blob: a17761c838207c76a1c18b7444f474151cf680e5 [file] [log] [blame]
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
4
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
8
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
21*/
22
Gustavo Padovan8c520a52012-05-23 04:04:22 -030023#include <linux/crypto.h>
24#include <linux/scatterlist.h>
25#include <crypto/b128ops.h>
26
Anderson Brigliaeb492e02011-06-09 18:50:40 -030027#include <net/bluetooth/bluetooth.h>
28#include <net/bluetooth/hci_core.h>
29#include <net/bluetooth/l2cap.h>
Brian Gix2b64d152011-12-21 16:12:12 -080030#include <net/bluetooth/mgmt.h>
Marcel Holtmannac4b7232013-10-10 14:54:16 -070031
32#include "smp.h"
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030033
Marcel Holtmann17b02e62012-03-01 14:32:37 -080034#define SMP_TIMEOUT msecs_to_jiffies(30000)
Vinicius Costa Gomes5d3de7d2011-06-14 13:37:41 -030035
Johan Hedberg065a13e2012-10-11 16:26:06 +020036#define AUTH_REQ_MASK 0x07
37
Johan Hedberg533e35d2014-06-16 19:25:18 +030038enum {
39 SMP_FLAG_TK_VALID,
40 SMP_FLAG_CFM_PENDING,
41 SMP_FLAG_MITM_AUTH,
42 SMP_FLAG_COMPLETE,
43 SMP_FLAG_INITIATOR,
44};
Johan Hedberg4bc58f52014-05-20 09:45:47 +030045
46struct smp_chan {
47 struct l2cap_conn *conn;
48 u8 preq[7]; /* SMP Pairing Request */
49 u8 prsp[7]; /* SMP Pairing Response */
50 u8 prnd[16]; /* SMP Pairing Random (local) */
51 u8 rrnd[16]; /* SMP Pairing Random (remote) */
52 u8 pcnf[16]; /* SMP Pairing Confirm */
53 u8 tk[16]; /* SMP Temporary Key */
54 u8 enc_key_size;
55 u8 remote_key_dist;
56 bdaddr_t id_addr;
57 u8 id_addr_type;
58 u8 irk[16];
59 struct smp_csrk *csrk;
60 struct smp_csrk *slave_csrk;
61 struct smp_ltk *ltk;
62 struct smp_ltk *slave_ltk;
63 struct smp_irk *remote_irk;
Johan Hedberg4a74d652014-05-20 09:45:50 +030064 unsigned long flags;
Johan Hedberg6a7bd102014-06-27 14:23:03 +030065
66 struct crypto_blkcipher *tfm_aes;
Johan Hedberg4bc58f52014-05-20 09:45:47 +030067};
68
Johan Hedberg8a2936f2014-06-16 19:25:19 +030069static inline void swap_buf(const u8 *src, u8 *dst, size_t len)
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030070{
Johan Hedberg8a2936f2014-06-16 19:25:19 +030071 size_t i;
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030072
Johan Hedberg8a2936f2014-06-16 19:25:19 +030073 for (i = 0; i < len; i++)
74 dst[len - 1 - i] = src[i];
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030075}
76
77static int smp_e(struct crypto_blkcipher *tfm, const u8 *k, u8 *r)
78{
79 struct blkcipher_desc desc;
80 struct scatterlist sg;
Johan Hedberg943a7322014-03-18 12:58:24 +020081 uint8_t tmp[16], data[16];
Johan Hedberg201a5922013-12-02 10:49:04 +020082 int err;
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030083
84 if (tfm == NULL) {
85 BT_ERR("tfm %p", tfm);
86 return -EINVAL;
87 }
88
89 desc.tfm = tfm;
90 desc.flags = 0;
91
Johan Hedberg943a7322014-03-18 12:58:24 +020092 /* The most significant octet of key corresponds to k[0] */
Johan Hedberg8a2936f2014-06-16 19:25:19 +030093 swap_buf(k, tmp, 16);
Johan Hedberg943a7322014-03-18 12:58:24 +020094
95 err = crypto_blkcipher_setkey(tfm, tmp, 16);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030096 if (err) {
97 BT_ERR("cipher setkey failed: %d", err);
98 return err;
99 }
100
Johan Hedberg943a7322014-03-18 12:58:24 +0200101 /* Most significant octet of plaintextData corresponds to data[0] */
Johan Hedberg8a2936f2014-06-16 19:25:19 +0300102 swap_buf(r, data, 16);
Johan Hedberg943a7322014-03-18 12:58:24 +0200103
104 sg_init_one(&sg, data, 16);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300105
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300106 err = crypto_blkcipher_encrypt(&desc, &sg, &sg, 16);
107 if (err)
108 BT_ERR("Encrypt data error %d", err);
109
Johan Hedberg943a7322014-03-18 12:58:24 +0200110 /* Most significant octet of encryptedData corresponds to data[0] */
Johan Hedberg8a2936f2014-06-16 19:25:19 +0300111 swap_buf(data, r, 16);
Johan Hedberg943a7322014-03-18 12:58:24 +0200112
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300113 return err;
114}
115
Johan Hedberg60478052014-02-18 10:19:31 +0200116static int smp_ah(struct crypto_blkcipher *tfm, u8 irk[16], u8 r[3], u8 res[3])
117{
Johan Hedberg943a7322014-03-18 12:58:24 +0200118 u8 _res[16];
Johan Hedberg60478052014-02-18 10:19:31 +0200119 int err;
120
121 /* r' = padding || r */
Johan Hedberg943a7322014-03-18 12:58:24 +0200122 memcpy(_res, r, 3);
123 memset(_res + 3, 0, 13);
Johan Hedberg60478052014-02-18 10:19:31 +0200124
Johan Hedberg943a7322014-03-18 12:58:24 +0200125 err = smp_e(tfm, irk, _res);
Johan Hedberg60478052014-02-18 10:19:31 +0200126 if (err) {
127 BT_ERR("Encrypt error");
128 return err;
129 }
130
131 /* The output of the random address function ah is:
132 * ah(h, r) = e(k, r') mod 2^24
133 * The output of the security function e is then truncated to 24 bits
134 * by taking the least significant 24 bits of the output of e as the
135 * result of ah.
136 */
Johan Hedberg943a7322014-03-18 12:58:24 +0200137 memcpy(res, _res, 3);
Johan Hedberg60478052014-02-18 10:19:31 +0200138
139 return 0;
140}
141
142bool smp_irk_matches(struct crypto_blkcipher *tfm, u8 irk[16],
143 bdaddr_t *bdaddr)
144{
145 u8 hash[3];
146 int err;
147
148 BT_DBG("RPA %pMR IRK %*phN", bdaddr, 16, irk);
149
150 err = smp_ah(tfm, irk, &bdaddr->b[3], hash);
151 if (err)
152 return false;
153
154 return !memcmp(bdaddr->b, hash, 3);
155}
156
Johan Hedbergb1e2b3a2014-02-23 19:42:19 +0200157int smp_generate_rpa(struct crypto_blkcipher *tfm, u8 irk[16], bdaddr_t *rpa)
158{
159 int err;
160
161 get_random_bytes(&rpa->b[3], 3);
162
163 rpa->b[5] &= 0x3f; /* Clear two most significant bits */
164 rpa->b[5] |= 0x40; /* Set second most significant bit */
165
166 err = smp_ah(tfm, irk, &rpa->b[3], rpa->b);
167 if (err < 0)
168 return err;
169
170 BT_DBG("RPA %pMR", rpa);
171
172 return 0;
173}
174
Johan Hedbergec70f362014-06-27 14:23:04 +0300175static int smp_c1(struct smp_chan *smp, u8 k[16], u8 r[16], u8 preq[7],
176 u8 pres[7], u8 _iat, bdaddr_t *ia, u8 _rat, bdaddr_t *ra,
177 u8 res[16])
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300178{
Johan Hedbergec70f362014-06-27 14:23:04 +0300179 struct hci_dev *hdev = smp->conn->hcon->hdev;
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300180 u8 p1[16], p2[16];
181 int err;
182
Johan Hedbergec70f362014-06-27 14:23:04 +0300183 BT_DBG("%s", hdev->name);
184
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300185 memset(p1, 0, 16);
186
187 /* p1 = pres || preq || _rat || _iat */
Johan Hedberg943a7322014-03-18 12:58:24 +0200188 p1[0] = _iat;
189 p1[1] = _rat;
190 memcpy(p1 + 2, preq, 7);
191 memcpy(p1 + 9, pres, 7);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300192
193 /* p2 = padding || ia || ra */
Johan Hedberg943a7322014-03-18 12:58:24 +0200194 memcpy(p2, ra, 6);
195 memcpy(p2 + 6, ia, 6);
196 memset(p2 + 12, 0, 4);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300197
198 /* res = r XOR p1 */
199 u128_xor((u128 *) res, (u128 *) r, (u128 *) p1);
200
201 /* res = e(k, res) */
Johan Hedbergec70f362014-06-27 14:23:04 +0300202 err = smp_e(smp->tfm_aes, k, res);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300203 if (err) {
204 BT_ERR("Encrypt data error");
205 return err;
206 }
207
208 /* res = res XOR p2 */
209 u128_xor((u128 *) res, (u128 *) res, (u128 *) p2);
210
211 /* res = e(k, res) */
Johan Hedbergec70f362014-06-27 14:23:04 +0300212 err = smp_e(smp->tfm_aes, k, res);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300213 if (err)
214 BT_ERR("Encrypt data error");
215
216 return err;
217}
218
Johan Hedbergec70f362014-06-27 14:23:04 +0300219static int smp_s1(struct smp_chan *smp, u8 k[16], u8 r1[16], u8 r2[16],
220 u8 _r[16])
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300221{
Johan Hedbergec70f362014-06-27 14:23:04 +0300222 struct hci_dev *hdev = smp->conn->hcon->hdev;
