1 /*
2 * Copyright (c) 2017-2019 Nordic Semiconductor ASA
3 *
4 * SPDX-License-Identifier: Apache-2.0
5 */
6
7 #include <string.h>
8
9 #include <zephyr/kernel.h>
10 #include <soc.h>
11 #include <zephyr/bluetooth/hci_types.h>
12 #include <zephyr/sys/byteorder.h>
13
14 #include "hal/cpu.h"
15 #include "hal/ccm.h"
16
17 #include "util/util.h"
18 #include "util/mem.h"
19 #include "util/memq.h"
20 #include "util/mayfly.h"
21 #include "util/dbuf.h"
22
23 #include "pdu_df.h"
24 #include "lll/pdu_vendor.h"
25 #include "pdu.h"
26
27 #include "lll.h"
28 #include "lll/lll_adv_types.h"
29 #include "lll_adv.h"
30 #include "lll/lll_adv_pdu.h"
31 #include "lll_scan.h"
32 #include "lll/lll_df_types.h"
33 #include "lll_conn.h"
34 #include "lll_filter.h"
35
36 #include "ll_sw/ull_tx_queue.h"
37
38 #include "ull_adv_types.h"
39 #include "ull_scan_types.h"
40 #include "ull_conn_types.h"
41 #include "ull_filter.h"
42
43 #include "ull_internal.h"
44 #include "ull_adv_internal.h"
45 #include "ull_scan_internal.h"
46 #include "ull_conn_internal.h"
47
48 #include "ll.h"
49
50 #include "hal/debug.h"
51
52 #define LOG_LEVEL CONFIG_BT_HCI_DRIVER_LOG_LEVEL
53 #include <zephyr/logging/log.h>
54 LOG_MODULE_REGISTER(bt_ctlr_ull_filter);
55
56 #define ADDR_TYPE_ANON 0xFF
57
58 #if defined(CONFIG_BT_CTLR_FILTER_ACCEPT_LIST)
59 /* Hardware Filter Accept List */
60 static struct lll_filter fal_filter;
61
62 #if defined(CONFIG_BT_CTLR_PRIVACY)
63 #include "common/rpa.h"
64
65 /* Filter Accept List peer list */
66 static struct lll_fal fal[CONFIG_BT_CTLR_FAL_SIZE];
67
68 /* Resolving list */
69 static struct lll_resolve_list rl[CONFIG_BT_CTLR_RL_SIZE];
70 static uint8_t rl_enable;
71
72 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
73 /* Cache of known unknown peer RPAs */
74 static uint8_t newest_prpa;
75 static struct lll_prpa_cache prpa_cache[CONFIG_BT_CTLR_RPA_CACHE_SIZE];
76
77 /* Cache of known unknown target RPAs */
78 static uint8_t newest_trpa;
79 static struct lll_trpa_cache trpa_cache[CONFIG_BT_CTLR_TRPA_CACHE_SIZE];
80
81 struct prpa_resolve_work {
82 struct k_work prpa_work;
83 bt_addr_t rpa;
84 resolve_callback_t cb;
85 };
86
87 struct target_resolve_work {
88 struct k_work target_work;
89 bt_addr_t rpa;
90 uint8_t idx;
91 resolve_callback_t cb;
92 };
93 #endif /* CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY */
94
95 static uint8_t peer_irks[CONFIG_BT_CTLR_RL_SIZE][IRK_SIZE];
96 static uint8_t peer_irk_rl_ids[CONFIG_BT_CTLR_RL_SIZE];
97 static uint8_t peer_irk_count;
98
99 static bt_addr_t local_rpas[CONFIG_BT_CTLR_RL_SIZE];
100
101 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
102 static struct prpa_resolve_work resolve_work;
103 static struct target_resolve_work t_work;
104
105 BUILD_ASSERT(ARRAY_SIZE(prpa_cache) < FILTER_IDX_NONE);
106 BUILD_ASSERT(ARRAY_SIZE(trpa_cache) < FILTER_IDX_NONE);
107 #endif /* CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY */
108 BUILD_ASSERT(ARRAY_SIZE(fal) < FILTER_IDX_NONE);
109 BUILD_ASSERT(ARRAY_SIZE(rl) < FILTER_IDX_NONE);
110
111 /* Hardware filter for the resolving list */
112 static struct lll_filter rl_filter;
113
114 #define DEFAULT_RPA_TIMEOUT_MS (900 * 1000)
115 static uint32_t rpa_timeout_ms;
116 static int64_t rpa_last_ms;
117
118 static struct k_work_delayable rpa_work;
119
120 #define LIST_MATCH(list, i, type, addr) (list[i].taken && \
121 (list[i].id_addr_type == (type & 0x1)) && \
122 !memcmp(list[i].id_addr.val, addr, BDADDR_SIZE))
123
124 static void fal_clear(void);
125 static uint8_t fal_find(uint8_t addr_type, const uint8_t *const addr,
126 uint8_t *const free_idx);
127 static uint32_t fal_add(bt_addr_le_t *id_addr);
128 static uint32_t fal_remove(bt_addr_le_t *id_addr);
129 static void fal_update(void);
130
131 static void rl_clear(void);
132 static void rl_update(void);
133 static int rl_access_check(bool check_ar);
134
135 #if defined(CONFIG_BT_BROADCASTER)
136 static void rpa_adv_refresh(struct ll_adv_set *adv);
137 #endif
138 static void rpa_timeout(struct k_work *work);
139 static void rpa_refresh_start(void);
140 static void rpa_refresh_stop(void);
141 #else /* !CONFIG_BT_CTLR_PRIVACY */
142 static uint32_t filter_add(struct lll_filter *filter, uint8_t addr_type,
143 uint8_t *bdaddr);
144 static uint32_t filter_remove(struct lll_filter *filter, uint8_t addr_type,
145 uint8_t *bdaddr);
146 #endif /* !CONFIG_BT_CTLR_PRIVACY */
147
148 static uint32_t filter_find(const struct lll_filter *const filter,
149 uint8_t addr_type, const uint8_t *const bdaddr);
150 static void filter_insert(struct lll_filter *const filter, int index,
151 uint8_t addr_type, const uint8_t *const bdaddr);
152 static void filter_clear(struct lll_filter *filter);
153
154 #if defined(CONFIG_BT_CTLR_PRIVACY) && \
155 defined(CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN)
156 static void conn_rpa_update(uint8_t rl_idx);
157 #endif /* CONFIG_BT_CTLR_PRIVACY && CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN */
158
159 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
160 static void prpa_cache_clear(void);
161 static uint8_t prpa_cache_find(bt_addr_t *prpa_cache_addr);
162 static void prpa_cache_add(bt_addr_t *prpa_cache_addr);
163 static uint8_t prpa_cache_try_resolve(bt_addr_t *rpa);
164 static void prpa_cache_resolve(struct k_work *work);
165 static void target_resolve(struct k_work *work);
166 static void trpa_cache_clear(void);
167 static uint8_t trpa_cache_find(bt_addr_t *prpa_cache_addr, uint8_t rl_idx);
168 static void trpa_cache_add(bt_addr_t *prpa_cache_addr, uint8_t rl_idx);
169 #endif /* CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY */
