smp.c 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745
  1. /*
  2. BlueZ - Bluetooth protocol stack for Linux
  3. Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
  4. This program is free software; you can redistribute it and/or modify
  5. it under the terms of the GNU General Public License version 2 as
  6. published by the Free Software Foundation;
  7. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
  8. OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  9. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
  10. IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
  11. CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
  12. WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  13. ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  14. OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
  16. COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
  17. SOFTWARE IS DISCLAIMED.
  18. */
  19. #include <linux/crypto.h>
  20. #include <linux/scatterlist.h>
  21. #include <crypto/b128ops.h>
  22. #include <net/bluetooth/bluetooth.h>
  23. #include <net/bluetooth/hci_core.h>
  24. #include <net/bluetooth/l2cap.h>
  25. #include <net/bluetooth/mgmt.h>
  26. #include "smp.h"
  27. #define SMP_ALLOW_CMD(smp, code) set_bit(code, &smp->allow_cmd)
  28. #define SMP_TIMEOUT msecs_to_jiffies(30000)
  29. #define AUTH_REQ_MASK 0x07
  30. #define KEY_DIST_MASK 0x07
  31. enum {
  32. SMP_FLAG_TK_VALID,
  33. SMP_FLAG_CFM_PENDING,
  34. SMP_FLAG_MITM_AUTH,
  35. SMP_FLAG_COMPLETE,
  36. SMP_FLAG_INITIATOR,
  37. };
  38. struct smp_chan {
  39. struct l2cap_conn *conn;
  40. struct delayed_work security_timer;
  41. unsigned long allow_cmd; /* Bitmask of allowed commands */
  42. u8 preq[7]; /* SMP Pairing Request */
  43. u8 prsp[7]; /* SMP Pairing Response */
  44. u8 prnd[16]; /* SMP Pairing Random (local) */
  45. u8 rrnd[16]; /* SMP Pairing Random (remote) */
  46. u8 pcnf[16]; /* SMP Pairing Confirm */
  47. u8 tk[16]; /* SMP Temporary Key */
  48. u8 enc_key_size;
  49. u8 remote_key_dist;
  50. bdaddr_t id_addr;
  51. u8 id_addr_type;
  52. u8 irk[16];
  53. struct smp_csrk *csrk;
  54. struct smp_csrk *slave_csrk;
  55. struct smp_ltk *ltk;
  56. struct smp_ltk *slave_ltk;
  57. struct smp_irk *remote_irk;
  58. unsigned long flags;
  59. struct crypto_blkcipher *tfm_aes;
  60. };
  61. static inline void swap_buf(const u8 *src, u8 *dst, size_t len)
  62. {
  63. size_t i;
  64. for (i = 0; i < len; i++)
  65. dst[len - 1 - i] = src[i];
  66. }
  67. static int smp_e(struct crypto_blkcipher *tfm, const u8 *k, u8 *r)
  68. {
  69. struct blkcipher_desc desc;
  70. struct scatterlist sg;
  71. uint8_t tmp[16], data[16];
  72. int err;
  73. if (tfm == NULL) {
  74. BT_ERR("tfm %p", tfm);
  75. return -EINVAL;
  76. }
  77. desc.tfm = tfm;
  78. desc.flags = 0;
  79. /* The most significant octet of key corresponds to k[0] */
  80. swap_buf(k, tmp, 16);
  81. err = crypto_blkcipher_setkey(tfm, tmp, 16);
  82. if (err) {
  83. BT_ERR("cipher setkey failed: %d", err);
  84. return err;
  85. }
  86. /* Most significant octet of plaintextData corresponds to data[0] */
  87. swap_buf(r, data, 16);
  88. sg_init_one(&sg, data, 16);
  89. err = crypto_blkcipher_encrypt(&desc, &sg, &sg, 16);
  90. if (err)
  91. BT_ERR("Encrypt data error %d", err);
  92. /* Most significant octet of encryptedData corresponds to data[0] */
  93. swap_buf(data, r, 16);
  94. return err;
  95. }
  96. static int smp_ah(struct crypto_blkcipher *tfm, u8 irk[16], u8 r[3], u8 res[3])
  97. {
  98. u8 _res[16];
  99. int err;
  100. /* r' = padding || r */
  101. memcpy(_res, r, 3);
  102. memset(_res + 3, 0, 13);
  103. err = smp_e(tfm, irk, _res);
  104. if (err) {
  105. BT_ERR("Encrypt error");
  106. return err;
  107. }
  108. /* The output of the random address function ah is:
  109. * ah(h, r) = e(k, r') mod 2^24
  110. * The output of the security function e is then truncated to 24 bits
  111. * by taking the least significant 24 bits of the output of e as the
  112. * result of ah.
  113. */
  114. memcpy(res, _res, 3);
  115. return 0;
  116. }
  117. bool smp_irk_matches(struct hci_dev *hdev, u8 irk[16], bdaddr_t *bdaddr)
  118. {
  119. struct l2cap_chan *chan = hdev->smp_data;
  120. struct crypto_blkcipher *tfm;
  121. u8 hash[3];
  122. int err;
  123. if (!chan || !chan->data)
  124. return false;
  125. tfm = chan->data;
  126. BT_DBG("RPA %pMR IRK %*phN", bdaddr, 16, irk);
  127. err = smp_ah(tfm, irk, &bdaddr->b[3], hash);
  128. if (err)
  129. return false;
  130. return !memcmp(bdaddr->b, hash, 3);
  131. }
  132. int smp_generate_rpa(struct hci_dev *hdev, u8 irk[16], bdaddr_t *rpa)
  133. {
  134. struct l2cap_chan *chan = hdev->smp_data;
  135. struct crypto_blkcipher *tfm;
  136. int err;
  137. if (!chan || !chan->data)
  138. return -EOPNOTSUPP;
  139. tfm = chan->data;
  140. get_random_bytes(&rpa->b[3], 3);
  141. rpa->b[5] &= 0x3f; /* Clear two most significant bits */
  142. rpa->b[5] |= 0x40; /* Set second most significant bit */
  143. err = smp_ah(tfm, irk, &rpa->b[3], rpa->b);
  144. if (err < 0)
  145. return err;
  146. BT_DBG("RPA %pMR", rpa);
  147. return 0;
  148. }
  149. static int smp_c1(struct crypto_blkcipher *tfm_aes, u8 k[16], u8 r[16],
  150. u8 preq[7], u8 pres[7], u8 _iat, bdaddr_t *ia, u8 _rat,
  151. bdaddr_t *ra, u8 res[16])
  152. {
  153. u8 p1[16], p2[16];
  154. int err;
  155. memset(p1, 0, 16);
  156. /* p1 = pres || preq || _rat || _iat */
  157. p1[0] = _iat;
  158. p1[1] = _rat;
  159. memcpy(p1 + 2, preq, 7);
  160. memcpy(p1 + 9, pres, 7);
  161. /* p2 = padding || ia || ra */
  162. memcpy(p2, ra, 6);
  163. memcpy(p2 + 6, ia, 6);
  164. memset(p2 + 12, 0, 4);
  165. /* res = r XOR p1 */
  166. u128_xor((u128 *) res, (u128 *) r, (u128 *) p1);
  167. /* res = e(k, res) */
  168. err = smp_e(tfm_aes, k, res);
  169. if (err) {
  170. BT_ERR("Encrypt data error");
  171. return err;
  172. }
  173. /* res = res XOR p2 */
