| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324 |
- // SPDX-License-Identifier: GPL-2.0-or-later
- /*
- *
- * BlueZ - Bluetooth protocol stack for Linux
- *
- * Copyright (C) 2011 Intel Corporation.
- *
- *
- */
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
- #define _GNU_SOURCE
- #include <stdio.h>
- #include <errno.h>
- #include <unistd.h>
- #include <stdlib.h>
- #include <string.h>
- #include "parser.h"
- /* SMP command codes */
- #define SMP_CMD_PAIRING_REQ 0x01
- #define SMP_CMD_PAIRING_RESP 0x02
- #define SMP_CMD_PAIRING_CONFIRM 0x03
- #define SMP_CMD_PAIRING_RANDOM 0x04
- #define SMP_CMD_PAIRING_FAILED 0x05
- #define SMP_CMD_ENCRYPT_INFO 0x06
- #define SMP_CMD_CENTRAL_IDENT 0x07
- #define SMP_CMD_IDENT_INFO 0X08
- #define SMP_CMD_IDENT_ADDR_INFO 0x09
- #define SMP_CMD_SIGN_INFO 0x0a
- #define SMP_CMD_SECURITY_REQ 0x0b
- /* IO Capabilities values */
- #define SMP_IO_DISPLAY_ONLY 0x00
- #define SMP_IO_DISPLAY_YESNO 0x01
- #define SMP_IO_KEYBOARD_ONLY 0x02
- #define SMP_IO_NO_INPUT_OUTPUT 0x03
- #define SMP_IO_KEYBOARD_DISPLAY 0x04
- /* OOB Data Present Values */
- #define SMP_OOB_NOT_PRESENT 0x00
- #define SMP_OOB_PRESENT 0x01
- #define SMP_DIST_ENC_KEY 0x01
- #define SMP_DIST_ID_KEY 0x02
- #define SMP_DIST_SIGN 0x04
- #define SMP_AUTH_NONE 0x00
- #define SMP_AUTH_BONDING 0x01
- #define SMP_AUTH_MITM 0x04
- #define SMP_REASON_PASSKEY_ENTRY_FAILED 0x01
- #define SMP_REASON_OOB_NOT_AVAIL 0x02
- #define SMP_REASON_AUTH_REQUIREMENTS 0x03
- #define SMP_REASON_CONFIRM_FAILED 0x04
- #define SMP_REASON_PAIRING_NOTSUPP 0x05
- #define SMP_REASON_ENC_KEY_SIZE 0x06
- #define SMP_REASON_CMD_NOTSUPP 0x07
- #define SMP_REASON_UNSPECIFIED 0x08
- #define SMP_REASON_REPEATED_ATTEMPTS 0x09
- static const char *smpcmd2str(uint8_t cmd)
- {
- switch (cmd) {
- case SMP_CMD_PAIRING_REQ:
- return "Pairing Request";
- case SMP_CMD_PAIRING_RESP:
- return "Pairing Response";
- case SMP_CMD_PAIRING_CONFIRM:
- return "Pairing Confirm";
- case SMP_CMD_PAIRING_RANDOM:
- return "Pairing Random";
- case SMP_CMD_PAIRING_FAILED:
- return "Pairing Failed";
- case SMP_CMD_ENCRYPT_INFO:
- return "Encryption Information";
- case SMP_CMD_CENTRAL_IDENT:
- return "Central Identification";
- case SMP_CMD_IDENT_INFO:
- return "Identity Information";
- case SMP_CMD_IDENT_ADDR_INFO:
- return "Identity Address Information";
- case SMP_CMD_SIGN_INFO:
- return "Signing Information";
- case SMP_CMD_SECURITY_REQ:
- return "Security Request";
- default:
- return "Unknown";
- }
- }
- static const char *smpio2str(uint8_t cap)
- {
- switch(cap) {
- case SMP_IO_DISPLAY_ONLY:
- return "DisplayOnly";
- case SMP_IO_DISPLAY_YESNO:
- return "DisplayYesNo";
- case SMP_IO_KEYBOARD_ONLY:
- return "KeyboardOnly";
- case SMP_IO_NO_INPUT_OUTPUT:
- return "NoInputNoOutput";
- case SMP_IO_KEYBOARD_DISPLAY:
- return "KeyboardDisplay";
- default:
- return "Unkown";
- }
- }
- static const char *smpreason2str(uint8_t reason)
- {
- switch (reason) {
- case SMP_REASON_PASSKEY_ENTRY_FAILED:
- return "Passkey Entry Failed";
- case SMP_REASON_OOB_NOT_AVAIL:
- return "OOB Not Available";
- case SMP_REASON_AUTH_REQUIREMENTS:
- return "Authentication Requirements";
- case SMP_REASON_CONFIRM_FAILED:
- return "Confirm Value Failed";
- case SMP_REASON_PAIRING_NOTSUPP:
- return "Pairing Not Supported";
- case SMP_REASON_ENC_KEY_SIZE:
- return "Encryption Key Size";
- case SMP_REASON_CMD_NOTSUPP:
- return "Command Not Supported";
- case SMP_REASON_UNSPECIFIED:
- return "Unspecified Reason";
- case SMP_REASON_REPEATED_ATTEMPTS:
- return "Repeated Attempts";
- default:
- return "Unkown";
- }
- }
- static void smp_cmd_pairing_dump(int level, struct frame *frm)
- {
- uint8_t cap = p_get_u8(frm);
- uint8_t oob = p_get_u8(frm);
- uint8_t auth = p_get_u8(frm);
- uint8_t key_size = p_get_u8(frm);
- uint8_t int_dist = p_get_u8(frm);
- uint8_t resp_dist = p_get_u8(frm);
- p_indent(level, frm);
