|  | /* | 
|  | * Copyright (c) 2017 Intel Corporation | 
|  | * Copyright (c) 2022 Nordic Semiconductor ASA | 
|  | * | 
|  | * SPDX-License-Identifier: Apache-2.0 | 
|  | */ | 
|  |  | 
|  | #include <string.h> | 
|  | #include <stdbool.h> | 
|  | #include <errno.h> | 
|  | #include <zephyr/sys/byteorder.h> | 
|  | #include <zephyr/bluetooth/mesh.h> | 
|  |  | 
|  | #include "common/bt_str.h" | 
|  |  | 
|  | #include "mesh.h" | 
|  | #include "crypto.h" | 
|  |  | 
|  | #define LOG_LEVEL CONFIG_BT_MESH_CRYPTO_LOG_LEVEL | 
|  | #include <zephyr/logging/log.h> | 
|  | LOG_MODULE_REGISTER(bt_mesh_crypto); | 
|  |  | 
|  | #define NET_MIC_LEN(pdu) (((pdu)[1] & 0x80) ? 8 : 4) | 
|  | #define APP_MIC_LEN(aszmic) ((aszmic) ? 8 : 4) | 
|  |  | 
|  | static int bt_mesh_aes_cmac_one_raw_key(const uint8_t key[16], const void *m, | 
|  | size_t len, uint8_t mac[16]) | 
|  | { | 
|  | struct bt_mesh_sg sg = {.data = m, .len = len}; | 
|  |  | 
|  | return bt_mesh_aes_cmac_raw_key(key, &sg, 1, mac); | 
|  | } | 
|  |  | 
|  | static int bt_mesh_aes_cmac_one_mesh_key(const struct bt_mesh_key *key, const void *m, | 
|  | size_t len, uint8_t mac[16]) | 
|  | { | 
|  | struct bt_mesh_sg sg = {.data = m, .len = len}; | 
|  |  | 
|  | return bt_mesh_aes_cmac_mesh_key(key, &sg, 1, mac); | 
|  | } | 
|  |  | 
|  | static int bt_mesh_sha256_hmac_one_raw_key(const uint8_t key[32], const void *m, size_t len, | 
|  | uint8_t mac[32]) | 
|  | { | 
|  | struct bt_mesh_sg sg = {.data = m, .len = len}; | 
|  |  | 
|  | return bt_mesh_sha256_hmac_raw_key(key, &sg, 1, mac); | 
|  | } | 
|  |  | 
|  | int bt_mesh_s1(const char *m, size_t m_len, uint8_t salt[16]) | 
|  | { | 
|  | const uint8_t zero[16] = { 0 }; | 
|  |  | 
|  | return bt_mesh_aes_cmac_one_raw_key(zero, m, m_len, salt); | 
|  | } | 
|  |  | 
|  | int bt_mesh_s2(const char *m, size_t m_len, uint8_t salt[32]) | 
|  | { | 
|  | const uint8_t zero[32] = { 0 }; | 
|  |  | 
|  | return bt_mesh_sha256_hmac_one_raw_key(zero, m, m_len, salt); | 
|  | } | 
|  |  | 
|  | int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], | 
|  | const char *info, uint8_t okm[16]) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(salt, ikm, ikm_len, okm); | 
|  | if (err < 0) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | return bt_mesh_aes_cmac_one_raw_key(okm, info, strlen(info), okm); | 
|  | } | 
|  |  | 
|  | int bt_mesh_k2(const uint8_t n[16], const uint8_t *p, size_t p_len, | 
|  | uint8_t net_id[1], struct bt_mesh_key *enc_key, struct bt_mesh_key *priv_key) | 
|  | { | 
|  | struct bt_mesh_sg sg[3]; | 
|  | uint8_t salt[16]; | 
|  | uint8_t out[16]; | 
|  | uint8_t t[16]; | 
|  | uint8_t pad; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG("n %s", bt_hex(n, 16)); | 
|  | LOG_DBG("p %s", bt_hex(p, p_len)); | 
|  |  | 
|  | err = bt_mesh_s1_str("smk2", salt); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(salt, n, 16, t); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | pad = 0x01; | 
|  |  | 
