MIPS: smp-cps: Clear Status IPL field when using EIC
[linux-2.6-block.git] / net / bluetooth / smp.h
CommitLineData
eb492e01
AB
1/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
4
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
8
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
21*/
22
aff2cae3
VT
23#ifndef __SMP_H
24#define __SMP_H
25
26struct smp_command_hdr {
27 __u8 code;
28} __packed;
29
30#define SMP_CMD_PAIRING_REQ 0x01
31#define SMP_CMD_PAIRING_RSP 0x02
32struct smp_cmd_pairing {
33 __u8 io_capability;
34 __u8 oob_flag;
35 __u8 auth_req;
36 __u8 max_key_size;
37 __u8 init_key_dist;
38 __u8 resp_key_dist;
39} __packed;
40
88ba43b6
AB
41#define SMP_IO_DISPLAY_ONLY 0x00
42#define SMP_IO_DISPLAY_YESNO 0x01
43#define SMP_IO_KEYBOARD_ONLY 0x02
44#define SMP_IO_NO_INPUT_OUTPUT 0x03
45#define SMP_IO_KEYBOARD_DISPLAY 0x04
46
47#define SMP_OOB_NOT_PRESENT 0x00
48#define SMP_OOB_PRESENT 0x01
49
50#define SMP_DIST_ENC_KEY 0x01
51#define SMP_DIST_ID_KEY 0x02
52#define SMP_DIST_SIGN 0x04
e65392e2 53#define SMP_DIST_LINK_KEY 0x08
88ba43b6
AB
54
55#define SMP_AUTH_NONE 0x00
56#define SMP_AUTH_BONDING 0x01
57#define SMP_AUTH_MITM 0x04
e65392e2
JH
58#define SMP_AUTH_SC 0x08
59#define SMP_AUTH_KEYPRESS 0x10
88ba43b6 60
aff2cae3
VT
61#define SMP_CMD_PAIRING_CONFIRM 0x03
62struct smp_cmd_pairing_confirm {
63 __u8 confirm_val[16];
64} __packed;
65
66#define SMP_CMD_PAIRING_RANDOM 0x04
67struct smp_cmd_pairing_random {
68 __u8 rand_val[16];
69} __packed;
70
71#define SMP_CMD_PAIRING_FAIL 0x05
72struct smp_cmd_pairing_fail {
73 __u8 reason;
74} __packed;
75
76#define SMP_CMD_ENCRYPT_INFO 0x06
77struct smp_cmd_encrypt_info {
78 __u8 ltk[16];
79} __packed;
80
81#define SMP_CMD_MASTER_IDENT 0x07
82struct smp_cmd_master_ident {
58115373 83 __le16 ediv;
fe39c7b2 84 __le64 rand;
aff2cae3
VT
85} __packed;
86
87#define SMP_CMD_IDENT_INFO 0x08
88struct smp_cmd_ident_info {
89 __u8 irk[16];
90} __packed;
91
92#define SMP_CMD_IDENT_ADDR_INFO 0x09
93struct smp_cmd_ident_addr_info {
94 __u8 addr_type;
95 bdaddr_t bdaddr;
96} __packed;
97
98#define SMP_CMD_SIGN_INFO 0x0a
99struct smp_cmd_sign_info {
100 __u8 csrk[16];
101} __packed;
102
103#define SMP_CMD_SECURITY_REQ 0x0b
104struct smp_cmd_security_req {
105 __u8 auth_req;
106} __packed;
107
e65392e2
JH
108#define SMP_CMD_PUBLIC_KEY 0x0c
109struct smp_cmd_public_key {
110 __u8 x[32];
111 __u8 y[32];
112} __packed;
113
114#define SMP_CMD_DHKEY_CHECK 0x0d
115struct smp_cmd_dhkey_check {
116 __u8 e[16];
117} __packed;
118
119#define SMP_CMD_KEYPRESS_NOTIFY 0x0e
120struct smp_cmd_keypress_notify {
