btstack/test/pts/l2cap_cbm_ecbm.c
2021-11-22 17:36:47 +01:00

538 lines
23 KiB
C

/*
* Copyright (C) 2014 BlueKitchen GmbH
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the copyright holders nor the names of
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
* 4. Any redistribution, use, or modification is done solely for
* personal benefit and not for any commercial purpose or for
* monetary gain.
*
* THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
* RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* Please inquire about commercial licensing options at
* contact@bluekitchen-gmbh.com
*
*/
#define BTSTACK_FILE__ "l2cap_cbm_ecbm.c"
/*
* l2cap_cbm_ecbm.c
*/
#include <stdint.h>
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include "btstack_config.h"
#include "ble/le_device_db.h"
#include "ble/sm.h"
#include "btstack_debug.h"
#include "btstack_event.h"
#include "btstack_memory.h"
#include "btstack_run_loop.h"
#include "gap.h"
#include "hci.h"
#include "hci_dump.h"
#include "l2cap.h"
#include "btstack_stdin.h"
static void show_usage(void);
#define TEST_PACKET_SIZE 100
#define TSPX_PSM 0x01
#define TSPX_LE_PSM 0x25
#define TSPX_ENHANCED_PSM 0x27
#define TSPX_PSM_UNSUPPORTED 0xf1
#define TSPX_L2CA_CBMPS_MIN 64
#define MTU_MIN 64
#define ENHANCED_MTU_INITIAL (TEST_PACKET_SIZE-1)
#define ENHANCED_MTU_RECONFIGURE (TEST_PACKET_SIZE)
static btstack_packet_callback_registration_t hci_event_callback_registration;
static btstack_packet_callback_registration_t sm_event_callback_registration;
// static bd_addr_t pts_address = { 0x00, 0x1a, 0x7d, 0xda, 0x71, 0x0a};
static bd_addr_t pts_address = { 0x00, 0x1b, 0xdc, 0x08, 0x0a, 0xa5};
static int pts_address_type = 0;
static int master_addr_type = 0;
static hci_con_handle_t handle_le = HCI_CON_HANDLE_INVALID;
static hci_con_handle_t handle_classic = HCI_CON_HANDLE_INVALID;
static uint32_t ui_passkey;
static int ui_digits_for_passkey;
// general discoverable flags
static uint8_t adv_general_discoverable[] = { 2, 01, 02 };
static uint16_t initial_credits = L2CAP_LE_AUTOMATIC_CREDITS;
const char * data_short = "a";
const char * data_long = "0123456789abcdefghijklmnopqrstuvwxyz";
const char * data_classic = "ABCDEF";
static int todo_send_short;
static int todo_send_long;
// note: must be smaller than TSPX_tester_mtu for l2cap/le/cfc/bv-02-c to succeed
static uint8_t buffer_x[500];
static uint16_t cid_classic;
static uint16_t cid_credit_based;
uint8_t receive_buffer_X[100];
static uint8_t data_channel_buffer_1[TEST_PACKET_SIZE];
static uint8_t data_channel_buffer_2[TEST_PACKET_SIZE];
static uint8_t * receive_buffers_2[] = { data_channel_buffer_1, data_channel_buffer_2 };
static bool enhanced_data_channel;
static uint16_t enhanced_reconfigure_index = 0;
static uint16_t enhanced_reconfigure_mps[] = { TEST_PACKET_SIZE, TEST_PACKET_SIZE - 2 };
static uint16_t enhanced_reconfigure_choices = sizeof (enhanced_reconfigure_mps) / sizeof(uint16_t);
static bool enhanced_authorization_required = false;
static uint16_t enhanced_remote_mtu;
static bool enhanced_insufficient_key_size;
static void gap_run(void){
}
static void app_packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){
bd_addr_t event_address;
uint16_t psm;
uint16_t cid;
hci_con_handle_t handle;
uint16_t cids[2];
uint8_t status;
switch (packet_type) {
case L2CAP_DATA_PACKET:
printf("L2CAP data cid 0x%02x len %u: ", channel, size);
printf_hexdump(packet, size);
break;
case HCI_EVENT_PACKET:
switch (packet[0]) {
case BTSTACK_EVENT_STATE:
// bt stack activated, get started
if (btstack_event_state_get_state(packet) == HCI_STATE_WORKING){
show_usage();
}
break;
case HCI_EVENT_LE_META:
switch (hci_event_le_meta_get_subevent_code(packet)) {
case HCI_SUBEVENT_LE_CONNECTION_COMPLETE:
handle_le = little_endian_read_16(packet, 4);
printf("HCI: LE Connection Complete, connection handle 0x%04x\n", handle_le);
break;
default:
break;
}
break;
case HCI_EVENT_CONNECTION_COMPLETE:
handle_classic = little_endian_read_16(packet, 3);
printf("HCI: ACL Connection Complete, connection handle 0x%04x\n", handle_classic);
break;
case HCI_EVENT_DISCONNECTION_COMPLETE:
break;
// Classic
case L2CAP_EVENT_INCOMING_CONNECTION:
psm = l2cap_event_incoming_connection_get_psm(packet);
cid = l2cap_event_incoming_connection_get_local_cid(packet);
if (psm != TSPX_PSM) break;
printf("L2CAP: Accepting incoming Classic connection request for 0x%02x, PSM %02x\n", cid, psm);
l2cap_accept_connection(cid);
break;
case L2CAP_EVENT_CHANNEL_OPENED:
// inform about new l2cap connection
l2cap_event_channel_opened_get_address(packet, event_address);
psm = l2cap_event_channel_opened_get_psm(packet);
cid = l2cap_event_channel_opened_get_local_cid(packet);
handle = l2cap_event_channel_opened_get_handle(packet);
if (packet[2] == 0) {
enhanced_data_channel = false;
printf("L2CAP: Classic Channel successfully opened: %s, handle 0x%02x, psm 0x%02x, local cid 0x%02x, remote cid 0x%02x\n",
bd_addr_to_str(event_address), handle, psm, cid, l2cap_event_channel_opened_get_remote_cid(packet));
cid_classic = cid;
} else {
printf("L2CAP: classic connection to device %s failed. status code %u\n", bd_addr_to_str(event_address), packet[2]);
}
break;
case L2CAP_EVENT_CHANNEL_CLOSED:
cid = l2cap_event_channel_closed_get_local_cid(packet);
printf("L2CAP: Clasic Channel closed 0x%02x\n", cid);
break;
// LE CBM
case L2CAP_EVENT_CBM_INCOMING_CONNECTION:
psm = l2cap_event_cbm_incoming_connection_get_psm(packet);
cid = l2cap_event_cbm_incoming_connection_get_local_cid(packet);
if (psm != TSPX_LE_PSM) break;
printf("L2CAP: Accepting incoming LE connection request for 0x%02x, PSM %02x\n", cid, psm);
l2cap_cbm_accept_connection(cid, receive_buffer_X, sizeof(receive_buffer_X), initial_credits);
break;
case L2CAP_EVENT_CBM_CHANNEL_OPENED:
// inform about new l2cap connection
l2cap_event_cbm_channel_opened_get_address(packet, event_address);
psm = l2cap_event_cbm_channel_opened_get_psm(packet);
cid = l2cap_event_cbm_channel_opened_get_local_cid(packet);
handle = l2cap_event_cbm_channel_opened_get_handle(packet);
if (packet[2] == 0) {
enhanced_data_channel = false;
printf("L2CAP: LE Data Channel successfully opened: %s, handle 0x%02x, psm 0x%02x, local cid 0x%02x, remote cid 0x%02x\n",
bd_addr_to_str(event_address), handle, psm, cid, little_endian_read_16(packet, 15));
cid_credit_based = cid;
} else {
printf("L2CAP: LE Data Channel connection to device %s failed. status code %u\n", bd_addr_to_str(event_address), packet[2]);
}
break;
case L2CAP_EVENT_CAN_SEND_NOW:
if (todo_send_short){
todo_send_short = 0;
l2cap_send(cid_credit_based, (uint8_t *) data_short, strlen(data_short));
break;
}
if (todo_send_long){
todo_send_long = 0;
if (enhanced_data_channel){
