316 lines
7.3 KiB
C
316 lines
7.3 KiB
C
/**
|
|
* @file hci_ecc.c
|
|
* HCI ECC emulation
|
|
*/
|
|
|
|
/*
|
|
* Copyright (c) 2016 Intel Corporation
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
#include <zephyr.h>
|
|
#include <atomic.h>
|
|
#include <misc/stack.h>
|
|
#include <misc/byteorder.h>
|
|
#include <tinycrypt/constants.h>
|
|
#include <tinycrypt/utils.h>
|
|
#include <tinycrypt/ecc.h>
|
|
#include <tinycrypt/ecc_dh.h>
|
|
|
|
#define BT_DBG_ENABLED IS_ENABLED(CONFIG_BLUETOOTH_DEBUG_HCI_CORE)
|
|
#include <bluetooth/log.h>
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/conn.h>
|
|
#include <bluetooth/hci.h>
|
|
#include <bluetooth/hci_driver.h>
|
|
|
|
#include "hci_ecc.h"
|
|
#ifdef CONFIG_BLUETOOTH_HCI_RAW
|
|
#include <bluetooth/hci_raw.h>
|
|
#include "hci_raw_internal.h"
|
|
#else
|
|
#include "hci_core.h"
|
|
#endif
|
|
|
|
static BT_STACK_NOINIT(ecc_thread_stack, 1060);
|
|
|
|
/* based on Core Specification 4.2 Vol 3. Part H 2.3.5.6.1 */
|
|
static const uint32_t debug_private_key[8] = {
|
|
0xcd3c1abd, 0x5899b8a6, 0xeb40b799, 0x4aff607b, 0xd2103f50, 0x74c9b3e3,
|
|
0xa3c55f38, 0x3f49f6d4
|
|
};
|
|
|
|
#if defined(CONFIG_BLUETOOTH_USE_DEBUG_KEYS)
|
|
static const uint8_t debug_public_key[64] = {
|
|
0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 0xdb, 0xfd, 0xf4, 0xac,
|
|
0x11, 0x91, 0xf4, 0xef, 0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
|
|
0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20, 0x8b, 0xd2, 0x89, 0x15,
|
|
0xd0, 0x8e, 0x1c, 0x74, 0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76,
|
|
0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63, 0x6d, 0xeb, 0x2a, 0x65,
|
|
0x49, 0x9c, 0x80, 0xdc
|
|
};
|
|
#endif
|
|
|
|
enum {
|
|
PENDING_PUB_KEY,
|
|
PENDING_DHKEY,
|
|
};
|
|
|
|
static atomic_t flags;
|
|
|
|
static K_SEM_DEFINE(cmd_sem, 0, 1);
|
|
|
|
static struct {
|
|
/* Based on the current implementation of ecc_make_key() it's safe
|
|
* for the private_key and random to occupy the same memory area.
|
|
*/
|
|
union {
|
|
uint32_t private_key[NUM_ECC_DIGITS];
|
|
uint32_t random[NUM_ECC_DIGITS * 2];
|
|
};
|
|
|
|
union {
|
|
EccPoint pk;
|
|
uint32_t dhkey[NUM_ECC_DIGITS];
|
|
};
|
|
} ecc;
|
|
|
|
static void send_cmd_status(uint16_t opcode, uint8_t status)
|
|
{
|
|
struct bt_hci_evt_cmd_status *evt;
|
|
struct bt_hci_evt_hdr *hdr;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("opcode %x status %x", opcode, status);
|
|
|
|
buf = bt_buf_get_cmd_complete(K_FOREVER);
|
|
bt_buf_set_type(buf, BT_BUF_EVT);
|
|
|
|
hdr = net_buf_add(buf, sizeof(*hdr));
|
|
hdr->evt = BT_HCI_EVT_CMD_STATUS;
|
|
hdr->len = sizeof(*evt);
|
|
|
|
evt = net_buf_add(buf, sizeof(*evt));
|
|
evt->ncmd = 1;
|
|
evt->opcode = sys_cpu_to_le16(opcode);
|
|
evt->status = status;
|
|
|
|
bt_recv_prio(buf);
