aboutsummaryrefslogtreecommitdiff
path: root/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c
diff options
context:
space:
mode:
Diffstat (limited to 'thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c')
-rw-r--r--thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c443
1 files changed, 443 insertions, 0 deletions
diff --git a/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c b/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c
new file mode 100644
index 0000000..a3d808d
--- /dev/null
+++ b/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_lesc/ble_lesc.c
@@ -0,0 +1,443 @@
+/**
+ * Copyright (c) 2018 - 2018, Nordic Semiconductor ASA
+ *
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form, except as embedded into a Nordic
+ * Semiconductor ASA integrated circuit in a product or a software update for
+ * such product, must reproduce the above copyright notice, this list of
+ * conditions and the following disclaimer in the documentation and/or other
+ * materials provided with the distribution.
+ *
+ * 3. Neither the name of Nordic Semiconductor ASA nor the names of its
+ * contributors may be used to endorse or promote products derived from this
+ * software without specific prior written permission.
+ *
+ * 4. This software, with or without modification, must only be used with a
+ * Nordic Semiconductor ASA integrated circuit.
+ *
+ * 5. Any software provided in binary form under this license must not be reverse
+ * engineered, decompiled, modified and/or disassembled.
+ *
+ * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
+ * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+#include "sdk_common.h"
+#if NRF_MODULE_ENABLED(BLE_LESC)
+
+#include "sdk_common.h"
+#include "ble_gap.h"
+#include "ble_lesc.h"
+#include "nrf_crypto.h"
+#include "nrf_crypto_mem.h"
+#include "peer_manager.h"
+#include "nrf_sdh_ble.h"
+#include "ble_conn_state.h"
+#define NRF_LOG_MODULE_NAME ble_lesc
+#include "nrf_log.h"
+NRF_LOG_MODULE_REGISTER();
+
+/**@brief Structure holding a ECDH public key, connection handle and valid state */
+typedef struct
+{
+ nrf_crypto_ecc_public_key_t public_key; /**< Public key used in either central or peripheral link. */
+ volatile uint16_t conn_handle; /**< Connection handle for connection that received the public key. */
+ volatile bool is_valid; /**< Flag indicating that the public key was valid. */
+} ble_lesc_public_key_t;
+
+/**@brief Context to generate an ECC private/public key pair
+ */
+static nrf_crypto_ecc_key_pair_generate_context_t m_ecc_keygen_context;
+
+
+/**@brief Context to do the LESC ECDH calculation.
+ */
+static nrf_crypto_ecdh_context_t m_ecdh_context;
+
+
+/**@brief Private key to use for LESC ECDH calculations
+ */
+static nrf_crypto_ecc_private_key_t m_local_private_key;
+
+
+/**@brief Public key to use for LESC ECDH calculation
+ */
+static ble_lesc_public_key_t m_local_public_key;
+
+
+/**@brief Structure holding peer central LESC ECC public key and valid state
+ */
+static ble_lesc_public_key_t m_peer_public_key_central =
+{
+ .conn_handle = BLE_CONN_HANDLE_INVALID,
+ .is_valid = false
+};
+
+
+/**@brief Structure holding peer peripheral LESC ECC public key and valid state
+ */
+static ble_lesc_public_key_t m_peer_public_key_peripheral =
+{
+ .conn_handle = BLE_CONN_HANDLE_INVALID,
+ .is_valid = false
+};
+
+/**@brief LESC ECC public key in a format usable by SoftDevice APIs.
+ *
+ * @note The BLE specification requires this key to be in little-endian format.
+ */
+static ble_gap_lesc_p256_pk_t m_lesc_public_key;
+
+
+/**@brief LESC ECDH key in a format usable by SoftDevice APIs.
+ *
+ * @note The BLE specification requires this key to be in little-endian format.
+ */
+static ble_gap_lesc_dhkey_t m_lesc_ecdh_key;
+
+
+static bool m_ble_lesc_invalid_state = false;
+static bool m_keypair_generated = false; /**< Flag indicating that the local ECDH key pair was generated. */
+
+
+static void ble_evt_handler(ble_evt_t const * p_ble_evt, void * p_context);
+NRF_SDH_BLE_OBSERVER(m_ble_evt_observer, BLE_LESC_OBSERVER_PRIO, ble_evt_handler, NULL);
+
+
+/**@brief Function to calculate LESC ECDH and set it using SoftDevice API
+ *
+ * @details This function calculates a LESC ECDH key (also know as a shared secret)
+ * sets it using a call to @ref sd_ble_gap_lesc_dhkey_reply.
