diff options
author | Johan Hedberg <johan.hedberg@intel.com> | 2014-06-06 15:33:30 +0300 |
---|---|---|
committer | Marcel Holtmann <marcel@holtmann.org> | 2014-12-03 16:51:18 +0100 |
commit | 6c0dcc5014caeb9c39db816a7e0169255923ccba (patch) | |
tree | f7d796382de99f7e7f80c320d2c51b6ac4c113df /net | |
parent | aeb7d461f9c895bb6d09e9d175696849e9f290c8 (diff) | |
download | op-kernel-dev-6c0dcc5014caeb9c39db816a7e0169255923ccba.zip op-kernel-dev-6c0dcc5014caeb9c39db816a7e0169255923ccba.tar.gz |
Bluetooth: Add check for accidentally generating a debug key
It is very unlikely, but to have a 100% guarantee of the generated key
type we need to reject any keys which happen to match the debug key.
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Diffstat (limited to 'net')
-rw-r--r-- | net/bluetooth/smp.c | 14 |
1 files changed, 11 insertions, 3 deletions
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c index ddc76cf..63d5ba7 100644 --- a/net/bluetooth/smp.c +++ b/net/bluetooth/smp.c @@ -1399,9 +1399,17 @@ static u8 sc_send_public_key(struct smp_chan *smp) { BT_DBG(""); - /* Generate local key pair for Secure Connections */ - if (!ecc_make_key(smp->local_pk, smp->local_sk)) - return SMP_UNSPECIFIED; + while (true) { + /* Generate local key pair for Secure Connections */ + if (!ecc_make_key(smp->local_pk, smp->local_sk)) + return SMP_UNSPECIFIED; + + /* This is unlikely, but we need to check that we didn't + * accidentially generate a debug key. + */ + if (memcmp(smp->local_sk, debug_sk, 32)) + break; + } BT_DBG("Local Public Key X: %32phN", smp->local_pk); BT_DBG("Local Public Key Y: %32phN", &smp->local_pk[32]); |