17c485f8bSMatthias Ringwald /* 27c485f8bSMatthias Ringwald * Copyright (C) 2014 BlueKitchen GmbH 37c485f8bSMatthias Ringwald * 47c485f8bSMatthias Ringwald * Redistribution and use in source and binary forms, with or without 57c485f8bSMatthias Ringwald * modification, are permitted provided that the following conditions 67c485f8bSMatthias Ringwald * are met: 77c485f8bSMatthias Ringwald * 87c485f8bSMatthias Ringwald * 1. Redistributions of source code must retain the above copyright 97c485f8bSMatthias Ringwald * notice, this list of conditions and the following disclaimer. 107c485f8bSMatthias Ringwald * 2. Redistributions in binary form must reproduce the above copyright 117c485f8bSMatthias Ringwald * notice, this list of conditions and the following disclaimer in the 127c485f8bSMatthias Ringwald * documentation and/or other materials provided with the distribution. 137c485f8bSMatthias Ringwald * 3. Neither the name of the copyright holders nor the names of 147c485f8bSMatthias Ringwald * contributors may be used to endorse or promote products derived 157c485f8bSMatthias Ringwald * from this software without specific prior written permission. 167c485f8bSMatthias Ringwald * 4. Any redistribution, use, or modification is done solely for 177c485f8bSMatthias Ringwald * personal benefit and not for any commercial purpose or for 187c485f8bSMatthias Ringwald * monetary gain. 197c485f8bSMatthias Ringwald * 207c485f8bSMatthias Ringwald * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 217c485f8bSMatthias Ringwald * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 227c485f8bSMatthias Ringwald * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 237c485f8bSMatthias Ringwald * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 247c485f8bSMatthias Ringwald * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 257c485f8bSMatthias Ringwald * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 267c485f8bSMatthias Ringwald * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 277c485f8bSMatthias Ringwald * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 287c485f8bSMatthias Ringwald * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 297c485f8bSMatthias Ringwald * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 307c485f8bSMatthias Ringwald * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 317c485f8bSMatthias Ringwald * SUCH DAMAGE. 327c485f8bSMatthias Ringwald * 337c485f8bSMatthias Ringwald * Please inquire about commercial licensing options at 347c485f8bSMatthias Ringwald * [email protected] 357c485f8bSMatthias Ringwald * 367c485f8bSMatthias Ringwald */ 37ab2c6ae4SMatthias Ringwald 38e501bae0SMatthias Ringwald #define BTSTACK_FILE__ "sm_pairing_central.c" 397c485f8bSMatthias Ringwald 407c485f8bSMatthias Ringwald 417c485f8bSMatthias Ringwald // ***************************************************************************** 42ec8ae085SMilanka Ringwald /* EXAMPLE_START(sm_pairing_central): LE Central - Test Pairing Methods 437c485f8bSMatthias Ringwald * 447c485f8bSMatthias Ringwald * @text Depending on the Authentication requiremens and IO Capabilities, 457c485f8bSMatthias Ringwald * the pairing process uses different short and long term key generation method. 467c485f8bSMatthias Ringwald * This example helps explore the different options incl. LE Secure Connections. 477c485f8bSMatthias Ringwald * It scans for advertisements and connects to the first device that lists a 487c485f8bSMatthias Ringwald * random service. 