1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BLUEKITCHEN 24 * GMBH OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /** 39 * @title Security Manager 40 * 41 */ 42 43 #ifndef SM_H 44 #define SM_H 45 46 #if defined __cplusplus 47 extern "C" { 48 #endif 49 50 #include <stdint.h> 51 #include "btstack_util.h" 52 #include "btstack_defines.h" 53 #include "hci.h" 54 55 typedef struct { 56 btstack_linked_item_t item; 57 bd_addr_t address; 58 bd_addr_type_t address_type; 59 } sm_lookup_entry_t; 60 61 /* API_START */ 62 63 /** 64 * @brief Initializes the Security Manager, connects to L2CAP 65 */ 66 void sm_init(void); 67 68 /** 69 * @brief Set secret ER key for key generation as described in Core V4.0, Vol 3, Part G, 5.2.2 70 * @note If not set and btstack_tlv is configured, ER key is generated and stored in TLV by SM 71 * @param er key 72 */ 73 void sm_set_er(sm_key_t er); 74 75 /** 76 * @brief Set secret IR key for key generation as described in Core V4.0, Vol 3, Part G, 5.2.2 77 * @note If not set and btstack_tlv is configured, IR key is generated and stored in TLV by SM 78 * @param ir key 79 */ 80 void sm_set_ir(sm_key_t ir); 81 82 /** 83 * @brief Registers OOB Data Callback. The callback should set the oob_data and return 1 if OOB data is availble 84 * @param get_oob_data_callback 85 */ 86 void sm_register_oob_data_callback( int (*get_oob_data_callback)(uint8_t address_type, bd_addr_t addr, uint8_t * oob_data)); 87 88 /** 89 * @brief Add event packet handler. 90 * @param callback_handler 91 */ 92 void sm_add_event_handler(btstack_packet_callback_registration_t * callback_handler); 93 94 /** 95 * @brief Remove event packet handler. 96 * @param callback_handler 97 */ 98 void sm_remove_event_handler(btstack_packet_callback_registration_t * callback_handler); 99 100 /** 101 * @brief Limit the STK generation methods. Bonding is stopped if the resulting one isn't in the list 102 * @param OR combination of SM_STK_GENERATION_METHOD_ 103 */ 104 void sm_set_accepted_stk_generation_methods(uint8_t accepted_stk_generation_methods); 105 106 /** 107 * @brief Set the accepted encryption key size range. Bonding is stopped if the result isn't within the range 108 * @param min_size (default 7) 109 * @param max_size (default 16) 110 */ 111 void sm_set_encryption_key_size_range(uint8_t min_size, uint8_t max_size); 112 113 /** 114 * @brief Sets the requested authentication requirements, bonding yes/no, MITM yes/no, SC yes/no, keypress yes/no 115 * @param OR combination of SM_AUTHREQ_ flags 116 */ 117 void sm_set_authentication_requirements(uint8_t auth_req); 118 119 /** 120 * @brief Sets the available IO Capabilities 121 * @param IO_CAPABILITY_ 122 */ 123 void sm_set_io_capabilities(io_capability_t io_capability); 124 125 /** 126 * @brief Enable/disable Secure Connections Mode only 127 * @param enable secure connections only mode 128 */ 129 void sm_set_secure_connections_only_mode(bool enable); 130 131 /** 132 * @brief Let Peripheral request an encrypted connection right after connecting 133 * @note Not used normally. Bonding is triggered by access to protected attributes in ATT Server 134 */ 135 void sm_set_request_security(int enable); 136 137 /** 138 * @brief Trigger Security Request 139 * @deprecated please use sm_request_pairing instead 140 */ 141 void sm_send_security_request(hci_con_handle_t con_handle); 142 143 /** 144 * @brief Decline bonding triggered by event before 145 * @param con_handle 146 */ 147 void sm_bonding_decline(hci_con_handle_t con_handle); 148 149 /** 150 * @brief Confirm Just Works bonding 151 * @param con_handle 152 */ 153 void sm_just_works_confirm(hci_con_handle_t con_handle); 154 155 /** 156 * @brief Confirm value from SM_EVENT_NUMERIC_COMPARISON_REQUEST for Numeric Comparison bonding 157 * @param con_handle 158 */ 159 void sm_numeric_comparison_confirm(hci_con_handle_t con_handle); 160 161 /** 162 * @brief Reports passkey input by user 163 * @param con_handle 164 * @param passkey in [0..999999] 165 */ 166 void sm_passkey_input(hci_con_handle_t con_handle, uint32_t passkey); 167 168 /** 169 * @brief Send keypress notification for keyboard only devices 170 * @param con_handle 171 * @param action see SM_KEYPRESS_* in bluetooth.h 172 */ 173 void sm_keypress_notification(hci_con_handle_t con_handle, uint8_t action); 174 175 /** 176 * @brief Used by att_server.c and gatt_client.c to request user authentication 177 * @param con_handle 178 */ 179 void sm_request_pairing(hci_con_handle_t con_handle); 180 181 /** 182 * @brief Report user authorization decline. 183 * @param con_handle 184 */ 185 void sm_authorization_decline(hci_con_handle_t con_handle); 186 187 /** 188 * @brief Report user authorization grant. 189 * @param con_handle 190 */ 191 void sm_authorization_grant(hci_con_handle_t con_handle); 192 193 /** 194 * @brief Support for signed writes, used by att_server. 