You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
470 lines
20 KiB
470 lines
20 KiB
/******************************************************************************
|
|
*
|
|
* Copyright 1999-2012 Broadcom Corporation
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
******************************************************************************/
|
|
|
|
/******************************************************************************
|
|
*
|
|
* This file contains internally used SMP definitions
|
|
*
|
|
******************************************************************************/
|
|
#ifndef SMP_INT_H
|
|
#define SMP_INT_H
|
|
|
|
#include "btm_api.h"
|
|
#include "btm_ble_api.h"
|
|
#include "btu.h"
|
|
#include "smp_api.h"
|
|
#include "stack/crypto_toolbox/crypto_toolbox.h"
|
|
|
|
typedef enum : uint8_t {
|
|
/* Legacy mode */
|
|
SMP_MODEL_ENCRYPTION_ONLY = 0, /* Just Works model */
|
|
SMP_MODEL_PASSKEY = 1, /* Passkey Entry model, input the key */
|
|
SMP_MODEL_OOB = 2, /* OOB model */
|
|
SMP_MODEL_KEY_NOTIF = 3, /* Passkey Entry model, display the key */
|
|
/* Secure connections mode */
|
|
SMP_MODEL_SEC_CONN_JUSTWORKS = 4, /* Just Works model */
|
|
SMP_MODEL_SEC_CONN_NUM_COMP = 5, /* Numeric Comparison model */
|
|
SMP_MODEL_SEC_CONN_PASSKEY_ENT = 6, /* Passkey Entry model, */
|
|
/* this side inputs the key */
|
|
SMP_MODEL_SEC_CONN_PASSKEY_DISP = 7, /* Passkey Entry model, */
|
|
/* this side displays the key */
|
|
SMP_MODEL_SEC_CONN_OOB = 8, /* Secure Connections mode, OOB model */
|
|
SMP_MODEL_OUT_OF_RANGE = 9,
|
|
} tSMP_ASSO_MODEL;
|
|
|
|
#ifndef SMP_MAX_CONN
|
|
#define SMP_MAX_CONN 2
|
|
#endif
|
|
|
|
#define SMP_WAIT_FOR_RSP_TIMEOUT_MS (30 * 1000)
|
|
#define SMP_DELAYED_AUTH_TIMEOUT_MS 500
|
|
|
|
#define SMP_OPCODE_INIT 0x04
|
|
|
|
/* SMP events */
|
|
typedef enum : uint8_t {
|
|
SMP_NOP_EVT = 0,
|
|
SMP_CONFIRM_EVT = SMP_OPCODE_CONFIRM, // 0x03
|
|
SMP_RAND_EVT = SMP_OPCODE_RAND, // 0x04
|
|
|
|
SMP_PAIR_COMMITM_EVT = SMP_OPCODE_PAIR_COMMITM, // 0x0f
|
|
SMP_SELF_DEF_EVT = (SMP_PAIR_COMMITM_EVT + 1), // 0x10
|
|
SMP_KEY_READY_EVT = (SMP_SELF_DEF_EVT), // 0x04
|
|
SMP_ENCRYPTED_EVT = (SMP_SELF_DEF_EVT + 1), // 0x05
|
|
SMP_L2CAP_CONN_EVT = (SMP_SELF_DEF_EVT + 2), // 0x06
|
|
SMP_L2CAP_DISCONN_EVT = (SMP_SELF_DEF_EVT + 3), // 0x07
|
|
SMP_IO_RSP_EVT = (SMP_SELF_DEF_EVT + 4), // 0x08
|
|
SMP_API_SEC_GRANT_EVT = (SMP_SELF_DEF_EVT + 5), // 0x09
|
|
SMP_TK_REQ_EVT = (SMP_SELF_DEF_EVT + 6), // 0x0a
|
|
SMP_AUTH_CMPL_EVT = (SMP_SELF_DEF_EVT + 7), // 0x0b
|
|
SMP_ENC_REQ_EVT = (SMP_SELF_DEF_EVT + 8), // 0x0c
|
|
SMP_BOND_REQ_EVT = (SMP_SELF_DEF_EVT + 9), // 0x0d
|
|
SMP_DISCARD_SEC_REQ_EVT = (SMP_SELF_DEF_EVT + 10), // 0x0e
|
|
|
|
SMP_BR_PAIR_KEYPR_NOTIF_EVT = SMP_OPCODE_PAIR_KEYPR_NOTIF,
|
|
/* not over BR/EDR */ // 0x0e
|
|
SMP_BR_SELF_DEF_EVT = SMP_BR_PAIR_KEYPR_NOTIF_EVT, // 0x0e
|
|
SMP_BR_KEY_READY_EVT = (SMP_BR_SELF_DEF_EVT + 1), // 0x0f
|
|
SMP_BR_ENCRYPTED_EVT = (SMP_BR_SELF_DEF_EVT + 2), // 0x10
|
|
SMP_BR_L2CAP_CONN_EVT = (SMP_BR_SELF_DEF_EVT + 3), // 0x11
|
|
SMP_BR_L2CAP_DISCONN_EVT = (SMP_BR_SELF_DEF_EVT + 4), // 0x12
|
|
SMP_BR_KEYS_RSP_EVT = (SMP_BR_SELF_DEF_EVT + 5), // 0x13
|
|
