esp_spp_api.c 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. // Copyright 2015-2016 Espressif Systems (Shanghai) PTE LTD
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. // http://www.apache.org/licenses/LICENSE-2.0
  7. //
  8. // Unless required by applicable law or agreed to in writing, software
  9. // distributed under the License is distributed on an "AS IS" BASIS,
  10. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. // See the License for the specific language governing permissions and
  12. // limitations under the License.
  13. #include <string.h>
  14. #include "esp_bt_main.h"
  15. #include "btc/btc_manage.h"
  16. #include "btc_spp.h"
  17. #include "esp_spp_api.h"
  18. #include "common/bt_target.h"
  19. #if (defined BTC_SPP_INCLUDED && BTC_SPP_INCLUDED == TRUE)
  20. static const uint8_t UUID_SPP[16] = {0x00, 0x00, 0x11, 0x01, 0x00, 0x00, 0x10, 0x00,
  21. 0x80, 0x00, 0x00, 0x80, 0x5F, 0x9B, 0x34, 0xFB
  22. };
  23. static tSDP_UUID sdp_uuid;
  24. esp_err_t esp_spp_register_callback(esp_spp_cb_t *callback)
  25. {
  26. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  27. if (callback == NULL) {
  28. return ESP_FAIL;
  29. }
  30. btc_profile_cb_set(BTC_PID_SPP, callback);
  31. return ESP_OK;
  32. }
  33. esp_err_t esp_spp_init(esp_spp_mode_t mode)
  34. {
  35. btc_msg_t msg;
  36. btc_spp_args_t arg;
  37. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  38. msg.sig = BTC_SIG_API_CALL;
  39. msg.pid = BTC_PID_SPP;
  40. msg.act = BTC_SPP_ACT_INIT;
  41. arg.init.mode = mode;
  42. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  43. }
  44. esp_err_t esp_spp_deinit(void)
  45. {
  46. btc_msg_t msg;
  47. btc_spp_args_t arg;
  48. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  49. msg.sig = BTC_SIG_API_CALL;
  50. msg.pid = BTC_PID_SPP;
  51. msg.act = BTC_SPP_ACT_UNINIT;
  52. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  53. }
  54. esp_err_t esp_spp_start_discovery(esp_bd_addr_t bd_addr)
  55. {
  56. sdp_uuid.len = 16;
  57. memcpy(sdp_uuid.uu.uuid128, UUID_SPP, sizeof(sdp_uuid.uu.uuid128));
  58. btc_msg_t msg;
  59. btc_spp_args_t arg;
  60. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  61. msg.sig = BTC_SIG_API_CALL;
  62. msg.pid = BTC_PID_SPP;
  63. msg.act = BTC_SPP_ACT_START_DISCOVERY;
  64. memcpy(arg.start_discovery.bd_addr, bd_addr, ESP_BD_ADDR_LEN);
  65. arg.start_discovery.num_uuid = 1;
  66. arg.start_discovery.p_uuid_list = &sdp_uuid;
  67. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), btc_spp_arg_deep_copy) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  68. }
  69. esp_err_t esp_spp_connect(esp_spp_sec_t sec_mask,
  70. esp_spp_role_t role, uint8_t remote_scn, esp_bd_addr_t peer_bd_addr)
  71. {
  72. btc_msg_t msg;
  73. btc_spp_args_t arg;
  74. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  75. if (sec_mask != ESP_SPP_SEC_NONE && sec_mask != ESP_SPP_SEC_AUTHORIZE && sec_mask != ESP_SPP_SEC_AUTHENTICATE) {
  76. LOG_WARN("Suggest to use ESP_SPP_SEC_NONE, ESP_SPP_SEC_AUTHORIZE or ESP_SPP_SEC_AUTHENTICATE only\n");
  77. }
  78. msg.sig = BTC_SIG_API_CALL;
  79. msg.pid = BTC_PID_SPP;
  80. msg.act = BTC_SPP_ACT_CONNECT;
  81. arg.connect.sec_mask = sec_mask;
  82. arg.connect.role = role;
