h>
2011-06-10 01:50:40 +04:00
# include <net/bluetooth/bluetooth.h>
# include <net/bluetooth/hci_core.h>
# include <net/bluetooth/l2cap.h>
2011-12-22 04:12:12 +04:00
# include <net/bluetooth/mgmt.h>
2013-10-11 01:54:16 +04:00
# include "smp.h"
2011-06-10 01:50:44 +04:00
2014-09-05 23:19:55 +04:00
# define SMP_ALLOW_CMD(smp, code) set_bit(code, &smp->allow_cmd)
2012-03-02 02:32:37 +04:00
# define SMP_TIMEOUT msecs_to_jiffies(30000)
2011-06-14 20:37:41 +04:00
2012-10-11 18:26:06 +04:00
# define AUTH_REQ_MASK 0x07
2014-09-05 23:19:53 +04:00
# define KEY_DIST_MASK 0x07
2012-10-11 18:26:06 +04:00
2014-06-16 20:25:18 +04:00
enum {
SMP_FLAG_TK_VALID ,
SMP_FLAG_CFM_PENDING ,
SMP_FLAG_MITM_AUTH ,
SMP_FLAG_COMPLETE ,
SMP_FLAG_INITIATOR ,
} ;
2014-05-20 10:45:47 +04:00
struct smp_chan {
2014-08-11 23:06:40 +04:00
struct l2cap_conn * conn ;
struct delayed_work security_timer ;
2014-09-05 23:19:55 +04:00
unsigned long allow_cmd ; /* Bitmask of allowed commands */
2014-08-11 23:06:40 +04:00
2014-05-20 10:45:47 +04:00
u8 preq [ 7 ] ; /* SMP Pairing Request */
u8 prsp [ 7 ] ; /* SMP Pairing Response */
u8 prnd [ 16 ] ; /* SMP Pairing Random (local) */
u8 rrnd [ 16 ] ; /* SMP Pairing Random (remote) */
u8 pcnf [ 16 ] ; /* SMP Pairing Confirm */
u8 tk [ 16 ] ; /* SMP Temporary Key */
u8 enc_key_size ;
u8 remote_key_dist ;
bdaddr_t id_addr ;
u8 id_addr_type ;
u8 irk [ 16 ] ;
struct smp_csrk * csrk ;
struct smp_csrk * slave_csrk ;
struct smp_ltk * ltk ;
struct smp_ltk * slave_ltk ;
struct smp_irk * remote_irk ;
2014-05-20 10:45:50 +04:00
unsigned long flags ;
2014-06-27 15:23:03 +04:00
struct crypto_blkcipher * tfm_aes ;
2014-05-20 10:45:47 +04:00
} ;
2014-06-16 20:25:19 +04:00
static inline void swap_buf ( const u8 * src , u8 * dst , size_t len )
2011-06-10 01:50:44 +04:00
{
2014-06-16 20:25:19 +04:00
size_t i ;
2011-06-10 01:50:44 +04:00
2014-06-16 20:25:19 +04:00
for ( i = 0 ; i < len ; i + + )
dst [ len - 1 - i ] = src [ i ] ;
2011-06-10 01:50:44 +04:00
}
static int smp_e ( struct crypto_blkcipher * tfm , const u8 * k , u8 * r )
{
struct blkcipher_desc desc ;
struct scatterlist sg ;
2014-03-18 14:58:24 +04:00
uint8_t tmp [ 16 ] , data [ 16 ] ;
2013-12-02 12:49:04 +04:00
int err ;
2011-06-10 01:50:44 +04:00
if ( tfm = = NULL ) {
BT_ERR ( " tfm %p " , tfm ) ;
return - EINVAL ;
}
desc . tfm = tfm ;
desc . flags = 0 ;
2014-03-18 14:58:24 +04:00
/* The most significant octet of key corresponds to k[0] */
2014-06-16 20:25:19 +04:00
swap_buf ( k , tmp , 16 ) ;
2014-03-18 14:58:24 +04:00
err = crypto_blkcipher_setkey ( tfm , tmp , 16 ) ;
2011-06-10 01:50:44 +04:00
if ( err ) {
BT_ERR ( " cipher setkey failed: %d " , err ) ;
return err ;
}
2014-03-18 14:58:24 +04:00
/* Most significant octet of plaintextData corresponds to data[0] */
2014-06-16 20:25:19 +04:00
swap_buf ( r , data , 16 ) ;
2014-03-18 14:58:24 +04:00
sg_init_one ( & sg , data , 16 ) ;
2011-06-10 01:50:44 +04:00
err = crypto_blkcipher_encrypt ( & desc , & sg , & sg , 16 ) ;
if ( err )
BT_ERR ( " Encrypt data error %d " , err ) ;
2014-03-18 14:58:24 +04:00
/* Most significant octet of encryptedData corresponds to data[0] */
2014-06-16 20:25:19 +04:00
swap_buf ( data , r , 16 ) ;
2014-03-18 14:58:24 +04:00
2011-06-10 01:50:44 +04:00
return err ;
}
2014-02-18 12:19:31 +04:00
static int smp_ah ( struct crypto_blkcipher * tfm , u8 irk [ 16 ] , u8 r [ 3 ] , u8 res [ 3 ] )
{
2014-03-18 14:58:24 +04:00
u8 _res [ 16 ] ;
2014-02-18 12:19:31 +04:00
int err ;
/* r' = padding || r */
2014-03-18 14:58:24 +04:00
memcpy ( _res , r , 3 ) ;
memset ( _res + 3 , 0 , 13 ) ;
2014-02-18 12:19:31 +04:00
2014-03-18 14:58:24 +04:00
err = smp_e ( tfm , irk , _res ) ;
2014-02-18 12:19:31 +04:00
if ( err ) {
BT_ERR ( " Encrypt error " ) ;
return err ;
}
/* The output of the random address function ah is:
* ah ( h , r ) = e ( k , r ' ) mod 2 ^ 24
* The output of the security function e is then truncated to 24 bits
* by taking the least significant 24 bits of the output of e as the
* result of ah .
*/
2014-03-18 14:58:24 +04:00
memcpy ( res , _res , 3 ) ;
2014-02-18 12:19:31 +04:00
return 0 ;
}
2014-08-08 10:37:17 +04:00
bool smp_irk_matches ( struct hci_dev * hdev , u8 irk [ 16 ] , bdaddr_t * bdaddr )
2014-02-18 12:19:31 +04:00
{
2014-08-08 10:37:17 +04:00
struct l2cap_chan * chan = hdev - > smp_data ;
struct crypto_blkcipher * tfm ;
2014-02-18 12:19:31 +04:00
u8 hash [ 3 ] ;
int err ;
2014-08-08 10:37:17 +04:00
if ( ! chan | | ! chan - > data )
return false ;
tfm = chan - > data ;
2014-02-18 12:19:31 +04:00
BT_DBG ( " RPA %pMR IRK %*phN " , bdaddr , 16 , irk ) ;
err = smp_ah ( tfm , irk , & bdaddr - > b [ 3 ] , hash ) ;
if ( err )
return false ;
return ! memcmp ( bdaddr - > b , hash , 3 ) ;
}
2014-08-08 10:37:17 +04:00
int smp_generate_rpa ( struct hci_dev * hdev , u8 irk [ 16 ] , bdaddr_t * rpa )
2014-02-23 21:42:19 +04:00
{
2014-08-08 10:37:17 +04:00
struct l2cap_chan * chan = hdev - > smp_data ;
struct crypto_blkcipher * tfm ;
2014-02-23 21:42:19 +04:00
int err ;
2014-08-08 10:37:17 +04:00
if ( ! chan | | ! chan - > data )
return - EOPNOTSUPP ;
tfm = chan - > data ;
2014-02-23 21:42:19 +04:00
get_random_bytes ( & rpa - > b [ 3 ] , 3 ) ;
rpa - > b [ 5 ] & = 0x3f ; /* Clear two most significant bits */
rpa - > b [ 5 ] | = 0x40 ; /* Set second most significant bit */
err = smp_ah ( tfm , irk , & rpa - > b [ 3 ] , rpa - > b ) ;
if ( err < 0 )
return err ;
BT_DBG ( " RPA %pMR " , rpa ) ;
return 0 ;
}
2014-10-25 23:15:37 +04:00
static int smp_c1 ( struct crypto_blkcipher * tfm_aes , u8 k [ 16 ] , u8 r [ 16 ] ,
u8 preq [ 7 ] , u8 pres [ 7 ] , u8 _iat , bdaddr_t * ia , u8 _rat ,
bdaddr_t * ra , u8 res [ 16 ] )
2011-06-10 01:50:44 +04:00
{
u8 p1 [ 16 ] , p2 [ 16 ] ;
int err ;
memset ( p1 , 0 , 16 ) ;
/* p1 = pres || preq || _rat || _iat */
2014-03-18 14:58:24 +04:00
p1 [ 0 ] = _iat ;
p1 [ 1 ] = _rat ;
memcpy ( p1 + 2 , preq , 7 ) ;
memcpy ( p1 + 9 , pres , 7 ) ;
2011-06-10 01:50:44 +04:00
/* p2 = padding || ia || ra */
2014-03-18 14:58:24 +04:00
memcpy ( p2 , ra , 6 ) ;
memcpy ( p2 + 6 , ia , 6 ) ;
memset ( p2 + 12 , 0 , 4 ) ;
2011-06-10 01:50:44 +04:00
/* res = r XOR p1 */
u128_xor ( ( u128 * ) res , ( u128 * ) r , ( u128 * ) p1 ) ;
/* res = e(k, res) */
2014-10-25 23:15:37 +04:00
err = smp_e ( tfm_aes , k , res ) ;
2011-06-10 01:50:44 +04:00
if ( err ) {
BT_ERR ( " Encrypt data error " ) ;
return err ;
}
/* res = res XOR p2 */
u128_xor ( ( u128 * ) res , ( u128 * ) res , ( u128 * ) p2 ) ;
/* res = e(k, res) */
2014-10-25 23:15:37 +04:00
err = smp_e ( tfm_aes , k , res ) ;
2011-06-10 01:50:44 +04:00
if ( err )
BT_ERR ( " Encrypt data error " ) ;
return err ;
}
2014-10-25 23:15:37 +04:00
static int smp_s1 ( struct crypto_blkcipher * tfm_aes , u8 k [ 16 ] , u8 r1 [ 16 ] ,
u8 r2 [ 16 ] , u8 _r [ 16 ] )
2011-06-10 01:50:44 +04:00
{
int err ;
/* Just least significant octets from r1 and r2 are considered */
2014-03-18 14:58:24 +04:00
memcpy ( _r , r2 , 8 ) ;
memcpy ( _r + 8 , r1 , 8 ) ;
2011-06-10 01:50:44 +04:00
2014-10-25 23:15:37 +04:00
err = smp_e ( tfm_aes , k , _r ) ;
2011-06-10 01:50:44 +04:00
if ( err )
BT_ERR ( " Encrypt data error " ) ;
return err ;
}
2014-08-08 10:37:18 +04:00
static void smp_send_cmd ( struct l2cap_conn * conn , u8 code , u16 len , void * data )
2011-06-10 01:50:40 +04:00
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
2014-08-11 23:06:40 +04:00
struct smp_chan * smp ;
2014-08-08 10:37:18 +04:00
struct kvec iv [ 2 ] ;
struct msghdr msg ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
