tools headers cpufeatures: Sync with the kernel sources
[linux-2.6-microblaze.git] / net / bluetooth / selftest.c
1 /*
2    BlueZ - Bluetooth protocol stack for Linux
3
4    Copyright (C) 2014 Intel Corporation
5
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License version 2 as
8    published by the Free Software Foundation;
9
10    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
11    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
12    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
13    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
14    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
15    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18
19    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
20    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
21    SOFTWARE IS DISCLAIMED.
22 */
23
24 #include <linux/debugfs.h>
25
26 #include <net/bluetooth/bluetooth.h>
27 #include <net/bluetooth/hci_core.h>
28
29 #include "ecdh_helper.h"
30 #include "smp.h"
31 #include "selftest.h"
32
33 #if IS_ENABLED(CONFIG_BT_SELFTEST_ECDH)
34
35 static const u8 priv_a_1[32] __initconst = {
36         0xbd, 0x1a, 0x3c, 0xcd, 0xa6, 0xb8, 0x99, 0x58,
37         0x99, 0xb7, 0x40, 0xeb, 0x7b, 0x60, 0xff, 0x4a,
38         0x50, 0x3f, 0x10, 0xd2, 0xe3, 0xb3, 0xc9, 0x74,
39         0x38, 0x5f, 0xc5, 0xa3, 0xd4, 0xf6, 0x49, 0x3f,
40 };
41 static const u8 priv_b_1[32] __initconst = {
42         0xfd, 0xc5, 0x7f, 0xf4, 0x49, 0xdd, 0x4f, 0x6b,
43         0xfb, 0x7c, 0x9d, 0xf1, 0xc2, 0x9a, 0xcb, 0x59,
44         0x2a, 0xe7, 0xd4, 0xee, 0xfb, 0xfc, 0x0a, 0x90,
45         0x9a, 0xbb, 0xf6, 0x32, 0x3d, 0x8b, 0x18, 0x55,
46 };
47 static const u8 pub_a_1[64] __initconst = {
48         0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc,
49         0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef,
50         0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
51         0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20,
52
53         0x8b, 0xd2, 0x89, 0x15, 0xd0, 0x8e, 0x1c, 0x74,
54         0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76,
55         0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63,
56         0x6d, 0xeb, 0x2a, 0x65, 0x49, 0x9c, 0x80, 0xdc,
57 };
58 static const u8 pub_b_1[64] __initconst = {
59         0x90, 0xa1, 0xaa, 0x2f, 0xb2, 0x77, 0x90, 0x55,
60         0x9f, 0xa6, 0x15, 0x86, 0xfd, 0x8a, 0xb5, 0x47,
61         0x00, 0x4c, 0x9e, 0xf1, 0x84, 0x22, 0x59, 0x09,
62         0x96, 0x1d, 0xaf, 0x1f, 0xf0, 0xf0, 0xa1, 0x1e,
63
64         0x4a, 0x21, 0xb1, 0x15, 0xf9, 0xaf, 0x89, 0x5f,
65         0x76, 0x36, 0x8e, 0xe2, 0x30, 0x11, 0x2d, 0x47,
66         0x60, 0x51, 0xb8, 0x9a, 0x3a, 0x70, 0x56, 0x73,
67         0x37, 0xad, 0x9d, 0x42, 0x3e, 0xf3, 0x55, 0x4c,
68 };
69 static const u8 dhkey_1[32] __initconst = {
70         0x98, 0xa6, 0xbf, 0x73, 0xf3, 0x34, 0x8d, 0x86,
71         0xf1, 0x66, 0xf8, 0xb4, 0x13, 0x6b, 0x79, 0x99,
72         0x9b, 0x7d, 0x39, 0x0a, 0xa6, 0x10, 0x10, 0x34,
73         0x05, 0xad, 0xc8, 0x57, 0xa3, 0x34, 0x02, 0xec,
74 };
75
76 static const u8 priv_a_2[32] __initconst = {
77         0x63, 0x76, 0x45, 0xd0, 0xf7, 0x73, 0xac, 0xb7,
78         0xff, 0xdd, 0x03, 0x72, 0xb9, 0x72, 0x85, 0xb4,
79         0x41, 0xb6, 0x5d, 0x0c, 0x5d, 0x54, 0x84, 0x60,
80         0x1a, 0xa3, 0x9a, 0x3c, 0x69, 0x16, 0xa5, 0x06,
81 };
82 static const u8 priv_b_2[32] __initconst = {
83         0xba, 0x30, 0x55, 0x50, 0x19, 0xa2, 0xca, 0xa3,
84         0xa5, 0x29, 0x08, 0xc6, 0xb5, 0x03, 0x88, 0x7e,
85         0x03, 0x2b, 0x50, 0x73, 0xd4, 0x2e, 0x50, 0x97,
86         0x64, 0xcd, 0x72, 0x0d, 0x67, 0xa0, 0x9a, 0x52,
87 };
88 static const u8 pub_a_2[64] __initconst = {