121 __u8 value;
122} __packed;
123
124#define SMP_CMD_MAX 0x0e
b28b4943 125
aff2cae3
VT
126#define SMP_PASSKEY_ENTRY_FAILED 0x01
127#define SMP_OOB_NOT_AVAIL 0x02
128#define SMP_AUTH_REQUIREMENTS 0x03
129#define SMP_CONFIRM_FAILED 0x04
130#define SMP_PAIRING_NOTSUPP 0x05
131#define SMP_ENC_KEY_SIZE 0x06
b93a6829
AE
132#define SMP_CMD_NOTSUPP 0x07
133#define SMP_UNSPECIFIED 0x08
aff2cae3 134#define SMP_REPEATED_ATTEMPTS 0x09
38e4a915 135#define SMP_INVALID_PARAMS 0x0a
e65392e2
JH
136#define SMP_DHKEY_CHECK_FAILED 0x0b
137#define SMP_NUMERIC_COMP_FAILED 0x0c
138#define SMP_BREDR_PAIRING_IN_PROGRESS 0x0d
139#define SMP_CROSS_TRANSP_NOT_ALLOWED 0x0e
aff2cae3 140
3158c50c
VCG
141#define SMP_MIN_ENC_KEY_SIZE 7
142#define SMP_MAX_ENC_KEY_SIZE 16
143
2ceba539
JH
144/* LTK types used in internal storage (struct smp_ltk) */
145enum {
146 SMP_STK,
147 SMP_LTK,
148 SMP_LTK_SLAVE,
23fb8de3
JH
149 SMP_LTK_P256,
150 SMP_LTK_P256_DEBUG,
2ceba539
JH
151};
152
23fb8de3
JH
153static inline bool smp_ltk_is_sc(struct smp_ltk *key)
154{
155 switch (key->type) {
156 case SMP_LTK_P256:
157 case SMP_LTK_P256_DEBUG:
158 return true;
159 }
160
161 return false;
162}
163
a6f7833c
JH
164static inline u8 smp_ltk_sec_level(struct smp_ltk *key)
165{
8f5eeca3
JH
166 if (key->authenticated) {
167 if (smp_ltk_is_sc(key))
168 return BT_SECURITY_FIPS;
169 else
170 return BT_SECURITY_HIGH;
171 }
a6f7833c
JH
172
173 return BT_SECURITY_MEDIUM;
174}
175
35dc6f83
JH
176/* Key preferences for smp_sufficient security */
177enum smp_key_pref {
178 SMP_ALLOW_STK,
179 SMP_USE_LTK,
180};
181
eb492e01 182/* SMP Commands */
c81d555a 183void smp_cancel_pairing(struct hci_conn *hcon);
35dc6f83
JH
184bool smp_sufficient_security(struct hci_conn *hcon, u8 sec_level,
185 enum smp_key_pref key_pref);
cc110922 186int smp_conn_security(struct hci_conn *hcon, __u8 sec_level);
2b64d153 187int smp_user_confirm_reply(struct hci_conn *conn, u16 mgmt_op, __le32 passkey);
eb492e01 188
cd082797
JH
189bool smp_irk_matches(struct hci_dev *hdev, const u8 irk[16],
190 const bdaddr_t *bdaddr);
191int smp_generate_rpa(struct hci_dev *hdev, const u8 irk[16], bdaddr_t *rpa);
60a27d65 192int smp_generate_oob(struct hci_dev *hdev, u8 hash[16], u8 rand[16]);
60478054 193
711eafe3
JH
194int smp_register(struct hci_dev *hdev);
195void smp_unregister(struct hci_dev *hdev);
196
0a2b0f04
JH
197#if IS_ENABLED(CONFIG_BT_SELFTEST_SMP)
198
199int bt_selftest_smp(void);
200
201#else
202
203static inline int bt_selftest_smp(void)
204{
205 return 0;
206}
207
208#endif
209
aff2cae3 210#endif /* __SMP_H */