blob: 56b2cfaa5404e701a00288b7e1ca91141845c786 [file] [log] [blame]
Anderson Brigliaeb492e02011-06-09 18:50:40 -03001/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
4
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
8
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
21*/
22
Steve Mucklef132c6c2012-06-06 18:30:57 -070023#include <linux/interrupt.h>
24#include <linux/module.h>
25
Anderson Brigliaeb492e02011-06-09 18:50:40 -030026#include <net/bluetooth/bluetooth.h>
27#include <net/bluetooth/hci_core.h>
28#include <net/bluetooth/l2cap.h>
Brian Gix2b64d152011-12-21 16:12:12 -080029#include <net/bluetooth/mgmt.h>
Anderson Brigliaeb492e02011-06-09 18:50:40 -030030#include <net/bluetooth/smp.h>
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030031#include <linux/crypto.h>
32#include <crypto/b128ops.h>
Brian Gixa68668b2011-08-11 15:49:36 -070033#include <asm/unaligned.h>
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030034
Vinicius Costa Gomesb19d5ce2011-06-14 13:37:41 -030035#define SMP_TIMEOUT 30000 /* 30 seconds */
36
Brian Gix7f7e16c2011-11-01 16:27:25 -070037#define SMP_MIN_CONN_INTERVAL 40 /* 50ms (40 * 1.25ms) */
38#define SMP_MAX_CONN_INTERVAL 56 /* 70ms (56 * 1.25ms) */
39#define SMP_MAX_CONN_LATENCY 0 /* 0ms (0 * 1.25ms) */
40#define SMP_SUPERVISION_TIMEOUT 500 /* 5 seconds (500 * 10ms) */
41
Brian Gixa68668b2011-08-11 15:49:36 -070042#ifndef FALSE
43#define FALSE 0
44#define TRUE (!FALSE)
45#endif
46
47static int smp_distribute_keys(struct l2cap_conn *conn, __u8 force);
Vinicius Costa Gomes5d3de7d2011-06-14 13:37:41 -030048
Anderson Brigliad22ef0b2011-06-09 18:50:44 -030049static inline void swap128(u8 src[16], u8 dst[16])
50{
51 int i;
52 for (i = 0; i < 16; i++)
53 dst[15 - i] = src[i];
54}
55
56static inline void swap56(u8 src[7], u8 dst[7])
57{
58 int i;
59 for (i = 0; i < 7; i++)
60 dst[6 - i] = src[i];
61}
62
63static int smp_e(struct crypto_blkcipher *tfm, const u8 *k, u8 *r)
64{
65 struct blkcipher_desc desc;
66 struct scatterlist sg;
67 int err, iv_len;
68 unsigned char iv[128];
69
70 if (tfm == NULL) {
71 BT_ERR("tfm %p", tfm);
72 return -EINVAL;
73 }
74
75 desc.tfm = tfm;
76 desc.flags = 0;
77
78 err = crypto_blkcipher_setkey(tfm, k, 16);
79 if (err) {
80 BT_ERR("cipher setkey failed: %d", err);
81 return err;
82 }
83
84 sg_init_one(&sg, r, 16);
85
86 iv_len = crypto_blkcipher_ivsize(tfm);
87 if (iv_len) {
88 memset(&iv, 0xff, iv_len);
89 crypto_blkcipher_set_iv(tfm, iv, iv_len);
90 }
91
92 err = crypto_blkcipher_encrypt(&desc, &sg, &sg, 16);
93 if (err)
94 BT_ERR("Encrypt data error %d", err);
95
96 return err;
97}
98
99static int smp_c1(struct crypto_blkcipher *tfm, u8 k[16], u8 r[16],
100 u8 preq[7], u8 pres[7], u8 _iat, bdaddr_t *ia,
101 u8 _rat, bdaddr_t *ra, u8 res[16])
102{
103 u8 p1[16], p2[16];
104 int err;
105
106 memset(p1, 0, 16);
107
108 /* p1 = pres || preq || _rat || _iat */
109 swap56(pres, p1);
110 swap56(preq, p1 + 7);
111 p1[14] = _rat;
112 p1[15] = _iat;
113
114 memset(p2, 0, 16);
115
116 /* p2 = padding || ia || ra */
117 baswap((bdaddr_t *) (p2 + 4), ia);
118 baswap((bdaddr_t *) (p2 + 10), ra);
119
120 /* res = r XOR p1 */
121 u128_xor((u128 *) res, (u128 *) r, (u128 *) p1);
122
123 /* res = e(k, res) */
124 err = smp_e(tfm, k, res);
125 if (err) {
126 BT_ERR("Encrypt data error");
127 return err;
128 }
129
130 /* res = res XOR p2 */
131 u128_xor((u128 *) res, (u128 *) res, (u128 *) p2);
132
133 /* res = e(k, res) */
134 err = smp_e(tfm, k, res);
135 if (err)
136 BT_ERR("Encrypt data error");
137
138 return err;
139}
140
141static int smp_s1(struct crypto_blkcipher *tfm, u8 k[16],
142 u8 r1[16], u8 r2[16], u8 _r[16])
143{
144 int err;
145
146 /* Just least significant octets from r1 and r2 are considered */
147 memcpy(_r, r1 + 8, 8);
148 memcpy(_r + 8, r2 + 8, 8);
149
150 err = smp_e(tfm, k, _r);
151 if (err)
152 BT_ERR("Encrypt data error");
153
154 return err;
155}
156
157static int smp_rand(u8 *buf)
158{
159 get_random_bytes(buf, 16);
160
161 return 0;
162}
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300163
164static struct sk_buff *smp_build_cmd(struct l2cap_conn *conn, u8 code,
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700165 u16 dlen, void *data)
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300166{
167 struct sk_buff *skb;
168 struct l2cap_hdr *lh;
169 int len;
170
171 len = L2CAP_HDR_SIZE + sizeof(code) + dlen;
172
173 if (len > conn->mtu)
174 return NULL;
175
176 skb = bt_skb_alloc(len, GFP_ATOMIC);
177 if (!skb)
178 return NULL;
179
180 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
181 lh->len = cpu_to_le16(sizeof(code) + dlen);
182 lh->cid = cpu_to_le16(L2CAP_CID_SMP);
183
184 memcpy(skb_put(skb, sizeof(code)), &code, sizeof(code));
185
186 memcpy(skb_put(skb, dlen), data, dlen);
187
188 return skb;
189}
190
191static void smp_send_cmd(struct l2cap_conn *conn, u8 code, u16 len, void *data)
192{
193 struct sk_buff *skb = smp_build_cmd(conn, code, len, data);
194
195 BT_DBG("code 0x%2.2x", code);
196
197 if (!skb)
198 return;
199
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700200 hci_send_acl(conn->hcon, NULL, skb, 0);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300201}
202
Brian Gix2b64d152011-12-21 16:12:12 -0800203static __u8 authreq_to_seclevel(__u8 authreq)
204{
205 if (authreq & SMP_AUTH_MITM)
206 return BT_SECURITY_HIGH;
Brian Gixa68668b2011-08-11 15:49:36 -0700207 else if (authreq & SMP_AUTH_BONDING)
Brian Gix2b64d152011-12-21 16:12:12 -0800208 return BT_SECURITY_MEDIUM;
Brian Gixa68668b2011-08-11 15:49:36 -0700209 else
210 return BT_SECURITY_LOW;
Brian Gix2b64d152011-12-21 16:12:12 -0800211}
212
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300213static __u8 seclevel_to_authreq(__u8 level)
Brian Gix2b64d152011-12-21 16:12:12 -0800214{
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300215 switch (level) {
Brian Gix2b64d152011-12-21 16:12:12 -0800216 case BT_SECURITY_HIGH:
217 return SMP_AUTH_MITM | SMP_AUTH_BONDING;
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300218
Brian Gix2b64d152011-12-21 16:12:12 -0800219 default:
220 return SMP_AUTH_NONE;
221 }
222}
223
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300224static void build_pairing_cmd(struct l2cap_conn *conn,