|  | sg[0].data = NULL; | 
|  | sg[0].len  = 0; | 
|  | sg[1].data = p; | 
|  | sg[1].len  = p_len; | 
|  | sg[2].data = &pad; | 
|  | sg[2].len  = sizeof(pad); | 
|  |  | 
|  | err = bt_mesh_aes_cmac_raw_key(t, sg, ARRAY_SIZE(sg), out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | net_id[0] = out[15] & 0x7f; | 
|  |  | 
|  | sg[0].data = out; | 
|  | sg[0].len  = sizeof(out); | 
|  | pad = 0x02; | 
|  |  | 
|  | err = bt_mesh_aes_cmac_raw_key(t, sg, ARRAY_SIZE(sg), out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_key_import(BT_MESH_KEY_TYPE_CCM, out, enc_key); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | pad = 0x03; | 
|  |  | 
|  | err = bt_mesh_aes_cmac_raw_key(t, sg, ARRAY_SIZE(sg), out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_key_import(BT_MESH_KEY_TYPE_ECB, out, priv_key); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | LOG_DBG("NID 0x%02x enc_key %s", net_id[0], bt_hex(enc_key, sizeof(struct bt_mesh_key))); | 
|  | LOG_DBG("priv_key %s", bt_hex(priv_key, sizeof(struct bt_mesh_key))); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_k3(const uint8_t n[16], uint8_t out[8]) | 
|  | { | 
|  | uint8_t id64[] = { 'i', 'd', '6', '4', 0x01 }; | 
|  | uint8_t tmp[16]; | 
|  | uint8_t t[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_s1_str("smk3", tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(tmp, n, 16, t); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(t, id64, sizeof(id64), tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | memcpy(out, tmp + 8, 8); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_k4(const uint8_t n[16], uint8_t out[1]) | 
|  | { | 
|  | uint8_t id6[] = { 'i', 'd', '6', 0x01 }; | 
|  | uint8_t tmp[16]; | 
|  | uint8_t t[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_s1_str("smk4", tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(tmp, n, 16, t); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(t, id6, sizeof(id6), tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | out[0] = tmp[15] & BIT_MASK(6); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_k5(const uint8_t *n, size_t n_len, const uint8_t salt[32], | 
|  | uint8_t *p, uint8_t out[32]) | 
|  | { | 
|  | uint8_t t[32]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_sha256_hmac_one_raw_key(salt, n, n_len, t); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_sha256_hmac_one_raw_key(t, p, strlen(p), out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_id128(const uint8_t n[16], const char *s, enum bt_mesh_key_type type, | 
|  | struct bt_mesh_key *out) | 
|  | { | 
|  | const char *id128 = "id128\x01"; | 
|  | uint8_t salt[16]; | 
|  | uint8_t k1_out[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_s1_str(s, salt); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_k1(n, 16, salt, id128, k1_out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_key_import(type, k1_out, out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_nonce(const uint8_t dhkey[32], const uint8_t prov_salt[16], uint8_t nonce[13]) | 