if ( ! chan )
return ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
BT_DBG ( " code 0x%2.2x " , code ) ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
iv [ 0 ] . iov_base = & code ;
iv [ 0 ] . iov_len = 1 ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
iv [ 1 ] . iov_base = data ;
iv [ 1 ] . iov_len = len ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
memset ( & msg , 0 , sizeof ( msg ) ) ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
msg . msg_iov = ( struct iovec * ) & iv ;
msg . msg_iovlen = 2 ;
2011-06-10 01:50:40 +04:00
2014-08-08 10:37:18 +04:00
l2cap_chan_send ( chan , & msg , 1 + len ) ;
2011-08-20 04:06:50 +04:00
2014-08-11 23:06:40 +04:00
if ( ! chan - > data )
return ;
smp = chan - > data ;
cancel_delayed_work_sync ( & smp - > security_timer ) ;
2014-09-05 23:19:48 +04:00
schedule_delayed_work ( & smp - > security_timer , SMP_TIMEOUT ) ;
2011-06-10 01:50:40 +04:00
}
2011-12-22 04:12:12 +04:00
static __u8 authreq_to_seclevel ( __u8 authreq )
{
if ( authreq & SMP_AUTH_MITM )
return BT_SECURITY_HIGH ;
else
return BT_SECURITY_MEDIUM ;
}
static __u8 seclevel_to_authreq ( __u8 sec_level )
{
switch ( sec_level ) {
case BT_SECURITY_HIGH :
return SMP_AUTH_MITM | SMP_AUTH_BONDING ;
case BT_SECURITY_MEDIUM :
return SMP_AUTH_BONDING ;
default :
return SMP_AUTH_NONE ;
}
}
2011-06-10 01:50:52 +04:00
static void build_pairing_cmd ( struct l2cap_conn * conn ,
2013-10-13 16:43:25 +04:00
struct smp_cmd_pairing * req ,
struct smp_cmd_pairing * rsp , __u8 authreq )
2011-06-10 01:50:52 +04:00
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2014-02-18 12:19:36 +04:00
struct hci_conn * hcon = conn - > hcon ;
struct hci_dev * hdev = hcon - > hdev ;
u8 local_dist = 0 , remote_dist = 0 ;
2011-07-08 01:59:38 +04:00
2014-07-30 10:22:22 +04:00
if ( test_bit ( HCI_BONDABLE , & conn - > hcon - > hdev - > dev_flags ) ) {
2014-03-09 23:19:17 +04:00
local_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN ;
remote_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN ;
2011-07-08 01:59:38 +04:00
authreq | = SMP_AUTH_BONDING ;
2011-12-22 04:12:12 +04:00
} else {
authreq & = ~ SMP_AUTH_BONDING ;
2011-07-08 01:59:38 +04:00
}
2014-02-18 12:19:36 +04:00
if ( test_bit ( HCI_RPA_RESOLVING , & hdev - > dev_flags ) )
remote_dist | = SMP_DIST_ID_KEY ;
2014-02-22 21:06:32 +04:00
if ( test_bit ( HCI_PRIVACY , & hdev - > dev_flags ) )
local_dist | = SMP_DIST_ID_KEY ;
2011-07-08 01:59:38 +04:00
if ( rsp = = NULL ) {
req - > io_capability = conn - > hcon - > io_capability ;
req - > oob_flag = SMP_OOB_NOT_PRESENT ;
req - > max_key_size = SMP_MAX_ENC_KEY_SIZE ;
2014-02-18 12:19:36 +04:00
req - > init_key_dist = local_dist ;
req - > resp_key_dist = remote_dist ;
2012-10-11 18:26:06 +04:00
req - > auth_req = ( authreq & AUTH_REQ_MASK ) ;
2014-02-18 12:19:36 +04:00
smp - > remote_key_dist = remote_dist ;
2011-07-08 01:59:38 +04:00
return ;
}
rsp - > io_capability = conn - > hcon - > io_capability ;
rsp - > oob_flag = SMP_OOB_NOT_PRESENT ;
rsp - > max_key_size = SMP_MAX_ENC_KEY_SIZE ;
2014-02-18 12:19:36 +04:00
rsp - > init_key_dist = req - > init_key_dist & remote_dist ;
rsp - > resp_key_dist = req - > resp_key_dist & local_dist ;
2012-10-11 18:26:06 +04:00
rsp - > auth_req = ( authreq & AUTH_REQ_MASK ) ;
2014-02-18 12:19:36 +04:00
smp - > remote_key_dist = rsp - > init_key_dist ;
2011-06-10 01:50:52 +04:00
}
2011-06-14 20:37:42 +04:00
static u8 check_enc_key_size ( struct l2cap_conn * conn , __u8 max_key_size )
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2011-09-05 21:31:30 +04:00
2011-06-14 20:37:42 +04:00
if ( ( max_key_size > SMP_MAX_ENC_KEY_SIZE ) | |
2013-10-13 16:43:25 +04:00
( max_key_size < SMP_MIN_ENC_KEY_SIZE ) )
2011-06-14 20:37:42 +04:00
return SMP_ENC_KEY_SIZE ;
2012-01-31 02:29:12 +04:00
smp - > enc_key_size = max_key_size ;
2011-06-14 20:37:42 +04:00
return 0 ;
}
2014-08-11 23:06:44 +04:00
static void smp_chan_destroy ( struct l2cap_conn * conn )
{
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
bool complete ;
BUG_ON ( ! smp ) ;
cancel_delayed_work_sync ( & smp - > security_timer ) ;
complete = test_bit ( SMP_FLAG_COMPLETE , & smp - > flags ) ;
mgmt_smp_complete ( conn - > hcon , complete ) ;
kfree ( smp - > csrk ) ;
kfree ( smp - > slave_csrk ) ;
crypto_free_blkcipher ( smp - > tfm_aes ) ;
/* If pairing failed clean up any keys we might have */
if ( ! complete ) {
if ( smp - > ltk ) {
list_del ( & smp - > ltk - > list ) ;
kfree ( smp - > ltk ) ;
}
if ( smp - > slave_ltk ) {
list_del ( & smp - > slave_ltk - > list ) ;
kfree ( smp - > slave_ltk ) ;
}
if ( smp - > remote_irk ) {
list_del ( & smp - > remote_irk - > list ) ;
kfree ( smp - > remote_irk ) ;
}
}
chan - > data = NULL ;
kfree ( smp ) ;
hci_conn_drop ( conn - > hcon ) ;
}
2013-11-06 13:24:57 +04:00
static void smp_failure ( struct l2cap_conn * conn , u8 reason )
2011-11-23 20:28:36 +04:00
{
2012-02-09 18:07:29 +04:00
struct hci_conn * hcon = conn - > hcon ;
2014-08-11 23:06:40 +04:00
struct l2cap_chan * chan = conn - > smp ;
2012-02-09 18:07:29 +04:00
2013-11-06 13:24:57 +04:00
if ( reason )
2011-11-23 20:28:36 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_FAIL , sizeof ( reason ) ,
2013-10-13 16:43:25 +04:00
& reason ) ;
2011-11-23 20:28:36 +04:00
2013-10-13 13:23:39 +04:00
clear_bit ( HCI_CONN_ENCRYPT_PEND , & hcon - > flags ) ;
2014-09-09 04:09:49 +04:00
mgmt_auth_failed ( hcon , HCI_ERROR_AUTH_FAILURE ) ;
2012-02-02 01:27:56 +04:00
2014-09-05 23:19:52 +04:00
if ( chan - > data )
2012-02-02 01:27:56 +04:00
smp_chan_destroy ( conn ) ;
2011-11-23 20:28:36 +04:00
}
2011-12-22 04:12:12 +04:00
# define JUST_WORKS 0x00
# define JUST_CFM 0x01
# define REQ_PASSKEY 0x02
# define CFM_PASSKEY 0x03
# define REQ_OOB 0x04
# define OVERLAP 0xFF
static const u8 gen_method [ 5 ] [ 5 ] = {
{ JUST_WORKS , JUST_CFM , REQ_PASSKEY , JUST_WORKS , REQ_PASSKEY } ,
{ JUST_WORKS , JUST_CFM , REQ_PASSKEY , JUST_WORKS , REQ_PASSKEY } ,
{ CFM_PASSKEY , CFM_PASSKEY , REQ_PASSKEY , JUST_WORKS , CFM_PASSKEY } ,
{ JUST_WORKS , JUST_CFM , JUST_WORKS , JUST_WORKS , JUST_CFM } ,
{ CFM_PASSKEY , CFM_PASSKEY , REQ_PASSKEY , JUST_WORKS , OVERLAP } ,
} ;
2014-06-17 14:07:38 +04:00
static u8 get_auth_method ( struct smp_chan * smp , u8 local_io , u8 remote_io )
{
2014-07-09 20:18:09 +04:00
/* If either side has unknown io_caps, use JUST_CFM (which gets
* converted later to JUST_WORKS if we ' re initiators .
*/
2014-06-17 14:07:38 +04:00
if ( local_io > SMP_IO_KEYBOARD_DISPLAY | |
remote_io > SMP_IO_KEYBOARD_DISPLAY )
2014-07-09 20:18:09 +04:00
return JUST_CFM ;
2014-06-17 14:07:38 +04:00
return gen_method [ remote_io ] [ local_io ] ;
}
2011-12-22 04:12:12 +04:00
static int tk_request ( struct l2cap_conn * conn , u8 remote_oob , u8 auth ,
u8 local_io , u8 remote_io )
{
struct hci_conn * hcon = conn - > hcon ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2011-12-22 04:12:12 +04:00
u8 method ;
u32 passkey = 0 ;
int ret = 0 ;
/* Initialize key for JUST WORKS */
memset ( smp - > tk , 0 , sizeof ( smp - > tk ) ) ;
2014-05-20 10:45:50 +04:00
clear_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
BT_DBG ( " tk_request: auth:%d lcl:%d rem:%d " , auth , local_io , remote_io ) ;
2014-07-09 20:18:09 +04:00
/* If neither side wants MITM, either "just" confirm an incoming
* request or use just - works for outgoing ones . The JUST_CFM
* will be converted to JUST_WORKS if necessary later in this
* function . If either side has MITM look up the method from the
* table .