170 #endif /* CONFIG_BT_CTLR_FILTER_ACCEPT_LIST */
171
172 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
173 #define PAL_ADDR_MATCH(type, addr) \
174 (pal[i].taken && \
175 (pal[i].id_addr_type == (type & 0x1)) && \
176 !memcmp(pal[i].id_addr.val, addr, BDADDR_SIZE))
177
178 #define PAL_MATCH(type, addr, sid) \
179 (PAL_ADDR_MATCH(type, addr) && \
180 (pal[i].sid == sid))
181
182 /* Periodic Advertising Accept List */
183 #define PAL_SIZE CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST_SIZE
184 static struct lll_pal pal[PAL_SIZE];
185
186 static void pal_clear(void);
187 #if defined(CONFIG_BT_CTLR_PRIVACY)
188 static uint8_t pal_addr_find(const uint8_t addr_type,
189 const uint8_t *const addr);
190 #endif /* CONFIG_BT_CTLR_PRIVACY */
191 static uint8_t pal_find(const uint8_t addr_type, const uint8_t *const addr,
192 const uint8_t sid, uint8_t *const free_idx);
193 static uint32_t pal_add(const bt_addr_le_t *const id_addr, const uint8_t sid);
194 static uint32_t pal_remove(const bt_addr_le_t *const id_addr,
195 const uint8_t sid);
196 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
197
198 #if defined(CONFIG_BT_CTLR_FILTER_ACCEPT_LIST)
ll_fal_size_get(void)199 uint8_t ll_fal_size_get(void)
200 {
201 return CONFIG_BT_CTLR_FAL_SIZE;
202 }
203
ll_fal_clear(void)204 uint8_t ll_fal_clear(void)
205 {
206 #if defined(CONFIG_BT_BROADCASTER)
207 if (ull_adv_filter_pol_get(0)) {
208 return BT_HCI_ERR_CMD_DISALLOWED;
209 }
210 #endif /* CONFIG_BT_BROADCASTER */
211
212 #if defined(CONFIG_BT_OBSERVER)
213 if (ull_scan_filter_pol_get(0) & 0x1) {
214 return BT_HCI_ERR_CMD_DISALLOWED;
215 }
216 #endif /* CONFIG_BT_OBSERVER */
217
218 #if defined(CONFIG_BT_CTLR_PRIVACY)
219 fal_clear();
220 #else
221 filter_clear(&fal_filter);
222 #endif /* CONFIG_BT_CTLR_PRIVACY */
223
224 return 0;
225 }
226
ll_fal_add(bt_addr_le_t * addr)227 uint8_t ll_fal_add(bt_addr_le_t *addr)
228 {
229 #if defined(CONFIG_BT_BROADCASTER)
230 if (ull_adv_filter_pol_get(0)) {
231 return BT_HCI_ERR_CMD_DISALLOWED;
232 }
233 #endif /* CONFIG_BT_BROADCASTER */
234
235 #if defined(CONFIG_BT_OBSERVER)
236 if (ull_scan_filter_pol_get(0) & 0x1) {
237 return BT_HCI_ERR_CMD_DISALLOWED;
238 }
239 #endif /* CONFIG_BT_OBSERVER */
240
241 if (addr->type == ADDR_TYPE_ANON) {
242 return 0;
243 }
244
245 #if defined(CONFIG_BT_CTLR_PRIVACY)
246 return fal_add(addr);
247 #else
248 return filter_add(&fal_filter, addr->type, addr->a.val);
249 #endif /* CONFIG_BT_CTLR_PRIVACY */
250 }
251
ll_fal_remove(bt_addr_le_t * addr)252 uint8_t ll_fal_remove(bt_addr_le_t *addr)
253 {
254 #if defined(CONFIG_BT_BROADCASTER)
255 if (ull_adv_filter_pol_get(0)) {
256 return BT_HCI_ERR_CMD_DISALLOWED;
257 }
258 #endif /* CONFIG_BT_BROADCASTER */
259
260 #if defined(CONFIG_BT_OBSERVER)
261 if (ull_scan_filter_pol_get(0) & 0x1) {
262 return BT_HCI_ERR_CMD_DISALLOWED;
263 }
264 #endif /* CONFIG_BT_OBSERVER */
265
266 if (addr->type == ADDR_TYPE_ANON) {
267 return 0;
268 }
269
270 #if defined(CONFIG_BT_CTLR_PRIVACY)
271 return fal_remove(addr);
272 #else
273 return filter_remove(&fal_filter, addr->type, addr->a.val);
274 #endif /* CONFIG_BT_CTLR_PRIVACY */
275 }
276
277 #if defined(CONFIG_BT_CTLR_PRIVACY)
ll_rl_id_addr_get(uint8_t rl_idx,uint8_t * id_addr_type,uint8_t * id_addr)278 void ll_rl_id_addr_get(uint8_t rl_idx, uint8_t *id_addr_type, uint8_t *id_addr)
279 {
280 LL_ASSERT(rl_idx < CONFIG_BT_CTLR_RL_SIZE);
281 LL_ASSERT(rl[rl_idx].taken);
282
283 *id_addr_type = rl[rl_idx].id_addr_type;
284 (void)memcpy(id_addr, rl[rl_idx].id_addr.val, BDADDR_SIZE);
285 }
286
ll_rl_size_get(void)287 uint8_t ll_rl_size_get(void)
288 {
289 return CONFIG_BT_CTLR_RL_SIZE;
290 }
291
ll_rl_clear(void)292 uint8_t ll_rl_clear(void)
293 {
294 if (!rl_access_check(false)) {
295 return BT_HCI_ERR_CMD_DISALLOWED;
296 }
297
298 rl_clear();
299
300 return 0;
301 }
302
ll_rl_add(bt_addr_le_t * id_addr,const uint8_t pirk[IRK_SIZE],const uint8_t lirk[IRK_SIZE])303 uint8_t ll_rl_add(bt_addr_le_t *id_addr, const uint8_t pirk[IRK_SIZE],
304 const uint8_t lirk[IRK_SIZE])
305 {
306 uint8_t i, j;
307
308 if (!rl_access_check(false)) {
309 return BT_HCI_ERR_CMD_DISALLOWED;
310 }
311
312 i = ull_filter_rl_find(id_addr->type, id_addr->a.val, &j);
313
314 /* Duplicate check */
315 if (i < ARRAY_SIZE(rl)) {
316 return BT_HCI_ERR_INVALID_PARAM;
317 } else if (j >= ARRAY_SIZE(rl)) {
318 return BT_HCI_ERR_MEM_CAPACITY_EXCEEDED;
319 }
320
321 /* Device not found but empty slot found */
322 i = j;
323
324 bt_addr_copy(&rl[i].id_addr, &id_addr->a);
325 rl[i].id_addr_type = id_addr->type & 0x1;
326 rl[i].pirk = mem_nz((uint8_t *)pirk, IRK_SIZE);
327 rl[i].lirk = mem_nz((uint8_t *)lirk, IRK_SIZE);
328 if (rl[i].pirk) {
329 /* cross-reference */
330 rl[i].pirk_idx = peer_irk_count;
331 peer_irk_rl_ids[peer_irk_count] = i;
332 /* AAR requires big-endian IRKs */
333 sys_memcpy_swap(peer_irks[peer_irk_count++], pirk, IRK_SIZE);
334 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
335 /* a new key was added, invalidate the known/unknown list */
336 prpa_cache_clear();
337 trpa_cache_clear();
338 #endif
339 }
340 if (rl[i].lirk) {
341 (void)memcpy(rl[i].local_irk, lirk, IRK_SIZE);
342 rl[i].local_rpa = NULL;
343 }
344 memset(rl[i].curr_rpa.val, 0x00, sizeof(rl[i].curr_rpa));
345 rl[i].rpas_ready = 0U;
346 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
347 memset(rl[i].target_rpa.val, 0x00, sizeof(rl[i].target_rpa));
348 #endif
349 /* Default to Network Privacy */
350 rl[i].dev = 0U;
351 /* Add reference to a Filter Accept List entry */
352 j = fal_find(id_addr->type, id_addr->a.val, NULL);
353 if (j < ARRAY_SIZE(fal)) {
354 fal[j].rl_idx = i;
