1/******************************************************************************
2 *
3 *  Copyright 1999-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/******************************************************************************
20 *
21 *  This file contains internally used SMP definitions
22 *
23 ******************************************************************************/
24#ifndef SMP_INT_H
25#define SMP_INT_H
26
27#include "btm_api.h"
28#include "btm_ble_api.h"
29#include "btu.h"
30#include "smp_api.h"
31
32/* Legacy mode */
33#define SMP_MODEL_ENCRYPTION_ONLY 0 /* Just Works model */
34#define SMP_MODEL_PASSKEY 1         /* Passkey Entry model, input the key */
35#define SMP_MODEL_OOB 2             /* OOB model */
36#define SMP_MODEL_KEY_NOTIF 3       /* Passkey Entry model, display the key */
37/* Secure connections mode */
38#define SMP_MODEL_SEC_CONN_JUSTWORKS 4    /* Just Works model */
39#define SMP_MODEL_SEC_CONN_NUM_COMP 5     /* Numeric Comparison model */
40#define SMP_MODEL_SEC_CONN_PASSKEY_ENT 6  /* Passkey Entry model, */
41                                          /* this side inputs the key */
42#define SMP_MODEL_SEC_CONN_PASSKEY_DISP 7 /* Passkey Entry model, */
43                                          /* this side displays the key */
44#define SMP_MODEL_SEC_CONN_OOB 8 /* Secure Connections mode, OOB model */
45#define SMP_MODEL_OUT_OF_RANGE 9
46typedef uint8_t tSMP_ASSO_MODEL;
47
48#ifndef SMP_MAX_CONN
49#define SMP_MAX_CONN 2
50#endif
51
52#define SMP_WAIT_FOR_RSP_TIMEOUT_MS (30 * 1000)
53#define SMP_DELAYED_AUTH_TIMEOUT_MS 500
54
55#define SMP_OPCODE_INIT 0x04
56
57/* SMP events */
58#define SMP_PAIRING_REQ_EVT SMP_OPCODE_PAIRING_REQ
59#define SMP_PAIRING_RSP_EVT SMP_OPCODE_PAIRING_RSP
60#define SMP_CONFIRM_EVT SMP_OPCODE_CONFIRM
61#define SMP_RAND_EVT SMP_OPCODE_RAND
62#define SMP_PAIRING_FAILED_EVT SMP_OPCODE_PAIRING_FAILED
63#define SMP_ENCRPTION_INFO_EVT SMP_OPCODE_ENCRYPT_INFO
64#define SMP_MASTER_ID_EVT SMP_OPCODE_MASTER_ID
65#define SMP_ID_INFO_EVT SMP_OPCODE_IDENTITY_INFO
66#define SMP_ID_ADDR_EVT SMP_OPCODE_ID_ADDR
67#define SMP_SIGN_INFO_EVT SMP_OPCODE_SIGN_INFO
68#define SMP_SECURITY_REQ_EVT SMP_OPCODE_SEC_REQ
69
70#define SMP_PAIR_PUBLIC_KEY_EVT SMP_OPCODE_PAIR_PUBLIC_KEY
71#define SMP_PAIR_KEYPRESS_NOTIFICATION_EVT SMP_OPCODE_PAIR_KEYPR_NOTIF
72
73#define SMP_PAIR_COMMITM_EVT SMP_OPCODE_PAIR_COMMITM
74
75#define SMP_SELF_DEF_EVT (SMP_PAIR_COMMITM_EVT + 1)
76#define SMP_KEY_READY_EVT (SMP_SELF_DEF_EVT)
77#define SMP_ENCRYPTED_EVT (SMP_SELF_DEF_EVT + 1)
78#define SMP_L2CAP_CONN_EVT (SMP_SELF_DEF_EVT + 2)
79#define SMP_L2CAP_DISCONN_EVT (SMP_SELF_DEF_EVT + 3)
80#define SMP_IO_RSP_EVT (SMP_SELF_DEF_EVT + 4)
81#define SMP_API_SEC_GRANT_EVT (SMP_SELF_DEF_EVT + 5)
82#define SMP_TK_REQ_EVT (SMP_SELF_DEF_EVT + 6)
83#define SMP_AUTH_CMPL_EVT (SMP_SELF_DEF_EVT + 7)
84#define SMP_ENC_REQ_EVT (SMP_SELF_DEF_EVT + 8)
85#define SMP_BOND_REQ_EVT (SMP_SELF_DEF_EVT + 9)
86#define SMP_DISCARD_SEC_REQ_EVT (SMP_SELF_DEF_EVT + 10)
87
88#define SMP_PAIR_DHKEY_CHCK_EVT SMP_OPCODE_PAIR_DHKEY_CHECK
89
90/* request to start public  key exchange */
91#define SMP_PUBL_KEY_EXCH_REQ_EVT (SMP_SELF_DEF_EVT + 11)
92
93/* local public key created */