|  | { | 
|  | uint8_t tmp[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_k1(dhkey, 32, prov_salt, "prsn", tmp); | 
|  | if (!err) { | 
|  | memcpy(nonce, tmp + 3, 13); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_session_key(const uint8_t dhkey[32], const uint8_t prov_salt[16], | 
|  | struct bt_mesh_key *session_key) | 
|  | { | 
|  | uint8_t raw_key[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_k1(dhkey, 32, prov_salt, "prsk", raw_key); | 
|  |  | 
|  | if (!err) { | 
|  | LOG_DBG("SessionKey: %s", bt_hex(raw_key, 16)); | 
|  | err = bt_mesh_key_import(BT_MESH_KEY_TYPE_CCM, raw_key, session_key); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_dev_key(const uint8_t dhkey[32], const uint8_t prov_salt[16], uint8_t dev_key[16]) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_k1(dhkey, 32, prov_salt, "prdk", dev_key); | 
|  |  | 
|  | if (!err) { | 
|  | LOG_DBG("DevKey: %s", bt_hex(dev_key, 16)); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static void create_proxy_nonce(uint8_t nonce[13], const uint8_t *pdu, | 
|  | uint32_t iv_index) | 
|  | { | 
|  | memset(nonce, 0, 13); | 
|  |  | 
|  | /* Nonce Type */ | 
|  | nonce[0] = 0x03; | 
|  |  | 
|  | /* Sequence Number */ | 
|  | nonce[2] = pdu[2]; | 
|  | nonce[3] = pdu[3]; | 
|  | nonce[4] = pdu[4]; | 
|  |  | 
|  | /* Source Address */ | 
|  | nonce[5] = pdu[5]; | 
|  | nonce[6] = pdu[6]; | 
|  |  | 
|  | /* IV Index */ | 
|  | sys_put_be32(iv_index, &nonce[9]); | 
|  | } | 
|  |  | 
|  | static void create_proxy_sol_nonce(uint8_t nonce[13], const uint8_t *pdu) | 
|  | { | 
|  | memset(nonce, 0, 13); | 
|  |  | 
|  | /* Nonce Type */ | 
|  | nonce[0] = 0x04; | 
|  |  | 
|  | /* Sequence Number */ | 
|  | nonce[2] = pdu[2]; | 
|  | nonce[3] = pdu[3]; | 
|  | nonce[4] = pdu[4]; | 
|  |  | 
|  | /* Source Address */ | 
|  | nonce[5] = pdu[5]; | 
|  | nonce[6] = pdu[6]; | 
|  | } | 
|  |  | 
|  | static void create_net_nonce(uint8_t nonce[13], const uint8_t *pdu, | 
|  | uint32_t iv_index) | 
|  | { | 
|  | /* Nonce Type */ | 
|  | nonce[0] = 0x00; | 
|  |  | 
|  | /* FRND + TTL */ | 
|  | nonce[1] = pdu[1]; | 
|  |  | 
|  | /* Sequence Number */ | 
|  | nonce[2] = pdu[2]; | 
|  | nonce[3] = pdu[3]; | 
|  | nonce[4] = pdu[4]; | 
|  |  | 
|  | /* Source Address */ | 
|  | nonce[5] = pdu[5]; | 
|  | nonce[6] = pdu[6]; | 
|  |  | 
|  | /* Pad */ | 
|  | nonce[7] = 0U; | 
|  | nonce[8] = 0U; | 
|  |  | 
|  | /* IV Index */ | 
|  | sys_put_be32(iv_index, &nonce[9]); | 
|  | } | 
|  |  | 
|  | int bt_mesh_net_obfuscate(uint8_t *pdu, uint32_t iv_index, const struct bt_mesh_key *privacy_key) | 
|  | { | 
|  | uint8_t priv_rand[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, }; | 
|  | uint8_t tmp[16]; | 
|  | int err, i; | 
|  |  | 
|  | LOG_DBG("IVIndex %u, PrivacyKey %s", iv_index, | 
|  | bt_hex(privacy_key, sizeof(struct bt_mesh_key))); | 
|  |  | 
|  | sys_put_be32(iv_index, &priv_rand[5]); | 
