esp_gap_ble_api.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746
  1. // Copyright 2015-2016 Espressif Systems (Shanghai) PTE LTD
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. // http://www.apache.org/licenses/LICENSE-2.0
  7. //
  8. // Unless required by applicable law or agreed to in writing, software
  9. // distributed under the License is distributed on an "AS IS" BASIS,
  10. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. // See the License for the specific language governing permissions and
  12. // limitations under the License.
  13. #include <string.h>
  14. #include "esp_bt_device.h"
  15. #include "esp_bt_main.h"
  16. #include "esp_gap_ble_api.h"
  17. #include "bta/bta_api.h"
  18. #include "common/bt_trace.h"
  19. #include "btc/btc_manage.h"
  20. #include "btc_gap_ble.h"
  21. #include "btc/btc_ble_storage.h"
  22. esp_err_t esp_ble_gap_register_callback(esp_gap_ble_cb_t callback)
  23. {
  24. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  25. return (btc_profile_cb_set(BTC_PID_GAP_BLE, callback) == 0 ? ESP_OK : ESP_FAIL);
  26. }
  27. esp_err_t esp_ble_gap_config_adv_data(esp_ble_adv_data_t *adv_data)
  28. {
  29. btc_msg_t msg = {0};
  30. btc_ble_gap_args_t arg;
  31. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  32. if (adv_data == NULL) {
  33. return ESP_ERR_INVALID_ARG;
  34. }
  35. if (adv_data->service_uuid_len & 0xf) { //not 16*n
  36. return ESP_ERR_INVALID_ARG;
  37. }
  38. msg.sig = BTC_SIG_API_CALL;
  39. msg.pid = BTC_PID_GAP_BLE;
  40. msg.act = BTC_GAP_BLE_ACT_CFG_ADV_DATA;
  41. memcpy(&arg.cfg_adv_data.adv_data, adv_data, sizeof(esp_ble_adv_data_t));
  42. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), btc_gap_ble_arg_deep_copy) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  43. }
  44. esp_err_t esp_ble_gap_set_scan_params(esp_ble_scan_params_t *scan_params)
  45. {
  46. btc_msg_t msg = {0};
  47. btc_ble_gap_args_t arg;
  48. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  49. if (scan_params == NULL) {
  50. return ESP_ERR_INVALID_ARG;
  51. }
  52. msg.sig = BTC_SIG_API_CALL;
  53. msg.pid = BTC_PID_GAP_BLE;
  54. msg.act = BTC_GAP_BLE_ACT_SET_SCAN_PARAM;
  55. memcpy(&arg.set_scan_param.scan_params, scan_params, sizeof(esp_ble_scan_params_t));
  56. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  57. }
  58. esp_err_t esp_ble_gap_start_scanning(uint32_t duration)
  59. {
  60. btc_msg_t msg = {0};
  61. btc_ble_gap_args_t arg;
  62. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  63. msg.sig = BTC_SIG_API_CALL;
  64. msg.pid = BTC_PID_GAP_BLE;
  65. msg.act = BTC_GAP_BLE_ACT_START_SCAN;
  66. arg.start_scan.duration = duration;
  67. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  68. }
  69. esp_err_t esp_ble_gap_stop_scanning(void)
  70. {
  71. btc_msg_t msg = {0};
  72. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  73. msg.sig = BTC_SIG_API_CALL;
  74. msg.pid = BTC_PID_GAP_BLE;
  75. msg.act = BTC_GAP_BLE_ACT_STOP_SCAN;
  76. return (btc_transfer_context(&msg, NULL, 0, NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  77. }
  78. esp_err_t esp_ble_gap_start_advertising(esp_ble_adv_params_t *adv_params)
  79. {
  80. btc_msg_t msg = {0};
  81. btc_ble_gap_args_t arg;
