1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
24
25
26
27
28
29
30
31
32
33
34
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
67
68
69
70
71
72
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
114
115
116
117
118
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
179
180
181
182
193
194
195
196
197
206
209
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
254
255
256
257
258
259
260
261
262
263
264
265
271
272
273
274
275
276
277
278
279
280
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
310
311
314
315
316
317
318
319
320
321
322
323
324
327
328
339
340
341
358
359
360
361
362
363
364
366
367
368
369
370
371
372
373
374
375
380
381
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
478
479
480
486
487
488
504
508
511
512
513
517
518
519
520
521
522
/* ... */
/* ... */
#include "common/bt_target.h"
#include "osi/allocator.h"
#if BLE_INCLUDED == TRUE
#include <string.h>
#include "gatt_int.h"
#include "stack/gatt_api.h"
#include "btm_int.h"
/* ... */
#if (SMP_INCLUDED == TRUE)
static BOOLEAN gatt_sign_data (tGATT_CLCB *p_clcb)
{
tGATT_VALUE *p_attr = (tGATT_VALUE *)p_clcb->p_attr_buf;
UINT8 *p_data = NULL, *p;
UINT16 payload_size = p_clcb->p_tcb->payload_size;
BOOLEAN status = FALSE;
UINT8 *p_signature;
gatt_set_sec_act(p_clcb->p_tcb, GATT_SEC_OK);
p_data = (UINT8 *)osi_malloc((UINT16)(p_attr->len + 3));
if (p_data != NULL) {
p = p_data;
UINT8_TO_STREAM(p, GATT_SIGN_CMD_WRITE);
UINT16_TO_STREAM(p, p_attr->handle);
ARRAY_TO_STREAM(p, p_attr->value, p_attr->len);
if ((payload_size - GATT_AUTH_SIGN_LEN - 3) < p_attr->len) {
p_attr->len = payload_size - GATT_AUTH_SIGN_LEN - 3;
}{...}
p_signature = p_attr->value + p_attr->len;
if (BTM_BleDataSignature(p_clcb->p_tcb->peer_bda,
p_data,
(UINT16)(p_attr->len + 3),
p_signature)) {
p_attr->len += BTM_BLE_AUTH_SIGN_LEN;
gatt_set_ch_state(p_clcb->p_tcb, GATT_CH_OPEN);
#if (GATTC_INCLUDED == TRUE)
gatt_act_write(p_clcb, GATT_SEC_SIGN_DATA);
#endif
}{...} else {
gatt_end_operation(p_clcb, GATT_INTERNAL_ERROR, NULL);
}{...}
osi_free(p_data);
}{...}
return status;
}{ ... }
/* ... */#endif
/* ... */
#if (SMP_INCLUDED == TRUE)
void gatt_verify_signature(tGATT_TCB *p_tcb, BT_HDR *p_buf)
{
UINT16 cmd_len;
#if (GATTS_INCLUDED == TRUE)
UINT8 op_code;
#endif
UINT8 *p, *p_orig = (UINT8 *)(p_buf + 1) + p_buf->offset;
UINT32 counter;
if (p_buf->len < GATT_AUTH_SIGN_LEN + 4) {
GATT_TRACE_ERROR("%s: Data length %u less than expected %u",
__func__, p_buf->len, GATT_AUTH_SIGN_LEN + 4);
return;
}{...}
cmd_len = p_buf->len - GATT_AUTH_SIGN_LEN + 4;
p = p_orig + cmd_len - 4;
STREAM_TO_UINT32(counter, p);
if (BTM_BleVerifySignature(p_tcb->peer_bda, p_orig, cmd_len, counter, p)) {
#if (GATTS_INCLUDED == TRUE)
STREAM_TO_UINT8(op_code, p_orig);
gatt_server_handle_client_req (p_tcb, op_code, (UINT16)(p_buf->len - 1), p_orig);/* ... */
#endif
}{...} else {
GATT_TRACE_ERROR("Signature Verification Failed, data ignored");
}{...}
return;
}{ ... }
