/** * @file hci_ecc.c * HCI ECC emulation */ /* * Copyright (c) 2016 Intel Corporation * * SPDX-License-Identifier: Apache-2.0 */ #include #include #include #include #include #include #include #include #define BT_DBG_ENABLED IS_ENABLED(CONFIG_BLUETOOTH_DEBUG_HCI_CORE) #include #include #include #include #include #include "hci_ecc.h" #ifdef CONFIG_BLUETOOTH_HCI_RAW #include #include "hci_raw_internal.h" #else #include "hci_core.h" #endif static BT_STACK_NOINIT(ecc_thread_stack, 1060); /* based on Core Specification 4.2 Vol 3. Part H 2.3.5.6.1 */ static const uint32_t debug_private_key[8] = { 0xcd3c1abd, 0x5899b8a6, 0xeb40b799, 0x4aff607b, 0xd2103f50, 0x74c9b3e3, 0xa3c55f38, 0x3f49f6d4 }; #if defined(CONFIG_BLUETOOTH_USE_DEBUG_KEYS) static const uint8_t debug_public_key[64] = { 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef, 0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e, 0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20, 0x8b, 0xd2, 0x89, 0x15, 0xd0, 0x8e, 0x1c, 0x74, 0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76, 0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63, 0x6d, 0xeb, 0x2a, 0x65, 0x49, 0x9c, 0x80, 0xdc }; #endif enum { PENDING_PUB_KEY, PENDING_DHKEY, }; static atomic_t flags; static K_SEM_DEFINE(cmd_sem, 0, 1); static struct { /* Based on the current implementation of ecc_make_key() it's safe * for the private_key and random to occupy the same memory area. */ union { uint32_t private_key[NUM_ECC_DIGITS]; uint32_t random[NUM_ECC_DIGITS * 2]; }; union { EccPoint pk; uint32_t dhkey[NUM_ECC_DIGITS]; }; } ecc; static void send_cmd_status(uint16_t opcode, uint8_t status) { struct bt_hci_evt_cmd_status *evt; struct bt_hci_evt_hdr *hdr; struct net_buf *buf; BT_DBG("opcode %x status %x", opcode, status); buf = bt_buf_get_cmd_complete(K_FOREVER); bt_buf_set_type(buf, BT_BUF_EVT); hdr = net_buf_add(buf, sizeof(*hdr)); hdr->evt = BT_HCI_EVT_CMD_STATUS; hdr->len = sizeof(*evt); evt = net_buf_add(buf, sizeof(*evt)); evt->ncmd = 1; evt->opcode = sys_cpu_to_le16(opcode); evt->status = status; bt_recv_prio(buf); } static uint8_t generate_keys(void) { #if !defined(CONFIG_BLUETOOTH_USE_DEBUG_KEYS) do { int rc; if (bt_rand((uint8_t *)ecc.random, sizeof(ecc.random))) { BT_ERR("Failed to get random bytes for ECC keys"); return BT_HCI_ERR_UNSPECIFIED; } rc = ecc_make_key(&ecc.pk, ecc.private_key, ecc.random); if (rc == TC_CRYPTO_FAIL) { BT_ERR("Failed to create ECC public/private pair"); return BT_HCI_ERR_UNSPECIFIED; } /* make sure generated key isn't debug key */ } while (memcmp(ecc.private_key, debug_private_key, 32) == 0); #else memcpy(&ecc.pk, debug_public_key, 64); memcpy(ecc.private_key, debug_private_key, 32); #endif return 0; } static void emulate_le_p256_public_key_cmd(void) { struct bt_hci_evt_le_p256_public_key_complete *evt; struct bt_hci_evt_le_meta_event *meta; struct bt_hci_evt_hdr *hdr; struct net_buf *buf; uint8_t status; BT_DBG(""); status = generate_keys(); buf = bt_buf_get_rx(K_FOREVER); bt_buf_set_type(buf, BT_BUF_EVT); hdr = net_buf_add(buf, sizeof(*hdr)); hdr->evt = BT_HCI_EVT_LE_META_EVENT; hdr->len = sizeof(*meta) + sizeof(*evt); meta = net_buf_add(buf, sizeof(*meta)); meta->subevent = BT_HCI_EVT_LE_P256_PUBLIC_KEY_COMPLETE; evt = net_buf_add(buf, sizeof(*evt)); evt->status = status; if (status) { memset(evt->key, 0, sizeof(evt->key)); } else { memcpy(evt->key, ecc.pk.x, 32); memcpy(&evt->key[32], ecc.pk.y, 