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300225 struct smp_cmd_pairing *req,
226 struct smp_cmd_pairing *rsp,
227 __u8 authreq)
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300228{
Brian Gixa68668b2011-08-11 15:49:36 -0700229 struct hci_conn *hcon = conn->hcon;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700230 u8 all_keys = 0;
Brian Gix2b64d152011-12-21 16:12:12 -0800231 u8 dist_keys = 0;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300232
Brian Gixa68668b2011-08-11 15:49:36 -0700233 dist_keys = SMP_DIST_ENC_KEY;
234 authreq |= SMP_AUTH_BONDING;
235
236 BT_DBG("conn->hcon->io_capability:%d", conn->hcon->io_capability);
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300237
238 if (rsp == NULL) {
239 req->io_capability = conn->hcon->io_capability;
Brian Gixa68668b2011-08-11 15:49:36 -0700240 req->oob_flag = hcon->oob ? SMP_OOB_PRESENT :
241 SMP_OOB_NOT_PRESENT;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300242 req->max_key_size = SMP_MAX_ENC_KEY_SIZE;
Brian Gixa68668b2011-08-11 15:49:36 -0700243 req->init_key_dist = all_keys;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300244 req->resp_key_dist = dist_keys;
245 req->auth_req = authreq;
Brian Gixa68668b2011-08-11 15:49:36 -0700246 BT_DBG("SMP_CMD_PAIRING_REQ %d %d %d %d %2.2x %2.2x",
247 req->io_capability, req->oob_flag,
248 req->auth_req, req->max_key_size,
249 req->init_key_dist, req->resp_key_dist);
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300250 return;
251 }
252
Brian Gixa68668b2011-08-11 15:49:36 -0700253 /* Only request OOB if remote AND we support it */
254 if (req->oob_flag)
255 rsp->oob_flag = hcon->oob ? SMP_OOB_PRESENT :
256 SMP_OOB_NOT_PRESENT;
257 else
258 rsp->oob_flag = SMP_OOB_NOT_PRESENT;
259
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300260 rsp->io_capability = conn->hcon->io_capability;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300261 rsp->max_key_size = SMP_MAX_ENC_KEY_SIZE;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700262 rsp->init_key_dist = req->init_key_dist & all_keys;
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300263 rsp->resp_key_dist = req->resp_key_dist & dist_keys;
264 rsp->auth_req = authreq;
Brian Gixa68668b2011-08-11 15:49:36 -0700265 BT_DBG("SMP_CMD_PAIRING_RSP %d %d %d %d %2.2x %2.2x",
266 req->io_capability, req->oob_flag, req->auth_req,
267 req->max_key_size, req->init_key_dist,
268 req->resp_key_dist);
Vinicius Costa Gomesb8e66ea2011-06-09 18:50:52 -0300269}
270
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300271static u8 check_enc_key_size(struct l2cap_conn *conn, __u8 max_key_size)
272{
Brian Gixa68668b2011-08-11 15:49:36 -0700273 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes1c1def02011-09-05 14:31:30 -0300274
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300275 if ((max_key_size > SMP_MAX_ENC_KEY_SIZE) ||
276 (max_key_size < SMP_MIN_ENC_KEY_SIZE))
277 return SMP_ENC_KEY_SIZE;
278
Brian Gixa68668b2011-08-11 15:49:36 -0700279 hcon->smp_key_size = max_key_size;
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300280
281 return 0;
282}
283
Brian Gixa68668b2011-08-11 15:49:36 -0700284#define JUST_WORKS SMP_JUST_WORKS
285#define REQ_PASSKEY SMP_REQ_PASSKEY
286#define CFM_PASSKEY SMP_CFM_PASSKEY
287#define JUST_CFM SMP_JUST_CFM
288#define OVERLAP SMP_OVERLAP
289static const u8 gen_method[5][5] = {
290 {JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY},
291 {JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY},
292 {CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, CFM_PASSKEY},
293 {JUST_WORKS, JUST_CFM, JUST_WORKS, JUST_WORKS, JUST_CFM},
294 {CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, OVERLAP}
Brian Gix2b64d152011-12-21 16:12:12 -0800295};
296
297static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth,
298 u8 local_io, u8 remote_io)
299{
300 struct hci_conn *hcon = conn->hcon;
Brian Gix2b64d152011-12-21 16:12:12 -0800301 u8 method;
302 u32 passkey = 0;
303 int ret = 0;
304
Brian Gixa68668b2011-08-11 15:49:36 -0700305 /* Initialize key to JUST WORKS */
306 memset(hcon->tk, 0, sizeof(hcon->tk));
307 hcon->tk_valid = FALSE;
308 hcon->auth = auth;
309
310 /* By definition, OOB data will be used if both sides have it available
311 */
312 if (remote_oob && hcon->oob) {
313 method = SMP_REQ_OOB;
314 goto agent_request;
315 }
Brian Gix2b64d152011-12-21 16:12:12 -0800316
317 BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io);
318
319 /* If neither side wants MITM, use JUST WORKS */
Brian Gixa68668b2011-08-11 15:49:36 -0700320 /* If either side has unknown io_caps, use JUST_WORKS */
Brian Gix2b64d152011-12-21 16:12:12 -0800321 if (!(auth & SMP_AUTH_MITM) ||
322 local_io > SMP_IO_KEYBOARD_DISPLAY ||
Brian Gixa68668b2011-08-11 15:49:36 -0700323 remote_io > SMP_IO_KEYBOARD_DISPLAY) {
324 hcon->auth &= ~SMP_AUTH_MITM;
325 hcon->tk_valid = TRUE;
Brian Gix2b64d152011-12-21 16:12:12 -0800326 return 0;
327 }
328
Brian Gixa68668b2011-08-11 15:49:36 -0700329 /* MITM is now officially requested, but not required */
330 /* Determine what we need (if anything) from the agent */
331 method = gen_method[local_io][remote_io];
Brian Gix2b64d152011-12-21 16:12:12 -0800332
Brian Gixa68668b2011-08-11 15:49:36 -0700333 BT_DBG("tk_method: %d", method);
334
335 if (method == SMP_JUST_WORKS || method == SMP_JUST_CFM)
336 hcon->auth &= ~SMP_AUTH_MITM;
337
338 /* Don't bother confirming unbonded JUST_WORKS */
339 if (!(auth & SMP_AUTH_BONDING) && method == SMP_JUST_CFM) {
340 hcon->tk_valid = TRUE;
341 return 0;
342 } else if (method == SMP_JUST_WORKS) {
343 hcon->tk_valid = TRUE;
344 return 0;
345 } else if (method == SMP_OVERLAP) {
Brian Gix2b64d152011-12-21 16:12:12 -0800346 if (hcon->link_mode & HCI_LM_MASTER)
Brian Gixa68668b2011-08-11 15:49:36 -0700347 method = SMP_CFM_PASSKEY;
Brian Gix2b64d152011-12-21 16:12:12 -0800348 else
Brian Gixa68668b2011-08-11 15:49:36 -0700349 method = SMP_REQ_PASSKEY;
Brian Gix2b64d152011-12-21 16:12:12 -0800350 }
351
Brian Gixa68668b2011-08-11 15:49:36 -0700352 BT_DBG("tk_method-2: %d", method);
Brian Gix2b64d152011-12-21 16:12:12 -0800353
Brian Gixa68668b2011-08-11 15:49:36 -0700354 if (method == SMP_CFM_PASSKEY) {
355 u8 key[16];
356 /* Generate a passkey for display. It is not valid until
357 * confirmed.