/* ... */#endif
/* ... */
void gatt_sec_check_complete(BOOLEAN sec_check_ok, tGATT_CLCB *p_clcb, UINT8 sec_act)
{
if (p_clcb && p_clcb->p_tcb) {
if (fixed_queue_is_empty(p_clcb->p_tcb->pending_enc_clcb)) {
gatt_set_sec_act(p_clcb->p_tcb, GATT_SEC_NONE);
}{...}
#if (GATTC_INCLUDED == TRUE)
if (!sec_check_ok) {
gatt_end_operation(p_clcb, GATT_AUTH_FAIL, NULL);
}{...} else if (p_clcb->operation == GATTC_OPTYPE_WRITE) {
gatt_act_write(p_clcb, sec_act);
}{...} else if (p_clcb->operation == GATTC_OPTYPE_READ) {
gatt_act_read(p_clcb, p_clcb->counter);
}{...}
#endif/* ... */
}{...}
}{ ... }
/* ... */
void gatt_enc_cmpl_cback(BD_ADDR bd_addr, tBT_TRANSPORT transport, void *p_ref_data, tBTM_STATUS result)
{
tGATT_TCB *p_tcb;
UINT8 sec_flag;
BOOLEAN status = FALSE;
UNUSED(p_ref_data);
GATT_TRACE_DEBUG("gatt_enc_cmpl_cback");
if ((p_tcb = gatt_find_tcb_by_addr(bd_addr, transport)) != NULL) {
if (gatt_get_sec_act(p_tcb) == GATT_SEC_ENC_PENDING) {
return;
}{...}
tGATT_PENDING_ENC_CLCB *p_buf =
(tGATT_PENDING_ENC_CLCB *)fixed_queue_dequeue(p_tcb->pending_enc_clcb, 0);
if (p_buf != NULL) {
if (result == BTM_SUCCESS) {
if (gatt_get_sec_act(p_tcb) == GATT_SEC_ENCRYPT_MITM ) {
BTM_GetSecurityFlagsByTransport(bd_addr, &sec_flag, transport);
if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) {
status = TRUE;
}{...}
}{...} else {
status = TRUE;
}{...}
}{...}
gatt_sec_check_complete(status , p_buf->p_clcb, p_tcb->sec_act);
osi_free(p_buf);
for (size_t count = fixed_queue_length(p_tcb->pending_enc_clcb);
count > 0; count--) {
p_buf = (tGATT_PENDING_ENC_CLCB *)fixed_queue_dequeue(p_tcb->pending_enc_clcb, 0);
if (p_buf != NULL) {
gatt_security_check_start(p_buf->p_clcb);
osi_free(p_buf);
}{...} else {
break;
}{...}
}{...}
}{...} else {
GATT_TRACE_ERROR("Unknown operation encryption completed");
}{...}
}{...} else {
GATT_TRACE_ERROR("enc callback for unknown bd_addr");
}{...}
}{ ... }
/* ... */
void gatt_notify_enc_cmpl(BD_ADDR bd_addr)
{
tGATT_TCB *p_tcb;
UINT8 i = 0;
if ((p_tcb = gatt_find_tcb_by_addr(bd_addr, BT_TRANSPORT_LE)) != NULL) {
for (i = 0; i < GATT_MAX_APPS; i++) {
if (gatt_cb.cl_rcb[i].in_use && gatt_cb.cl_rcb[i].app_cb.p_enc_cmpl_cb) {
(*gatt_cb.cl_rcb[i].app_cb.p_enc_cmpl_cb)(gatt_cb.cl_rcb[i].gatt_if, bd_addr);
}{...}
}{...}
if (gatt_get_sec_act(p_tcb) == GATT_SEC_ENC_PENDING) {
gatt_set_sec_act(p_tcb, GATT_SEC_NONE);
size_t count = fixed_queue_length(p_tcb->pending_enc_clcb);
for (; count > 0; count--) {
tGATT_PENDING_ENC_CLCB *p_buf =
(tGATT_PENDING_ENC_CLCB *)fixed_queue_dequeue(p_tcb->pending_enc_clcb, 0);
if (p_buf != NULL) {
gatt_security_check_start(p_buf->p_clcb);
osi_free(p_buf);
}{...} else {
break;
}{...}
}{...}
}{...}
}{...} else {
GATT_TRACE_DEBUG("notify GATT for encryption completion of unknown device");
}{...}
return;
}{ ... }
/* ... */
void gatt_set_sec_act(tGATT_TCB *p_tcb, tGATT_SEC_ACTION sec_act)
{
if (p_tcb) {
p_tcb->sec_act = sec_act;
}{...}
}{ ... }
/* ... */