355 rl[i].fal = 1U;
356 } else {
357 rl[i].fal = 0U;
358 }
359
360 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
361 /* Add reference to a periodic list entry */
362 j = pal_addr_find(id_addr->type, id_addr->a.val);
363 if (j < ARRAY_SIZE(pal)) {
364 pal[j].rl_idx = i;
365 rl[i].pal = j + 1U;
366 } else {
367 rl[i].pal = 0U;
368 }
369 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
370
371 rl[i].taken = 1U;
372
373 return 0;
374 }
375
ll_rl_remove(bt_addr_le_t * id_addr)376 uint8_t ll_rl_remove(bt_addr_le_t *id_addr)
377 {
378 uint8_t i;
379
380 if (!rl_access_check(false)) {
381 return BT_HCI_ERR_CMD_DISALLOWED;
382 }
383
384 /* find the device and mark it as empty */
385 i = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
386 if (i < ARRAY_SIZE(rl)) {
387 uint8_t j, k;
388
389 if (rl[i].pirk) {
390 /* Swap with last item */
391 uint8_t pi = rl[i].pirk_idx, pj = peer_irk_count - 1;
392
393 if (pj && (pj < ARRAY_SIZE(peer_irks)) && (pi != pj)) {
394 (void)memcpy(peer_irks[pi], peer_irks[pj],
395 IRK_SIZE);
396 for (k = 0U;
397 k < CONFIG_BT_CTLR_RL_SIZE;
398 k++) {
399
400 if (rl[k].taken && rl[k].pirk &&
401 rl[k].pirk_idx == pj) {
402 rl[k].pirk_idx = pi;
403 peer_irk_rl_ids[pi] = k;
404 break;
405 }
406 }
407 }
408 peer_irk_count--;
409 }
410
411 /* Check if referenced by a Filter Accept List entry */
412 j = fal_find(id_addr->type, id_addr->a.val, NULL);
413 if (j < ARRAY_SIZE(fal)) {
414 fal[j].rl_idx = FILTER_IDX_NONE;
415 }
416
417 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
418 /* Check if referenced by a periodic list entry */
419 j = pal_addr_find(id_addr->type, id_addr->a.val);
420 if (j < ARRAY_SIZE(pal)) {
421 pal[j].rl_idx = FILTER_IDX_NONE;
422 }
423 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
424
425 rl[i].taken = 0U;
426
427 return 0;
428 }
429
430 return BT_HCI_ERR_UNKNOWN_CONN_ID;
431 }
432
ll_rl_crpa_set(uint8_t id_addr_type,uint8_t * id_addr,uint8_t rl_idx,uint8_t * crpa)433 void ll_rl_crpa_set(uint8_t id_addr_type, uint8_t *id_addr, uint8_t rl_idx,
434 uint8_t *crpa)
435 {
436 if ((crpa[5] & 0xc0) == 0x40) {
437
438 if (id_addr) {
439 /* find the device and return its RPA */
440 rl_idx = ull_filter_rl_find(id_addr_type, id_addr,
441 NULL);
442 }
443
444 if (rl_idx < ARRAY_SIZE(rl) && rl[rl_idx].taken) {
445 (void)memcpy(rl[rl_idx].curr_rpa.val, crpa,
446 sizeof(bt_addr_t));
447 #if defined(CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN)
448 conn_rpa_update(rl_idx);
449 #endif /* CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN) */
450 }
451 }
452 }
453
ll_rl_crpa_get(bt_addr_le_t * id_addr,bt_addr_t * crpa)454 uint8_t ll_rl_crpa_get(bt_addr_le_t *id_addr, bt_addr_t *crpa)
455 {
456 uint8_t i;
457
458 /* find the device and return its RPA */
459 i = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
460 if (i < ARRAY_SIZE(rl) &&
461 mem_nz(rl[i].curr_rpa.val, sizeof(rl[i].curr_rpa.val))) {
462 bt_addr_copy(crpa, &rl[i].curr_rpa);
463 return 0;
464 }
465
466 return BT_HCI_ERR_UNKNOWN_CONN_ID;
467 }
468
ll_rl_lrpa_get(bt_addr_le_t * id_addr,bt_addr_t * lrpa)469 uint8_t ll_rl_lrpa_get(bt_addr_le_t *id_addr, bt_addr_t *lrpa)
470 {
471 uint8_t i;
472
473 /* find the device and return the local RPA */
474 i = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
475 if (i < ARRAY_SIZE(rl)) {
476 bt_addr_copy(lrpa, rl[i].local_rpa);
477 return 0;
478 }
479
480 return BT_HCI_ERR_UNKNOWN_CONN_ID;
481 }
482
ll_rl_enable(uint8_t enable)483 uint8_t ll_rl_enable(uint8_t enable)
484 {
485 if (!rl_access_check(false)) {
486 return BT_HCI_ERR_CMD_DISALLOWED;
487 }
488
489 switch (enable) {
490 case BT_HCI_ADDR_RES_DISABLE:
491 rl_enable = 0U;
492 break;
493 case BT_HCI_ADDR_RES_ENABLE:
494 rl_enable = 1U;
495 break;
496 default:
497 return BT_HCI_ERR_INVALID_PARAM;
498 }
499
500 return 0;
501 }
502
ll_rl_timeout_set(uint16_t timeout)503 void ll_rl_timeout_set(uint16_t timeout)
504 {
505 rpa_timeout_ms = timeout * 1000U;
506 }
507
ll_priv_mode_set(bt_addr_le_t * id_addr,uint8_t mode)508 uint8_t ll_priv_mode_set(bt_addr_le_t *id_addr, uint8_t mode)
509 {
510 uint8_t i;
511
512 if (!rl_access_check(false)) {
513 return BT_HCI_ERR_CMD_DISALLOWED;
514 }
515
516 /* find the device and mark it as empty */
517 i = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
518 if (i < ARRAY_SIZE(rl)) {
519 switch (mode) {
520 case BT_HCI_LE_PRIVACY_MODE_NETWORK:
521 rl[i].dev = 0U;
522 break;
523 case BT_HCI_LE_PRIVACY_MODE_DEVICE:
524 rl[i].dev = 1U;
525 break;
526 default:
527 return BT_HCI_ERR_INVALID_PARAM;
528 }
529 } else {
530 return BT_HCI_ERR_UNKNOWN_CONN_ID;
531 }
532
533 return 0;
534 }
535 #endif /* CONFIG_BT_CTLR_PRIVACY */
536 #endif /* CONFIG_BT_CTLR_FILTER_ACCEPT_LIST */
537
538 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
ll_pal_size_get(void)539 uint8_t ll_pal_size_get(void)
540 {
541 return PAL_SIZE;
542 }
543
ll_pal_clear(void)544 uint8_t ll_pal_clear(void)
545 {
546 /* FIXME: Check and fail if Periodic Advertising Create Sync is pending.
547 */
548
549 pal_clear();
550
551 return 0;
552 }
553
ll_pal_add(const bt_addr_le_t * const addr,const uint8_t sid)554 uint8_t ll_pal_add(const bt_addr_le_t *const addr, const uint8_t sid)
555 {
556 /* FIXME: Check and fail if Periodic Advertising Create Sync is pending.
557 */
558
559 if (addr->type == ADDR_TYPE_ANON) {
560 return 0;
561 }
562
563 return pal_add(addr, sid);
564 }
565
ll_pal_remove(const bt_addr_le_t * const addr,const uint8_t sid)566 uint8_t ll_pal_remove(const bt_addr_le_t *const addr, const uint8_t sid)
567 {
568 /* FIXME: Check and fail if Periodic Advertising Create Sync is pending.