497c485f8bSMatthias Ringwald */ 507c485f8bSMatthias Ringwald // ***************************************************************************** 517c485f8bSMatthias Ringwald 527c485f8bSMatthias Ringwald 537c485f8bSMatthias Ringwald #include <stdint.h> 547c485f8bSMatthias Ringwald #include <inttypes.h> 557c485f8bSMatthias Ringwald #include <stdio.h> 567c485f8bSMatthias Ringwald #include <stdlib.h> 577c485f8bSMatthias Ringwald #include <string.h> 587c485f8bSMatthias Ringwald 597c485f8bSMatthias Ringwald #include "btstack.h" 60a63a688aSMatthias Ringwald // sm_pairing_central.gatt contains the declaration of the provided GATT Services + Characteristics 61a63a688aSMatthias Ringwald // sm_pairing_central.h contains the binary representation of sm_pairing_central.gatt 62a63a688aSMatthias Ringwald // it is generated by the build system by calling: $BTSTACK_ROOT/tool/compile_gatt.py sm_pairing_central.gatt sm_pairing_central.h 63a63a688aSMatthias Ringwald // it needs to be regenerated when the GATT Database declared in sm_pairing_central.gatt file is modified 643c90b2d9SMatthias Ringwald #include "sm_pairing_central.h" 657c485f8bSMatthias Ringwald 667c485f8bSMatthias Ringwald 677c485f8bSMatthias Ringwald // We're looking for a remote device that lists this service in the advertisement 687c485f8bSMatthias Ringwald // LightBlue assigns 0x1111 as the UUID for a Blank service. 697c485f8bSMatthias Ringwald #define REMOTE_SERVICE 0x1111 707c485f8bSMatthias Ringwald 7198c0024dSMatthias Ringwald // Fixed passkey - used with sm_pairing_peripheral. Passkey is random in general 7232112218SMatthias Ringwald #define FIXED_PASSKEY 123456 7398c0024dSMatthias Ringwald 747c485f8bSMatthias Ringwald 757c485f8bSMatthias Ringwald static btstack_packet_callback_registration_t hci_event_callback_registration; 767c485f8bSMatthias Ringwald static btstack_packet_callback_registration_t sm_event_callback_registration; 777c485f8bSMatthias Ringwald 787c485f8bSMatthias Ringwald /* @section GAP LE setup for receiving advertisements 797c485f8bSMatthias Ringwald * 807c485f8bSMatthias Ringwald * @text GAP LE advertisements are received as custom HCI events of the 817c485f8bSMatthias Ringwald * GAP_EVENT_ADVERTISING_REPORT type. To receive them, you'll need to register 827c485f8bSMatthias Ringwald * the HCI packet handler, as shown in Listing GAPLEAdvSetup. 837c485f8bSMatthias Ringwald */ 847c485f8bSMatthias Ringwald 857c485f8bSMatthias Ringwald /* LISTING_START(GAPLEAdvSetup): Setting up GAP LE client for receiving advertisements */ 8698c0024dSMatthias Ringwald static void hci_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size); 8798c0024dSMatthias Ringwald static void sm_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size); 887c485f8bSMatthias Ringwald 897c485f8bSMatthias Ringwald static void sm_pairing_central_setup(void){ 907c485f8bSMatthias Ringwald l2cap_init(); 917c485f8bSMatthias Ringwald 927c485f8bSMatthias Ringwald // setup le device db 937c485f8bSMatthias Ringwald le_device_db_init(); 947c485f8bSMatthias Ringwald 957c485f8bSMatthias Ringwald // setup SM: Display only 967c485f8bSMatthias Ringwald sm_init(); 977c485f8bSMatthias Ringwald 98e5779dd2SMatthias Ringwald // setup ATT server 99e5779dd2SMatthias Ringwald att_server_init(profile_data, NULL, NULL); 100e5779dd2SMatthias Ringwald 1017c485f8bSMatthias Ringwald /** 1027c485f8bSMatthias Ringwald * Choose ONE of the following configurations 1033cdbe9dbSMatthias Ringwald * Bonding is disabled to allow for repeated testing. It can be enabled by or'ing 1043cdbe9dbSMatthias Ringwald * SM_AUTHREQ_BONDING to the authentication requirements like this: 1053cdbe9dbSMatthias Ringwald * sm_set_authentication_requirements( X | SM_AUTHREQ_BONDING) 1067c485f8bSMatthias Ringwald */ 1077c485f8bSMatthias Ringwald 108a4fe6467SMatthias Ringwald // register handler 10998c0024dSMatthias Ringwald hci_event_callback_registration.callback = &hci_packet_handler; 110a4fe6467SMatthias Ringwald hci_add_event_handler(&hci_event_callback_registration); 111a4fe6467SMatthias Ringwald 11298c0024dSMatthias Ringwald sm_event_callback_registration.callback = &sm_packet_handler; 113a4fe6467SMatthias Ringwald