|  | memcpy(&priv_rand[9], &pdu[7], 7); | 
|  |  | 
|  | LOG_DBG("PrivacyRandom %s", bt_hex(priv_rand, 16)); | 
|  |  | 
|  | err = bt_mesh_encrypt(privacy_key, priv_rand, tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < 6; i++) { | 
|  | pdu[1 + i] ^= tmp[i]; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_net_encrypt(const struct bt_mesh_key *key, struct net_buf_simple *buf, | 
|  | uint32_t iv_index, enum bt_mesh_nonce_type type) | 
|  | { | 
|  | uint8_t mic_len = NET_MIC_LEN(buf->data); | 
|  | uint8_t nonce[13]; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG("IVIndex %u EncKey %s mic_len %u", iv_index, | 
|  | bt_hex(key, sizeof(struct bt_mesh_key)), mic_len); | 
|  | LOG_DBG("PDU (len %u) %s", buf->len, bt_hex(buf->data, buf->len)); | 
|  |  | 
|  | if (IS_ENABLED(CONFIG_BT_MESH_PROXY) && type == BT_MESH_NONCE_PROXY) { | 
|  | create_proxy_nonce(nonce, buf->data, iv_index); | 
|  | } else if (IS_ENABLED(CONFIG_BT_MESH_OD_PRIV_PROXY_SRV) && | 
|  | type == BT_MESH_NONCE_SOLICITATION) { | 
|  | create_proxy_sol_nonce(nonce, buf->data); | 
|  | } else { | 
|  | create_net_nonce(nonce, buf->data, iv_index); | 
|  | } | 
|  |  | 
|  | LOG_DBG("Nonce %s", bt_hex(nonce, 13)); | 
|  |  | 
|  | err = bt_mesh_ccm_encrypt(key, nonce, &buf->data[7], buf->len - 7, NULL, 0, | 
|  | &buf->data[7], mic_len); | 
|  | if (!err) { | 
|  | net_buf_simple_add(buf, mic_len); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_net_decrypt(const struct bt_mesh_key *key, struct net_buf_simple *buf, | 
|  | uint32_t iv_index, enum bt_mesh_nonce_type type) | 
|  | { | 
|  | uint8_t mic_len = NET_MIC_LEN(buf->data); | 
|  | uint8_t nonce[13]; | 
|  |  | 
|  | LOG_DBG("PDU (%u bytes) %s", buf->len, bt_hex(buf->data, buf->len)); | 
|  | LOG_DBG("iv_index %u, key %s mic_len %u", iv_index, bt_hex(key, sizeof(struct bt_mesh_key)), | 
|  | mic_len); | 
|  |  | 
|  | if (IS_ENABLED(CONFIG_BT_MESH_PROXY) && type == BT_MESH_NONCE_PROXY) { | 
|  | create_proxy_nonce(nonce, buf->data, iv_index); | 
|  | } else if (IS_ENABLED(CONFIG_BT_MESH_SOLICITATION) && | 
|  | type == BT_MESH_NONCE_SOLICITATION) { | 
|  | create_proxy_sol_nonce(nonce, buf->data); | 
|  | } else { | 
|  | create_net_nonce(nonce, buf->data, iv_index); | 
|  | } | 
|  |  | 
|  | LOG_DBG("Nonce %s", bt_hex(nonce, 13)); | 
|  |  | 
|  | buf->len -= mic_len; | 
|  |  | 
|  | return bt_mesh_ccm_decrypt(key, nonce, &buf->data[7], buf->len - 7, NULL, 0, | 
|  | &buf->data[7], mic_len); | 
|  | } | 
|  |  | 
|  | static void create_app_nonce(uint8_t nonce[13], | 
|  | const struct bt_mesh_app_crypto_ctx *ctx) | 
|  | { | 
|  | if (ctx->dev_key) { | 
|  | nonce[0] = 0x02; | 
|  | } else { | 
|  | nonce[0] = 0x01; | 
|  | } | 
|  |  | 
|  | sys_put_be32((ctx->seq_num | ((uint32_t)ctx->aszmic << 31)), &nonce[1]); | 
|  |  | 
|  | sys_put_be16(ctx->src, &nonce[5]); | 
|  | sys_put_be16(ctx->dst, &nonce[7]); | 
|  |  | 
|  | sys_put_be32(ctx->iv_index, &nonce[9]); | 
|  | } | 
|  |  | 