  83. arg.connect.remote_scn = remote_scn;
  84. memcpy(arg.connect.peer_bd_addr, peer_bd_addr, ESP_BD_ADDR_LEN);
  85. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  86. }
  87. esp_err_t esp_spp_disconnect(uint32_t handle)
  88. {
  89. btc_msg_t msg;
  90. btc_spp_args_t arg;
  91. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  92. msg.sig = BTC_SIG_API_CALL;
  93. msg.pid = BTC_PID_SPP;
  94. msg.act = BTC_SPP_ACT_DISCONNECT;
  95. arg.disconnect.handle = handle;
  96. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  97. }
  98. esp_err_t esp_spp_start_srv(esp_spp_sec_t sec_mask,
  99. esp_spp_role_t role, uint8_t local_scn, const char *name)
  100. {
  101. btc_msg_t msg;
  102. btc_spp_args_t arg;
  103. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  104. if (name == NULL || strlen(name) > ESP_SPP_SERVER_NAME_MAX) {
  105. LOG_ERROR("Invalid server name!\n");
  106. return ESP_ERR_INVALID_ARG;
  107. }
  108. if (sec_mask != ESP_SPP_SEC_NONE && sec_mask != ESP_SPP_SEC_AUTHORIZE && sec_mask != ESP_SPP_SEC_AUTHENTICATE) {
  109. LOG_WARN("Suggest to use ESP_SPP_SEC_NONE, ESP_SPP_SEC_AUTHORIZE or ESP_SPP_SEC_AUTHENTICATE only\n");
  110. }
  111. msg.sig = BTC_SIG_API_CALL;
  112. msg.pid = BTC_PID_SPP;
  113. msg.act = BTC_SPP_ACT_START_SRV;
  114. arg.start_srv.sec_mask = sec_mask;
  115. arg.start_srv.role = role;
  116. arg.start_srv.local_scn = local_scn;
  117. arg.start_srv.max_session = ESP_SPP_MAX_SESSION;
  118. strcpy(arg.start_srv.name, name);
  119. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  120. }
  121. esp_err_t esp_spp_stop_srv(void)
  122. {
  123. btc_msg_t msg;
  124. btc_spp_args_t arg;
  125. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  126. msg.sig = BTC_SIG_API_CALL;
  127. msg.pid = BTC_PID_SPP;
  128. msg.act = BTC_SPP_ACT_STOP_SRV;
  129. arg.stop_srv.scn = BTC_SPP_INVALID_SCN;
  130. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  131. }
  132. esp_err_t esp_spp_stop_srv_scn(uint8_t scn)
  133. {
  134. btc_msg_t msg;
  135. btc_spp_args_t arg;
  136. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  137. if ((scn == 0) || (scn >= PORT_MAX_RFC_PORTS)) {
  138. LOG_ERROR("Invalid SCN!\n");
  139. return ESP_ERR_INVALID_ARG;
  140. }
  141. msg.sig = BTC_SIG_API_CALL;
  142. msg.pid = BTC_PID_SPP;
  143. msg.act = BTC_SPP_ACT_STOP_SRV;
  144. arg.stop_srv.scn = scn;
  145. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), NULL) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  146. }
  147. esp_err_t esp_spp_write(uint32_t handle, int len, uint8_t *p_data)
  148. {
  149. btc_msg_t msg;
  150. btc_spp_args_t arg;
  151. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  152. msg.sig = BTC_SIG_API_CALL;
  153. msg.pid = BTC_PID_SPP;
  154. msg.act = BTC_SPP_ACT_WRITE;
  155. arg.write.handle = handle;
  156. arg.write.len = len;
  157. arg.write.p_data = p_data;
  158. return (btc_transfer_context(&msg, &arg, sizeof(btc_spp_args_t), btc_spp_arg_deep_copy) == BT_STATUS_SUCCESS ? ESP_OK : ESP_FAIL);
  159. }
  160. esp_err_t esp_spp_vfs_register(void)
  161. {
  162. ESP_BLUEDROID_STATUS_CHECK(ESP_BLUEDROID_STATUS_ENABLED);
  163. return btc_spp_vfs_register();
  164. }
  165. #endif ///defined BTC_SPP_INCLUDED && BTC_SPP_INCLUDED == TRUE