sm_add_event_handler(&sm_event_callback_registration); 114a4fe6467SMatthias Ringwald 1157c485f8bSMatthias Ringwald // LE Legacy Pairing, Just Works 11698c0024dSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 1173cdbe9dbSMatthias Ringwald // sm_set_authentication_requirements(0); 1187c485f8bSMatthias Ringwald 1197c485f8bSMatthias Ringwald // LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays 1207c485f8bSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 1217c485f8bSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_MITM_PROTECTION); 12298c0024dSMatthias Ringwald // sm_use_fixed_passkey_in_display_role(FIXED_PASSKEY); 1237c485f8bSMatthias Ringwald 1247c485f8bSMatthias Ringwald #ifdef ENABLE_LE_SECURE_CONNECTIONS 1253cdbe9dbSMatthias Ringwald 1263cdbe9dbSMatthias Ringwald // enable LE Secure Connections Only mode - disables Legacy pairing 1273cdbe9dbSMatthias Ringwald // sm_set_secure_connections_only_mode(true); 1283cdbe9dbSMatthias Ringwald 1293cdbe9dbSMatthias Ringwald // LE Secure Connections, Just Works 1307c485f8bSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 1317c485f8bSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION); 1327c485f8bSMatthias Ringwald 1337c485f8bSMatthias Ringwald // LE Secure Connections, Numeric Comparison 13498c0024dSMatthias Ringwald sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 13598c0024dSMatthias Ringwald sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 1367c485f8bSMatthias Ringwald 13732112218SMatthias Ringwald // LE Secure Pairing, Passkey entry initiator (us) enters, responder displays 13832112218SMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_KEYBOARD_ONLY); 1397c485f8bSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 14098c0024dSMatthias Ringwald // sm_use_fixed_passkey_in_display_role(FIXED_PASSKEY); 14132112218SMatthias Ringwald 14232112218SMatthias Ringwald // LE Secure Pairing, Passkey entry initiator (us) displays, responder enters 14332112218SMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 14432112218SMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 1457c485f8bSMatthias Ringwald #endif 1467c485f8bSMatthias Ringwald } 1477c485f8bSMatthias Ringwald 1487c485f8bSMatthias Ringwald /* LISTING_END */ 1497c485f8bSMatthias Ringwald 1507c485f8bSMatthias Ringwald /* @section HCI packet handler 1517c485f8bSMatthias Ringwald * 1527c485f8bSMatthias Ringwald * @text The HCI packet handler has to start the scanning, 1537c485f8bSMatthias Ringwald * and to handle received advertisements. Advertisements are received 1547c485f8bSMatthias Ringwald * as HCI event packets of the GAP_EVENT_ADVERTISING_REPORT type, 15598c0024dSMatthias Ringwald * see Listing HCIPacketHandler. 1567c485f8bSMatthias Ringwald */ 1577c485f8bSMatthias Ringwald 15898c0024dSMatthias Ringwald /* LISTING_START(HCIPacketHandler): Scanning and receiving advertisements */ 1597c485f8bSMatthias Ringwald 16098c0024dSMatthias Ringwald static void hci_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 1619ec2630cSMatthias Ringwald UNUSED(channel); 1629ec2630cSMatthias Ringwald UNUSED(size); 1639ec2630cSMatthias Ringwald 1647c485f8bSMatthias Ringwald if (packet_type != HCI_EVENT_PACKET) return; 1657c485f8bSMatthias Ringwald hci_con_handle_t con_handle; 1667c485f8bSMatthias Ringwald 1677c485f8bSMatthias Ringwald switch (hci_event_packet_get_type(packet)) { 1687c485f8bSMatthias Ringwald case BTSTACK_EVENT_STATE: 1697c485f8bSMatthias Ringwald // BTstack activated, get started 1707c485f8bSMatthias Ringwald if (btstack_event_state_get_state(packet) == HCI_STATE_WORKING){ 1717c485f8bSMatthias Ringwald printf("Start scaning!