Blob: hci-crypto.c
Blob id: 5e6dd3e203610d2a0cc04ea5129412b1bc46b94f
Size: 3.4 KB
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | // SPDX-License-Identifier: LGPL-2.1-or-later /* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2013-2014 Intel Corporation * * */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <string.h> #include "monitor/bt.h" #include "src/shared/util.h" #include "src/shared/hci.h" #include "src/shared/hci-crypto.h" struct crypto_data { uint8_t size; bt_hci_crypto_func_t callback; void *user_data; }; static void le_encrypt_callback(const void *response, uint8_t size, void *user_data) { struct crypto_data *data = user_data; const struct bt_hci_rsp_le_encrypt *rsp = response; if (rsp->status) { data->callback(NULL, 0, data->user_data); return; } data->callback(rsp->data, data->size, data->user_data); } static bool le_encrypt(struct bt_hci *hci, uint8_t size, const uint8_t key[16], const uint8_t plaintext[16], bt_hci_crypto_func_t callback, void *user_data) { struct crypto_data *data; struct bt_hci_cmd_le_encrypt cmd; if (!callback || !size || size > 16) return false; memcpy(cmd.key, key, 16); memcpy(cmd.plaintext, plaintext, 16); data = new0(struct crypto_data, 1); data->size = size; data->callback = callback; data->user_data = user_data; if (!bt_hci_send(hci, BT_HCI_CMD_LE_ENCRYPT, &cmd, sizeof(cmd), le_encrypt_callback, data, free)) { free(data); return false; } return true; } static void prand_callback(const void *response, uint8_t size, void *user_data) { struct crypto_data *data = user_data; const struct bt_hci_rsp_le_rand *rsp = response; uint8_t prand[3]; if (rsp->status) { data->callback(NULL, 0, data->user_data); return; } prand[0] = (rsp->number & 0xff0000) >> 16; prand[1] = (rsp->number & 0x00ff00) >> 8; prand[2] = (rsp->number & 0x00003f) | 0x40; data->callback(prand, 3, data->user_data); } bool bt_hci_crypto_prand(struct bt_hci *hci, bt_hci_crypto_func_t callback, void *user_data) { struct crypto_data *data; if (!callback) return false; data = new0(struct crypto_data, 1); data->callback = callback; data->user_data = user_data; if (!bt_hci_send(hci, BT_HCI_CMD_LE_RAND, NULL, 0, prand_callback, data, free)) { free(data); return false; } return true; } bool bt_hci_crypto_e(struct bt_hci *hci, const uint8_t key[16], const uint8_t plaintext[16], bt_hci_crypto_func_t callback, void *user_data) { return le_encrypt(hci, 16, key, plaintext, callback, user_data); } bool bt_hci_crypto_d1(struct bt_hci *hci, const uint8_t k[16], uint16_t d, uint16_t r, bt_hci_crypto_func_t callback, void *user_data) { uint8_t dp[16]; /* d' = padding || r || d */ dp[0] = d & 0xff; dp[1] = d >> 8; dp[2] = r & 0xff; dp[3] = r >> 8; memset(dp + 4, 0, 12); /* d1(k, d, r) = e(k, d') */ return le_encrypt(hci, 16, k, dp, callback, user_data); } bool bt_hci_crypto_dm(struct bt_hci *hci, const uint8_t k[16], const uint8_t r[8], bt_hci_crypto_func_t callback, void *user_data) { uint8_t rp[16]; /* r' = padding || r */ memcpy(rp, r, 8); memset(rp + 8, 0, 8); /* dm(k, r) = e(k, r') mod 2^16 */ return le_encrypt(hci, 8, k, rp, callback, user_data); } bool bt_hci_crypto_ah(struct bt_hci *hci, const uint8_t k[16], const uint8_t r[3], bt_hci_crypto_func_t callback, void *user_data) { uint8_t rp[16]; /* r' = padding || r */ memcpy(rp, r, 3); memset(rp + 3, 0, 13); /* ah(k, r) = e(k, r') mod 2^24 */ return le_encrypt(hci, 3, k, rp, callback, user_data); } |