mirror of
https://github.com/bluekitchen/btstack.git
synced 2025-03-26 11:37:10 +00:00
create RFCOMM connection send OBEX Connect and receive response retrieve phone book repeat GET request when response incomplete start extracting goep_client.h support CONNECT message support GET message add obex_iterator use obex_iterator goep_client adds connection_id if available avoid accessing internal goep state from pbap start extracting pbap_client.h events: add meta events and data packet types for GOEP and PBAP use events and data packet type for goep use events and data packet type for pbap remove private fields from GOEP_SUBEVENT_CONNECTION_OPENED implement SetPhoneBook return cid in connect operations, return errors if busy, return obex errors limit OBEX packet size by bearer MTU split into obex.h, goep_client.h, goep_client.c, pbap_client.h, pbab_client.c fix state after pull phonebook add console UI for testing clean up code provide packet_handler in create connection for pbap_client and goep_client annotate headers for goep_client and pbap_client
197 lines
7.9 KiB
C
197 lines
7.9 KiB
C
/*
|
|
* Copyright (C) 2014 BlueKitchen GmbH
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the copyright holders nor the names of
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
* 4. Any redistribution, use, or modification is done solely for
|
|
* personal benefit and not for any commercial purpose or for
|
|
* monetary gain.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
|
|
* RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* Please inquire about commercial licensing options at
|
|
* contact@bluekitchen-gmbh.com
|
|
*
|
|
*/
|
|
|
|
// *****************************************************************************
|
|
/* EXAMPLE_START(sm_pairing_peripheral): LE Peripheral - Test pairing combinations
|
|
*
|
|
* @text Depending on the Authentication requiremens and IO Capabilities,
|
|
* the pairing process uses different short and long term key generation method.
|
|
* This example helps explore the different options incl. LE Secure Connections.
|
|
*/
|
|
// *****************************************************************************
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "sm_pairing_peripheral.h"
|
|
#include "btstack.h"
|
|
|
|
/* @section Main Application Setup
|
|
*
|
|
* @text Listing MainConfiguration shows main application code.
|
|
* It initializes L2CAP, the Security Manager and configures the ATT Server with the pre-compiled
|
|
* ATT Database generated from $sm_pairing_peripheral.gatt$. Finally, it configures the advertisements
|
|
* and boots the Bluetooth stack.
|
|
* In this example, the Advertisement contains the Flags attribute and the device name.
|
|
* The flag 0x06 indicates: LE General Discoverable Mode and BR/EDR not supported.
|
|
* Various examples for IO Capabilites and Authentication Requirements are given below.
|
|
*/
|
|
|
|
/* LISTING_START(MainConfiguration): Init L2CAP SM ATT Server and start heartbeat timer */
|
|
static btstack_packet_callback_registration_t hci_event_callback_registration;
|
|
static btstack_packet_callback_registration_t sm_event_callback_registration;
|
|
// static hci_con_handle_t con_handle;
|
|
|
|
static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size);
|
|
|
|
const uint8_t adv_data[] = {
|
|
// Flags general discoverable, BR/EDR not supported
|
|
0x02, 0x01, 0x06,
|
|
// Name
|
|
0x0b, 0x09, 'S', 'M', ' ', 'P', 'a', 'i', 'r', 'i', 'n', 'g',
|
|
};
|
|
const uint8_t adv_data_len = sizeof(adv_data);
|
|
|
|
static void sm_peripheral_setup(void){
|
|
|
|
// register for HCI events
|
|
hci_event_callback_registration.callback = &packet_handler;
|
|
hci_add_event_handler(&hci_event_callback_registration);
|
|
|
|
l2cap_init();
|
|
|
|
// setup le device db
