* Re: [PATCH 1/1] mesh: Handle publickey exchange phase for initiator
2020-01-10 9:54 ` [PATCH 1/1] mesh: Handle publickey exchange phase for initiator Prathyusha Nelluri
@ 2020-01-13 23:51 ` Gix, Brian
0 siblings, 0 replies; 2+ messages in thread
From: Gix, Brian @ 2020-01-13 23:51 UTC (permalink / raw)
To: prathyusha.n, linux-bluetooth
Does not build cleanly on tip:
CC mesh/prov-initiator.o
mesh/prov-initiator.c: In function ‘int_prov_rx’:
mesh/prov-initiator.c:595:11: error: unused variable ‘oob_key’ [-Werror=unused-variable]
595 | uint32_t oob_key;
| ^~~~~~~
On Fri, 2020-01-10 at 15:24 +0530, Prathyusha Nelluri wrote:
> From: Prathyusha N <prathyusha.n@samsung.com>
>
> In Public Key OOB case, when provisioner receives public key via
> OOB, provisioner has to send it's public key to remote node and
> and then proceed for authentication.
>
> Handle invalid keys case.
> ---
> mesh/prov-initiator.c | 229 +++++++++++++++++++++++++-----------------
> 1 file changed, 135 insertions(+), 94 deletions(-)
>
> diff --git a/mesh/prov-initiator.c b/mesh/prov-initiator.c
> index 7efd5b349..cd6be95b0 100644
> --- a/mesh/prov-initiator.c
> +++ b/mesh/prov-initiator.c
> @@ -186,7 +186,7 @@ static void int_prov_open(void *user_data, prov_trans_tx_t trans_tx,
> return;
> }
>
> -static void prov_calc_secret(const uint8_t *pub, const uint8_t *priv,
> +static bool prov_calc_secret(const uint8_t *pub, const uint8_t *priv,
> uint8_t *secret)
> {
> uint8_t tmp[64];
> @@ -196,22 +196,27 @@ static void prov_calc_secret(const uint8_t *pub, const uint8_t *priv,
> swap_u256_bytes(tmp);
> swap_u256_bytes(tmp + 32);
>
> - ecdh_shared_secret(tmp, priv, secret);
> + if (!ecdh_shared_secret(tmp, priv, secret))
> + return false;
>
> /* Convert to Mesh byte order */
> swap_u256_bytes(secret);
> + return true;
> }
>
> -static void int_credentials(struct mesh_prov_initiator *prov)
> +static bool int_credentials(struct mesh_prov_initiator *prov)
> {
> - prov_calc_secret(prov->conf_inputs.dev_pub_key,
> - prov->private_key, prov->secret);
> + if (!prov_calc_secret(prov->conf_inputs.dev_pub_key,
> + prov->private_key, prov->secret))
> + goto failure;
>
> - mesh_crypto_s1(&prov->conf_inputs,
> - sizeof(prov->conf_inputs), prov->salt);
> + if (!mesh_crypto_s1(&prov->conf_inputs,
> + sizeof(prov->conf_inputs), prov->salt))
> + goto failure;
>
> - mesh_crypto_prov_conf_key(prov->secret, prov->salt,
> - prov->calc_key);
> + if (!mesh_crypto_prov_conf_key(prov->secret, prov->salt,
> + prov->calc_key))
> + goto failure;
>
> l_getrandom(prov->rand_auth_workspace, 16);
>
> @@ -224,6 +229,11 @@ static void int_credentials(struct mesh_prov_initiator *prov)
> print_packet("LocalRandom", prov->rand_auth_workspace, 16);
> print_packet("ConfirmationSalt", prov->salt, 16);
> print_packet("ConfirmationKey", prov->calc_key, 16);
> +
> + return true;
> +
> +failure:
> + return false;
> }
>
> static uint8_t u16_high_bit(uint16_t mask)
> @@ -320,10 +330,21 @@ static void static_cb(void *user_data, int err, uint8_t *key, uint32_t len)
> send_confirm(prov);
> }
>
> +static void send_pub_key(struct mesh_prov_initiator *prov)
> +{
> + struct prov_pub_key_msg msg;
> +
> + msg.opcode = PROV_PUB_KEY;