94#define SMP_LOC_PUBL_KEY_CRTD_EVT (SMP_SELF_DEF_EVT + 12)
95
96/* both local and peer public keys are saved in cb */
97#define SMP_BOTH_PUBL_KEYS_RCVD_EVT (SMP_SELF_DEF_EVT + 13)
98
99/* DHKey computation is completed, time to start SC phase1 */
100#define SMP_SC_DHKEY_CMPLT_EVT (SMP_SELF_DEF_EVT + 14)
101
102/* new local nonce is generated and saved in p_cb->rand */
103#define SMP_HAVE_LOC_NONCE_EVT (SMP_SELF_DEF_EVT + 15)
104
105/* time to start SC phase2 */
106#define SMP_SC_PHASE1_CMPLT_EVT (SMP_SELF_DEF_EVT + 16)
107
108/* request to calculate number for user check. Used only in the numeric compare
109 * protocol */
110#define SMP_SC_CALC_NC_EVT (SMP_SELF_DEF_EVT + 17)
111
112/* Request to display the number for user check to the user.*/
113/* Used only in the numeric compare protocol */
114#define SMP_SC_DSPL_NC_EVT (SMP_SELF_DEF_EVT + 18)
115
116/* user confirms 'OK' numeric comparison request */
117#define SMP_SC_NC_OK_EVT (SMP_SELF_DEF_EVT + 19)
118
119/* both local and peer DHKey Checks are already present - it is used on slave to
120 * prevent a race condition */
121#define SMP_SC_2_DHCK_CHKS_PRES_EVT (SMP_SELF_DEF_EVT + 20)
122
123/* same meaning as SMP_KEY_READY_EVT to separate between SC and legacy actions
124 */
125#define SMP_SC_KEY_READY_EVT (SMP_SELF_DEF_EVT + 21)
126#define SMP_KEYPRESS_NOTIFICATION_EVENT (SMP_SELF_DEF_EVT + 22)
127
128/* SC OOB data from some repository is provided */
129#define SMP_SC_OOB_DATA_EVT (SMP_SELF_DEF_EVT + 23)
130
131#define SMP_CR_LOC_SC_OOB_DATA_EVT (SMP_SELF_DEF_EVT + 24)
132#define SMP_MAX_EVT SMP_CR_LOC_SC_OOB_DATA_EVT
133
134typedef uint8_t tSMP_EVENT;
135
136/* Assumption it's only using the low 8 bits, if bigger than that, need to
137 * expand it to 16 bits */
138#define SMP_SEC_KEY_MASK 0x00ff
139
140/* SMP pairing state */
141enum {
142  SMP_STATE_IDLE,
143  SMP_STATE_WAIT_APP_RSP,
144  SMP_STATE_SEC_REQ_PENDING,
145  SMP_STATE_PAIR_REQ_RSP,
146  SMP_STATE_WAIT_CONFIRM,
147  SMP_STATE_CONFIRM,
148  SMP_STATE_RAND,
149  SMP_STATE_PUBLIC_KEY_EXCH,
150  SMP_STATE_SEC_CONN_PHS1_START,
151  SMP_STATE_WAIT_COMMITMENT,
152  SMP_STATE_WAIT_NONCE,
153  SMP_STATE_SEC_CONN_PHS2_START,
154  SMP_STATE_WAIT_DHK_CHECK,
155  SMP_STATE_DHK_CHECK,
156  SMP_STATE_ENCRYPTION_PENDING,
157  SMP_STATE_BOND_PENDING,
158  SMP_STATE_CREATE_LOCAL_SEC_CONN_OOB_DATA,
159  SMP_STATE_MAX
160};
161typedef uint8_t tSMP_STATE;
162
163/* SMP over BR/EDR events */
164#define SMP_BR_PAIRING_REQ_EVT SMP_OPCODE_PAIRING_REQ
165#define SMP_BR_PAIRING_RSP_EVT SMP_OPCODE_PAIRING_RSP
166#define SMP_BR_CONFIRM_EVT SMP_OPCODE_CONFIRM /* not over BR/EDR */
167#define SMP_BR_RAND_EVT SMP_OPCODE_RAND       /* not over BR/EDR */
168#define SMP_BR_PAIRING_FAILED_EVT SMP_OPCODE_PAIRING_FAILED
169#define SMP_BR_ENCRPTION_INFO_EVT                                    \
170  SMP_OPCODE_ENCRYPT_INFO                         /* not over BR/EDR \
171                                                     */
172#define SMP_BR_MASTER_ID_EVT SMP_OPCODE_MASTER_ID /* not over BR/EDR */
173#define SMP_BR_ID_INFO_EVT SMP_OPCODE_IDENTITY_INFO
174#define SMP_BR_ID_ADDR_EVT SMP_OPCODE_ID_ADDR
175#define SMP_BR_SIGN_INFO_EVT SMP_OPCODE_SIGN_INFO
176#define SMP_BR_SECURITY_REQ_EVT SMP_OPCODE_SEC_REQ /* not over BR/EDR */