memset(receive_buffer_X, 0x33, enhanced_remote_mtu);
l2cap_send(cid_credit_based, (uint8_t *) receive_buffer_X, enhanced_remote_mtu);
} else {
l2cap_send(cid_credit_based, (uint8_t *) data_long, strlen(data_long));
}
}
break;
case L2CAP_EVENT_PACKET_SENT:
cid = l2cap_event_packet_sent_get_local_cid(packet);
printf("L2CAP: LE Data Channel Packet sent0x%02x\n", cid);
break;
case L2CAP_EVENT_ECBM_CHANNEL_OPENED:
enhanced_data_channel = true;
cid = l2cap_event_ecbm_channel_opened_get_local_cid(packet);
status = l2cap_event_channel_opened_get_status(packet);
if (l2cap_event_channel_opened_get_status(packet) == 0){
cid_credit_based = cid;
enhanced_remote_mtu = l2cap_event_ecbm_channel_opened_get_remote_mtu(packet);
}
printf("L2CAP_EVENT_ECBM_CHANNEL_OPENED - cid 0x%04x mtu %u, status 0x%02x\n", cid, enhanced_remote_mtu, status);
break;
case L2CAP_EVENT_ECBM_INCOMING_CONNECTION:
printf("L2CAP_EVENT_ECBM_INCOMING_CONNECTION\n");
cid = l2cap_event_ecbm_incoming_connection_get_local_cid(packet);
if (enhanced_authorization_required){
enhanced_authorization_required = false;
l2cap_ecbm_decline_channels(cid, 0x0006);
break;
}
if (enhanced_insufficient_key_size){
enhanced_insufficient_key_size = false;
l2cap_ecbm_decline_channels(cid, 0x0007);
break;
}
l2cap_ecbm_accept_channels(cid, 2, initial_credits, ENHANCED_MTU_INITIAL, receive_buffers_2, cids);
break;
case L2CAP_EVENT_ECBM_RECONFIGURED:
enhanced_remote_mtu = l2cap_event_ecbm_reconfigured_get_mtu(packet);
printf("L2CAP_EVENT_ECBM_RECONFIGURED - remote mps %u, remote mtu %u\n",
l2cap_event_ecbm_reconfigured_get_mps(packet), enhanced_remote_mtu);
break;
case SM_EVENT_JUST_WORKS_REQUEST:
printf("SM_EVENT_JUST_WORKS_REQUEST\n");
sm_just_works_confirm(little_endian_read_16(packet, 2));
break;
case SM_EVENT_PASSKEY_INPUT_NUMBER:
// display number
master_addr_type = packet[4];
reverse_bd_addr(&packet[5], event_address);
printf("\nGAP Bonding %s (%u): Enter 6 digit passkey: '", bd_addr_to_str(pts_address), master_addr_type);
fflush(stdout);
ui_passkey = 0;
ui_digits_for_passkey = 6;
break;
case SM_EVENT_PASSKEY_DISPLAY_NUMBER:
// display number
printf("\nGAP Bonding %s (%u): Display Passkey '%06u\n", bd_addr_to_str(pts_address), master_addr_type, little_endian_read_32(packet, 11));
break;
case SM_EVENT_PASSKEY_DISPLAY_CANCEL:
printf("\nGAP Bonding %s (%u): Display cancel\n", bd_addr_to_str(pts_address), master_addr_type);
break;
case SM_EVENT_AUTHORIZATION_REQUEST:
// auto-authorize connection if requested
sm_authorization_grant(little_endian_read_16(packet, 2));
break;
default:
break;
}
}
gap_run();
}
void show_usage(void){
bd_addr_t iut_address;
uint8_t uit_addr_type;
gap_le_get_own_address(&uit_addr_type, iut_address);
printf("\n--- CLI for L2CAP and LE Data Channel %s ---\n", bd_addr_to_str(iut_address));
printf("a - create HCI LE connection to type %u address %s\n", pts_address_type, bd_addr_to_str(pts_address));
printf("A - create HCI BR/EDR connection to address %s\n", bd_addr_to_str(pts_address));
printf("b - connect to PSM 0x%02x CFC (TSPX_LE_PSM - LE)\n", TSPX_LE_PSM);
printf("B - connect to PSM 0x%02x CFC (TSPX_PSM_UNSUPPORTED - LE)\n", TSPX_PSM_UNSUPPORTED);
printf("c - send 10 credits\n");
printf("d - connect to PSM 0x%02x ECFC (TSPX_LE_PSM)\n", TSPX_LE_PSM);
printf("D - connect to PSM 0x%02x ECFC (TSPX_PSM_UNSUPPORTED - LE)\n", TSPX_PSM_UNSUPPORTED);