+ *
+ * @note This function will only work if there is a generated local ECC key pair (private and
+ * public key pair) and a valid ECC public key received from the peer on either a peripheral
+ * or central link. If the ECC public key from the peer is invalid, a random shared secret
+ * is generated and set using the @ref sd_ble_gap_lesc_dhkey_reply call.
+ *
+ * @warning This function must be run in a low interrupt priority, like the main
+ * application context. Running this in a high priority interrupt level
+ * may disrupt time critical operations like radio communications.
+ *
+ * @retval
+ */
+static ret_code_t ble_lesc_dhkey_calculate_and_set(ble_lesc_public_key_t * const p_peer_public_key)
+{
+ ret_code_t err_code = NRF_ERROR_INVALID_STATE;
+ size_t shared_secret_size = BLE_GAP_LESC_DHKEY_LEN;
+
+ uint8_t * p_shared_secret = m_lesc_ecdh_key.key;
+
+ // Check if there is a valid generated and set local ECDH public key
+ if (!m_keypair_generated)
+ {
+ return NRF_ERROR_INVALID_STATE;
+ }
+
+ // Check if the public_key is valid
+ if (p_peer_public_key->is_valid)
+ {
+ err_code = nrf_crypto_ecdh_compute(&m_ecdh_context,
+ &m_local_private_key,
+ &p_peer_public_key->public_key,
+ p_shared_secret,
+ &shared_secret_size);
+ }
+
+ if(err_code == NRF_SUCCESS)
+ {
+ err_code = nrf_crypto_ecc_byte_order_invert(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ p_shared_secret,
+ p_shared_secret,
+ BLE_GAP_LESC_DHKEY_LEN);
+ VERIFY_SUCCESS(err_code);
+ }
+ else
+ {
+ NRF_LOG_WARNING("Creating invalid shared secret to make LESC fail.");
+ err_code = nrf_crypto_rng_vector_generate(p_shared_secret, BLE_GAP_LESC_DHKEY_LEN);
+ VERIFY_SUCCESS(err_code);
+ }
+
+ NRF_LOG_DEBUG("Calling sd_ble_gap_lesc_dhkey_reply on conn_handle: %d", p_peer_public_key->conn_handle);
+ err_code = sd_ble_gap_lesc_dhkey_reply(p_peer_public_key->conn_handle, &m_lesc_ecdh_key);
+
+ return err_code;
+}
+
+
+/**@brief Function to set the peer ECC public key for a peripheral link
+ *
+ * @details This call should be made to
+ *
+ * @param[in] conn_handle The connection handle to the peripheral connection.
+ * @param[in] p_public_key Pointer to structure holding the public key received from the peer.
+ *
+ * @retval
+ */
+static ret_code_t ble_lesc_peer_peripheral_public_key_set(
+ uint16_t conn_handle,
+ ble_gap_lesc_p256_pk_t const * const p_public_key)
+{
+ ret_code_t err_code;
+
+ uint8_t public_raw[BLE_GAP_LESC_P256_PK_LEN];
+ size_t public_raw_len = BLE_GAP_LESC_P256_PK_LEN;
+
+ VERIFY_TRUE(conn_handle != BLE_CONN_HANDLE_INVALID, NRF_ERROR_INVALID_PARAM);
+ VERIFY_PARAM_NOT_NULL(p_public_key);
+
+ memcpy(public_raw, p_public_key->pk, BLE_GAP_LESC_P256_PK_LEN);
+
+ err_code = nrf_crypto_ecc_byte_order_invert(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ public_raw,
+ public_raw,
+ NRF_CRYPTO_ECC_SECP256R1_RAW_PUBLIC_KEY_SIZE);
+ VERIFY_SUCCESS(err_code);
+
+
+ err_code = nrf_crypto_ecc_public_key_from_raw(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ &m_peer_public_key_peripheral.public_key,
+ public_raw,
+ public_raw_len);
+
+ if (err_code == NRF_SUCCESS)
+ {
+ m_peer_public_key_peripheral.is_valid = true;
+ }
+ else
+ {
+ m_peer_public_key_peripheral.is_valid = false;
+ }
+
+ m_peer_public_key_peripheral.conn_handle = conn_handle;
+
+ return NRF_SUCCESS;
+}
+
+/**@brief Function to set peer ECC public key for a central link
+ *
+ * @details Setting the peer ECC public key will start a
+ *
+ * @param[in] conn_handle The connection handle to the peripheral connection.