  174. u128_xor((u128 *) res, (u128 *) res, (u128 *) p2);
  175. /* res = e(k, res) */
  176. err = smp_e(tfm_aes, k, res);
  177. if (err)
  178. BT_ERR("Encrypt data error");
  179. return err;
  180. }
  181. static int smp_s1(struct crypto_blkcipher *tfm_aes, u8 k[16], u8 r1[16],
  182. u8 r2[16], u8 _r[16])
  183. {
  184. int err;
  185. /* Just least significant octets from r1 and r2 are considered */
  186. memcpy(_r, r2, 8);
  187. memcpy(_r + 8, r1, 8);
  188. err = smp_e(tfm_aes, k, _r);
  189. if (err)
  190. BT_ERR("Encrypt data error");
  191. return err;
  192. }
  193. static void smp_send_cmd(struct l2cap_conn *conn, u8 code, u16 len, void *data)
  194. {
  195. struct l2cap_chan *chan = conn->smp;
  196. struct smp_chan *smp;
  197. struct kvec iv[2];
  198. struct msghdr msg;
  199. if (!chan)
  200. return;
  201. BT_DBG("code 0x%2.2x", code);
  202. iv[0].iov_base = &code;
  203. iv[0].iov_len = 1;
  204. iv[1].iov_base = data;
  205. iv[1].iov_len = len;
  206. memset(&msg, 0, sizeof(msg));
  207. msg.msg_iov = (struct iovec *) &iv;
  208. msg.msg_iovlen = 2;
  209. l2cap_chan_send(chan, &msg, 1 + len);
  210. if (!chan->data)
  211. return;
  212. smp = chan->data;
  213. cancel_delayed_work_sync(&smp->security_timer);
  214. schedule_delayed_work(&smp->security_timer, SMP_TIMEOUT);
  215. }
  216. static __u8 authreq_to_seclevel(__u8 authreq)
  217. {
  218. if (authreq & SMP_AUTH_MITM)
  219. return BT_SECURITY_HIGH;
  220. else
  221. return BT_SECURITY_MEDIUM;
  222. }
  223. static __u8 seclevel_to_authreq(__u8 sec_level)
  224. {
  225. switch (sec_level) {
  226. case BT_SECURITY_HIGH:
  227. return SMP_AUTH_MITM | SMP_AUTH_BONDING;
  228. case BT_SECURITY_MEDIUM:
  229. return SMP_AUTH_BONDING;
  230. default:
  231. return SMP_AUTH_NONE;
  232. }
  233. }
  234. static void build_pairing_cmd(struct l2cap_conn *conn,
  235. struct smp_cmd_pairing *req,
  236. struct smp_cmd_pairing *rsp, __u8 authreq)
  237. {
  238. struct l2cap_chan *chan = conn->smp;
  239. struct smp_chan *smp = chan->data;
  240. struct hci_conn *hcon = conn->hcon;
  241. struct hci_dev *hdev = hcon->hdev;
  242. u8 local_dist = 0, remote_dist = 0;
  243. if (test_bit(HCI_BONDABLE, &conn->hcon->hdev->dev_flags)) {
  244. local_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN;
  245. remote_dist = SMP_DIST_ENC_KEY | SMP_DIST_SIGN;
  246. authreq |= SMP_AUTH_BONDING;
  247. } else {
  248. authreq &= ~SMP_AUTH_BONDING;
  249. }
  250. if (test_bit(HCI_RPA_RESOLVING, &hdev->dev_flags))
  251. remote_dist |= SMP_DIST_ID_KEY;
  252. if (test_bit(HCI_PRIVACY, &hdev->dev_flags))
  253. local_dist |= SMP_DIST_ID_KEY;
  254. if (rsp == NULL) {
  255. req->io_capability = conn->hcon->io_capability;
  256. req->oob_flag = SMP_OOB_NOT_PRESENT;
  257. req->max_key_size = SMP_MAX_ENC_KEY_SIZE;
  258. req->init_key_dist = local_dist;
  259. req->resp_key_dist = remote_dist;
  260. req->auth_req = (authreq & AUTH_REQ_MASK);
  261. smp->remote_key_dist = remote_dist;
  262. return;
  263. }
  264. rsp->io_capability = conn->hcon->io_capability;
  265. rsp->oob_flag = SMP_OOB_NOT_PRESENT;
  266. rsp->max_key_size = SMP_MAX_ENC_KEY_SIZE;
  267. rsp->init_key_dist = req->init_key_dist & remote_dist;
  268. rsp->resp_key_dist = req->resp_key_dist & local_dist;
  269. rsp->auth_req = (authreq & AUTH_REQ_MASK);
  270. smp->remote_key_dist = rsp->init_key_dist;
  271. }
  272. static u8 check_enc_key_size(struct l2cap_conn *conn, __u8 max_key_size)
  273. {
  274. struct l2cap_chan *chan = conn->smp;
  275. struct smp_chan *smp = chan->data;
  276. if ((max_key_size > SMP_MAX_ENC_KEY_SIZE) ||
  277. (max_key_size < SMP_MIN_ENC_KEY_SIZE))
  278. return SMP_ENC_KEY_SIZE;
  279. smp->enc_key_size = max_key_size;
  280. return 0;
  281. }
  282. static void smp_chan_destroy(struct l2cap_conn *conn)
  283. {
  284. struct l2cap_chan *chan = conn->smp;
  285. struct smp_chan *smp = chan->data;
  286. bool complete;
  287. BUG_ON(!smp);
  288. cancel_delayed_work_sync(&smp->security_timer);
  289. complete = test_bit(SMP_FLAG_COMPLETE, &smp->flags);
  290. mgmt_smp_complete(conn->hcon, complete);
  291. kfree(smp->csrk);
  292. kfree(smp->slave_csrk);
  293. crypto_free_blkcipher(smp->tfm_aes);
  294. /* If pairing failed clean up any keys we might have */
  295. if (!complete) {
  296. if (smp->ltk) {
  297. list_del(&smp->ltk->list);
  298. kfree(smp->ltk);
  299. }
  300. if (smp->slave_ltk) {
  301. list_del(&smp->slave_ltk->list);
  302. kfree(smp->slave_ltk);
  303. }
  304. if (smp->remote_irk) {
  305. list_del(&smp->remote_irk->list);
  306. kfree(smp->remote_irk);
  307. }
  308. }
  309. chan->data = NULL;
  310. kfree(smp);
  311. hci_conn_drop(conn->hcon);
  312. }
  313. static void smp_failure(struct l2cap_conn *conn, u8 reason)
  314. {
  315. struct hci_conn *hcon = conn->hcon;
  316. struct l2cap_chan *chan = conn->smp;
  317. if (reason)
  318. smp_send_cmd(conn, SMP_CMD_PAIRING_FAIL, sizeof(reason),
  319. &reason);
  320. clear_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags);
  321. mgmt_auth_failed(hcon, HCI_ERROR_AUTH_FAILURE);
  322. if (chan->data)
  323. smp_chan_destroy(conn);
  324. }
  325. #define JUST_WORKS 0x00
  326. #define JUST_CFM 0x01
  327. #define REQ_PASSKEY 0x02
  328. #define CFM_PASSKEY 0x03
  329. #define REQ_OOB 0x04
  330. #define OVERLAP 0xFF
  331. static const u8 gen_method[5][5] = {
  332. { JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY },
  333. { JUST_WORKS, JUST_CFM, REQ_PASSKEY, JUST_WORKS, REQ_PASSKEY },
  334. { CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, CFM_PASSKEY },
  335. { JUST_WORKS, JUST_CFM, JUST_WORKS, JUST_WORKS, JUST_CFM },
  336. { CFM_PASSKEY, CFM_PASSKEY, REQ_PASSKEY, JUST_WORKS, OVERLAP },
  337. };
  338. static u8 get_auth_method(struct smp_chan *smp, u8 local_io, u8 remote_io)
  339. {
  340. /* If either side has unknown io_caps, use JUST_CFM (which gets
  341. * converted later to JUST_WORKS if we're initiators.
