blob: 1277147a915070e3a5256debdd98316fa1d916c5 [file] [log] [blame]
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
4
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
8
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
21*/
22
Ville Tervoaff2cae2011-02-10 22:38:54 -030023#ifndef __SMP_H
24#define __SMP_H
25
26struct smp_command_hdr {
27 __u8 code;
28} __packed;
29
30#define SMP_CMD_PAIRING_REQ 0x01
31#define SMP_CMD_PAIRING_RSP 0x02
32struct smp_cmd_pairing {
33 __u8 io_capability;
34 __u8 oob_flag;
35 __u8 auth_req;
36 __u8 max_key_size;
37 __u8 init_key_dist;
38 __u8 resp_key_dist;
39} __packed;
40
Anderson Briglia88ba43b2011-06-09 18:50:42 -030041#define SMP_IO_DISPLAY_ONLY 0x00
42#define SMP_IO_DISPLAY_YESNO 0x01
43#define SMP_IO_KEYBOARD_ONLY 0x02
44#define SMP_IO_NO_INPUT_OUTPUT 0x03
45#define SMP_IO_KEYBOARD_DISPLAY 0x04
46
47#define SMP_OOB_NOT_PRESENT 0x00
48#define SMP_OOB_PRESENT 0x01
49
50#define SMP_DIST_ENC_KEY 0x01
51#define SMP_DIST_ID_KEY 0x02
52#define SMP_DIST_SIGN 0x04
53
54#define SMP_AUTH_NONE 0x00
55#define SMP_AUTH_BONDING 0x01
56#define SMP_AUTH_MITM 0x04
57
Ville Tervoaff2cae2011-02-10 22:38:54 -030058#define SMP_CMD_PAIRING_CONFIRM 0x03
59struct smp_cmd_pairing_confirm {
60 __u8 confirm_val[16];
61} __packed;
62
63#define SMP_CMD_PAIRING_RANDOM 0x04
64struct smp_cmd_pairing_random {
65 __u8 rand_val[16];
66} __packed;
67
68#define SMP_CMD_PAIRING_FAIL 0x05
69struct smp_cmd_pairing_fail {
70 __u8 reason;
71} __packed;
72
73#define SMP_CMD_ENCRYPT_INFO 0x06
74struct smp_cmd_encrypt_info {
75 __u8 ltk[16];
76} __packed;
77
78#define SMP_CMD_MASTER_IDENT 0x07
79struct smp_cmd_master_ident {
Andrei Emeltchenko58115372012-03-12 12:13:06 +020080 __le16 ediv;
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -080081 __le64 rand;
Ville Tervoaff2cae2011-02-10 22:38:54 -030082} __packed;
83
84#define SMP_CMD_IDENT_INFO 0x08
85struct smp_cmd_ident_info {
86 __u8 irk[16];
87} __packed;
88
89#define SMP_CMD_IDENT_ADDR_INFO 0x09
90struct smp_cmd_ident_addr_info {
91 __u8 addr_type;
92 bdaddr_t bdaddr;
93} __packed;
94
95#define SMP_CMD_SIGN_INFO 0x0a
96struct smp_cmd_sign_info {
97 __u8 csrk[16];
98} __packed;
99
100#define SMP_CMD_SECURITY_REQ 0x0b
101struct smp_cmd_security_req {
102 __u8 auth_req;
103} __packed;
104
105#define SMP_PASSKEY_ENTRY_FAILED 0x01
106#define SMP_OOB_NOT_AVAIL 0x02
107#define SMP_AUTH_REQUIREMENTS 0x03
108#define SMP_CONFIRM_FAILED 0x04
109#define SMP_PAIRING_NOTSUPP 0x05
110#define SMP_ENC_KEY_SIZE 0x06
Andrei Emeltchenkob93a6822012-07-19 17:03:44 +0300111#define SMP_CMD_NOTSUPP 0x07
112#define SMP_UNSPECIFIED 0x08
Ville Tervoaff2cae2011-02-10 22:38:54 -0300113#define SMP_REPEATED_ATTEMPTS 0x09
114
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300115#define SMP_MIN_ENC_KEY_SIZE 7
116#define SMP_MAX_ENC_KEY_SIZE 16
117
Brian Gix2b64d152011-12-21 16:12:12 -0800118#define SMP_FLAG_TK_VALID 1
119#define SMP_FLAG_CFM_PENDING 2
120#define SMP_FLAG_MITM_AUTH 3
Johan Hedberg1d98bf42014-03-24 14:39:08 +0200121#define SMP_FLAG_COMPLETE 4
122#define SMP_FLAG_INITIATOR 5
Johan Hedberge3098be2014-02-28 18:10:03 +0200123
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300124struct smp_chan {
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300125 struct l2cap_conn *conn;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300126 u8 preq[7]; /* SMP Pairing Request */
127 u8 prsp[7]; /* SMP Pairing Response */
Andrei Emeltchenkob93a6822012-07-19 17:03:44 +0300128 u8 prnd[16]; /* SMP Pairing Random (local) */
129 u8 rrnd[16]; /* SMP Pairing Random (remote) */
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300130 u8 pcnf[16]; /* SMP Pairing Confirm */
131 u8 tk[16]; /* SMP Temporary Key */
Vinicius Costa Gomesf7aa6112012-01-30 19:29:12 -0300132 u8 enc_key_size;
Johan Hedbergfd349c02014-02-18 10:19:36 +0200133 u8 remote_key_dist;
134 bdaddr_t id_addr;
135 u8 id_addr_type;
136 u8 irk[16];
Marcel Holtmann7ee4ea32014-03-09 12:19:17 -0700137 struct smp_csrk *csrk;
138 struct smp_csrk *slave_csrk;
Johan Hedberg23d0e122014-02-19 14:57:46 +0200139 struct smp_ltk *ltk;
140 struct smp_ltk *slave_ltk;
141 struct smp_irk *remote_irk;
Brian Gix2b64d152011-12-21 16:12:12 -0800142 unsigned long smp_flags;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300143 struct work_struct confirm;
144 struct work_struct random;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300145};
146
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300147/* SMP Commands */
Johan Hedbergad32a2f2013-05-14 18:05:12 +0300148bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level);
Vinicius Costa Gomescc110922012-08-23 21:32:43 -0300149int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300150int smp_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb);
Johan Hedberg4bd6d382014-02-26 23:33:45 +0200151int smp_distribute_keys(struct l2cap_conn *conn);
Brian Gix2b64d152011-12-21 16:12:12 -0800152int smp_user_confirm_reply(struct hci_conn *conn, u16 mgmt_op, __le32 passkey);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300153
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300154void smp_chan_destroy(struct l2cap_conn *conn);
155
Johan Hedberg60478052014-02-18 10:19:31 +0200156bool smp_irk_matches(struct crypto_blkcipher *tfm, u8 irk[16],
157 bdaddr_t *bdaddr);
Johan Hedbergb1e2b3a2014-02-23 19:42:19 +0200158int smp_generate_rpa(struct crypto_blkcipher *tfm, u8 irk[16], bdaddr_t *rpa);
Johan Hedberg60478052014-02-18 10:19:31 +0200159
Ville Tervoaff2cae2011-02-10 22:38:54 -0300160#endif /* __SMP_H */