pinebuds/services/ble_app/app_sec/app_sec.c

415 lines
12 KiB
C
Raw Normal View History

2022-08-15 04:20:27 -05:00
/***************************************************************************
*
* Copyright 2015-2019 BES.
* All rights reserved. All unpublished rights reserved.
*
* No part of this work may be used or reproduced in any form or by any
* means, or stored in a database or retrieval system, without prior written
* permission of BES.
*
* Use of this work is governed by a license granted by BES.
* This work contains confidential and proprietary information of
* BES. which is protected by copyright, trade secret,
* trademark and other intellectual property rights.
*
****************************************************************************/
/**
****************************************************************************************
* @addtogroup APP
* @{
****************************************************************************************
*/
/*
* INCLUDE FILES
****************************************************************************************
*/
#include "rwip_config.h"
#if (BLE_APP_SEC)
#include "co_math.h"
#include "gap.h" // GAP Definition
#include "gapc.h" // GAPC Definition
#include "gapc_task.h" // GAP Controller Task API Definition
2022-08-15 04:20:27 -05:00
#include "prf_types.h"
#include <string.h>
2022-08-15 04:20:27 -05:00
#include "app.h" // Application API Definition
2022-08-15 04:20:27 -05:00
#include "app_ble_include.h"
#include "app_sec.h" // Application Security API Definition
#include "app_task.h" // Application Manager API Definition
2022-08-15 04:20:27 -05:00
#if (DISPLAY_SUPPORT)
#include "app_display.h" // Display Application Definitions
#endif //(DISPLAY_SUPPORT)
2022-08-15 04:20:27 -05:00
#if (NVDS_SUPPORT)
#include "nvds.h" // NVDS API Definitions
#endif //(NVDS_SUPPORT)
2022-08-15 04:20:27 -05:00
#ifdef BLE_APP_AM0
#include "am0_app.h"
#endif // BLE_APP_AM0
#if (BLE_APP_ANCC)
#include "app_ancc.h" // ANC Module Definition
#endif // (BLE_APP_ANCC)
2022-08-15 04:20:27 -05:00
#if (BLE_APP_AMS)
#include "app_amsc.h" // AMS Module Definition
#endif // (BLE_APP_AMS)
2022-08-15 04:20:27 -05:00
#include "app_gfps.h"
#include "nvrecord_ble.h"
#include "nvrecord_extension.h"
#include "tgt_hardware.h"
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
#define BLE_KEY_PRINT
BleDeviceinfo ble_save_info;
#endif
#ifdef TWS_SYSTEM_ENABLED
#include "app_tws_if.h"
#endif
/*
* GLOBAL VARIABLE DEFINITIONS
****************************************************************************************
*/
/// Application Security Environment Structure
struct app_sec_env_tag app_sec_env;
/*
* GLOBAL FUNCTION DEFINITIONS
****************************************************************************************
*/
void app_sec_init(void) {
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
if (nv_record_ble_record_Once_a_device_has_been_bonded()) {
app_sec_env.bonded = true;
} else {
app_sec_env.bonded = false;
}
2022-08-15 04:20:27 -05:00
TRACE(2, "[%s] once bonded:%d", __func__, app_sec_env.bonded);
2022-08-15 04:20:27 -05:00
#endif
}
bool app_sec_get_bond_status(void) { return app_sec_env.bonded; }
2022-08-15 04:20:27 -05:00