  342. */
  343. if (local_io > SMP_IO_KEYBOARD_DISPLAY ||
  344. remote_io > SMP_IO_KEYBOARD_DISPLAY)
  345. return JUST_CFM;
  346. return gen_method[remote_io][local_io];
  347. }
  348. static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth,
  349. u8 local_io, u8 remote_io)
  350. {
  351. struct hci_conn *hcon = conn->hcon;
  352. struct l2cap_chan *chan = conn->smp;
  353. struct smp_chan *smp = chan->data;
  354. u8 method;
  355. u32 passkey = 0;
  356. int ret = 0;
  357. /* Initialize key for JUST WORKS */
  358. memset(smp->tk, 0, sizeof(smp->tk));
  359. clear_bit(SMP_FLAG_TK_VALID, &smp->flags);
  360. BT_DBG("tk_request: auth:%d lcl:%d rem:%d", auth, local_io, remote_io);
  361. /* If neither side wants MITM, either "just" confirm an incoming
  362. * request or use just-works for outgoing ones. The JUST_CFM
  363. * will be converted to JUST_WORKS if necessary later in this
  364. * function. If either side has MITM look up the method from the
  365. * table.
  366. */
  367. if (!(auth & SMP_AUTH_MITM))
  368. method = JUST_CFM;
  369. else
  370. method = get_auth_method(smp, local_io, remote_io);
  371. /* Don't confirm locally initiated pairing attempts */
  372. if (method == JUST_CFM && test_bit(SMP_FLAG_INITIATOR, &smp->flags))
  373. method = JUST_WORKS;
  374. /* Don't bother user space with no IO capabilities */
  375. if (method == JUST_CFM && hcon->io_capability == HCI_IO_NO_INPUT_OUTPUT)
  376. method = JUST_WORKS;
  377. /* If Just Works, Continue with Zero TK */
  378. if (method == JUST_WORKS) {
  379. set_bit(SMP_FLAG_TK_VALID, &smp->flags);
  380. return 0;
  381. }
  382. /* Not Just Works/Confirm results in MITM Authentication */
  383. if (method != JUST_CFM) {
  384. set_bit(SMP_FLAG_MITM_AUTH, &smp->flags);
  385. if (hcon->pending_sec_level < BT_SECURITY_HIGH)
  386. hcon->pending_sec_level = BT_SECURITY_HIGH;
  387. }
  388. /* If both devices have Keyoard-Display I/O, the master
  389. * Confirms and the slave Enters the passkey.
  390. */
  391. if (method == OVERLAP) {
  392. if (hcon->role == HCI_ROLE_MASTER)
  393. method = CFM_PASSKEY;
  394. else
  395. method = REQ_PASSKEY;
  396. }
  397. /* Generate random passkey. */
  398. if (method == CFM_PASSKEY) {
  399. memset(smp->tk, 0, sizeof(smp->tk));
  400. get_random_bytes(&passkey, sizeof(passkey));
  401. passkey %= 1000000;
  402. put_unaligned_le32(passkey, smp->tk);
  403. BT_DBG("PassKey: %d", passkey);
  404. set_bit(SMP_FLAG_TK_VALID, &smp->flags);
  405. }
  406. hci_dev_lock(hcon->hdev);
  407. if (method == REQ_PASSKEY)
  408. ret = mgmt_user_passkey_request(hcon->hdev, &hcon->dst,
  409. hcon->type, hcon->dst_type);
  410. else if (method == JUST_CFM)
  411. ret = mgmt_user_confirm_request(hcon->hdev, &hcon->dst,
  412. hcon->type, hcon->dst_type,
  413. passkey, 1);
  414. else
  415. ret = mgmt_user_passkey_notify(hcon->hdev, &hcon->dst,
  416. hcon->type, hcon->dst_type,
  417. passkey, 0);
  418. hci_dev_unlock(hcon->hdev);
  419. return ret;
  420. }
  421. static u8 smp_confirm(struct smp_chan *smp)
  422. {
  423. struct l2cap_conn *conn = smp->conn;
  424. struct smp_cmd_pairing_confirm cp;
  425. int ret;
  426. BT_DBG("conn %p", conn);
  427. ret = smp_c1(smp->tfm_aes, smp->tk, smp->prnd, smp->preq, smp->prsp,
  428. conn->hcon->init_addr_type, &conn->hcon->init_addr,
  429. conn->hcon->resp_addr_type, &conn->hcon->resp_addr,
  430. cp.confirm_val);
  431. if (ret)
  432. return SMP_UNSPECIFIED;
  433. clear_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
  434. smp_send_cmd(smp->conn, SMP_CMD_PAIRING_CONFIRM, sizeof(cp), &cp);
  435. if (conn->hcon->out)
  436. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_CONFIRM);
  437. else
  438. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_RANDOM);
  439. return 0;
  440. }
  441. static u8 smp_random(struct smp_chan *smp)
  442. {
  443. struct l2cap_conn *conn = smp->conn;
  444. struct hci_conn *hcon = conn->hcon;
  445. u8 confirm[16];
  446. int ret;
  447. if (IS_ERR_OR_NULL(smp->tfm_aes))
  448. return SMP_UNSPECIFIED;
  449. BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
  450. ret = smp_c1(smp->tfm_aes, smp->tk, smp->rrnd, smp->preq, smp->prsp,
  451. hcon->init_addr_type, &hcon->init_addr,
  452. hcon->resp_addr_type, &hcon->resp_addr, confirm);
  453. if (ret)
  454. return SMP_UNSPECIFIED;
  455. if (memcmp(smp->pcnf, confirm, sizeof(smp->pcnf)) != 0) {
  456. BT_ERR("Pairing failed (confirmation values mismatch)");
  457. return SMP_CONFIRM_FAILED;
  458. }
  459. if (hcon->out) {
  460. u8 stk[16];
  461. __le64 rand = 0;
  462. __le16 ediv = 0;
  463. smp_s1(smp->tfm_aes, smp->tk, smp->rrnd, smp->prnd, stk);
  464. memset(stk + smp->enc_key_size, 0,
  465. SMP_MAX_ENC_KEY_SIZE - smp->enc_key_size);
  466. if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags))
  467. return SMP_UNSPECIFIED;
  468. hci_le_start_enc(hcon, ediv, rand, stk);
  469. hcon->enc_key_size = smp->enc_key_size;
  470. set_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags);
  471. } else {
  472. u8 stk[16], auth;
  473. __le64 rand = 0;
  474. __le16 ediv = 0;
  475. smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd),
  476. smp->prnd);
  477. smp_s1(smp->tfm_aes, smp->tk, smp->prnd, smp->rrnd, stk);
  478. memset(stk + smp->enc_key_size, 0,
  479. SMP_MAX_ENC_KEY_SIZE - smp->enc_key_size);
  480. if (hcon->pending_sec_level == BT_SECURITY_HIGH)
  481. auth = 1;
  482. else
  483. auth = 0;
  484. /* Even though there's no _SLAVE suffix this is the
  485. * slave STK we're adding for later lookup (the master
  486. * STK never needs to be stored).
  487. */
  488. hci_add_ltk(hcon->hdev, &hcon->dst, hcon->dst_type,
  489. SMP_STK, auth, stk, smp->enc_key_size, ediv, rand);
  490. }
  491. return 0;
  492. }
  493. static void smp_notify_keys(struct l2cap_conn *conn)
  494. {
  495. struct l2cap_chan *chan = conn->smp;
  496. struct smp_chan *smp = chan->data;
  497. struct hci_conn *hcon = conn->hcon;
  498. struct hci_dev *hdev = hcon->hdev;
  499. struct smp_cmd_pairing *req = (void *) &smp->preq[1];
  500. struct smp_cmd_pairing *rsp = (void *) &smp->prsp[1];
  501. bool persistent;
  502. if (smp->remote_irk) {
  503. mgmt_new_irk(hdev, smp->remote_irk);
  504. /* Now that user space can be considered to know the
  505. * identity address track the connection based on it
  506. * from now on.
  507. */
  508. bacpy(&hcon->dst, &smp->remote_irk->bdaddr);
  509. hcon->dst_type = smp->remote_irk->addr_type;
  510. queue_work(hdev->workqueue, &conn->id_addr_update_work);
  511. /* When receiving an indentity resolving key for
  512. * a remote device that does not use a resolvable
  513. * private address, just remove the key so that
  514. * it is possible to use the controller white
  515. * list for scanning.
  516. *
  517. * Userspace will have been told to not store
  518. * this key at this point. So it is safe to
  519. * just remove it.