89         0xdd, 0x78, 0x5c, 0x74, 0x03, 0x9b, 0x7e, 0x98,
90         0xcb, 0x94, 0x87, 0x4a, 0xad, 0xfa, 0xf8, 0xd5,
91         0x43, 0x3e, 0x5c, 0xaf, 0xea, 0xb5, 0x4c, 0xf4,
92         0x9e, 0x80, 0x79, 0x57, 0x7b, 0xa4, 0x31, 0x2c,
93
94         0x4f, 0x5d, 0x71, 0x43, 0x77, 0x43, 0xf8, 0xea,
95         0xd4, 0x3e, 0xbd, 0x17, 0x91, 0x10, 0x21, 0xd0,
96         0x1f, 0x87, 0x43, 0x8e, 0x40, 0xe2, 0x52, 0xcd,
97         0xbe, 0xdf, 0x98, 0x38, 0x18, 0x12, 0x95, 0x91,
98 };
99 static const u8 pub_b_2[64] __initconst = {
100         0xcc, 0x00, 0x65, 0xe1, 0xf5, 0x6c, 0x0d, 0xcf,
101         0xec, 0x96, 0x47, 0x20, 0x66, 0xc9, 0xdb, 0x84,
102         0x81, 0x75, 0xa8, 0x4d, 0xc0, 0xdf, 0xc7, 0x9d,
103         0x1b, 0x3f, 0x3d, 0xf2, 0x3f, 0xe4, 0x65, 0xf4,
104
105         0x79, 0xb2, 0xec, 0xd8, 0xca, 0x55, 0xa1, 0xa8,
106         0x43, 0x4d, 0x6b, 0xca, 0x10, 0xb0, 0xc2, 0x01,
107         0xc2, 0x33, 0x4e, 0x16, 0x24, 0xc4, 0xef, 0xee,
108         0x99, 0xd8, 0xbb, 0xbc, 0x48, 0xd0, 0x01, 0x02,
109 };
110 static const u8 dhkey_2[32] __initconst = {
111         0x69, 0xeb, 0x21, 0x32, 0xf2, 0xc6, 0x05, 0x41,
112         0x60, 0x19, 0xcd, 0x5e, 0x94, 0xe1, 0xe6, 0x5f,
113         0x33, 0x07, 0xe3, 0x38, 0x4b, 0x68, 0xe5, 0x62,
114         0x3f, 0x88, 0x6d, 0x2f, 0x3a, 0x84, 0x85, 0xab,
115 };
116
117 static const u8 priv_a_3[32] __initconst = {
118         0xbd, 0x1a, 0x3c, 0xcd, 0xa6, 0xb8, 0x99, 0x58,
119         0x99, 0xb7, 0x40, 0xeb, 0x7b, 0x60, 0xff, 0x4a,
120         0x50, 0x3f, 0x10, 0xd2, 0xe3, 0xb3, 0xc9, 0x74,
121         0x38, 0x5f, 0xc5, 0xa3, 0xd4, 0xf6, 0x49, 0x3f,
122 };
123 static const u8 pub_a_3[64] __initconst = {
124         0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc,
125         0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef,
126         0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
127         0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20,
128
129         0x8b, 0xd2, 0x89, 0x15, 0xd0, 0x8e, 0x1c, 0x74,
130         0x24, 0x30, 0xed, 0x8f, 0xc2, 0x45, 0x63, 0x76,
131         0x5c, 0x15, 0x52, 0x5a, 0xbf, 0x9a, 0x32, 0x63,
132         0x6d, 0xeb, 0x2a, 0x65, 0x49, 0x9c, 0x80, 0xdc,
133 };
134 static const u8 dhkey_3[32] __initconst = {
135         0x2d, 0xab, 0x00, 0x48, 0xcb, 0xb3, 0x7b, 0xda,
136         0x55, 0x7b, 0x8b, 0x72, 0xa8, 0x57, 0x87, 0xc3,
137         0x87, 0x27, 0x99, 0x32, 0xfc, 0x79, 0x5f, 0xae,
138         0x7c, 0x1c, 0xf9, 0x49, 0xe6, 0xd7, 0xaa, 0x70,
139 };
140
141 static int __init test_ecdh_sample(struct crypto_kpp *tfm, const u8 priv_a[32],
142                                    const u8 priv_b[32], const u8 pub_a[64],
143                                    const u8 pub_b[64], const u8 dhkey[32])
144 {
145         u8 *tmp, *dhkey_a, *dhkey_b;
146         int ret;
147
148         tmp = kmalloc(64, GFP_KERNEL);
149         if (!tmp)
150                 return -EINVAL;
151
152         dhkey_a = &tmp[0];
153         dhkey_b = &tmp[32];
154
155         ret = set_ecdh_privkey(tfm, priv_a);
156         if (ret)
157                 goto out;
158
159         ret = compute_ecdh_secret(tfm, pub_b, dhkey_a);
160         if (ret)
161                 goto out;
162
163         if (memcmp(dhkey_a, dhkey, 32)) {
164                 ret = -EINVAL;
165                 goto out;
166         }
167
168         ret = set_ecdh_privkey(tfm, priv_b);
169         if (ret)
170                 goto out;
171
172         ret = compute_ecdh_secret(tfm, pub_a, dhkey_b);
173         if (ret)
174                 goto out;
175
176         if (memcmp(dhkey_b, dhkey, 32))
177                 ret = -EINVAL;
178         /* fall through*/
179 out:
180         kfree(tmp);
181         return ret;
182 }
183
184 static char test_ecdh_buffer[32];
185
186 static ssize_t test_ecdh_read(struct file *file, char __user *user_buf,
187                               size_t count, loff_t *ppos)
188 {
189         return simple_read_from_buffer(user_buf, count, ppos, test_ecdh_buffer,
190                                        strlen(test_ecdh_buffer));
191 }
192
193 static const struct file_operations test_ecdh_fops = {
194         .open           = simple_open,
195         .read           = test_ecdh_read,
196         .llseek         = default_llseek,
197 };
198
199 static int __init test_ecdh(void)
200 {
201         struct crypto_kpp *tfm;
202         ktime_t calltime, delta, rettime;
203         unsigned long long duration = 0;
204         int err;
205
206         calltime = ktime_get();
207
208         tfm = crypto_alloc_kpp("ecdh", 0, 0);
209         if (IS_ERR(tfm)) {
210                 BT_ERR("Unable to create ECDH crypto context");
211                 err = PTR_ERR(tfm);
212                 goto done;
213         }
214
215         err = test_ecdh_sample(tfm, priv_a_1, priv_b_1, pub_a_1, pub_b_1,
216                                dhkey_1);
217         if (err) {
218                 BT_ERR("ECDH sample 1 failed");
219                 goto done;
220         }
221
222         err = test_ecdh_sample(tfm, priv_a_2, priv_b_2, pub_a_2, pub_b_2,
223                                dhkey_2);
224         if (err) {
225                 BT_ERR("ECDH sample 2 failed");
226                 goto done;
227         }
228
229         err = test_ecdh_sample(tfm, priv_a_3, priv_a_3, pub_a_3, pub_a_3,
230                                dhkey_3);
231         if (err) {
232                 BT_ERR("ECDH sample 3 failed");
233                 goto done;
234         }
235
236         crypto_free_kpp(tfm);
237
238         rettime = ktime_get();
239         delta = ktime_sub(rettime, calltime);
240         duration = (unsigned long long) ktime_to_ns(delta) >> 10;
241
242         BT_INFO("ECDH test passed in %llu usecs", duration);
243
244 done:
245         if (!err)
246                 snprintf(test_ecdh_buffer, sizeof(test_ecdh_buffer),
247                          "PASS (%llu usecs)\n", duration);
248         else
249                 snprintf(test_ecdh_buffer, sizeof(test_ecdh_buffer), "FAIL\n");
250
251         debugfs_create_file("selftest_ecdh", 0444, bt_debugfs, NULL,
252                             &test_ecdh_fops);
253
254         return err;
255 }
256
257 #else
258
259 static inline int test_ecdh(void)
260 {
261         return 0;
262 }
263
264 #endif
265
266 static int __init run_selftest(void)
267 {
268         int err;
269
270         BT_INFO("Starting self testing");
271
272         err = test_ecdh();
273         if (err)
274                 goto done;
275
276         err = bt_selftest_smp();
277
278 done:
279         BT_INFO("Finished self testing");
280
281         return err;
282 }
283
284 #if IS_MODULE(CONFIG_BT)
285
286 /* This is run when CONFIG_BT_SELFTEST=y and CONFIG_BT=m and is just a
287  * wrapper to allow running this at module init.
288  *
289  * If CONFIG_BT_SELFTEST=n, then this code is not compiled at all.
290  */
291 int __init bt_selftest(void)
292 {
293         return run_selftest();
294 }
295
296 #else
297
298 /* This is run when CONFIG_BT_SELFTEST=y and CONFIG_BT=y and is run
299  * via late_initcall() as last item in the initialization sequence.
300  *
301  * If CONFIG_BT_SELFTEST=n, then this code is not compiled at all.
302  */
303 static int __init bt_selftest_init(void)
304 {
305         return run_selftest();
306 }
307 late_initcall(bt_selftest_init);
308
309 #endif