  82. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  83. msg.sig = BTC_SIG_API_CALL;
  84. msg.pid = BTC_PID_GAP_BLE;
  85. msg.act = BTC_GAP_BLE_ACT_START_ADV;
  86. memcpy(&arg.start_adv.adv_params, adv_params, sizeof(esp_ble_adv_params_t));
  87. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  88. }
  89. esp_err_t esp_ble_gap_stop_advertising(void)
  90. {
  91. btc_msg_t msg = {0};
  92. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  93. msg.sig = BTC_SIG_API_CALL;
  94. msg.pid = BTC_PID_GAP_BLE;
  95. msg.act = BTC_GAP_BLE_ACT_STOP_ADV;
  96. return (btc_transfer_context(&msg, NULL, 0, NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  97. }
  98. esp_err_t esp_ble_gap_update_conn_params(esp_ble_conn_update_params_t *params)
  99. {
  100. btc_msg_t msg = {0};
  101. btc_ble_gap_args_t arg;
  102. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  103. if(!params) {
  104. LOG_ERROR("%s,params is NULL", __func__);
  105. return ESP_FAIL;
  106. }
  107. if (ESP_BLE_IS_VALID_PARAM(params->min_int, ESP_BLE_CONN_INT_MIN, ESP_BLE_CONN_INT_MAX) &&
  108. ESP_BLE_IS_VALID_PARAM(params->max_int, ESP_BLE_CONN_INT_MIN, ESP_BLE_CONN_INT_MAX) &&
  109. ESP_BLE_IS_VALID_PARAM(params->timeout, ESP_BLE_CONN_SUP_TOUT_MIN, ESP_BLE_CONN_SUP_TOUT_MAX) &&
  110. (params->latency <= ESP_BLE_CONN_LATENCY_MAX || params->latency == ESP_BLE_CONN_PARAM_UNDEF) &&
  111. ((params->timeout * 10) >= ((1 + params->latency) * ((params->max_int * 5) >> 1))) && params->min_int <= params->max_int) {
  112. msg.sig = BTC_SIG_API_CALL;
  113. msg.pid = BTC_PID_GAP_BLE;
  114. msg.act = BTC_GAP_BLE_ACT_UPDATE_CONN_PARAM;
  115. memcpy(&arg.conn_update_params.conn_params, params, sizeof(esp_ble_conn_update_params_t));
  116. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  117. } else {
  118. LOG_ERROR("%s,invalid connection params:min_int = %d, max_int = %d, latency = %d, timeout = %d",\
  119. __func__, params->min_int, params->max_int, params->latency, params->timeout);
  120. return ESP_FAIL;
  121. }
  122. }
  123. esp_err_t esp_ble_gap_set_pkt_data_len(esp_bd_addr_t remote_device, uint16_t tx_data_length)
  124. {
  125. btc_msg_t msg = {0};
  126. btc_ble_gap_args_t arg;
  127. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  128. msg.sig = BTC_SIG_API_CALL;
  129. msg.pid = BTC_PID_GAP_BLE;
  130. msg.act = BTC_GAP_BLE_ACT_SET_PKT_DATA_LEN;
  131. arg.set_pkt_data_len.tx_data_length = tx_data_length;
  132. memcpy(arg.set_pkt_data_len.remote_device, remote_device, ESP_BD_ADDR_LEN);
  133. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  134. }
  135. esp_err_t esp_ble_gap_set_rand_addr(esp_bd_addr_t rand_addr)
  136. {
  137. btc_msg_t msg = {0};
  138. btc_ble_gap_args_t arg;
  139. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  140. msg.sig = BTC_SIG_API_CALL;
  141. msg.pid = BTC_PID_GAP_BLE;
  142. msg.act = BTC_GAP_BLE_ACT_SET_RAND_ADDRESS;
  143. memcpy(arg.set_rand_addr.rand_addr, rand_addr, ESP_BD_ADDR_LEN);
  144. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  145. }
  146. esp_err_t esp_ble_gap_clear_rand_addr(void)
  147. {
  148. btc_msg_t msg = {0};
  149. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  150. msg.sig = BTC_SIG_API_CALL;
