blob: f7507472b4072a407e5700951b4401dfe62d4d79 [file] [log] [blame]
/*
*
* BlueZ - Bluetooth protocol stack for Linux
*
* Copyright (C) 2013-2014 Intel Corporation
*
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <string.h>
#include "monitor/bt.h"
#include "src/shared/util.h"
#include "src/shared/hci.h"
#include "src/shared/hci-crypto.h"
struct crypto_data {
uint8_t size;
bt_hci_crypto_func_t callback;
void *user_data;
};
static void le_encrypt_callback(const void *response, uint8_t size,
void *user_data)
{
struct crypto_data *data = user_data;
const struct bt_hci_rsp_le_encrypt *rsp = response;
if (rsp->status) {
data->callback(NULL, 0, data->user_data);
return;
}
data->callback(rsp->data, data->size, data->user_data);
}
static bool le_encrypt(struct bt_hci *hci, uint8_t size,
const uint8_t key[16], const uint8_t plaintext[16],
bt_hci_crypto_func_t callback, void *user_data)
{
struct crypto_data *data;
struct bt_hci_cmd_le_encrypt cmd;
if (!callback || !size || size > 16)
return false;
memcpy(cmd.key, key, 16);
memcpy(cmd.plaintext, plaintext, 16);
data = new0(struct crypto_data, 1);
data->size = size;
data->callback = callback;
data->user_data = user_data;
if (!bt_hci_send(hci, BT_HCI_CMD_LE_ENCRYPT, &cmd, sizeof(cmd),
le_encrypt_callback, data, free)) {
free(data);
return false;
}
return true;
}
static void prand_callback(const void *response, uint8_t size,
void *user_data)
{
struct crypto_data *data = user_data;
const struct bt_hci_rsp_le_rand *rsp = response;
uint8_t prand[3];
if (rsp->status) {
data->callback(NULL, 0, data->user_data);
return;
}
prand[0] = (rsp->number & 0xff0000) >> 16;
prand[1] = (rsp->number & 0x00ff00) >> 8;
prand[2] = (rsp->number & 0x00003f) | 0x40;
data->callback(prand, 3, data->user_data);
}
bool bt_hci_crypto_prand(struct bt_hci *hci,
bt_hci_crypto_func_t callback, void *user_data)
{
struct crypto_data *data;
if (!callback)
return false;
data = new0(struct crypto_data, 1);
data->callback = callback;
data->user_data = user_data;
if (!bt_hci_send(hci, BT_HCI_CMD_LE_RAND, NULL, 0,
prand_callback, data, free)) {
free(data);
return false;
}
return true;
}
bool bt_hci_crypto_e(struct bt_hci *hci,
const uint8_t key[16], const uint8_t plaintext[16],
bt_hci_crypto_func_t callback, void *user_data)
{
return le_encrypt(hci, 16, key, plaintext, callback, user_data);
}
bool bt_hci_crypto_d1(struct bt_hci *hci,
const uint8_t k[16], uint16_t d, uint16_t r,
bt_hci_crypto_func_t callback, void *user_data)
{
uint8_t dp[16];
/* d' = padding || r || d */
dp[0] = d & 0xff;
dp[1] = d >> 8;
dp[2] = r & 0xff;
dp[3] = r >> 8;
memset(dp + 4, 0, 12);
/* d1(k, d, r) = e(k, d') */
return le_encrypt(hci, 16, k, dp, callback, user_data);
}
bool bt_hci_crypto_dm(struct bt_hci *hci,
const uint8_t k[16], const uint8_t r[8],
bt_hci_crypto_func_t callback, void *user_data)
{
uint8_t rp[16];
/* r' = padding || r */
memcpy(rp, r, 8);
memset(rp + 8, 0, 8);
/* dm(k, r) = e(k, r') mod 2^16 */
return le_encrypt(hci, 8, k, rp, callback, user_data);
}
bool bt_hci_crypto_ah(struct bt_hci *hci,
const uint8_t k[16], const uint8_t r[3],
bt_hci_crypto_func_t callback, void *user_data)
{
uint8_t rp[16];
/* r' = padding || r */
memcpy(rp, r, 3);
memset(rp + 3, 0, 13);
/* ah(k, r) = e(k, r') mod 2^24 */
return le_encrypt(hci, 3, k, rp, callback, user_data);
}