\n"); 1727c485f8bSMatthias Ringwald gap_set_scan_parameters(1,0x0030, 0x0030); 1737c485f8bSMatthias Ringwald gap_start_scan(); 1747c485f8bSMatthias Ringwald } 1757c485f8bSMatthias Ringwald break; 1767c485f8bSMatthias Ringwald case GAP_EVENT_ADVERTISING_REPORT:{ 1777c485f8bSMatthias Ringwald bd_addr_t address; 1787c485f8bSMatthias Ringwald gap_event_advertising_report_get_address(packet, address); 1797c485f8bSMatthias Ringwald uint8_t address_type = gap_event_advertising_report_get_address_type(packet); 1807c485f8bSMatthias Ringwald uint8_t length = gap_event_advertising_report_get_data_length(packet); 1817c485f8bSMatthias Ringwald const uint8_t * data = gap_event_advertising_report_get_data(packet); 18298c0024dSMatthias Ringwald // printf("Advertisement event: addr-type %u, addr %s, data[%u] ", 18398c0024dSMatthias Ringwald // address_type, bd_addr_to_str(address), length); 18498c0024dSMatthias Ringwald // printf_hexdump(data, length); 1857c485f8bSMatthias Ringwald if (!ad_data_contains_uuid16(length, (uint8_t *) data, REMOTE_SERVICE)) break; 1867c485f8bSMatthias Ringwald printf("Found remote with UUID %04x, connecting...\n", REMOTE_SERVICE); 1877c485f8bSMatthias Ringwald gap_stop_scan(); 1887c485f8bSMatthias Ringwald gap_connect(address,address_type); 1897c485f8bSMatthias Ringwald break; 1907c485f8bSMatthias Ringwald } 19198c0024dSMatthias Ringwald case HCI_EVENT_LE_META: 19298c0024dSMatthias Ringwald // wait for connection complete 19398c0024dSMatthias Ringwald if (hci_event_le_meta_get_subevent_code(packet) != HCI_SUBEVENT_LE_CONNECTION_COMPLETE) break; 19498c0024dSMatthias Ringwald con_handle = hci_subevent_le_connection_complete_get_connection_handle(packet); 19598c0024dSMatthias Ringwald printf("Connection complete\n"); 19698c0024dSMatthias Ringwald // start pairing 19798c0024dSMatthias Ringwald sm_request_pairing(con_handle); 19898c0024dSMatthias Ringwald break; 19998c0024dSMatthias Ringwald case HCI_EVENT_ENCRYPTION_CHANGE: 20098c0024dSMatthias Ringwald con_handle = hci_event_encryption_change_get_connection_handle(packet); 20198c0024dSMatthias Ringwald printf("Connection encrypted: %u\n", hci_event_encryption_change_get_encryption_enabled(packet)); 20298c0024dSMatthias Ringwald break; 20398c0024dSMatthias Ringwald default: 20498c0024dSMatthias Ringwald break; 20598c0024dSMatthias Ringwald } 20698c0024dSMatthias Ringwald } 20798c0024dSMatthias Ringwald 20898c0024dSMatthias Ringwald /* @section HCI packet handler 20998c0024dSMatthias Ringwald * 21098c0024dSMatthias Ringwald * @text The SM packet handler receives Security Manager Events required for pairing. 21198c0024dSMatthias Ringwald * It also receives events generated during Identity Resolving 21298c0024dSMatthias Ringwald * see Listing SMPacketHandler. 21398c0024dSMatthias Ringwald */ 21498c0024dSMatthias Ringwald 21598c0024dSMatthias Ringwald /* LISTING_START(SMPacketHandler): Scanning and receiving advertisements */ 21698c0024dSMatthias Ringwald 21798c0024dSMatthias Ringwald static void sm_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 21898c0024dSMatthias Ringwald UNUSED(channel); 21998c0024dSMatthias Ringwald UNUSED(size); 22098c0024dSMatthias Ringwald 22198c0024dSMatthias Ringwald if (packet_type != HCI_EVENT_PACKET) return; 22298c0024dSMatthias Ringwald 223*7e65711bSMatthias Ringwald bd_addr_t addr; 22498c0024dSMatthias Ringwald switch (hci_event_packet_get_type(packet)) { 2257c485f8bSMatthias Ringwald case SM_EVENT_JUST_WORKS_REQUEST: 2267c485f8bSMatthias Ringwald printf("Just works requested\n"); 2277c485f8bSMatthias Ringwald sm_just_works_confirm(sm_event_just_works_request_get_handle(packet)); 2287c485f8bSMatthias Ringwald break; 2297c485f8bSMatthias Ringwald case SM_EVENT_NUMERIC_COMPARISON_REQUEST: 230bace42efSMatthias Ringwald printf("Confirming numeric comparison: %"PRIu32"\n", sm_event_numeric_comparison_request_get_passkey(packet)); 2317c485f8bSMatthias Ringwald sm_numeric_comparison_confirm(sm_event_passkey_display_number_get_handle(packet)); 2327c485f8bSMatthias Ringwald break; 2337c485f8bSMatthias Ringwald