  151. msg.pid = BTC_PID_GAP_BLE;
  152. msg.act = BTC_GAP_BLE_ACT_CLEAR_RAND_ADDRESS;
  153. return (btc_transfer_context(&msg, NULL, 0, NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  154. }
  155. esp_err_t esp_ble_gap_config_local_privacy (bool privacy_enable)
  156. {
  157. btc_msg_t msg = {0};
  158. btc_ble_gap_args_t arg;
  159. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  160. msg.sig = BTC_SIG_API_CALL;
  161. msg.pid = BTC_PID_GAP_BLE;
  162. msg.act = BTC_GAP_BLE_ACT_CONFIG_LOCAL_PRIVACY;
  163. arg.cfg_local_privacy.privacy_enable = privacy_enable;
  164. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  165. }
  166. esp_err_t esp_ble_gap_config_local_icon (uint16_t icon)
  167. {
  168. esp_err_t ret;
  169. btc_msg_t msg = {0};
  170. btc_ble_gap_args_t arg;
  171. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  172. switch (icon) {
  173. case ESP_BLE_APPEARANCE_GENERIC_PHONE:
  174. case ESP_BLE_APPEARANCE_GENERIC_COMPUTER:
  175. case ESP_BLE_APPEARANCE_GENERIC_REMOTE:
  176. case ESP_BLE_APPEARANCE_GENERIC_THERMOMETER:
  177. case ESP_BLE_APPEARANCE_THERMOMETER_EAR:
  178. case ESP_BLE_APPEARANCE_GENERIC_HEART_RATE:
  179. case ESP_BLE_APPEARANCE_HEART_RATE_BELT:
  180. case ESP_BLE_APPEARANCE_GENERIC_BLOOD_PRESSURE:
  181. case ESP_BLE_APPEARANCE_BLOOD_PRESSURE_ARM:
  182. case ESP_BLE_APPEARANCE_BLOOD_PRESSURE_WRIST:
  183. case ESP_BLE_APPEARANCE_GENERIC_PULSE_OXIMETER:
  184. case ESP_BLE_APPEARANCE_PULSE_OXIMETER_FINGERTIP:
  185. case ESP_BLE_APPEARANCE_PULSE_OXIMETER_WRIST:
  186. case ESP_BLE_APPEARANCE_GENERIC_GLUCOSE:
  187. case ESP_BLE_APPEARANCE_GENERIC_WEIGHT:
  188. case ESP_BLE_APPEARANCE_GENERIC_WALKING:
  189. case ESP_BLE_APPEARANCE_WALKING_IN_SHOE:
  190. case ESP_BLE_APPEARANCE_WALKING_ON_SHOE:
  191. case ESP_BLE_APPEARANCE_WALKING_ON_HIP:
  192. case ESP_BLE_APPEARANCE_GENERIC_WATCH:
  193. case ESP_BLE_APPEARANCE_SPORTS_WATCH:
  194. case ESP_BLE_APPEARANCE_GENERIC_EYEGLASSES:
  195. case ESP_BLE_APPEARANCE_GENERIC_DISPLAY:
  196. case ESP_BLE_APPEARANCE_GENERIC_MEDIA_PLAYER:
  197. case ESP_BLE_APPEARANCE_GENERIC_BARCODE_SCANNER:
  198. case ESP_BLE_APPEARANCE_HID_BARCODE_SCANNER:
  199. case ESP_BLE_APPEARANCE_GENERIC_HID:
  200. case ESP_BLE_APPEARANCE_HID_KEYBOARD:
  201. case ESP_BLE_APPEARANCE_HID_MOUSE:
  202. case ESP_BLE_APPEARANCE_HID_JOYSTICK:
  203. case ESP_BLE_APPEARANCE_HID_GAMEPAD:
  204. case ESP_BLE_APPEARANCE_HID_DIGITIZER_TABLET:
  205. case ESP_BLE_APPEARANCE_HID_CARD_READER:
  206. case ESP_BLE_APPEARANCE_HID_DIGITAL_PEN:
  207. case ESP_BLE_APPEARANCE_UNKNOWN:
  208. case ESP_BLE_APPEARANCE_GENERIC_CLOCK:
  209. case ESP_BLE_APPEARANCE_GENERIC_TAG:
  210. case ESP_BLE_APPEARANCE_GENERIC_KEYRING:
  211. case ESP_BLE_APPEARANCE_GENERIC_CYCLING:
  212. case ESP_BLE_APPEARANCE_CYCLING_COMPUTER:
  213. case ESP_BLE_APPEARANCE_CYCLING_SPEED:
  214. case ESP_BLE_APPEARANCE_CYCLING_CADENCE:
  215. case ESP_BLE_APPEARANCE_CYCLING_POWER:
  216. case ESP_BLE_APPEARANCE_CYCLING_SPEED_CADENCE:
  217. case ESP_BLE_APPEARANCE_GENERIC_PERSONAL_MOBILITY_DEVICE:
  218. case ESP_BLE_APPEARANCE_POWERED_WHEELCHAIR:
  219. case ESP_BLE_APPEARANCE_MOBILITY_SCOOTER:
  220. case ESP_BLE_APPEARANCE_GENERIC_CONTINUOUS_GLUCOSE_MONITOR:
  221. case ESP_BLE_APPEARANCE_GENERIC_INSULIN_PUMP:
  222. case ESP_BLE_APPEARANCE_INSULIN_PUMP_DURABLE_PUMP:
  223. case ESP_BLE_APPEARANCE_INSULIN_PUMP_PATCH_PUMP:
  224. case ESP_BLE_APPEARANCE_INSULIN_PEN:
  225. case ESP_BLE_APPEARANCE_GENERIC_MEDICATION_DELIVERY:
  226. case ESP_BLE_APPEARANCE_GENERIC_OUTDOOR_SPORTS:
  227. case ESP_BLE_APPEARANCE_OUTDOOR_SPORTS_LOCATION:
  228. case ESP_BLE_APPEARANCE_OUTDOOR_SPORTS_LOCATION_AND_NAV:
  229. case ESP_BLE_APPEARANCE_OUTDOOR_SPORTS_LOCATION_POD:
  230. case ESP_BLE_APPEARANCE_OUTDOOR_SPORTS_LOCATION_POD_AND_NAV:
  231. msg.sig = BTC_SIG_API_CALL;
  232. msg.pid = BTC_PID_GAP_BLE;
  233. msg.act = BTC_GAP_BLE_ACT_CONFIG_LOCAL_ICON;
  234. arg.cfg_local_icon.icon = icon;
  235. ret = (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  236. break;
  237. default:
  238. ret = ESP_ERR_INVALID_ARG;
  239. break;
  240. }
  241. return ret;
  242. }
  243. esp_err_t esp_ble_gap_update_whitelist(bool add_remove, esp_bd_addr_t remote_bda)
  244. {
  245. btc_msg_t msg = {0};
  246. btc_ble_gap_args_t arg;
  247. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  248. return ESP_ERR_INVALID_STATE;
  249. }
  250. if (!remote_bda){
  251. return ESP_ERR_INVALID_SIZE;
  252. }
  253. msg.sig = BTC_SIG_API_CALL;
  254. msg.pid = BTC_PID_GAP_BLE;
  255. msg.act = BTC_GAP_BLE_ACT_UPDATE_WHITE_LIST;
  256. arg.update_white_list.add_remove = add_remove;
  257. memcpy(arg.update_white_list.remote_bda, remote_bda, sizeof(esp_bd_addr_t));
  258. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  259. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  260. }
  261. esp_err_t esp_ble_gap_get_whitelist_size(uint16_t *length)
  262. {
  263. if (length == NULL) {
  264. return ESP_FAIL;
  265. }
  266. btc_get_whitelist_size(length);
  267. return ESP_OK;
  268. }
  269. esp_err_t esp_ble_gap_set_prefer_conn_params(esp_bd_addr_t bd_addr,
  270. uint16_t min_conn_int, uint16_t max_conn_int,
  271. uint16_t slave_latency, uint16_t supervision_tout)
  272. {
  273. btc_msg_t msg = {0};
  274. btc_ble_gap_args_t arg;
  275. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  276. return ESP_ERR_INVALID_STATE;
  277. }
  278. if (ESP_BLE_IS_VALID_PARAM(min_conn_int, ESP_BLE_CONN_INT_MIN, ESP_BLE_CONN_INT_MAX) &&
  279. ESP_BLE_IS_VALID_PARAM(max_conn_int, ESP_BLE_CONN_INT_MIN, ESP_BLE_CONN_INT_MAX) &&
  280. ESP_BLE_IS_VALID_PARAM(supervision_tout, ESP_BLE_CONN_SUP_TOUT_MIN, ESP_BLE_CONN_SUP_TOUT_MAX) &&
  281. (slave_latency <= ESP_BLE_CONN_LATENCY_MAX || slave_latency == ESP_BLE_CONN_PARAM_UNDEF) &&
  282. ((supervision_tout * 10) >= ((1 + slave_latency) * ((max_conn_int * 5) >> 1))) && min_conn_int <= max_conn_int) {
  283. msg.sig = BTC_SIG_API_CALL;
  284. msg.pid = BTC_PID_GAP_BLE;
  285. msg.act = BTC_GAP_BLE_ACT_SET_CONN_PARAMS;
  286. arg.set_conn_params.min_conn_int = min_conn_int;
  287. arg.set_conn_params.max_conn_int = max_conn_int;
  288. arg.set_conn_params.slave_latency = slave_latency;
  289. arg.set_conn_params.supervision_tout = supervision_tout;
  290. memcpy(arg.set_conn_params.bd_addr, bd_addr, sizeof(esp_bd_addr_t));
  291. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  292. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  293. } else {
