int bt_conn_auth_pincode_entry(struct bt_conn *conn, const char *pin) { size_t len; if (!bt_auth) { return -EINVAL; } if (conn->type != BT_CONN_TYPE_BR) { return -EINVAL; } len = strlen(pin); if (len > 16) { return -EINVAL; } if (conn->required_sec_level == BT_SECURITY_HIGH && len < 16) { BT_WARN("PIN code for %s is not 16 bytes wide", bt_addr_str(&conn->br.dst)); return -EPERM; } /* Allow user send entered PIN to remote, then reset user state. */ if (!atomic_test_and_clear_bit(conn->flags, BT_CONN_USER)) { return -EPERM; } if (len == 16) { atomic_set_bit(conn->flags, BT_CONN_BR_LEGACY_SECURE); } return pin_code_reply(conn, pin, len); }
struct bt_keys *bt_keys_find_irk(const bt_addr_le_t *addr) { int i; BT_DBG("%s", bt_addr_le_str(addr)); if (!bt_addr_le_is_rpa(addr)) { return NULL; } for (i = 0; i < ARRAY_SIZE(key_pool); i++) { if (!(key_pool[i].keys & BT_KEYS_IRK)) { continue; } if (!bt_addr_cmp((bt_addr_t *)addr->val, &key_pool[i].irk.rpa)) { BT_DBG("cached RPA %s for %s", bt_addr_str(&key_pool[i].irk.rpa), bt_addr_le_str(&key_pool[i].addr)); return &key_pool[i]; } } for (i = 0; i < ARRAY_SIZE(key_pool); i++) { if (!(key_pool[i].keys & BT_KEYS_IRK)) { continue; } if (bt_smp_irk_matches(key_pool[i].irk.val, (bt_addr_t *)addr->val)) { BT_DBG("RPA %s matches %s", bt_addr_str(&key_pool[i].irk.rpa), bt_addr_le_str(&key_pool[i].addr)); bt_addr_copy(&key_pool[i].irk.rpa, (bt_addr_t *)addr->val); return &key_pool[i]; } } BT_DBG("No IRK for %s", bt_addr_le_str(addr)); return NULL; }
bool bt_rpa_irk_matches(const u8_t irk[16], const bt_addr_t *addr) { u8_t hash[3]; int err; BT_DBG("IRK %s bdaddr %s", bt_hex(irk, 16), bt_addr_str(addr)); err = ah(irk, addr->val + 3, hash); if (err) { return false; } return !memcmp(addr->val, hash, 3); }
static struct bt_keys *bt_keys_get_addr_br(const bt_addr_t *addr) { struct bt_keys *keys; int i; BT_DBG("%s", bt_addr_str(addr)); for (i = 0; i < ARRAY_SIZE(key_pool); i++) { keys = &key_pool[i]; /* * When both LE and BR/EDR keys are for the same device, * the bt_addr_le_t is the public address, i.e. the same * as the BR/EDR address. */ if (keys->addr.type == BT_ADDR_LE_PUBLIC && !bt_addr_cmp((const bt_addr_t *)keys->addr.val, addr)) { return keys; } /* * BT_ADDR_LE_ANY has the same type of as BT_ADDR_LE_PUBLIC * value. No need to make redudant comparision against * BT_ADDR_LE_PUBLIC. */ if (!bt_addr_le_cmp(&keys->addr, BT_ADDR_LE_ANY)) { bt_addr_copy((bt_addr_t *)keys->addr.val, addr); BT_DBG("created %p for %s", keys, bt_addr_str(addr)); return keys; } } BT_DBG("unable to create keys for %s", bt_addr_str(addr)); return NULL; }
int bt_rpa_create(const u8_t irk[16], bt_addr_t *rpa) { int err; err = bt_rand(rpa->val + 3, 3); if (err) { return err; } BT_ADDR_SET_RPA(rpa); err = ah(irk, rpa->val + 3, rpa->val); if (err) { return err; } BT_DBG("Created RPA %s", bt_addr_str((bt_addr_t *)rpa->val)); return 0; }
struct bt_keys *bt_keys_get_link_key(const bt_addr_t *addr) { struct bt_keys *keys; BT_DBG("%s", bt_addr_str(addr)); keys = bt_keys_find_link_key(addr); if (keys) { return keys; } keys = bt_keys_get_addr_br(addr); if (!keys) { return NULL; } bt_keys_add_type(keys, BT_KEYS_LINK_KEY); return keys; }
struct bt_keys *bt_keys_find_link_key(const bt_addr_t *addr) { struct bt_keys *keys; int i; BT_DBG("%s", bt_addr_str(addr)); for (i = 0; i < ARRAY_SIZE(key_pool); i++) { keys = &key_pool[i]; /* * When both LE and BR/EDR keys are for the same device, * the bt_addr_le_t is the public address, i.e. the same * as the BR/EDR address. */ if (keys->addr.type == BT_ADDR_LE_PUBLIC && (keys->keys & BT_KEYS_LINK_KEY) && !bt_addr_cmp((const bt_addr_t *)keys->addr.val, addr)) { return keys; } } return NULL; }