tGATT_SEC_ACTION gatt_get_sec_act(tGATT_TCB *p_tcb)
{
tGATT_SEC_ACTION sec_act = GATT_SEC_NONE;
if (p_tcb) {
sec_act = p_tcb->sec_act;
}{...}
return sec_act;
}{ ... }
/* ... */
tGATT_SEC_ACTION gatt_determine_sec_act(tGATT_CLCB *p_clcb )
{
tGATT_SEC_ACTION act = GATT_SEC_OK;
UINT8 sec_flag;
tGATT_TCB *p_tcb = p_clcb->p_tcb;
tGATT_AUTH_REQ auth_req = p_clcb->auth_req;
BOOLEAN is_link_encrypted = FALSE;
BOOLEAN is_link_key_known = FALSE;
BOOLEAN is_key_mitm = FALSE;
#if (SMP_INCLUDED == TRUE)
UINT8 key_type;
tBTM_BLE_SEC_REQ_ACT sec_act = BTM_LE_SEC_NONE;/* ... */
#endif
if (auth_req == GATT_AUTH_REQ_NONE ) {
return act;
}{...}
BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_clcb->p_tcb->transport);
#if (SMP_INCLUDED == TRUE)
btm_ble_link_sec_check(p_tcb->peer_bda, auth_req, &sec_act);
#endif
if (
#if (SMP_INCLUDED == TRUE)
sec_act == BTM_BLE_SEC_REQ_ACT_DISCARD &&
#endif
auth_req != GATT_AUTH_REQ_NONE) {
return GATT_SEC_ENC_PENDING;
}{...}
if (sec_flag & (BTM_SEC_FLAG_ENCRYPTED | BTM_SEC_FLAG_LKEY_KNOWN)) {
if (sec_flag & BTM_SEC_FLAG_ENCRYPTED) {
is_link_encrypted = TRUE;
}{...}
is_link_key_known = TRUE;
if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) {
is_key_mitm = TRUE;
}{...}
}{...}
switch (auth_req) {
case GATT_AUTH_REQ_MITM:
case GATT_AUTH_REQ_SIGNED_MITM:
if (!is_key_mitm) {
act = GATT_SEC_ENCRYPT_MITM;
}{...}
break;
...
case GATT_AUTH_REQ_NO_MITM:
case GATT_AUTH_REQ_SIGNED_NO_MITM:
if (!is_link_key_known) {
act = GATT_SEC_ENCRYPT_NO_MITM;
}{...}
break;...
default:
break;...
}{...}
if (act == GATT_SEC_OK) {
if (p_tcb->transport == BT_TRANSPORT_LE &&
(p_clcb->operation == GATTC_OPTYPE_WRITE) &&
(p_clcb->op_subtype == GATT_WRITE_NO_RSP)) {
/* ... */
if (!is_link_encrypted) {
#if (SMP_INCLUDED == TRUE)
btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type);
#endif
if (
#if (SMP_INCLUDED == TRUE)
(key_type & BTM_LE_KEY_LCSRK) &&
#endif
((auth_req == GATT_AUTH_REQ_SIGNED_NO_MITM) ||
(auth_req == GATT_AUTH_REQ_SIGNED_MITM))) {
act = GATT_SEC_SIGN_DATA;
}{...} else {
act = GATT_SEC_ENCRYPT;
}{...}
}{...}
}{...} else {
if (!is_link_encrypted) {
act = GATT_SEC_ENCRYPT;
}{...}
}{...}
}{...}
return act ;
}{ ... }
/* ... */
tGATT_STATUS gatt_get_link_encrypt_status(tGATT_TCB *p_tcb)
{
tGATT_STATUS encrypt_status = GATT_NOT_ENCRYPTED;
UINT8 sec_flag = 0;
BTM_GetSecurityFlagsByTransport(p_tcb->peer_bda, &sec_flag, p_tcb->transport);
if ((sec_flag & BTM_SEC_FLAG_ENCRYPTED) && (sec_flag & BTM_SEC_FLAG_LKEY_KNOWN)) {
encrypt_status = GATT_ENCRYPED_NO_MITM;
if (sec_flag & BTM_SEC_FLAG_LKEY_AUTHED) {
encrypt_status = GATT_ENCRYPED_MITM;
}{...}
}{...}
GATT_TRACE_DEBUG("gatt_get_link_encrypt_status status=0x%x", encrypt_status);
return encrypt_status ;
}{ ... }
/* ... */
static BOOLEAN gatt_convert_sec_action(tGATT_SEC_ACTION gatt_sec_act, tBTM_BLE_SEC_ACT *p_btm_sec_act )
{
BOOLEAN status = TRUE;
switch (gatt_sec_act) {
case GATT_SEC_ENCRYPT:
*p_btm_sec_act = BTM_BLE_SEC_ENCRYPT;
break;...