SMP_BR_API_SEC_GRANT_EVT = (SMP_BR_SELF_DEF_EVT + 6), // 0x14
|
|
SMP_BR_TK_REQ_EVT = (SMP_BR_SELF_DEF_EVT + 7), // 0x15
|
|
SMP_BR_AUTH_CMPL_EVT = (SMP_BR_SELF_DEF_EVT + 8), // 0x16
|
|
SMP_BR_ENC_REQ_EVT = (SMP_BR_SELF_DEF_EVT + 9), // 0x17
|
|
SMP_BR_BOND_REQ_EVT = (SMP_BR_SELF_DEF_EVT + 10), // 0x18
|
|
SMP_BR_DISCARD_SEC_REQ_EVT = (SMP_BR_SELF_DEF_EVT + 11), // 0x19
|
|
SMP_BR_MAX_EVT = (SMP_BR_SELF_DEF_EVT + 12), // 0x1a
|
|
|
|
SMP_PAIR_DHKEY_CHCK_EVT = SMP_OPCODE_PAIR_DHKEY_CHECK, // 0x0d
|
|
|
|
/* request to start public key exchange */
|
|
SMP_PUBL_KEY_EXCH_REQ_EVT = (SMP_SELF_DEF_EVT + 11), // 0x1b
|
|
|
|
/* local public key created */
|
|
SMP_LOC_PUBL_KEY_CRTD_EVT = (SMP_SELF_DEF_EVT + 12), // 0x1c
|
|
|
|
/* both local and peer public keys are saved in cb */
|
|
SMP_BOTH_PUBL_KEYS_RCVD_EVT = (SMP_SELF_DEF_EVT + 13), // 0x1d
|
|
|
|
/* DHKey computation is completed, time to start SC phase1 */
|
|
SMP_SC_DHKEY_CMPLT_EVT = (SMP_SELF_DEF_EVT + 14), // 0x1d
|
|
|
|
/* new local nonce is generated and saved in p_cb->rand */
|
|
SMP_HAVE_LOC_NONCE_EVT = (SMP_SELF_DEF_EVT + 15), // 0x1f
|
|
|
|
/* time to start SC phase2 */
|
|
SMP_SC_PHASE1_CMPLT_EVT = (SMP_SELF_DEF_EVT + 16), // 0x20
|
|
|
|
/* request to calculate number for user check. Used only in the numeric
|
|
* compare protocol */
|
|
SMP_SC_CALC_NC_EVT = (SMP_SELF_DEF_EVT + 17), // 0x21
|
|
|
|
/* Request to display the number for user check to the user.*/
|
|
/* Used only in the numeric compare protocol */
|
|
SMP_SC_DSPL_NC_EVT = (SMP_SELF_DEF_EVT + 18), // 0x22
|
|
|
|
/* user confirms 'OK' numeric comparison request */
|
|
SMP_SC_NC_OK_EVT = (SMP_SELF_DEF_EVT + 19), // 0x23
|
|
|
|
/* both local and peer DHKey Checks are already present - it is used on
|
|
* peripheral to prevent a race condition */
|
|
SMP_SC_2_DHCK_CHKS_PRES_EVT = (SMP_SELF_DEF_EVT + 20), // 0x24
|
|
|
|
/* same meaning as SMP_KEY_READY_EVT to separate between SC and legacy actions
|
|
*/
|
|
SMP_SC_KEY_READY_EVT = (SMP_SELF_DEF_EVT + 21), // 0x25
|
|
SMP_KEYPRESS_NOTIFICATION_EVENT = (SMP_SELF_DEF_EVT + 22), // 0x26
|
|
|
|
/* SC OOB data from some repository is provided */
|
|
SMP_SC_OOB_DATA_EVT = (SMP_SELF_DEF_EVT + 23), // 0x27
|
|
|
|
SMP_CR_LOC_SC_OOB_DATA_EVT = (SMP_SELF_DEF_EVT + 24), // 0x28
|
|
SMP_MAX_EVT = SMP_CR_LOC_SC_OOB_DATA_EVT, // 0x28
|
|
} tSMP_EVENT;
|
|
typedef tSMP_EVENT tSMP_BR_EVENT;
|
|
|
|
/* Assumption it's only using the low 8 bits, if bigger than that, need to
|
|
* expand it to 16 bits */
|
|
#define SMP_SEC_KEY_MASK 0x00ff
|
|
|
|
/* SMP pairing state */
|
|
enum {
|
|
SMP_STATE_IDLE,
|
|
SMP_STATE_WAIT_APP_RSP,
|
|
SMP_STATE_SEC_REQ_PENDING,
|
|
SMP_STATE_PAIR_REQ_RSP,
|
|
SMP_STATE_WAIT_CONFIRM,
|
|
SMP_STATE_CONFIRM,
|
|
SMP_STATE_RAND,
|
|
SMP_STATE_PUBLIC_KEY_EXCH,
|
|
SMP_STATE_SEC_CONN_PHS1_START,
|
|
SMP_STATE_WAIT_COMMITMENT,
|
|
SMP_STATE_WAIT_NONCE,
|
|
SMP_STATE_SEC_CONN_PHS2_START,
|
|
SMP_STATE_WAIT_DHK_CHECK,
|
|
SMP_STATE_DHK_CHECK,
|
|
SMP_STATE_ENCRYPTION_PENDING,
|
|
SMP_STATE_BOND_PENDING,
|
|
SMP_STATE_CREATE_LOCAL_SEC_CONN_OOB_DATA,
|
|
SMP_STATE_MAX
|
|
};
|
|
typedef uint8_t tSMP_STATE;
|
|
|
|
/* SMP over BR/EDR pairing states */
|
|
enum {