177#define SMP_BR_PAIR_PUBLIC_KEY_EVT \
178  SMP_OPCODE_PAIR_PUBLIC_KEY /* not over BR/EDR */
179#define SMP_BR_PAIR_DHKEY_CHCK_EVT \
180  SMP_OPCODE_PAIR_DHKEY_CHECK /* not over BR/EDR */
181#define SMP_BR_PAIR_KEYPR_NOTIF_EVT \
182  SMP_OPCODE_PAIR_KEYPR_NOTIF /* not over BR/EDR */
183#define SMP_BR_SELF_DEF_EVT SMP_BR_PAIR_KEYPR_NOTIF_EVT
184#define SMP_BR_KEY_READY_EVT (SMP_BR_SELF_DEF_EVT + 1)
185#define SMP_BR_ENCRYPTED_EVT (SMP_BR_SELF_DEF_EVT + 2)
186#define SMP_BR_L2CAP_CONN_EVT (SMP_BR_SELF_DEF_EVT + 3)
187#define SMP_BR_L2CAP_DISCONN_EVT (SMP_BR_SELF_DEF_EVT + 4)
188#define SMP_BR_KEYS_RSP_EVT (SMP_BR_SELF_DEF_EVT + 5)
189#define SMP_BR_API_SEC_GRANT_EVT (SMP_BR_SELF_DEF_EVT + 6)
190#define SMP_BR_TK_REQ_EVT (SMP_BR_SELF_DEF_EVT + 7)
191#define SMP_BR_AUTH_CMPL_EVT (SMP_BR_SELF_DEF_EVT + 8)
192#define SMP_BR_ENC_REQ_EVT (SMP_BR_SELF_DEF_EVT + 9)
193#define SMP_BR_BOND_REQ_EVT (SMP_BR_SELF_DEF_EVT + 10)
194#define SMP_BR_DISCARD_SEC_REQ_EVT (SMP_BR_SELF_DEF_EVT + 11)
195#define SMP_BR_MAX_EVT (SMP_BR_SELF_DEF_EVT + 12)
196typedef uint8_t tSMP_BR_EVENT;
197
198/* SMP over BR/EDR pairing states */
199enum {
200  SMP_BR_STATE_IDLE = SMP_STATE_IDLE,
201  SMP_BR_STATE_WAIT_APP_RSP,
202  SMP_BR_STATE_PAIR_REQ_RSP,
203  SMP_BR_STATE_BOND_PENDING,
204  SMP_BR_STATE_MAX
205};
206typedef uint8_t tSMP_BR_STATE;
207
208enum {
209  SMP_KEY_TYPE_TK,
210  SMP_KEY_TYPE_CFM,
211  SMP_KEY_TYPE_CMP,
212  SMP_KEY_TYPE_PEER_DHK_CHCK,
213  SMP_KEY_TYPE_STK,
214  SMP_KEY_TYPE_LTK
215};
216typedef struct {
217  uint8_t key_type;
218  uint8_t* p_data;
219} tSMP_KEY;
220
221typedef union {
222  uint8_t* p_data; /* uint8_t type data pointer */
223  tSMP_KEY key;
224  uint8_t status;
225  uint16_t reason;
226  uint32_t passkey;
227  tSMP_OOB_DATA_TYPE req_oob_type;
228} tSMP_INT_DATA;
229
230/* internal status mask */
231#define SMP_PAIR_FLAGS_WE_STARTED_DD (1)
232#define SMP_PAIR_FLAGS_PEER_STARTED_DD (1 << 1)
233#define SMP_PAIR_FLAGS_CMD_CONFIRM (1 << SMP_OPCODE_CONFIRM) /* 1 << 3 */
234#define SMP_PAIR_FLAG_ENC_AFTER_PAIR (1 << 4)
235#define SMP_PAIR_FLAG_HAVE_PEER_DHK_CHK \
236  (1 << 5) /* used on slave to resolve race condition */
237#define SMP_PAIR_FLAG_HAVE_PEER_PUBL_KEY \
238  (1 << 6) /* used on slave to resolve race condition */
239#define SMP_PAIR_FLAG_HAVE_PEER_COMM \
240  (1 << 7) /* used to resolve race condition */
241#define SMP_PAIR_FLAG_HAVE_LOCAL_PUBL_KEY \
242  (1 << 8) /* used on slave to resolve race condition */
243
244/* check if authentication requirement need MITM protection */
245#define SMP_NO_MITM_REQUIRED(x) (((x)&SMP_AUTH_YN_BIT) == 0)
246
247#define SMP_ENCRYT_KEY_SIZE 16
248#define SMP_ENCRYT_DATA_SIZE 16
249#define SMP_ECNCRPYT_STATUS HCI_SUCCESS
250
251typedef struct {
252  RawAddress bd_addr;
253  BT_HDR* p_copy;
254} tSMP_REQ_Q_ENTRY;
255
256/* SMP control block */
257typedef struct {
258  tSMP_CALLBACK* p_callback;
259  alarm_t* smp_rsp_timer_ent;
260  uint8_t trace_level;
261  RawAddress pairing_bda;
262  tSMP_STATE state;
263  bool derive_lk;
264  bool id_addr_rcvd;
265  tBLE_ADDR_TYPE id_addr_type;
266  RawAddress id_addr;
267  bool smp_over_br;
268  tSMP_BR_STATE br_state; /* if SMP over BR/ERD has priority over SMP */
269  uint8_t failure;
270  uint8_t status;