32); } atomic_clear_bit(&flags, PENDING_PUB_KEY); bt_recv(buf); } static void emulate_le_generate_dhkey(void) { struct bt_hci_evt_le_generate_dhkey_complete *evt; struct bt_hci_evt_le_meta_event *meta; struct bt_hci_evt_hdr *hdr; struct net_buf *buf; int32_t ret; if (ecc_valid_public_key(&ecc.pk) < 0) { ret = TC_CRYPTO_FAIL; } else { ret = ecdh_shared_secret(ecc.dhkey, &ecc.pk, ecc.private_key); } buf = bt_buf_get_rx(K_FOREVER); bt_buf_set_type(buf, BT_BUF_EVT); hdr = net_buf_add(buf, sizeof(*hdr)); hdr->evt = BT_HCI_EVT_LE_META_EVENT; hdr->len = sizeof(*meta) + sizeof(*evt); meta = net_buf_add(buf, sizeof(*meta)); meta->subevent = BT_HCI_EVT_LE_GENERATE_DHKEY_COMPLETE; evt = net_buf_add(buf, sizeof(*evt)); if (ret == TC_CRYPTO_FAIL) { evt->status = BT_HCI_ERR_UNSPECIFIED; memset(evt->dhkey, 0, sizeof(evt->dhkey)); } else { evt->status = 0; memcpy(evt->dhkey, ecc.dhkey, sizeof(ecc.dhkey)); } atomic_clear_bit(&flags, PENDING_DHKEY); bt_recv(buf); } static void ecc_thread(void *p1, void *p2, void *p3) { while (true) { k_sem_take(&cmd_sem, K_FOREVER); if (atomic_test_bit(&flags, PENDING_PUB_KEY)) { emulate_le_p256_public_key_cmd(); } else if (atomic_test_bit(&flags, PENDING_DHKEY)) { emulate_le_generate_dhkey(); } else { __ASSERT(0, "Unhandled ECC command"); } stack_analyze("ecc stack", ecc_thread_stack, sizeof(ecc_thread_stack)); } } static void clear_ecc_events(struct net_buf *buf) { struct bt_hci_cp_le_set_event_mask *cmd; cmd = (void *)buf->data + sizeof(struct bt_hci_cmd_hdr); /* * don't enable controller ECC events as those will be generated from * emulation code */ cmd->events[0] &= ~0x80; /* LE Read Local P-256 PKey Compl */ cmd->events[1] &= ~0x01; /* LE Generate DHKey Compl Event */ } static void le_gen_dhkey(struct net_buf *buf) { struct bt_hci_cp_le_generate_dhkey *cmd; uint8_t status; if (atomic_test_bit(&flags, PENDING_PUB_KEY)) { status = BT_HCI_ERR_CMD_DISALLOWED; goto send_status; } if (buf->len < sizeof(struct bt_hci_cp_le_generate_dhkey)) { status = BT_HCI_ERR_INVALID_PARAMS; goto send_status; } if (atomic_test_and_set_bit(&flags, PENDING_DHKEY)) { status = BT_HCI_ERR_CMD_DISALLOWED; goto send_status; } cmd = (void *)buf->data; memcpy(ecc.pk.x, cmd->key, 32); memcpy(ecc.pk.y, &cmd->key[32], 32); k_sem_give(&cmd_sem); status = BT_HCI_ERR_SUCCESS; send_status: net_buf_unref(buf); send_cmd_status(BT_HCI_OP_LE_GENERATE_DHKEY, status); } static void le_p256_pub_key(struct net_buf *buf) { uint8_t status; net_buf_unref(buf); if (atomic_test_bit(&flags, PENDING_DHKEY)) { status = BT_HCI_ERR_CMD_DISALLOWED; } else if (atomic_test_and_set_bit(&flags, PENDING_PUB_KEY)) { status = BT_HCI_ERR_CMD_DISALLOWED; } else { k_sem_give(&cmd_sem); status = BT_HCI_ERR_SUCCESS; } send_cmd_status(BT_HCI_OP_LE_P256_PUBLIC_KEY, status); } int bt_hci_ecc_send(struct net_buf *buf) { if (bt_buf_get_type(buf) == BT_BUF_CMD) { struct bt_hci_cmd_hdr *chdr = (void *)buf->data; switch (sys_le16_to_cpu(chdr->opcode)) { case BT_HCI_OP_LE_P256_PUBLIC_KEY: net_buf_pull(buf, sizeof(*chdr)); le_p256_pub_key(buf); return 0; case BT_HCI_OP_LE_GENERATE_DHKEY: net_buf_pull(buf, sizeof(*chdr)); le_gen_dhkey(buf); return 0; case BT_HCI_OP_LE_SET_EVENT_MASK: clear_ecc_events(buf); break; default: break; } } return bt_dev.drv->send(buf); } void bt_hci_ecc_init(void) { k_thread_spawn(ecc_thread_stack, sizeof(ecc_thread_stack), ecc_thread, NULL, NULL, NULL, K_PRIO_PREEMPT(10), 0, K_NO_WAIT); }