case SM_EVENT_PASSKEY_DISPLAY_NUMBER: 234bace42efSMatthias Ringwald printf("Display Passkey: %"PRIu32"\n", sm_event_passkey_display_number_get_passkey(packet)); 2357c485f8bSMatthias Ringwald break; 23698c0024dSMatthias Ringwald case SM_EVENT_PASSKEY_INPUT_NUMBER: 23798c0024dSMatthias Ringwald printf("Passkey Input requested\n"); 23898c0024dSMatthias Ringwald printf("Sending fixed passkey %"PRIu32"\n", FIXED_PASSKEY); 23998c0024dSMatthias Ringwald sm_passkey_input(sm_event_passkey_input_number_get_handle(packet), FIXED_PASSKEY); 24098c0024dSMatthias Ringwald break; 241eee18978SMatthias Ringwald case SM_EVENT_PAIRING_COMPLETE: 242eee18978SMatthias Ringwald switch (sm_event_pairing_complete_get_status(packet)){ 243eee18978SMatthias Ringwald case ERROR_CODE_SUCCESS: 244eee18978SMatthias Ringwald printf("Pairing complete, success\n"); 245eee18978SMatthias Ringwald break; 246eee18978SMatthias Ringwald case ERROR_CODE_CONNECTION_TIMEOUT: 247eee18978SMatthias Ringwald printf("Pairing failed, timeout\n"); 248eee18978SMatthias Ringwald break; 249eee18978SMatthias Ringwald case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION: 2503cdbe9dbSMatthias Ringwald printf("Pairing failed, disconnected\n"); 251eee18978SMatthias Ringwald break; 252eee18978SMatthias Ringwald case ERROR_CODE_AUTHENTICATION_FAILURE: 253eee18978SMatthias Ringwald printf("Pairing failed, reason = %u\n", sm_event_pairing_complete_get_reason(packet)); 254eee18978SMatthias Ringwald break; 255eee18978SMatthias Ringwald default: 256eee18978SMatthias Ringwald break; 257eee18978SMatthias Ringwald } 258eee18978SMatthias Ringwald break; 259*7e65711bSMatthias Ringwald case SM_EVENT_REENCRYPTION_STARTED: 260*7e65711bSMatthias Ringwald sm_event_reencryption_complete_get_address(packet, addr); 261*7e65711bSMatthias Ringwald printf("Bonding information exists for addr type %u, identity addr %s -> start re-encryption\n", 262*7e65711bSMatthias Ringwald sm_event_reencryption_started_get_addr_type(packet), bd_addr_to_str(addr)); 263*7e65711bSMatthias Ringwald break; 264*7e65711bSMatthias Ringwald case SM_EVENT_REENCRYPTION_COMPLETE: 265*7e65711bSMatthias Ringwald switch (sm_event_reencryption_complete_get_status(packet)){ 266*7e65711bSMatthias Ringwald case ERROR_CODE_SUCCESS: 267*7e65711bSMatthias Ringwald printf("Re-encryption complete, success\n"); 268*7e65711bSMatthias Ringwald break; 269*7e65711bSMatthias Ringwald case ERROR_CODE_CONNECTION_TIMEOUT: 270*7e65711bSMatthias Ringwald printf("Re-encryption failed, timeout\n"); 271*7e65711bSMatthias Ringwald break; 272*7e65711bSMatthias Ringwald case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION: 273*7e65711bSMatthias Ringwald printf("Re-encryption failed, disconnected\n"); 274*7e65711bSMatthias Ringwald break; 275*7e65711bSMatthias Ringwald case ERROR_CODE_AUTHENTICATION_FAILURE: 276*7e65711bSMatthias Ringwald printf("Re-encryption failed, authentication failure\n"); 277*7e65711bSMatthias Ringwald break; 278*7e65711bSMatthias Ringwald default: 279*7e65711bSMatthias Ringwald break; 280*7e65711bSMatthias Ringwald } 281*7e65711bSMatthias Ringwald break; 2827c485f8bSMatthias Ringwald default: 2837c485f8bSMatthias Ringwald break; 2847c485f8bSMatthias Ringwald } 2857c485f8bSMatthias Ringwald } 2867c485f8bSMatthias Ringwald /* LISTING_END */ 2877c485f8bSMatthias Ringwald 2887c485f8bSMatthias Ringwald int btstack_main(void); 2897c485f8bSMatthias Ringwald int btstack_main(void) 2907c485f8bSMatthias Ringwald { 2917c485f8bSMatthias Ringwald sm_pairing_central_setup(); 2927c485f8bSMatthias Ringwald 2937c485f8bSMatthias Ringwald // turn on! 2947c485f8bSMatthias Ringwald hci_power_control(HCI_POWER_ON); 2957c485f8bSMatthias Ringwald 2967c485f8bSMatthias Ringwald return 0; 2977c485f8bSMatthias Ringwald } 2987c485f8bSMatthias Ringwald 2997c485f8bSMatthias Ringwald /* EXAMPLE_END */ 300