case GATT_SEC_ENCRYPT_NO_MITM:
*p_btm_sec_act = BTM_BLE_SEC_ENCRYPT_NO_MITM;
break;...
case GATT_SEC_ENCRYPT_MITM:
*p_btm_sec_act = BTM_BLE_SEC_ENCRYPT_MITM;
break;...
default:
status = FALSE;
break;...
}{...}
return status;
}{ ... }
/* ... */
BOOLEAN gatt_security_check_start(tGATT_CLCB *p_clcb)
{
tGATT_TCB *p_tcb = p_clcb->p_tcb;
tGATT_SEC_ACTION gatt_sec_act;
tBTM_BLE_SEC_ACT btm_ble_sec_act;
BOOLEAN status = TRUE;
#if (SMP_INCLUDED == TRUE)
tBTM_STATUS btm_status;
#endif
tGATT_SEC_ACTION sec_act_old = gatt_get_sec_act(p_tcb);
gatt_sec_act = gatt_determine_sec_act(p_clcb);
if (sec_act_old == GATT_SEC_NONE) {
gatt_set_sec_act(p_tcb, gatt_sec_act);
}{...}
switch (gatt_sec_act ) {
case GATT_SEC_SIGN_DATA:
#if (SMP_INCLUDED == TRUE)
GATT_TRACE_DEBUG("gatt_security_check_start: Do data signing");
gatt_sign_data(p_clcb);/* ... */
#endif
break;...
case GATT_SEC_ENCRYPT:
case GATT_SEC_ENCRYPT_NO_MITM:
case GATT_SEC_ENCRYPT_MITM:
if (sec_act_old < GATT_SEC_ENCRYPT) {
GATT_TRACE_DEBUG("gatt_security_check_start: Encrypt now or key upgreade first");
gatt_convert_sec_action(gatt_sec_act, &btm_ble_sec_act);
#if (SMP_INCLUDED == TRUE)
btm_status = BTM_SetEncryption(p_tcb->peer_bda, p_tcb->transport , gatt_enc_cmpl_cback, &btm_ble_sec_act);
if ( (btm_status != BTM_SUCCESS) && (btm_status != BTM_CMD_STARTED)) {
GATT_TRACE_ERROR("gatt_security_check_start BTM_SetEncryption failed btm_status=%d", btm_status);
status = FALSE;
}{...}
#endif/* ... */
}{...}
if (status) {
gatt_add_pending_enc_channel_clcb (p_tcb, p_clcb);
}{...}
break;...
case GATT_SEC_ENC_PENDING:
gatt_add_pending_enc_channel_clcb (p_tcb, p_clcb);
break;...
default:
gatt_sec_check_complete(TRUE, p_clcb, gatt_sec_act);
break;...
}{...}
if (status == FALSE) {
gatt_set_sec_act(p_tcb, GATT_SEC_NONE);
gatt_set_ch_state(p_tcb, GATT_CH_OPEN);
}{...}
return status;
}{ ... }
/* ... */
#endif