|  | int bt_mesh_app_encrypt(const struct bt_mesh_key *key, const struct bt_mesh_app_crypto_ctx *ctx, | 
|  | struct net_buf_simple *buf) | 
|  | { | 
|  | uint8_t nonce[13]; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG("AppKey %s", bt_hex(key, sizeof(struct bt_mesh_key))); | 
|  | LOG_DBG("dev_key %u src 0x%04x dst 0x%04x", ctx->dev_key, ctx->src, ctx->dst); | 
|  | LOG_DBG("seq_num 0x%08x iv_index 0x%08x", ctx->seq_num, ctx->iv_index); | 
|  | LOG_DBG("Clear: %s", bt_hex(buf->data, buf->len)); | 
|  |  | 
|  | create_app_nonce(nonce, ctx); | 
|  |  | 
|  | LOG_DBG("Nonce  %s", bt_hex(nonce, 13)); | 
|  |  | 
|  | err = bt_mesh_ccm_encrypt(key, nonce, buf->data, buf->len, ctx->ad, | 
|  | ctx->ad ? 16 : 0, buf->data, | 
|  | APP_MIC_LEN(ctx->aszmic)); | 
|  | if (!err) { | 
|  | net_buf_simple_add(buf, APP_MIC_LEN(ctx->aszmic)); | 
|  | LOG_DBG("Encr: %s", bt_hex(buf->data, buf->len)); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_app_decrypt(const struct bt_mesh_key *key, const struct bt_mesh_app_crypto_ctx *ctx, | 
|  | struct net_buf_simple *buf, struct net_buf_simple *out) | 
|  | { | 
|  | uint8_t nonce[13]; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG("EncData (len %u) %s", buf->len, bt_hex(buf->data, buf->len)); | 
|  |  | 
|  | create_app_nonce(nonce, ctx); | 
|  |  | 
|  | LOG_DBG("AppKey %s", bt_hex(key, sizeof(struct bt_mesh_key))); | 
|  | LOG_DBG("Nonce  %s", bt_hex(nonce, 13)); | 
|  |  | 
|  | err = bt_mesh_ccm_decrypt(key, nonce, buf->data, buf->len, ctx->ad, | 
|  | ctx->ad ? 16 : 0, out->data, | 
|  | APP_MIC_LEN(ctx->aszmic)); | 
|  | if (!err) { | 
|  | net_buf_simple_add(out, buf->len); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | /* reversed, 8-bit, poly=0x07 */ | 
|  | static const uint8_t crc_table[256] = { | 
|  | 0x00, 0x91, 0xe3, 0x72, 0x07, 0x96, 0xe4, 0x75, | 
|  | 0x0e, 0x9f, 0xed, 0x7c, 0x09, 0x98, 0xea, 0x7b, | 
|  | 0x1c, 0x8d, 0xff, 0x6e, 0x1b, 0x8a, 0xf8, 0x69, | 
|  | 0x12, 0x83, 0xf1, 0x60, 0x15, 0x84, 0xf6, 0x67, | 
|  |  | 
|  | 0x38, 0xa9, 0xdb, 0x4a, 0x3f, 0xae, 0xdc, 0x4d, | 
|  | 0x36, 0xa7, 0xd5, 0x44, 0x31, 0xa0, 0xd2, 0x43, | 
|  | 0x24, 0xb5, 0xc7, 0x56, 0x23, 0xb2, 0xc0, 0x51, | 
|  | 0x2a, 0xbb, 0xc9, 0x58, 0x2d, 0xbc, 0xce, 0x5f, | 
|  |  | 
|  | 0x70, 0xe1, 0x93, 0x02, 0x77, 0xe6, 0x94, 0x05, | 
|  | 0x7e, 0xef, 0x9d, 0x0c, 0x79, 0xe8, 0x9a, 0x0b, | 
|  | 0x6c, 0xfd, 0x8f, 0x1e, 0x6b, 0xfa, 0x88, 0x19, | 
|  | 0x62, 0xf3, 0x81, 0x10, 0x65, 0xf4, 0x86, 0x17, | 
|  |  | 
|  | 0x48, 0xd9, 0xab, 0x3a, 0x4f, 0xde, 0xac, 0x3d, | 
|  | 0x46, 0xd7, 0xa5, 0x34, 0x41, 0xd0, 0xa2, 0x33, | 
|  | 0x54, 0xc5, 0xb7, 0x26, 0x53, 0xc2, 0xb0, 0x21, | 
|  | 0x5a, 0xcb, 0xb9, 0x28, 0x5d, 0xcc, 0xbe, 0x2f, | 
|  |  | 
|  | 0xe0, 0x71, 0x03, 0x92, 0xe7, 0x76, 0x04, 0x95, | 
|  | 0xee, 0x7f, 0x0d, 0x9c, 0xe9, 0x78, 0x0a, 0x9b, | 
|  | 0xfc, 0x6d, 0x1f, 0x8e, 0xfb, 0x6a, 0x18, 0x89, | 
|  | 0xf2, 0x63, 0x11, 0x80, 0xf5, 0x64, 0x16, 0x87, | 
|  |  | 
|  | 0xd8, 0x49, 0x3b, 0xaa, 0xdf, 0x4e, 0x3c, 0xad, | 