+ * @param[in] p_public_key Pointer to structure holding the public key received from the peer.
+ *
+ * @retval
+ */
+static ret_code_t ble_lesc_peer_central_public_key_set(
+ uint16_t conn_handle,
+ ble_gap_lesc_p256_pk_t const * const p_public_key)
+{
+ ret_code_t err_code;
+
+ uint8_t public_raw[BLE_GAP_LESC_P256_PK_LEN];
+ size_t public_raw_len = BLE_GAP_LESC_P256_PK_LEN;
+
+ VERIFY_TRUE(conn_handle != BLE_CONN_HANDLE_INVALID, NRF_ERROR_INVALID_PARAM);
+ VERIFY_PARAM_NOT_NULL(p_public_key);
+
+ memcpy(public_raw, p_public_key->pk, BLE_GAP_LESC_P256_PK_LEN);
+
+ err_code = nrf_crypto_ecc_byte_order_invert(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ public_raw,
+ public_raw,
+ NRF_CRYPTO_ECC_SECP256R1_RAW_PUBLIC_KEY_SIZE);
+ VERIFY_SUCCESS(err_code);
+
+ err_code = nrf_crypto_ecc_public_key_from_raw(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ &m_peer_public_key_central.public_key,
+ public_raw,
+ public_raw_len);
+
+ if (err_code == NRF_SUCCESS)
+ {
+ m_peer_public_key_central.is_valid = true;
+ }
+ else
+ {
+ m_peer_public_key_central.is_valid = false;
+ }
+
+ m_peer_public_key_central.conn_handle = conn_handle;
+
+ return NRF_SUCCESS;
+}
+
+
+/**@brief BLE event handler for LESC DHKEY requests
+ */
+static void ble_evt_handler(ble_evt_t const * p_ble_evt, void * p_context)
+{
+ ret_code_t err_code = NRF_SUCCESS;
+ uint16_t conn_handle = p_ble_evt->evt.gap_evt.conn_handle;
+ uint16_t role = ble_conn_state_role(conn_handle);
+
+ switch (p_ble_evt->header.evt_id)
+ {
+ case BLE_GAP_EVT_LESC_DHKEY_REQUEST:
+ {
+ NRF_LOG_DEBUG("Handling BLE_GAP_EVT_LESC_DHKEY_REQUEST");
+
+ ble_gap_lesc_p256_pk_t const * p_pk_peer =
+ p_ble_evt->evt.gap_evt.params.lesc_dhkey_request.p_pk_peer;
+
+ if (role == BLE_GAP_ROLE_CENTRAL)
+ {
+ err_code = ble_lesc_peer_central_public_key_set(conn_handle,
+ p_pk_peer);
+ }
+ else if (role == BLE_GAP_ROLE_PERIPH)
+ {
+ err_code = ble_lesc_peer_peripheral_public_key_set(conn_handle,
+ p_pk_peer);
+ }
+
+ if (err_code != NRF_SUCCESS)
+ {
+ // Set the state to invalid
+ m_ble_lesc_invalid_state = true;
+ }
+
+ break;
+ }
+
+ default:
+ break;
+ }
+}
+
+
+ret_code_t ble_lesc_init(void)
+{
+ ret_code_t err_code;
+
+#if NRF_CRYPTO_ALLOCATOR == NRF_CRYPTO_ALLOCATOR_NRF_MALLOC
+
+ // Initialize mem_manager if used by nrf_crypto
+ err_code = nrf_mem_init();
+ VERIFY_SUCCESS(err_code);
+
+#endif
+
+ // Ensure that nrf_crypto has been initialized
+ err_code = nrf_crypto_init();
+ VERIFY_SUCCESS(err_code);
+
+#if defined(NRF_CRYPTO_RNG_AUTO_INIT_ENABLED) && (NRF_CRYPTO_RNG_AUTO_INIT_ENABLED == 1)
+
+ // Do nothing. RNG is initialized with nrf_crypto_init call.