*/
2014-06-17 14:07:38 +04:00
if ( ! ( auth & SMP_AUTH_MITM ) )
2014-07-09 20:18:09 +04:00
method = JUST_CFM ;
2011-12-22 04:12:12 +04:00
else
2014-06-17 14:07:38 +04:00
method = get_auth_method ( smp , local_io , remote_io ) ;
2011-12-22 04:12:12 +04:00
2014-03-24 16:39:07 +04:00
/* Don't confirm locally initiated pairing attempts */
2014-05-20 10:45:50 +04:00
if ( method = = JUST_CFM & & test_bit ( SMP_FLAG_INITIATOR , & smp - > flags ) )
2014-03-24 16:39:07 +04:00
method = JUST_WORKS ;
2014-07-16 16:09:13 +04:00
/* Don't bother user space with no IO capabilities */
if ( method = = JUST_CFM & & hcon - > io_capability = = HCI_IO_NO_INPUT_OUTPUT )
method = JUST_WORKS ;
2011-12-22 04:12:12 +04:00
/* If Just Works, Continue with Zero TK */
if ( method = = JUST_WORKS ) {
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
return 0 ;
}
/* Not Just Works/Confirm results in MITM Authentication */
2014-09-18 12:26:32 +04:00
if ( method ! = JUST_CFM ) {
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_MITM_AUTH , & smp - > flags ) ;
2014-09-18 12:26:32 +04:00
if ( hcon - > pending_sec_level < BT_SECURITY_HIGH )
hcon - > pending_sec_level = BT_SECURITY_HIGH ;
}
2011-12-22 04:12:12 +04:00
/* If both devices have Keyoard-Display I/O, the master
* Confirms and the slave Enters the passkey .
*/
if ( method = = OVERLAP ) {
2014-07-16 12:42:27 +04:00
if ( hcon - > role = = HCI_ROLE_MASTER )
2011-12-22 04:12:12 +04:00
method = CFM_PASSKEY ;
else
method = REQ_PASSKEY ;
}
2014-03-19 16:14:53 +04:00
/* Generate random passkey. */
2011-12-22 04:12:12 +04:00
if ( method = = CFM_PASSKEY ) {
2014-03-18 14:58:24 +04:00
memset ( smp - > tk , 0 , sizeof ( smp - > tk ) ) ;
2011-12-22 04:12:12 +04:00
get_random_bytes ( & passkey , sizeof ( passkey ) ) ;
passkey % = 1000000 ;
2014-03-18 14:58:24 +04:00
put_unaligned_le32 ( passkey , smp - > tk ) ;
2011-12-22 04:12:12 +04:00
BT_DBG ( " PassKey: %d " , passkey ) ;
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
}
hci_dev_lock ( hcon - > hdev ) ;
if ( method = = REQ_PASSKEY )
2013-10-13 13:23:39 +04:00
ret = mgmt_user_passkey_request ( hcon - > hdev , & hcon - > dst ,
2012-02-09 17:26:12 +04:00
hcon - > type , hcon - > dst_type ) ;
2014-03-24 16:39:05 +04:00
else if ( method = = JUST_CFM )
ret = mgmt_user_confirm_request ( hcon - > hdev , & hcon - > dst ,
hcon - > type , hcon - > dst_type ,
passkey , 1 ) ;
2011-12-22 04:12:12 +04:00
else
2014-03-19 16:14:53 +04:00
ret = mgmt_user_passkey_notify ( hcon - > hdev , & hcon - > dst ,
2012-02-09 17:26:12 +04:00
hcon - > type , hcon - > dst_type ,
2014-03-20 10:18:14 +04:00
passkey , 0 ) ;
2011-12-22 04:12:12 +04:00
hci_dev_unlock ( hcon - > hdev ) ;
return ret ;
}
2014-05-20 10:45:52 +04:00
static u8 smp_confirm ( struct smp_chan * smp )
2011-09-05 21:31:31 +04:00
{
struct l2cap_conn * conn = smp - > conn ;
struct smp_cmd_pairing_confirm cp ;
int ret ;
BT_DBG ( " conn %p " , conn ) ;
2014-10-25 23:15:37 +04:00
ret = smp_c1 ( smp - > tfm_aes , smp - > tk , smp - > prnd , smp - > preq , smp - > prsp ,
2014-02-28 14:54:17 +04:00
conn - > hcon - > init_addr_type , & conn - > hcon - > init_addr ,
2014-03-18 14:58:24 +04:00
conn - > hcon - > resp_addr_type , & conn - > hcon - > resp_addr ,
cp . confirm_val ) ;
2014-05-20 10:45:52 +04:00
if ( ret )
return SMP_UNSPECIFIED ;
2011-09-05 21:31:31 +04:00
2014-05-20 10:45:50 +04:00
clear_bit ( SMP_FLAG_CFM_PENDING , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
2011-09-05 21:31:31 +04:00
smp_send_cmd ( smp - > conn , SMP_CMD_PAIRING_CONFIRM , sizeof ( cp ) , & cp ) ;
2014-09-05 23:19:55 +04:00
if ( conn - > hcon - > out )
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_CONFIRM ) ;
else
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_RANDOM ) ;
2014-05-20 10:45:52 +04:00
return 0 ;
2011-09-05 21:31:31 +04:00
}
2014-05-20 10:45:51 +04:00
static u8 smp_random ( struct smp_chan * smp )
2011-09-05 21:31:31 +04:00
{
struct l2cap_conn * conn = smp - > conn ;
struct hci_conn * hcon = conn - > hcon ;
2014-05-20 10:45:51 +04:00
u8 confirm [ 16 ] ;
2011-09-05 21:31:31 +04:00
int ret ;
2014-06-27 15:23:04 +04:00
if ( IS_ERR_OR_NULL ( smp - > tfm_aes ) )
2014-05-20 10:45:51 +04:00
return SMP_UNSPECIFIED ;
2011-09-05 21:31:31 +04:00
BT_DBG ( " conn %p %s " , conn , conn - > hcon - > out ? " master " : " slave " ) ;
2014-10-25 23:15:37 +04:00
ret = smp_c1 ( smp - > tfm_aes , smp - > tk , smp - > rrnd , smp - > preq , smp - > prsp ,
2014-02-28 14:54:17 +04:00
hcon - > init_addr_type , & hcon - > init_addr ,
2014-03-18 14:58:24 +04:00
hcon - > resp_addr_type , & hcon - > resp_addr , confirm ) ;
2014-05-20 10:45:51 +04:00
if ( ret )
return SMP_UNSPECIFIED ;
2011-09-05 21:31:31 +04:00
if ( memcmp ( smp - > pcnf , confirm , sizeof ( smp - > pcnf ) ) ! = 0 ) {
BT_ERR ( " Pairing failed (confirmation values mismatch) " ) ;
2014-05-20 10:45:51 +04:00
return SMP_CONFIRM_FAILED ;
2011-09-05 21:31:31 +04:00
}
if ( hcon - > out ) {
2014-02-28 04:00:28 +04:00
u8 stk [ 16 ] ;
__le64 rand = 0 ;
__le16 ediv = 0 ;
2011-09-05 21:31:31 +04:00
2014-10-25 23:15:37 +04:00
smp_s1 ( smp - > tfm_aes , smp - > tk , smp - > rrnd , smp - > prnd , stk ) ;
2011-09-05 21:31:31 +04:00
2012-01-31 02:29:12 +04:00
memset ( stk + smp - > enc_key_size , 0 ,
2012-03-08 08:25:00 +04:00
SMP_MAX_ENC_KEY_SIZE - smp - > enc_key_size ) ;
2011-09-05 21:31:31 +04:00
2014-05-20 10:45:51 +04:00
if ( test_and_set_bit ( HCI_CONN_ENCRYPT_PEND , & hcon - > flags ) )
return SMP_UNSPECIFIED ;
2011-09-05 21:31:31 +04:00
hci_le_start_enc ( hcon , ediv , rand , stk ) ;
2012-01-31 02:29:12 +04:00
hcon - > enc_key_size = smp - > enc_key_size ;
2014-07-01 20:14:12 +04:00
set_bit ( HCI_CONN_STK_ENCRYPT , & hcon - > flags ) ;
2011-09-05 21:31:31 +04:00
} else {
2014-06-10 16:19:50 +04:00
u8 stk [ 16 ] , auth ;
2014-02-28 04:00:28 +04:00
__le64 rand = 0 ;
__le16 ediv = 0 ;
2011-09-05 21:31:31 +04:00
2014-03-18 14:58:24 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_RANDOM , sizeof ( smp - > prnd ) ,
smp - > prnd ) ;
2011-09-05 21:31:31 +04:00
2014-10-25 23:15:37 +04:00
smp_s1 ( smp - > tfm_aes , smp - > tk , smp - > prnd , smp - > rrnd , stk ) ;
2011-09-05 21:31:31 +04:00
2012-01-31 02:29:12 +04:00
memset ( stk + smp - > enc_key_size , 0 ,
2013-10-13 16:43:25 +04:00
SMP_MAX_ENC_KEY_SIZE - smp - > enc_key_size ) ;
2011-09-05 21:31:31 +04:00
2014-06-10 16:19:50 +04:00
if ( hcon - > pending_sec_level = = BT_SECURITY_HIGH )
auth = 1 ;
else
auth = 0 ;
2014-06-16 20:25:15 +04:00
/* Even though there's no _SLAVE suffix this is the
* slave STK we ' re adding for later lookup ( the master
* STK never needs to be stored ) .
*/
2013-10-13 13:23:39 +04:00
hci_add_ltk ( hcon - > hdev , & hcon - > dst , hcon - > dst_type ,
2014-06-16 20:25:16 +04:00
SMP_STK , auth , stk , smp - > enc_key_size , ediv , rand ) ;
2011-09-05 21:31:31 +04:00
}
2014-05-20 10:45:51 +04:00
return 0 ;
2011-09-05 21:31:31 +04:00
}
2014-08-11 23:06:36 +04:00
static void smp_notify_keys ( struct l2cap_conn * conn )
{
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
struct hci_conn * hcon = conn - > hcon ;
struct hci_dev * hdev = hcon - > hdev ;
struct smp_cmd_pairing * req = ( void * ) & smp - > preq [ 1 ] ;
struct smp_cmd_pairing * rsp = ( void * ) & smp - > prsp [ 1 ] ;
bool persistent ;
if ( smp - > remote_irk ) {
mgmt_new_irk ( hdev , smp - > remote_irk ) ;
/* Now that user space can be considered to know the
* identity address track the connection based on it
* from now on .
*/
bacpy ( & hcon - > dst , & smp - > remote_irk - > bdaddr ) ;
hcon - > dst_type = smp - > remote_irk - > addr_type ;
2014-09-05 23:19:50 +04:00
queue_work ( hdev - > workqueue , & conn - > id_addr_update_work ) ;
2014-08-11 23:06:36 +04:00
/* When receiving an indentity resolving key for
* a remote device that does not use a resolvable
* private address , just remove the key so that
* it is possible to use the controller white
* list for scanning .
*
* Userspace will have been told to not store
* this key at this point . So it is safe to
* just remove it .
*/
if ( ! bacmp ( & smp - > remote_irk - > rpa , BDADDR_ANY ) ) {
list_del ( & smp - > remote_irk - > list ) ;
kfree ( smp - > remote_irk ) ;
smp - > remote_irk = NULL ;
}
}
/* The LTKs and CSRKs should be persistent only if both sides
* had the bonding bit set in their authentication requests .