|
|
}
|
|
|
|
static uint8_t generate_keys(void)
|
|
{
|
|
#if !defined(CONFIG_BLUETOOTH_USE_DEBUG_KEYS)
|
|
do {
|
|
int rc;
|
|
|
|
if (bt_rand((uint8_t *)ecc.random, sizeof(ecc.random))) {
|
|
BT_ERR("Failed to get random bytes for ECC keys");
|
|
return BT_HCI_ERR_UNSPECIFIED;
|
|
}
|
|
|
|
rc = ecc_make_key(&ecc.pk, ecc.private_key, ecc.random);
|
|
if (rc == TC_CRYPTO_FAIL) {
|
|
BT_ERR("Failed to create ECC public/private pair");
|
|
return BT_HCI_ERR_UNSPECIFIED;
|
|
}
|
|
|
|
/* make sure generated key isn't debug key */
|
|
} while (memcmp(ecc.private_key, debug_private_key, 32) == 0);
|
|
#else
|
|
memcpy(&ecc.pk, debug_public_key, 64);
|
|
memcpy(ecc.private_key, debug_private_key, 32);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static void emulate_le_p256_public_key_cmd(void)
|
|
{
|
|
struct bt_hci_evt_le_p256_public_key_complete *evt;
|
|
struct bt_hci_evt_le_meta_event *meta;
|
|
struct bt_hci_evt_hdr *hdr;
|
|
struct net_buf *buf;
|
|
uint8_t status;
|
|
|
|
BT_DBG("");
|
|
|
|
status = generate_keys();
|
|
|
|
buf = bt_buf_get_rx(K_FOREVER);
|
|
bt_buf_set_type(buf, BT_BUF_EVT);
|
|
|
|
hdr = net_buf_add(buf, sizeof(*hdr));
|
|
hdr->evt = BT_HCI_EVT_LE_META_EVENT;
|
|
hdr->len = sizeof(*meta) + sizeof(*evt);
|
|
|
|
meta = net_buf_add(buf, sizeof(*meta));
|
|
meta->subevent = BT_HCI_EVT_LE_P256_PUBLIC_KEY_COMPLETE;
|
|
|
|
evt = net_buf_add(buf, sizeof(*evt));
|
|
evt->status = status;
|
|
|
|
if (status) {
|
|
memset(evt->key, 0, sizeof(evt->key));
|
|
} else {
|
|
memcpy(evt->key, ecc.pk.x, 32);
|
|
memcpy(&evt->key[32], ecc.pk.y, 32);
|
|
}
|
|
|
|
atomic_clear_bit(&flags, PENDING_PUB_KEY);
|
|
|
|
bt_recv(buf);
|
|
}
|
|
|
|
static void emulate_le_generate_dhkey(void)
|
|
{
|
|
struct bt_hci_evt_le_generate_dhkey_complete *evt;
|
|
struct bt_hci_evt_le_meta_event *meta;
|
|
struct bt_hci_evt_hdr *hdr;
|
|
struct net_buf *buf;
|
|
int32_t ret;
|
|
|
|
if (ecc_valid_public_key(&ecc.pk) < 0) {
|
|
ret = TC_CRYPTO_FAIL;
|
|
} else {
|
|
ret = ecdh_shared_secret(ecc.dhkey, &ecc.pk, ecc.private_key);
|
|
}
|
|
|
|
buf = bt_buf_get_rx(K_FOREVER);
|
|
bt_buf_set_type(buf, BT_BUF_EVT);
|
|
|
|
hdr = net_buf_add(buf, sizeof(*hdr));
|
|
hdr->evt = BT_HCI_EVT_LE_META_EVENT;
|
|
hdr->len = sizeof(*meta) + sizeof(*evt);
|
|
|
|
meta = net_buf_add(buf, sizeof(*meta));
|
|
meta->subevent = BT_HCI_EVT_LE_GENERATE_DHKEY_COMPLETE;
|
|
|
|
evt = net_buf_add(buf, sizeof(*evt));
|
|
|
|
if (ret == TC_CRYPTO_FAIL) {
|
|
evt->status = BT_HCI_ERR_UNSPECIFIED;
|
|
memset(evt->dhkey, 0, sizeof(evt->dhkey));
|
|
} else {
|
|
evt->status = 0;
|
|
memcpy(evt->dhkey, ecc.dhkey, sizeof(ecc.dhkey));
|
|
}
|
|
|
|
atomic_clear_bit(&flags, PENDING_DHKEY);
|
|
|
|
bt_recv(buf);
|
|
}
|
|
|
|
static void ecc_thread(void *p1, void *p2, void *p3)
|
|
{
|
|
while (true) {
|
|