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300223 int err;
224
Johan Hedbergec70f362014-06-27 14:23:04 +0300225 BT_DBG("%s", hdev->name);
226
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300227 /* Just least significant octets from r1 and r2 are considered */
Johan Hedberg943a7322014-03-18 12:58:24 +0200228 memcpy(_r, r2, 8);
229 memcpy(_r + 8, r1, 8);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300230
Johan Hedbergec70f362014-06-27 14:23:04 +0300231 err = smp_e(smp->tfm_aes, k, _r);
Anderson Brigliad22ef0b2011-06-09 18:50:44 -0300232 if (err)
233 BT_ERR("Encrypt data error");
234
235 return err;
236}
237
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300238static struct sk_buff *smp_build_cmd(struct l2cap_conn *conn, u8 code,
Marcel Holtmannf1560462013-10-13 05:43:25 -0700239 u16 dlen, void *data)
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300240{
241 struct sk_buff *skb;
242 struct l2cap_hdr *lh;
243 int len;
244
245 len = L2CAP_HDR_SIZE + sizeof(code) + dlen;
246
247 if (len > conn->mtu)
248 return NULL;
249
250 skb = bt_skb_alloc(len, GFP_ATOMIC);
251 if (!skb)
252 return NULL;
253
254 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
255 lh->len = cpu_to_le16(sizeof(code) + dlen);
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700256 lh->cid = cpu_to_le16(L2CAP_CID_SMP);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300257
258 memcpy(skb_put(skb, sizeof(code)), &code, sizeof(code));
259
260 memcpy(skb_put(skb, dlen), data, dlen);
261
262 return skb;
263}
264
265static void smp_send_cmd(struct l2cap_conn *conn, u8 code, u16 len, void *data)
266{
267 struct sk_buff *skb = smp_build_cmd(conn, code, len, data);
268
269 BT_DBG("code 0x%2.2x", code);
270
271 if (!skb)
272 return;
273
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +0200274 skb->priority = HCI_PRIO_MAX;
275 hci_send_acl(conn->hchan, skb, 0);
Vinicius Costa Gomese2dcd112011-08-19 21:06:50 -0300276
Gustavo F. Padovan6c9d42a2011-12-20 10:57:27 -0200277 cancel_delayed_work_sync(&conn->security_timer);
Marcel Holtmann17b02e62012-03-01 14:32:37 -0800278 schedule_delayed_work(&conn->security_timer, SMP_TIMEOUT);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300279}
280
Brian Gix2b64d152011-12-21 16:12:12 -0800281static __u8 authreq_to_seclevel(__u8 authreq)
282{
283 if (authreq & SMP_AUTH_MITM)
284 return BT_SECURITY_HIGH;
285 else
286 return BT_SECURITY_MEDIUM;
287}
288
289static __u8 seclevel_to_authreq(__u8 sec_level)
290{
291 switch (sec_level) {
292 case BT_SECURITY_HIGH:
293 return SMP_AUTH_MITM | SMP_AUTH_BONDING;
294 case BT_SECURITY_MEDIUM:
295 return SMP_AUTH_BONDING;
296 default:
297 return SMP_AUTH_NONE;
298 }
299}
300
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300301static void build_pairing_cmd(struct l2cap_conn *conn,
Marcel Holtmannf1560462013-10-13 05:43:25 -0700302 struct smp_cmd_pairing *req,
303 struct smp_cmd_pairing *rsp, __u8 authreq)
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300304{
Johan Hedbergfd349c02014-02-18 10:19:36 +0200305 struct smp_chan *smp = conn->smp_chan;
306 struct hci_conn *hcon = conn->hcon;
307 struct hci_dev *hdev = hcon->hdev;
308 u8 local_dist = 0, remote_dist = 0;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300309
Johan Hedberga8b2d5c2012-01-08 23:11:15 +0200310 if (test_bit(HCI_PAIRABLE, &conn->hcon->hdev->dev_flags)) {
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -0700311 local_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN;
312 remote_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300313 authreq |= SMP_AUTH_BONDING;
Brian Gix2b64d152011-12-21 16:12:12 -0800314 } else {
315 authreq &= ~SMP_AUTH_BONDING;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300316 }
317
Johan Hedbergfd349c02014-02-18 10:19:36 +0200318 if (test_bit(HCI_RPA_RESOLVING, &hdev->dev_flags))
319 remote_dist |= SMP_DIST_ID_KEY;
320
Johan Hedberg863efaf2014-02-22 19:06:32 +0200321 if (test_bit(HCI_PRIVACY, &hdev->dev_flags))
322 local_dist |= SMP_DIST_ID_KEY;
323
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300324 if (rsp == NULL) {
325 req->io_capability = conn->hcon->io_capability;
326 req->oob_flag = SMP_OOB_NOT_PRESENT;
327 req->max_key_size = SMP_MAX_ENC_KEY_SIZE;
Johan Hedbergfd349c02014-02-18 10:19:36 +0200328 req->init_key_dist = local_dist;
329 req->resp_key_dist = remote_dist;
Johan Hedberg065a13e2012-10-11 16:26:06 +0200330 req->auth_req = (authreq & AUTH_REQ_MASK);
Johan Hedbergfd349c02014-02-18 10:19:36 +0200331
332 smp->remote_key_dist = remote_dist;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300333 return;
334 }
335
336 rsp->io_capability = conn->hcon->io_capability;
337 rsp->oob_flag = SMP_OOB_NOT_PRESENT;
338 rsp->max_key_size = SMP_MAX_ENC_KEY_SIZE;
Johan Hedbergfd349c02014-02-18 10:19:36 +0200339 rsp->init_key_dist = req->init_key_dist & remote_dist;
340 rsp->resp_key_dist = req->resp_key_dist & local_dist;
Johan Hedberg065a13e2012-10-11 16:26:06 +0200341 rsp->auth_req = (authreq & AUTH_REQ_MASK);
Johan Hedbergfd349c02014-02-18 10:19:36 +0200342
343 smp->remote_key_dist = rsp->init_key_dist;
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300344}
345
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300346static u8 check_enc_key_size(struct l2cap_conn *conn, __u8 max_key_size)
347{
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300348 struct smp_chan *smp = conn->smp_chan;
349
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300350 if ((max_key_size > SMP_MAX_ENC_KEY_SIZE) ||
Marcel Holtmannf1560462013-10-13 05:43:25 -0700351 (max_key_size < SMP_MIN_ENC_KEY_SIZE))
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300352 return SMP_ENC_KEY_SIZE;
353
Vinicius Costa Gomesf7aa6112012-01-30 19:29:12 -0300354 smp->enc_key_size = max_key_size;
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300355
356 return 0;
357}
358
Johan Hedberg84794e12013-11-06 11:24:57 +0200359static void smp_failure(struct l2cap_conn *conn, u8 reason)
Brian Gix4f957a72011-11-23 08:28:36 -0800360{
Johan Hedbergbab73cb2012-02-09 16:07:29 +0200361 struct hci_conn *hcon = conn->hcon;
362
Johan Hedberg84794e12013-11-06 11:24:57 +0200363 if (reason)
Brian Gix4f957a72011-11-23 08:28:36 -0800364 smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason),
Marcel Holtmannf1560462013-10-13 05:43:25 -0700365 &reason);
Brian Gix4f957a72011-11-23 08:28:36 -0800366
Marcel Holtmannce39fb42013-10-13 02:23:39 -0700367 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags);
368 mgmt_auth_failed(hcon->hdev, &hcon->dst, hcon->type, hcon->dst_type,
369 HCI_ERROR_AUTH_FAILURE);
Vinicius Costa Gomesf1c09c02012-02-01 18:27:56 -0300370
Andre Guedes61a0cfb2012-08-01 20:34:15 -0300371 cancel_delayed_work_sync(&conn->security_timer);
372
Marcel Holtmannce39fb42013-10-13 02:23:39 -0700373 if (test_and_clear_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
Vinicius Costa Gomesf1c09c02012-02-01 18:27:56 -0300374 smp_chan_destroy(conn);
Brian Gix4f957a72011-11-23 08:28:36 -0800375}
376
Brian Gix2b64d152011-12-21 16:12:12 -0800377#define JUST_WORKS 0x00
378#define JUST_CFM 0x01
379#define REQ_PASSKEY 0x02
380#define CFM_PASSKEY 0x03
381#define REQ_OOB 0x04
382#define OVERLAP 0xFF
383
384static const u8 gen_method[5][5] = {
385 { JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY },
386 { JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY },
387 { CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, CFM_PASSKEY },
388 { JUST_WORKS, JUST_CFM, JUST_WORKS, JUST_WORKS, JUST_CFM },
389 { CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, OVERLAP },
390};
391
Johan Hedberg581370c2014-06-17 13:07:38 +0300392static u8 get_auth_method(struct smp_chan *smp, u8 local_io, u8 remote_io)
393{
Johan Hedberg2bcd4002014-07-09 19:18:09 +0300394 /* If either side has unknown io_caps, use JUST_CFM (which gets
395 * converted later to JUST_WORKS if we're initiators.