358 */
Brian Gix2b64d152011-12-21 16:12:12 -0800359 memset(key, 0, sizeof(key));
360 get_random_bytes(&passkey, sizeof(passkey));
361 passkey %= 1000000;
362 put_unaligned_le32(passkey, key);
Brian Gixa68668b2011-08-11 15:49:36 -0700363 swap128(key, hcon->tk);
Brian Gix2b64d152011-12-21 16:12:12 -0800364 BT_DBG("PassKey: %d", passkey);
365 }
366
Brian Gixa68668b2011-08-11 15:49:36 -0700367agent_request:
Brian Gix2b64d152011-12-21 16:12:12 -0800368 hci_dev_lock(hcon->hdev);
369
Brian Gixa68668b2011-08-11 15:49:36 -0700370 switch (method) {
371 case SMP_REQ_PASSKEY:
Brian Gix3dd70172011-09-16 21:38:54 -0700372 ret = mgmt_user_confirm_request(hcon->hdev->id,
373 HCI_EV_USER_PASSKEY_REQUEST, conn->dst, 0);
374 break;
Brian Gixa68668b2011-08-11 15:49:36 -0700375 case SMP_CFM_PASSKEY:
376 default:
Brian Gix3dd70172011-09-16 21:38:54 -0700377 ret = mgmt_user_confirm_request(hcon->hdev->id,
378 HCI_EV_USER_CONFIRM_REQUEST, conn->dst, passkey);
379 break;
Brian Gixa68668b2011-08-11 15:49:36 -0700380 }
Brian Gix2b64d152011-12-21 16:12:12 -0800381
382 hci_dev_unlock(hcon->hdev);
383
384 return ret;
385}
386
Brian Gixa68668b2011-08-11 15:49:36 -0700387static int send_pairing_confirm(struct l2cap_conn *conn)
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300388{
Brian Gixa68668b2011-08-11 15:49:36 -0700389 struct hci_conn *hcon = conn->hcon;
390 struct crypto_blkcipher *tfm = hcon->hdev->tfm;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300391 struct smp_cmd_pairing_confirm cp;
392 int ret;
Brian Gixa68668b2011-08-11 15:49:36 -0700393 u8 res[16];
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300394
395 if (conn->hcon->out)
Brian Gixa68668b2011-08-11 15:49:36 -0700396 ret = smp_c1(tfm, hcon->tk, hcon->prnd, hcon->preq, hcon->prsp,
397 0, conn->src, hcon->dst_type, conn->dst, res);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300398 else
Brian Gixa68668b2011-08-11 15:49:36 -0700399 ret = smp_c1(tfm, hcon->tk, hcon->prnd, hcon->preq, hcon->prsp,
400 hcon->dst_type, conn->dst, 0, conn->src, res);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300401
Brian Gixa68668b2011-08-11 15:49:36 -0700402 if (ret)
403 return SMP_CONFIRM_FAILED;
Brian Gix2b64d152011-12-21 16:12:12 -0800404
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300405 swap128(res, cp.confirm_val);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300406
Brian Gixa68668b2011-08-11 15:49:36 -0700407 hcon->cfm_pending = FALSE;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300408
Brian Gixa68668b2011-08-11 15:49:36 -0700409 smp_send_cmd(conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp);
Brian Gix2b64d152011-12-21 16:12:12 -0800410
411 return 0;
412}
413
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700414int le_user_confirm_reply(struct hci_conn *hcon, u16 mgmt_op, void *cp)
Brian Gixa68668b2011-08-11 15:49:36 -0700415{
416 struct mgmt_cp_user_passkey_reply *psk_reply = cp;
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700417 struct l2cap_conn *conn = hcon->smp_conn;
Brian Gixa68668b2011-08-11 15:49:36 -0700418 u8 key[16];
419 u8 reason = 0;
420 int ret = 0;
421
422 BT_DBG("");
423
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700424 hcon->tk_valid = TRUE;
Brian Gixa68668b2011-08-11 15:49:36 -0700425
426 switch (mgmt_op) {
427 case MGMT_OP_USER_CONFIRM_NEG_REPLY:
428 reason = SMP_CONFIRM_FAILED;
429 break;
430 case MGMT_OP_USER_CONFIRM_REPLY:
431 break;
432 case MGMT_OP_USER_PASSKEY_REPLY:
433 memset(key, 0, sizeof(key));
434 BT_DBG("PassKey: %d", psk_reply->passkey);
435 put_unaligned_le32(psk_reply->passkey, key);
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700436 swap128(key, hcon->tk);
Brian Gixa68668b2011-08-11 15:49:36 -0700437 break;
438 default:
439 reason = SMP_CONFIRM_FAILED;
440 ret = -EOPNOTSUPP;
441 break;
442 }
443
444 if (reason) {
445 BT_DBG("smp_send_cmd: SMP_CMD_PAIRING_FAIL");
446 smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason),
447 &reason);
Brian Gixe9ceb522011-09-22 10:46:35 -0700448 del_timer(&hcon->smp_timer);
Brian Gix8d0b7d62011-10-12 15:12:42 -0700449 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Brian Gix58ba0772011-09-23 13:40:16 -0700450 mgmt_auth_failed(hcon->hdev->id, conn->dst, reason);
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700451 hci_conn_put(hcon);
452 } else if (hcon->cfm_pending) {
Brian Gixa68668b2011-08-11 15:49:36 -0700453 BT_DBG("send_pairing_confirm");
454 ret = send_pairing_confirm(conn);
455 }
456
457 return ret;
458}
459
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300460static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300461{
Brian Gixa68668b2011-08-11 15:49:36 -0700462 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300463 struct smp_cmd_pairing rsp, *req = (void *) skb->data;
464 u8 key_size;
Brian Gix2b64d152011-12-21 16:12:12 -0800465 u8 auth = SMP_AUTH_NONE;
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300466 int ret;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300467
468 BT_DBG("conn %p", conn);
469
Brian Gixa68668b2011-08-11 15:49:36 -0700470 hcon->preq[0] = SMP_CMD_PAIRING_REQ;
471 memcpy(&hcon->preq[1], req, sizeof(*req));
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300472 skb_pull(skb, sizeof(*req));
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300473
Brian Gixa68668b2011-08-11 15:49:36 -0700474 if (req->oob_flag && hcon->oob) {
475 /* By definition, OOB data pairing will have MITM protection */
476 auth = req->auth_req | SMP_AUTH_MITM;
477 } else if (req->auth_req & SMP_AUTH_BONDING) {
478 /* We will attempt MITM for all Bonding attempts */
479 auth = SMP_AUTH_BONDING | SMP_AUTH_MITM;
480 }
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300481
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300482 /* We didn't start the pairing, so no requirements */
Brian Gix2b64d152011-12-21 16:12:12 -0800483 build_pairing_cmd(conn, req, &rsp, auth);
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300484
485 key_size = min(req->max_key_size, rsp.max_key_size);