|
|
le_device_db_init();
|
|
|
|
// setup SM: Display only
|
|
sm_init();
|
|
sm_event_callback_registration.callback = &packet_handler;
|
|
sm_add_event_handler(&sm_event_callback_registration);
|
|
|
|
/**
|
|
* Choose ONE of the following configurations
|
|
*/
|
|
|
|
// LE Legacy Pairing, Just Works
|
|
sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT);
|
|
sm_set_authentication_requirements(0);
|
|
|
|
// LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays
|
|
// sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY);
|
|
// sm_set_authentication_requirements(SM_AUTHREQ_MITM_PROTECTION);
|
|
|
|
#ifdef ENABLE_LE_SECURE_CONNECTIONS
|
|
// LE Secure Connetions, Just Works
|
|
// sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO);
|
|
// sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION);
|
|
|
|
// LE Secure Connections, Numeric Comparison
|
|
// sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO);
|
|
// sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION);
|
|
|
|
// LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays
|
|
// sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY);
|
|
// sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION);
|
|
#endif
|
|
|
|
// setup ATT server
|
|
att_server_init(profile_data, NULL, NULL);
|
|
att_server_register_packet_handler(packet_handler);
|
|
|
|
// setup advertisements
|
|
uint16_t adv_int_min = 0x0030;
|
|
uint16_t adv_int_max = 0x0030;
|
|
uint8_t adv_type = 0;
|
|
bd_addr_t null_addr;
|
|
memset(null_addr, 0, 6);
|
|
gap_advertisements_set_params(adv_int_min, adv_int_max, adv_type, 0, null_addr, 0x07, 0x00);
|
|
gap_advertisements_set_data(adv_data_len, (uint8_t*) adv_data);
|
|
gap_advertisements_enable(1);
|
|
}
|
|
|
|
/* LISTING_END */
|
|
|
|
/*
|
|
* @section Packet Handler
|
|
*
|
|
* @text The packet handler is used to:
|
|
* - stop the counter after a disconnect
|
|
* - send a notification when the requested ATT_EVENT_CAN_SEND_NOW is received
|
|
*/
|
|
|
|
/* LISTING_START(packetHandler): Packet Handler */
|
|
static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){
|
|
UNUSED(channel);
|
|
UNUSED(size);
|
|
|
|
bd_addr_t addr;
|
|
switch (packet_type) {
|
|
case HCI_EVENT_PACKET:
|
|
switch (hci_event_packet_get_type(packet)) {
|
|
case SM_EVENT_JUST_WORKS_REQUEST:
|
|
printf("Just Works requested\n");
|
|
sm_just_works_confirm(sm_event_just_works_request_get_handle(packet));
|
|
break;
|
|
case SM_EVENT_NUMERIC_COMPARISON_REQUEST:
|
|
printf("Confirming numeric comparison: %u\n", sm_event_numeric_comparison_request_get_passkey(packet));
|
|
sm_numeric_comparison_confirm(sm_event_passkey_display_number_get_handle(packet));
|
|
break;
|
|
case SM_EVENT_PASSKEY_DISPLAY_NUMBER:
|
|
printf("Display Passkey: %u\n", sm_event_passkey_display_number_get_passkey(packet));
|
|
break;
|
|
case SM_EVENT_IDENTITY_CREATED:
|
|
sm_event_identity_created_get_identity_address(packet, addr);
|
|
printf("Identity created: type %u address %s\n", sm_event_identity_created_get_identity_addr_type(packet), bd_addr_to_str(addr));
|
|
break;
|
|
case SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED:
|
|
sm_event_identity_resolving_succeeded_get_identity_address(packet, addr);
|
|
printf("Identity resolved: type %u address %s\n", sm_event_identity_resolving_succeeded_get_identity_addr_type(packet), bd_addr_to_str(addr));
|
|
break;
|
|
case SM_EVENT_IDENTITY_RESOLVING_FAILED:
|
|
sm_event_identity_created_get_address(packet, addr);
|
|
printf("Identity resolving failed\n");
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
/* LISTING_END */
|
|
|
|
int btstack_main(void);
|
|
int btstack_main(void)
|
|
{
|
|
sm_peripheral_setup();
|
|
|
|
// turn on!
|
|
hci_power_control(HCI_POWER_ON);
|
|
|
|
return 0;
|
|
}
|
|
/* EXAMPLE_END */
|