printf("e - require encrypted connection for ECFC / insufficint key size - LEVEL_2\n");
printf("E - require authenticated connection for ECFC - LEVEL_3\n");
printf("f - require authorized connection for ECFC\n");
printf("m - enable manual credit management (incoming connections only)\n");
printf("r - send EFCF Reconfigure Request for MTU %u\n", ENHANCED_MTU_RECONFIGURE);
printf("s - send short data %s\n", data_short);
printf("S - send long data %s\n", data_long);
printf("y - connect to address %s PSM 0x%02x (TSPX_PSM - Classic)\n", bd_addr_to_str(pts_address), TSPX_PSM);
printf("z - send classic data Classic %s\n", data_classic);
printf("t - disconnect channel\n");
printf("---\n");
printf("Ctrl-c - exit\n");
printf("---\n");
}
static void stdin_process(char buffer){
// passkey input
if (ui_digits_for_passkey){
if (buffer < '0' || buffer > '9') return;
printf("%c", buffer);
fflush(stdout);
ui_passkey = ui_passkey * 10 + buffer - '0';
ui_digits_for_passkey--;
if (ui_digits_for_passkey == 0){
printf("\nSending Passkey '%06x'\n", ui_passkey);
sm_passkey_input(handle_le, ui_passkey);
}
return;
}
uint16_t cids[2];
switch (buffer){
case 'a':
printf("Direct LE Connection Establishment to type %u, addr %s\n", pts_address_type, bd_addr_to_str(pts_address));
gap_advertisements_enable(0); // controller with single role cannot create connection while advertising
gap_connect(pts_address, pts_address_type);
break;
case 'A':
printf("BR/EDR Connection Establishment to addr %s\n", bd_addr_to_str(pts_address));
gap_connect(pts_address, BD_ADDR_TYPE_ACL);
break;
case 'b':
printf("Connect to PSM 0x%02x - CFC LE\n", TSPX_LE_PSM);
l2cap_cbm_create_channel(&app_packet_handler, handle_le, TSPX_LE_PSM, buffer_x,
sizeof(buffer_x), L2CAP_LE_AUTOMATIC_CREDITS, LEVEL_0, &cid_credit_based);
break;
case 'B':
printf("Creating connection to %s 0x%02x - CFC LE\n", bd_addr_to_str(pts_address), TSPX_PSM_UNSUPPORTED);
l2cap_cbm_create_channel(&app_packet_handler, handle_le, TSPX_PSM_UNSUPPORTED, buffer_x,
sizeof(buffer_x), L2CAP_LE_AUTOMATIC_CREDITS, LEVEL_0, &cid_credit_based);
break;
case 'd':
if (handle_le != HCI_CON_HANDLE_INVALID){
printf("Connect to PSM 0x%02x - ECFC LE\n", TSPX_LE_PSM);
l2cap_ecbm_create_channels(&app_packet_handler, handle_le, LEVEL_0, TSPX_ENHANCED_PSM,
2, L2CAP_LE_AUTOMATIC_CREDITS, ENHANCED_MTU_INITIAL, receive_buffers_2, cids);
break;
}
if (handle_classic != HCI_CON_HANDLE_INVALID){
printf("Connect to PSM 0x%02x - ECFC Classic\n", TSPX_LE_PSM);
l2cap_ecbm_create_channels(&app_packet_handler, handle_classic, LEVEL_0, TSPX_ENHANCED_PSM,
2, L2CAP_LE_AUTOMATIC_CREDITS, ENHANCED_MTU_INITIAL, receive_buffers_2, cids);
break;
}
printf("Neither Classic nor LE connected\n");
break;
case 'D':
printf("Creating connection to %s 0x%02x - ECFC LE\n", bd_addr_to_str(pts_address), TSPX_PSM_UNSUPPORTED);
l2cap_ecbm_create_channels(&app_packet_handler, handle_le, LEVEL_0, TSPX_PSM_UNSUPPORTED,
2, L2CAP_LE_AUTOMATIC_CREDITS, ENHANCED_MTU_INITIAL, receive_buffers_2, cids);
break;
case 'c':
printf("Provide 10 credits\n");
if (enhanced_data_channel){
l2cap_ecbm_provide_credits(cid_credit_based, 10);
} else {
l2cap_cbm_provide_credits(cid_credit_based, 10);
}
break;
case 'e':
printf("Re-register L2CAP ECFC channel as LEVEL_2 / insufficient key size\n");
l2cap_ecbm_unregister_service(TSPX_ENHANCED_PSM);