486 if (check_enc_key_size(conn, key_size))
487 return SMP_ENC_KEY_SIZE;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300488
Brian Gixa68668b2011-08-11 15:49:36 -0700489 ret = smp_rand(hcon->prnd);
Vinicius Costa Gomes8aab4752011-09-05 14:31:31 -0300490 if (ret)
491 return SMP_UNSPECIFIED;
492
Brian Gixa68668b2011-08-11 15:49:36 -0700493 /* Request setup of TK */
494 ret = tk_request(conn, req->oob_flag, auth, rsp.io_capability,
495 req->io_capability);
496 if (ret)
497 return SMP_UNSPECIFIED;
498
499 hcon->prsp[0] = SMP_CMD_PAIRING_RSP;
500 memcpy(&hcon->prsp[1], &rsp, sizeof(rsp));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300501
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300502 smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(rsp), &rsp);
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300503
Brian Gixe9ceb522011-09-22 10:46:35 -0700504 mod_timer(&hcon->smp_timer, jiffies + msecs_to_jiffies(SMP_TIMEOUT));
Brian Gix2b64d152011-12-21 16:12:12 -0800505
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300506 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300507}
508
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300509static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300510{
Brian Gixa68668b2011-08-11 15:49:36 -0700511 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300512 struct smp_cmd_pairing *req, *rsp = (void *) skb->data;
Brian Gix2b64d152011-12-21 16:12:12 -0800513 u8 key_size, auth = SMP_AUTH_NONE;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300514 int ret;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300515
516 BT_DBG("conn %p", conn);
517
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300518 skb_pull(skb, sizeof(*rsp));
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300519
Brian Gixa68668b2011-08-11 15:49:36 -0700520 req = (void *) &hcon->preq[1];
Vinicius Costa Gomes3158c502011-06-14 13:37:42 -0300521
522 key_size = min(req->max_key_size, rsp->max_key_size);
523 if (check_enc_key_size(conn, key_size))
524 return SMP_ENC_KEY_SIZE;
525
Brian Gixa68668b2011-08-11 15:49:36 -0700526 hcon->prsp[0] = SMP_CMD_PAIRING_RSP;
527 memcpy(&hcon->prsp[1], rsp, sizeof(*rsp));
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300528
Brian Gixa68668b2011-08-11 15:49:36 -0700529 ret = smp_rand(hcon->prnd);
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300530 if (ret)
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300531 return SMP_UNSPECIFIED;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300532
Brian Gix2b64d152011-12-21 16:12:12 -0800533 if ((req->auth_req & SMP_AUTH_BONDING) &&
534 (rsp->auth_req & SMP_AUTH_BONDING))
535 auth = SMP_AUTH_BONDING;
536
537 auth |= (req->auth_req | rsp->auth_req) & SMP_AUTH_MITM;
538
Brian Gixa68668b2011-08-11 15:49:36 -0700539 ret = tk_request(conn, req->oob_flag, auth, rsp->io_capability,
540 req->io_capability);
Brian Gix2b64d152011-12-21 16:12:12 -0800541 if (ret)
542 return SMP_UNSPECIFIED;
543
Brian Gixa68668b2011-08-11 15:49:36 -0700544 hcon->cfm_pending = TRUE;
Brian Gix2b64d152011-12-21 16:12:12 -0800545
546 /* Can't compose response until we have been confirmed */
Brian Gixa68668b2011-08-11 15:49:36 -0700547 if (!hcon->tk_valid)
Brian Gix2b64d152011-12-21 16:12:12 -0800548 return 0;
549
Brian Gixa68668b2011-08-11 15:49:36 -0700550 ret = send_pairing_confirm(conn);
551 if (ret)
552 return SMP_CONFIRM_FAILED;
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300553
554 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300555}
556
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300557static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300558{
Brian Gixa68668b2011-08-11 15:49:36 -0700559 struct hci_conn *hcon = conn->hcon;
560 int ret;
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300561
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300562 BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
563
Brian Gixa68668b2011-08-11 15:49:36 -0700564 memcpy(hcon->pcnf, skb->data, sizeof(hcon->pcnf));
565 skb_pull(skb, sizeof(hcon->pcnf));
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300566
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300567 if (conn->hcon->out) {
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300568 u8 random[16];
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300569
Brian Gixa68668b2011-08-11 15:49:36 -0700570 swap128(hcon->prnd, random);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300571 smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(random),
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300572 random);
Brian Gixa68668b2011-08-11 15:49:36 -0700573 } else if (hcon->tk_valid) {
574 ret = send_pairing_confirm(conn);
Anderson Briglia13b48392011-06-09 18:50:42 -0300575
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300576 if (ret)
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300577 return SMP_CONFIRM_FAILED;
Brian Gixa68668b2011-08-11 15:49:36 -0700578 } else
579 hcon->cfm_pending = TRUE;
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300580
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300581
Brian Gixe9ceb522011-09-22 10:46:35 -0700582 mod_timer(&hcon->smp_timer, jiffies + msecs_to_jiffies(SMP_TIMEOUT));
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300583
584 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300585}
586
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300587static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300588{
Vinicius Costa Gomes735038c2011-06-09 18:50:47 -0300589 struct hci_conn *hcon = conn->hcon;
590 struct crypto_blkcipher *tfm = hcon->hdev->tfm;
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300591 int ret;
Vinicius Costa Gomesc34e25e2011-06-09 18:50:48 -0300592 u8 key[16], res[16], random[16], confirm[16];
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300593
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300594 swap128(skb->data, random);
595 skb_pull(skb, sizeof(random));
