Blob Blame History Raw
/*
 *
 *  BlueZ - Bluetooth protocol stack for Linux
 *
 *  Copyright (C) 2013-2014  Intel Corporation
 *
 *
 *  This library is free software; you can redistribute it and/or
 *  modify it under the terms of the GNU Lesser General Public
 *  License as published by the Free Software Foundation; either
 *  version 2.1 of the License, or (at your option) any later version.
 *
 *  This library is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 *  Lesser General Public License for more details.
 *
 *  You should have received a copy of the GNU Lesser General Public
 *  License along with this library; if not, write to the Free Software
 *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 *
 */

#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <string.h>

#include "monitor/bt.h"
#include "src/shared/util.h"
#include "src/shared/hci.h"
#include "src/shared/hci-crypto.h"

struct crypto_data {
	uint8_t size;
	bt_hci_crypto_func_t callback;
	void *user_data;
};

static void le_encrypt_callback(const void *response, uint8_t size,
							void *user_data)
{
	struct crypto_data *data = user_data;
	const struct bt_hci_rsp_le_encrypt *rsp = response;

	if (rsp->status) {
		data->callback(NULL, 0, data->user_data);
		return;
	}

	data->callback(rsp->data, data->size, data->user_data);
}

static bool le_encrypt(struct bt_hci *hci, uint8_t size,
			const uint8_t key[16], const uint8_t plaintext[16],
			bt_hci_crypto_func_t callback, void *user_data)
{
	struct crypto_data *data;
	struct bt_hci_cmd_le_encrypt cmd;

	if (!callback || !size || size > 16)
		return false;

	memcpy(cmd.key, key, 16);
	memcpy(cmd.plaintext, plaintext, 16);

	data = new0(struct crypto_data, 1);
	data->size = size;
	data->callback = callback;
	data->user_data = user_data;

	if (!bt_hci_send(hci, BT_HCI_CMD_LE_ENCRYPT, &cmd, sizeof(cmd),
					le_encrypt_callback, data, free)) {
		free(data);
		return false;
	}

	return true;
}

static void prand_callback(const void *response, uint8_t size,
							void *user_data)
{
	struct crypto_data *data = user_data;
	const struct bt_hci_rsp_le_rand *rsp = response;
	uint8_t prand[3];

	if (rsp->status) {
		data->callback(NULL, 0, data->user_data);
		return;
	}

	prand[0] = (rsp->number & 0xff0000) >> 16;
	prand[1] = (rsp->number & 0x00ff00) >> 8;
	prand[2] = (rsp->number & 0x00003f) | 0x40;

	data->callback(prand, 3, data->user_data);
}

bool bt_hci_crypto_prand(struct bt_hci *hci,
			bt_hci_crypto_func_t callback, void *user_data)
{
	struct crypto_data *data;

	if (!callback)
		return false;

	data = new0(struct crypto_data, 1);
	data->callback = callback;
	data->user_data = user_data;

	if (!bt_hci_send(hci, BT_HCI_CMD_LE_RAND, NULL, 0,
					prand_callback, data, free)) {
		free(data);
		return false;
	}

	return true;
}

bool bt_hci_crypto_e(struct bt_hci *hci,
			const uint8_t key[16], const uint8_t plaintext[16],
			bt_hci_crypto_func_t callback, void *user_data)
{
	return le_encrypt(hci, 16, key, plaintext, callback, user_data);
}

bool bt_hci_crypto_d1(struct bt_hci *hci,
			const uint8_t k[16], uint16_t d, uint16_t r,
			bt_hci_crypto_func_t callback, void *user_data)
{
	uint8_t dp[16];

	/* d' = padding || r || d */
	dp[0] = d & 0xff;
	dp[1] = d >> 8;
	dp[2] = r & 0xff;
	dp[3] = r >> 8;
	memset(dp + 4, 0, 12);

	/* d1(k, d, r) = e(k, d') */
	return le_encrypt(hci, 16, k, dp, callback, user_data);
}

bool bt_hci_crypto_dm(struct bt_hci *hci,
			const uint8_t k[16], const uint8_t r[8],
			bt_hci_crypto_func_t callback, void *user_data)
{
	uint8_t rp[16];

	/* r' = padding || r */
	memcpy(rp, r, 8);
	memset(rp + 8, 0, 8);

	/* dm(k, r) = e(k, r') mod 2^16 */
	return le_encrypt(hci, 8, k, rp, callback, user_data);
}

bool bt_hci_crypto_ah(struct bt_hci *hci,
			const uint8_t k[16], const uint8_t r[3],
			bt_hci_crypto_func_t callback, void *user_data)
{
	uint8_t rp[16];

	/* r' = padding || r */
	memcpy(rp, r, 3);
	memset(rp + 3, 0, 13);

	/* ah(k, r) = e(k, r') mod 2^24 */
	return le_encrypt(hci, 3, k, rp, callback, user_data);
}