void app_sec_send_security_req(uint8_t conidx, enum gap_auth authority) {
// Send security request
struct gapc_security_cmd *cmd =
KE_MSG_ALLOC(GAPC_SECURITY_CMD, KE_BUILD_ID(TASK_GAPC, conidx), TASK_APP,
gapc_security_cmd);
2022-08-15 04:20:27 -05:00
cmd->operation = GAPC_SECURITY_REQ;
2022-08-15 04:20:27 -05:00
cmd->auth = authority;
2022-08-15 04:20:27 -05:00
// Send the message
ke_msg_send(cmd);
2022-08-15 04:20:27 -05:00
}
/*
* MESSAGE HANDLERS
****************************************************************************************
*/
static int gapc_bond_req_ind_handler(ke_msg_id_t const msgid,
struct gapc_bond_req_ind const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id) {
TRACE(1, "Get bond req %d", param->request);
2022-08-15 04:20:27 -05:00
// Prepare the GAPC_BOND_CFM message
struct gapc_bond_cfm *cfm =
KE_MSG_ALLOC(GAPC_BOND_CFM, src_id, TASK_APP, gapc_bond_cfm);
switch (param->request) {
case (GAPC_PAIRING_REQ): {
cfm->request = GAPC_PAIRING_RSP;
cfm->accept = true;
cfm->data.pairing_feat.auth = BLE_AUTHENTICATION_LEVEL;
#if (BLE_APP_GFPS)
cfm->data.pairing_feat.iocap = GAP_IO_CAP_DISPLAY_YES_NO;
#else
cfm->data.pairing_feat.iocap = GAP_IO_CAP_NO_INPUT_NO_OUTPUT;
2022-08-15 04:20:27 -05:00
#endif
cfm->data.pairing_feat.key_size = 16;
cfm->data.pairing_feat.oob = GAP_OOB_AUTH_DATA_NOT_PRESENT;
#if (BLE_APP_GFPS)
cfm->data.pairing_feat.sec_req = GAP_SEC1_SEC_CON_PAIR_ENC;
#else
cfm->data.pairing_feat.sec_req = GAP_SEC1_NOAUTH_PAIR_ENC;
2022-08-15 04:20:27 -05:00
#endif
cfm->data.pairing_feat.ikey_dist =
GAP_KDIST_ENCKEY | GAP_KDIST_IDKEY | GAP_KDIST_LINKKEY;
cfm->data.pairing_feat.rkey_dist =
GAP_KDIST_ENCKEY | GAP_KDIST_IDKEY | GAP_KDIST_LINKKEY;
} break;
case (GAPC_LTK_EXCH): {
// Counter
uint8_t counter;
cfm->accept = true;
cfm->request = GAPC_LTK_EXCH;
// Generate all the values
cfm->data.ltk.ediv = (uint16_t)co_rand_word();
for (counter = 0; counter < RAND_NB_LEN; counter++) {
cfm->data.ltk.randnb.nb[counter] = (uint8_t)co_rand_word();
}
for (counter = 0; counter < GAP_KEY_LEN; counter++) {
cfm->data.ltk.ltk.key[counter] = (uint8_t)co_rand_word();
2022-08-15 04:20:27 -05:00
}
#ifdef _BLE_NVDS_
#ifdef BLE_KEY_PRINT
TRACE(0, "<==============>LTK IS:");
DUMP8("%02x ", (uint8_t *)&cfm->data.ltk, 16);
TRACE(1, "<==============>EDIV IS: %04x:", cfm->data.ltk.ediv);
TRACE(0, "<==============>RANDOM IS:");
DUMP8("%02x ", (uint8_t *)&cfm->data.ltk.randnb.nb, 8);
#endif
ble_save_info.EDIV = cfm->data.ltk.ediv;
memcpy(&ble_save_info.RANDOM, (uint8_t *)&cfm->data.ltk.randnb.nb, 8);
memcpy(&ble_save_info.LTK, (uint8_t *)&cfm->data.ltk, 16);
2022-08-15 04:20:27 -05:00
ble_save_info.bonded = false;
#endif
} break;
case (GAPC_IRK_EXCH): {
cfm->accept = true;
cfm->request = GAPC_IRK_EXCH;
// Load IRK
memcpy(cfm->data.irk.irk.key, app_env.loc_irk, KEY_LEN);
// load identity ble address
memcpy(cfm->data.irk.addr.addr.addr, ble_addr, BLE_ADDR_SIZE);
cfm->data.irk.addr.addr_type = ADDR_PUBLIC;
} break;
case (GAPC_TK_EXCH): {
// Generate a PIN Code- (Between 100000 and 999999)
uint32_t pin_code = (100000 + (co_rand_word() % 900000));
cfm->accept = true;
cfm->request = GAPC_TK_EXCH;
// Set the TK value