396 */
Johan Hedberg581370c2014-06-17 13:07:38 +0300397 if (local_io > SMP_IO_KEYBOARD_DISPLAY ||
398 remote_io > SMP_IO_KEYBOARD_DISPLAY)
Johan Hedberg2bcd4002014-07-09 19:18:09 +0300399 return JUST_CFM;
Johan Hedberg581370c2014-06-17 13:07:38 +0300400
401 return gen_method[remote_io][local_io];
402}
403
Brian Gix2b64d152011-12-21 16:12:12 -0800404static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth,
405 u8 local_io, u8 remote_io)
406{
407 struct hci_conn *hcon = conn->hcon;
408 struct smp_chan *smp = conn->smp_chan;
409 u8 method;
410 u32 passkey = 0;
411 int ret = 0;
412
413 /* Initialize key for JUST WORKS */
414 memset(smp->tk, 0, sizeof(smp->tk));
Johan Hedberg4a74d652014-05-20 09:45:50 +0300415 clear_bit(SMP_FLAG_TK_VALID, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800416
417 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io);
418
Johan Hedberg2bcd4002014-07-09 19:18:09 +0300419 /* If neither side wants MITM, either "just" confirm an incoming
420 * request or use just-works for outgoing ones. The JUST_CFM
421 * will be converted to JUST_WORKS if necessary later in this
422 * function. If either side has MITM look up the method from the
423 * table.
424 */
Johan Hedberg581370c2014-06-17 13:07:38 +0300425 if (!(auth & SMP_AUTH_MITM))
Johan Hedberg2bcd4002014-07-09 19:18:09 +0300426 method = JUST_CFM;
Brian Gix2b64d152011-12-21 16:12:12 -0800427 else
Johan Hedberg581370c2014-06-17 13:07:38 +0300428 method = get_auth_method(smp, local_io, remote_io);
Brian Gix2b64d152011-12-21 16:12:12 -0800429
430 /* If not bonding, don't ask user to confirm a Zero TK */
431 if (!(auth & SMP_AUTH_BONDING) && method == JUST_CFM)
432 method = JUST_WORKS;
433
Johan Hedberga82505c2014-03-24 14:39:07 +0200434 /* Don't confirm locally initiated pairing attempts */
Johan Hedberg4a74d652014-05-20 09:45:50 +0300435 if (method == JUST_CFM && test_bit(SMP_FLAG_INITIATOR, &smp->flags))
Johan Hedberga82505c2014-03-24 14:39:07 +0200436 method = JUST_WORKS;
437
Brian Gix2b64d152011-12-21 16:12:12 -0800438 /* If Just Works, Continue with Zero TK */
439 if (method == JUST_WORKS) {
Johan Hedberg4a74d652014-05-20 09:45:50 +0300440 set_bit(SMP_FLAG_TK_VALID, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800441 return 0;
442 }
443
444 /* Not Just Works/Confirm results in MITM Authentication */
445 if (method != JUST_CFM)
Johan Hedberg4a74d652014-05-20 09:45:50 +0300446 set_bit(SMP_FLAG_MITM_AUTH, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800447
448 /* If both devices have Keyoard-Display I/O, the master
449 * Confirms and the slave Enters the passkey.
450 */
451 if (method == OVERLAP) {
Johan Hedberg4dae2792014-06-24 17:03:50 +0300452 if (test_bit(HCI_CONN_MASTER, &hcon->flags))
Brian Gix2b64d152011-12-21 16:12:12 -0800453 method = CFM_PASSKEY;
454 else
455 method = REQ_PASSKEY;
456 }
457
Johan Hedberg01ad34d2014-03-19 14:14:53 +0200458 /* Generate random passkey. */
Brian Gix2b64d152011-12-21 16:12:12 -0800459 if (method == CFM_PASSKEY) {
Johan Hedberg943a7322014-03-18 12:58:24 +0200460 memset(smp->tk, 0, sizeof(smp->tk));
Brian Gix2b64d152011-12-21 16:12:12 -0800461 get_random_bytes(&passkey, sizeof(passkey));
462 passkey %= 1000000;
Johan Hedberg943a7322014-03-18 12:58:24 +0200463 put_unaligned_le32(passkey, smp->tk);
Brian Gix2b64d152011-12-21 16:12:12 -0800464 BT_DBG("PassKey: %d", passkey);
Johan Hedberg4a74d652014-05-20 09:45:50 +0300465 set_bit(SMP_FLAG_TK_VALID, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800466 }
467
468 hci_dev_lock(hcon->hdev);
469
470 if (method == REQ_PASSKEY)
Marcel Holtmannce39fb42013-10-13 02:23:39 -0700471 ret = mgmt_user_passkey_request(hcon->hdev, &hcon->dst,
Johan Hedberg272d90d2012-02-09 15:26:12 +0200472 hcon->type, hcon->dst_type);
Johan Hedberg4eb65e62014-03-24 14:39:05 +0200473 else if (method == JUST_CFM)
474 ret = mgmt_user_confirm_request(hcon->hdev, &hcon->dst,
475 hcon->type, hcon->dst_type,
476 passkey, 1);
Brian Gix2b64d152011-12-21 16:12:12 -0800477 else
Johan Hedberg01ad34d2014-03-19 14:14:53 +0200478 ret = mgmt_user_passkey_notify(hcon->hdev, &hcon->dst,
Johan Hedberg272d90d2012-02-09 15:26:12 +0200479 hcon->type, hcon->dst_type,
Johan Hedberg39adbff2014-03-20 08:18:14 +0200480 passkey, 0);
Brian Gix2b64d152011-12-21 16:12:12 -0800481
482 hci_dev_unlock(hcon->hdev);
483
484 return ret;
485}
486
Johan Hedberg1cc61142014-05-20 09:45:52 +0300487static u8 smp_confirm(struct smp_chan *smp)
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300488{
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300489 struct l2cap_conn *conn = smp->conn;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300490 struct smp_cmd_pairing_confirm cp;
491 int ret;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300492
493 BT_DBG("conn %p", conn);
494
Johan Hedbergec70f362014-06-27 14:23:04 +0300495 ret = smp_c1(smp, smp->tk, smp->prnd, smp->preq, smp->prsp,
Johan Hedbergb1cd5fd2014-02-28 12:54:17 +0200496 conn->hcon->init_addr_type, &conn->hcon->init_addr,
Johan Hedberg943a7322014-03-18 12:58:24 +0200497 conn->hcon->resp_addr_type, &conn->hcon->resp_addr,
498 cp.confirm_val);
Johan Hedberg1cc61142014-05-20 09:45:52 +0300499 if (ret)
500 return SMP_UNSPECIFIED;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300501
Johan Hedberg4a74d652014-05-20 09:45:50 +0300502 clear_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800503
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300504 smp_send_cmd(smp->conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp);
505
Johan Hedberg1cc61142014-05-20 09:45:52 +0300506 return 0;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300507}
508
Johan Hedberg861580a2014-05-20 09:45:51 +0300509static u8 smp_random(struct smp_chan *smp)
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300510{
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300511 struct l2cap_conn *conn = smp->conn;
512 struct hci_conn *hcon = conn->hcon;
Johan Hedberg861580a2014-05-20 09:45:51 +0300513 u8 confirm[16];
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300514 int ret;
515
Johan Hedbergec70f362014-06-27 14:23:04 +0300516 if (IS_ERR_OR_NULL(smp->tfm_aes))
Johan Hedberg861580a2014-05-20 09:45:51 +0300517 return SMP_UNSPECIFIED;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300518
519 BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
520
Johan Hedbergec70f362014-06-27 14:23:04 +0300521 ret = smp_c1(smp, smp->tk, smp->rrnd, smp->preq, smp->prsp,
Johan Hedbergb1cd5fd2014-02-28 12:54:17 +0200522 hcon->init_addr_type, &hcon->init_addr,
Johan Hedberg943a7322014-03-18 12:58:24 +0200523 hcon->resp_addr_type, &hcon->resp_addr, confirm);
Johan Hedberg861580a2014-05-20 09:45:51 +0300524 if (ret)
525 return SMP_UNSPECIFIED;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300526
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300527 if (memcmp(smp->pcnf, confirm, sizeof(smp->pcnf)) != 0) {
528 BT_ERR("Pairing failed (confirmation values mismatch)");
Johan Hedberg861580a2014-05-20 09:45:51 +0300529 return SMP_CONFIRM_FAILED;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300530 }
531
532 if (hcon->out) {
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -0800533 u8 stk[16];
534 __le64 rand = 0;
535 __le16 ediv = 0;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300536
Johan Hedbergec70f362014-06-27 14:23:04 +0300537 smp_s1(smp, smp->tk, smp->rrnd, smp->prnd, stk);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300538
Vinicius Costa Gomesf7aa6112012-01-30 19:29:12 -0300539 memset(stk + smp->enc_key_size, 0,
Gustavo F. Padovan04124682012-03-08 01:25:00 -0300540 SMP_MAX_ENC_KEY_SIZE - smp->enc_key_size);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300541
Johan Hedberg861580a2014-05-20 09:45:51 +0300542 if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags))
543 return SMP_UNSPECIFIED;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300544
545 hci_le_start_enc(hcon, ediv, rand, stk);
Vinicius Costa Gomesf7aa6112012-01-30 19:29:12 -0300546 hcon->enc_key_size = smp->enc_key_size;
Johan Hedbergfe59a052014-07-01 19:14:12 +0300547 set_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300548 } else {
Johan Hedbergfff34902014-06-10 15:19:50 +0300549 u8 stk[16], auth;
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -0800550 __le64 rand = 0;
551 __le16 ediv = 0;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300552
Johan Hedberg943a7322014-03-18 12:58:24 +0200553 smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd),
554 smp->prnd);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300555
Johan Hedbergec70f362014-06-27 14:23:04 +0300556 smp_s1(smp, smp->tk, smp->prnd, smp->rrnd, stk);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300557
Vinicius Costa Gomesf7aa6112012-01-30 19:29:12 -0300558 memset(stk + smp->enc_key_size, 0,
Marcel Holtmannf1560462013-10-13 05:43:25 -0700559 SMP_MAX_ENC_KEY_SIZE - smp->enc_key_size);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300560
Johan Hedbergfff34902014-06-10 15:19:50 +0300561 if (hcon->pending_sec_level == BT_SECURITY_HIGH)
562 auth = 1;
563 else
564 auth = 0;
565
Johan Hedberg7d5843b2014-06-16 19:25:15 +0300566 /* Even though there's no _SLAVE suffix this is the
567 * slave STK we're adding for later lookup (the master
568 * STK never needs to be stored).