  294. LOG_ERROR("%s,invalid connection params:min_int = %d, max_int = %d, latency = %d, timeout = %d",\
  295. __func__, min_conn_int, max_conn_int, slave_latency, supervision_tout);
  296. return ESP_FAIL;
  297. }
  298. }
  299. esp_err_t esp_ble_gap_set_device_name(const char *name)
  300. {
  301. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  302. return esp_bt_dev_set_device_name(name);
  303. }
  304. esp_err_t esp_ble_gap_get_local_used_addr(esp_bd_addr_t local_used_addr, uint8_t * addr_type)
  305. {
  306. if(esp_bluedroid_get_status() != (ESP_BLUEDROID_STATUS_ENABLED)) {
  307. LOG_ERROR("%s, bluedroid status error", __func__);
  308. return ESP_FAIL;
  309. }
  310. if(!BTM_BleGetCurrentAddress(local_used_addr, addr_type)) {
  311. return ESP_FAIL;
  312. }
  313. return ESP_OK;
  314. }
  315. uint8_t *esp_ble_resolve_adv_data( uint8_t *adv_data, uint8_t type, uint8_t *length)
  316. {
  317. if (((type < ESP_BLE_AD_TYPE_FLAG) || (type > ESP_BLE_AD_TYPE_128SERVICE_DATA)) &&
  318. (type != ESP_BLE_AD_MANUFACTURER_SPECIFIC_TYPE)) {
  319. LOG_ERROR("the eir type not define, type = %x\n", type);
  320. return NULL;
  321. }
  322. if (adv_data == NULL) {
  323. LOG_ERROR("Invalid p_eir data.\n");
  324. return NULL;
  325. }
  326. return (BTM_CheckAdvData( adv_data, type, length));
  327. }
  328. esp_err_t esp_ble_gap_config_adv_data_raw(uint8_t *raw_data, uint32_t raw_data_len)
  329. {
  330. btc_msg_t msg = {0};
  331. btc_ble_gap_args_t arg;
  332. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  333. if (raw_data == NULL
  334. || (raw_data_len <= 0 || raw_data_len > ESP_BLE_ADV_DATA_LEN_MAX)) {
  335. return ESP_ERR_INVALID_ARG;
  336. }
  337. msg.sig = BTC_SIG_API_CALL;
  338. msg.pid = BTC_PID_GAP_BLE;
  339. msg.act = BTC_GAP_BLE_ACT_CFG_ADV_DATA_RAW;
  340. arg.cfg_adv_data_raw.raw_adv = raw_data;
  341. arg.cfg_adv_data_raw.raw_adv_len = raw_data_len;
  342. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), btc_gap_ble_arg_deep_copy) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  343. }
  344. esp_err_t esp_ble_gap_read_rssi(esp_bd_addr_t remote_addr)
  345. {
  346. btc_msg_t msg = {0};
  347. btc_ble_gap_args_t arg;
  348. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  349. return ESP_ERR_INVALID_STATE;
  350. }
  351. msg.sig = BTC_SIG_API_CALL;
  352. msg.pid = BTC_PID_GAP_BLE;
  353. msg.act = BTC_GAP_BLE_ACT_READ_RSSI;
  354. memcpy(arg.read_rssi.remote_addr, remote_addr, sizeof(esp_bd_addr_t));
  355. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  356. }
  357. esp_err_t esp_ble_gap_config_scan_rsp_data_raw(uint8_t *raw_data, uint32_t raw_data_len)
  358. {
  359. btc_msg_t msg = {0};
  360. btc_ble_gap_args_t arg;
  361. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  362. if (raw_data == NULL
  363. || (raw_data_len <= 0 || raw_data_len > ESP_BLE_SCAN_RSP_DATA_LEN_MAX)) {
  364. return ESP_ERR_INVALID_ARG;
  365. }
  366. msg.sig = BTC_SIG_API_CALL;
  367. msg.pid = BTC_PID_GAP_BLE;
  368. msg.act = BTC_GAP_BLE_ACT_CFG_SCAN_RSP_DATA_RAW;
  369. arg.cfg_scan_rsp_data_raw.raw_scan_rsp = raw_data;
  370. arg.cfg_scan_rsp_data_raw.raw_scan_rsp_len = raw_data_len;