569 */
570
571 if (addr->type == ADDR_TYPE_ANON) {
572 return 0;
573 }
574
575 return pal_remove(addr, sid);
576 }
577
ull_filter_ull_pal_addr_match(const uint8_t addr_type,const uint8_t * const addr)578 bool ull_filter_ull_pal_addr_match(const uint8_t addr_type,
579 const uint8_t *const addr)
580 {
581 for (int i = 0; i < PAL_SIZE; i++) {
582 if (PAL_ADDR_MATCH(addr_type, addr)) {
583 return true;
584 }
585 }
586
587 return false;
588 }
589
ull_filter_ull_pal_match(const uint8_t addr_type,const uint8_t * const addr,const uint8_t sid)590 bool ull_filter_ull_pal_match(const uint8_t addr_type,
591 const uint8_t *const addr, const uint8_t sid)
592 {
593 for (int i = 0; i < PAL_SIZE; i++) {
594 if (PAL_MATCH(addr_type, addr, sid)) {
595 return true;
596 }
597 }
598
599 return false;
600 }
601
602 #if defined(CONFIG_BT_CTLR_PRIVACY)
ull_filter_ull_pal_listed(const uint8_t rl_idx,uint8_t * const addr_type,uint8_t * const addr)603 bool ull_filter_ull_pal_listed(const uint8_t rl_idx, uint8_t *const addr_type,
604 uint8_t *const addr)
605 {
606 if (rl_idx >= ARRAY_SIZE(rl)) {
607 return false;
608 }
609
610 LL_ASSERT(rl[rl_idx].taken);
611
612 if (rl[rl_idx].pal) {
613 uint8_t pal_idx = rl[rl_idx].pal - 1;
614
615 *addr_type = pal[pal_idx].id_addr_type;
616 (void)memcpy(addr, pal[pal_idx].id_addr.val, BDADDR_SIZE);
617
618 return true;
619 }
620
621 return false;
622 }
623 #endif /* CONFIG_BT_CTLR_PRIVACY */
624 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
625
ull_filter_reset(bool init)626 void ull_filter_reset(bool init)
627 {
628 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
629 pal_clear();
630 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
631
632 #if defined(CONFIG_BT_CTLR_PRIVACY)
633 fal_clear();
634
635 rl_enable = 0U;
636 rpa_timeout_ms = DEFAULT_RPA_TIMEOUT_MS;
637 rpa_last_ms = -1;
638 rl_clear();
639 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
640 prpa_cache_clear();
641 trpa_cache_clear();
642 #endif
643 if (init) {
644 k_work_init_delayable(&rpa_work, rpa_timeout);
645 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
646 k_work_init(&(resolve_work.prpa_work), prpa_cache_resolve);
647 k_work_init(&(t_work.target_work), target_resolve);
648 #endif
649 } else {
650 k_work_cancel_delayable(&rpa_work);
651 }
652 #elif defined(CONFIG_BT_CTLR_FILTER_ACCEPT_LIST)
653 filter_clear(&fal_filter);
654 #endif /* CONFIG_BT_CTLR_FILTER_ACCEPT_LIST */
655 }
656
657 #if defined(CONFIG_BT_CTLR_FILTER_ACCEPT_LIST)
ull_filter_lll_get(bool filter)658 struct lll_filter *ull_filter_lll_get(bool filter)
659 {
660 #if defined(CONFIG_BT_CTLR_PRIVACY)
661 if (filter) {
662 return &fal_filter;
663 }
664 return &rl_filter;
665 #else
666 LL_ASSERT(filter);
667 return &fal_filter;
668 #endif
669 }
670
ull_filter_lll_fal_match(const struct lll_filter * const filter,uint8_t addr_type,const uint8_t * const addr,uint8_t * devmatch_id)671 uint8_t ull_filter_lll_fal_match(const struct lll_filter *const filter,
672 uint8_t addr_type, const uint8_t *const addr,
673 uint8_t *devmatch_id)
674 {
675 *devmatch_id = filter_find(filter, addr_type, addr);
676
677 return (*devmatch_id) == FILTER_IDX_NONE ? 0U : 1U;
678 }
679
680 #if defined(CONFIG_BT_CTLR_PRIVACY)
ull_filter_adv_scan_state_cb(uint8_t bm)681 void ull_filter_adv_scan_state_cb(uint8_t bm)
682 {
683 if (bm) {
684 rpa_refresh_start();
685 } else {
686 rpa_refresh_stop();
687 }
688 }
689
ull_filter_adv_update(uint8_t adv_fp)690 void ull_filter_adv_update(uint8_t adv_fp)
691 {
692 /* Clear before populating filter */
693 filter_clear(&fal_filter);
694
695 /* enabling advertising */
696 if (adv_fp &&
697 (!IS_ENABLED(CONFIG_BT_OBSERVER) ||
698 !(ull_scan_filter_pol_get(0) & 0x1))) {
699 /* filter accept list not in use, update FAL */
700 fal_update();
701 }
702
703 /* Clear before populating rl filter */
704 filter_clear(&rl_filter);
705
706 if (rl_enable &&
707 (!IS_ENABLED(CONFIG_BT_OBSERVER) || !ull_scan_is_enabled(0))) {
708 /* rl not in use, update resolving list LUT */
709 rl_update();
710 }
711 }
712
ull_filter_scan_update(uint8_t scan_fp)713 void ull_filter_scan_update(uint8_t scan_fp)
714 {
715 /* Clear before populating filter */
716 filter_clear(&fal_filter);
717
718 /* enabling advertising */
719 if ((scan_fp & 0x1) &&
720 (!IS_ENABLED(CONFIG_BT_BROADCASTER) ||
721 !ull_adv_filter_pol_get(0))) {
722 /* Filter Accept List not in use, update FAL */
723 fal_update();
724 }
725
726 /* Clear before populating rl filter */
727 filter_clear(&rl_filter);
728
729 if (rl_enable &&
730 (!IS_ENABLED(CONFIG_BT_BROADCASTER) || !ull_adv_is_enabled(0))) {
731 /* rl not in use, update resolving list LUT */
732 rl_update();
733 }
734 }
735
ull_filter_rpa_update(bool timeout)736 void ull_filter_rpa_update(bool timeout)
737 {
738 uint8_t i;
739 int err;
740 int64_t now = k_uptime_get();
741 bool all = timeout || (rpa_last_ms == -1) ||
742 (now - rpa_last_ms >= rpa_timeout_ms);
743 LOG_DBG("");
744
745 for (i = 0U; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
746 if ((rl[i].taken) && (all || !rl[i].rpas_ready)) {
747
748 if (rl[i].pirk) {
749 uint8_t irk[IRK_SIZE];
750
751 /* TODO: move this swap to the driver level */
752 sys_memcpy_swap(irk, peer_irks[rl[i].pirk_idx],
753 IRK_SIZE);
754 err = bt_rpa_create(irk, &rl[i].peer_rpa);
755 LL_ASSERT(!err);
756 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
757 /* a new key was added,
758 * invalidate the known/unknown peer RPA cache
759 */
760 prpa_cache_clear();
761 trpa_cache_clear();
762 #endif
763 }
764
765 if (rl[i].lirk) {
766 bt_addr_t rpa;
767
768 err = bt_rpa_create(rl[i].local_irk, &rpa);
769 LL_ASSERT(!err);
770 /* pointer read/write assumed to be atomic
771 * so that if ISR fires the local_rpa pointer
772 * will always point to a valid full RPA
773 */
774 rl[i].local_rpa = &rpa;
775 bt_addr_copy(&local_rpas[i], &rpa);
776 rl[i].local_rpa = &local_rpas[i];
777 }
778
779 rl[i].rpas_ready = 1U;
780 }
781 }
782
783 if (all) {
784 rpa_last_ms = now;
785 }
786
787 if (timeout) {
788 #if defined(CONFIG_BT_BROADCASTER)
789 uint8_t handle;
790
791 for (handle = 0U; handle < BT_CTLR_ADV_SET; handle++) {
792 struct ll_adv_set *adv;
793
794 adv = ull_adv_is_enabled_get(handle);
795 if (adv) {
796 rpa_adv_refresh(adv);
797 }
798 }
799 #endif
800 }
801 }
802
803 #if defined(CONFIG_BT_BROADCASTER)
ull_filter_adva_get(uint8_t rl_idx)804 const uint8_t *ull_filter_adva_get(uint8_t rl_idx)
805 {
806 /* AdvA */
807 if (rl_idx < ARRAY_SIZE(rl) && rl[rl_idx].lirk) {
808 LL_ASSERT(rl[rl_idx].rpas_ready);
809 return rl[rl_idx].local_rpa->val;
810 }
811
812 return NULL;
813 }
814
ull_filter_tgta_get(uint8_t rl_idx)815 const uint8_t *ull_filter_tgta_get(uint8_t rl_idx)
816 {
817 /* TargetA */
818 if (rl_idx < ARRAY_SIZE(rl) && rl[rl_idx].pirk) {
819 return rl[rl_idx].peer_rpa.val;
820 }
821
822 return NULL;
823 }
824 #endif /* CONFIG_BT_BROADCASTER */
825
ull_filter_rl_find(uint8_t id_addr_type,uint8_t const * const id_addr,uint8_t * const free_idx)826 uint8_t ull_filter_rl_find(uint8_t id_addr_type, uint8_t const *const id_addr,
827 uint8_t *const free_idx)
828 {
829 uint8_t i;
830
831 if (free_idx) {
832 *free_idx = FILTER_IDX_NONE;
833 }
834
835 for (i = 0U; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
836 if (LIST_MATCH(rl, i, id_addr_type, id_addr)) {
837 return i;
838 } else if (free_idx && !rl[i].taken &&
839 (*free_idx == FILTER_IDX_NONE)) {
840 *free_idx = i;
841 }
842 }
843
844 return FILTER_IDX_NONE;
845 }
846
ull_filter_lll_lrpa_used(uint8_t rl_idx)847 bool ull_filter_lll_lrpa_used(uint8_t rl_idx)
848 {
849 return rl_idx < ARRAY_SIZE(rl) && rl[rl_idx].lirk;
850 }
851
ull_filter_lll_lrpa_get(uint8_t rl_idx)852 bt_addr_t *ull_filter_lll_lrpa_get(uint8_t rl_idx)
853 {
854 if ((rl_idx >= ARRAY_SIZE(rl)) || !rl[rl_idx].lirk ||
855 !rl[rl_idx].rpas_ready) {
856 return NULL;
857 }
858
859 return rl[rl_idx].local_rpa;
860 }
861
ull_filter_lll_irks_get(uint8_t * count)862 uint8_t *ull_filter_lll_irks_get(uint8_t *count)
863 {
864 *count = peer_irk_count;
865 return (uint8_t *)peer_irks;
866 }
867
ull_filter_lll_rl_idx(bool filter,uint8_t devmatch_id)868 uint8_t ull_filter_lll_rl_idx(bool filter, uint8_t devmatch_id)
869 {
870 uint8_t i;
871
872 if (filter) {
873 LL_ASSERT(devmatch_id < ARRAY_SIZE(fal));
874 LL_ASSERT(fal[devmatch_id].taken);
875 i = fal[devmatch_id].rl_idx;
876 } else {
877 LL_ASSERT(devmatch_id < ARRAY_SIZE(rl));
878 i = devmatch_id;
879 LL_ASSERT(rl[i].taken);
880 }
881
882 return i;
883 }
884
ull_filter_lll_rl_irk_idx(uint8_t irkmatch_id)885 uint8_t ull_filter_lll_rl_irk_idx(uint8_t irkmatch_id)
886 {
887 uint8_t i;
888
889 LL_ASSERT(irkmatch_id < peer_irk_count);
890 i = peer_irk_rl_ids[irkmatch_id];
891 LL_ASSERT(i < CONFIG_BT_CTLR_RL_SIZE);
892 LL_ASSERT(rl[i].taken);
893
894 return i;
895 }
896
ull_filter_lll_irk_in_fal(uint8_t rl_idx)897 bool ull_filter_lll_irk_in_fal(uint8_t rl_idx)
898 {
899 if (rl_idx >= ARRAY_SIZE(rl)) {
900 return false;
901 }
902
903 LL_ASSERT(rl[rl_idx].taken);
904
905 return rl[rl_idx].fal;
906 }
907
ull_filter_lll_fal_get(void)908 struct lll_fal *ull_filter_lll_fal_get(void)
909 {
910 return fal;
911 }
912
ull_filter_lll_resolve_list_get(void)913 struct lll_resolve_list *ull_filter_lll_resolve_list_get(void)
914 {
915 return rl;
916 }
917
ull_filter_lll_rl_idx_allowed(uint8_t irkmatch_ok,uint8_t rl_idx)918 bool ull_filter_lll_rl_idx_allowed(uint8_t irkmatch_ok, uint8_t rl_idx)
919 {
920 /* If AR is disabled or we don't know the device or we matched an IRK
921 * then we're all set.