  520. */
  521. if (!bacmp(&smp->remote_irk->rpa, BDADDR_ANY)) {
  522. list_del(&smp->remote_irk->list);
  523. kfree(smp->remote_irk);
  524. smp->remote_irk = NULL;
  525. }
  526. }
  527. /* The LTKs and CSRKs should be persistent only if both sides
  528. * had the bonding bit set in their authentication requests.
  529. */
  530. persistent = !!((req->auth_req & rsp->auth_req) & SMP_AUTH_BONDING);
  531. if (smp->csrk) {
  532. smp->csrk->bdaddr_type = hcon->dst_type;
  533. bacpy(&smp->csrk->bdaddr, &hcon->dst);
  534. mgmt_new_csrk(hdev, smp->csrk, persistent);
  535. }
  536. if (smp->slave_csrk) {
  537. smp->slave_csrk->bdaddr_type = hcon->dst_type;
  538. bacpy(&smp->slave_csrk->bdaddr, &hcon->dst);
  539. mgmt_new_csrk(hdev, smp->slave_csrk, persistent);
  540. }
  541. if (smp->ltk) {
  542. smp->ltk->bdaddr_type = hcon->dst_type;
  543. bacpy(&smp->ltk->bdaddr, &hcon->dst);
  544. mgmt_new_ltk(hdev, smp->ltk, persistent);
  545. }
  546. if (smp->slave_ltk) {
  547. smp->slave_ltk->bdaddr_type = hcon->dst_type;
  548. bacpy(&smp->slave_ltk->bdaddr, &hcon->dst);
  549. mgmt_new_ltk(hdev, smp->slave_ltk, persistent);
  550. }
  551. }
  552. static void smp_allow_key_dist(struct smp_chan *smp)
  553. {
  554. /* Allow the first expected phase 3 PDU. The rest of the PDUs
  555. * will be allowed in each PDU handler to ensure we receive
  556. * them in the correct order.
  557. */
  558. if (smp->remote_key_dist & SMP_DIST_ENC_KEY)
  559. SMP_ALLOW_CMD(smp, SMP_CMD_ENCRYPT_INFO);
  560. else if (smp->remote_key_dist & SMP_DIST_ID_KEY)
  561. SMP_ALLOW_CMD(smp, SMP_CMD_IDENT_INFO);
  562. else if (smp->remote_key_dist & SMP_DIST_SIGN)
  563. SMP_ALLOW_CMD(smp, SMP_CMD_SIGN_INFO);
  564. }
  565. static void smp_distribute_keys(struct smp_chan *smp)
  566. {
  567. struct smp_cmd_pairing *req, *rsp;
  568. struct l2cap_conn *conn = smp->conn;
  569. struct hci_conn *hcon = conn->hcon;
  570. struct hci_dev *hdev = hcon->hdev;
  571. __u8 *keydist;
  572. BT_DBG("conn %p", conn);
  573. rsp = (void *) &smp->prsp[1];
  574. /* The responder sends its keys first */
  575. if (hcon->out && (smp->remote_key_dist & KEY_DIST_MASK)) {
  576. smp_allow_key_dist(smp);
  577. return;
  578. }
  579. req = (void *) &smp->preq[1];
  580. if (hcon->out) {
  581. keydist = &rsp->init_key_dist;
  582. *keydist &= req->init_key_dist;
  583. } else {
  584. keydist = &rsp->resp_key_dist;
  585. *keydist &= req->resp_key_dist;
  586. }
  587. BT_DBG("keydist 0x%x", *keydist);
  588. if (*keydist & SMP_DIST_ENC_KEY) {
  589. struct smp_cmd_encrypt_info enc;
  590. struct smp_cmd_master_ident ident;
  591. struct smp_ltk *ltk;
  592. u8 authenticated;
  593. __le16 ediv;
  594. __le64 rand;
  595. get_random_bytes(enc.ltk, sizeof(enc.ltk));
  596. get_random_bytes(&ediv, sizeof(ediv));
  597. get_random_bytes(&rand, sizeof(rand));
  598. smp_send_cmd(conn, SMP_CMD_ENCRYPT_INFO, sizeof(enc), &enc);
  599. authenticated = hcon->sec_level == BT_SECURITY_HIGH;
  600. ltk = hci_add_ltk(hdev, &hcon->dst, hcon->dst_type,
  601. SMP_LTK_SLAVE, authenticated, enc.ltk,
  602. smp->enc_key_size, ediv, rand);
  603. smp->slave_ltk = ltk;
  604. ident.ediv = ediv;
  605. ident.rand = rand;
  606. smp_send_cmd(conn, SMP_CMD_MASTER_IDENT, sizeof(ident), &ident);
  607. *keydist &= ~SMP_DIST_ENC_KEY;
  608. }
  609. if (*keydist & SMP_DIST_ID_KEY) {
  610. struct smp_cmd_ident_addr_info addrinfo;
  611. struct smp_cmd_ident_info idinfo;
  612. memcpy(idinfo.irk, hdev->irk, sizeof(idinfo.irk));
  613. smp_send_cmd(conn, SMP_CMD_IDENT_INFO, sizeof(idinfo), &idinfo);
  614. /* The hci_conn contains the local identity address
  615. * after the connection has been established.
  616. *
  617. * This is true even when the connection has been
  618. * established using a resolvable random address.
  619. */
  620. bacpy(&addrinfo.bdaddr, &hcon->src);
  621. addrinfo.addr_type = hcon->src_type;
  622. smp_send_cmd(conn, SMP_CMD_IDENT_ADDR_INFO, sizeof(addrinfo),
  623. &addrinfo);
  624. *keydist &= ~SMP_DIST_ID_KEY;
  625. }
  626. if (*keydist & SMP_DIST_SIGN) {
  627. struct smp_cmd_sign_info sign;
  628. struct smp_csrk *csrk;
  629. /* Generate a new random key */
  630. get_random_bytes(sign.csrk, sizeof(sign.csrk));
  631. csrk = kzalloc(sizeof(*csrk), GFP_KERNEL);
  632. if (csrk) {
  633. csrk->master = 0x00;
  634. memcpy(csrk->val, sign.csrk, sizeof(csrk->val));
  635. }
  636. smp->slave_csrk = csrk;
  637. smp_send_cmd(conn, SMP_CMD_SIGN_INFO, sizeof(sign), &sign);
  638. *keydist &= ~SMP_DIST_SIGN;
  639. }
  640. /* If there are still keys to be received wait for them */
  641. if (smp->remote_key_dist & KEY_DIST_MASK) {
  642. smp_allow_key_dist(smp);
  643. return;
  644. }
  645. set_bit(SMP_FLAG_COMPLETE, &smp->flags);
  646. smp_notify_keys(conn);
  647. smp_chan_destroy(conn);
  648. }
  649. static void smp_timeout(struct work_struct *work)
  650. {
  651. struct smp_chan *smp = container_of(work, struct smp_chan,
  652. security_timer.work);
  653. struct l2cap_conn *conn = smp->conn;
  654. BT_DBG("conn %p", conn);
  655. hci_disconnect(conn->hcon, HCI_ERROR_REMOTE_USER_TERM);
  656. }
  657. static struct smp_chan *smp_chan_create(struct l2cap_conn *conn)
  658. {
  659. struct l2cap_chan *chan = conn->smp;
  660. struct smp_chan *smp;
  661. smp = kzalloc(sizeof(*smp), GFP_ATOMIC);
  662. if (!smp)
  663. return NULL;
  664. smp->tfm_aes = crypto_alloc_blkcipher("ecb(aes)", 0, CRYPTO_ALG_ASYNC);