  371. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), btc_gap_ble_arg_deep_copy) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  372. }
  373. esp_err_t esp_ble_gap_add_duplicate_scan_exceptional_device(esp_ble_duplicate_exceptional_info_type_t type, esp_duplicate_info_t device_info)
  374. {
  375. btc_msg_t msg = {0};
  376. btc_ble_gap_args_t arg;
  377. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  378. return ESP_ERR_INVALID_STATE;
  379. }
  380. if (!device_info && type <= ESP_BLE_DUPLICATE_SCAN_EXCEPTIONAL_INFO_MESH_LINK_ID) {
  381. return ESP_ERR_INVALID_SIZE;
  382. }
  383. msg.sig = BTC_SIG_API_CALL;
  384. msg.pid = BTC_PID_GAP_BLE;
  385. msg.act = BTC_GAP_BLE_UPDATE_DUPLICATE_SCAN_EXCEPTIONAL_LIST;
  386. arg.update_duplicate_exceptional_list.subcode = ESP_BLE_DUPLICATE_EXCEPTIONAL_LIST_ADD;
  387. arg.update_duplicate_exceptional_list.info_type = type;
  388. if (device_info) {
  389. memcpy(arg.update_duplicate_exceptional_list.device_info, device_info, sizeof(esp_bd_addr_t));
  390. }
  391. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  392. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  393. }
  394. esp_err_t esp_ble_gap_remove_duplicate_scan_exceptional_device(esp_ble_duplicate_exceptional_info_type_t type, esp_duplicate_info_t device_info)
  395. {
  396. btc_msg_t msg = {0};
  397. btc_ble_gap_args_t arg;
  398. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  399. return ESP_ERR_INVALID_STATE;
  400. }
  401. if (!device_info && type <= ESP_BLE_DUPLICATE_SCAN_EXCEPTIONAL_INFO_MESH_LINK_ID) {
  402. return ESP_ERR_INVALID_SIZE;
  403. }
  404. msg.sig = BTC_SIG_API_CALL;
  405. msg.pid = BTC_PID_GAP_BLE;
  406. msg.act = BTC_GAP_BLE_UPDATE_DUPLICATE_SCAN_EXCEPTIONAL_LIST;
  407. arg.update_duplicate_exceptional_list.subcode = ESP_BLE_DUPLICATE_EXCEPTIONAL_LIST_REMOVE;
  408. arg.update_duplicate_exceptional_list.info_type = type;
  409. if (device_info) {
  410. memcpy(arg.update_duplicate_exceptional_list.device_info, device_info, sizeof(esp_bd_addr_t));
  411. }
  412. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  413. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  414. }
  415. esp_err_t esp_ble_gap_clean_duplicate_scan_exceptional_list(esp_duplicate_scan_exceptional_list_type_t list_type)
  416. {
  417. btc_msg_t msg = {0};
  418. btc_ble_gap_args_t arg;
  419. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  420. return ESP_ERR_INVALID_STATE;
  421. }
  422. msg.sig = BTC_SIG_API_CALL;
  423. msg.pid = BTC_PID_GAP_BLE;
  424. msg.act = BTC_GAP_BLE_UPDATE_DUPLICATE_SCAN_EXCEPTIONAL_LIST;
  425. arg.update_duplicate_exceptional_list.subcode = ESP_BLE_DUPLICATE_EXCEPTIONAL_LIST_CLEAN;
  426. arg.update_duplicate_exceptional_list.info_type = list_type;
  427. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  428. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  429. }
  430. #if (SMP_INCLUDED == TRUE)
  431. esp_err_t esp_ble_gap_set_security_param(esp_ble_sm_param_t param_type,
  432. void *value, uint8_t len)
  433. {
  434. if(param_type >= ESP_BLE_SM_MAX_PARAM) {
  435. return ESP_ERR_INVALID_ARG;
  436. }
  437. if((param_type != ESP_BLE_SM_CLEAR_STATIC_PASSKEY) && ( value == NULL || len < sizeof(uint8_t) || len > sizeof(uint32_t))) {