922 */
923 if (!rl_enable || rl_idx >= ARRAY_SIZE(rl) || irkmatch_ok) {
924 return true;
925 }
926
927 LL_ASSERT(rl_idx < CONFIG_BT_CTLR_RL_SIZE);
928 LL_ASSERT(rl[rl_idx].taken);
929
930 return !rl[rl_idx].pirk || rl[rl_idx].dev;
931 }
932
ull_filter_lll_rl_addr_allowed(uint8_t id_addr_type,const uint8_t * id_addr,uint8_t * const rl_idx)933 bool ull_filter_lll_rl_addr_allowed(uint8_t id_addr_type,
934 const uint8_t *id_addr,
935 uint8_t *const rl_idx)
936 {
937 uint8_t i, j;
938
939 /* We matched an IRK then we're all set. No hw
940 * filters are used in this case.
941 */
942 if (*rl_idx != FILTER_IDX_NONE) {
943 return true;
944 }
945
946 for (i = 0U; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
947 if (rl[i].taken && (rl[i].id_addr_type == id_addr_type)) {
948 uint8_t *addr = rl[i].id_addr.val;
949
950 for (j = 0U; j < BDADDR_SIZE; j++) {
951 if (addr[j] != id_addr[j]) {
952 break;
953 }
954 }
955
956 if (j == BDADDR_SIZE) {
957 *rl_idx = i;
958 return !rl[i].pirk || rl[i].dev;
959 }
960 }
961 }
962
963 return true;
964 }
965
ull_filter_lll_rl_addr_resolve(uint8_t id_addr_type,const uint8_t * id_addr,uint8_t rl_idx)966 bool ull_filter_lll_rl_addr_resolve(uint8_t id_addr_type,
967 const uint8_t *id_addr, uint8_t rl_idx)
968 {
969 /* Unable to resolve if AR is disabled, no RL entry or no local IRK */
970 if (!rl_enable || rl_idx >= ARRAY_SIZE(rl) || !rl[rl_idx].lirk) {
971 return false;
972 }
973
974 if ((id_addr_type != 0U) && ((id_addr[5] & 0xc0) == 0x40)) {
975 return bt_rpa_irk_matches(rl[rl_idx].local_irk,
976 (bt_addr_t *)id_addr);
977 }
978
979 return false;
980 }
981
ull_filter_lll_rl_enabled(void)982 bool ull_filter_lll_rl_enabled(void)
983 {
984 return rl_enable;
985 }
986
987 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
ull_filter_deferred_resolve(bt_addr_t * rpa,resolve_callback_t cb)988 uint8_t ull_filter_deferred_resolve(bt_addr_t *rpa, resolve_callback_t cb)
989 {
990 if (rl_enable) {
991 if (!k_work_is_pending(&(resolve_work.prpa_work))) {
992 /* copy input param to work variable */
993 (void)memcpy(resolve_work.rpa.val, rpa->val,
994 sizeof(bt_addr_t));
995 resolve_work.cb = cb;
996
997 k_work_submit(&(resolve_work.prpa_work));
998
999 return 1;
1000 }
1001 }
1002
1003 return 0;
1004 }
1005
ull_filter_deferred_targeta_resolve(bt_addr_t * rpa,uint8_t rl_idx,resolve_callback_t cb)1006 uint8_t ull_filter_deferred_targeta_resolve(bt_addr_t *rpa, uint8_t rl_idx,
1007 resolve_callback_t cb)
1008 {
1009 if (rl_enable) {
1010 if (!k_work_is_pending(&(t_work.target_work))) {
1011 /* copy input param to work variable */
1012 (void)memcpy(t_work.rpa.val, rpa->val,
1013 sizeof(bt_addr_t));
1014 t_work.cb = cb;
1015 t_work.idx = rl_idx;
1016
1017 k_work_submit(&(t_work.target_work));
1018
1019 return 1;
1020 }
1021 }
1022 return 0;
1023 }
1024 #endif /* CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY */
1025
fal_clear(void)1026 static void fal_clear(void)
1027 {
1028 for (int i = 0; i < CONFIG_BT_CTLR_FAL_SIZE; i++) {
1029 uint8_t j = fal[i].rl_idx;
1030
1031 if (j < ARRAY_SIZE(rl)) {
1032 rl[j].fal = 0U;
1033 }
1034 fal[i].taken = 0U;
1035 }
1036 }
1037
fal_find(uint8_t addr_type,const uint8_t * const addr,uint8_t * const free_idx)1038 static uint8_t fal_find(uint8_t addr_type, const uint8_t *const addr,
1039 uint8_t *const free_idx)
1040 {
1041 int i;
1042
1043 if (free_idx) {
1044 *free_idx = FILTER_IDX_NONE;
1045 }
1046
1047 for (i = 0; i < CONFIG_BT_CTLR_FAL_SIZE; i++) {
1048 if (LIST_MATCH(fal, i, addr_type, addr)) {
1049 return i;
1050 } else if (free_idx && !fal[i].taken &&
1051 (*free_idx == FILTER_IDX_NONE)) {
1052 *free_idx = i;
1053 }
1054 }
1055
1056 return FILTER_IDX_NONE;
1057 }
1058
fal_add(bt_addr_le_t * id_addr)1059 static uint32_t fal_add(bt_addr_le_t *id_addr)
1060 {
1061 uint8_t i, j;
1062
1063 i = fal_find(id_addr->type, id_addr->a.val, &j);
1064
1065 /* Duplicate check */
1066 if (i < ARRAY_SIZE(fal)) {
1067 return 0;
1068 } else if (j >= ARRAY_SIZE(fal)) {
1069 return BT_HCI_ERR_MEM_CAPACITY_EXCEEDED;
1070 }
1071
1072 i = j;
1073
1074 fal[i].id_addr_type = id_addr->type & 0x1;
1075 bt_addr_copy(&fal[i].id_addr, &id_addr->a);
1076 /* Get index to Resolving List if applicable */
1077 j = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
1078 if (j < ARRAY_SIZE(rl)) {
1079 fal[i].rl_idx = j;
1080 rl[j].fal = 1U;
1081 } else {
1082 fal[i].rl_idx = FILTER_IDX_NONE;
1083 }
1084 fal[i].taken = 1U;
1085
1086 return 0;
1087 }
1088
fal_remove(bt_addr_le_t * id_addr)1089 static uint32_t fal_remove(bt_addr_le_t *id_addr)