569 */
Marcel Holtmannce39fb42013-10-13 02:23:39 -0700570 hci_add_ltk(hcon->hdev, &hcon->dst, hcon->dst_type,
Johan Hedberg2ceba532014-06-16 19:25:16 +0300571 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300572 }
573
Johan Hedberg861580a2014-05-20 09:45:51 +0300574 return 0;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300575}
576
577static struct smp_chan *smp_chan_create(struct l2cap_conn *conn)
578{
579 struct smp_chan *smp;
580
Marcel Holtmannf1560462013-10-13 05:43:25 -0700581 smp = kzalloc(sizeof(*smp), GFP_ATOMIC);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300582 if (!smp)
583 return NULL;
584
Johan Hedberg6a7bd102014-06-27 14:23:03 +0300585 smp->tfm_aes = crypto_alloc_blkcipher("ecb(aes)", 0, CRYPTO_ALG_ASYNC);
586 if (IS_ERR(smp->tfm_aes)) {
587 BT_ERR("Unable to create ECB crypto context");
588 kfree(smp);
589 return NULL;
590 }
591
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300592 smp->conn = conn;
593 conn->smp_chan = smp;
594
595 hci_conn_hold(conn->hcon);
596
597 return smp;
598}
599
600void smp_chan_destroy(struct l2cap_conn *conn)
601{
Brian Gixc8eb9692011-11-23 08:28:35 -0800602 struct smp_chan *smp = conn->smp_chan;
Johan Hedbergf4a407b2014-02-18 21:41:34 +0200603 bool complete;
Brian Gixc8eb9692011-11-23 08:28:35 -0800604
Vinicius Costa Gomesf1c09c02012-02-01 18:27:56 -0300605 BUG_ON(!smp);
Brian Gixc8eb9692011-11-23 08:28:35 -0800606
Johan Hedberg4a74d652014-05-20 09:45:50 +0300607 complete = test_bit(SMP_FLAG_COMPLETE, &smp->flags);
Johan Hedbergf4a407b2014-02-18 21:41:34 +0200608 mgmt_smp_complete(conn->hcon, complete);
609
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -0700610 kfree(smp->csrk);
611 kfree(smp->slave_csrk);
612
Johan Hedberg6a7bd102014-06-27 14:23:03 +0300613 crypto_free_blkcipher(smp->tfm_aes);
614
Johan Hedberg759331d2014-02-28 10:10:16 +0200615 /* If pairing failed clean up any keys we might have */
616 if (!complete) {
617 if (smp->ltk) {
618 list_del(&smp->ltk->list);
619 kfree(smp->ltk);
620 }
621
622 if (smp->slave_ltk) {
623 list_del(&smp->slave_ltk->list);
624 kfree(smp->slave_ltk);
625 }
626
627 if (smp->remote_irk) {
628 list_del(&smp->remote_irk->list);
629 kfree(smp->remote_irk);
630 }
631 }
632
Brian Gixc8eb9692011-11-23 08:28:35 -0800633 kfree(smp);
634 conn->smp_chan = NULL;
David Herrmann76a68ba2013-04-06 20:28:37 +0200635 hci_conn_drop(conn->hcon);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300636}
637
Brian Gix2b64d152011-12-21 16:12:12 -0800638int smp_user_confirm_reply(struct hci_conn *hcon, u16 mgmt_op, __le32 passkey)
639{
Johan Hedbergb10e8012014-06-27 14:23:07 +0300640 struct l2cap_conn *conn = hcon->l2cap_data;
Brian Gix2b64d152011-12-21 16:12:12 -0800641 struct smp_chan *smp;
642 u32 value;
Brian Gix2b64d152011-12-21 16:12:12 -0800643
644 BT_DBG("");
645
Johan Hedberg642ac772014-06-27 14:23:06 +0300646 if (!conn || !test_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
Brian Gix2b64d152011-12-21 16:12:12 -0800647 return -ENOTCONN;
648
649 smp = conn->smp_chan;
650
651 switch (mgmt_op) {
652 case MGMT_OP_USER_PASSKEY_REPLY:
653 value = le32_to_cpu(passkey);
Johan Hedberg943a7322014-03-18 12:58:24 +0200654 memset(smp->tk, 0, sizeof(smp->tk));
Brian Gix2b64d152011-12-21 16:12:12 -0800655 BT_DBG("PassKey: %d", value);
Johan Hedberg943a7322014-03-18 12:58:24 +0200656 put_unaligned_le32(value, smp->tk);
Brian Gix2b64d152011-12-21 16:12:12 -0800657 /* Fall Through */
658 case MGMT_OP_USER_CONFIRM_REPLY:
Johan Hedberg4a74d652014-05-20 09:45:50 +0300659 set_bit(SMP_FLAG_TK_VALID, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800660 break;
661 case MGMT_OP_USER_PASSKEY_NEG_REPLY:
662 case MGMT_OP_USER_CONFIRM_NEG_REPLY:
Johan Hedberg84794e12013-11-06 11:24:57 +0200663 smp_failure(conn, SMP_PASSKEY_ENTRY_FAILED);
Brian Gix2b64d152011-12-21 16:12:12 -0800664 return 0;
665 default:
Johan Hedberg84794e12013-11-06 11:24:57 +0200666 smp_failure(conn, SMP_PASSKEY_ENTRY_FAILED);
Brian Gix2b64d152011-12-21 16:12:12 -0800667 return -EOPNOTSUPP;
668 }
669
670 /* If it is our turn to send Pairing Confirm, do so now */
Johan Hedberg1cc61142014-05-20 09:45:52 +0300671 if (test_bit(SMP_FLAG_CFM_PENDING, &smp->flags)) {
672 u8 rsp = smp_confirm(smp);
673 if (rsp)
674 smp_failure(conn, rsp);
675 }
Brian Gix2b64d152011-12-21 16:12:12 -0800676
677 return 0;
678}
679
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300680static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300681{
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300682 struct smp_cmd_pairing rsp, *req = (void *) skb->data;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300683 struct smp_chan *smp;
Johan Hedbergc7262e72014-06-17 13:07:37 +0300684 u8 key_size, auth, sec_level;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300685 int ret;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300686
687 BT_DBG("conn %p", conn);
688
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200689 if (skb->len < sizeof(*req))
Johan Hedberg38e4a912014-05-08 14:19:11 +0300690 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200691
Johan Hedberg4dae2792014-06-24 17:03:50 +0300692 if (test_bit(HCI_CONN_MASTER, &conn->hcon->flags))
Brian Gix2b64d152011-12-21 16:12:12 -0800693 return SMP_CMD_NOTSUPP;
694
Johan Hedberg51a8efd2012-01-16 06:10:31 +0200695 if (!test_and_set_bit(HCI_CONN_LE_SMP_PEND, &conn->hcon->flags))
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300696 smp = smp_chan_create(conn);
Andrei Emeltchenkod08fd0e2012-07-19 17:03:43 +0300697 else
698 smp = conn->smp_chan;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300699
Andrei Emeltchenkod08fd0e2012-07-19 17:03:43 +0300700 if (!smp)
701 return SMP_UNSPECIFIED;
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300702
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300703 smp->preq[0] = SMP_CMD_PAIRING_REQ;
704 memcpy(&smp->preq[1], req, sizeof(*req));
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300705 skb_pull(skb, sizeof(*req));
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300706
Brian Gix2b64d152011-12-21 16:12:12 -0800707 /* We didn't start the pairing, so match remote */
Johan Hedberg1ef35822014-05-20 09:45:48 +0300708 auth = req->auth_req;
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300709
Johan Hedbergc7262e72014-06-17 13:07:37 +0300710 sec_level = authreq_to_seclevel(auth);
711 if (sec_level > conn->hcon->pending_sec_level)
712 conn->hcon->pending_sec_level = sec_level;
Ido Yarivfdde0a22012-03-05 20:09:38 +0200713
Johan Hedberg2ed8f652014-06-17 13:07:39 +0300714 /* If we need MITM check that it can be acheived */
715 if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
716 u8 method;
717
718 method = get_auth_method(smp, conn->hcon->io_capability,
719 req->io_capability);
720 if (method == JUST_WORKS || method == JUST_CFM)
721 return SMP_AUTH_REQUIREMENTS;
722 }
723
Brian Gix2b64d152011-12-21 16:12:12 -0800724 build_pairing_cmd(conn, req, &rsp, auth);
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300725
726 key_size = min(req->max_key_size, rsp.max_key_size);
727 if (check_enc_key_size(conn, key_size))
728 return SMP_ENC_KEY_SIZE;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300729
Johan Hedberge84a6b12013-12-02 10:49:03 +0200730 get_random_bytes(smp->prnd, sizeof(smp->prnd));
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300731
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300732 smp->prsp[0] = SMP_CMD_PAIRING_RSP;
733 memcpy(&smp->prsp[1], &rsp, sizeof(rsp));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300734
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300735 smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(rsp), &rsp);
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300736
Brian Gix2b64d152011-12-21 16:12:12 -0800737 /* Request setup of TK */
738 ret = tk_request(conn, 0, auth, rsp.io_capability, req->io_capability);
739 if (ret)
740 return SMP_UNSPECIFIED;
741
Johan Hedberg4a74d652014-05-20 09:45:50 +0300742 clear_bit(SMP_FLAG_INITIATOR, &smp->flags);
