1 /* 2 BlueZ - Bluetooth protocol stack for Linux 3 4 Copyright (C) 2014 Intel Corporation 5 6 This program is free software; you can redistribute it and/or modify 7 it under the terms of the GNU General Public License version 2 as 8 published by the Free Software Foundation; 9 10 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS 11 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 12 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. 13 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY 14 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES 15 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18 19 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, 20 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS 21 SOFTWARE IS DISCLAIMED. 22 */ 23 24 #include <linux/debugfs.h> 25 26 #include <net/bluetooth/bluetooth.h> 27 #include <net/bluetooth/hci_core.h> 28 29 #include "ecdh_helper.h" 30 #include "smp.h" 31 #include "selftest.h" 32 33 #if IS_ENABLED(CONFIG_BT_SELFTEST_ECDH) 34 35 static const u8 priv_a_1[32] __initconst = { 36 0xbd, 0x1a, 0x3c, 0xcd, 0xa6, 0xb8, 0x99, 0x58, 37 0x99, 0xb7, 0x40, 0xeb, 0x7b, 0x60, 0xff, 0x4a, 38 0x50, 0x3f, 0x10, 0xd2, 0xe3, 0xb3, 0xc9, 0x74, 39 0x38, 0x5f, 0xc5, 0xa3, 0xd4, 0xf6, 0x49, 0x3f, 40 }; 41 static const u8 priv_b_1[32] __initconst = { 42 0xfd, 0xc5, 0x7f, 0xf4, 0x49, 0xdd, 0x4f, 0x6b, 43 0xfb, 0x7c, 0x9d, 0xf1, 0xc2, 0x9a, 0xcb, 0x59, 44 0x2a, 0xe7, 0xd4, 0xee, 0xfb, 0xfc, 0x0a, 0x90, 45 0x9a, 0xbb, 0xf6, 0x32, 0x3d, 0x8b, 0x18, 0x55, 46 }; 47 static const u8 pub_a_1[64] __initconst = { 48 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 49 0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef, 50 0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e, 51 0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20, 52 53 0x8b, 0xd2, 0x89, 0x15, 0xd0, 0x8e, 0x1c, 0x74, 54 0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76, 55 0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63, 56 0x6d, 0xeb, 0x2a, 0x65, 0x49, 0x9c, 0x80, 0xdc, 57 }; 58 static const u8 pub_b_1[64] __initconst = { 59 0x90, 0xa1, 0xaa, 0x2f, 0xb2, 0x77, 0x90, 0x55, 60 0x9f, 0xa6, 0x15, 0x86, 0xfd, 0x8a, 0xb5, 0x47, 61 0x00, 0x4c, 0x9e, 0xf1, 0x84, 0x22, 0x59, 0x09, 62 0x96, 0x1d, 0xaf, 0x1f, 0xf0, 0xf0, 0xa1, 0x1e, 63 64 0x4a, 0x21, 0xb1, 0x15, 0xf9, 0xaf, 0x89, 0x5f, 65 0x76, 0x36, 0x8e, 0xe2, 0x30, 0x11, 0x2d, 0x47, 66 0x60, 0x51, 0xb8, 0x9a, 0x3a, 0x70, 0x56, 0x73, 67 0x37, 0xad, 0x9d, 0x42, 0x3e, 0xf3, 0x55, 0x4c, 68 }; 69 static const u8 dhkey_1[32] __initconst = { 70 0x98, 0xa6, 0xbf, 0x73, 0xf3, 0x34, 0x8d, 0x86, 71 0xf1, 0x66, 0xf8, 0xb4, 0x13, 0x6b, 0x79, 0x99, 72 0x9b, 0x7d, 0x39, 0x0a, 0xa6, 0x10, 0x10, 0x34, 73 0x05, 0xad, 0xc8, 0x57, 0xa3, 0x34, 0x02, 0xec, 74 }; 75 76 static const u8 priv_a_2[32] __initconst = { 77 0x63, 0x76, 0x45, 0xd0, 0xf7, 0x73, 0xac, 0xb7, 78 0xff, 0xdd, 0x03, 0x72, 0xb9, 0x72, 0x85, 0xb4, 79 0x41, 0xb6, 0x5d, 0x0c, 0x5d, 0x54, 0x84, 0x60, 80 0x1a, 0xa3, 0x9a, 0x3c, 0x69, 0x16, 0xa5, 0x06, 81 }; 82 static const u8 priv_b_2[32] __initconst = { 83 0xba, 0x30, 0x55, 