1090 {
1091 /* find the device and mark it as empty */
1092 uint8_t i = fal_find(id_addr->type, id_addr->a.val, NULL);
1093
1094 if (i < ARRAY_SIZE(fal)) {
1095 uint8_t j = fal[i].rl_idx;
1096
1097 if (j < ARRAY_SIZE(rl)) {
1098 rl[j].fal = 0U;
1099 }
1100 fal[i].taken = 0U;
1101
1102 return 0;
1103 }
1104
1105 return BT_HCI_ERR_UNKNOWN_CONN_ID;
1106 }
1107
fal_update(void)1108 static void fal_update(void)
1109 {
1110 uint8_t i;
1111
1112 /* Populate filter from fal peers */
1113 for (i = 0U; i < CONFIG_BT_CTLR_FAL_SIZE; i++) {
1114 uint8_t j;
1115
1116 if (!fal[i].taken) {
1117 continue;
1118 }
1119
1120 j = fal[i].rl_idx;
1121
1122 if (!rl_enable || j >= ARRAY_SIZE(rl) || !rl[j].pirk ||
1123 rl[j].dev) {
1124 filter_insert(&fal_filter, i, fal[i].id_addr_type,
1125 fal[i].id_addr.val);
1126 }
1127 }
1128 }
1129
rl_update(void)1130 static void rl_update(void)
1131 {
1132 uint8_t i;
1133
1134 /* Populate filter from rl peers */
1135 for (i = 0U; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
1136 if (rl[i].taken) {
1137 filter_insert(&rl_filter, i, rl[i].id_addr_type,
1138 rl[i].id_addr.val);
1139 }
1140 }
1141 }
1142
1143 #if defined(CONFIG_BT_BROADCASTER)
rpa_adv_refresh(struct ll_adv_set * adv)1144 static void rpa_adv_refresh(struct ll_adv_set *adv)
1145 {
1146 struct lll_adv_aux *lll_aux;
1147 struct pdu_adv *prev;
1148 struct lll_adv *lll;
1149 struct pdu_adv *pdu;
1150 uint8_t pri_idx;
1151
1152 #if defined(CONFIG_BT_CTLR_ADV_EXT)
1153 uint8_t sec_idx;
1154 #endif /* CONFIG_BT_CTLR_ADV_EXT */
1155
1156 if (adv->own_addr_type != BT_ADDR_LE_PUBLIC_ID &&
1157 adv->own_addr_type != BT_ADDR_LE_RANDOM_ID) {
1158 return;
1159 }
1160
1161 lll = &adv->lll;
1162 if (lll->rl_idx >= ARRAY_SIZE(rl)) {
1163 return;
1164 }
1165
1166
1167 pri_idx = UINT8_MAX;
1168 lll_aux = NULL;
1169 pdu = NULL;
1170 prev = lll_adv_data_peek(lll);
1171
1172 if (false) {
1173
1174 #if defined(CONFIG_BT_CTLR_ADV_EXT)
1175 } else if (prev->type == PDU_ADV_TYPE_EXT_IND) {
1176 struct pdu_adv_com_ext_adv *pri_com_hdr;
1177 struct pdu_adv_ext_hdr pri_hdr_flags;
1178 struct pdu_adv_ext_hdr *pri_hdr;
1179
1180 /* Pick the primary PDU header flags */
1181 pri_com_hdr = (void *)&prev->adv_ext_ind;
1182 pri_hdr = (void *)pri_com_hdr->ext_hdr_adv_data;
1183 if (pri_com_hdr->ext_hdr_len) {
1184 pri_hdr_flags = *pri_hdr;
1185 } else {
1186 *(uint8_t *)&pri_hdr_flags = 0U;
1187 }
1188
1189 /* AdvA, in primary or auxiliary PDU */
1190 if (pri_hdr_flags.adv_addr) {
1191 pdu = lll_adv_data_alloc(lll, &pri_idx);
1192 (void)memcpy(pdu, prev, (PDU_AC_LL_HEADER_SIZE +
1193 prev->len));
1194
1195 #if (CONFIG_BT_CTLR_ADV_AUX_SET > 0)
1196 } else if (pri_hdr_flags.aux_ptr) {
1197 struct pdu_adv_com_ext_adv *sec_com_hdr;
1198 struct pdu_adv_ext_hdr sec_hdr_flags;
1199 struct pdu_adv_ext_hdr *sec_hdr;
1200 struct pdu_adv *sec_pdu;
1201
1202 lll_aux = lll->aux;
1203 sec_pdu = lll_adv_aux_data_peek(lll_aux);
1204
1205 sec_com_hdr = (void *)&sec_pdu->adv_ext_ind;
1206 sec_hdr = (void *)sec_com_hdr->ext_hdr_adv_data;
1207 if (sec_com_hdr->ext_hdr_len) {
1208 sec_hdr_flags = *sec_hdr;
1209 } else {
1210 *(uint8_t *)&sec_hdr_flags = 0U;
1211 }
1212
1213 if (sec_hdr_flags.adv_addr) {
1214 pdu = lll_adv_aux_data_alloc(lll_aux, &sec_idx);
1215 (void)memcpy(pdu, sec_pdu,
1216 (PDU_AC_LL_HEADER_SIZE +
1217 sec_pdu->len));
1218 }
1219 #endif /* (CONFIG_BT_CTLR_ADV_AUX_SET > 0) */
1220 }
1221 #endif /* CONFIG_BT_CTLR_ADV_EXT */
1222
1223 } else {
1224 pdu = lll_adv_data_alloc(lll, &pri_idx);
1225 (void)memcpy(pdu, prev, (PDU_AC_LL_HEADER_SIZE + prev->len));
1226 }
1227
1228 if (pdu) {
1229 ull_adv_pdu_update_addrs(adv, pdu);
1230
1231 if (pri_idx != UINT8_MAX) {
1232 lll_adv_data_enqueue(lll, pri_idx);
1233
1234 #if defined(CONFIG_BT_CTLR_ADV_EXT)
1235 } else {
1236 lll_adv_aux_data_enqueue(lll_aux, sec_idx);
1237 #endif /* CONFIG_BT_CTLR_ADV_EXT */
1238
1239 }
1240 }
1241 }
1242 #endif /* CONFIG_BT_BROADCASTER */
1243
rl_clear(void)1244 static void rl_clear(void)
1245 {
1246 for (uint8_t i = 0; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
1247 rl[i].taken = 0U;
1248 }
1249
1250 peer_irk_count = 0U;
1251 }
1252
rl_access_check(bool check_ar)1253 static int rl_access_check(bool check_ar)
1254 {
1255 if (check_ar) {
1256 /* If address resolution is disabled, allow immediately */
1257 if (!rl_enable) {
1258 return -1;
1259 }
1260 }
1261
1262 /* NOTE: Allowed when passive scanning, otherwise deny if advertising,
1263 * active scanning, initiating or periodic sync create is active.