Johan Hedbergedca7922014-03-24 15:54:11 +0200743
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300744 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300745}
746
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300747static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300748{
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300749 struct smp_cmd_pairing *req, *rsp = (void *) skb->data;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300750 struct smp_chan *smp = conn->smp_chan;
Brian Gix2b64d152011-12-21 16:12:12 -0800751 u8 key_size, auth = SMP_AUTH_NONE;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300752 int ret;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300753
754 BT_DBG("conn %p", conn);
755
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200756 if (skb->len < sizeof(*rsp))
Johan Hedberg38e4a912014-05-08 14:19:11 +0300757 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200758
Johan Hedberg4dae2792014-06-24 17:03:50 +0300759 if (!test_bit(HCI_CONN_MASTER, &conn->hcon->flags))
Brian Gix2b64d152011-12-21 16:12:12 -0800760 return SMP_CMD_NOTSUPP;
761
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300762 skb_pull(skb, sizeof(*rsp));
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300763
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300764 req = (void *) &smp->preq[1];
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300765
766 key_size = min(req->max_key_size, rsp->max_key_size);
767 if (check_enc_key_size(conn, key_size))
768 return SMP_ENC_KEY_SIZE;
769
Johan Hedberg2ed8f652014-06-17 13:07:39 +0300770 /* If we need MITM check that it can be acheived */
771 if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
772 u8 method;
773
774 method = get_auth_method(smp, req->io_capability,
775 rsp->io_capability);
776 if (method == JUST_WORKS || method == JUST_CFM)
777 return SMP_AUTH_REQUIREMENTS;
778 }
779
Johan Hedberge84a6b12013-12-02 10:49:03 +0200780 get_random_bytes(smp->prnd, sizeof(smp->prnd));
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300781
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300782 smp->prsp[0] = SMP_CMD_PAIRING_RSP;
783 memcpy(&smp->prsp[1], rsp, sizeof(*rsp));
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300784
Johan Hedbergfdcc4be2014-03-14 10:53:50 +0200785 /* Update remote key distribution in case the remote cleared
786 * some bits that we had enabled in our request.
787 */
788 smp->remote_key_dist &= rsp->resp_key_dist;
789
Brian Gix2b64d152011-12-21 16:12:12 -0800790 if ((req->auth_req & SMP_AUTH_BONDING) &&
Marcel Holtmannf1560462013-10-13 05:43:25 -0700791 (rsp->auth_req & SMP_AUTH_BONDING))
Brian Gix2b64d152011-12-21 16:12:12 -0800792 auth = SMP_AUTH_BONDING;
793
794 auth |= (req->auth_req | rsp->auth_req) & SMP_AUTH_MITM;
795
Johan Hedberg476585e2012-06-06 18:54:15 +0800796 ret = tk_request(conn, 0, auth, req->io_capability, rsp->io_capability);
Brian Gix2b64d152011-12-21 16:12:12 -0800797 if (ret)
798 return SMP_UNSPECIFIED;
799
Johan Hedberg4a74d652014-05-20 09:45:50 +0300800 set_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
Brian Gix2b64d152011-12-21 16:12:12 -0800801
802 /* Can't compose response until we have been confirmed */
Johan Hedberg4a74d652014-05-20 09:45:50 +0300803 if (test_bit(SMP_FLAG_TK_VALID, &smp->flags))
Johan Hedberg1cc61142014-05-20 09:45:52 +0300804 return smp_confirm(smp);
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300805
806 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300807}
808
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300809static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300810{
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300811 struct smp_chan *smp = conn->smp_chan;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300812
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300813 BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
814
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200815 if (skb->len < sizeof(smp->pcnf))
Johan Hedberg38e4a912014-05-08 14:19:11 +0300816 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200817
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300818 memcpy(smp->pcnf, skb->data, sizeof(smp->pcnf));
819 skb_pull(skb, sizeof(smp->pcnf));
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300820
Johan Hedberg943a7322014-03-18 12:58:24 +0200821 if (conn->hcon->out)
822 smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd),
823 smp->prnd);
Johan Hedberg4a74d652014-05-20 09:45:50 +0300824 else if (test_bit(SMP_FLAG_TK_VALID, &smp->flags))
Johan Hedberg1cc61142014-05-20 09:45:52 +0300825 return smp_confirm(smp);
Johan Hedberg943a7322014-03-18 12:58:24 +0200826 else
Johan Hedberg4a74d652014-05-20 09:45:50 +0300827 set_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300828
829 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300830}
831
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300832static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300833{
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300834 struct smp_chan *smp = conn->smp_chan;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300835
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300836 BT_DBG("conn %p", conn);
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300837
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200838 if (skb->len < sizeof(smp->rrnd))
Johan Hedberg38e4a912014-05-08 14:19:11 +0300839 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200840
Johan Hedberg943a7322014-03-18 12:58:24 +0200841 memcpy(smp->rrnd, skb->data, sizeof(smp->rrnd));
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300842 skb_pull(skb, sizeof(smp->rrnd));
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300843
Johan Hedberg861580a2014-05-20 09:45:51 +0300844 return smp_random(smp);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300845}
846
Marcel Holtmannf81cd822014-07-01 10:59:24 +0200847static bool smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level)
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300848{
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -0300849 struct smp_ltk *key;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300850 struct hci_conn *hcon = conn->hcon;
851
Johan Hedberg98a0b842014-01-30 19:40:00 -0800852 key = hci_find_ltk_by_addr(hcon->hdev, &hcon->dst, hcon->dst_type,
853 hcon->out);
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300854 if (!key)
Marcel Holtmannf81cd822014-07-01 10:59:24 +0200855 return false;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300856
Johan Hedberg4dab7862012-06-07 14:58:37 +0800857 if (sec_level > BT_SECURITY_MEDIUM && !key->authenticated)
Marcel Holtmannf81cd822014-07-01 10:59:24 +0200858 return false;
Johan Hedberg4dab7862012-06-07 14:58:37 +0800859
Johan Hedberg51a8efd2012-01-16 06:10:31 +0200860 if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags))
Marcel Holtmannf81cd822014-07-01 10:59:24 +0200861 return true;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300862
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -0300863 hci_le_start_enc(hcon, key->ediv, key->rand, key->val);
864 hcon->enc_key_size = key->enc_size;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300865
Johan Hedbergfe59a052014-07-01 19:14:12 +0300866 /* We never store STKs for master role, so clear this flag */
867 clear_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags);
868
Marcel Holtmannf81cd822014-07-01 10:59:24 +0200869 return true;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300870}
Marcel Holtmannf1560462013-10-13 05:43:25 -0700871
Johan Hedberg854f4722014-07-01 18:40:20 +0300872bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level)
873{
874 if (sec_level == BT_SECURITY_LOW)
875 return true;
876
Johan Hedberg9ab65d602014-07-01 19:14:13 +0300877 /* If we're encrypted with an STK always claim insufficient
878 * security. This way we allow the connection to be re-encrypted
879 * with an LTK, even if the LTK provides the same level of
880 * security.