|
|
SMP_BR_STATE_IDLE = SMP_STATE_IDLE,
|
|
SMP_BR_STATE_WAIT_APP_RSP,
|
|
SMP_BR_STATE_PAIR_REQ_RSP,
|
|
SMP_BR_STATE_BOND_PENDING,
|
|
SMP_BR_STATE_MAX
|
|
};
|
|
typedef uint8_t tSMP_BR_STATE;
|
|
|
|
enum {
|
|
SMP_KEY_TYPE_TK,
|
|
SMP_KEY_TYPE_CFM,
|
|
SMP_KEY_TYPE_CMP,
|
|
SMP_KEY_TYPE_PEER_DHK_CHCK,
|
|
SMP_KEY_TYPE_STK,
|
|
SMP_KEY_TYPE_LTK
|
|
};
|
|
typedef struct {
|
|
uint8_t key_type;
|
|
uint8_t* p_data;
|
|
} tSMP_KEY;
|
|
|
|
typedef union {
|
|
uint8_t* p_data; /* uint8_t type data pointer */
|
|
tSMP_KEY key;
|
|
tSMP_STATUS status;
|
|
uint32_t passkey;
|
|
tSMP_OOB_DATA_TYPE req_oob_type;
|
|
} tSMP_INT_DATA;
|
|
|
|
/* internal status mask */
|
|
#define SMP_PAIR_FLAGS_WE_STARTED_DD (1)
|
|
#define SMP_PAIR_FLAGS_PEER_STARTED_DD (1 << 1)
|
|
#define SMP_PAIR_FLAGS_CMD_CONFIRM (1 << SMP_OPCODE_CONFIRM) /* 1 << 3 */
|
|
#define SMP_PAIR_FLAG_ENC_AFTER_PAIR (1 << 4)
|
|
#define SMP_PAIR_FLAG_HAVE_PEER_DHK_CHK \
|
|
(1 << 5) /* used on peripheral to resolve race condition */
|
|
#define SMP_PAIR_FLAG_HAVE_PEER_PUBL_KEY \
|
|
(1 << 6) /* used on peripheral to resolve race condition */
|
|
#define SMP_PAIR_FLAG_HAVE_PEER_COMM \
|
|
(1 << 7) /* used to resolve race condition */
|
|
#define SMP_PAIR_FLAG_HAVE_LOCAL_PUBL_KEY \
|
|
(1 << 8) /* used on peripheral to resolve race condition */
|
|
|
|
/* check if authentication requirement need MITM protection */
|
|
#define SMP_NO_MITM_REQUIRED(x) (((x)&SMP_AUTH_YN_BIT) == 0)
|
|
|
|
typedef struct {
|
|
RawAddress bd_addr;
|
|
BT_HDR* p_copy;
|
|
} tSMP_REQ_Q_ENTRY;
|
|
|
|
/* SMP control block */
|
|
typedef struct {
|
|
tSMP_CALLBACK* p_callback;
|
|
alarm_t* smp_rsp_timer_ent;
|
|
uint8_t trace_level;
|
|
RawAddress pairing_bda;
|
|
tSMP_STATE state;
|
|
bool derive_lk;
|
|
bool id_addr_rcvd;
|
|
tBLE_ADDR_TYPE id_addr_type;
|
|
RawAddress id_addr;
|
|
bool smp_over_br;
|
|
tSMP_BR_STATE br_state; /* if SMP over BR/ERD has priority over SMP */
|
|
uint8_t failure;
|
|
tSMP_STATUS status;
|
|
uint8_t role;
|
|
uint16_t flags;
|
|
tSMP_EVT cb_evt;
|
|
tSMP_SEC_LEVEL sec_level;
|
|
bool connect_initialized;
|
|
Octet16 confirm;
|
|
Octet16 rconfirm;
|
|
Octet16 rrand; /* for SC this is peer nonce */
|
|
Octet16 rand; /* for SC this is local nonce */
|
|
BT_OCTET32 private_key;
|
|
BT_OCTET32 dhkey;
|
|
Octet16 commitment;
|
|
Octet16 remote_commitment;
|
|
Octet16 local_random; /* local randomizer - passkey or OOB randomizer */
|
|
Octet16 peer_random; /* peer randomizer - passkey or OOB randomizer */
|
|
Octet16 dhkey_check;
|
|
Octet16 remote_dhkey_check;
|
|
tSMP_PUBLIC_KEY loc_publ_key;
|
|
tSMP_PUBLIC_KEY peer_publ_key;
|
|
tSMP_OOB_DATA_TYPE req_oob_type;
|
|
tSMP_SC_OOB_DATA sc_oob_data;
|
|
tSMP_IO_CAP peer_io_caps;
|
|
tSMP_IO_CAP local_io_capability;
|
|
tSMP_OOB_FLAG peer_oob_flag;
|
|
tSMP_OOB_FLAG loc_oob_flag;
|
|
tSMP_AUTH_REQ peer_auth_req;
|
|
tSMP_AUTH_REQ loc_auth_req;
|
|
bool secure_connections_only_mode_required; /* true if locally SM is required
|
|
to operate */
|
|
/* either in Secure Connections mode or not at all */
|
|
tSMP_ASSO_MODEL selected_association_model;
|
|
bool le_secure_connections_mode_is_used;
|
|
bool key_derivation_h7_used;
|
|