> + memcpy(msg.pub_key, prov->conf_inputs.prv_pub_key, 64);
> + prov->trans_tx(prov->trans_data, &msg, sizeof(msg));
> + prov->state = INT_PROV_KEY_SENT;
> +}
> +
> static void pub_key_cb(void *user_data, int err, uint8_t *key, uint32_t len)
> {
> struct mesh_prov_initiator *rx_prov = user_data;
> struct prov_fail_msg msg;
> + uint8_t fail_code[2];
>
> if (prov != rx_prov)
> return;
> @@ -338,20 +359,16 @@ static void pub_key_cb(void *user_data, int err, uint8_t *key, uint32_t len)
> memcpy(prov->conf_inputs.dev_pub_key, key, 64);
> prov->material |= MAT_REMOTE_PUBLIC;
>
> - if ((prov->material & MAT_SECRET) == MAT_SECRET)
> - int_credentials(prov);
> + send_pub_key(prov);
>
> - send_confirm(prov);
> -}
> -
> -static void send_pub_key(struct mesh_prov_initiator *prov)
> -{
> - struct prov_pub_key_msg msg;
> -
> - msg.opcode = PROV_PUB_KEY;
> - memcpy(msg.pub_key, prov->conf_inputs.prv_pub_key, 64);
> - prov->trans_tx(prov->trans_data, &msg, sizeof(msg));
> - prov->state = INT_PROV_KEY_SENT;
> + if ((prov->material & MAT_SECRET) == MAT_SECRET) {
> + if (!int_credentials(prov)) {
> + fail_code[0] = PROV_FAILED;
> + fail_code[1] = PROV_ERR_UNEXPECTED_ERR;
> + prov->trans_tx(prov->trans_data, fail_code, 2);
> + int_prov_close(prov, fail_code[1]);
> + }
> + }
> }
>
> static void send_random(struct mesh_prov_initiator *prov)
> @@ -482,6 +499,93 @@ static void get_random_key(struct mesh_prov_initiator *prov, uint8_t action,
> l_put_be32(oob_key, prov->rand_auth_workspace + 44);
> }
>
> +static void int_prov_auth(void)
> +{
> + uint8_t fail_code[2];
> + uint32_t oob_key;
> +
> + prov->state = INT_PROV_KEY_ACKED;
> +
> + l_debug("auth_method: %d", prov->conf_inputs.start.auth_method);
> + memset(prov->rand_auth_workspace + 16, 0, 32);
> +
> + switch (prov->conf_inputs.start.auth_method) {
> + default:
> + case 0:
> + /* Auth Type 3c - No OOB */
> + prov->material |= MAT_RAND_AUTH;
> + break;
> + case 1:
> + /* Auth Type 3c - Static OOB */
> + /* Prompt Agent for Static OOB */
> + fail_code[1] = mesh_agent_request_static(prov->agent,
> + static_cb, prov);
> +
> + if (fail_code[1])
> + goto failure;
> +
> + break;
> + case 2:
> + /* Auth Type 3a - Output OOB */
> + /* Prompt Agent for Output OOB */
> + if (prov->conf_inputs.start.auth_action ==
> + PROV_ACTION_OUT_ALPHA) {
> + fail_code[1] = mesh_agent_prompt_alpha(
> + prov->agent, true,
> + static_cb, prov);
> + } else {
> + fail_code[1] = mesh_agent_prompt_number(
> + prov->agent, true,
> + prov->conf_inputs.start.auth_action,
> + number_cb, prov);
> + }
> +
> + if (fail_code[1])
> + goto failure;
> +
> + break;
> +
> + case 3:
> + /* Auth Type 3b - input OOB */
> + get_random_key(prov,
> + prov->conf_inputs.start.auth_action,
> + prov->conf_inputs.start.auth_size);
> + oob_key = l_get_be32(prov->rand_auth_workspace + 28);
> +
> + /* Ask Agent to Display random key */
> + if (prov->conf_inputs.start.auth_action ==
> + PROV_ACTION_IN_ALPHA) {
> +
> + fail_code[1] = mesh_agent_display_string(
> + prov->agent,
> + (char *) prov->rand_auth_workspace + 16,
> + NULL, prov);
> + } else {
> + fail_code[1] = mesh_agent_display_number(
> + prov->agent, true,
> + prov->conf_inputs.start.auth_action,