0x50, 0x19, 0xa2, 0xca, 0xa3, 84 0xa5, 0x29, 0x08, 0xc6, 0xb5, 0x03, 0x88, 0x7e, 85 0x03, 0x2b, 0x50, 0x73, 0xd4, 0x2e, 0x50, 0x97, 86 0x64, 0xcd, 0x72, 0x0d, 0x67, 0xa0, 0x9a, 0x52, 87 }; 88 static const u8 pub_a_2[64] __initconst = { 89 0xdd, 0x78, 0x5c, 0x74, 0x03, 0x9b, 0x7e, 0x98, 90 0xcb, 0x94, 0x87, 0x4a, 0xad, 0xfa, 0xf8, 0xd5, 91 0x43, 0x3e, 0x5c, 0xaf, 0xea, 0xb5, 0x4c, 0xf4, 92 0x9e, 0x80, 0x79, 0x57, 0x7b, 0xa4, 0x31, 0x2c, 93 94 0x4f, 0x5d, 0x71, 0x43, 0x77, 0x43, 0xf8, 0xea, 95 0xd4, 0x3e, 0xbd, 0x17, 0x91, 0x10, 0x21, 0xd0, 96 0x1f, 0x87, 0x43, 0x8e, 0x40, 0xe2, 0x52, 0xcd, 97 0xbe, 0xdf, 0x98, 0x38, 0x18, 0x12, 0x95, 0x91, 98 }; 99 static const u8 pub_b_2[64] __initconst = { 100 0xcc, 0x00, 0x65, 0xe1, 0xf5, 0x6c, 0x0d, 0xcf, 101 0xec, 0x96, 0x47, 0x20, 0x66, 0xc9, 0xdb, 0x84, 102 0x81, 0x75, 0xa8, 0x4d, 0xc0, 0xdf, 0xc7, 0x9d, 103 0x1b, 0x3f, 0x3d, 0xf2, 0x3f, 0xe4, 0x65, 0xf4, 104 105 0x79, 0xb2, 0xec, 0xd8, 0xca, 0x55, 0xa1, 0xa8, 106 0x43, 0x4d, 0x6b, 0xca, 0x10, 0xb0, 0xc2, 0x01, 107 0xc2, 0x33, 0x4e, 0x16, 0x24, 0xc4, 0xef, 0xee, 108 0x99, 0xd8, 0xbb, 0xbc, 0x48, 0xd0, 0x01, 0x02, 109 }; 110 static const u8 dhkey_2[32] __initconst = { 111 0x69, 0xeb, 0x21, 0x32, 0xf2, 0xc6, 0x05, 0x41, 112 0x60, 0x19, 0xcd, 0x5e, 0x94, 0xe1, 0xe6, 0x5f, 113 0x33, 0x07, 0xe3, 0x38, 0x4b, 0x68, 0xe5, 0x62, 114 0x3f, 0x88, 0x6d, 0x2f, 0x3a, 0x84, 0x85, 0xab, 115 }; 116 117 static const u8 priv_a_3[32] __initconst = { 118 0xbd, 0x1a, 0x3c, 0xcd, 0xa6, 0xb8, 0x99, 0x58, 119 0x99, 0xb7, 0x40, 0xeb, 0x7b, 0x60, 0xff, 0x4a, 120 0x50, 0x3f, 0x10, 0xd2, 0xe3, 0xb3, 0xc9, 0x74, 121 0x38, 0x5f, 0xc5, 0xa3, 0xd4, 0xf6, 0x49, 0x3f, 122 }; 123 static const u8 pub_a_3[64] __initconst = { 124 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 125 0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef, 126 0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e, 127 0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20, 128 129 0x8b, 0xd2, 0x89, 0x15, 0xd0, 0x8e, 0x1c, 0x74, 130 0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76, 131 0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63, 132 0x6d, 0xeb, 0x2a, 0x65, 0x49, 0x9c, 0x80, 0xdc, 133 }; 134 static const u8 dhkey_3[32] __initconst = { 135 0x2d, 0xab, 0x00, 0x48, 0xcb, 0xb3, 0x7b, 0xda, 136 0x55, 0x7b, 0x8b, 0x72, 0xa8, 0x57, 0x87, 0xc3, 137 0x87, 0x27, 0x99, 0x32, 0xfc, 0x79, 0x5f, 0xae, 138 0x7c, 0x1c, 0xf9, 0x49, 0xe6, 0xd7, 0xaa, 0x70, 139 }; 140 141 static int __init test_ecdh_sample(struct crypto_kpp *tfm, const u8 priv_a[32], 142 const u8 priv_b[32], const u8 pub_a[64], 143 const u8 pub_b[64], const u8 dhkey[32]) 144 { 145 u8 *tmp, *dhkey_a, *dhkey_b; 146 int ret; 147 148 tmp = kmalloc(64, GFP_KERNEL); 149 if (!tmp) 150 return -EINVAL; 151 152 dhkey_a = &tmp[0]; 153 dhkey_b = &tmp[32]; 154 155 ret = set_ecdh_privkey(tfm, priv_a); 156 if (ret) 157 goto out; 158 159 ret = compute_ecdh_secret(tfm, pub_b, dhkey_a); 160 if (ret) 161 goto out; 162 163 if (memcmp(dhkey_a, dhkey, 32)) { 164 ret = -EINVAL; 165 goto out; 166 } 167 168 ret = set_ecdh_privkey(tfm, priv_b); 169 if (ret) 170 