+
+#elif defined((NRF_CRYPTO_RNG_AUTO_INIT_ENABLED) && (NRF_CRYPTO_RNG_AUTO_INIT_ENABLED == 0)
+
+ // Initialize the RNG
+ err_code = nrf_crypto_rng_init(NULL, NULL);
+ VERIFY_SUCCESS(err_code);
+
+#else
+
+ #error Invalid sdk_config.h (does not contain NRF_CRYPTO_RNG_AUTO_INIT_ENABLED)
+
+#endif // defined(NRF_CRYPTO_RNG_AUTO_INIT_ENABLED) && (NRF_CRYPTO_RNG_AUTO_INIT_ENABLED == 1)
+
+ return err_code;
+}
+
+
+ret_code_t ble_lesc_ecc_keypair_generate_and_set(void)
+{
+ ret_code_t err_code;
+
+ size_t public_len = BLE_GAP_LESC_P256_PK_LEN;
+
+ // Update flag to indicate that there is no valid private key
+ m_keypair_generated = false;
+
+ err_code = nrf_crypto_ecc_key_pair_generate(&m_ecc_keygen_context,
+ &g_nrf_crypto_ecc_secp256r1_curve_info,
+ &m_local_private_key,
+ &m_local_public_key.public_key);
+ VERIFY_SUCCESS(err_code);
+
+ // Converting public key to raw format.
+ err_code = nrf_crypto_ecc_public_key_to_raw(&m_local_public_key.public_key,
+ (uint8_t *)m_lesc_public_key.pk,
+ &public_len);
+ VERIFY_SUCCESS(err_code);
+
+ // Convert the raw public key to little-endian (required for BLE)
+ err_code = nrf_crypto_ecc_byte_order_invert(&g_nrf_crypto_ecc_secp256r1_curve_info,
+ m_lesc_public_key.pk,
+ m_lesc_public_key.pk,
+ NRF_CRYPTO_ECC_SECP256R1_RAW_PUBLIC_KEY_SIZE);
+ VERIFY_SUCCESS(err_code);
+
+ // Set the local public key used for all LESC pairing procedures.
+ err_code = pm_lesc_public_key_set(&m_lesc_public_key);
+
+ if(err_code == NRF_SUCCESS)
+ {
+ // Set the flag to indicate that there is a valid ECDH key pair generated
+ m_keypair_generated = true;
+ }
+
+ return err_code;
+}
+
+
+ret_code_t ble_lesc_ecc_local_public_key_get(ble_gap_lesc_p256_pk_t const ** pp_lesc_public_key)
+{
+ VERIFY_PARAM_NOT_NULL(pp_lesc_public_key);
+ VERIFY_TRUE(m_keypair_generated, NRF_ERROR_INVALID_STATE);
+
+ (*pp_lesc_public_key) = &m_lesc_public_key;
+ return NRF_SUCCESS;
+}
+
+
+ret_code_t ble_lesc_service_request_handler(void)
+{
+ ret_code_t err_code = NRF_SUCCESS;
+
+ // If the LESC module is in an invalid state restart is required
+ if (m_ble_lesc_invalid_state)
+ {
+ return NRF_ERROR_INVALID_STATE;
+ }
+
+ if (m_peer_public_key_central.conn_handle != BLE_CONN_HANDLE_INVALID)
+ {
+ // The central link has received a DHKEY_REQUEST.
+ err_code = ble_lesc_dhkey_calculate_and_set(&m_peer_public_key_central);
+
+ m_peer_public_key_central.conn_handle = BLE_CONN_HANDLE_INVALID;
+ }
+ else if (m_peer_public_key_peripheral.conn_handle != BLE_CONN_HANDLE_INVALID)
+ {
+ // The peripheral link has received a DHKEY_REQUEST.
+ err_code = ble_lesc_dhkey_calculate_and_set(&m_peer_public_key_peripheral);
+
+ m_peer_public_key_peripheral.conn_handle = BLE_CONN_HANDLE_INVALID;
+ }
+ else
+ {
+ // Do nothing
+ }
+
+ return err_code;
+}
+
+#endif // NRF_MODULE_ENABLED(BLE_LESC)