  665. if (IS_ERR(smp->tfm_aes)) {
  666. BT_ERR("Unable to create ECB crypto context");
  667. kfree(smp);
  668. return NULL;
  669. }
  670. smp->conn = conn;
  671. chan->data = smp;
  672. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_FAIL);
  673. INIT_DELAYED_WORK(&smp->security_timer, smp_timeout);
  674. hci_conn_hold(conn->hcon);
  675. return smp;
  676. }
  677. int smp_user_confirm_reply(struct hci_conn *hcon, u16 mgmt_op, __le32 passkey)
  678. {
  679. struct l2cap_conn *conn = hcon->l2cap_data;
  680. struct l2cap_chan *chan;
  681. struct smp_chan *smp;
  682. u32 value;
  683. int err;
  684. BT_DBG("");
  685. if (!conn)
  686. return -ENOTCONN;
  687. chan = conn->smp;
  688. if (!chan)
  689. return -ENOTCONN;
  690. l2cap_chan_lock(chan);
  691. if (!chan->data) {
  692. err = -ENOTCONN;
  693. goto unlock;
  694. }
  695. smp = chan->data;
  696. switch (mgmt_op) {
  697. case MGMT_OP_USER_PASSKEY_REPLY:
  698. value = le32_to_cpu(passkey);
  699. memset(smp->tk, 0, sizeof(smp->tk));
  700. BT_DBG("PassKey: %d", value);
  701. put_unaligned_le32(value, smp->tk);
  702. /* Fall Through */
  703. case MGMT_OP_USER_CONFIRM_REPLY:
  704. set_bit(SMP_FLAG_TK_VALID, &smp->flags);
  705. break;
  706. case MGMT_OP_USER_PASSKEY_NEG_REPLY:
  707. case MGMT_OP_USER_CONFIRM_NEG_REPLY:
  708. smp_failure(conn, SMP_PASSKEY_ENTRY_FAILED);
  709. err = 0;
  710. goto unlock;
  711. default:
  712. smp_failure(conn, SMP_PASSKEY_ENTRY_FAILED);
  713. err = -EOPNOTSUPP;
  714. goto unlock;
  715. }
  716. err = 0;
  717. /* If it is our turn to send Pairing Confirm, do so now */
  718. if (test_bit(SMP_FLAG_CFM_PENDING, &smp->flags)) {
  719. u8 rsp = smp_confirm(smp);
  720. if (rsp)
  721. smp_failure(conn, rsp);
  722. }
  723. unlock:
  724. l2cap_chan_unlock(chan);
  725. return err;
  726. }
  727. static u8 smp_cmd_pairing_req(struct l2cap_conn *conn, struct sk_buff *skb)
  728. {
  729. struct smp_cmd_pairing rsp, *req = (void *) skb->data;
  730. struct l2cap_chan *chan = conn->smp;
  731. struct hci_dev *hdev = conn->hcon->hdev;
  732. struct smp_chan *smp;
  733. u8 key_size, auth, sec_level;
  734. int ret;
  735. BT_DBG("conn %p", conn);
  736. if (skb->len < sizeof(*req))
  737. return SMP_INVALID_PARAMS;
  738. if (conn->hcon->role != HCI_ROLE_SLAVE)
  739. return SMP_CMD_NOTSUPP;
  740. if (!chan->data)
  741. smp = smp_chan_create(conn);
  742. else
  743. smp = chan->data;
  744. if (!smp)
  745. return SMP_UNSPECIFIED;
  746. /* We didn't start the pairing, so match remote */
  747. auth = req->auth_req & AUTH_REQ_MASK;
  748. if (!test_bit(HCI_BONDABLE, &hdev->dev_flags) &&
  749. (auth & SMP_AUTH_BONDING))
  750. return SMP_PAIRING_NOTSUPP;
  751. smp->preq[0] = SMP_CMD_PAIRING_REQ;
  752. memcpy(&smp->preq[1], req, sizeof(*req));
  753. skb_pull(skb, sizeof(*req));
  754. if (conn->hcon->io_capability == HCI_IO_NO_INPUT_OUTPUT)
  755. sec_level = BT_SECURITY_MEDIUM;
  756. else
  757. sec_level = authreq_to_seclevel(auth);
  758. if (sec_level > conn->hcon->pending_sec_level)
  759. conn->hcon->pending_sec_level = sec_level;
  760. /* If we need MITM check that it can be achieved */
  761. if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
  762. u8 method;
  763. method = get_auth_method(smp, conn->hcon->io_capability,
  764. req->io_capability);
  765. if (method == JUST_WORKS || method == JUST_CFM)
  766. return SMP_AUTH_REQUIREMENTS;
  767. }
  768. build_pairing_cmd(conn, req, &rsp, auth);
  769. key_size = min(req->max_key_size, rsp.max_key_size);
  770. if (check_enc_key_size(conn, key_size))
  771. return SMP_ENC_KEY_SIZE;
  772. get_random_bytes(smp->prnd, sizeof(smp->prnd));
  773. smp->prsp[0] = SMP_CMD_PAIRING_RSP;
  774. memcpy(&smp->prsp[1], &rsp, sizeof(rsp));
  775. smp_send_cmd(conn, SMP_CMD_PAIRING_RSP, sizeof(rsp), &rsp);
  776. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_CONFIRM);
  777. /* Request setup of TK */
  778. ret = tk_request(conn, 0, auth, rsp.io_capability, req->io_capability);
  779. if (ret)
  780. return SMP_UNSPECIFIED;
  781. return 0;
  782. }
  783. static u8 smp_cmd_pairing_rsp(struct l2cap_conn *conn, struct sk_buff *skb)
  784. {
  785. struct smp_cmd_pairing *req, *rsp = (void *) skb->data;
  786. struct l2cap_chan *chan = conn->smp;
  787. struct smp_chan *smp = chan->data;
  788. u8 key_size, auth;
  789. int ret;
  790. BT_DBG("conn %p", conn);
  791. if (skb->len < sizeof(*rsp))
  792. return SMP_INVALID_PARAMS;
  793. if (conn->hcon->role != HCI_ROLE_MASTER)
  794. return SMP_CMD_NOTSUPP;
  795. skb_pull(skb, sizeof(*rsp));
  796. req = (void *) &smp->preq[1];
  797. key_size = min(req->max_key_size, rsp->max_key_size);
  798. if (check_enc_key_size(conn, key_size))
  799. return SMP_ENC_KEY_SIZE;
  800. auth = rsp->auth_req & AUTH_REQ_MASK;
  801. /* If we need MITM check that it can be achieved */
  802. if (conn->hcon->pending_sec_level >= BT_SECURITY_HIGH) {
  803. u8 method;
  804. method = get_auth_method(smp, req->io_capability,
  805. rsp->io_capability);
  806. if (method == JUST_WORKS || method == JUST_CFM)
  807. return SMP_AUTH_REQUIREMENTS;
  808. }
  809. get_random_bytes(smp->prnd, sizeof(smp->prnd));
  810. smp->prsp[0] = SMP_CMD_PAIRING_RSP;
  811. memcpy(&smp->prsp[1], rsp, sizeof(*rsp));
  812. /* Update remote key distribution in case the remote cleared
  813. * some bits that we had enabled in our request.