memset(cfm->data.tk.key, 0, KEY_LEN);
cfm->data.tk.key[0] = (uint8_t)((pin_code & 0x000000FF) >> 0);
cfm->data.tk.key[1] = (uint8_t)((pin_code & 0x0000FF00) >> 8);
cfm->data.tk.key[2] = (uint8_t)((pin_code & 0x00FF0000) >> 16);
cfm->data.tk.key[3] = (uint8_t)((pin_code & 0xFF000000) >> 24);
} break;
case GAPC_NC_EXCH:
cfm->accept = true;
cfm->request = GAPC_NC_EXCH;
break;
default: {
ASSERT_ERR(0);
} break;
}
// Send the message
ke_msg_send(cfm);
return (KE_MSG_CONSUMED);
2022-08-15 04:20:27 -05:00
}
void app_sec_reset_env_on_connection(void) {
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
memset(&ble_save_info, 0, sizeof(BleDeviceinfo));
2022-08-15 04:20:27 -05:00
#endif
}
static int gapc_bond_ind_handler(ke_msg_id_t const msgid,
struct gapc_bond_ind const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id) {
uint8_t conidx = KE_IDX_GET(src_id);
switch (param->info) {
case (GAPC_PAIRING_SUCCEED): {
TRACE(0, "GAPC_PAIRING_SUCCEED");
// Update the bonding status in the environment
app_sec_env.bonded = true;
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
ble_save_info.bonded = true;
2022-08-15 04:20:27 -05:00
if (!nv_record_blerec_add(&ble_save_info)) {
2022-08-15 04:20:27 -05:00
#ifdef TWS_SYSTEM_ENABLED
app_ble_sync_ble_info();
TRACE(0, "BLE NVDS SETUP SUCCESS!!!,the key is the newest");
2022-08-15 04:20:27 -05:00
#endif
}
2022-08-15 04:20:27 -05:00
#endif
break;
}
case (GAPC_REPEATED_ATTEMPT): {
appm_disconnect(conidx);
break;
}
case (GAPC_IRK_EXCH): {
TRACE(0, "Peer device IRK is:");
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
DUMP8("%02x ", param->data.irk.irk.key, BLE_IRK_SIZE);
DUMP8("%02x ", (uint8_t *)&(param->data.irk.addr), BLE_ADDR_SIZE + 1);
app_env.context[conidx].isBdAddrResolvingInProgress = false;
app_env.context[conidx].isGotSolvedBdAddr = true;
memcpy(app_env.context[conidx].solvedBdAddr, param->data.irk.addr.addr.addr,
BLE_ADDR_SIZE);
memcpy(ble_save_info.IRK, param->data.irk.irk.key, BLE_IRK_SIZE);
memcpy(ble_save_info.peer_bleAddr, param->data.irk.addr.addr.addr,
BLE_ADDR_SIZE);
2022-08-15 04:20:27 -05:00
#endif
app_exchange_remote_feature(conidx);
break;
}
case (GAPC_PAIRING_FAILED): {
TRACE(1, "GAPC_PAIRING_FAILED!!! Error code 0x%x", param->data.reason);
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
nv_record_ble_delete_entry(app_env.context[conidx].solvedBdAddr);
app_sec_env.bonded = false;
2022-08-15 04:20:27 -05:00
#endif
break;
}
case GAPC_LTK_EXCH: {
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
TRACE(1, "isLocal %d", param->data.ltk.isLocal);
TRACE(0, "Peer device LTK is:");
DUMP8("%02x ", param->data.ltk.ltk.key, BLE_LTK_SIZE);
TRACE(1, "EDIV %04x ", param->data.ltk.ediv);
TRACE(0, "Peer device random number is:");
DUMP8("%02x ", param->data.ltk.randnb.nb, BLE_ENC_RANDOM_SIZE);
if (param->data.ltk.isLocal) {
ble_save_info.EDIV = param->data.ltk.ediv;
memcpy(&ble_save_info.RANDOM, (uint8_t *)&param->data.ltk.randnb.nb,
BLE_ENC_RANDOM_SIZE);
memcpy(&ble_save_info.LTK, (uint8_t *)&param->data.ltk, BLE_LTK_SIZE);
2022-08-15 04:20:27 -05:00
}
#endif
break;
}
default: {
ASSERT_ERR(0);
break;
}
}
return (KE_MSG_CONSUMED);
2022-08-15 04:20:27 -05:00
}
static int gapc_encrypt_req_ind_handler(