*/
persistent = ! ! ( ( req - > auth_req & rsp - > auth_req ) & SMP_AUTH_BONDING ) ;
if ( smp - > csrk ) {
smp - > csrk - > bdaddr_type = hcon - > dst_type ;
bacpy ( & smp - > csrk - > bdaddr , & hcon - > dst ) ;
mgmt_new_csrk ( hdev , smp - > csrk , persistent ) ;
}
if ( smp - > slave_csrk ) {
smp - > slave_csrk - > bdaddr_type = hcon - > dst_type ;
bacpy ( & smp - > slave_csrk - > bdaddr , & hcon - > dst ) ;
mgmt_new_csrk ( hdev , smp - > slave_csrk , persistent ) ;
}
if ( smp - > ltk ) {
smp - > ltk - > bdaddr_type = hcon - > dst_type ;
bacpy ( & smp - > ltk - > bdaddr , & hcon - > dst ) ;
mgmt_new_ltk ( hdev , smp - > ltk , persistent ) ;
}
if ( smp - > slave_ltk ) {
smp - > slave_ltk - > bdaddr_type = hcon - > dst_type ;
bacpy ( & smp - > slave_ltk - > bdaddr , & hcon - > dst ) ;
mgmt_new_ltk ( hdev , smp - > slave_ltk , persistent ) ;
}
}
2014-09-05 23:19:55 +04:00
static void smp_allow_key_dist ( struct smp_chan * smp )
{
/* Allow the first expected phase 3 PDU. The rest of the PDUs
* will be allowed in each PDU handler to ensure we receive
* them in the correct order .
*/
if ( smp - > remote_key_dist & SMP_DIST_ENC_KEY )
SMP_ALLOW_CMD ( smp , SMP_CMD_ENCRYPT_INFO ) ;
else if ( smp - > remote_key_dist & SMP_DIST_ID_KEY )
SMP_ALLOW_CMD ( smp , SMP_CMD_IDENT_INFO ) ;
else if ( smp - > remote_key_dist & SMP_DIST_SIGN )
SMP_ALLOW_CMD ( smp , SMP_CMD_SIGN_INFO ) ;
}
2014-09-05 23:19:51 +04:00
static void smp_distribute_keys ( struct smp_chan * smp )
2014-08-11 23:06:36 +04:00
{
struct smp_cmd_pairing * req , * rsp ;
2014-08-11 23:06:43 +04:00
struct l2cap_conn * conn = smp - > conn ;
2014-08-11 23:06:36 +04:00
struct hci_conn * hcon = conn - > hcon ;
struct hci_dev * hdev = hcon - > hdev ;
__u8 * keydist ;
BT_DBG ( " conn %p " , conn ) ;
rsp = ( void * ) & smp - > prsp [ 1 ] ;
/* The responder sends its keys first */
2014-09-05 23:19:55 +04:00
if ( hcon - > out & & ( smp - > remote_key_dist & KEY_DIST_MASK ) ) {
smp_allow_key_dist ( smp ) ;
2014-08-11 23:06:43 +04:00
return ;
2014-09-05 23:19:55 +04:00
}
2014-08-11 23:06:36 +04:00
req = ( void * ) & smp - > preq [ 1 ] ;
if ( hcon - > out ) {
keydist = & rsp - > init_key_dist ;
* keydist & = req - > init_key_dist ;
} else {
keydist = & rsp - > resp_key_dist ;
* keydist & = req - > resp_key_dist ;
}
BT_DBG ( " keydist 0x%x " , * keydist ) ;
if ( * keydist & SMP_DIST_ENC_KEY ) {
struct smp_cmd_encrypt_info enc ;
struct smp_cmd_master_ident ident ;
struct smp_ltk * ltk ;
u8 authenticated ;
__le16 ediv ;
__le64 rand ;
get_random_bytes ( enc . ltk , sizeof ( enc . ltk ) ) ;
get_random_bytes ( & ediv , sizeof ( ediv ) ) ;
get_random_bytes ( & rand , sizeof ( rand ) ) ;
smp_send_cmd ( conn , SMP_CMD_ENCRYPT_INFO , sizeof ( enc ) , & enc ) ;
authenticated = hcon - > sec_level = = BT_SECURITY_HIGH ;
ltk = hci_add_ltk ( hdev , & hcon - > dst , hcon - > dst_type ,
SMP_LTK_SLAVE , authenticated , enc . ltk ,
smp - > enc_key_size , ediv , rand ) ;
smp - > slave_ltk = ltk ;
ident . ediv = ediv ;
ident . rand = rand ;
smp_send_cmd ( conn , SMP_CMD_MASTER_IDENT , sizeof ( ident ) , & ident ) ;
* keydist & = ~ SMP_DIST_ENC_KEY ;
}
if ( * keydist & SMP_DIST_ID_KEY ) {
struct smp_cmd_ident_addr_info addrinfo ;
struct smp_cmd_ident_info idinfo ;
memcpy ( idinfo . irk , hdev - > irk , sizeof ( idinfo . irk ) ) ;
smp_send_cmd ( conn , SMP_CMD_IDENT_INFO , sizeof ( idinfo ) , & idinfo ) ;
/* The hci_conn contains the local identity address
* after the connection has been established .
*
* This is true even when the connection has been
* established using a resolvable random address .
*/
bacpy ( & addrinfo . bdaddr , & hcon - > src ) ;
addrinfo . addr_type = hcon - > src_type ;
smp_send_cmd ( conn , SMP_CMD_IDENT_ADDR_INFO , sizeof ( addrinfo ) ,
& addrinfo ) ;
* keydist & = ~ SMP_DIST_ID_KEY ;
}
if ( * keydist & SMP_DIST_SIGN ) {
struct smp_cmd_sign_info sign ;
struct smp_csrk * csrk ;
/* Generate a new random key */
get_random_bytes ( sign . csrk , sizeof ( sign . csrk ) ) ;
csrk = kzalloc ( sizeof ( * csrk ) , GFP_KERNEL ) ;
if ( csrk ) {
csrk - > master = 0x00 ;
memcpy ( csrk - > val , sign . csrk , sizeof ( csrk - > val ) ) ;
}
smp - > slave_csrk = csrk ;
smp_send_cmd ( conn , SMP_CMD_SIGN_INFO , sizeof ( sign ) , & sign ) ;
* keydist & = ~ SMP_DIST_SIGN ;
}
/* If there are still keys to be received wait for them */
2014-09-05 23:19:55 +04:00
if ( smp - > remote_key_dist & KEY_DIST_MASK ) {
smp_allow_key_dist ( smp ) ;
2014-08-11 23:06:43 +04:00
return ;
2014-09-05 23:19:55 +04:00
}
2014-08-11 23:06:36 +04:00
set_bit ( SMP_FLAG_COMPLETE , & smp - > flags ) ;
smp_notify_keys ( conn ) ;
smp_chan_destroy ( conn ) ;
}
2014-08-11 23:06:40 +04:00
static void smp_timeout ( struct work_struct * work )
{
struct smp_chan * smp = container_of ( work , struct smp_chan ,
security_timer . work ) ;
struct l2cap_conn * conn = smp - > conn ;
BT_DBG ( " conn %p " , conn ) ;
2014-08-18 21:33:29 +04:00
hci_disconnect ( conn - > hcon , HCI_ERROR_REMOTE_USER_TERM ) ;
2014-08-11 23:06:40 +04:00
}
2011-09-05 21:31:31 +04:00
static struct smp_chan * smp_chan_create ( struct l2cap_conn * conn )
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
2011-09-05 21:31:31 +04:00
struct smp_chan * smp ;
2013-10-13 16:43:25 +04:00
smp = kzalloc ( sizeof ( * smp ) , GFP_ATOMIC ) ;
2014-09-05 23:19:52 +04:00
if ( ! smp )
2011-09-05 21:31:31 +04:00
return NULL ;
2014-06-27 15:23:03 +04:00
smp - > tfm_aes = crypto_alloc_blkcipher ( " ecb(aes) " , 0 , CRYPTO_ALG_ASYNC ) ;
if ( IS_ERR ( smp - > tfm_aes ) ) {
BT_ERR ( " Unable to create ECB crypto context " ) ;
kfree ( smp ) ;
return NULL ;
}
2011-09-05 21:31:31 +04:00
smp - > conn = conn ;
2014-08-08 10:37:18 +04:00
chan - > data = smp ;
2011-09-05 21:31:31 +04:00
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_FAIL ) ;
2014-08-11 23:06:40 +04:00
INIT_DELAYED_WORK ( & smp - > security_timer , smp_timeout ) ;
2011-09-05 21:31:31 +04:00
hci_conn_hold ( conn - > hcon ) ;
return smp ;
}
2011-12-22 04:12:12 +04:00
int smp_user_confirm_reply ( struct hci_conn * hcon , u16 mgmt_op , __le32 passkey )
{
2014-06-27 15:23:07 +04:00
struct l2cap_conn * conn = hcon - > l2cap_data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan ;
2011-12-22 04:12:12 +04:00
struct smp_chan * smp ;
u32 value ;
2014-09-05 23:19:52 +04:00
int err ;
2011-12-22 04:12:12 +04:00
BT_DBG ( " " ) ;
2014-09-05 23:19:52 +04:00
if ( ! conn )
2011-12-22 04:12:12 +04:00
return - ENOTCONN ;
2014-08-08 10:37:18 +04:00
chan = conn - > smp ;
if ( ! chan )
return - ENOTCONN ;
2014-09-05 23:19:52 +04:00
l2cap_chan_lock ( chan ) ;
if ( ! chan - > data ) {
err = - ENOTCONN ;
goto unlock ;
}
2014-08-08 10:37:18 +04:00
smp = chan - > data ;
2011-12-22 04:12:12 +04:00
switch ( mgmt_op ) {
case MGMT_OP_USER_PASSKEY_REPLY :
value = le32_to_cpu ( passkey ) ;
2014-03-18 14:58:24 +04:00
memset ( smp - > tk , 0 , sizeof ( smp - > tk ) ) ;
2011-12-22 04:12:12 +04:00
BT_DBG ( " PassKey: %d " , value ) ;
2014-03-18 14:58:24 +04:00
put_unaligned_le32 ( value , smp - > tk ) ;
2011-12-22 04:12:12 +04:00
/* Fall Through */
case MGMT_OP_USER_CONFIRM_REPLY :
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
break ;
case MGMT_OP_USER_PASSKEY_NEG_REPLY :
case MGMT_OP_USER_CONFIRM_NEG_REPLY :
2013-11-06 13:24:57 +04:00
smp_failure ( conn , SMP_PASSKEY_ENTRY_FAILED ) ;
2014-09-05 23:19:52 +04:00
err = 0 ;
goto unlock ;
2011-12-22 04:12:12 +04:00
default :
2013-11-06 13:24:57 +04:00
smp_failure ( conn , SMP_PASSKEY_ENTRY_FAILED ) ;
2014-09-05 23:19:52 +04:00
err = - EOPNOTSUPP ;
goto unlock ;
2011-12-22 04:12:12 +04:00
}
2014-09-05 23:19:52 +04:00
err = 0 ;
2011-12-22 04:12:12 +04:00
/* If it is our turn to send Pairing Confirm, do so now */
2014-05-20 10:45:52 +04:00
if ( test_bit ( SMP_FLAG_CFM_PENDING , & smp - > flags ) ) {
u8 rsp = smp_confirm ( smp ) ;
if ( rsp )
smp_failure ( conn , rsp ) ;
}
2011-12-22 04:12:12 +04:00
2014-09-05 23:19:52 +04:00
unlock :
l2cap_chan_unlock ( chan ) ;
return err ;
2011-12-22 04:12:12 +04:00
}
2011-06-10 01:50:53 +04:00
static u8 smp_cmd_pairing_req ( struct l2cap_conn * conn , struct sk_buff * skb )
2011-06-10 01:50:42 +04:00
{
2011-06-14 20:37:42 +04:00
struct smp_cmd_pairing rsp , * req = ( void * ) skb - > data ;
2014-09-05 23:19:52 +04:00
struct l2cap_chan * chan = conn - > smp ;
2014-07-10 12:02:07 +04:00
struct hci_dev * hdev = conn - > hcon - > hdev ;
2011-09-05 21:31:31 +04:00
struct smp_chan * smp ;
2014-06-17 14:07:37 +04:00
u8 key_size , auth , sec_level ;
2011-09-05 21:31:31 +04:00
int ret ;
2011-06-10 01:50:42 +04:00
BT_DBG ( " conn %p " , conn ) ;
2014-02-18 12:19:29 +04:00
if ( skb - > len < sizeof ( * req ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-07-16 12:42:27 +04:00