881 */
882 if (test_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags))
883 return false;
884
Johan Hedberg854f4722014-07-01 18:40:20 +0300885 if (hcon->sec_level >= sec_level)
886 return true;
887
888 return false;
889}
890
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300891static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300892{
893 struct smp_cmd_security_req *rp = (void *) skb->data;
894 struct smp_cmd_pairing cp;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300895 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300896 struct smp_chan *smp;
Johan Hedbergc7262e72014-06-17 13:07:37 +0300897 u8 sec_level;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300898
899 BT_DBG("conn %p", conn);
900
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200901 if (skb->len < sizeof(*rp))
Johan Hedberg38e4a912014-05-08 14:19:11 +0300902 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +0200903
Johan Hedberg4dae2792014-06-24 17:03:50 +0300904 if (!test_bit(HCI_CONN_MASTER, &conn->hcon->flags))
Johan Hedberg86ca9ea2013-11-05 11:30:39 +0200905 return SMP_CMD_NOTSUPP;
906
Johan Hedbergc7262e72014-06-17 13:07:37 +0300907 sec_level = authreq_to_seclevel(rp->auth_req);
Johan Hedberg854f4722014-07-01 18:40:20 +0300908 if (smp_sufficient_security(hcon, sec_level))
909 return 0;
910
Johan Hedbergc7262e72014-06-17 13:07:37 +0300911 if (sec_level > hcon->pending_sec_level)
912 hcon->pending_sec_level = sec_level;
Vinicius Costa Gomesfeb45eb2011-08-25 20:02:35 -0300913
Johan Hedberg4dab7862012-06-07 14:58:37 +0800914 if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300915 return 0;
916
Johan Hedberg51a8efd2012-01-16 06:10:31 +0200917 if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300918 return 0;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300919
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300920 smp = smp_chan_create(conn);
Johan Hedbergc29d2442014-06-16 19:25:14 +0300921 if (!smp)
922 return SMP_UNSPECIFIED;
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300923
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300924 skb_pull(skb, sizeof(*rp));
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300925
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300926 memset(&cp, 0, sizeof(cp));
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300927 build_pairing_cmd(conn, &cp, NULL, rp->auth_req);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300928
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300929 smp->preq[0] = SMP_CMD_PAIRING_REQ;
930 memcpy(&smp->preq[1], &cp, sizeof(cp));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300931
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300932 smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300933
Johan Hedberg4a74d652014-05-20 09:45:50 +0300934 clear_bit(SMP_FLAG_INITIATOR, &smp->flags);
Johan Hedbergedca7922014-03-24 15:54:11 +0200935
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300936 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300937}
938
Vinicius Costa Gomescc110922012-08-23 21:32:43 -0300939int smp_conn_security(struct hci_conn *hcon, __u8 sec_level)
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300940{
Vinicius Costa Gomescc110922012-08-23 21:32:43 -0300941 struct l2cap_conn *conn = hcon->l2cap_data;
Johan Hedberg0a66cf22014-03-24 14:39:03 +0200942 struct smp_chan *smp;
Brian Gix2b64d152011-12-21 16:12:12 -0800943 __u8 authreq;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300944
Vinicius Costa Gomes3a0259b2011-06-09 18:50:43 -0300945 BT_DBG("conn %p hcon %p level 0x%2.2x", conn, hcon, sec_level);
946
Johan Hedberg0a66cf22014-03-24 14:39:03 +0200947 /* This may be NULL if there's an unexpected disconnection */
948 if (!conn)
949 return 1;
950
Johan Hedberg757aee02013-04-24 13:05:32 +0300951 if (!test_bit(HCI_LE_ENABLED, &hcon->hdev->dev_flags))
Andre Guedes2e65c9d2011-06-30 19:20:56 -0300952 return 1;
953
Johan Hedbergad32a2f2013-05-14 18:05:12 +0300954 if (smp_sufficient_security(hcon, sec_level))
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300955 return 1;
956
Johan Hedbergc7262e72014-06-17 13:07:37 +0300957 if (sec_level > hcon->pending_sec_level)
958 hcon->pending_sec_level = sec_level;
959
Johan Hedberg4dae2792014-06-24 17:03:50 +0300960 if (test_bit(HCI_CONN_MASTER, &hcon->flags))
Johan Hedbergc7262e72014-06-17 13:07:37 +0300961 if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
962 return 0;
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300963
Johan Hedberg51a8efd2012-01-16 06:10:31 +0200964 if (test_and_set_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300965 return 0;
966
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300967 smp = smp_chan_create(conn);
Brian Gix2b64d152011-12-21 16:12:12 -0800968 if (!smp)
969 return 1;
970
971 authreq = seclevel_to_authreq(sec_level);
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300972
Johan Hedberg79897d22014-06-01 09:45:24 +0300973 /* Require MITM if IO Capability allows or the security level
974 * requires it.
Johan Hedberg2e233642014-03-18 15:42:30 +0200975 */
Johan Hedberg79897d22014-06-01 09:45:24 +0300976 if (hcon->io_capability != HCI_IO_NO_INPUT_OUTPUT ||
Johan Hedbergc7262e72014-06-17 13:07:37 +0300977 hcon->pending_sec_level > BT_SECURITY_MEDIUM)
Johan Hedberg2e233642014-03-18 15:42:30 +0200978 authreq |= SMP_AUTH_MITM;
979
Johan Hedberg4dae2792014-06-24 17:03:50 +0300980 if (test_bit(HCI_CONN_MASTER, &hcon->flags)) {
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300981 struct smp_cmd_pairing cp;
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300982
Brian Gix2b64d152011-12-21 16:12:12 -0800983 build_pairing_cmd(conn, &cp, NULL, authreq);
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300984 smp->preq[0] = SMP_CMD_PAIRING_REQ;
985 memcpy(&smp->preq[1], &cp, sizeof(cp));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300986
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300987 smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
988 } else {
989 struct smp_cmd_security_req cp;
Brian Gix2b64d152011-12-21 16:12:12 -0800990 cp.auth_req = authreq;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300991 smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp);
992 }
993
Johan Hedberg4a74d652014-05-20 09:45:50 +0300994 set_bit(SMP_FLAG_INITIATOR, &smp->flags);
Johan Hedbergedca7922014-03-24 15:54:11 +0200995
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300996 return 0;
997}
998
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300999static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb)
1000{
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001001 struct smp_cmd_encrypt_info *rp = (void *) skb->data;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001002 struct smp_chan *smp = conn->smp_chan;
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001003
Johan Hedbergc46b98b2014-02-18 10:19:29 +02001004 BT_DBG("conn %p", conn);
1005
1006 if (skb->len < sizeof(*rp))
Johan Hedberg38e4a912014-05-08 14:19:11 +03001007 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +02001008
Johan Hedberg6131ddc2014-02-18 10:19:37 +02001009 /* Ignore this PDU if it wasn't requested */
1010 if (!(smp->remote_key_dist & SMP_DIST_ENC_KEY))
1011 return 0;
1012
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001013 skb_pull(skb, sizeof(*rp));
1014
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001015 memcpy(smp->tk, rp->ltk, sizeof(smp->tk));
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001016
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001017 return 0;
1018}
1019
1020static int smp_cmd_master_ident(struct l2cap_conn *conn, struct sk_buff *skb)
1021{
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001022 struct smp_cmd_master_ident *rp = (void *) skb->data;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001023 struct smp_chan *smp = conn->smp_chan;
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001024 struct hci_dev *hdev = conn->hcon->hdev;
1025 struct hci_conn *hcon = conn->hcon;
Johan Hedberg23d0e122014-02-19 14:57:46 +02001026 struct smp_ltk *ltk;
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001027 u8 authenticated;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001028
Johan Hedbergc46b98b2014-02-18 10:19:29 +02001029 BT_DBG("conn %p", conn);
1030
1031 if (skb->len < sizeof(*rp))
Johan Hedberg38e4a912014-05-08 14:19:11 +03001032 return SMP_INVALID_PARAMS;
Johan Hedbergc46b98b2014-02-18 10:19:29 +02001033
Johan Hedberg6131ddc2014-02-18 10:19:37 +02001034 /* Ignore this PDU if it wasn't requested */
1035 if (!(smp->remote_key_dist & SMP_DIST_ENC_KEY))
1036 return 0;
1037
Johan Hedberg9747a9f2014-02-26 23:33:43 +02001038 /* Mark the information as received */
1039 smp->remote_key_dist &= ~SMP_DIST_ENC_KEY;
1040
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001041 skb_pull(skb, sizeof(*rp));
1042
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001043 hci_dev_lock(hdev);
Marcel Holtmannce39fb42013-10-13 02:23:39 -07001044 authenticated = (hcon->sec_level == BT_SECURITY_HIGH);
Johan Hedberg2ceba532014-06-16 19:25:16 +03001045 ltk = hci_add_ltk(hdev, &hcon->dst, hcon->dst_type, SMP_LTK,
Johan Hedberg23d0e122014-02-19 14:57:46 +02001046 authenticated, smp->tk, smp->enc_key_size,
1047 rp->ediv, rp->rand);
1048 smp->ltk = ltk;
Johan Hedbergfd349c02014-02-18 10:19:36 +02001049 if (!(smp->remote_key_dist & SMP_DIST_ID_KEY))
Johan Hedberg4bd6d382014-02-26 23:33:45 +02001050 smp_distribute_keys(conn);
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001051 hci_dev_unlock(hdev);
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001052
1053 return 0;
1054}
1055
Johan Hedbergfd349c02014-02-18 10:19:36 +02001056static int smp_cmd_ident_info(struct l2cap_conn *conn, struct sk_buff *skb)
1057{
1058 struct smp_cmd_ident_info *info = (void *) skb->data;
1059 struct smp_chan *smp = conn->smp_chan;
1060
1061 BT_DBG("");
1062
1063 if (skb->len < sizeof(*info))
Johan Hedberg38e4a912014-05-08 14:19:11 +03001064 return SMP_INVALID_PARAMS;
Johan Hedbergfd349c02014-02-18 10:19:36 +02001065
Johan Hedberg6131ddc2014-02-18 10:19:37 +02001066 /* Ignore this PDU if it wasn't requested */
1067 if (!(smp->remote_key_dist & SMP_DIST_ID_KEY))
1068 return 0;
1069
Johan Hedbergfd349c02014-02-18 10:19:36 +02001070 skb_pull(skb, sizeof(*info));
1071
1072 memcpy(smp->irk, info->irk, 16);
1073
1074 return 0;
1075}
1076
1077static int smp_cmd_ident_addr_info(struct l2cap_conn *conn,
1078 struct sk_buff *skb)
1079{
1080 struct smp_cmd_ident_addr_info *info = (void *) skb->data;
1081 struct smp_chan *smp = conn->smp_chan;
1082 struct hci_conn *hcon = conn->hcon;
1083 bdaddr_t rpa;
1084
1085 BT_DBG("");
1086
1087 if (skb->len < sizeof(*info))
Johan Hedberg38e4a912014-05-08 14:19:11 +03001088 return SMP_INVALID_PARAMS;
Johan Hedbergfd349c02014-02-18 10:19:36 +02001089
Johan Hedberg6131ddc2014-02-18 10:19:37 +02001090 /* Ignore this PDU if it wasn't requested */
1091 if (!(smp->remote_key_dist & SMP_DIST_ID_KEY))
1092 return 0;
1093
Johan Hedberg9747a9f2014-02-26 23:33:43 +02001094 /* Mark the information as received */
1095 smp->remote_key_dist &= ~SMP_DIST_ID_KEY;
1096
Johan Hedbergfd349c02014-02-18 10:19:36 +02001097 skb_pull(skb, sizeof(*info));
1098
Johan Hedberg31dd6242014-06-27 14:23:02 +03001099 hci_dev_lock(hcon->hdev);
1100
Johan Hedberga9a58f82014-02-25 22:24:37 +02001101 /* Strictly speaking the Core Specification (4.1) allows sending
1102 * an empty address which would force us to rely on just the IRK
1103 * as "identity information". However, since such
1104 * implementations are not known of and in order to not over
1105 * complicate our implementation, simply pretend that we never
1106 * received an IRK for such a device.