k_sem_take(&cmd_sem, K_FOREVER);
|
|
|
|
if (atomic_test_bit(&flags, PENDING_PUB_KEY)) {
|
|
emulate_le_p256_public_key_cmd();
|
|
} else if (atomic_test_bit(&flags, PENDING_DHKEY)) {
|
|
emulate_le_generate_dhkey();
|
|
} else {
|
|
__ASSERT(0, "Unhandled ECC command");
|
|
}
|
|
|
|
stack_analyze("ecc stack", ecc_thread_stack,
|
|
sizeof(ecc_thread_stack));
|
|
}
|
|
}
|
|
|
|
static void clear_ecc_events(struct net_buf *buf)
|
|
{
|
|
struct bt_hci_cp_le_set_event_mask *cmd;
|
|
|
|
cmd = (void *)buf->data + sizeof(struct bt_hci_cmd_hdr);
|
|
|
|
/*
|
|
* don't enable controller ECC events as those will be generated from
|
|
* emulation code
|
|
*/
|
|
cmd->events[0] &= ~0x80; /* LE Read Local P-256 PKey Compl */
|
|
cmd->events[1] &= ~0x01; /* LE Generate DHKey Compl Event */
|
|
}
|
|
|
|
static void le_gen_dhkey(struct net_buf *buf)
|
|
{
|
|
struct bt_hci_cp_le_generate_dhkey *cmd;
|
|
uint8_t status;
|
|
|
|
if (atomic_test_bit(&flags, PENDING_PUB_KEY)) {
|
|
status = BT_HCI_ERR_CMD_DISALLOWED;
|
|
goto send_status;
|
|
}
|
|
|
|
if (buf->len < sizeof(struct bt_hci_cp_le_generate_dhkey)) {
|
|
status = BT_HCI_ERR_INVALID_PARAMS;
|
|
goto send_status;
|
|
}
|
|
|
|
if (atomic_test_and_set_bit(&flags, PENDING_DHKEY)) {
|
|
status = BT_HCI_ERR_CMD_DISALLOWED;
|
|
goto send_status;
|
|
}
|
|
|
|
cmd = (void *)buf->data;
|
|
memcpy(ecc.pk.x, cmd->key, 32);
|
|
memcpy(ecc.pk.y, &cmd->key[32], 32);
|
|
k_sem_give(&cmd_sem);
|
|
status = BT_HCI_ERR_SUCCESS;
|
|
|
|
send_status:
|
|
net_buf_unref(buf);
|
|
send_cmd_status(BT_HCI_OP_LE_GENERATE_DHKEY, status);
|
|
}
|
|
|
|
static void le_p256_pub_key(struct net_buf *buf)
|
|
{
|
|
uint8_t status;
|
|
|
|
net_buf_unref(buf);
|
|
|
|
if (atomic_test_bit(&flags, PENDING_DHKEY)) {
|
|
status = BT_HCI_ERR_CMD_DISALLOWED;
|
|
} else if (atomic_test_and_set_bit(&flags, PENDING_PUB_KEY)) {
|
|
status = BT_HCI_ERR_CMD_DISALLOWED;
|
|
} else {
|
|
k_sem_give(&cmd_sem);
|
|
status = BT_HCI_ERR_SUCCESS;
|
|
}
|
|
|
|
send_cmd_status(BT_HCI_OP_LE_P256_PUBLIC_KEY, status);
|
|
}
|
|
|
|
int bt_hci_ecc_send(struct net_buf *buf)
|
|
{
|
|
if (bt_buf_get_type(buf) == BT_BUF_CMD) {
|
|
struct bt_hci_cmd_hdr *chdr = (void *)buf->data;
|
|
|
|
switch (sys_le16_to_cpu(chdr->opcode)) {
|
|
case BT_HCI_OP_LE_P256_PUBLIC_KEY:
|
|
net_buf_pull(buf, sizeof(*chdr));
|
|
le_p256_pub_key(buf);
|
|
return 0;
|
|
case BT_HCI_OP_LE_GENERATE_DHKEY:
|
|
net_buf_pull(buf, sizeof(*chdr));
|
|
le_gen_dhkey(buf);
|
|
return 0;
|
|
case BT_HCI_OP_LE_SET_EVENT_MASK:
|
|
clear_ecc_events(buf);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
return bt_dev.drv->send(buf);
|
|
}
|
|
|
|
void bt_hci_ecc_init(void)
|
|
{
|
|
k_thread_spawn(ecc_thread_stack, sizeof(ecc_thread_stack),
|
|
ecc_thread, NULL, NULL, NULL,
|
|
K_PRIO_PREEMPT(10), 0, K_NO_WAIT);
|
|
}
|