if ( conn - > hcon - > role ! = HCI_ROLE_SLAVE )
2011-12-22 04:12:12 +04:00
return SMP_CMD_NOTSUPP ;
2014-09-05 23:19:52 +04:00
if ( ! chan - > data )
2011-09-05 21:31:31 +04:00
smp = smp_chan_create ( conn ) ;
2014-09-05 23:19:52 +04:00
else
2014-08-08 10:37:18 +04:00
smp = chan - > data ;
2011-09-05 21:31:31 +04:00
2012-07-19 18:03:43 +04:00
if ( ! smp )
return SMP_UNSPECIFIED ;
2011-08-20 04:06:51 +04:00
2014-09-11 04:37:42 +04:00
/* We didn't start the pairing, so match remote */
auth = req - > auth_req & AUTH_REQ_MASK ;
2014-07-30 10:22:22 +04:00
if ( ! test_bit ( HCI_BONDABLE , & hdev - > dev_flags ) & &
2014-09-11 04:37:42 +04:00
( auth & SMP_AUTH_BONDING ) )
2014-07-10 12:02:07 +04:00
return SMP_PAIRING_NOTSUPP ;
2011-09-05 21:31:30 +04:00
smp - > preq [ 0 ] = SMP_CMD_PAIRING_REQ ;
memcpy ( & smp - > preq [ 1 ] , req , sizeof ( * req ) ) ;
2011-06-14 20:37:42 +04:00
skb_pull ( skb , sizeof ( * req ) ) ;
2011-06-10 01:50:42 +04:00
2014-09-11 04:58:54 +04:00
if ( conn - > hcon - > io_capability = = HCI_IO_NO_INPUT_OUTPUT )
2014-09-11 04:37:44 +04:00
sec_level = BT_SECURITY_MEDIUM ;
else
sec_level = authreq_to_seclevel ( auth ) ;
2014-06-17 14:07:37 +04:00
if ( sec_level > conn - > hcon - > pending_sec_level )
conn - > hcon - > pending_sec_level = sec_level ;
2012-03-05 22:09:38 +04:00
2014-06-17 14:07:39 +04:00
/* If we need MITM check that it can be acheived */
if ( conn - > hcon - > pending_sec_level > = BT_SECURITY_HIGH ) {
u8 method ;
method = get_auth_method ( smp , conn - > hcon - > io_capability ,
req - > io_capability ) ;
if ( method = = JUST_WORKS | | method = = JUST_CFM )
return SMP_AUTH_REQUIREMENTS ;
}
2011-12-22 04:12:12 +04:00
build_pairing_cmd ( conn , req , & rsp , auth ) ;
2011-06-14 20:37:42 +04:00
key_size = min ( req - > max_key_size , rsp . max_key_size ) ;
if ( check_enc_key_size ( conn , key_size ) )
return SMP_ENC_KEY_SIZE ;
2011-06-10 01:50:42 +04:00
2013-12-02 12:49:03 +04:00
get_random_bytes ( smp - > prnd , sizeof ( smp - > prnd ) ) ;
2011-09-05 21:31:31 +04:00
2011-09-05 21:31:30 +04:00
smp - > prsp [ 0 ] = SMP_CMD_PAIRING_RSP ;
memcpy ( & smp - > prsp [ 1 ] , & rsp , sizeof ( rsp ) ) ;
2011-06-10 01:50:45 +04:00
2011-06-14 20:37:42 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_RSP , sizeof ( rsp ) , & rsp ) ;
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_CONFIRM ) ;
2011-06-10 01:50:53 +04:00
2011-12-22 04:12:12 +04:00
/* Request setup of TK */
ret = tk_request ( conn , 0 , auth , rsp . io_capability , req - > io_capability ) ;
if ( ret )
return SMP_UNSPECIFIED ;
2011-06-10 01:50:53 +04:00
return 0 ;
2011-06-10 01:50:42 +04:00
}
2011-06-10 01:50:53 +04:00
static u8 smp_cmd_pairing_rsp ( struct l2cap_conn * conn , struct sk_buff * skb )
2011-06-10 01:50:42 +04:00
{
2011-06-14 20:37:42 +04:00
struct smp_cmd_pairing * req , * rsp = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2014-09-11 04:37:41 +04:00
u8 key_size , auth ;
2011-06-10 01:50:46 +04:00
int ret ;
2011-06-10 01:50:42 +04:00
BT_DBG ( " conn %p " , conn ) ;
2014-02-18 12:19:29 +04:00
if ( skb - > len < sizeof ( * rsp ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-07-16 12:42:27 +04:00
if ( conn - > hcon - > role ! = HCI_ROLE_MASTER )
2011-12-22 04:12:12 +04:00
return SMP_CMD_NOTSUPP ;
2011-06-14 20:37:42 +04:00
skb_pull ( skb , sizeof ( * rsp ) ) ;
2011-09-05 21:31:30 +04:00
req = ( void * ) & smp - > preq [ 1 ] ;
2011-06-10 01:50:53 +04:00
2011-06-14 20:37:42 +04:00
key_size = min ( req - > max_key_size , rsp - > max_key_size ) ;
if ( check_enc_key_size ( conn , key_size ) )
return SMP_ENC_KEY_SIZE ;
2014-09-11 04:37:42 +04:00
auth = rsp - > auth_req & AUTH_REQ_MASK ;
2014-06-17 14:07:39 +04:00
/* If we need MITM check that it can be acheived */
if ( conn - > hcon - > pending_sec_level > = BT_SECURITY_HIGH ) {
u8 method ;
method = get_auth_method ( smp , req - > io_capability ,
rsp - > io_capability ) ;
if ( method = = JUST_WORKS | | method = = JUST_CFM )
return SMP_AUTH_REQUIREMENTS ;
}
2013-12-02 12:49:03 +04:00
get_random_bytes ( smp - > prnd , sizeof ( smp - > prnd ) ) ;
2011-06-10 01:50:46 +04:00
2011-09-05 21:31:31 +04:00
smp - > prsp [ 0 ] = SMP_CMD_PAIRING_RSP ;
memcpy ( & smp - > prsp [ 1 ] , rsp , sizeof ( * rsp ) ) ;
2011-06-10 01:50:46 +04:00
2014-03-14 12:53:50 +04:00
/* Update remote key distribution in case the remote cleared
* some bits that we had enabled in our request .
*/
smp - > remote_key_dist & = rsp - > resp_key_dist ;
2014-09-11 04:37:42 +04:00
auth | = req - > auth_req ;
2011-12-22 04:12:12 +04:00
2012-06-06 14:54:15 +04:00
ret = tk_request ( conn , 0 , auth , req - > io_capability , rsp - > io_capability ) ;
2011-12-22 04:12:12 +04:00
if ( ret )
return SMP_UNSPECIFIED ;
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_CFM_PENDING , & smp - > flags ) ;
2011-12-22 04:12:12 +04:00
/* Can't compose response until we have been confirmed */
2014-05-20 10:45:50 +04:00
if ( test_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) )
2014-05-20 10:45:52 +04:00
return smp_confirm ( smp ) ;
2011-06-10 01:50:53 +04:00
return 0 ;
2011-06-10 01:50:42 +04:00
}
2011-06-10 01:50:53 +04:00
static u8 smp_cmd_pairing_confirm ( struct l2cap_conn * conn , struct sk_buff * skb )
2011-06-10 01:50:42 +04:00
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2011-06-10 01:50:46 +04:00
2011-06-10 01:50:42 +04:00
BT_DBG ( " conn %p %s " , conn , conn - > hcon - > out ? " master " : " slave " ) ;
2014-02-18 12:19:29 +04:00
if ( skb - > len < sizeof ( smp - > pcnf ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2011-09-05 21:31:30 +04:00
memcpy ( smp - > pcnf , skb - > data , sizeof ( smp - > pcnf ) ) ;
skb_pull ( skb , sizeof ( smp - > pcnf ) ) ;
2011-06-10 01:50:42 +04:00
2014-09-05 23:19:55 +04:00
if ( conn - > hcon - > out ) {
2014-03-18 14:58:24 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_RANDOM , sizeof ( smp - > prnd ) ,
smp - > prnd ) ;
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_RANDOM ) ;
return 0 ;
}
if ( test_bit ( SMP_FLAG_TK_VALID , & smp - > flags ) )
2014-05-20 10:45:52 +04:00
return smp_confirm ( smp ) ;
2014-03-18 14:58:24 +04:00
else
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_CFM_PENDING , & smp - > flags ) ;
2011-06-10 01:50:53 +04:00
return 0 ;
2011-06-10 01:50:42 +04:00
}
2011-06-10 01:50:53 +04:00
static u8 smp_cmd_pairing_random ( struct l2cap_conn * conn , struct sk_buff * skb )
2011-06-10 01:50:42 +04:00
{
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2011-06-10 01:50:46 +04:00
2011-09-05 21:31:31 +04:00
BT_DBG ( " conn %p " , conn ) ;
2011-06-14 20:37:42 +04:00
2014-02-18 12:19:29 +04:00
if ( skb - > len < sizeof ( smp - > rrnd ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-03-18 14:58:24 +04:00
memcpy ( smp - > rrnd , skb - > data , sizeof ( smp - > rrnd ) ) ;
2011-09-05 21:31:31 +04:00
skb_pull ( skb , sizeof ( smp - > rrnd ) ) ;
2011-07-08 01:59:40 +04:00
2014-05-20 10:45:51 +04:00
return smp_random ( smp ) ;
2011-06-10 01:50:42 +04:00
}
2014-07-01 12:59:24 +04:00
static bool smp_ltk_encrypt ( struct l2cap_conn * conn , u8 sec_level )
2011-08-26 03:02:28 +04:00
{
2012-02-03 04:08:01 +04:00
struct smp_ltk * key ;
2011-08-26 03:02:28 +04:00
struct hci_conn * hcon = conn - > hcon ;
2014-01-31 07:40:00 +04:00
key = hci_find_ltk_by_addr ( hcon - > hdev , & hcon - > dst , hcon - > dst_type ,
2014-07-16 12:42:28 +04:00
hcon - > role ) ;
2011-08-26 03:02:28 +04:00
if ( ! key )
2014-07-01 12:59:24 +04:00
return false ;
2011-08-26 03:02:28 +04:00
2014-09-11 04:37:45 +04:00
if ( smp_ltk_sec_level ( key ) < sec_level )
2014-07-01 12:59:24 +04:00
return false ;
2012-06-07 10:58:37 +04:00
2012-01-16 08:10:31 +04:00
if ( test_and_set_bit ( HCI_CONN_ENCRYPT_PEND , & hcon - > flags ) )
2014-07-01 12:59:24 +04:00
return true ;
2011-08-26 03:02:28 +04:00
2012-02-03 04:08:01 +04:00
hci_le_start_enc ( hcon , key - > ediv , key - > rand , key - > val ) ;
hcon - > enc_key_size = key - > enc_size ;
2011-08-26 03:02:28 +04:00
2014-07-01 20:14:12 +04:00
/* We never store STKs for master role, so clear this flag */
clear_bit ( HCI_CONN_STK_ENCRYPT , & hcon - > flags ) ;
2014-07-01 12:59:24 +04:00
return true ;
2011-08-26 03:02:28 +04:00
}
2013-10-13 16:43:25 +04:00
2014-07-01 19:40:20 +04:00
bool smp_sufficient_security ( struct hci_conn * hcon , u8 sec_level )
{
if ( sec_level = = BT_SECURITY_LOW )
return true ;
2014-07-01 20:14:13 +04:00
/* If we're encrypted with an STK always claim insufficient
* security . This way we allow the connection to be re - encrypted
* with an LTK , even if the LTK provides the same level of
2014-07-14 15:34:55 +04:00
* security . Only exception is if we don ' t have an LTK ( e . g .