> + oob_key, NULL, prov);
> + }
> +
> + if (fail_code[1])
> + goto failure;
> +
> + break;
> +
> + }
> +
> + if (prov->material & MAT_RAND_AUTH)
> + send_confirm(prov);
> +
> + return;
> +
> +failure:
> + l_debug("Failing... %d", fail_code[1]);
> + fail_code[0] = PROV_FAILED;
> + prov->trans_tx(prov->trans_data, fail_code, 2);
> + int_prov_close(prov, fail_code[1]);
> +}
> +
> static void int_prov_rx(void *user_data, const uint8_t *data, uint16_t len)
> {
> struct mesh_prov_initiator *rx_prov = user_data;
> @@ -596,79 +700,12 @@ static void int_prov_rx(void *user_data, const uint8_t *data, uint16_t len)
> if ((prov->material & MAT_SECRET) != MAT_SECRET)
> return;
>
> - int_credentials(prov);
> - prov->state = INT_PROV_KEY_ACKED;
> -
> - l_debug("auth_method: %d", prov->conf_inputs.start.auth_method);
> - memset(prov->rand_auth_workspace + 16, 0, 32);
> - switch (prov->conf_inputs.start.auth_method) {
> - default:
> - case 0:
> - /* Auth Type 3c - No OOB */
> - prov->material |= MAT_RAND_AUTH;
> - break;
> - case 1:
> - /* Auth Type 3c - Static OOB */
> - /* Prompt Agent for Static OOB */
> - fail_code[1] = mesh_agent_request_static(prov->agent,
> - static_cb, prov);
> -
> - if (fail_code[1])
> - goto failure;
> -
> - break;
> - case 2:
> - /* Auth Type 3a - Output OOB */
> - /* Prompt Agent for Output OOB */
> - if (prov->conf_inputs.start.auth_action ==
> - PROV_ACTION_OUT_ALPHA) {
> - fail_code[1] = mesh_agent_prompt_alpha(
> - prov->agent, true,
> - static_cb, prov);
> - } else {
> - fail_code[1] = mesh_agent_prompt_number(
> - prov->agent, true,
> - prov->conf_inputs.start.auth_action,
> - number_cb, prov);
> - }
> -
> - if (fail_code[1])
> - goto failure;
> -
> - break;
> -
> - case 3:
> - /* Auth Type 3b - input OOB */
> - get_random_key(prov,
> - prov->conf_inputs.start.auth_action,
> - prov->conf_inputs.start.auth_size);
> - oob_key = l_get_be32(prov->rand_auth_workspace + 28);
> -
> - /* Ask Agent to Display random key */
> - if (prov->conf_inputs.start.auth_action ==
> - PROV_ACTION_IN_ALPHA) {
> -
> - fail_code[1] = mesh_agent_display_string(
> - prov->agent,
> - (char *) prov->rand_auth_workspace + 16,
> - NULL, prov);
> - } else {
> - fail_code[1] = mesh_agent_display_number(
> - prov->agent, true,
> - prov->conf_inputs.start.auth_action,
> - oob_key, NULL, prov);
> - }
> -
> - if (fail_code[1])
> - goto failure;
> -
> - break;
> -
> + if (!int_credentials(prov)) {
> + fail_code[1] = PROV_ERR_UNEXPECTED_ERR;
> + goto failure;
> }
>
> - if (prov->material & MAT_RAND_AUTH)
> - send_confirm(prov);
> -
> + int_prov_auth();
> break;
>
> case PROV_INP_CMPLT: /* Provisioning Input Complete */
> @@ -760,11 +797,15 @@ static void int_prov_ack(void *user_data, uint8_t msg_num)
> prov->state = INT_PROV_DATA_ACKED;
> break;
>
> + case INT_PROV_KEY_SENT:
> + if (prov->conf_inputs.caps.pub_type == 1)
> + int_prov_auth();
> + break;
> +
> case INT_PROV_IDLE:
> case INT_PROV_INVITE_SENT:
> case INT_PROV_INVITE_ACKED:
> case INT_PROV_START_ACKED:
> - case INT_PROV_KEY_SENT:
> case INT_PROV_KEY_ACKED:
> case INT_PROV_CONF_SENT:
> case INT_PROV_CONF_ACKED:
^ permalink raw reply [flat|nested] 2+ messages in thread