bool le_sc_kp_notif_is_used;
|
|
tSMP_SC_KEY_TYPE local_keypress_notification;
|
|
tSMP_SC_KEY_TYPE peer_keypress_notification;
|
|
uint8_t
|
|
round; /* authentication stage 1 round for passkey association model */
|
|
uint32_t number_to_display;
|
|
Octet16 mac_key;
|
|
uint8_t peer_enc_size;
|
|
uint8_t loc_enc_size;
|
|
uint8_t peer_i_key;
|
|
uint8_t peer_r_key;
|
|
uint8_t local_i_key;
|
|
uint8_t local_r_key;
|
|
|
|
Octet16 tk;
|
|
Octet16 ltk;
|
|
uint16_t div;
|
|
Octet16 csrk; /* storage for local CSRK */
|
|
uint16_t ediv;
|
|
BT_OCTET8 enc_rand;
|
|
tBLE_ADDR_TYPE addr_type;
|
|
RawAddress local_bda;
|
|
bool is_pair_cancel;
|
|
bool discard_sec_req;
|
|
uint8_t rcvd_cmd_code;
|
|
uint8_t rcvd_cmd_len;
|
|
uint16_t total_tx_unacked;
|
|
bool wait_for_authorization_complete;
|
|
tSMP_STATUS cert_failure; /*failure case for certification */
|
|
alarm_t* delayed_auth_timer_ent;
|
|
} tSMP_CB;
|
|
|
|
/* Server Action functions are of this type */
|
|
typedef void (*tSMP_ACT)(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
|
|
extern tSMP_CB smp_cb;
|
|
|
|
/* Functions provided by att_main.cc */
|
|
extern void smp_init(void);
|
|
|
|
/* smp main */
|
|
extern void smp_sm_event(tSMP_CB* p_cb, tSMP_EVENT event,
|
|
tSMP_INT_DATA* p_data);
|
|
|
|
extern tSMP_STATE smp_get_state(void);
|
|
extern void smp_set_state(tSMP_STATE state);
|
|
|
|
/* smp_br_main */
|
|
extern void smp_br_state_machine_event(tSMP_CB* p_cb, tSMP_BR_EVENT event,
|
|
tSMP_INT_DATA* p_data);
|
|
extern tSMP_BR_STATE smp_get_br_state(void);
|
|
extern void smp_set_br_state(tSMP_BR_STATE state);
|
|
|
|
/* smp_act.cc */
|
|
extern void smp_send_pair_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_pair_fail(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_rand(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_pair_public_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_commitment(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_dhkey_check(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_keypress_notification(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_pair_fail(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_rand(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_process_pairing_public_key(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_enc_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_central_id(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_id_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_id_addr(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_sec_grant(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_sec_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_sl_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_start_enc(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_enc_cmpl(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_discard(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_pairing_cmpl(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_decide_association_model(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_app_cback(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_compare(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