ke_msg_id_t const msgid, struct gapc_encrypt_req_ind const *param,
ke_task_id_t const dest_id, ke_task_id_t const src_id) {
TRACE(1, "%s, master ask for LTK TO encrypt!!!!", __FUNCTION__);
2022-08-15 04:20:27 -05:00
uint8_t conidx = KE_IDX_GET(src_id);
2022-08-15 04:20:27 -05:00
appm_check_and_resolve_ble_address(conidx);
2022-08-15 04:20:27 -05:00
if (!app_env.context[conidx].isGotSolvedBdAddr) {
return (KE_MSG_SAVED);
}
2022-08-15 04:20:27 -05:00
TRACE(0, "Random ble address solved. Can rsp enc req.");
2022-08-15 04:20:27 -05:00
// Prepare the GAPC_ENCRYPT_CFM message
struct gapc_encrypt_cfm *cfm =
KE_MSG_ALLOC(GAPC_ENCRYPT_CFM, src_id, TASK_APP, gapc_encrypt_cfm);
2022-08-15 04:20:27 -05:00
cfm->found = false;
2022-08-15 04:20:27 -05:00
#ifdef _BLE_NVDS_
struct gapc_ltk ltk;
2022-08-15 04:20:27 -05:00
bool ret;
ret = nv_record_ble_record_find_ltk_through_static_bd_addr(
app_env.context[conidx].solvedBdAddr, ltk.ltk.key);
if (ret) {
TRACE(0, "FIND LTK SUCCESSED!!!");
2022-08-15 04:20:27 -05:00
#ifdef BLE_KEY_PRINT
DUMP8("%02x ", (uint8_t *)ltk.ltk.key, 16);
2022-08-15 04:20:27 -05:00
#endif
cfm->found = true;
cfm->key_size = 16;
memcpy(&cfm->ltk, ltk.ltk.key, sizeof(struct gap_sec_key));
2022-08-15 04:20:27 -05:00
} else {
TRACE(0, "FIND LTK failed!!!");
}
2022-08-15 04:20:27 -05:00
#endif
TRACE(2, "%s app_sec_env.bonded %d", __FUNCTION__, app_sec_env.bonded);
2022-08-15 04:20:27 -05:00
// Send the message
ke_msg_send(cfm);
2022-08-15 04:20:27 -05:00
// encryption has been completed, we can start exchanging remote features now
app_exchange_remote_feature(conidx);
2022-08-15 04:20:27 -05:00
return (KE_MSG_CONSUMED);
2022-08-15 04:20:27 -05:00
}
static int gapc_encrypt_ind_handler(ke_msg_id_t const msgid,
struct gapc_encrypt_ind const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id) {
TRACE(2, "%s param->auth %d", __FUNCTION__, param->auth);
2022-08-15 04:20:27 -05:00
return (KE_MSG_CONSUMED);
2022-08-15 04:20:27 -05:00
}
static int app_sec_msg_dflt_handler(ke_msg_id_t const msgid, void *param,
2022-08-15 04:20:27 -05:00
ke_task_id_t const dest_id,
ke_task_id_t const src_id) {
// Drop the message
2022-08-15 04:20:27 -05:00
return (KE_MSG_CONSUMED);
2022-08-15 04:20:27 -05:00
}
/*
* LOCAL VARIABLE DEFINITIONS
****************************************************************************************
*/
2022-08-15 04:20:27 -05:00
/// Default State handlers definition
const struct ke_msg_handler app_sec_msg_handler_list[] = {
// Note: first message is latest message checked by kernel so default is put
// on top.
{KE_MSG_DEFAULT_HANDLER, (ke_msg_func_t)app_sec_msg_dflt_handler},
2022-08-15 04:20:27 -05:00
{GAPC_BOND_REQ_IND, (ke_msg_func_t)gapc_bond_req_ind_handler},
{GAPC_BOND_IND, (ke_msg_func_t)gapc_bond_ind_handler},
2022-08-15 04:20:27 -05:00
{GAPC_ENCRYPT_REQ_IND, (ke_msg_func_t)gapc_encrypt_req_ind_handler},
{GAPC_ENCRYPT_IND, (ke_msg_func_t)gapc_encrypt_ind_handler},
2022-08-15 04:20:27 -05:00
};
const struct ke_state_handler app_sec_table_handler = {
&app_sec_msg_handler_list[0],
(sizeof(app_sec_msg_handler_list) / sizeof(struct ke_msg_handler))};
2022-08-15 04:20:27 -05:00
#endif //(BLE_APP_SEC)
/// @} APP