  438. return ESP_ERR_INVALID_ARG;
  439. }
  440. if((param_type == ESP_BLE_SM_SET_STATIC_PASSKEY)) {
  441. uint32_t passkey = 0;
  442. for(uint8_t i = 0; i < len; i++)
  443. {
  444. passkey += (((uint8_t *)value)[i]<<(8*i));
  445. }
  446. if(passkey > 999999) {
  447. return ESP_ERR_INVALID_ARG;
  448. }
  449. }
  450. btc_msg_t msg = {0};
  451. btc_ble_gap_args_t arg;
  452. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  453. msg.sig = BTC_SIG_API_CALL;
  454. msg.pid = BTC_PID_GAP_BLE;
  455. msg.act = BTC_GAP_BLE_SET_SECURITY_PARAM_EVT;
  456. arg.set_security_param.param_type = param_type;
  457. arg.set_security_param.len = len;
  458. arg.set_security_param.value = value;
  459. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), btc_gap_ble_arg_deep_copy)
  460. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  461. }
  462. esp_err_t esp_ble_set_encryption(esp_bd_addr_t bd_addr, esp_ble_sec_act_t sec_act)
  463. {
  464. btc_msg_t msg = {0};
  465. btc_ble_gap_args_t arg;
  466. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  467. msg.sig = BTC_SIG_API_CALL;
  468. msg.pid = BTC_PID_GAP_BLE;
  469. msg.act = BTC_GAP_BLE_SET_ENCRYPTION_EVT;
  470. arg.set_encryption.sec_act = sec_act;
  471. memcpy(arg.set_encryption.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  472. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  473. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  474. }
  475. esp_err_t esp_ble_gap_security_rsp(esp_bd_addr_t bd_addr, bool accept)
  476. {
  477. btc_msg_t msg = {0};
  478. btc_ble_gap_args_t arg;
  479. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  480. msg.sig = BTC_SIG_API_CALL;
  481. msg.pid = BTC_PID_GAP_BLE;
  482. msg.act = BTC_GAP_BLE_SECURITY_RSP_EVT;
  483. arg.sec_rsp.accept = accept;
  484. memcpy(arg.sec_rsp.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  485. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  486. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  487. }
  488. esp_err_t esp_ble_passkey_reply(esp_bd_addr_t bd_addr, bool accept, uint32_t passkey)
  489. {
  490. btc_msg_t msg = {0};
  491. btc_ble_gap_args_t arg;
  492. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  493. msg.sig = BTC_SIG_API_CALL;
  494. msg.pid = BTC_PID_GAP_BLE;
  495. msg.act = BTC_GAP_BLE_PASSKEY_REPLY_EVT;
  496. arg.enc_passkey_replay.accept = accept;
  497. arg.enc_passkey_replay.passkey = passkey;
  498. memcpy(arg.enc_passkey_replay.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  499. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  500. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  501. }
  502. esp_err_t esp_ble_confirm_reply(esp_bd_addr_t bd_addr, bool accept)
  503. {
  504. btc_msg_t msg = {0};
  505. btc_ble_gap_args_t arg;
  506. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  507. msg.sig = BTC_SIG_API_CALL;
  508. msg.pid = BTC_PID_GAP_BLE;
  509. msg.act = BTC_GAP_BLE_CONFIRM_REPLY_EVT;
  510. arg.enc_comfirm_replay.accept = accept;
  511. memcpy(arg.enc_comfirm_replay.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  512. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  513. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  514. }
