diff options
author | Johan Hedberg <johan.hedberg@intel.com> | 2014-06-06 12:33:30 (GMT) |
---|---|---|
committer | Marcel Holtmann <marcel@holtmann.org> | 2014-12-03 15:51:18 (GMT) |
commit | 6c0dcc5014caeb9c39db816a7e0169255923ccba (patch) | |
tree | f7d796382de99f7e7f80c320d2c51b6ac4c113df /net/bluetooth/smp.c | |
parent | aeb7d461f9c895bb6d09e9d175696849e9f290c8 (diff) | |
download | linux-6c0dcc5014caeb9c39db816a7e0169255923ccba.tar.xz |
Bluetooth: Add check for accidentally generating a debug key
It is very unlikely, but to have a 100% guarantee of the generated key
type we need to reject any keys which happen to match the debug key.
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Diffstat (limited to 'net/bluetooth/smp.c')
-rw-r--r-- | net/bluetooth/smp.c | 14 |
1 files changed, 11 insertions, 3 deletions
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c index ddc76cf..63d5ba7 100644 --- a/net/bluetooth/smp.c +++ b/net/bluetooth/smp.c @@ -1399,9 +1399,17 @@ static u8 sc_send_public_key(struct smp_chan *smp) { BT_DBG(""); - /* Generate local key pair for Secure Connections */ - if (!ecc_make_key(smp->local_pk, smp->local_sk)) - return SMP_UNSPECIFIED; + while (true) { + /* Generate local key pair for Secure Connections */ + if (!ecc_make_key(smp->local_pk, smp->local_sk)) + return SMP_UNSPECIFIED; + + /* This is unlikely, but we need to check that we didn't + * accidentially generate a debug key. + */ + if (memcmp(smp->local_sk, debug_sk, 32)) + break; + } BT_DBG("Local Public Key X: %32phN", smp->local_pk); BT_DBG("Local Public Key Y: %32phN", &smp->local_pk[32]); |