271  uint8_t role;
272  uint16_t flags;
273  uint8_t cb_evt;
274  tSMP_SEC_LEVEL sec_level;
275  bool connect_initialized;
276  BT_OCTET16 confirm;
277  BT_OCTET16 rconfirm;
278  BT_OCTET16 rrand; /* for SC this is peer nonce */
279  BT_OCTET16 rand;  /* for SC this is local nonce */
280  BT_OCTET32 private_key;
281  BT_OCTET32 dhkey;
282  BT_OCTET16 commitment;
283  BT_OCTET16 remote_commitment;
284  BT_OCTET16 local_random; /* local randomizer - passkey or OOB randomizer */
285  BT_OCTET16 peer_random;  /* peer randomizer - passkey or OOB randomizer */
286  BT_OCTET16 dhkey_check;
287  BT_OCTET16 remote_dhkey_check;
288  tSMP_PUBLIC_KEY loc_publ_key;
289  tSMP_PUBLIC_KEY peer_publ_key;
290  tSMP_OOB_DATA_TYPE req_oob_type;
291  tSMP_SC_OOB_DATA sc_oob_data;
292  tSMP_IO_CAP peer_io_caps;
293  tSMP_IO_CAP local_io_capability;
294  tSMP_OOB_FLAG peer_oob_flag;
295  tSMP_OOB_FLAG loc_oob_flag;
296  tSMP_AUTH_REQ peer_auth_req;
297  tSMP_AUTH_REQ loc_auth_req;
298  bool secure_connections_only_mode_required; /* true if locally SM is required
299                                                 to operate */
300  /* either in Secure Connections mode or not at all */
301  tSMP_ASSO_MODEL selected_association_model;
302  bool le_secure_connections_mode_is_used;
303  bool key_derivation_h7_used;
304  bool le_sc_kp_notif_is_used;
305  tSMP_SC_KEY_TYPE local_keypress_notification;
306  tSMP_SC_KEY_TYPE peer_keypress_notification;
307  uint8_t
308      round; /* authentication stage 1 round for passkey association model */
309  uint32_t number_to_display;
310  BT_OCTET16 mac_key;
311  uint8_t peer_enc_size;
312  uint8_t loc_enc_size;
313  uint8_t peer_i_key;
314  uint8_t peer_r_key;
315  uint8_t local_i_key;
316  uint8_t local_r_key;
317
318  BT_OCTET16 tk;
319  BT_OCTET16 ltk;
320  uint16_t div;
321  BT_OCTET16 csrk; /* storage for local CSRK */
322  uint16_t ediv;
323  BT_OCTET8 enc_rand;
324  uint8_t addr_type;
325  RawAddress local_bda;
326  bool is_pair_cancel;
327  bool discard_sec_req;
328  uint8_t rcvd_cmd_code;
329  uint8_t rcvd_cmd_len;
330  uint16_t total_tx_unacked;
331  bool wait_for_authorization_complete;
332  uint8_t cert_failure; /*failure case for certification */
333  alarm_t* delayed_auth_timer_ent;
334} tSMP_CB;
335
336/* Server Action functions are of this type */
337typedef void (*tSMP_ACT)(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
338
339extern tSMP_CB smp_cb;
340
341/* Functions provided by att_main.cc */
342extern void smp_init(void);
343
344/* smp main */
345extern void smp_sm_event(tSMP_CB* p_cb, tSMP_EVENT event,
346                         tSMP_INT_DATA* p_data);
347
348extern void smp_proc_sec_request(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
349extern void smp_set_fail_nc(bool enable);
350extern void smp_set_fail_conf(bool enable);
351extern void smp_set_passk_entry_fail(bool enable);
352extern void smp_set_oob_fail(bool enable);
353extern void smp_set_peer_sc_notif(bool enable);
354extern void smp_aes_cmac_rfc4493_chk(uint8_t* key, uint8_t* msg,
355                                     uint8_t msg_len, uint8_t mac_len,
356                                     uint8_t* mac);
357extern void smp_f4_calc_chk(uint8_t* U, uint8_t* V, uint8_t* X, uint8_t* Z,