Anderson Briglia7d24ddc2011-06-09 18:50:46 -0300596
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300597 if (conn->hcon->out)
Brian Gixa68668b2011-08-11 15:49:36 -0700598 ret = smp_c1(tfm, hcon->tk, random, hcon->preq, hcon->prsp, 0,
599 conn->src, hcon->dst_type, conn->dst,
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300600 res);
601 else
Brian Gixa68668b2011-08-11 15:49:36 -0700602 ret = smp_c1(tfm, hcon->tk, random, hcon->preq, hcon->prsp,
603 hcon->dst_type, conn->dst, 0, conn->src,
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300604 res);
605 if (ret)
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300606 return SMP_UNSPECIFIED;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300607
Anderson Briglia13b48392011-06-09 18:50:42 -0300608 BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
609
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300610 swap128(res, confirm);
611
Brian Gixa68668b2011-08-11 15:49:36 -0700612 if (memcmp(hcon->pcnf, confirm, sizeof(hcon->pcnf)) != 0) {
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300613 BT_ERR("Pairing failed (confirmation values mismatch)");
Vinicius Costa Gomes64532ec2011-06-09 18:50:53 -0300614 return SMP_CONFIRM_FAILED;
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300615 }
Anderson Briglia13b48392011-06-09 18:50:42 -0300616
617 if (conn->hcon->out) {
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300618 u8 stk[16], rand[8];
Vinicius Costa Gomes735038c2011-06-09 18:50:47 -0300619 __le16 ediv;
Vinicius Costa Gomes397d9ae2011-06-14 13:37:42 -0300620
Vinicius Costa Gomes735038c2011-06-09 18:50:47 -0300621 memset(rand, 0, sizeof(rand));
622 ediv = 0;
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300623
Brian Gixa68668b2011-08-11 15:49:36 -0700624 smp_s1(tfm, hcon->tk, random, hcon->prnd, key);
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300625 swap128(key, stk);
626
Brian Gixa68668b2011-08-11 15:49:36 -0700627 memset(stk + hcon->smp_key_size, 0,
628 SMP_MAX_ENC_KEY_SIZE - hcon->smp_key_size);
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300629
630 hci_le_start_enc(hcon, ediv, rand, stk);
Brian Gixa68668b2011-08-11 15:49:36 -0700631 hcon->enc_key_size = hcon->smp_key_size;
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300632 } else {
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300633 u8 stk[16], r[16], rand[8];
634 __le16 ediv;
635
636 memset(rand, 0, sizeof(rand));
637 ediv = 0;
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300638
Brian Gixa68668b2011-08-11 15:49:36 -0700639 swap128(hcon->prnd, r);
Anderson Briglia21b8a2b2011-06-09 18:50:46 -0300640 smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(r), r);
641
Brian Gixa68668b2011-08-11 15:49:36 -0700642 smp_s1(tfm, hcon->tk, hcon->prnd, random, key);
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300643 swap128(key, stk);
Vinicius Costa Gomes397d9ae2011-06-14 13:37:42 -0300644
Brian Gixa68668b2011-08-11 15:49:36 -0700645 memset(stk + hcon->smp_key_size, 0,
646 SMP_MAX_ENC_KEY_SIZE - hcon->smp_key_size);
Vinicius Costa Gomesf1b45c52011-07-07 18:59:40 -0300647
Brian Gixcf956772011-10-20 15:18:51 -0700648 hci_add_ltk(conn->hcon->hdev, 0, conn->dst, hcon->dst_type,
649 hcon->smp_key_size, hcon->auth, ediv, rand, stk);
Anderson Briglia13b48392011-06-09 18:50:42 -0300650 }
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300651
652 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300653}
654
Brian Gix372257b2011-10-25 09:06:30 -0700655static int smp_encrypt_link(struct hci_conn *hcon, struct link_key *key)
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300656{
Brian Gix372257b2011-10-25 09:06:30 -0700657 struct key_master_id *master;
Brian Gix80fb3a92012-01-31 13:15:20 -0800658 u8 sec_level;
Brian Gix372257b2011-10-25 09:06:30 -0700659 u8 zerobuf[8];
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300660
Brian Gix372257b2011-10-25 09:06:30 -0700661 if (!hcon || !key || !key->data)
662 return -EINVAL;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300663
Brian Gix372257b2011-10-25 09:06:30 -0700664 memset(zerobuf, 0, sizeof(zerobuf));
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300665
Brian Gix372257b2011-10-25 09:06:30 -0700666 master = (void *) key->data;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300667
Brian Gix372257b2011-10-25 09:06:30 -0700668 if (!master->ediv && !memcmp(master->rand, zerobuf, sizeof(zerobuf)))
669 return -EINVAL;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300670
Brian Gix372257b2011-10-25 09:06:30 -0700671 hcon->enc_key_size = key->pin_len;
672 hcon->sec_req = TRUE;
Brian Gix80fb3a92012-01-31 13:15:20 -0800673 sec_level = authreq_to_seclevel(key->auth);
674
675 BT_DBG("cur %d, req: %d", hcon->sec_level, sec_level);
676
677 if (sec_level > hcon->sec_level)
678 hcon->pending_sec_level = sec_level;
679
680
681 if (!(hcon->link_mode & HCI_LM_ENCRYPT))
682 hci_conn_hold(hcon);
683
Brian Gix372257b2011-10-25 09:06:30 -0700684 hci_le_start_enc(hcon, master->ediv, master->rand, key->val);
685
686 return 0;
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300687}
Brian Gix372257b2011-10-25 09:06:30 -0700688
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300689static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300690{
Brian Gixa68668b2011-08-11 15:49:36 -0700691 struct hci_conn *hcon = conn->hcon;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300692 struct smp_cmd_security_req *rp = (void *) skb->data;
693 struct smp_cmd_pairing cp;
Brian Gixa68668b2011-08-11 15:49:36 -0700694 struct link_key *key;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300695
696 BT_DBG("conn %p", conn);
697
Vinicius Costa Gomesa5474a82011-01-26 21:42:57 -0300698 if (test_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend))
Vinicius Costa Gomes988c5992011-08-25 20:02:28 -0300699 return 0;
700
Brian Gixa68668b2011-08-11 15:49:36 -0700701 key = hci_find_link_key_type(hcon->hdev, conn->dst, KEY_TYPE_LTK);
