| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247 |
- /*
- * Copyright (C) 2014 BlueKitchen GmbH
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the copyright holders nor the names of
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- * 4. Any redistribution, use, or modification is done solely for
- * personal benefit and not for any commercial purpose or for
- * monetary gain.
- *
- * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
- * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
- * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
- * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
- * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
- * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
- * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
- * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
- * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- *
- * Please inquire about commercial licensing options at
- * contact@bluekitchen-gmbh.com
- *
- */
- #define BTSTACK_FILE__ "sm_pairing_peripheral.c"
- // *****************************************************************************
- /* EXAMPLE_START(sm_pairing_peripheral): LE Peripheral - Test pairing combinations
- *
- * @text Depending on the Authentication requiremens and IO Capabilities,
- * the pairing process uses different short and long term key generation method.
- * This example helps explore the different options incl. LE Secure Connections.
- */
- // *****************************************************************************
- #include <stdint.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <inttypes.h>
- #include "sm_pairing_peripheral.h"
- #include "btstack.h"
- /* @section Main Application Setup
- *
- * @text Listing MainConfiguration shows main application code.
- * It initializes L2CAP, the Security Manager and configures the ATT Server with the pre-compiled
- * ATT Database generated from $sm_pairing_peripheral.gatt$. Finally, it configures the advertisements
- * and boots the Bluetooth stack.
- * In this example, the Advertisement contains the Flags attribute, the device name, and a 16-bit (test) service 0x1111
- * The flag 0x06 indicates: LE General Discoverable Mode and BR/EDR not supported.
- * Various examples for IO Capabilites and Authentication Requirements are given below.
- */
-
- /* LISTING_START(MainConfiguration): Setup stack to advertise */
- static btstack_packet_callback_registration_t sm_event_callback_registration;
- static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size);
- const uint8_t adv_data[] = {
- // Flags general discoverable, BR/EDR not supported
- 0x02, BLUETOOTH_DATA_TYPE_FLAGS, 0x06,
- // Name
- 0x0b, BLUETOOTH_DATA_TYPE_COMPLETE_LOCAL_NAME, 'S', 'M', ' ', 'P', 'a', 'i', 'r', 'i', 'n', 'g',
- // Incomplete List of 16-bit Service Class UUIDs -- 1111 - only valid for testing!
- 0x03, BLUETOOTH_DATA_TYPE_INCOMPLETE_LIST_OF_16_BIT_SERVICE_CLASS_UUIDS, 0x11, 0x11,
- };
- const uint8_t adv_data_len = sizeof(adv_data);
- static void sm_peripheral_setup(void){
- l2cap_init();
- // setup le device db
- le_device_db_init();
- // setup SM: Display only
- sm_init();
- /**
- * Choose ONE of the following configurations
- * Bonding is disabled to allow for repeated testing. It can be enabled by or'ing
- * SM_AUTHREQ_BONDING to the authentication requirements like this:
- * sm_set_authentication_requirements( X | SM_AUTHREQ_BONDING)
- */
- // LE Legacy Pairing, Just Works
- // sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT);
- // sm_set_authentication_requirements(0);
- // LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays
- // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY);
- // sm_set_authentication_requirements(SM_AUTHREQ_MITM_PROTECTION);
- // sm_use_fixed_passkey_in_display_role(123456);
- #ifdef ENABLE_LE_SECURE_CONNECTIONS
- // enable LE Secure Connections Only mode - disables Legacy pairing
- // sm_set_secure_connections_only_mode(true);
- // LE Secure Connections, Just Works
- // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO);
- // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION);