358                            uint8_t* mac);
359extern void smp_g2_calc_chk(uint8_t* U, uint8_t* V, uint8_t* X, uint8_t* Y);
360extern void smp_h6_calc_chk(uint8_t* key, uint8_t* key_id, uint8_t* mac);
361extern void smp_f5_key_calc_chk(uint8_t* w, uint8_t* mac);
362extern void smp_f5_mackey_or_ltk_calc_chk(uint8_t* t, uint8_t* counter,
363                                          uint8_t* key_id, uint8_t* n1,
364                                          uint8_t* n2, uint8_t* a1, uint8_t* a2,
365                                          uint8_t* length, uint8_t* mac);
366extern void smp_f5_calc_chk(uint8_t* w, uint8_t* n1, uint8_t* n2, uint8_t* a1,
367                            uint8_t* a2, uint8_t* mac_key, uint8_t* ltk);
368extern void smp_f6_calc_chk(uint8_t* w, uint8_t* n1, uint8_t* n2, uint8_t* r,
369                            uint8_t* iocap, uint8_t* a1, uint8_t* a2,
370                            uint8_t* mac);
371extern tSMP_STATE smp_get_state(void);
372extern void smp_set_state(tSMP_STATE state);
373
374/* smp_br_main */
375extern void smp_br_state_machine_event(tSMP_CB* p_cb, tSMP_BR_EVENT event,
376                                       tSMP_INT_DATA* p_data);
377extern tSMP_BR_STATE smp_get_br_state(void);
378extern void smp_set_br_state(tSMP_BR_STATE state);
379
380/* smp_act.cc */
381extern void smp_send_pair_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
382extern void smp_send_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
383extern void smp_send_pair_fail(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
384extern void smp_send_rand(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
385extern void smp_send_pair_public_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
386extern void smp_send_commitment(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
387extern void smp_send_dhkey_check(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
388extern void smp_send_keypress_notification(tSMP_CB* p_cb,
389                                           tSMP_INT_DATA* p_data);
390extern void smp_proc_pair_fail(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
391extern void smp_proc_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
392extern void smp_proc_rand(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
393extern void smp_process_pairing_public_key(tSMP_CB* p_cb,
394                                           tSMP_INT_DATA* p_data);
395extern void smp_proc_enc_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
396extern void smp_proc_master_id(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
397extern void smp_proc_id_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
398extern void smp_proc_id_addr(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
399extern void smp_proc_sec_grant(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
400extern void smp_proc_sec_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
401extern void smp_proc_sl_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
402extern void smp_start_enc(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
403extern void smp_enc_cmpl(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