195 * @return ready 196 */ 197 int sm_cmac_ready(void); 198 199 /** 200 * @brief Support for signed writes, used by att_server. 201 * @note Message is in little endian to allows passing in ATT PDU without flipping. 202 * @note signing data: [opcode, attribute_handle, message, sign_counter] 203 * @note calculated hash in done_callback is big endian and has 16 byte. 204 * @param key 205 * @param opcde 206 * @param attribute_handle 207 * @param message_len 208 * @param message 209 * @param sign_counter 210 */ 211 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint16_t message_len, const uint8_t * message, uint32_t sign_counter, void (*done_callback)(uint8_t * hash)); 212 213 /** 214 * @brief Match address against bonded devices 215 * @param address_type 216 * @param address 217 * @return 0 if successfully added to lookup queue 218 * @note Triggers SM_IDENTITY_RESOLVING_* events 219 */ 220 int sm_address_resolution_lookup(uint8_t address_type, bd_addr_t address); 221 222 /** 223 * @brief Get Identity Resolving state 224 * @param con_handle 225 * @return irk_lookup_state_t 226 * @note return IRK_LOOKUP_IDLE if connection does not exist 227 */ 228 irk_lookup_state_t sm_identity_resolving_state(hci_con_handle_t con_handle); 229 230 /** 231 * @brief Identify device in LE Device DB. 232 * @param con_handle 233 * @return index from le_device_db or -1 if not found/identified 234 */ 235 int sm_le_device_index(hci_con_handle_t con_handle); 236 237 /** 238 * @brief Get LTK for encrypted connection 239 * @param con_handle 240 * @param ltk buffer to store long term key 241 * @return ERROR_CODE_SUCCESS ok 242 * ERROR_CODE_UNKNOWN_CONNECTION_IDENTIFIER if no connection for this con handle exists 243 * ERROR_CODE_PIN_OR_KEY_MISSING if connection is not encrypted 244 */ 245 uint8_t sm_get_ltk(hci_con_handle_t con_handle, sm_key_t ltk); 246 247 /** 248 * @brief Use fixec passkey for Legacy and SC instead of generating a random number 249 * @note Can be used to improve security over Just Works if no keyboard or displary are present and 250 * individual random passkey can be printed on the device during production 251 * @param passkey 252 */ 253 void sm_use_fixed_passkey_in_display_role(uint32_t passkey); 254 255 /** 256 * @brief Allow connection re-encryption in Peripheral (Responder) role for LE Legacy Pairing 257 * without entry for Central device stored in LE Device DB 258 * @note BTstack in Peripheral Role (Responder) supports LE Legacy Pairing without a persistent LE Device DB as 259 * the LTK is reconstructed from a local secret IRK and EDIV + Random stored on Central (Initiator) device 260 * On the downside, it's not really possible to delete a pairing if this is enabled. 261 * @param allow encryption using reconstructed LTK without stored entry (Default: 1) 262 */ 263 void sm_allow_ltk_reconstruction_without_le_device_db_entry(int allow); 264 265 /** 266 * @brief Generate OOB data for LE Secure Connections 267 * @note This generates a 128 bit random number ra and then calculates Ca = f4(PKa, PKa, ra, 0) 268 * New OOB data should be generated for each pairing. Ra is used for subsequent OOB pairings 269 * @param callback 270 * @return status 271 */ 272 uint8_t sm_generate_sc_oob_data(void (*callback)(const uint8_t * confirm_value, const uint8_t * random_value)); 273 274 /** 275 * @brief Registers OOB Data Callback for LE Secure Conections. The callback should set all arguments and return 1 if OOB data is availble 276 * @note the oob_sc_local_random usually is the random_value returend by sm_generate_sc_oob_data 277 * @param get_oob_data_callback 278 */ 279 void sm_register_sc_oob_data_callback( int (*get_sc_oob_data_callback)(uint8_t address_type, bd_addr_t addr, uint8_t * oob_sc_peer_confirm, uint8_t * oob_sc_peer_random)); 280 281 /** 282 * @bbrief Register LTK Callback that allows to provide a custom LTK on re-encryption. The callback returns true if LTK was modified 283 * @param get_ltk_callback 284 */ 285 void sm_register_ltk_callback( bool (*get_ltk_callback)(hci_con_handle_t con_handle, uint8_t address_type, bd_addr_t addr, uint8_t * ltk)); 286 287 /* API_END */ 288 289 /** 290 * @brief De-Init SM 291 */ 292 void sm_deinit(void); 293 294 /** 295 * @brief Use Debug Keys for LE Secure Connections for testing until restart 296 * @note Requires ENABLE_LE_SECURE_CONNECTIONS and ENABLE_LE_SECURE_CONNECTIONS_DEBUG_KEY 297 */ 298 void sm_test_enable_secure_connections_debug_keys(void); 299 300 // PTS testing 301 void sm_test_set_irk(sm_key_t irk); 302 void sm_test_use_fixed_local_csrk(void); 303 304 305 #ifdef ENABLE_TESTING_SUPPORT 306 void sm_test_set_pairing_failure(int reason); 307 #endif 308 309 #if defined __cplusplus 310 } 311 #endif 312 313 #endif // SM_H 314