* because of key distribution bits ) .
2014-07-01 20:14:13 +04:00
*/
2014-07-14 15:34:55 +04:00
if ( test_bit ( HCI_CONN_STK_ENCRYPT , & hcon - > flags ) & &
hci_find_ltk_by_addr ( hcon - > hdev , & hcon - > dst , hcon - > dst_type ,
2014-07-16 12:42:28 +04:00
hcon - > role ) )
2014-07-01 20:14:13 +04:00
return false ;
2014-07-01 19:40:20 +04:00
if ( hcon - > sec_level > = sec_level )
return true ;
return false ;
}
2011-06-10 01:50:53 +04:00
static u8 smp_cmd_security_req ( struct l2cap_conn * conn , struct sk_buff * skb )
2011-06-10 01:50:42 +04:00
{
struct smp_cmd_security_req * rp = ( void * ) skb - > data ;
struct smp_cmd_pairing cp ;
2011-01-27 03:42:57 +03:00
struct hci_conn * hcon = conn - > hcon ;
2011-09-05 21:31:31 +04:00
struct smp_chan * smp ;
2014-09-11 04:37:42 +04:00
u8 sec_level , auth ;
2011-06-10 01:50:42 +04:00
BT_DBG ( " conn %p " , conn ) ;
2014-02-18 12:19:29 +04:00
if ( skb - > len < sizeof ( * rp ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-07-16 12:42:27 +04:00
if ( hcon - > role ! = HCI_ROLE_MASTER )
2013-11-05 13:30:39 +04:00
return SMP_CMD_NOTSUPP ;
2014-09-11 04:37:42 +04:00
auth = rp - > auth_req & AUTH_REQ_MASK ;
2014-09-11 04:58:54 +04:00
if ( hcon - > io_capability = = HCI_IO_NO_INPUT_OUTPUT )
2014-09-11 04:37:44 +04:00
sec_level = BT_SECURITY_MEDIUM ;
else
sec_level = authreq_to_seclevel ( auth ) ;
2014-07-01 19:40:20 +04:00
if ( smp_sufficient_security ( hcon , sec_level ) )
return 0 ;
2014-06-17 14:07:37 +04:00
if ( sec_level > hcon - > pending_sec_level )
hcon - > pending_sec_level = sec_level ;
2011-08-26 03:02:35 +04:00
2012-06-07 10:58:37 +04:00
if ( smp_ltk_encrypt ( conn , hcon - > pending_sec_level ) )
2011-08-26 03:02:28 +04:00
return 0 ;
2011-09-05 21:31:31 +04:00
smp = smp_chan_create ( conn ) ;
2014-06-16 20:25:14 +04:00
if ( ! smp )
return SMP_UNSPECIFIED ;
2011-08-20 04:06:51 +04:00
2014-07-30 10:22:22 +04:00
if ( ! test_bit ( HCI_BONDABLE , & hcon - > hdev - > dev_flags ) & &
2014-09-11 04:37:42 +04:00
( auth & SMP_AUTH_BONDING ) )
2014-07-29 15:18:48 +04:00
return SMP_PAIRING_NOTSUPP ;
2011-06-10 01:50:42 +04:00
skb_pull ( skb , sizeof ( * rp ) ) ;
2011-06-10 01:50:53 +04:00
memset ( & cp , 0 , sizeof ( cp ) ) ;
2014-09-11 04:37:42 +04:00
build_pairing_cmd ( conn , & cp , NULL , auth ) ;
2011-06-10 01:50:42 +04:00
2011-09-05 21:31:30 +04:00
smp - > preq [ 0 ] = SMP_CMD_PAIRING_REQ ;
memcpy ( & smp - > preq [ 1 ] , & cp , sizeof ( cp ) ) ;
2011-06-10 01:50:45 +04:00
2011-06-10 01:50:42 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_REQ , sizeof ( cp ) , & cp ) ;
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_RSP ) ;
2011-01-27 03:42:57 +03:00
2011-06-10 01:50:53 +04:00
return 0 ;
2011-06-10 01:50:42 +04:00
}
2012-08-24 04:32:43 +04:00
int smp_conn_security ( struct hci_conn * hcon , __u8 sec_level )
2011-06-10 01:50:40 +04:00
{
2012-08-24 04:32:43 +04:00
struct l2cap_conn * conn = hcon - > l2cap_data ;
2014-09-06 07:59:10 +04:00
struct l2cap_chan * chan ;
2014-03-24 16:39:03 +04:00
struct smp_chan * smp ;
2011-12-22 04:12:12 +04:00
__u8 authreq ;
2014-09-05 23:19:52 +04:00
int ret ;
2011-06-10 01:50:40 +04:00
2011-06-10 01:50:43 +04:00
BT_DBG ( " conn %p hcon %p level 0x%2.2x " , conn , hcon , sec_level ) ;
2014-03-24 16:39:03 +04:00
/* This may be NULL if there's an unexpected disconnection */
if ( ! conn )
return 1 ;
2014-09-06 07:59:10 +04:00
chan = conn - > smp ;
2013-04-24 14:05:32 +04:00
if ( ! test_bit ( HCI_LE_ENABLED , & hcon - > hdev - > dev_flags ) )
2011-07-01 02:20:56 +04:00
return 1 ;
2013-05-14 19:05:12 +04:00
if ( smp_sufficient_security ( hcon , sec_level ) )
2011-06-10 01:50:40 +04:00
return 1 ;
2011-01-27 03:42:57 +03:00
2014-06-17 14:07:37 +04:00
if ( sec_level > hcon - > pending_sec_level )
hcon - > pending_sec_level = sec_level ;
2014-07-16 12:42:27 +04:00
if ( hcon - > role = = HCI_ROLE_MASTER )
2014-06-17 14:07:37 +04:00
if ( smp_ltk_encrypt ( conn , hcon - > pending_sec_level ) )
return 0 ;
2011-08-20 04:06:51 +04:00
2014-09-05 23:19:52 +04:00
l2cap_chan_lock ( chan ) ;
/* If SMP is already in progress ignore this request */
if ( chan - > data ) {
ret = 0 ;
goto unlock ;
}
2011-08-20 04:06:51 +04:00
2011-09-05 21:31:31 +04:00
smp = smp_chan_create ( conn ) ;
2014-09-05 23:19:52 +04:00
if ( ! smp ) {
ret = 1 ;
goto unlock ;
}
2011-12-22 04:12:12 +04:00
authreq = seclevel_to_authreq ( sec_level ) ;
2011-08-20 04:06:51 +04:00
2014-06-01 10:45:24 +04:00
/* Require MITM if IO Capability allows or the security level
* requires it .