l2cap_ecbm_register_service(&app_packet_handler, TSPX_ENHANCED_PSM, MTU_MIN, LEVEL_2);
enhanced_insufficient_key_size = true;
break;
case 'E':
printf("Re-register L2CAP ECFC channel as LEVEL_3\n");
l2cap_ecbm_unregister_service(TSPX_ENHANCED_PSM);
l2cap_ecbm_register_service(&app_packet_handler, TSPX_ENHANCED_PSM, MTU_MIN, LEVEL_3);
break;
case 'f':
printf("Require Authentication for ECFC\n");
l2cap_ecbm_unregister_service(TSPX_ENHANCED_PSM);
l2cap_ecbm_register_service(&app_packet_handler, TSPX_ENHANCED_PSM, MTU_MIN, LEVEL_2);
enhanced_authorization_required = true;
break;
case 'm':
printf("Enable manual credit management for incoming connections\n");
initial_credits = 5;
break;
case 'r':
printf("Reconfigure MTU = %u, MPS = %u\n", ENHANCED_MTU_RECONFIGURE, enhanced_reconfigure_mps[enhanced_reconfigure_index]);
l2cap_ecbm_mps_set_max(enhanced_reconfigure_mps[enhanced_reconfigure_index++]);
l2cap_ecbm_reconfigure_channels(1, &cid_credit_based, ENHANCED_MTU_RECONFIGURE, receive_buffers_2);
if (enhanced_reconfigure_index == enhanced_reconfigure_choices){
enhanced_reconfigure_index = 0;
}
break;
case 's':
printf("Send L2CAP Data Short %s\n", data_short);
todo_send_short = 1;
l2cap_request_can_send_now_event(cid_credit_based);
break;
case 'S':
printf("Send L2CAP Data Long %s\n", data_long);
todo_send_long = 1;
l2cap_request_can_send_now_event(cid_credit_based);
break;
case 'y':
printf("Creating connection to %s 0x%02x - Classic\n", bd_addr_to_str(pts_address), TSPX_PSM);
l2cap_create_channel(&app_packet_handler, pts_address, TSPX_PSM, 100, &cid_classic);
break;
case 'z':
printf("Send L2CAP Data Classic %s\n", data_classic);
l2cap_send(cid_classic, (uint8_t *) data_classic, strlen(data_classic));
break;
case 't':
printf("Disconnect channel 0x%02x\n", cid_credit_based);
l2cap_disconnect(cid_credit_based);
break;
default:
show_usage();
break;
}
return;
}
int btstack_main(int argc, const char * argv[]);
int btstack_main(int argc, const char * argv[]){
(void)argc;
(void)argv;
printf("BTstack LE Data Channel test starting up...\n");
// register for HCI events
hci_event_callback_registration.callback = &app_packet_handler;
hci_add_event_handler(&hci_event_callback_registration);
hci_disable_l2cap_timeout_check();
// set up l2cap_le
l2cap_init();
// setup le device db
le_device_db_init();
// setup SM: Display only
sm_init();
sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY);
sm_set_authentication_requirements( SM_AUTHREQ_BONDING | SM_AUTHREQ_MITM_PROTECTION);
sm_event_callback_registration.callback = &app_packet_handler;
sm_add_event_handler(&sm_event_callback_registration);
btstack_stdin_setup(stdin_process);
// gap_random_address_set_update_period(5000);
// gap_random_address_set_mode(GAP_RANDOM_ADDRESS_RESOLVABLE);
gap_advertisements_set_data(sizeof(adv_general_discoverable), adv_general_discoverable);
gap_advertisements_enable(1);
sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT);
sm_set_authentication_requirements(0);
// le data channel setup
l2cap_cbm_register_service(&app_packet_handler, TSPX_LE_PSM, LEVEL_0);
// l2cap data channel setup
l2cap_ecbm_register_service(&app_packet_handler, TSPX_ENHANCED_PSM, MTU_MIN, LEVEL_0);
l2cap_ecbm_mps_set_min(TSPX_L2CA_CBMPS_MIN);
// classic data channel setup
l2cap_register_service(&app_packet_handler, TSPX_PSM, 100, LEVEL_0);
// turn on!
hci_power_control(HCI_POWER_ON);
return 0;
}