  814. */
  815. smp->remote_key_dist &= rsp->resp_key_dist;
  816. auth |= req->auth_req;
  817. ret = tk_request(conn, 0, auth, req->io_capability, rsp->io_capability);
  818. if (ret)
  819. return SMP_UNSPECIFIED;
  820. set_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
  821. /* Can't compose response until we have been confirmed */
  822. if (test_bit(SMP_FLAG_TK_VALID, &smp->flags))
  823. return smp_confirm(smp);
  824. return 0;
  825. }
  826. static u8 smp_cmd_pairing_confirm(struct l2cap_conn *conn, struct sk_buff *skb)
  827. {
  828. struct l2cap_chan *chan = conn->smp;
  829. struct smp_chan *smp = chan->data;
  830. BT_DBG("conn %p %s", conn, conn->hcon->out ? "master" : "slave");
  831. if (skb->len < sizeof(smp->pcnf))
  832. return SMP_INVALID_PARAMS;
  833. memcpy(smp->pcnf, skb->data, sizeof(smp->pcnf));
  834. skb_pull(skb, sizeof(smp->pcnf));
  835. if (conn->hcon->out) {
  836. smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd),
  837. smp->prnd);
  838. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_RANDOM);
  839. return 0;
  840. }
  841. if (test_bit(SMP_FLAG_TK_VALID, &smp->flags))
  842. return smp_confirm(smp);
  843. else
  844. set_bit(SMP_FLAG_CFM_PENDING, &smp->flags);
  845. return 0;
  846. }
  847. static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb)
  848. {
  849. struct l2cap_chan *chan = conn->smp;
  850. struct smp_chan *smp = chan->data;
  851. BT_DBG("conn %p", conn);
  852. if (skb->len < sizeof(smp->rrnd))
  853. return SMP_INVALID_PARAMS;
  854. memcpy(smp->rrnd, skb->data, sizeof(smp->rrnd));
  855. skb_pull(skb, sizeof(smp->rrnd));
  856. return smp_random(smp);
  857. }
  858. static bool smp_ltk_encrypt(struct l2cap_conn *conn, u8 sec_level)
  859. {
  860. struct smp_ltk *key;
  861. struct hci_conn *hcon = conn->hcon;
  862. key = hci_find_ltk_by_addr(hcon->hdev, &hcon->dst, hcon->dst_type,
  863. hcon->role);
  864. if (!key)
  865. return false;
  866. if (smp_ltk_sec_level(key) < sec_level)
  867. return false;
  868. if (test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &hcon->flags))
  869. return true;
  870. hci_le_start_enc(hcon, key->ediv, key->rand, key->val);
  871. hcon->enc_key_size = key->enc_size;
  872. /* We never store STKs for master role, so clear this flag */
  873. clear_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags);
  874. return true;
  875. }
  876. bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level)
  877. {
  878. if (sec_level == BT_SECURITY_LOW)
  879. return true;
  880. /* If we're encrypted with an STK always claim insufficient
  881. * security. This way we allow the connection to be re-encrypted
  882. * with an LTK, even if the LTK provides the same level of
  883. * security. Only exception is if we don't have an LTK (e.g.
  884. * because of key distribution bits).
  885. */
  886. if (test_bit(HCI_CONN_STK_ENCRYPT, &hcon->flags) &&
  887. hci_find_ltk_by_addr(hcon->hdev, &hcon->dst, hcon->dst_type,
  888. hcon->role))
  889. return false;
  890. if (hcon->sec_level >= sec_level)
  891. return true;
  892. return false;
  893. }
  894. static u8 smp_cmd_security_req(struct l2cap_conn *conn, struct sk_buff *skb)
  895. {
  896. struct smp_cmd_security_req *rp = (void *) skb->data;
  897. struct smp_cmd_pairing cp;
  898. struct hci_conn *hcon = conn->hcon;
  899. struct smp_chan *smp;
  900. u8 sec_level, auth;
  901. BT_DBG("conn %p", conn);
  902. if (skb->len < sizeof(*rp))
  903. return SMP_INVALID_PARAMS;
  904. if (hcon->role != HCI_ROLE_MASTER)
  905. return SMP_CMD_NOTSUPP;
  906. auth = rp->auth_req & AUTH_REQ_MASK;
  907. if (hcon->io_capability == HCI_IO_NO_INPUT_OUTPUT)
  908. sec_level = BT_SECURITY_MEDIUM;
  909. else
  910. sec_level = authreq_to_seclevel(auth);
  911. if (smp_sufficient_security(hcon, sec_level))
  912. return 0;
  913. if (sec_level > hcon->pending_sec_level)
  914. hcon->pending_sec_level = sec_level;
  915. if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
  916. return 0;
  917. smp = smp_chan_create(conn);
  918. if (!smp)
  919. return SMP_UNSPECIFIED;
  920. if (!test_bit(HCI_BONDABLE, &hcon->hdev->dev_flags) &&
  921. (auth & SMP_AUTH_BONDING))
  922. return SMP_PAIRING_NOTSUPP;
  923. skb_pull(skb, sizeof(*rp));
  924. memset(&cp, 0, sizeof(cp));
  925. build_pairing_cmd(conn, &cp, NULL, auth);
  926. smp->preq[0] = SMP_CMD_PAIRING_REQ;
  927. memcpy(&smp->preq[1], &cp, sizeof(cp));
  928. smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
  929. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_RSP);
  930. return 0;
  931. }
  932. int smp_conn_security(struct hci_conn *hcon, __u8 sec_level)
  933. {
  934. struct l2cap_conn *conn = hcon->l2cap_data;
  935. struct l2cap_chan *chan;
  936. struct smp_chan *smp;
  937. __u8 authreq;
  938. int ret;
  939. BT_DBG("conn %p hcon %p level 0x%2.2x", conn, hcon, sec_level);
  940. /* This may be NULL if there's an unexpected disconnection */
  941. if (!conn)
  942. return 1;
  943. chan = conn->smp;
  944. if (!test_bit(HCI_LE_ENABLED, &hcon->hdev->dev_flags))
  945. return 1;
  946. if (smp_sufficient_security(hcon, sec_level))
  947. return 1;
  948. if (sec_level > hcon->pending_sec_level)
  949. hcon->pending_sec_level = sec_level;
  950. if (hcon->role == HCI_ROLE_MASTER)
  951. if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
  952. return 0;
  953. l2cap_chan_lock(chan);
  954. /* If SMP is already in progress ignore this request */
  955. if (chan->data) {
  956. ret = 0;
  957. goto unlock;
  958. }
  959. smp = smp_chan_create(conn);
  960. if (!smp) {
  961. ret = 1;
  962. goto unlock;
  963. }
  964. authreq = seclevel_to_authreq(sec_level);
  965. /* Require MITM if IO Capability allows or the security level
  966. * requires it.
