1d7ee901aSMatthias Ringwald /* 2d7ee901aSMatthias Ringwald * Copyright (C) 2014 BlueKitchen GmbH 3d7ee901aSMatthias Ringwald * 4d7ee901aSMatthias Ringwald * Redistribution and use in source and binary forms, with or without 5d7ee901aSMatthias Ringwald * modification, are permitted provided that the following conditions 6d7ee901aSMatthias Ringwald * are met: 7d7ee901aSMatthias Ringwald * 8d7ee901aSMatthias Ringwald * 1. Redistributions of source code must retain the above copyright 9d7ee901aSMatthias Ringwald * notice, this list of conditions and the following disclaimer. 10d7ee901aSMatthias Ringwald * 2. Redistributions in binary form must reproduce the above copyright 11d7ee901aSMatthias Ringwald * notice, this list of conditions and the following disclaimer in the 12d7ee901aSMatthias Ringwald * documentation and/or other materials provided with the distribution. 13d7ee901aSMatthias Ringwald * 3. Neither the name of the copyright holders nor the names of 14d7ee901aSMatthias Ringwald * contributors may be used to endorse or promote products derived 15d7ee901aSMatthias Ringwald * from this software without specific prior written permission. 16d7ee901aSMatthias Ringwald * 4. Any redistribution, use, or modification is done solely for 17d7ee901aSMatthias Ringwald * personal benefit and not for any commercial purpose or for 18d7ee901aSMatthias Ringwald * monetary gain. 19d7ee901aSMatthias Ringwald * 20d7ee901aSMatthias Ringwald * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21d7ee901aSMatthias Ringwald * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22d7ee901aSMatthias Ringwald * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23d7ee901aSMatthias Ringwald * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24d7ee901aSMatthias Ringwald * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25d7ee901aSMatthias Ringwald * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26d7ee901aSMatthias Ringwald * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27d7ee901aSMatthias Ringwald * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28d7ee901aSMatthias Ringwald * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29d7ee901aSMatthias Ringwald * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30d7ee901aSMatthias Ringwald * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31d7ee901aSMatthias Ringwald * SUCH DAMAGE. 32d7ee901aSMatthias Ringwald * 33d7ee901aSMatthias Ringwald * Please inquire about commercial licensing options at 34d7ee901aSMatthias Ringwald * [email protected] 35d7ee901aSMatthias Ringwald * 36d7ee901aSMatthias Ringwald */ 37d7ee901aSMatthias Ringwald 38e501bae0SMatthias Ringwald #define BTSTACK_FILE__ "sm_pairing_peripheral.c" 39ab2c6ae4SMatthias Ringwald 40d7ee901aSMatthias Ringwald // ***************************************************************************** 41ec8ae085SMilanka Ringwald /* EXAMPLE_START(sm_pairing_peripheral): LE Peripheral - Test Pairing Methods 42d7ee901aSMatthias Ringwald * 43d7ee901aSMatthias Ringwald * @text Depending on the Authentication requiremens and IO Capabilities, 44d7ee901aSMatthias Ringwald * the pairing process uses different short and long term key generation method. 45d7ee901aSMatthias Ringwald * This example helps explore the different options incl. LE Secure Connections. 46d7ee901aSMatthias Ringwald */ 47d7ee901aSMatthias Ringwald // ***************************************************************************** 48d7ee901aSMatthias Ringwald 49d7ee901aSMatthias Ringwald #include <stdint.h> 50d7ee901aSMatthias Ringwald #include <stdio.h> 51d7ee901aSMatthias Ringwald #include <stdlib.h> 52d7ee901aSMatthias Ringwald #include <string.h> 53bace42efSMatthias Ringwald #include <inttypes.h> 54d7ee901aSMatthias Ringwald 55d7ee901aSMatthias Ringwald #include "sm_pairing_peripheral.h" 56d7ee901aSMatthias Ringwald #include "btstack.h" 57d7ee901aSMatthias Ringwald 58d7ee901aSMatthias Ringwald /* @section Main Application Setup 59d7ee901aSMatthias Ringwald * 60d7ee901aSMatthias Ringwald * @text Listing MainConfiguration shows main application code. 61d7ee901aSMatthias Ringwald * It initializes L2CAP, the Security Manager and configures the ATT Server with the pre-compiled 62d7ee901aSMatthias Ringwald * ATT Database generated from $sm_pairing_peripheral.gatt$. Finally, it configures the advertisements 63d7ee901aSMatthias Ringwald * and boots the Bluetooth stack. 