702 if (key && ((key->auth & SMP_AUTH_MITM) ||
703 !(rp->auth_req & SMP_AUTH_MITM))) {
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300704
Brian Gix372257b2011-10-25 09:06:30 -0700705 if (smp_encrypt_link(hcon, key) < 0)
706 goto invalid_key;
Brian Gixa68668b2011-08-11 15:49:36 -0700707
Brian Gixa68668b2011-08-11 15:49:36 -0700708 return 0;
709 }
710
Brian Gix372257b2011-10-25 09:06:30 -0700711invalid_key:
Brian Gixa68668b2011-08-11 15:49:36 -0700712 hcon->sec_req = FALSE;
713
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300714 skb_pull(skb, sizeof(*rp));
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300715
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300716 memset(&cp, 0, sizeof(cp));
Vinicius Costa Gomes54790f72011-07-07 18:59:38 -0300717 build_pairing_cmd(conn, &cp, NULL, rp->auth_req);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300718
Brian Gix27a795c2012-04-19 11:05:06 -0700719 hcon->pending_sec_level = authreq_to_seclevel(rp->auth_req);
Brian Gixa68668b2011-08-11 15:49:36 -0700720 hcon->preq[0] = SMP_CMD_PAIRING_REQ;
721 memcpy(&hcon->preq[1], &cp, sizeof(cp));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300722
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300723 smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300724
Brian Gixe9ceb522011-09-22 10:46:35 -0700725 mod_timer(&hcon->smp_timer, jiffies + msecs_to_jiffies(SMP_TIMEOUT));
Vinicius Costa Gomesb19d5ce2011-06-14 13:37:41 -0300726
Vinicius Costa Gomesa5474a82011-01-26 21:42:57 -0300727 set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Vinicius Costa Gomesa5474a82011-01-26 21:42:57 -0300728
Brian Gix8d0b7d62011-10-12 15:12:42 -0700729 hci_conn_hold(hcon);
730
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300731 return 0;
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300732}
733
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300734int smp_conn_security(struct l2cap_conn *conn, __u8 sec_level)
735{
Vinicius Costa Gomes3a0259b2011-06-09 18:50:43 -0300736 struct hci_conn *hcon = conn->hcon;
Brian Gix2b64d152011-12-21 16:12:12 -0800737 __u8 authreq;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300738
Brian Gix80fb3a92012-01-31 13:15:20 -0800739 BT_DBG("conn %p hcon %p %d req: %d",
740 conn, hcon, hcon->sec_level, sec_level);
Vinicius Costa Gomes3a0259b2011-06-09 18:50:43 -0300741
Brian Gix80fb3a92012-01-31 13:15:20 -0800742 if (IS_ERR(hcon->hdev->tfm))
Andre Guedes2e65c9d2011-06-30 19:20:56 -0300743 return 1;
744
Brian Gix80fb3a92012-01-31 13:15:20 -0800745 if (test_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend))
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700746 return -EINPROGRESS;
Anderson Briglia133e14c2011-06-09 18:50:40 -0300747
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300748 if (sec_level == BT_SECURITY_LOW)
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300749 return 1;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300750
Brian Gix80fb3a92012-01-31 13:15:20 -0800751
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300752 if (hcon->sec_level >= sec_level)
753 return 1;
754
Brian Gix2b64d152011-12-21 16:12:12 -0800755 authreq = seclevel_to_authreq(sec_level);
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300756
Brian Gixa68668b2011-08-11 15:49:36 -0700757 hcon->smp_conn = conn;
Brian Gix80fb3a92012-01-31 13:15:20 -0800758 hcon->pending_sec_level = sec_level;
Subramanian Srinivasan3e7c75d2012-10-08 17:22:43 -0700759 if (hcon->link_mode & HCI_LM_MASTER) {
Vinicius Costa Gomes5d873ca2011-07-07 18:59:41 -0300760 struct link_key *key;
761
762 key = hci_find_link_key_type(hcon->hdev, conn->dst,
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700763 KEY_TYPE_LTK);
Vinicius Costa Gomes5d873ca2011-07-07 18:59:41 -0300764
Brian Gix372257b2011-10-25 09:06:30 -0700765 if (smp_encrypt_link(hcon, key) == 0)
Vinicius Costa Gomes5d873ca2011-07-07 18:59:41 -0300766 goto done;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700767 }
768
Brian Gixa68668b2011-08-11 15:49:36 -0700769 hcon->sec_req = FALSE;
770
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300771 if (hcon->link_mode & HCI_LM_MASTER) {
772 struct smp_cmd_pairing cp;
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300773
Brian Gix2b64d152011-12-21 16:12:12 -0800774 build_pairing_cmd(conn, &cp, NULL, authreq);
Brian Gixa68668b2011-08-11 15:49:36 -0700775 hcon->preq[0] = SMP_CMD_PAIRING_REQ;
776 memcpy(&hcon->preq[1], &cp, sizeof(cp));
Anderson Brigliac8e856e2011-06-09 18:50:45 -0300777
Brian Gixe9ceb522011-09-22 10:46:35 -0700778 mod_timer(&hcon->smp_timer, jiffies +
Vinicius Costa Gomesb19d5ce2011-06-14 13:37:41 -0300779 msecs_to_jiffies(SMP_TIMEOUT));
Anderson Brigliaf01ead32011-06-09 18:50:45 -0300780
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300781 smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
Brian Gix80fb3a92012-01-31 13:15:20 -0800782 hci_conn_hold(hcon);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300783 } else {
784 struct smp_cmd_security_req cp;
Brian Gix2b64d152011-12-21 16:12:12 -0800785 cp.auth_req = authreq;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300786 smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp);
787 }
788
Vinicius Costa Gomes02bc7452011-07-07 18:59:41 -0300789done:
Vinicius Costa Gomesa5474a82011-01-26 21:42:57 -0300790 set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300791
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300792 return 0;
793}
794
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300795static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb)
796{
Brian Gixa68668b2011-08-11 15:49:36 -0700797 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -0300798 struct smp_cmd_encrypt_info *rp = (void *) skb->data;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700799 u8 rand[8];
800 int err;
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -0300801
802 skb_pull(skb, sizeof(*rp));
803
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700804 BT_DBG("conn %p", conn);