2014-03-18 17:42:30 +04:00
*/
2014-06-01 10:45:24 +04:00
if ( hcon - > io_capability ! = HCI_IO_NO_INPUT_OUTPUT | |
2014-06-17 14:07:37 +04:00
hcon - > pending_sec_level > BT_SECURITY_MEDIUM )
2014-03-18 17:42:30 +04:00
authreq | = SMP_AUTH_MITM ;
2014-07-16 12:42:27 +04:00
if ( hcon - > role = = HCI_ROLE_MASTER ) {
2011-08-20 04:06:51 +04:00
struct smp_cmd_pairing cp ;
2011-06-10 01:50:45 +04:00
2011-12-22 04:12:12 +04:00
build_pairing_cmd ( conn , & cp , NULL , authreq ) ;
2011-09-05 21:31:30 +04:00
smp - > preq [ 0 ] = SMP_CMD_PAIRING_REQ ;
memcpy ( & smp - > preq [ 1 ] , & cp , sizeof ( cp ) ) ;
2011-06-10 01:50:45 +04:00
2011-06-10 01:50:40 +04:00
smp_send_cmd ( conn , SMP_CMD_PAIRING_REQ , sizeof ( cp ) , & cp ) ;
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_RSP ) ;
2011-06-10 01:50:40 +04:00
} else {
struct smp_cmd_security_req cp ;
2011-12-22 04:12:12 +04:00
cp . auth_req = authreq ;
2011-06-10 01:50:40 +04:00
smp_send_cmd ( conn , SMP_CMD_SECURITY_REQ , sizeof ( cp ) , & cp ) ;
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_PAIRING_REQ ) ;
2011-06-10 01:50:40 +04:00
}
2014-05-20 10:45:50 +04:00
set_bit ( SMP_FLAG_INITIATOR , & smp - > flags ) ;
2014-09-05 23:19:52 +04:00
ret = 0 ;
2014-03-24 17:54:11 +04:00
2014-09-05 23:19:52 +04:00
unlock :
l2cap_chan_unlock ( chan ) ;
return ret ;
2011-06-10 01:50:40 +04:00
}
2011-07-08 01:59:34 +04:00
static int smp_cmd_encrypt_info ( struct l2cap_conn * conn , struct sk_buff * skb )
{
2011-07-08 01:59:39 +04:00
struct smp_cmd_encrypt_info * rp = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2011-07-08 01:59:39 +04:00
2014-02-18 12:19:29 +04:00
BT_DBG ( " conn %p " , conn ) ;
if ( skb - > len < sizeof ( * rp ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_MASTER_IDENT ) ;
2014-02-18 12:19:37 +04:00
2011-07-08 01:59:39 +04:00
skb_pull ( skb , sizeof ( * rp ) ) ;
2011-09-05 21:31:30 +04:00
memcpy ( smp - > tk , rp - > ltk , sizeof ( smp - > tk ) ) ;
2011-07-08 01:59:39 +04:00
2011-07-08 01:59:34 +04:00
return 0 ;
}
static int smp_cmd_master_ident ( struct l2cap_conn * conn , struct sk_buff * skb )
{
2011-07-08 01:59:39 +04:00
struct smp_cmd_master_ident * rp = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2012-02-03 04:08:01 +04:00
struct hci_dev * hdev = conn - > hcon - > hdev ;
struct hci_conn * hcon = conn - > hcon ;
2014-02-19 16:57:46 +04:00
struct smp_ltk * ltk ;
2012-02-03 04:08:01 +04:00
u8 authenticated ;
2011-07-08 01:59:39 +04:00
2014-02-18 12:19:29 +04:00
BT_DBG ( " conn %p " , conn ) ;
if ( skb - > len < sizeof ( * rp ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:29 +04:00
2014-02-27 01:33:43 +04:00
/* Mark the information as received */
smp - > remote_key_dist & = ~ SMP_DIST_ENC_KEY ;
2014-09-05 23:19:55 +04:00
if ( smp - > remote_key_dist & SMP_DIST_ID_KEY )
SMP_ALLOW_CMD ( smp , SMP_CMD_IDENT_INFO ) ;
2014-09-10 03:21:46 +04:00
else if ( smp - > remote_key_dist & SMP_DIST_SIGN )
SMP_ALLOW_CMD ( smp , SMP_CMD_SIGN_INFO ) ;
2014-09-05 23:19:55 +04:00
2011-07-08 01:59:39 +04:00
skb_pull ( skb , sizeof ( * rp ) ) ;
2011-07-08 01:59:34 +04:00
2012-02-03 04:08:01 +04:00
hci_dev_lock ( hdev ) ;
2013-10-13 13:23:39 +04:00
authenticated = ( hcon - > sec_level = = BT_SECURITY_HIGH ) ;
2014-06-16 20:25:16 +04:00
ltk = hci_add_ltk ( hdev , & hcon - > dst , hcon - > dst_type , SMP_LTK ,
2014-02-19 16:57:46 +04:00
authenticated , smp - > tk , smp - > enc_key_size ,
rp - > ediv , rp - > rand ) ;
smp - > ltk = ltk ;
2014-09-05 23:19:54 +04:00
if ( ! ( smp - > remote_key_dist & KEY_DIST_MASK ) )
2014-09-05 23:19:51 +04:00
smp_distribute_keys ( smp ) ;
2012-02-03 04:08:01 +04:00
hci_dev_unlock ( hdev ) ;
2011-07-08 01:59:34 +04:00
return 0 ;
}
2014-02-18 12:19:36 +04:00
static int smp_cmd_ident_info ( struct l2cap_conn * conn , struct sk_buff * skb )
{
struct smp_cmd_ident_info * info = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2014-02-18 12:19:36 +04:00
BT_DBG ( " " ) ;
if ( skb - > len < sizeof ( * info ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:36 +04:00
2014-09-05 23:19:55 +04:00
SMP_ALLOW_CMD ( smp , SMP_CMD_IDENT_ADDR_INFO ) ;
2014-02-18 12:19:37 +04:00
2014-02-18 12:19:36 +04:00
skb_pull ( skb , sizeof ( * info ) ) ;
memcpy ( smp - > irk , info - > irk , 16 ) ;
return 0 ;
}
static int smp_cmd_ident_addr_info ( struct l2cap_conn * conn ,
struct sk_buff * skb )
{
struct smp_cmd_ident_addr_info * info = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2014-02-18 12:19:36 +04:00
struct hci_conn * hcon = conn - > hcon ;
bdaddr_t rpa ;
BT_DBG ( " " ) ;
if ( skb - > len < sizeof ( * info ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-02-18 12:19:36 +04:00
2014-02-27 01:33:43 +04:00
/* Mark the information as received */
smp - > remote_key_dist & = ~ SMP_DIST_ID_KEY ;
2014-09-05 23:19:55 +04:00
if ( smp - > remote_key_dist & SMP_DIST_SIGN )
SMP_ALLOW_CMD ( smp , SMP_CMD_SIGN_INFO ) ;
2014-02-18 12:19:36 +04:00
skb_pull ( skb , sizeof ( * info ) ) ;
2014-06-27 15:23:02 +04:00
hci_dev_lock ( hcon - > hdev ) ;
2014-02-26 00:24:37 +04:00
/* Strictly speaking the Core Specification (4.1) allows sending
* an empty address which would force us to rely on just the IRK
* as " identity information " . However , since such
* implementations are not known of and in order to not over
* complicate our implementation , simply pretend that we never
* received an IRK for such a device .
*/
if ( ! bacmp ( & info - > bdaddr , BDADDR_ANY ) ) {
BT_ERR ( " Ignoring IRK with no identity address " ) ;
2014-06-27 15:23:02 +04:00
goto distribute ;
2014-02-26 00:24:37 +04:00
}
2014-02-18 12:19:36 +04:00
bacpy ( & smp - > id_addr , & info - > bdaddr ) ;
smp - > id_addr_type = info - > addr_type ;
if ( hci_bdaddr_is_rpa ( & hcon - > dst , hcon - > dst_type ) )
bacpy ( & rpa , & hcon - > dst ) ;
else
bacpy ( & rpa , BDADDR_ANY ) ;
2014-02-19 16:57:46 +04:00
smp - > remote_irk = hci_add_irk ( conn - > hcon - > hdev , & smp - > id_addr ,
smp - > id_addr_type , smp - > irk , & rpa ) ;
2014-02-18 12:19:36 +04:00
2014-06-27 15:23:02 +04:00
distribute :
2014-09-05 23:19:54 +04:00
if ( ! ( smp - > remote_key_dist & KEY_DIST_MASK ) )
smp_distribute_keys ( smp ) ;
2014-02-18 12:19:36 +04:00
2014-06-27 15:23:02 +04:00
hci_dev_unlock ( hcon - > hdev ) ;
2014-02-18 12:19:36 +04:00
return 0 ;
}
2014-03-09 23:19:17 +04:00
static int smp_cmd_sign_info ( struct l2cap_conn * conn , struct sk_buff * skb )
{
struct smp_cmd_sign_info * rp = ( void * ) skb - > data ;
2014-08-08 10:37:18 +04:00
struct l2cap_chan * chan = conn - > smp ;
struct smp_chan * smp = chan - > data ;
2014-03-09 23:19:17 +04:00
struct hci_dev * hdev = conn - > hcon - > hdev ;
struct smp_csrk * csrk ;
BT_DBG ( " conn %p " , conn ) ;
if ( skb - > len < sizeof ( * rp ) )
2014-05-08 15:19:11 +04:00
return SMP_INVALID_PARAMS ;
2014-03-09 23:19:17 +04:00
/* Mark the information as received */
smp - > remote_key_dist & = ~ SMP_DIST_SIGN ;
skb_pull ( skb , sizeof ( * rp ) ) ;
hci_dev_lock ( hdev ) ;
csrk = kzalloc ( sizeof ( * csrk ) , GFP_KERNEL ) ;
if ( csrk ) {
csrk - > master = 0x01 ;
memcpy ( csrk - > val , rp - > csrk , sizeof ( csrk - > val ) ) ;
}
smp - > csrk = csrk ;
2014-09-05 23:19:51 +04:00
smp_distribute_keys ( smp ) ;
2014-03-09 23:19:17 +04:00
hci_dev_unlock ( hdev ) ;
return 0 ;
}
2014-08-11 23:06:38 +04:00
static int smp_sig_channel ( struct l2cap_chan * chan , struct sk_buff * skb )
2011-06-10 01:50:40 +04:00
{
2014-08-08 10:37:18 +04:00
struct l2cap_conn * conn = chan - > conn ;
2013-10-03 11:00:57 +04:00
struct hci_conn * hcon = conn - > hcon ;
2014-09-05 23:19:55 +04:00
struct smp_chan * smp ;
2013-10-03 12:23:08 +04:00
__u8 code , reason ;
2011-06-10 01:50:40 +04:00
int err = 0 ;
2013-10-03 11:00:57 +04:00
if ( hcon - > type ! = LE_LINK ) {
kfree_skb ( skb ) ;
2013-10-16 12:37:01 +04:00
return 0 ;
2013-10-03 11:00:57 +04:00
}
2014-08-11 23:06:39 +04:00
if ( skb - > len < 1 )
2013-10-03 12:23:08 +04:00
return - EILSEQ ;
2013-10-18 14:43:00 +04:00
if ( ! test_bit ( HCI_LE_ENABLED , & hcon - > hdev - > dev_flags ) ) {
2011-07-01 02:20:56 +04:00
reason = SMP_PAIRING_NOTSUPP ;
goto done ;
}
2013-10-03 12:23:08 +04:00
code = skb - > data [ 0 ] ;
2011-06-10 01:50:40 +04:00
skb_pull ( skb , sizeof ( code ) ) ;
2014-09-05 23:19:55 +04:00
smp = chan - > data ;
if ( code > SMP_CMD_MAX )
goto drop ;
2014-09-11 04:37:43 +04:00
if ( smp & & ! test_and_clear_bit ( code , & smp - > allow_cmd ) )
2014-09-05 23:19:55 +04:00
goto drop ;
/* If we don't have a context the only allowed commands are
* pairing request and security request .