  967. */
  968. if (hcon->io_capability != HCI_IO_NO_INPUT_OUTPUT ||
  969. hcon->pending_sec_level > BT_SECURITY_MEDIUM)
  970. authreq |= SMP_AUTH_MITM;
  971. if (hcon->role == HCI_ROLE_MASTER) {
  972. struct smp_cmd_pairing cp;
  973. build_pairing_cmd(conn, &cp, NULL, authreq);
  974. smp->preq[0] = SMP_CMD_PAIRING_REQ;
  975. memcpy(&smp->preq[1], &cp, sizeof(cp));
  976. smp_send_cmd(conn, SMP_CMD_PAIRING_REQ, sizeof(cp), &cp);
  977. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_RSP);
  978. } else {
  979. struct smp_cmd_security_req cp;
  980. cp.auth_req = authreq;
  981. smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp);
  982. SMP_ALLOW_CMD(smp, SMP_CMD_PAIRING_REQ);
  983. }
  984. set_bit(SMP_FLAG_INITIATOR, &smp->flags);
  985. ret = 0;
  986. unlock:
  987. l2cap_chan_unlock(chan);
  988. return ret;
  989. }
  990. static int smp_cmd_encrypt_info(struct l2cap_conn *conn, struct sk_buff *skb)
  991. {
  992. struct smp_cmd_encrypt_info *rp = (void *) skb->data;
  993. struct l2cap_chan *chan = conn->smp;
  994. struct smp_chan *smp = chan->data;
  995. BT_DBG("conn %p", conn);
  996. if (skb->len < sizeof(*rp))
  997. return SMP_INVALID_PARAMS;
  998. SMP_ALLOW_CMD(smp, SMP_CMD_MASTER_IDENT);
  999. skb_pull(skb, sizeof(*rp));
  1000. memcpy(smp->tk, rp->ltk, sizeof(smp->tk));
  1001. return 0;
  1002. }
  1003. static int smp_cmd_master_ident(struct l2cap_conn *conn, struct sk_buff *skb)
  1004. {
  1005. struct smp_cmd_master_ident *rp = (void *) skb->data;
  1006. struct l2cap_chan *chan = conn->smp;
  1007. struct smp_chan *smp = chan->data;
  1008. struct hci_dev *hdev = conn->hcon->hdev;
  1009. struct hci_conn *hcon = conn->hcon;
  1010. struct smp_ltk *ltk;
  1011. u8 authenticated;
  1012. BT_DBG("conn %p", conn);
  1013. if (skb->len < sizeof(*rp))
  1014. return SMP_INVALID_PARAMS;
  1015. /* Mark the information as received */
  1016. smp->remote_key_dist &= ~SMP_DIST_ENC_KEY;
  1017. if (smp->remote_key_dist & SMP_DIST_ID_KEY)
  1018. SMP_ALLOW_CMD(smp, SMP_CMD_IDENT_INFO);
  1019. else if (smp->remote_key_dist & SMP_DIST_SIGN)
  1020. SMP_ALLOW_CMD(smp, SMP_CMD_SIGN_INFO);
  1021. skb_pull(skb, sizeof(*rp));
  1022. hci_dev_lock(hdev);
  1023. authenticated = (hcon->sec_level == BT_SECURITY_HIGH);
  1024. ltk = hci_add_ltk(hdev, &hcon->dst, hcon->dst_type, SMP_LTK,
  1025. authenticated, smp->tk, smp->enc_key_size,
  1026. rp->ediv, rp->rand);
  1027. smp->ltk = ltk;
  1028. if (!(smp->remote_key_dist & KEY_DIST_MASK))
  1029. smp_distribute_keys(smp);
  1030. hci_dev_unlock(hdev);
  1031. return 0;
  1032. }
  1033. static int smp_cmd_ident_info(struct l2cap_conn *conn, struct sk_buff *skb)
  1034. {
  1035. struct smp_cmd_ident_info *info = (void *) skb->data;
  1036. struct l2cap_chan *chan = conn->smp;
  1037. struct smp_chan *smp = chan->data;
  1038. BT_DBG("");
  1039. if (skb->len < sizeof(*info))
  1040. return SMP_INVALID_PARAMS;
  1041. SMP_ALLOW_CMD(smp, SMP_CMD_IDENT_ADDR_INFO);
  1042. skb_pull(skb, sizeof(*info));
  1043. memcpy(smp->irk, info->irk, 16);
  1044. return 0;
  1045. }
  1046. static int smp_cmd_ident_addr_info(struct l2cap_conn *conn,
  1047. struct sk_buff *skb)
  1048. {
  1049. struct smp_cmd_ident_addr_info *info = (void *) skb->data;
  1050. struct l2cap_chan *chan = conn->smp;
  1051. struct smp_chan *smp = chan->data;
  1052. struct hci_conn *hcon = conn->hcon;
  1053. bdaddr_t rpa;
  1054. BT_DBG("");
  1055. if (skb->len < sizeof(*info))
  1056. return SMP_INVALID_PARAMS;
  1057. /* Mark the information as received */
  1058. smp->remote_key_dist &= ~SMP_DIST_ID_KEY;
  1059. if (smp->remote_key_dist & SMP_DIST_SIGN)
  1060. SMP_ALLOW_CMD(smp, SMP_CMD_SIGN_INFO);
  1061. skb_pull(skb, sizeof(*info));
  1062. hci_dev_lock(hcon->hdev);
  1063. /* Strictly speaking the Core Specification (4.1) allows sending
  1064. * an empty address which would force us to rely on just the IRK
  1065. * as "identity information". However, since such
  1066. * implementations are not known of and in order to not over
  1067. * complicate our implementation, simply pretend that we never
  1068. * received an IRK for such a device.
  1069. */
  1070. if (!bacmp(&info->bdaddr, BDADDR_ANY)) {
  1071. BT_ERR("Ignoring IRK with no identity address");
  1072. goto distribute;
  1073. }
  1074. bacpy(&smp->id_addr, &info->bdaddr);
  1075. smp->id_addr_type = info->addr_type;
  1076. if (hci_bdaddr_is_rpa(&hcon->dst, hcon->dst_type))
  1077. bacpy(&rpa, &hcon->dst);
  1078. else
  1079. bacpy(&rpa, BDADDR_ANY);
  1080. smp->remote_irk = hci_add_irk(conn->hcon->hdev, &smp->id_addr,
  1081. smp->id_addr_type, smp->irk, &rpa);
  1082. distribute:
  1083. if (!(smp->remote_key_dist & KEY_DIST_MASK))
  1084. smp_distribute_keys(smp);
  1085. hci_dev_unlock(hcon->hdev);
  1086. return 0;
  1087. }
  1088. static int smp_cmd_sign_info(struct l2cap_conn *conn, struct sk_buff *skb)
  1089. {
  1090. struct smp_cmd_sign_info *rp = (void *) skb->data;
  1091. struct l2cap_chan *chan = conn->smp;
  1092. struct smp_chan *smp = chan->data;
  1093. struct hci_dev *hdev = conn->hcon->hdev;
  1094. struct smp_csrk *csrk;
  1095. BT_DBG("conn %p", conn);
  1096. if (skb->len < sizeof(*rp))
  1097. return SMP_INVALID_PARAMS;
  1098. /* Mark the information as received */
  1099. smp->remote_key_dist &= ~SMP_DIST_SIGN;
  1100. skb_pull(skb, sizeof(*rp));
  1101. hci_dev_lock(hdev);
  1102. csrk = kzalloc(sizeof(*csrk), GFP_KERNEL);
  1103. if (csrk) {
  1104. csrk->master = 0x01;
  1105. memcpy(csrk->val, rp->csrk, sizeof(csrk->val));
  1106. }
  1107. smp->csrk = csrk;
  1108. smp_distribute_keys(smp);
  1109. hci_dev_unlock(hdev);
  1110. return 0;
  1111. }
  1112. static int smp_sig_channel(struct l2cap_chan *chan, struct sk_buff *skb)
  1113. {
  1114. struct l2cap_conn *conn = chan->conn;
  1115. struct hci_conn *hcon = conn->hcon;
  1116. struct smp_chan *smp;
  1117. __u8 code, reason;
  1118. int err = 0;
  1119. if (hcon->type != LE_LINK) {
  1120. kfree_skb(skb);
  1121. return 0;
  1122. }
  1123. if (skb->len < 1)
  1124. return -EILSEQ;
  1125. if (!test_bit(HCI_LE_ENABLED, &hcon->hdev->dev_flags)) {
  1126. reason = SMP_PAIRING_NOTSUPP;
  1127. goto done;
  1128. }
  1129. code = skb->data[0];
  1130. skb_pull(skb, sizeof(code));
  1131. smp = chan->data;
  1132. if (code > SMP_CMD_MAX)
  1133. goto drop;
  1134. if (smp && !test_and_clear_bit(code, &smp->allow_cmd))
  1135. goto drop;
  1136. /* If we don't have a context the only allowed commands are
  1137. * pairing request and security request.