805
806 memset(rand, 0, sizeof(rand));
807
Brian Gixcf956772011-10-20 15:18:51 -0700808 err = hci_add_ltk(hcon->hdev, 0, conn->dst, hcon->dst_type,
809 0, 0, 0, rand, rp->ltk);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700810 if (err)
811 return SMP_UNSPECIFIED;
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -0300812
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300813 return 0;
814}
815
816static int smp_cmd_master_ident(struct l2cap_conn *conn, struct sk_buff *skb)
817{
Vinicius Costa Gomesc9839a12012-02-02 21:08:01 -0300818 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomese56cede2011-07-07 18:59:39 -0300819 struct smp_cmd_master_ident *rp = (void *) skb->data;
Brian Gixa68668b2011-08-11 15:49:36 -0700820 struct smp_cmd_pairing *paircmd = (void *) &hcon->prsp[1];
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700821 struct link_key *key;
Brian Gixa68668b2011-08-11 15:49:36 -0700822 u8 *keydist;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300823
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -0300824 skb_pull(skb, sizeof(*rp));
825
Brian Gixa68668b2011-08-11 15:49:36 -0700826 key = hci_find_link_key_type(hcon->hdev, conn->dst, KEY_TYPE_LTK);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700827 if (key == NULL)
828 return SMP_UNSPECIFIED;
829
Brian Gixa68668b2011-08-11 15:49:36 -0700830 if (hcon->out)
831 keydist = &paircmd->resp_key_dist;
832 else
833 keydist = &paircmd->init_key_dist;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700834
Brian Gixa68668b2011-08-11 15:49:36 -0700835 BT_DBG("keydist 0x%x", *keydist);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700836
Brian Gixcf956772011-10-20 15:18:51 -0700837 hci_add_ltk(hcon->hdev, 1, conn->dst, hcon->dst_type,
838 hcon->smp_key_size, hcon->auth, rp->ediv,
839 rp->rand, key->val);
Vinicius Costa Gomesc1d5e1d2011-07-07 18:59:34 -0300840
Brian Gixa68668b2011-08-11 15:49:36 -0700841 *keydist &= ~SMP_DIST_ENC_KEY;
842 if (hcon->out) {
843 if (!(*keydist))
844 smp_distribute_keys(conn, 1);
845 }
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300846
847 return 0;
848}
849
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300850int smp_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
851{
Brian Gixa68668b2011-08-11 15:49:36 -0700852 struct hci_conn *hcon = conn->hcon;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300853 __u8 code = skb->data[0];
854 __u8 reason;
855 int err = 0;
856
Brian Gixa68668b2011-08-11 15:49:36 -0700857 if (IS_ERR(hcon->hdev->tfm)) {
858 err = PTR_ERR(hcon->hdev->tfm);
Andre Guedes2e65c9d2011-06-30 19:20:56 -0300859 reason = SMP_PAIRING_NOTSUPP;
Brian Gixa68668b2011-08-11 15:49:36 -0700860 BT_ERR("SMP_PAIRING_NOTSUPP %p", hcon->hdev->tfm);
Andre Guedes2e65c9d2011-06-30 19:20:56 -0300861 goto done;
862 }
863
Brian Gixa68668b2011-08-11 15:49:36 -0700864 hcon->smp_conn = conn;
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300865 skb_pull(skb, sizeof(code));
866
867 switch (code) {
868 case SMP_CMD_PAIRING_REQ:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300869 reason = smp_cmd_pairing_req(conn, skb);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300870 break;
871
872 case SMP_CMD_PAIRING_FAIL:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300873 reason = 0;
874 err = -EPERM;
Brian Gixe9ceb522011-09-22 10:46:35 -0700875 del_timer(&hcon->smp_timer);
Brian Gix8d0b7d62011-10-12 15:12:42 -0700876 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Brian Gix570efc92011-10-13 15:59:51 -0700877 mgmt_auth_failed(hcon->hdev->id, conn->dst, skb->data[0]);
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700878 hci_conn_put(hcon);
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300879 break;
880
881 case SMP_CMD_PAIRING_RSP:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300882 reason = smp_cmd_pairing_rsp(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300883 break;
884
885 case SMP_CMD_SECURITY_REQ:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300886 reason = smp_cmd_security_req(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300887 break;
888
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300889 case SMP_CMD_PAIRING_CONFIRM:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300890 reason = smp_cmd_pairing_confirm(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300891 break;
892
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300893 case SMP_CMD_PAIRING_RANDOM:
Vinicius Costa Gomesda85e5e2011-06-09 18:50:53 -0300894 reason = smp_cmd_pairing_random(conn, skb);
Anderson Briglia88ba43b2011-06-09 18:50:42 -0300895 break;
896
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300897 case SMP_CMD_ENCRYPT_INFO:
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300898 reason = smp_cmd_encrypt_info(conn, skb);
899 break;
900
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300901 case SMP_CMD_MASTER_IDENT:
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300902 reason = smp_cmd_master_ident(conn, skb);
903 break;
904
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300905 case SMP_CMD_IDENT_INFO:
906 case SMP_CMD_IDENT_ADDR_INFO:
907 case SMP_CMD_SIGN_INFO:
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300908 /* Just ignored */
909 reason = 0;
910 break;
911
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300912 default:
913 BT_DBG("Unknown command code 0x%2.2x", code);
914
915 reason = SMP_CMD_NOTSUPP;
Vinicius Costa Gomes3a0259b2011-06-09 18:50:43 -0300916 err = -EOPNOTSUPP;
917 goto done;
918 }
919
920done:
Brian Gixa68668b2011-08-11 15:49:36 -0700921 if (reason) {
922 BT_ERR("SMP_CMD_PAIRING_FAIL: %d", reason);
Anderson Briglia133e14c2011-06-09 18:50:40 -0300923 smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason),
924 &reason);
Brian Gixe9ceb522011-09-22 10:46:35 -0700925 del_timer(&hcon->smp_timer);
Brian Gix8d0b7d62011-10-12 15:12:42 -0700926 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Brian Gix58ba0772011-09-23 13:40:16 -0700927 mgmt_auth_failed(hcon->hdev->id, conn->dst, reason);