1264 */
1265 return ((IS_ENABLED(CONFIG_BT_BROADCASTER) && ull_adv_is_enabled(0)) ||
1266 (IS_ENABLED(CONFIG_BT_OBSERVER) &&
1267 (ull_scan_is_enabled(0) & ~ULL_SCAN_IS_PASSIVE)))
1268 ? 0 : 1;
1269 }
1270
rpa_timeout(struct k_work * work)1271 static void rpa_timeout(struct k_work *work)
1272 {
1273 ull_filter_rpa_update(true);
1274 k_work_schedule(&rpa_work, K_MSEC(rpa_timeout_ms));
1275 }
1276
rpa_refresh_start(void)1277 static void rpa_refresh_start(void)
1278 {
1279 LOG_DBG("");
1280 k_work_schedule(&rpa_work, K_MSEC(rpa_timeout_ms));
1281 }
1282
rpa_refresh_stop(void)1283 static void rpa_refresh_stop(void)
1284 {
1285 k_work_cancel_delayable(&rpa_work);
1286 }
1287
1288 #else /* !CONFIG_BT_CTLR_PRIVACY */
1289
filter_add(struct lll_filter * filter,uint8_t addr_type,uint8_t * bdaddr)1290 static uint32_t filter_add(struct lll_filter *filter, uint8_t addr_type,
1291 uint8_t *bdaddr)
1292 {
1293 int index;
1294
1295 if (filter->enable_bitmask == LLL_FILTER_BITMASK_ALL) {
1296 return BT_HCI_ERR_MEM_CAPACITY_EXCEEDED;
1297 }
1298
1299 for (index = 0;
1300 (filter->enable_bitmask & BIT(index));
1301 index++) {
1302 }
1303
1304 filter_insert(filter, index, addr_type, bdaddr);
1305 return 0;
1306 }
1307
filter_remove(struct lll_filter * filter,uint8_t addr_type,uint8_t * bdaddr)1308 static uint32_t filter_remove(struct lll_filter *filter, uint8_t addr_type,
1309 uint8_t *bdaddr)
1310 {
1311 int index;
1312
1313 index = filter_find(filter, addr_type, bdaddr);
1314 if (index == FILTER_IDX_NONE) {
1315 return BT_HCI_ERR_INVALID_PARAM;
1316 }
1317
1318 filter->enable_bitmask &= ~BIT(index);
1319 filter->addr_type_bitmask &= ~BIT(index);
1320
1321 return 0;
1322 }
1323 #endif /* !CONFIG_BT_CTLR_PRIVACY */
1324
filter_find(const struct lll_filter * const filter,uint8_t addr_type,const uint8_t * const bdaddr)1325 static uint32_t filter_find(const struct lll_filter *const filter,
1326 uint8_t addr_type, const uint8_t *const bdaddr)
1327 {
1328 int index;
1329
1330 if (!filter->enable_bitmask) {
1331 return FILTER_IDX_NONE;
1332 }
1333
1334 index = LLL_FILTER_SIZE;
1335 while (index--) {
1336 if ((filter->enable_bitmask & BIT(index)) &&
1337 (((filter->addr_type_bitmask >> index) & 0x01) ==
1338 (addr_type & 0x01)) &&
1339 !memcmp(filter->bdaddr[index], bdaddr, BDADDR_SIZE)) {
1340 return index;
1341 }
1342 }
1343
1344 return FILTER_IDX_NONE;
1345 }
1346
filter_insert(struct lll_filter * const filter,int index,uint8_t addr_type,const uint8_t * const bdaddr)1347 static void filter_insert(struct lll_filter *const filter, int index,
1348 uint8_t addr_type, const uint8_t *const bdaddr)
1349 {
1350 filter->enable_bitmask |= BIT(index);
1351 filter->addr_type_bitmask |= ((addr_type & 0x01) << index);
1352 (void)memcpy(&filter->bdaddr[index][0], bdaddr, BDADDR_SIZE);
1353 }
1354
filter_clear(struct lll_filter * filter)1355 static void filter_clear(struct lll_filter *filter)
1356 {
1357 filter->enable_bitmask = 0;
1358 filter->addr_type_bitmask = 0;
1359 }
1360 #endif /* CONFIG_BT_CTLR_FILTER_ACCEPT_LIST */
1361
1362 #if defined(CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST)
pal_clear(void)1363 static void pal_clear(void)
1364 {
1365 for (int i = 0; i < PAL_SIZE; i++) {
1366
1367 #if defined(CONFIG_BT_CTLR_PRIVACY)
1368 uint8_t j = pal[i].rl_idx;
1369
1370 if (j < ARRAY_SIZE(pal)) {
1371 rl[j].pal = 0U;
1372 }
1373 #endif /* CONFIG_BT_CTLR_PRIVACY */
1374
1375 pal[i].taken = 0U;
1376 }
1377 }
1378
1379 #if defined(CONFIG_BT_CTLR_PRIVACY)
pal_addr_find(const uint8_t addr_type,const uint8_t * const addr)1380 static uint8_t pal_addr_find(const uint8_t addr_type, const uint8_t *const addr)
1381 {
1382 for (int i = 0; i < PAL_SIZE; i++) {
1383 if (PAL_ADDR_MATCH(addr_type, addr)) {
1384 return i;
1385 }
1386 }
1387
1388 return FILTER_IDX_NONE;
1389 }
1390 #endif /* CONFIG_BT_CTLR_PRIVACY */
1391
pal_find(const uint8_t addr_type,const uint8_t * const addr,const uint8_t sid,uint8_t * const free_idx)1392 static uint8_t pal_find(const uint8_t addr_type, const uint8_t *const addr,
1393 const uint8_t sid, uint8_t *const free_idx)
1394 {
1395 int i;
1396
1397 if (free_idx) {
1398 *free_idx = FILTER_IDX_NONE;
1399 }
1400
1401 for (i = 0; i < PAL_SIZE; i++) {
1402 if (PAL_MATCH(addr_type, addr, sid)) {
1403 return i;
1404 } else if (free_idx && !pal[i].taken &&
1405 (*free_idx == FILTER_IDX_NONE)) {
1406 *free_idx = i;
1407 }
1408 }
1409
1410 return FILTER_IDX_NONE;
1411 }
1412
pal_add(const bt_addr_le_t * const id_addr,const uint8_t sid)1413 static uint32_t pal_add(const bt_addr_le_t *const id_addr, const uint8_t sid)
1414 {
1415 uint8_t i, j;
1416
1417 i = pal_find(id_addr->type, id_addr->a.val, sid, &j);
1418
1419 /* Duplicate check */
1420 if (i < PAL_SIZE) {
1421 return BT_HCI_ERR_INVALID_PARAM;
1422 } else if (j >= PAL_SIZE) {
1423 return BT_HCI_ERR_MEM_CAPACITY_EXCEEDED;
1424 }
1425
1426 i = j;
1427
1428 pal[i].id_addr_type = id_addr->type & 0x1;
1429 bt_addr_copy(&pal[i].id_addr, &id_addr->a);
1430 pal[i].sid = sid;
1431
1432 #if defined(CONFIG_BT_CTLR_PRIVACY)
1433 /* Get index to Resolving List if applicable */
1434 j = ull_filter_rl_find(id_addr->type, id_addr->a.val, NULL);
1435 if (j < ARRAY_SIZE(rl)) {
1436 pal[i].rl_idx = j;
1437 rl[j].pal = i + 1U;
1438 } else {
1439 pal[i].rl_idx = FILTER_IDX_NONE;
1440 }
1441 #endif /* CONFIG_BT_CTLR_PRIVACY */
1442
1443 pal[i].taken = 1U;
1444
1445 return 0;
1446 }
1447
pal_remove(const bt_addr_le_t * const id_addr,const uint8_t sid)1448 static uint32_t pal_remove(const bt_addr_le_t *const id_addr, const uint8_t sid)
1449 {
1450 /* find the device and mark it as empty */
1451 uint8_t i = pal_find(id_addr->type, id_addr->a.val, sid, NULL);
1452
1453 if (i < PAL_SIZE) {
1454
1455 #if defined(CONFIG_BT_CTLR_PRIVACY)
1456 uint8_t j = pal[i].rl_idx;
1457
1458 if (j < ARRAY_SIZE(rl)) {
1459 rl[j].pal = 0U;
1460 }
1461 #endif /* CONFIG_BT_CTLR_PRIVACY */
1462
1463 pal[i].taken = 0U;
1464
1465 return 0;
1466 }
1467
1468 return BT_HCI_ERR_UNKNOWN_ADV_IDENTIFIER;
1469 }
1470 #endif /* CONFIG_BT_CTLR_SYNC_PERIODIC_ADV_LIST */
1471
1472 #if defined(CONFIG_BT_CTLR_PRIVACY) && \
1473 defined(CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN)
conn_rpa_update(uint8_t rl_idx)1474 static void conn_rpa_update(uint8_t rl_idx)
1475 {
1476 uint16_t handle;
1477
1478 for (handle = 0U; handle < CONFIG_BT_MAX_CONN; handle++) {
1479 struct ll_conn *conn = ll_connected_get(handle);
1480
1481 /* The RPA of the connection matches the RPA that was just
1482 * resolved
1483 */
1484 if (conn && !memcmp(conn->peer_id_addr, rl[rl_idx].curr_rpa.val,
1485 BDADDR_SIZE)) {