  1138. */
  1139. if (!smp && code != SMP_CMD_PAIRING_REQ && code != SMP_CMD_SECURITY_REQ)
  1140. goto drop;
  1141. switch (code) {
  1142. case SMP_CMD_PAIRING_REQ:
  1143. reason = smp_cmd_pairing_req(conn, skb);
  1144. break;
  1145. case SMP_CMD_PAIRING_FAIL:
  1146. smp_failure(conn, 0);
  1147. err = -EPERM;
  1148. break;
  1149. case SMP_CMD_PAIRING_RSP:
  1150. reason = smp_cmd_pairing_rsp(conn, skb);
  1151. break;
  1152. case SMP_CMD_SECURITY_REQ:
  1153. reason = smp_cmd_security_req(conn, skb);
  1154. break;
  1155. case SMP_CMD_PAIRING_CONFIRM:
  1156. reason = smp_cmd_pairing_confirm(conn, skb);
  1157. break;
  1158. case SMP_CMD_PAIRING_RANDOM:
  1159. reason = smp_cmd_pairing_random(conn, skb);
  1160. break;
  1161. case SMP_CMD_ENCRYPT_INFO:
  1162. reason = smp_cmd_encrypt_info(conn, skb);
  1163. break;
  1164. case SMP_CMD_MASTER_IDENT:
  1165. reason = smp_cmd_master_ident(conn, skb);
  1166. break;
  1167. case SMP_CMD_IDENT_INFO:
  1168. reason = smp_cmd_ident_info(conn, skb);
  1169. break;
  1170. case SMP_CMD_IDENT_ADDR_INFO:
  1171. reason = smp_cmd_ident_addr_info(conn, skb);
  1172. break;
  1173. case SMP_CMD_SIGN_INFO:
  1174. reason = smp_cmd_sign_info(conn, skb);
  1175. break;
  1176. default:
  1177. BT_DBG("Unknown command code 0x%2.2x", code);
  1178. reason = SMP_CMD_NOTSUPP;
  1179. goto done;
  1180. }
  1181. done:
  1182. if (!err) {
  1183. if (reason)
  1184. smp_failure(conn, reason);
  1185. kfree_skb(skb);
  1186. }
  1187. return err;
  1188. drop:
  1189. BT_ERR("%s unexpected SMP command 0x%02x from %pMR", hcon->hdev->name,
  1190. code, &hcon->dst);
  1191. kfree_skb(skb);
  1192. return 0;
  1193. }
  1194. static void smp_teardown_cb(struct l2cap_chan *chan, int err)
  1195. {
  1196. struct l2cap_conn *conn = chan->conn;
  1197. BT_DBG("chan %p", chan);
  1198. if (chan->data)
  1199. smp_chan_destroy(conn);
  1200. conn->smp = NULL;
  1201. l2cap_chan_put(chan);
  1202. }
  1203. static void smp_resume_cb(struct l2cap_chan *chan)
  1204. {
  1205. struct smp_chan *smp = chan->data;
  1206. struct l2cap_conn *conn = chan->conn;
  1207. struct hci_conn *hcon = conn->hcon;
  1208. BT_DBG("chan %p", chan);
  1209. if (!smp)
  1210. return;
  1211. if (!test_bit(HCI_CONN_ENCRYPT, &hcon->flags))
  1212. return;
  1213. cancel_delayed_work(&smp->security_timer);
  1214. smp_distribute_keys(smp);
  1215. }
  1216. static void smp_ready_cb(struct l2cap_chan *chan)
  1217. {
  1218. struct l2cap_conn *conn = chan->conn;
  1219. BT_DBG("chan %p", chan);
  1220. conn->smp = chan;
  1221. l2cap_chan_hold(chan);
  1222. }
  1223. static int smp_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
  1224. {
  1225. int err;
  1226. BT_DBG("chan %p", chan);
  1227. err = smp_sig_channel(chan, skb);
  1228. if (err) {
  1229. struct smp_chan *smp = chan->data;
  1230. if (smp)
  1231. cancel_delayed_work_sync(&smp->security_timer);
  1232. hci_disconnect(chan->conn->hcon, HCI_ERROR_AUTH_FAILURE);
  1233. }
  1234. return err;
  1235. }
  1236. static struct sk_buff *smp_alloc_skb_cb(struct l2cap_chan *chan,
  1237. unsigned long hdr_len,
  1238. unsigned long len, int nb)
  1239. {
  1240. struct sk_buff *skb;
  1241. skb = bt_skb_alloc(hdr_len + len, GFP_KERNEL);
  1242. if (!skb)
  1243. return ERR_PTR(-ENOMEM);
  1244. skb->priority = HCI_PRIO_MAX;
  1245. bt_cb(skb)->chan = chan;
  1246. return skb;
  1247. }
  1248. static const struct l2cap_ops smp_chan_ops = {
  1249. .name = "Security Manager",
  1250. .ready = smp_ready_cb,
  1251. .recv = smp_recv_cb,
  1252. .alloc_skb = smp_alloc_skb_cb,
  1253. .teardown = smp_teardown_cb,
  1254. .resume = smp_resume_cb,
  1255. .new_connection = l2cap_chan_no_new_connection,
  1256. .state_change = l2cap_chan_no_state_change,
  1257. .close = l2cap_chan_no_close,
  1258. .defer = l2cap_chan_no_defer,
  1259. .suspend = l2cap_chan_no_suspend,
  1260. .set_shutdown = l2cap_chan_no_set_shutdown,
  1261. .get_sndtimeo = l2cap_chan_no_get_sndtimeo,
  1262. .memcpy_fromiovec = l2cap_chan_no_memcpy_fromiovec,
  1263. };
  1264. static inline struct l2cap_chan *smp_new_conn_cb(struct l2cap_chan *pchan)
  1265. {
  1266. struct l2cap_chan *chan;
  1267. BT_DBG("pchan %p", pchan);
  1268. chan = l2cap_chan_create();
  1269. if (!chan)
  1270. return NULL;
  1271. chan->chan_type = pchan->chan_type;
  1272. chan->ops = &smp_chan_ops;
  1273. chan->scid = pchan->scid;
  1274. chan->dcid = chan->scid;
  1275. chan->imtu = pchan->imtu;
  1276. chan->omtu = pchan->omtu;
  1277. chan->mode = pchan->mode;
  1278. BT_DBG("created chan %p", chan);
  1279. return chan;
  1280. }
  1281. static const struct l2cap_ops smp_root_chan_ops = {
  1282. .name = "Security Manager Root",
  1283. .new_connection = smp_new_conn_cb,
  1284. /* None of these are implemented for the root channel */
  1285. .close = l2cap_chan_no_close,
  1286. .alloc_skb = l2cap_chan_no_alloc_skb,
  1287. .recv = l2cap_chan_no_recv,
  1288. .state_change = l2cap_chan_no_state_change,
  1289. .teardown = l2cap_chan_no_teardown,
  1290. .ready = l2cap_chan_no_ready,
  1291. .defer = l2cap_chan_no_defer,
  1292. .suspend = l2cap_chan_no_suspend,
  1293. .resume = l2cap_chan_no_resume,
  1294. .set_shutdown = l2cap_chan_no_set_shutdown,
  1295. .get_sndtimeo = l2cap_chan_no_get_sndtimeo,
  1296. .memcpy_fromiovec = l2cap_chan_no_memcpy_fromiovec,
  1297. };
  1298. int smp_register(struct hci_dev *hdev)
  1299. {
  1300. struct l2cap_chan *chan;
  1301. struct crypto_blkcipher *tfm_aes;
  1302. BT_DBG("%s", hdev->name);
  1303. tfm_aes = crypto_alloc_blkcipher("ecb(aes)", 0, CRYPTO_ALG_ASYNC);
  1304. if (IS_ERR(tfm_aes)) {
  1305. int err = PTR_ERR(tfm_aes);
  1306. BT_ERR("Unable to create crypto context");
  1307. return err;
  1308. }
  1309. chan = l2cap_chan_create();
  1310. if (!chan) {
  1311. crypto_free_blkcipher(tfm_aes);
  1312. return -ENOMEM;
  1313. }
  1314. chan->data = tfm_aes;
  1315. l2cap_add_scid(chan, L2CAP_CID_SMP);
  1316. l2cap_chan_set_defaults(chan);
  1317. bacpy(&chan->src, &hdev->bdaddr);
  1318. chan->src_type = BDADDR_LE_PUBLIC;
  1319. chan->state = BT_LISTEN;
  1320. chan->mode = L2CAP_MODE_BASIC;
  1321. chan->imtu = L2CAP_DEFAULT_MTU;
  1322. chan->ops = &smp_root_chan_ops;
  1323. hdev->smp_data = chan;
  1324. return 0;
  1325. }
  1326. void smp_unregister(struct hci_dev *hdev)
  1327. {
  1328. struct l2cap_chan *chan = hdev->smp_data;
  1329. struct crypto_blkcipher *tfm_aes;
  1330. if (!chan)
  1331. return;
  1332. BT_DBG("%s chan %p", hdev->name, chan);
  1333. tfm_aes = chan->data;
  1334. if (tfm_aes) {
  1335. chan->data = NULL;
  1336. crypto_free_blkcipher(tfm_aes);
  1337. }
  1338. hdev->smp_data = NULL;
  1339. l2cap_chan_put(chan);
  1340. }