Brian Gix6d5fb8a2011-09-09 14:53:04 -0700928 hci_conn_put(hcon);
Brian Gixa68668b2011-08-11 15:49:36 -0700929 }
Anderson Brigliaeb492e02011-06-09 18:50:40 -0300930
931 kfree_skb(skb);
932 return err;
933}
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300934
Brian Gixa68668b2011-08-11 15:49:36 -0700935static int smp_distribute_keys(struct l2cap_conn *conn, __u8 force)
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300936{
Brian Gixa68668b2011-08-11 15:49:36 -0700937 struct hci_conn *hcon = conn->hcon;
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300938 struct smp_cmd_pairing *req, *rsp;
939 __u8 *keydist;
940
941 BT_DBG("conn %p force %d", conn, force);
942
Brian Gixa68668b2011-08-11 15:49:36 -0700943 if (IS_ERR(hcon->hdev->tfm))
944 return PTR_ERR(hcon->hdev->tfm);
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -0300945
Brian Gixa68668b2011-08-11 15:49:36 -0700946 rsp = (void *) &hcon->prsp[1];
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300947
948 /* The responder sends its keys first */
Brian Gixa68668b2011-08-11 15:49:36 -0700949 if (!force && hcon->out && (rsp->resp_key_dist & 0x07))
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300950 return 0;
951
Brian Gixa68668b2011-08-11 15:49:36 -0700952 req = (void *) &hcon->preq[1];
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300953
Brian Gixa68668b2011-08-11 15:49:36 -0700954 if (hcon->out) {
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300955 keydist = &rsp->init_key_dist;
956 *keydist &= req->init_key_dist;
957 } else {
958 keydist = &rsp->resp_key_dist;
959 *keydist &= req->resp_key_dist;
960 }
961
962
963 BT_DBG("keydist 0x%x", *keydist);
964
965 if (*keydist & SMP_DIST_ENC_KEY) {
966 struct smp_cmd_encrypt_info enc;
967 struct smp_cmd_master_ident ident;
968 __le16 ediv;
969
970 get_random_bytes(enc.ltk, sizeof(enc.ltk));
971 get_random_bytes(&ediv, sizeof(ediv));
972 get_random_bytes(ident.rand, sizeof(ident.rand));
973
974 smp_send_cmd(conn, SMP_CMD_ENCRYPT_INFO, sizeof(enc), &enc);
975
Brian Gixcf956772011-10-20 15:18:51 -0700976 hci_add_ltk(hcon->hdev, 1, conn->dst, hcon->dst_type,
977 hcon->smp_key_size, hcon->auth, ediv,
978 ident.rand, enc.ltk);
Vinicius Costa Gomes16b90832011-07-07 18:59:39 -0300979
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -0300980 ident.ediv = cpu_to_le16(ediv);
981
982 smp_send_cmd(conn, SMP_CMD_MASTER_IDENT, sizeof(ident), &ident);
983
984 *keydist &= ~SMP_DIST_ENC_KEY;
985 }
986
987 if (*keydist & SMP_DIST_ID_KEY) {
988 struct smp_cmd_ident_addr_info addrinfo;
989 struct smp_cmd_ident_info idinfo;
990
991 /* Send a dummy key */
992 get_random_bytes(idinfo.irk, sizeof(idinfo.irk));
993
994 smp_send_cmd(conn, SMP_CMD_IDENT_INFO, sizeof(idinfo), &idinfo);
995
996 /* Just public address */
997 memset(&addrinfo, 0, sizeof(addrinfo));
998 bacpy(&addrinfo.bdaddr, conn->src);
999
1000 smp_send_cmd(conn, SMP_CMD_IDENT_ADDR_INFO, sizeof(addrinfo),
1001 &addrinfo);
1002
1003 *keydist &= ~SMP_DIST_ID_KEY;
1004 }
1005
1006 if (*keydist & SMP_DIST_SIGN) {
1007 struct smp_cmd_sign_info sign;
1008
1009 /* Send a dummy key */
1010 get_random_bytes(sign.csrk, sizeof(sign.csrk));
1011
1012 smp_send_cmd(conn, SMP_CMD_SIGN_INFO, sizeof(sign), &sign);
1013
1014 *keydist &= ~SMP_DIST_SIGN;
1015 }
1016
Brian Gix2a335262011-11-17 12:59:23 -08001017 if (hcon->out) {
Brian Gixe57c1672011-09-13 12:34:59 -07001018 if (hcon->disconn_cfm_cb)
1019 hcon->disconn_cfm_cb(hcon, 0);
Brian Gixe9ceb522011-09-22 10:46:35 -07001020 del_timer(&hcon->smp_timer);
Brian Gix8d0b7d62011-10-12 15:12:42 -07001021 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Brian Gix2a335262011-11-17 12:59:23 -08001022 hci_conn_put(hcon);
1023 } else if (rsp->resp_key_dist) {
1024 if (hcon->disconn_cfm_cb)
1025 hcon->disconn_cfm_cb(hcon, SMP_UNSPECIFIED);
1026 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
Brian Gix58ba0772011-09-23 13:40:16 -07001027 mgmt_auth_failed(hcon->hdev->id, conn->dst, SMP_UNSPECIFIED);
Brian Gix6d5fb8a2011-09-09 14:53:04 -07001028 hci_conn_put(hcon);
Vinicius Costa Gomesd26a2342011-08-19 21:06:51 -03001029 }
1030
Vinicius Costa Gomes7034b912011-07-07 18:59:34 -03001031 return 0;
1032}
Brian Gixa68668b2011-08-11 15:49:36 -07001033
1034int smp_link_encrypt_cmplt(struct l2cap_conn *conn, u8 status, u8 encrypt)
1035{
1036 struct hci_conn *hcon = conn->hcon;
1037
1038 BT_DBG("smp: %d %d %d", status, encrypt, hcon->sec_req);
1039
Brian Gix8d0b7d62011-10-12 15:12:42 -07001040 clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->pend);
1041
Brian Gix80fb3a92012-01-31 13:15:20 -08001042 if (!status && encrypt && hcon->sec_level < hcon->pending_sec_level)
1043 hcon->sec_level = hcon->pending_sec_level;
1044
Brian Gixa68668b2011-08-11 15:49:36 -07001045 if (!status && encrypt && !hcon->sec_req)
Brian Gix80fb3a92012-01-31 13:15:20 -08001046 return smp_distribute_keys(conn, 0);
Brian Gixa68668b2011-08-11 15:49:36 -07001047
1048 /* Fall back to Pairing request if failed a Link Security request */
1049 else if (hcon->sec_req && (status || !encrypt))
Brian Gix80fb3a92012-01-31 13:15:20 -08001050 smp_conn_security(conn, hcon->pending_sec_level);
Brian Gixa68668b2011-08-11 15:49:36 -07001051
Brian Gix80fb3a92012-01-31 13:15:20 -08001052 hci_conn_put(hcon);
Brian Gix8d0b7d62011-10-12 15:12:42 -07001053
Vinicius Costa Gomesc1d5e1d2011-07-07 18:59:34 -03001054 return 0;
1055}
Brian Gixe9ceb522011-09-22 10:46:35 -07001056
1057void smp_timeout(unsigned long arg)
1058{
1059 struct l2cap_conn *conn = (void *) arg;
1060 u8 reason = SMP_UNSPECIFIED;
1061
1062 BT_DBG("%p", conn);
1063
1064 smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason), &reason);
Brian Gix8d0b7d62011-10-12 15:12:42 -07001065 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->hcon->pend);
Brian Gix58ba0772011-09-23 13:40:16 -07001066 mgmt_auth_failed(conn->hcon->hdev->id, conn->dst, SMP_UNSPECIFIED);
Brian Gixe9ceb522011-09-22 10:46:35 -07001067 hci_conn_put(conn->hcon);
1068}