goto out; 171 172 ret = compute_ecdh_secret(tfm, pub_a, dhkey_b); 173 if (ret) 174 goto out; 175 176 if (memcmp(dhkey_b, dhkey, 32)) 177 ret = -EINVAL; 178 /* fall through*/ 179 out: 180 kfree(tmp); 181 return ret; 182 } 183 184 static char test_ecdh_buffer[32]; 185 186 static ssize_t test_ecdh_read(struct file *file, char __user *user_buf, 187 size_t count, loff_t *ppos) 188 { 189 return simple_read_from_buffer(user_buf, count, ppos, test_ecdh_buffer, 190 strlen(test_ecdh_buffer)); 191 } 192 193 static const struct file_operations test_ecdh_fops = { 194 .open = simple_open, 195 .read = test_ecdh_read, 196 .llseek = default_llseek, 197 }; 198 199 static int __init test_ecdh(void) 200 { 201 struct crypto_kpp *tfm; 202 ktime_t calltime, delta, rettime; 203 unsigned long long duration = 0; 204 int err; 205 206 calltime = ktime_get(); 207 208 tfm = crypto_alloc_kpp("ecdh", 0, 0); 209 if (IS_ERR(tfm)) { 210 BT_ERR("Unable to create ECDH crypto context"); 211 err = PTR_ERR(tfm); 212 goto done; 213 } 214 215 err = test_ecdh_sample(tfm, priv_a_1, priv_b_1, pub_a_1, pub_b_1, 216 dhkey_1); 217 if (err) { 218 BT_ERR("ECDH sample 1 failed"); 219 goto done; 220 } 221 222 err = test_ecdh_sample(tfm, priv_a_2, priv_b_2, pub_a_2, pub_b_2, 223 dhkey_2); 224 if (err) { 225 BT_ERR("ECDH sample 2 failed"); 226 goto done; 227 } 228 229 err = test_ecdh_sample(tfm, priv_a_3, priv_a_3, pub_a_3, pub_a_3, 230 dhkey_3); 231 if (err) { 232 BT_ERR("ECDH sample 3 failed"); 233 goto done; 234 } 235 236 crypto_free_kpp(tfm); 237 238 rettime = ktime_get(); 239 delta = ktime_sub(rettime, calltime); 240 duration = (unsigned long long) ktime_to_ns(delta) >> 10; 241 242 BT_INFO("ECDH test passed in %llu usecs", duration); 243 244 done: 245 if (!err) 246 snprintf(test_ecdh_buffer, sizeof(test_ecdh_buffer), 247 "PASS (%llu usecs)\n", duration); 248 else 249 snprintf(test_ecdh_buffer, sizeof(test_ecdh_buffer), "FAIL\n"); 250 251 debugfs_create_file("selftest_ecdh", 0444, bt_debugfs, NULL, 252 &test_ecdh_fops); 253 254 return err; 255 } 256 257 #else 258 259 static inline int test_ecdh(void) 260 { 261 return 0; 262 } 263 264 #endif 265 266 static int __init run_selftest(void) 267 { 268 int err; 269 270 BT_INFO("Starting self testing"); 271 272 err = test_ecdh(); 273 if (err) 274 goto done; 275 276 err = bt_selftest_smp(); 277 278 done: 279 BT_INFO("Finished self testing"); 280 281 return err; 282 } 283 284 #if IS_MODULE(CONFIG_BT) 285 286 /* This is run when CONFIG_BT_SELFTEST=y and CONFIG_BT=m and is just a 287 * wrapper to allow running this at module init. 288 * 289 * If CONFIG_BT_SELFTEST=n, then this code is not compiled at all. 290 */ 291 int __init bt_selftest(void) 292 { 293 return run_selftest(); 294 } 295 296 #else 297 298 /* This is run when CONFIG_BT_SELFTEST=y and CONFIG_BT=y and is run 299 * via late_initcall() as last item in the initialization sequence. 300 * 301 * If CONFIG_BT_SELFTEST=n, then this code is not compiled at all. 302 */ 303 static int __init bt_selftest_init(void) 304 { 305 return run_selftest(); 306 } 307 late_initcall(bt_selftest_init); 308 309 #endif 310