_check_auth_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_process_io_response(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_id_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_enc_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_csrk_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_ltk_reply(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_pair_cmd(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_pair_terminate(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_idle_terminate(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_send_pair_rsp(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_key_distribution(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_proc_srk_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_csrk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_key_pick_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_both_have_public_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_start_secure_connection_phase1(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_process_local_nonce(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_process_pairing_commitment(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_process_peer_nonce(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_process_dhkey_check(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_match_dhkey_checks(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_process_keypress_notification(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_move_to_secure_connections_phase2(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_phase_2_dhkey_checks_are_present(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_wait_for_both_public_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_start_passkey_verification(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_process_secure_connection_oob_data(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_process_secure_connection_long_term_key(void);
|
|
extern void smp_set_local_oob_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_set_local_oob_random_commitment(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_set_derive_link_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_derive_link_key_from_long_term_key(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_br_process_pairing_command(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_br_process_security_grant(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_br_process_peripheral_keys_response(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_br_send_pair_response(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_br_check_authorization_request(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_br_select_next_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_br_process_link_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_key_distribution_by_transport(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_br_pairing_complete(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
|
|
/* smp_l2c */
|
|
extern void smp_l2cap_if_init(void);
|
|
extern void smp_data_ind(const RawAddress& bd_addr, BT_HDR* p_buf);
|
|
|
|
/* smp_util.cc */
|
|