2013-01-29 20:44:23 +04:00
*/
2014-09-05 23:19:55 +04:00
if ( ! smp & & code ! = SMP_CMD_PAIRING_REQ & & code ! = SMP_CMD_SECURITY_REQ )
goto drop ;
2013-01-29 20:44:23 +04:00
2011-06-10 01:50:40 +04:00
switch ( code ) {
case SMP_CMD_PAIRING_REQ :
2011-06-10 01:50:53 +04:00
reason = smp_cmd_pairing_req ( conn , skb ) ;
2011-06-10 01:50:40 +04:00
break ;
case SMP_CMD_PAIRING_FAIL :
2013-11-06 13:24:57 +04:00
smp_failure ( conn , 0 ) ;
2011-06-10 01:50:53 +04:00
err = - EPERM ;
2011-06-10 01:50:40 +04:00
break ;
case SMP_CMD_PAIRING_RSP :
2011-06-10 01:50:53 +04:00
reason = smp_cmd_pairing_rsp ( conn , skb ) ;
2011-06-10 01:50:42 +04:00
break ;
case SMP_CMD_SECURITY_REQ :
2011-06-10 01:50:53 +04:00
reason = smp_cmd_security_req ( conn , skb ) ;
2011-06-10 01:50:42 +04:00
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_PAIRING_CONFIRM :
2011-06-10 01:50:53 +04:00
reason = smp_cmd_pairing_confirm ( conn , skb ) ;
2011-06-10 01:50:42 +04:00
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_PAIRING_RANDOM :
2011-06-10 01:50:53 +04:00
reason = smp_cmd_pairing_random ( conn , skb ) ;
2011-06-10 01:50:42 +04:00
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_ENCRYPT_INFO :
2011-07-08 01:59:34 +04:00
reason = smp_cmd_encrypt_info ( conn , skb ) ;
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_MASTER_IDENT :
2011-07-08 01:59:34 +04:00
reason = smp_cmd_master_ident ( conn , skb ) ;
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_IDENT_INFO :
2014-02-18 12:19:36 +04:00
reason = smp_cmd_ident_info ( conn , skb ) ;
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_IDENT_ADDR_INFO :
2014-02-18 12:19:36 +04:00
reason = smp_cmd_ident_addr_info ( conn , skb ) ;
break ;
2011-06-10 01:50:40 +04:00
case SMP_CMD_SIGN_INFO :
2014-03-09 23:19:17 +04:00
reason = smp_cmd_sign_info ( conn , skb ) ;
2011-07-08 01:59:34 +04:00
break ;
2011-06-10 01:50:40 +04:00
default :
BT_DBG ( " Unknown command code 0x%2.2x " , code ) ;
reason = SMP_CMD_NOTSUPP ;
2011-06-10 01:50:43 +04:00
goto done ;
2011-06-10 01:50:40 +04:00
}
2011-06-10 01:50:43 +04:00
done :
2014-08-18 21:33:31 +04:00
if ( ! err ) {
if ( reason )
smp_failure ( conn , reason ) ;
2014-08-11 23:06:39 +04:00
kfree_skb ( skb ) ;
2014-08-18 21:33:31 +04:00
}
2011-06-10 01:50:40 +04:00
return err ;
2014-09-05 23:19:55 +04:00
drop :
BT_ERR ( " %s unexpected SMP command 0x%02x from %pMR " , hcon - > hdev - > name ,
code , & hcon - > dst ) ;
kfree_skb ( skb ) ;
return 0 ;
2011-06-10 01:50:40 +04:00
}
2011-07-08 01:59:34 +04:00
2014-08-08 10:37:16 +04:00
static void smp_teardown_cb ( struct l2cap_chan * chan , int err )
{
struct l2cap_conn * conn = chan - > conn ;
BT_DBG ( " chan %p " , chan ) ;
2014-09-05 23:19:52 +04:00
if ( chan - > data )
2014-08-08 10:37:18 +04:00
smp_chan_destroy ( conn ) ;
2014-08-08 10:37:16 +04:00
conn - > smp = NULL ;
l2cap_chan_put ( chan ) ;
}
2014-08-11 23:06:36 +04:00
static void smp_resume_cb ( struct l2cap_chan * chan )
{
2014-08-11 23:06:40 +04:00
struct smp_chan * smp = chan - > data ;
2014-08-11 23:06:36 +04:00
struct l2cap_conn * conn = chan - > conn ;
struct hci_conn * hcon = conn - > hcon ;
BT_DBG ( " chan %p " , chan ) ;
2014-08-11 23:06:43 +04:00
if ( ! smp )
return ;
2014-08-11 23:06:40 +04:00
2014-09-05 23:19:49 +04:00
if ( ! test_bit ( HCI_CONN_ENCRYPT , & hcon - > flags ) )
return ;
2014-08-11 23:06:43 +04:00
cancel_delayed_work ( & smp - > security_timer ) ;
2014-09-05 23:19:51 +04:00
smp_distribute_keys ( smp ) ;
2014-08-11 23:06:36 +04:00
}
2014-08-08 10:37:16 +04:00
static void smp_ready_cb ( struct l2cap_chan * chan )
{
struct l2cap_conn * conn = chan - > conn ;
BT_DBG ( " chan %p " , chan ) ;
conn - > smp = chan ;
l2cap_chan_hold ( chan ) ;
}
2014-08-11 23:06:38 +04:00
static int smp_recv_cb ( struct l2cap_chan * chan , struct sk_buff * skb )
{
int err ;
BT_DBG ( " chan %p " , chan ) ;
err = smp_sig_channel ( chan , skb ) ;
if ( err ) {
2014-08-11 23:06:40 +04:00
struct smp_chan * smp = chan - > data ;
2014-08-11 23:06:38 +04:00
2014-08-11 23:06:40 +04:00
if ( smp )
cancel_delayed_work_sync ( & smp - > security_timer ) ;
2014-08-11 23:06:38 +04:00
2014-08-18 21:33:29 +04:00
hci_disconnect ( chan - > conn - > hcon , HCI_ERROR_AUTH_FAILURE ) ;
2014-08-11 23:06:38 +04:00
}
return err ;
}
2014-08-08 10:37:16 +04:00
static struct sk_buff * smp_alloc_skb_cb ( struct l2cap_chan * chan ,
unsigned long hdr_len ,
unsigned long len , int nb )
{
struct sk_buff * skb ;
skb = bt_skb_alloc ( hdr_len + len , GFP_KERNEL ) ;
if ( ! skb )
return ERR_PTR ( - ENOMEM ) ;
skb - > priority = HCI_PRIO_MAX ;
bt_cb ( skb ) - > chan = chan ;
return skb ;
}
static const struct l2cap_ops smp_chan_ops = {
. name = " Security Manager " ,
. ready = smp_ready_cb ,
2014-08-08 10:37:18 +04:00
. recv = smp_recv_cb ,
2014-08-08 10:37:16 +04:00
. alloc_skb = smp_alloc_skb_cb ,
. teardown = smp_teardown_cb ,
2014-08-11 23:06:36 +04:00
. resume = smp_resume_cb ,
2014-08-08 10:37:16 +04:00
. new_connection = l2cap_chan_no_new_connection ,
. state_change = l2cap_chan_no_state_change ,
. close = l2cap_chan_no_close ,
. defer = l2cap_chan_no_defer ,
. suspend = l2cap_chan_no_suspend ,
. set_shutdown = l2cap_chan_no_set_shutdown ,
. get_sndtimeo = l2cap_chan_no_get_sndtimeo ,
. memcpy_fromiovec = l2cap_chan_no_memcpy_fromiovec ,
} ;
static inline struct l2cap_chan * smp_new_conn_cb ( struct l2cap_chan * pchan )
{
struct l2cap_chan * chan ;
BT_DBG ( " pchan %p " , pchan ) ;
chan = l2cap_chan_create ( ) ;
if ( ! chan )
return NULL ;
chan - > chan_type = pchan - > chan_type ;
chan - > ops = & smp_chan_ops ;
chan - > scid = pchan - > scid ;
chan - > dcid = chan - > scid ;
chan - > imtu = pchan - > imtu ;
chan - > omtu = pchan - > omtu ;
chan - > mode = pchan - > mode ;
BT_DBG ( " created chan %p " , chan ) ;
return chan ;
}
static const struct l2cap_ops smp_root_chan_ops = {
. name = " Security Manager Root " ,
. new_connection = smp_new_conn_cb ,
/* None of these are implemented for the root channel */
. close = l2cap_chan_no_close ,
. alloc_skb = l2cap_chan_no_alloc_skb ,
. recv = l2cap_chan_no_recv ,
. state_change = l2cap_chan_no_state_change ,
. teardown = l2cap_chan_no_teardown ,
. ready = l2cap_chan_no_ready ,
. defer = l2cap_chan_no_defer ,
. suspend = l2cap_chan_no_suspend ,
. resume = l2cap_chan_no_resume ,
. set_shutdown = l2cap_chan_no_set_shutdown ,
. get_sndtimeo = l2cap_chan_no_get_sndtimeo ,
. memcpy_fromiovec = l2cap_chan_no_memcpy_fromiovec ,
} ;
2014-08-08 10:32:52 +04:00
int smp_register ( struct hci_dev * hdev )
{
2014-08-08 10:37:16 +04:00
struct l2cap_chan * chan ;
2014-08-08 10:37:17 +04:00
struct crypto_blkcipher * tfm_aes ;
2014-08-08 10:37:16 +04:00
2014-08-08 10:32:52 +04:00
BT_DBG ( " %s " , hdev - > name ) ;
2014-08-08 10:37:17 +04:00
tfm_aes = crypto_alloc_blkcipher ( " ecb(aes) " , 0 , CRYPTO_ALG_ASYNC ) ;
if ( IS_ERR ( tfm_aes ) ) {
int err = PTR_ERR ( tfm_aes ) ;
2014-08-08 10:32:52 +04:00
BT_ERR ( " Unable to create crypto context " ) ;
return err ;
}
2014-08-08 10:37:16 +04:00
chan = l2cap_chan_create ( ) ;
if ( ! chan ) {
2014-08-08 10:37:17 +04:00
crypto_free_blkcipher ( tfm_aes ) ;
2014-08-08 10:37:16 +04:00
return - ENOMEM ;
}
2014-08-08 10:37:17 +04:00
chan - > data = tfm_aes ;
2014-08-08 10:37:18 +04:00
l2cap_add_scid ( chan , L2CAP_CID_SMP ) ;
2014-08-08 10:37:16 +04:00
l2cap_chan_set_defaults ( chan ) ;
bacpy ( & chan - > src , & hdev - > bdaddr ) ;
chan - > src_type = BDADDR_LE_PUBLIC ;
chan - > state = BT_LISTEN ;
chan - > mode = L2CAP_MODE_BASIC ;
chan - > imtu = L2CAP_DEFAULT_MTU ;
chan - > ops = & smp_root_chan_ops ;
hdev - > smp_data = chan ;
2014-08-08 10:32:52 +04:00
return 0 ;
}
void smp_unregister ( struct hci_dev * hdev )
{
2014-08-08 10:37:16 +04:00
struct l2cap_chan * chan = hdev - > smp_data ;
2014-08-08 10:37:17 +04:00
struct crypto_blkcipher * tfm_aes ;
2014-08-08 10:37:16 +04:00
if ( ! chan )
return ;
BT_DBG ( " %s chan %p " , hdev - > name , chan ) ;
2014-08-08 10:32:52 +04:00
2014-08-08 10:37:17 +04:00
tfm_aes = chan - > data ;
if ( tfm_aes ) {
chan - > data = NULL ;
crypto_free_blkcipher ( tfm_aes ) ;
2014-08-08 10:32:52 +04:00
}
2014-08-08 10:37:16 +04:00
hdev - > smp_data = NULL ;
l2cap_chan_put ( chan ) ;
2014-08-08 10:32:52 +04:00
}