404extern void smp_proc_discard(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
405extern void smp_pairing_cmpl(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
406extern void smp_decide_association_model(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
407extern void smp_send_app_cback(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
408extern void smp_proc_compare(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
409extern void smp_check_auth_req(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
410extern void smp_process_io_response(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
411extern void smp_send_id_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
412extern void smp_send_enc_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
413extern void smp_send_csrk_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
414extern void smp_send_ltk_reply(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
415extern void smp_proc_pair_cmd(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
416extern void smp_pair_terminate(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
417extern void smp_idle_terminate(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
418extern void smp_send_pair_rsp(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
419extern void smp_key_distribution(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
420extern void smp_proc_srk_info(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
421extern void smp_generate_csrk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
422extern void smp_fast_conn_param(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
423extern void smp_key_pick_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
424extern void smp_both_have_public_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
425extern void smp_start_secure_connection_phase1(tSMP_CB* p_cb,
426                                               tSMP_INT_DATA* p_data);
427extern void smp_process_local_nonce(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
428extern void smp_process_pairing_commitment(tSMP_CB* p_cb,
429                                           tSMP_INT_DATA* p_data);
430extern void smp_process_peer_nonce(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
431extern void smp_process_dhkey_check(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
432extern void smp_match_dhkey_checks(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
433extern void smp_process_keypress_notification(tSMP_CB* p_cb,
434                                              tSMP_INT_DATA* p_data);
435extern void smp_move_to_secure_connections_phase2(tSMP_CB* p_cb,
436                                                  tSMP_INT_DATA* p_data);
437extern void smp_phase_2_dhkey_checks_are_present(tSMP_CB* p_cb,
438                                                 tSMP_INT_DATA* p_data);
439extern void smp_wait_for_both_public_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
440extern void smp_start_passkey_verification(tSMP_CB* p_cb,
441                                           tSMP_INT_DATA* p_data);
442extern void smp_process_secure_connection_oob_data(tSMP_CB* p_cb,
443                                                   tSMP_INT_DATA* p_data);