extern void smp_log_metrics(const RawAddress& bd_addr, bool is_outgoing,
|
|
const uint8_t* p_buf, size_t buf_len);
|
|
extern bool smp_send_cmd(uint8_t cmd_code, tSMP_CB* p_cb);
|
|
extern void smp_cb_cleanup(tSMP_CB* p_cb);
|
|
extern void smp_reset_control_value(tSMP_CB* p_cb);
|
|
extern void smp_proc_pairing_cmpl(tSMP_CB* p_cb);
|
|
extern void smp_convert_string_to_tk(Octet16* tk, uint32_t passkey);
|
|
extern void smp_mask_enc_key(uint8_t loc_enc_size, Octet16* p_data);
|
|
extern void smp_rsp_timeout(void* data);
|
|
extern void smp_delayed_auth_complete_timeout(void* data);
|
|
extern bool smp_command_has_invalid_length(tSMP_CB* p_cb);
|
|
extern bool smp_command_has_invalid_parameters(tSMP_CB* p_cb);
|
|
extern void smp_reject_unexpected_pairing_command(const RawAddress& bd_addr);
|
|
extern tSMP_ASSO_MODEL smp_select_association_model(tSMP_CB* p_cb);
|
|
extern uint8_t smp_calculate_random_input(uint8_t* random, uint8_t round);
|
|
extern void smp_collect_local_io_capabilities(uint8_t* iocap, tSMP_CB* p_cb);
|
|
extern void smp_collect_peer_io_capabilities(uint8_t* iocap, tSMP_CB* p_cb);
|
|
extern void smp_collect_local_ble_address(uint8_t* le_addr, tSMP_CB* p_cb);
|
|
extern void smp_collect_peer_ble_address(uint8_t* le_addr, tSMP_CB* p_cb);
|
|
extern bool smp_check_commitment(tSMP_CB* p_cb);
|
|
extern void smp_save_secure_connections_long_term_key(tSMP_CB* p_cb);
|
|
extern void smp_calculate_f5_mackey_and_long_term_key(tSMP_CB* p_cb);
|
|
extern void smp_remove_fixed_channel(tSMP_CB* p_cb);
|
|
extern bool smp_request_oob_data(tSMP_CB* p_cb);
|
|
|
|
/* smp_keys.cc */
|
|
extern void smp_generate_srand_mrand_confirm(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_compare(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_stk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_ltk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_passkey(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_generate_rand_cont(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_create_private_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_use_oob_private_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_compute_dhkey(tSMP_CB* p_cb);
|
|
extern void smp_calculate_local_commitment(tSMP_CB* p_cb);
|
|
extern Octet16 smp_calculate_peer_commitment(tSMP_CB* p_cb);
|
|
extern void smp_calculate_numeric_comparison_display_number(
|
|
tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
|
|
extern void smp_calculate_local_dhkey_check(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_calculate_peer_dhkey_check(tSMP_CB* p_cb,
|
|
tSMP_INT_DATA* p_data);
|
|
extern void smp_start_nonce_generation(tSMP_CB* p_cb);
|
|
extern bool smp_calculate_link_key_from_long_term_key(tSMP_CB* p_cb);
|
|
extern bool smp_calculate_long_term_key_from_link_key(tSMP_CB* p_cb);
|
|
|
|
extern void print128(const Octet16& x, const uint8_t* key_name);
|
|
extern void smp_xor_128(Octet16* a, const Octet16& b);
|
|
|
|
/* Save the p_cb->sc_oob_data.loc_oob_data for later, since the p_cb gets
|
|
* cleaned up */
|
|
extern void smp_save_local_oob_data(tSMP_CB* p_cb);
|
|
extern void smp_clear_local_oob_data();
|
|
|
|
#endif /* SMP_INT_H */
|