  515. esp_err_t esp_ble_remove_bond_device(esp_bd_addr_t bd_addr)
  516. {
  517. btc_msg_t msg = {0};
  518. btc_ble_gap_args_t arg;
  519. msg.sig = BTC_SIG_API_CALL;
  520. msg.pid = BTC_PID_GAP_BLE;
  521. msg.act = BTC_GAP_BLE_REMOVE_BOND_DEV_EVT;
  522. memcpy(arg.remove_bond_device.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  523. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL)
  524. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  525. }
  526. int esp_ble_get_bond_device_num(void)
  527. {
  528. if (esp_bluedroid_get_status() != ESP_BLUEDROID_STATUS_ENABLED) {
  529. return ESP_FAIL;
  530. }
  531. return btc_storage_get_num_ble_bond_devices();
  532. }
  533. esp_err_t esp_ble_get_bond_device_list(int *dev_num, esp_ble_bond_dev_t *dev_list)
  534. {
  535. int ret;
  536. int dev_num_total;
  537. if (dev_num == NULL || dev_list == NULL) {
  538. return ESP_ERR_INVALID_ARG;
  539. }
  540. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  541. dev_num_total = btc_storage_get_num_ble_bond_devices();
  542. if (*dev_num > dev_num_total) {
  543. *dev_num = dev_num_total;
  544. }
  545. ret = btc_storage_get_bonded_ble_devices_list(dev_list, *dev_num);
  546. return (ret == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  547. }
  548. esp_err_t esp_ble_oob_req_reply(esp_bd_addr_t bd_addr, uint8_t *TK, uint8_t len)
  549. {
  550. if(len != ESP_BT_OCTET16_LEN) {
  551. return ESP_ERR_INVALID_ARG;
  552. }
  553. btc_msg_t msg = {0};
  554. btc_ble_gap_args_t arg;
  555. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  556. msg.sig = BTC_SIG_API_CALL;
  557. msg.pid = BTC_PID_GAP_BLE;
  558. msg.act = BTC_GAP_BLE_OOB_REQ_REPLY_EVT;
  559. memcpy(arg.oob_req_reply.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  560. arg.oob_req_reply.len = len;
  561. arg.oob_req_reply.p_value = TK;
  562. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), btc_gap_ble_arg_deep_copy)
  563. == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  564. }
  565. #endif /* #if (SMP_INCLUDED == TRUE) */
  566. esp_err_t esp_ble_gap_disconnect(esp_bd_addr_t remote_device)
  567. {
  568. btc_msg_t msg = {0};
  569. btc_ble_gap_args_t arg;
  570. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  571. msg.sig = BTC_SIG_API_CALL;
  572. msg.pid = BTC_PID_GAP_BLE;
  573. msg.act = BTC_GAP_BLE_DISCONNECT_EVT;
  574. memcpy(arg.disconnect.remote_device, remote_device, ESP_BD_ADDR_LEN);
  575. return (btc_transfer_context(&msg, &arg, sizeof(btc_ble_gap_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  576. }
  577. esp_err_t esp_gap_ble_set_authorization(esp_bd_addr_t bd_addr, bool authorize)
  578. {
  579. if (!bd_addr) {
  580. return ESP_ERR_INVALID_ARG;
  581. }
  582. if (BTM_Ble_Authorization(bd_addr, authorize)) {
  583. return ESP_OK;
  584. }
  585. return ESP_FAIL;
  586. }
  587. esp_err_t esp_ble_get_current_conn_params(esp_bd_addr_t bd_addr, esp_gap_conn_params_t *conn_params)
  588. {
  589. if(!bd_addr || !conn_params) {
  590. return ESP_ERR_INVALID_ARG;
  591. }
  592. if(BTM_GetCurrentConnParams(bd_addr, &conn_params->interval, &conn_params->latency, &conn_params->timeout)) {
  593. return ESP_OK;
  594. }
  595. return ESP_ERR_NOT_FOUND;
  596. }