1107 */
1108 if (!bacmp(&info->bdaddr, BDADDR_ANY)) {
1109 BT_ERR("Ignoring IRK with no identity address");
Johan Hedberg31dd6242014-06-27 14:23:02 +03001110 goto distribute;
Johan Hedberga9a58f82014-02-25 22:24:37 +02001111 }
1112
Johan Hedbergfd349c02014-02-18 10:19:36 +02001113 bacpy(&smp->id_addr, &info->bdaddr);
1114 smp->id_addr_type = info->addr_type;
1115
1116 if (hci_bdaddr_is_rpa(&hcon->dst, hcon->dst_type))
1117 bacpy(&rpa, &hcon->dst);
1118 else
1119 bacpy(&rpa, BDADDR_ANY);
1120
Johan Hedberg23d0e122014-02-19 14:57:46 +02001121 smp->remote_irk = hci_add_irk(conn->hcon->hdev, &smp->id_addr,
1122 smp->id_addr_type, smp->irk, &rpa);
Johan Hedbergfd349c02014-02-18 10:19:36 +02001123
Johan Hedberg31dd6242014-06-27 14:23:02 +03001124distribute:
Johan Hedberg4bd6d382014-02-26 23:33:45 +02001125 smp_distribute_keys(conn);
Johan Hedbergfd349c02014-02-18 10:19:36 +02001126
Johan Hedberg31dd6242014-06-27 14:23:02 +03001127 hci_dev_unlock(hcon->hdev);
1128
Johan Hedbergfd349c02014-02-18 10:19:36 +02001129 return 0;
1130}
1131
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001132static int smp_cmd_sign_info(struct l2cap_conn *conn, struct sk_buff *skb)
1133{
1134 struct smp_cmd_sign_info *rp = (void *) skb->data;
1135 struct smp_chan *smp = conn->smp_chan;
1136 struct hci_dev *hdev = conn->hcon->hdev;
1137 struct smp_csrk *csrk;
1138
1139 BT_DBG("conn %p", conn);
1140
1141 if (skb->len < sizeof(*rp))
Johan Hedberg38e4a912014-05-08 14:19:11 +03001142 return SMP_INVALID_PARAMS;
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001143
1144 /* Ignore this PDU if it wasn't requested */
1145 if (!(smp->remote_key_dist & SMP_DIST_SIGN))
1146 return 0;
1147
1148 /* Mark the information as received */
1149 smp->remote_key_dist &= ~SMP_DIST_SIGN;
1150
1151 skb_pull(skb, sizeof(*rp));
1152
1153 hci_dev_lock(hdev);
1154 csrk = kzalloc(sizeof(*csrk), GFP_KERNEL);
1155 if (csrk) {
1156 csrk->master = 0x01;
1157 memcpy(csrk->val, rp->csrk, sizeof(csrk->val));
1158 }
1159 smp->csrk = csrk;
1160 if (!(smp->remote_key_dist & SMP_DIST_SIGN))
1161 smp_distribute_keys(conn);
1162 hci_dev_unlock(hdev);
1163
1164 return 0;
1165}
1166
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001167int smp_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
1168{
Marcel Holtmann7b9899d2013-10-03 00:00:57 -07001169 struct hci_conn *hcon = conn->hcon;
Marcel Holtmann92381f52013-10-03 01:23:08 -07001170 __u8 code, reason;
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001171 int err = 0;
1172
Marcel Holtmann7b9899d2013-10-03 00:00:57 -07001173 if (hcon->type != LE_LINK) {
1174 kfree_skb(skb);
Johan Hedberg34327112013-10-16 11:37:01 +03001175 return 0;
Marcel Holtmann7b9899d2013-10-03 00:00:57 -07001176 }
1177
Marcel Holtmann92381f52013-10-03 01:23:08 -07001178 if (skb->len < 1) {
1179 kfree_skb(skb);
1180 return -EILSEQ;
1181 }
1182
Marcel Holtmann06ae3312013-10-18 03:43:00 -07001183 if (!test_bit(HCI_LE_ENABLED, &hcon->hdev->dev_flags)) {
Andre Guedes2e65c9d2011-06-30 19:20:56 -03001184 err = -ENOTSUPP;
1185 reason = SMP_PAIRING_NOTSUPP;
1186 goto done;
1187 }
1188
Marcel Holtmann92381f52013-10-03 01:23:08 -07001189 code = skb->data[0];
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001190 skb_pull(skb, sizeof(code));
1191
Johan Hedberg8cf9fa12013-01-29 10:44:23 -06001192 /*
1193 * The SMP context must be initialized for all other PDUs except
1194 * pairing and security requests. If we get any other PDU when
1195 * not initialized simply disconnect (done if this function
1196 * returns an error).
1197 */
1198 if (code != SMP_CMD_PAIRING_REQ && code != SMP_CMD_SECURITY_REQ &&
1199 !conn->smp_chan) {
1200 BT_ERR("Unexpected SMP command 0x%02x. Disconnecting.", code);
1201 kfree_skb(skb);
1202 return -ENOTSUPP;
1203 }
1204
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001205 switch (code) {
1206 case SMP_CMD_PAIRING_REQ:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001207 reason = smp_cmd_pairing_req(conn, skb);
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001208 break;
1209
1210 case SMP_CMD_PAIRING_FAIL:
Johan Hedberg84794e12013-11-06 11:24:57 +02001211 smp_failure(conn, 0);
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001212 reason = 0;
1213 err = -EPERM;
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001214 break;
1215
1216 case SMP_CMD_PAIRING_RSP:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001217 reason = smp_cmd_pairing_rsp(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -03001218 break;
1219
1220 case SMP_CMD_SECURITY_REQ:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001221 reason = smp_cmd_security_req(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -03001222 break;
1223
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001224 case SMP_CMD_PAIRING_CONFIRM:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001225 reason = smp_cmd_pairing_confirm(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -03001226 break;
1227
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001228 case SMP_CMD_PAIRING_RANDOM:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -03001229 reason = smp_cmd_pairing_random(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -03001230 break;
1231
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001232 case SMP_CMD_ENCRYPT_INFO:
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001233 reason = smp_cmd_encrypt_info(conn, skb);
1234 break;
1235
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001236 case SMP_CMD_MASTER_IDENT:
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001237 reason = smp_cmd_master_ident(conn, skb);
1238 break;
1239
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001240 case SMP_CMD_IDENT_INFO:
Johan Hedbergfd349c02014-02-18 10:19:36 +02001241 reason = smp_cmd_ident_info(conn, skb);
1242 break;
1243
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001244 case SMP_CMD_IDENT_ADDR_INFO:
Johan Hedbergfd349c02014-02-18 10:19:36 +02001245 reason = smp_cmd_ident_addr_info(conn, skb);
1246 break;
1247
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001248 case SMP_CMD_SIGN_INFO:
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001249 reason = smp_cmd_sign_info(conn, skb);
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001250 break;
1251
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001252 default:
1253 BT_DBG("Unknown command code 0x%2.2x", code);
1254
1255 reason = SMP_CMD_NOTSUPP;
Vinicius Costa Gomes3a0259b2011-06-09 18:50:43 -03001256 err = -EOPNOTSUPP;
1257 goto done;
1258 }
1259
1260done:
1261 if (reason)
Johan Hedberg84794e12013-11-06 11:24:57 +02001262 smp_failure(conn, reason);
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001263
1264 kfree_skb(skb);
1265 return err;
1266}
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001267
Johan Hedberg35d70272014-02-19 14:57:47 +02001268static void smp_notify_keys(struct l2cap_conn *conn)
1269{
1270 struct smp_chan *smp = conn->smp_chan;
1271 struct hci_conn *hcon = conn->hcon;
1272 struct hci_dev *hdev = hcon->hdev;
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001273 struct smp_cmd_pairing *req = (void *) &smp->preq[1];
1274 struct smp_cmd_pairing *rsp = (void *) &smp->prsp[1];
1275 bool persistent;
Johan Hedberg35d70272014-02-19 14:57:47 +02001276
Johan Hedberg61b1a7f2014-03-20 12:54:16 +02001277 if (smp->remote_irk) {
Johan Hedberg95fbac82014-02-19 15:18:31 +02001278 mgmt_new_irk(hdev, smp->remote_irk);
Johan Hedberg61b1a7f2014-03-20 12:54:16 +02001279 /* Now that user space can be considered to know the
1280 * identity address track the connection based on it
1281 * from now on.