|  | 0xd6, 0x47, 0x35, 0xa4, 0xd1, 0x40, 0x32, 0xa3, | 
|  | 0xc4, 0x55, 0x27, 0xb6, 0xc3, 0x52, 0x20, 0xb1, | 
|  | 0xca, 0x5b, 0x29, 0xb8, 0xcd, 0x5c, 0x2e, 0xbf, | 
|  |  | 
|  | 0x90, 0x01, 0x73, 0xe2, 0x97, 0x06, 0x74, 0xe5, | 
|  | 0x9e, 0x0f, 0x7d, 0xec, 0x99, 0x08, 0x7a, 0xeb, | 
|  | 0x8c, 0x1d, 0x6f, 0xfe, 0x8b, 0x1a, 0x68, 0xf9, | 
|  | 0x82, 0x13, 0x61, 0xf0, 0x85, 0x14, 0x66, 0xf7, | 
|  |  | 
|  | 0xa8, 0x39, 0x4b, 0xda, 0xaf, 0x3e, 0x4c, 0xdd, | 
|  | 0xa6, 0x37, 0x45, 0xd4, 0xa1, 0x30, 0x42, 0xd3, | 
|  | 0xb4, 0x25, 0x57, 0xc6, 0xb3, 0x22, 0x50, 0xc1, | 
|  | 0xba, 0x2b, 0x59, 0xc8, 0xbd, 0x2c, 0x5e, 0xcf | 
|  | }; | 
|  |  | 
|  | uint8_t bt_mesh_fcs_calc(const uint8_t *data, uint8_t data_len) | 
|  | { | 
|  | uint8_t fcs = 0xff; | 
|  |  | 
|  | while (data_len--) { | 
|  | fcs = crc_table[fcs ^ *data++]; | 
|  | } | 
|  |  | 
|  | LOG_DBG("fcs 0x%02x", 0xff - fcs); | 
|  |  | 
|  | return 0xff - fcs; | 
|  | } | 
|  |  | 
|  | bool bt_mesh_fcs_check(struct net_buf_simple *buf, uint8_t received_fcs) | 
|  | { | 
|  | const uint8_t *data = buf->data; | 
|  | uint16_t data_len = buf->len; | 
|  | uint8_t fcs = 0xff; | 
|  |  | 
|  | while (data_len--) { | 
|  | fcs = crc_table[fcs ^ *data++]; | 
|  | } | 
|  |  | 
|  | return crc_table[fcs ^ received_fcs] == 0xcf; | 
|  | } | 
|  |  | 
|  | int bt_mesh_virtual_addr(const uint8_t virtual_label[16], uint16_t *addr) | 
|  | { | 
|  | uint8_t salt[16]; | 
|  | uint8_t tmp[16]; | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_s1_str("vtad", salt); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_raw_key(salt, virtual_label, 16, tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | *addr = (sys_get_be16(&tmp[14]) & 0x3fff) | 0x8000; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_salt(uint8_t algorithm, | 
|  | const uint8_t *conf_salt, | 
|  | const uint8_t *prov_rand, | 
|  | const uint8_t *dev_rand, | 
|  | uint8_t *prov_salt) | 
|  | { | 
|  | uint8_t size = algorithm ? 32 : 16; | 
|  | const uint8_t prov_salt_key[16] = { 0 }; | 
|  | struct bt_mesh_sg sg[] = { | 
|  | { conf_salt, size }, | 
|  | { prov_rand, size }, | 
|  | { dev_rand, size }, | 
|  | }; | 
|  |  | 
|  | return bt_mesh_aes_cmac_raw_key(prov_salt_key, sg, ARRAY_SIZE(sg), prov_salt); | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_conf_salt(uint8_t algorithm, const uint8_t conf_inputs[145], | 
|  | uint8_t *salt) | 
|  | { | 
|  | if (algorithm == BT_MESH_PROV_AUTH_HMAC_SHA256_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_HMAC_SHA256_AES_CCM)) { | 
|  |  | 
|  | return bt_mesh_s2(conf_inputs, 145, salt); | 
|  | } | 
|  |  | 
|  | if (algorithm == BT_MESH_PROV_AUTH_CMAC_AES128_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_CMAC_AES128_AES_CCM)) { | 
|  |  | 
|  | return bt_mesh_s1(conf_inputs, 145, salt); | 
|  | } | 
|  |  | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_conf_key(uint8_t algorithm, const uint8_t *k_input, | 