1486 (void)memcpy(conn->peer_id_addr, rl[rl_idx].id_addr.val,
1487 BDADDR_SIZE);
1488 break;
1489 }
1490 }
1491 }
1492 #endif /* CONFIG_BT_CTLR_PRIVACY && CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN */
1493
1494 #if defined(CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY)
target_resolve(struct k_work * work)1495 static void target_resolve(struct k_work *work)
1496 {
1497 uint8_t j, idx;
1498 bt_addr_t *search_rpa;
1499 struct target_resolve_work *twork;
1500 static memq_link_t link;
1501 static struct mayfly mfy = {0, 0, &link, 0, NULL};
1502
1503 twork = CONTAINER_OF(work, struct target_resolve_work, target_work);
1504 idx = twork->idx;
1505 search_rpa = &(twork->rpa);
1506
1507 if (rl[idx].taken && bt_addr_eq(&(rl[idx].target_rpa), search_rpa)) {
1508 j = idx;
1509 } else {
1510 uint8_t i;
1511
1512 /* No match - so not in list; Need to see if we can resolve */
1513
1514 i = trpa_cache_find(search_rpa, idx);
1515 if (i != FILTER_IDX_NONE) {
1516 /* Found a known unknown - do nothing */
1517 j = FILTER_IDX_NONE;
1518 } else if (bt_rpa_irk_matches(rl[idx].local_irk, search_rpa)) {
1519 /* Could resolve, store RPA */
1520 (void)memcpy(rl[idx].target_rpa.val, search_rpa->val,
1521 sizeof(bt_addr_t));
1522 j = idx;
1523 } else if (rl[idx].taken) {
1524 /* No match - thus cannot resolve, we have an unknown
1525 * so insert in known unknown list
1526 */
1527 trpa_cache_add(search_rpa, idx);
1528 j = FILTER_IDX_NONE;
1529 } else {
1530 /* Could not resolve, and not in table */
1531 j = FILTER_IDX_NONE;
1532 }
1533 }
1534
1535 /* Kick the callback in LLL (using the mayfly, tailchain it)
1536 * Pass param FILTER_IDX_NONE if RPA can not be resolved,
1537 * or index in cache if it can be resolved
1538 */
1539 if (twork->cb) {
1540 mfy.fp = twork->cb;
1541 mfy.param = (void *) ((unsigned int) j);
1542 (void)mayfly_enqueue(TICKER_USER_ID_THREAD,
1543 TICKER_USER_ID_LLL, 1, &mfy);
1544 }
1545 }
1546
prpa_cache_try_resolve(bt_addr_t * rpa)1547 static uint8_t prpa_cache_try_resolve(bt_addr_t *rpa)
1548 {
1549 uint8_t pi;
1550 uint8_t lpirk[IRK_SIZE];
1551
1552 for (uint8_t i = 0U; i < CONFIG_BT_CTLR_RL_SIZE; i++) {
1553 if (rl[i].taken && rl[i].pirk) {
1554 pi = rl[i].pirk_idx;
1555 sys_memcpy_swap(lpirk, peer_irks[pi], IRK_SIZE);
1556 if (bt_rpa_irk_matches(lpirk, rpa)) {
1557 return i;
1558 }
1559 }
1560 }
1561
1562 return FILTER_IDX_NONE;
1563 }
1564
prpa_cache_resolve(struct k_work * work)1565 static void prpa_cache_resolve(struct k_work *work)
1566 {
1567 uint8_t i, j;
1568 bt_addr_t *search_rpa;
1569 struct prpa_resolve_work *rwork;
1570 static memq_link_t link;
1571 static struct mayfly mfy = {0, 0, &link, 0, NULL};
1572
1573 rwork = CONTAINER_OF(work, struct prpa_resolve_work, prpa_work);
1574 search_rpa = &(rwork->rpa);
1575
1576 i = prpa_cache_find(search_rpa);
1577
1578 if (i == FILTER_IDX_NONE) {
1579 /* No match - so not in known unknown list
1580 * Need to see if we can resolve
1581 */
1582 j = prpa_cache_try_resolve(search_rpa);
1583
1584 if (j == FILTER_IDX_NONE) {
1585 /* No match - thus cannot resolve, we have an unknown
1586 * so insert in known unkonown list
1587 */
1588 prpa_cache_add(search_rpa);
1589 } else {
1590 /* Address could be resolved, so update current RPA
1591 * in list
1592 */
1593 (void)memcpy(rl[j].curr_rpa.val, search_rpa->val,
1594 sizeof(bt_addr_t));
1595 #if defined(CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN)
1596 conn_rpa_update(j);
1597 #endif /* CONFIG_BT_CTLR_CHECK_SAME_PEER_CONN */
1598 }
1599
1600 } else {
1601 /* Found a known unknown - do nothing */
1602 j = FILTER_IDX_NONE;
1603 }
1604
1605 /* Kick the callback in LLL (using the mayfly, tailchain it)
1606 * Pass param FILTER_IDX_NONE if RPA can not be resolved,
1607 * or index in cache if it can be resolved
1608 */
1609 if (rwork->cb) {
1610 mfy.fp = rwork->cb;
1611 mfy.param = (void *) ((unsigned int) j);
1612 (void)mayfly_enqueue(TICKER_USER_ID_THREAD,
1613 TICKER_USER_ID_LLL, 1, &mfy);
1614 }
1615 }
1616
prpa_cache_clear(void)1617 static void prpa_cache_clear(void)
1618 {
1619 /* Note the first element will not be in use before wrap around
1620 * is reached.
1621 * The first element in actual use will be at index 1.
1622 * There is no element waisted with this implementation, as
1623 * element 0 will eventually be allocated.
1624 */
1625 newest_prpa = 0U;
1626
1627 for (uint8_t i = 0; i < CONFIG_BT_CTLR_RPA_CACHE_SIZE; i++) {
1628 prpa_cache[i].taken = 0U;
1629 }
1630 }
1631
prpa_cache_add(bt_addr_t * rpa)1632 static void prpa_cache_add(bt_addr_t *rpa)
1633 {
1634 newest_prpa = (newest_prpa + 1) % CONFIG_BT_CTLR_RPA_CACHE_SIZE;
1635
1636 (void)memcpy(prpa_cache[newest_prpa].rpa.val, rpa->val,
1637 sizeof(bt_addr_t));
1638 prpa_cache[newest_prpa].taken = 1U;
1639 }
1640
prpa_cache_find(bt_addr_t * rpa)1641 static uint8_t prpa_cache_find(bt_addr_t *rpa)
1642 {
1643 for (uint8_t i = 0; i < CONFIG_BT_CTLR_RPA_CACHE_SIZE; i++) {
1644 if (prpa_cache[i].taken &&
1645 bt_addr_eq(&(prpa_cache[i].rpa), rpa)) {
1646 return i;
1647 }
1648 }
1649 return FILTER_IDX_NONE;
1650 }
1651
ull_filter_lll_prpa_cache_get(void)1652 const struct lll_prpa_cache *ull_filter_lll_prpa_cache_get(void)
1653 {
1654 return prpa_cache;
1655 }
1656
trpa_cache_clear(void)1657 static void trpa_cache_clear(void)
1658 {
1659 /* Note the first element will not be in use before wrap around
1660 * is reached.
1661 * The first element in actual use will be at index 1.
1662 * There is no element waisted with this implementation, as
1663 * element 0 will eventually be allocated.
1664 */
1665 newest_trpa = 0U;
1666
1667 for (uint8_t i = 0; i < CONFIG_BT_CTLR_TRPA_CACHE_SIZE; i++) {
1668 trpa_cache[i].rl_idx = FILTER_IDX_NONE;
1669 }
1670 }
1671
trpa_cache_add(bt_addr_t * rpa,uint8_t rl_idx)1672 static void trpa_cache_add(bt_addr_t *rpa, uint8_t rl_idx)
1673 {
1674 newest_trpa = (newest_trpa + 1) % CONFIG_BT_CTLR_TRPA_CACHE_SIZE;
1675
1676 (void)memcpy(trpa_cache[newest_trpa].rpa.val, rpa->val,
1677 sizeof(bt_addr_t));
1678 trpa_cache[newest_trpa].rl_idx = rl_idx;
1679 }
1680
trpa_cache_find(bt_addr_t * rpa,uint8_t rl_idx)1681 static uint8_t trpa_cache_find(bt_addr_t *rpa, uint8_t rl_idx)
1682 {
1683 for (uint8_t i = 0; i < CONFIG_BT_CTLR_TRPA_CACHE_SIZE; i++) {
1684 if (trpa_cache[i].rl_idx == rl_idx &&
1685 bt_addr_eq(&(trpa_cache[i].rpa), rpa)) {
1686 return i;
1687 }
1688 }
1689 return FILTER_IDX_NONE;
1690 }
1691
ull_filter_lll_trpa_cache_get(void)1692 const struct lll_trpa_cache *ull_filter_lll_trpa_cache_get(void)
1693 {
1694 return trpa_cache;
1695 }
1696
1697 #endif /* !CONFIG_BT_CTLR_SW_DEFERRED_PRIVACY */
1698