1282 */
1283 bacpy(&hcon->dst, &smp->remote_irk->bdaddr);
1284 hcon->dst_type = smp->remote_irk->addr_type;
1285 l2cap_conn_update_id_addr(hcon);
1286 }
Johan Hedberg95fbac82014-02-19 15:18:31 +02001287
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001288 /* The LTKs and CSRKs should be persistent only if both sides
1289 * had the bonding bit set in their authentication requests.
1290 */
1291 persistent = !!((req->auth_req & rsp->auth_req) & SMP_AUTH_BONDING);
1292
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001293 if (smp->csrk) {
1294 smp->csrk->bdaddr_type = hcon->dst_type;
1295 bacpy(&smp->csrk->bdaddr, &hcon->dst);
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001296 mgmt_new_csrk(hdev, smp->csrk, persistent);
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001297 }
1298
1299 if (smp->slave_csrk) {
1300 smp->slave_csrk->bdaddr_type = hcon->dst_type;
1301 bacpy(&smp->slave_csrk->bdaddr, &hcon->dst);
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001302 mgmt_new_csrk(hdev, smp->slave_csrk, persistent);
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001303 }
1304
Johan Hedberg35d70272014-02-19 14:57:47 +02001305 if (smp->ltk) {
1306 smp->ltk->bdaddr_type = hcon->dst_type;
1307 bacpy(&smp->ltk->bdaddr, &hcon->dst);
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001308 mgmt_new_ltk(hdev, smp->ltk, persistent);
Johan Hedberg35d70272014-02-19 14:57:47 +02001309 }
1310
1311 if (smp->slave_ltk) {
1312 smp->slave_ltk->bdaddr_type = hcon->dst_type;
1313 bacpy(&smp->slave_ltk->bdaddr, &hcon->dst);
Marcel Holtmann53ac6ab2014-03-09 23:38:42 -07001314 mgmt_new_ltk(hdev, smp->slave_ltk, persistent);
Johan Hedberg35d70272014-02-19 14:57:47 +02001315 }
1316}
1317
Johan Hedberg4bd6d382014-02-26 23:33:45 +02001318int smp_distribute_keys(struct l2cap_conn *conn)
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001319{
1320 struct smp_cmd_pairing *req, *rsp;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001321 struct smp_chan *smp = conn->smp_chan;
Johan Hedberg524237c2014-02-22 19:06:31 +02001322 struct hci_conn *hcon = conn->hcon;
1323 struct hci_dev *hdev = hcon->hdev;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001324 __u8 *keydist;
1325
Johan Hedberg4bd6d382014-02-26 23:33:45 +02001326 BT_DBG("conn %p", conn);
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001327
Johan Hedberg524237c2014-02-22 19:06:31 +02001328 if (!test_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags))
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -03001329 return 0;
1330
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001331 rsp = (void *) &smp->prsp[1];
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001332
1333 /* The responder sends its keys first */
Johan Hedbergefabba32014-02-26 23:33:44 +02001334 if (hcon->out && (smp->remote_key_dist & 0x07))
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001335 return 0;
1336
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -03001337 req = (void *) &smp->preq[1];
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001338
Johan Hedberg524237c2014-02-22 19:06:31 +02001339 if (hcon->out) {
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001340 keydist = &rsp->init_key_dist;
1341 *keydist &= req->init_key_dist;
1342 } else {
1343 keydist = &rsp->resp_key_dist;
1344 *keydist &= req->resp_key_dist;
1345 }
1346
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001347 BT_DBG("keydist 0x%x", *keydist);
1348
1349 if (*keydist & SMP_DIST_ENC_KEY) {
1350 struct smp_cmd_encrypt_info enc;
1351 struct smp_cmd_master_ident ident;
Johan Hedberg23d0e122014-02-19 14:57:46 +02001352 struct smp_ltk *ltk;
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001353 u8 authenticated;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001354 __le16 ediv;
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -08001355 __le64 rand;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001356
1357 get_random_bytes(enc.ltk, sizeof(enc.ltk));
1358 get_random_bytes(&ediv, sizeof(ediv));
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -08001359 get_random_bytes(&rand, sizeof(rand));
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001360
1361 smp_send_cmd(conn, SMP_CMD_ENCRYPT_INFO, sizeof(enc), &enc);
1362
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -03001363 authenticated = hcon->sec_level == BT_SECURITY_HIGH;
Johan Hedberg524237c2014-02-22 19:06:31 +02001364 ltk = hci_add_ltk(hdev, &hcon->dst, hcon->dst_type,
Johan Hedberg2ceba532014-06-16 19:25:16 +03001365 SMP_LTK_SLAVE, authenticated, enc.ltk,
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -08001366 smp->enc_key_size, ediv, rand);
Johan Hedberg23d0e122014-02-19 14:57:46 +02001367 smp->slave_ltk = ltk;
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -03001368
Andrei Emeltchenko58115372012-03-12 12:13:06 +02001369 ident.ediv = ediv;
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -08001370 ident.rand = rand;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001371
1372 smp_send_cmd(conn, SMP_CMD_MASTER_IDENT, sizeof(ident), &ident);
1373
1374 *keydist &= ~SMP_DIST_ENC_KEY;
1375 }
1376
1377 if (*keydist & SMP_DIST_ID_KEY) {
1378 struct smp_cmd_ident_addr_info addrinfo;
1379 struct smp_cmd_ident_info idinfo;
1380
Johan Hedberg863efaf2014-02-22 19:06:32 +02001381 memcpy(idinfo.irk, hdev->irk, sizeof(idinfo.irk));
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001382
1383 smp_send_cmd(conn, SMP_CMD_IDENT_INFO, sizeof(idinfo), &idinfo);
1384
Johan Hedberg82d4b352014-02-23 19:42:18 +02001385 /* The hci_conn contains the local identity address
1386 * after the connection has been established.
1387 *
1388 * This is true even when the connection has been
1389 * established using a resolvable random address.
1390 */
Johan Hedberg524237c2014-02-22 19:06:31 +02001391 bacpy(&addrinfo.bdaddr, &hcon->src);
Johan Hedberg82d4b352014-02-23 19:42:18 +02001392 addrinfo.addr_type = hcon->src_type;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001393
1394 smp_send_cmd(conn, SMP_CMD_IDENT_ADDR_INFO, sizeof(addrinfo),
Marcel Holtmannf1560462013-10-13 05:43:25 -07001395 &addrinfo);
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001396
1397 *keydist &= ~SMP_DIST_ID_KEY;
1398 }
1399
1400 if (*keydist & SMP_DIST_SIGN) {
1401 struct smp_cmd_sign_info sign;
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001402 struct smp_csrk *csrk;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001403
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001404 /* Generate a new random key */
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001405 get_random_bytes(sign.csrk, sizeof(sign.csrk));
1406
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -07001407 csrk = kzalloc(sizeof(*csrk), GFP_KERNEL);
1408 if (csrk) {
1409 csrk->master = 0x00;
1410 memcpy(csrk->val, sign.csrk, sizeof(csrk->val));
1411 }
1412 smp->slave_csrk = csrk;
1413
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001414 smp_send_cmd(conn, SMP_CMD_SIGN_INFO, sizeof(sign), &sign);
1415
1416 *keydist &= ~SMP_DIST_SIGN;
1417 }
1418
Johan Hedbergefabba32014-02-26 23:33:44 +02001419 /* If there are still keys to be received wait for them */
1420 if ((smp->remote_key_dist & 0x07))
1421 return 0;
1422
Johan Hedberg1d98bf42014-03-24 14:39:08 +02001423 clear_bit(HCI_CONN_LE_SMP_PEND, &hcon->flags);
1424 cancel_delayed_work_sync(&conn->security_timer);
Johan Hedberg4a74d652014-05-20 09:45:50 +03001425 set_bit(SMP_FLAG_COMPLETE, &smp->flags);
Johan Hedberg1d98bf42014-03-24 14:39:08 +02001426 smp_notify_keys(conn);
Johan Hedbergefabba32014-02-26 23:33:44 +02001427
Johan Hedberg1d98bf42014-03-24 14:39:08 +02001428 smp_chan_destroy(conn);
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -03001429
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001430 return 0;
1431}