- // LE Secure Connections, Numeric Comparison
- sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO);
- sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION);
- // LE Secure Pairing, Passkey entry initiator enter, responder (us) displays
- // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY);
- // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION);
- // sm_use_fixed_passkey_in_display_role(123456);
- // LE Secure Pairing, Passkey entry initiator displays, responder (us) enter
- // sm_set_io_capabilities(IO_CAPABILITY_KEYBOARD_ONLY);
- // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION);
- #endif
- // setup ATT server
- att_server_init(profile_data, NULL, NULL);
- // setup advertisements
- uint16_t adv_int_min = 0x0030;
- uint16_t adv_int_max = 0x0030;
- uint8_t adv_type = 0;
- bd_addr_t null_addr;
- memset(null_addr, 0, 6);
- gap_advertisements_set_params(adv_int_min, adv_int_max, adv_type, 0, null_addr, 0x07, 0x00);
- gap_advertisements_set_data(adv_data_len, (uint8_t*) adv_data);
- gap_advertisements_enable(1);
- // register for SM events
- sm_event_callback_registration.callback = &packet_handler;
- sm_add_event_handler(&sm_event_callback_registration);
- // register for ATT
- att_server_register_packet_handler(packet_handler);
- }
- /* LISTING_END */
- /*
- * @section Packet Handler
- *
- * @text The packet handler is used to:
- * - report connect/disconnect
- * - handle Security Manager events
- */
- /* LISTING_START(packetHandler): Packet Handler */
- static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){
- UNUSED(channel);
- UNUSED(size);
- hci_con_handle_t con_handle;
- bd_addr_t addr;
- switch (packet_type) {
- case HCI_EVENT_PACKET:
- switch (hci_event_packet_get_type(packet)) {
- case HCI_EVENT_LE_META:
- switch (hci_event_le_meta_get_subevent_code(packet)) {
- case HCI_SUBEVENT_LE_CONNECTION_COMPLETE:
- printf("Connection complete\n");
- // Uncomment the next lines to trigger explicit pairing on connect
- // con_handle = hci_subevent_le_connection_complete_get_connection_handle(packet);
- // sm_send_security_request(con_handle);
- UNUSED(con_handle);
- break;
- default:
- break;
- }
- break;
- case SM_EVENT_JUST_WORKS_REQUEST:
- printf("Just Works requested\n");
- sm_just_works_confirm(sm_event_just_works_request_get_handle(packet));
- break;
- case SM_EVENT_NUMERIC_COMPARISON_REQUEST:
- printf("Confirming numeric comparison: %"PRIu32"\n", sm_event_numeric_comparison_request_get_passkey(packet));
- sm_numeric_comparison_confirm(sm_event_passkey_display_number_get_handle(packet));
- break;
- case SM_EVENT_PASSKEY_DISPLAY_NUMBER:
- printf("Display Passkey: %"PRIu32"\n", sm_event_passkey_display_number_get_passkey(packet));
- break;
- case SM_EVENT_IDENTITY_CREATED:
- sm_event_identity_created_get_identity_address(packet, addr);
- printf("Identity created: type %u address %s\n", sm_event_identity_created_get_identity_addr_type(packet), bd_addr_to_str(addr));
- break;
- case SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED:
- sm_event_identity_resolving_succeeded_get_identity_address(packet, addr);
- printf("Identity resolved: type %u address %s\n", sm_event_identity_resolving_succeeded_get_identity_addr_type(packet), bd_addr_to_str(addr));
- break;
- case SM_EVENT_IDENTITY_RESOLVING_FAILED:
- sm_event_identity_created_get_address(packet, addr);
- printf("Identity resolving failed\n");
- break;
- case SM_EVENT_PAIRING_COMPLETE:
- switch (sm_event_pairing_complete_get_status(packet)){
- case ERROR_CODE_SUCCESS:
- printf("Pairing complete, success\n");
- break;
- case ERROR_CODE_CONNECTION_TIMEOUT:
- printf("Pairing failed, timeout\n");
- break;
- case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION:
- printf("Pairing failed, disconnected\n");
- break;
- case ERROR_CODE_AUTHENTICATION_FAILURE:
- printf("Pairing failed, reason = %u\n", sm_event_pairing_complete_get_reason(packet));
- break;
- default:
- break;
- }
- break;
- default:
- break;
- }
- break;
- }
- }
- /* LISTING_END */
- int btstack_main(void);
- int btstack_main(void)
- {
- sm_peripheral_setup();
- // turn on!
- hci_power_control(HCI_POWER_ON);
-
- return 0;
- }
- /* EXAMPLE_END */
|