- printf("capability 0x%2.2x oob 0x%2.2x auth req 0x%2.2x\n", cap, oob,
- auth);
- p_indent(level , frm);
- printf("max key size 0x%2.2x init key dist 0x%2.2x "
- "resp key dist 0x%2.2x\n", key_size, int_dist, resp_dist);
- p_indent(level , frm);
- printf("Capability: %s (OOB data %s)\n", smpio2str(cap),
- oob == 0x00 ? "not present" : "available");
- p_indent(level , frm);
- printf("Authentication: %s (%s)\n",
- auth & SMP_AUTH_BONDING ? "Bonding" : "No Bonding",
- auth & SMP_AUTH_MITM ? "MITM Protection" :
- "No MITM Protection");
- p_indent(level , frm);
- printf("Initiator Key Distribution: %s %s %s\n",
- int_dist & SMP_DIST_ENC_KEY ? "LTK" : "",
- int_dist & SMP_DIST_ID_KEY ? "IRK" : "",
- int_dist & SMP_DIST_SIGN ? "CSRK" : "");
- p_indent(level , frm);
- printf("Responder Key Distribution: %s %s %s\n",
- resp_dist & SMP_DIST_ENC_KEY ? "LTK" : "",
- resp_dist & SMP_DIST_ID_KEY ? "IRK" : "",
- resp_dist & SMP_DIST_SIGN ? "CSRK" : "");
- }
- static void smp_cmd_pairing_confirm_dump(int level, struct frame *frm)
- {
- int i;
- p_indent(level, frm);
- printf("key ");
- for (i = 0; i < 16; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_pairing_random_dump(int level, struct frame *frm)
- {
- int i;
- p_indent(level, frm);
- printf("random ");
- for (i = 0; i < 16; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_pairing_failed_dump(int level, struct frame *frm)
- {
- uint8_t reason = p_get_u8(frm);
- p_indent(level, frm);
- printf("reason 0x%2.2x\n", reason);
- p_indent(level, frm);
- printf("Reason %s\n", smpreason2str(reason));
- }
- static void smp_cmd_encrypt_info_dump(int level, struct frame *frm)
- {
- int i;
- p_indent(level, frm);
- printf("LTK ");
- for (i = 0; i < 16; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_central_ident_dump(int level, struct frame *frm)
- {
- uint16_t ediv = btohs(htons(p_get_u16(frm)));
- int i;
- p_indent(level, frm);
- printf("EDIV 0x%4.4x ", ediv);
- printf("Rand 0x");
- for (i = 0; i < 8; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_ident_info_dump(int level, struct frame *frm)
- {
- int i;
- p_indent(level, frm);
- printf("IRK ");
- for (i = 0; i < 16; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_ident_addr_info_dump(int level, struct frame *frm)
- {
- uint8_t type = p_get_u8(frm);
- char addr[18];
- p_indent(level, frm);
- p_ba2str((bdaddr_t *) frm, addr);
- printf("bdaddr %s (%s)\n", addr, type == 0x00 ? "Public" : "Random");
- }
- static void smp_cmd_sign_info_dump(int level, struct frame *frm)
- {
- int i;
- p_indent(level, frm);
- printf("CSRK ");
- for (i = 0; i < 16; i++)
- printf("%2.2x", p_get_u8(frm));
- printf("\n");
- }
- static void smp_cmd_security_req_dump(int level, struct frame *frm)
- {
- uint8_t auth = p_get_u8(frm);
- p_indent(level, frm);
- printf("auth req 0x%2.2x\n", auth);
- }
- void smp_dump(int level, struct frame *frm)
- {
- uint8_t cmd;
- cmd = p_get_u8(frm);
- p_indent(level, frm);
- printf("SMP: %s (0x%.2x)\n", smpcmd2str(cmd), cmd);
- switch (cmd) {
- case SMP_CMD_PAIRING_REQ:
- smp_cmd_pairing_dump(level + 1, frm);
- break;
- case SMP_CMD_PAIRING_RESP:
- smp_cmd_pairing_dump(level + 1, frm);
- break;
- case SMP_CMD_PAIRING_CONFIRM:
- smp_cmd_pairing_confirm_dump(level + 1, frm);
- break;
- case SMP_CMD_PAIRING_RANDOM:
- smp_cmd_pairing_random_dump(level + 1, frm);
- break;
- case SMP_CMD_PAIRING_FAILED:
- smp_cmd_pairing_failed_dump(level + 1, frm);
- break;
- case SMP_CMD_ENCRYPT_INFO:
- smp_cmd_encrypt_info_dump(level + 1, frm);
- break;
- case SMP_CMD_CENTRAL_IDENT:
- smp_cmd_central_ident_dump(level + 1, frm);
- break;
- case SMP_CMD_IDENT_INFO:
- smp_cmd_ident_info_dump(level + 1, frm);
- break;
- case SMP_CMD_IDENT_ADDR_INFO:
- smp_cmd_ident_addr_info_dump(level + 1, frm);
- break;
- case SMP_CMD_SIGN_INFO:
- smp_cmd_sign_info_dump(level + 1, frm);
- break;
- case SMP_CMD_SECURITY_REQ:
- smp_cmd_security_req_dump(level + 1, frm);
- break;
- default:
- raw_dump(level, frm);
- }
- }
|