444extern void smp_process_secure_connection_long_term_key(void);
445extern void smp_set_local_oob_keys(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
446extern void smp_set_local_oob_random_commitment(tSMP_CB* p_cb,
447                                                tSMP_INT_DATA* p_data);
448extern void smp_set_derive_link_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
449extern void smp_derive_link_key_from_long_term_key(tSMP_CB* p_cb,
450                                                   tSMP_INT_DATA* p_data);
451extern void smp_br_process_pairing_command(tSMP_CB* p_cb,
452                                           tSMP_INT_DATA* p_data);
453extern void smp_br_process_security_grant(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
454extern void smp_br_process_slave_keys_response(tSMP_CB* p_cb,
455                                               tSMP_INT_DATA* p_data);
456extern void smp_br_send_pair_response(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
457extern void smp_br_check_authorization_request(tSMP_CB* p_cb,
458                                               tSMP_INT_DATA* p_data);
459extern void smp_br_select_next_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
460extern void smp_br_process_link_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
461extern void smp_key_distribution_by_transport(tSMP_CB* p_cb,
462                                              tSMP_INT_DATA* p_data);
463extern void smp_br_pairing_complete(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
464
465/* smp_l2c */
466extern void smp_l2cap_if_init(void);
467extern void smp_data_ind(const RawAddress& bd_addr, BT_HDR* p_buf);
468
469/* smp_util.cc */
470extern bool smp_send_cmd(uint8_t cmd_code, tSMP_CB* p_cb);
471extern void smp_cb_cleanup(tSMP_CB* p_cb);
472extern void smp_reset_control_value(tSMP_CB* p_cb);
473extern void smp_proc_pairing_cmpl(tSMP_CB* p_cb);
474extern void smp_convert_string_to_tk(BT_OCTET16 tk, uint32_t passkey);
475extern void smp_mask_enc_key(uint8_t loc_enc_size, uint8_t* p_data);
476extern void smp_rsp_timeout(void* data);
477extern void smp_delayed_auth_complete_timeout(void* data);
478extern void smp_xor_128(BT_OCTET16 a, BT_OCTET16 b);
479extern bool smp_encrypt_data(uint8_t* key, uint8_t key_len, uint8_t* plain_text,
480                             uint8_t pt_len, tSMP_ENC* p_out);
481extern bool smp_command_has_invalid_parameters(tSMP_CB* p_cb);
482extern void smp_reject_unexpected_pairing_command(const RawAddress& bd_addr);
483extern tSMP_ASSO_MODEL smp_select_association_model(tSMP_CB* p_cb);
484extern void smp_reverse_array(uint8_t* arr, uint8_t len);
485extern uint8_t smp_calculate_random_input(uint8_t* random, uint8_t round);
486extern void smp_collect_local_io_capabilities(uint8_t* iocap, tSMP_CB* p_cb);
487extern void smp_collect_peer_io_capabilities(uint8_t* iocap, tSMP_CB* p_cb);
488extern void smp_collect_local_ble_address(uint8_t* le_addr, tSMP_CB* p_cb);
489extern void smp_collect_peer_ble_address(uint8_t* le_addr, tSMP_CB* p_cb);
490extern bool smp_check_commitment(tSMP_CB* p_cb);
491extern void smp_save_secure_connections_long_term_key(tSMP_CB* p_cb);
492extern bool smp_calculate_f5_mackey_and_long_term_key(tSMP_CB* p_cb);