|  | const uint8_t *conf_salt, uint8_t *conf_key) | 
|  | { | 
|  | if (algorithm == BT_MESH_PROV_AUTH_HMAC_SHA256_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_HMAC_SHA256_AES_CCM)) { | 
|  |  | 
|  | return bt_mesh_k5(k_input, 64, conf_salt, "prck256", conf_key); | 
|  | } | 
|  |  | 
|  | if (algorithm == BT_MESH_PROV_AUTH_CMAC_AES128_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_CMAC_AES128_AES_CCM)) { | 
|  |  | 
|  | return bt_mesh_k1(k_input, 32, conf_salt, "prck", conf_key); | 
|  | } | 
|  |  | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_conf(uint8_t algorithm, const uint8_t *conf_key, | 
|  | const uint8_t *prov_rand, const uint8_t *auth, uint8_t *conf) | 
|  | { | 
|  | uint8_t auth_size = algorithm ? 32 : 16; | 
|  |  | 
|  | LOG_DBG("ConfirmationKey %s", bt_hex(conf_key, auth_size)); | 
|  | LOG_DBG("RandomDevice %s", bt_hex(prov_rand, auth_size)); | 
|  | LOG_DBG("AuthValue %s", bt_hex(auth, auth_size)); | 
|  |  | 
|  | if (algorithm == BT_MESH_PROV_AUTH_HMAC_SHA256_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_HMAC_SHA256_AES_CCM)) { | 
|  |  | 
|  | return bt_mesh_sha256_hmac_one_raw_key(conf_key, prov_rand, 32, conf); | 
|  | } | 
|  |  | 
|  | if (algorithm == BT_MESH_PROV_AUTH_CMAC_AES128_AES_CCM && | 
|  | IS_ENABLED(CONFIG_BT_MESH_ECDH_P256_CMAC_AES128_AES_CCM)) { | 
|  | struct bt_mesh_sg sg[] = { { prov_rand, 16 }, { auth, 16 } }; | 
|  |  | 
|  | return bt_mesh_aes_cmac_raw_key(conf_key, sg, ARRAY_SIZE(sg), conf); | 
|  | } | 
|  |  | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_decrypt(struct bt_mesh_key *key, uint8_t nonce[13], const uint8_t data[25 + 8], | 
|  | uint8_t out[25]) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_ccm_decrypt(key, nonce, data, 25, NULL, 0, out, 8); | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_prov_encrypt(struct bt_mesh_key *key, uint8_t nonce[13], const uint8_t data[25], | 
|  | uint8_t out[25 + 8]) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | err = bt_mesh_ccm_encrypt(key, nonce, data, 25, NULL, 0, out, 8); | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int bt_mesh_beacon_auth(const struct bt_mesh_key *beacon_key, uint8_t flags, | 
|  | const uint8_t net_id[8], uint32_t iv_index, uint8_t auth[8]) | 
|  | { | 
|  | uint8_t msg[13], tmp[16]; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG("BeaconKey %s", bt_hex(beacon_key, sizeof(struct bt_mesh_key))); | 
|  | LOG_DBG("NetId %s", bt_hex(net_id, 8)); | 
|  | LOG_DBG("IV Index 0x%08x", iv_index); | 
|  |  | 
|  | msg[0] = flags; | 
|  | memcpy(&msg[1], net_id, 8); | 
|  | sys_put_be32(iv_index, &msg[9]); | 
|  |  | 
|  | LOG_DBG("BeaconMsg %s", bt_hex(msg, sizeof(msg))); | 
|  |  | 
|  | err = bt_mesh_aes_cmac_one_mesh_key(beacon_key, msg, sizeof(msg), tmp); | 
|  | if (!err) { | 
|  | memcpy(auth, tmp, 8); | 
|  | } | 
|  |  | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static int private_beacon_obf(const struct bt_mesh_key *pbk, const uint8_t data[5], | 
