// SPDX-License-Identifier: LGPL-2.1-or-later /* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2013-2014 Intel Corporation * * */ #ifdef HAVE_CONFIG_H #include #endif #include #include "monitor/bt.h" #include "src/shared/util.h" #include "src/shared/hci.h" #include "src/shared/hci-crypto.h" struct crypto_data { uint8_t size; bt_hci_crypto_func_t callback; void *user_data; }; static void le_encrypt_callback(const void *response, uint8_t size, void *user_data) { struct crypto_data *data = user_data; const struct bt_hci_rsp_le_encrypt *rsp = response; if (rsp->status) { data->callback(NULL, 0, data->user_data); return; } data->callback(rsp->data, data->size, data->user_data); } static bool le_encrypt(struct bt_hci *hci, uint8_t size, const uint8_t key[16], const uint8_t plaintext[16], bt_hci_crypto_func_t callback, void *user_data) { struct crypto_data *data; struct bt_hci_cmd_le_encrypt cmd; if (!callback || !size || size > 16) return false; memcpy(cmd.key, key, 16); memcpy(cmd.plaintext, plaintext, 16); data = new0(struct crypto_data, 1); data->size = size; data->callback = callback; data->user_data = user_data; if (!bt_hci_send(hci, BT_HCI_CMD_LE_ENCRYPT, &cmd, sizeof(cmd), le_encrypt_callback, data, free)) { free(data); return false; } return true; } static void prand_callback(const void *response, uint8_t size, void *user_data) { struct crypto_data *data = user_data; const struct bt_hci_rsp_le_rand *rsp = response; uint8_t prand[3]; if (rsp->status) { data->callback(NULL, 0, data->user_data); return; } prand[0] = (rsp->number & 0xff0000) >> 16; prand[1] = (rsp->number & 0x00ff00) >> 8; prand[2] = (rsp->number & 0x00003f) | 0x40; data->callback(prand, 3, data->user_data); } bool bt_hci_crypto_prand(struct bt_hci *hci, bt_hci_crypto_func_t callback, void *user_data) { struct crypto_data *data; if (!callback) return false; data = new0(struct crypto_data, 1); data->callback = callback; data->user_data = user_data; if (!bt_hci_send(hci, BT_HCI_CMD_LE_RAND, NULL, 0, prand_callback, data, free)) { free(data); return false; } return true; } bool bt_hci_crypto_e(struct bt_hci *hci, const uint8_t key[16], const uint8_t plaintext[16], bt_hci_crypto_func_t callback, void *user_data) { return le_encrypt(hci, 16, key, plaintext, callback, user_data); } bool bt_hci_crypto_d1(struct bt_hci *hci, const uint8_t k[16], uint16_t d, uint16_t r, bt_hci_crypto_func_t callback, void *user_data) { uint8_t dp[16]; /* d' = padding || r || d */ dp[0] = d & 0xff; dp[1] = d >> 8; dp[2] = r & 0xff; dp[3] = r >> 8; memset(dp + 4, 0, 12); /* d1(k, d, r) = e(k, d') */ return le_encrypt(hci, 16, k, dp, callback, user_data); } bool bt_hci_crypto_dm(struct bt_hci *hci, const uint8_t k[16], const uint8_t r[8], bt_hci_crypto_func_t callback, void *user_data) { uint8_t rp[16]; /* r' = padding || r */ memcpy(rp, r, 8); memset(rp + 8, 0, 8); /* dm(k, r) = e(k, r') mod 2^16 */ return le_encrypt(hci, 8, k, rp, callback, user_data); } bool bt_hci_crypto_ah(struct bt_hci *hci, const uint8_t k[16], const uint8_t r[3], bt_hci_crypto_func_t callback, void *user_data) { uint8_t rp[16]; /* r' = padding || r */ memcpy(rp, r, 3); memset(rp + 3, 0, 13); /* ah(k, r) = e(k, r') mod 2^24 */ return le_encrypt(hci, 3, k, rp, callback, user_data); }