493extern void smp_remove_fixed_channel(tSMP_CB* p_cb);
494extern bool smp_request_oob_data(tSMP_CB* p_cb);
495
496/* smp_keys.cc */
497extern void smp_generate_srand_mrand_confirm(tSMP_CB* p_cb,
498                                             tSMP_INT_DATA* p_data);
499extern void smp_generate_compare(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
500extern void smp_generate_stk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
501extern void smp_generate_ltk(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
502extern void smp_generate_passkey(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
503extern void smp_generate_rand_cont(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
504extern void smp_create_private_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
505extern void smp_use_oob_private_key(tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
506extern void smp_compute_dhkey(tSMP_CB* p_cb);
507extern void smp_calculate_local_commitment(tSMP_CB* p_cb);
508extern void smp_calculate_peer_commitment(tSMP_CB* p_cb, BT_OCTET16 output_buf);
509extern void smp_calculate_numeric_comparison_display_number(
510    tSMP_CB* p_cb, tSMP_INT_DATA* p_data);
511extern void smp_calculate_local_dhkey_check(tSMP_CB* p_cb,
512                                            tSMP_INT_DATA* p_data);
513extern void smp_calculate_peer_dhkey_check(tSMP_CB* p_cb,
514                                           tSMP_INT_DATA* p_data);
515extern void smp_start_nonce_generation(tSMP_CB* p_cb);
516extern bool smp_calculate_link_key_from_long_term_key(tSMP_CB* p_cb);
517extern bool smp_calculate_long_term_key_from_link_key(tSMP_CB* p_cb);
518extern void smp_calculate_f4(uint8_t* u, uint8_t* v, uint8_t* x, uint8_t z,
519                             uint8_t* c);
520extern uint32_t smp_calculate_g2(uint8_t* u, uint8_t* v, uint8_t* x,
521                                 uint8_t* y);
522extern bool smp_calculate_f5(uint8_t* w, uint8_t* n1, uint8_t* n2, uint8_t* a1,
523                             uint8_t* a2, uint8_t* mac_key, uint8_t* ltk);
524extern bool smp_calculate_f5_mackey_or_long_term_key(
525    uint8_t* t, uint8_t* counter, uint8_t* key_id, uint8_t* n1, uint8_t* n2,
526    uint8_t* a1, uint8_t* a2, uint8_t* length, uint8_t* mac);
527extern bool smp_calculate_f5_key(uint8_t* w, uint8_t* t);
528extern bool smp_calculate_f6(uint8_t* w, uint8_t* n1, uint8_t* n2, uint8_t* r,
529                             uint8_t* iocap, uint8_t* a1, uint8_t* a2,
530                             uint8_t* f3);
531extern bool smp_calculate_h6(uint8_t* w, uint8_t* keyid, uint8_t* h2);
532extern bool smp_calculate_h7(uint8_t* salt, uint8_t* w, uint8_t* h2);
533#if (SMP_DEBUG == TRUE)
534extern void smp_debug_print_nbyte_little_endian(uint8_t* p,
535                                                const char* key_name,
536                                                uint8_t len);
537#endif
538
539/* smp_cmac.cc */
540extern bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input,
541                                     uint16_t length, uint16_t tlen,
542                                     uint8_t* p_signature);
543extern void print128(BT_OCTET16 x, const uint8_t* key_name);
544
545#endif /* SMP_INT_H */
546