|  | const uint8_t random[13], uint8_t out[5]) | 
|  | { | 
|  | uint8_t salt[16]; | 
|  | int i, err; | 
|  |  | 
|  | /* C1 = 0x01 | random | 0x0001 */ | 
|  | salt[0] = 0x01; | 
|  | memcpy(&salt[1], random, 13); | 
|  | sys_put_be16(0x0001, &salt[14]); | 
|  |  | 
|  | /* ObfData = e(pbk, C1) ^ (flags | iv_index) */ | 
|  | err = bt_mesh_encrypt(pbk, salt, salt); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < 5; i++) { | 
|  | out[i] = data[i] ^ salt[i]; | 
|  | } | 
|  |  | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int private_beacon_auth(const struct bt_mesh_key *pbk, | 
|  | const uint8_t beacon_data[5], | 
|  | const uint8_t random[13], uint8_t auth[8]) | 
|  | { | 
|  | uint8_t salt[16], tmp[16]; | 
|  | int i, err; | 
|  |  | 
|  | /* B0 = 0x19 | random | 0x0005 */ | 
|  | salt[0] = 0x19; | 
|  | memcpy(&salt[1], random, 13); | 
|  | sys_put_be16(0x0005, &salt[14]); | 
|  |  | 
|  | /* T0 = e(PBK, b0) */ | 
|  | err = bt_mesh_encrypt(pbk, salt, tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | /* P = flags | iv_index | 000 */ | 
|  | /* T1 = e(PBK, P ^ T0) */ | 
|  | for (i = 0; i < 5; i++) { | 
|  | tmp[i] ^= beacon_data[i]; | 
|  | } | 
|  |  | 
|  | err = bt_mesh_encrypt(pbk, tmp, tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | /* C0 = 0x01 | random | 0x0000 */ | 
|  | salt[0] = 0x01; | 
|  | sys_put_be16(0x0000, &salt[14]); | 
|  |  | 
|  | /* T2 = T1 ^ e(PBK, C0) */ | 
|  | memcpy(auth, tmp, 8); | 
|  |  | 
|  | err = bt_mesh_encrypt(pbk, salt, tmp); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | /* Auth = T2[0..7] */ | 
|  | for (i = 0; i < 8; i++) { | 
|  | auth[i] ^= tmp[i]; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_beacon_decrypt(const struct bt_mesh_key *pbk, const uint8_t random[13], | 
|  | const uint8_t data[5], const uint8_t expected_auth[8], uint8_t out[5]) | 
|  | { | 
|  | uint8_t auth[8]; | 
|  | int err; | 
|  |  | 
|  | LOG_DBG(""); | 
|  |  | 
|  | err = private_beacon_obf(pbk, data, random, out); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | err = private_beacon_auth(pbk, out, random, auth); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | LOG_DBG("0x%02x, 0x%08x", out[0], sys_get_be32(&out[1])); | 
|  |  | 
|  | if (memcmp(auth, expected_auth, 8)) { | 
|  | LOG_DBG("Invalid auth rx: %s", bt_hex(auth, 8)); | 
|  | LOG_DBG("Expected auth: %s", bt_hex(expected_auth, 8)); | 
|  | return -EBADMSG; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bt_mesh_beacon_encrypt(const struct bt_mesh_key *pbk, uint8_t flags, uint32_t iv_index, | 
|  | const uint8_t random[13], uint8_t data[5], uint8_t auth[8]) | 
|  | { | 
|  | int err; | 
|  |  | 
|  | LOG_WRN("Enc beacon: 0x%02x, 0x%08x", flags, iv_index); | 
|  |  | 
|  | data[0] = flags; | 
|  | sys_put_be32(iv_index, &data[1]); | 
|  |  | 
|  | err = private_beacon_auth(pbk, data, random, auth); | 
|  | if (err) { | 
|  | return err; | 
|  | } | 
|  |  | 
|  | return private_beacon_obf(pbk, data, random, data); | 
|  | } |