6473704aa9SMatthias Ringwald * In this example, the Advertisement contains the Flags attribute, the device name, and a 16-bit (test) service 0x1111 65d7ee901aSMatthias Ringwald * The flag 0x06 indicates: LE General Discoverable Mode and BR/EDR not supported. 66d7ee901aSMatthias Ringwald * Various examples for IO Capabilites and Authentication Requirements are given below. 67d7ee901aSMatthias Ringwald */ 68d7ee901aSMatthias Ringwald 6973704aa9SMatthias Ringwald /* LISTING_START(MainConfiguration): Setup stack to advertise */ 70d7ee901aSMatthias Ringwald static btstack_packet_callback_registration_t sm_event_callback_registration; 71d7ee901aSMatthias Ringwald 72d7ee901aSMatthias Ringwald static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size); 73d7ee901aSMatthias Ringwald 74d7ee901aSMatthias Ringwald const uint8_t adv_data[] = { 75d7ee901aSMatthias Ringwald // Flags general discoverable, BR/EDR not supported 76bf85c285SMatthias Ringwald 0x02, BLUETOOTH_DATA_TYPE_FLAGS, 0x06, 77d7ee901aSMatthias Ringwald // Name 78bf85c285SMatthias Ringwald 0x0b, BLUETOOTH_DATA_TYPE_COMPLETE_LOCAL_NAME, 'S', 'M', ' ', 'P', 'a', 'i', 'r', 'i', 'n', 'g', 79bde654efSMatthias Ringwald // Incomplete List of 16-bit Service Class UUIDs -- 1111 - only valid for testing! 80bde654efSMatthias Ringwald 0x03, BLUETOOTH_DATA_TYPE_INCOMPLETE_LIST_OF_16_BIT_SERVICE_CLASS_UUIDS, 0x11, 0x11, 81d7ee901aSMatthias Ringwald }; 82d7ee901aSMatthias Ringwald const uint8_t adv_data_len = sizeof(adv_data); 83d7ee901aSMatthias Ringwald 84d7ee901aSMatthias Ringwald static void sm_peripheral_setup(void){ 85d7ee901aSMatthias Ringwald 86d7ee901aSMatthias Ringwald l2cap_init(); 87d7ee901aSMatthias Ringwald 88d7ee901aSMatthias Ringwald // setup le device db 89d7ee901aSMatthias Ringwald le_device_db_init(); 90d7ee901aSMatthias Ringwald 91d7ee901aSMatthias Ringwald // setup SM: Display only 92d7ee901aSMatthias Ringwald sm_init(); 93d7ee901aSMatthias Ringwald 94d7ee901aSMatthias Ringwald /** 95d7ee901aSMatthias Ringwald * Choose ONE of the following configurations 963cdbe9dbSMatthias Ringwald * Bonding is disabled to allow for repeated testing. It can be enabled by or'ing 973cdbe9dbSMatthias Ringwald * SM_AUTHREQ_BONDING to the authentication requirements like this: 983cdbe9dbSMatthias Ringwald * sm_set_authentication_requirements( X | SM_AUTHREQ_BONDING) 99d7ee901aSMatthias Ringwald */ 100d7ee901aSMatthias Ringwald 101d7ee901aSMatthias Ringwald // LE Legacy Pairing, Just Works 1024b8c611fSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT); 1033cdbe9dbSMatthias Ringwald // sm_set_authentication_requirements(0); 104d7ee901aSMatthias Ringwald 105d7ee901aSMatthias Ringwald // LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays 106d7ee901aSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 107d7ee901aSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_MITM_PROTECTION); 1084b8c611fSMatthias Ringwald // sm_use_fixed_passkey_in_display_role(123456); 109d7ee901aSMatthias Ringwald 110d7ee901aSMatthias Ringwald #ifdef ENABLE_LE_SECURE_CONNECTIONS 1113cdbe9dbSMatthias Ringwald 1123cdbe9dbSMatthias Ringwald // enable LE Secure Connections Only mode - disables Legacy pairing 11332112218SMatthias Ringwald // sm_set_secure_connections_only_mode(true); 1143cdbe9dbSMatthias Ringwald 1153cdbe9dbSMatthias Ringwald // LE Secure Connections, Just Works 11699c44ab2SMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT); 117d7ee901aSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION); 118d7ee901aSMatthias Ringwald 119d7ee901aSMatthias Ringwald // LE Secure Connections, Numeric Comparison 12099c44ab2SMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 12199c44ab2SMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 122d7ee901aSMatthias Ringwald 12332112218SMatthias Ringwald // LE Secure Pairing, Passkey entry initiator enter, responder (us) displays 124d7ee901aSMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 125d7ee901aSMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 1264b8c611fSMatthias Ringwald // sm_use_fixed_passkey_in_display_role(123456); 12732112218SMatthias Ringwald 12832112218SMatthias Ringwald // LE Secure Pairing, Passkey entry initiator displays, responder (us) enter 12932112218SMatthias Ringwald // sm_set_io_capabilities(IO_CAPABILITY_KEYBOARD_ONLY); 13032112218SMatthias Ringwald // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 131d7ee901aSMatthias Ringwald #endif 132d7ee901aSMatthias Ringwald 133d7ee901aSMatthias Ringwald // setup ATT server 134d7ee901aSMatthias Ringwald att_server_init(profile_data, NULL, NULL); 135d7ee901aSMatthias Ringwald 136d7ee901aSMatthias Ringwald // setup advertisements 137d7ee901aSMatthias Ringwald uint16_t adv_int_min = 0x0030; 138d7ee901aSMatthias Ringwald uint16_t adv_int_max = 0x0030; 139d7ee901aSMatthias Ringwald uint8_t adv_type = 0; 140d7ee901aSMatthias Ringwald bd_addr_t null_addr; 141d7ee901aSMatthias Ringwald memset(null_addr, 0, 6); 142d7ee901aSMatthias Ringwald gap_advertisements_set_params(adv_int_min, adv_int_max, adv_type, 0, null_addr, 0x07, 0x00); 143d7ee901aSMatthias Ringwald gap_advertisements_set_data(adv_data_len, (uint8_t*) adv_data); 144d7ee901aSMatthias Ringwald gap_advertisements_enable(1); 145a4fe6467SMatthias Ringwald 146a4fe6467SMatthias Ringwald // register for SM events 147a4fe6467SMatthias Ringwald sm_event_callback_registration.callback = &packet_handler; 148a4fe6467SMatthias Ringwald sm_add_event_handler(&sm_event_callback_registration); 149a4fe6467SMatthias Ringwald 150a4fe6467SMatthias Ringwald // register for ATT 151a4fe6467SMatthias Ringwald att_server_register_packet_handler(packet_handler); 152d7ee901aSMatthias Ringwald } 153d7ee901aSMatthias Ringwald 154d7ee901aSMatthias Ringwald /* LISTING_END */ 155d7ee901aSMatthias Ringwald 156d7ee901aSMatthias Ringwald /* 157d7ee901aSMatthias Ringwald * @section Packet Handler 158d7ee901aSMatthias Ringwald * 159d7ee901aSMatthias Ringwald * @text The packet handler is used to: 16073704aa9SMatthias Ringwald * - report connect/disconnect 16173704aa9SMatthias Ringwald * - handle Security Manager events 162d7ee901aSMatthias Ringwald */ 163d7ee901aSMatthias Ringwald 164d7ee901aSMatthias Ringwald /* LISTING_START(packetHandler): Packet Handler */ 165d7ee901aSMatthias Ringwald static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 1669ec2630cSMatthias Ringwald UNUSED(channel); 1679ec2630cSMatthias Ringwald UNUSED(size); 168414eb680SMatthias Ringwald 1697bbeb3adSMilanka Ringwald if (packet_type != HCI_EVENT_PACKET) return; 1707bbeb3adSMilanka Ringwald 171a4fe6467SMatthias Ringwald hci_con_handle_t con_handle; 1729c22b849SMatthias Ringwald bd_addr_t addr; 173414eb680SMatthias Ringwald 174d7ee901aSMatthias Ringwald switch (hci_event_packet_get_type(packet)) { 175a4fe6467SMatthias Ringwald case HCI_EVENT_LE_META: 176a4fe6467SMatthias Ringwald switch (hci_event_le_meta_get_subevent_code(packet)) { 177a4fe6467SMatthias Ringwald case HCI_SUBEVENT_LE_CONNECTION_COMPLETE: 17873704aa9SMatthias Ringwald printf("Connection complete\n"); 179414eb680SMatthias Ringwald // Uncomment the next lines to trigger explicit pairing on connect 180414eb680SMatthias Ringwald // con_handle = hci_subevent_le_connection_complete_get_connection_handle(packet); 181414eb680SMatthias Ringwald // sm_send_security_request(con_handle); 182414eb680SMatthias Ringwald UNUSED(con_handle); 183a4fe6467SMatthias Ringwald break; 184a4fe6467SMatthias Ringwald default: 185a4fe6467SMatthias Ringwald break; 186a4fe6467SMatthias Ringwald } 187a4fe6467SMatthias Ringwald break; 188d7ee901aSMatthias Ringwald case SM_EVENT_JUST_WORKS_REQUEST: 189d7ee901aSMatthias Ringwald printf("Just Works requested\n"); 190d7ee901aSMatthias Ringwald sm_just_works_confirm(sm_event_just_works_request_get_handle(packet)); 191d7ee901aSMatthias Ringwald break; 192d7ee901aSMatthias Ringwald case SM_EVENT_NUMERIC_COMPARISON_REQUEST: 193bace42efSMatthias Ringwald printf("Confirming numeric comparison: %"PRIu32"\n", sm_event_numeric_comparison_request_get_passkey(packet)); 194d7ee901aSMatthias Ringwald sm_numeric_comparison_confirm(sm_event_passkey_display_number_get_handle(packet)); 195d7ee901aSMatthias Ringwald break; 196d7ee901aSMatthias Ringwald case SM_EVENT_PASSKEY_DISPLAY_NUMBER: 197bace42efSMatthias Ringwald printf("Display Passkey: %"PRIu32"\n", sm_event_passkey_display_number_get_passkey(packet)); 198d7ee901aSMatthias Ringwald break; 1999c22b849SMatthias Ringwald case SM_EVENT_IDENTITY_CREATED: 2009c22b849SMatthias Ringwald sm_event_identity_created_get_identity_address(packet, addr); 2019c22b849SMatthias Ringwald printf("Identity created: type %u address %s\n", sm_event_identity_created_get_identity_addr_type(packet), bd_addr_to_str(addr)); 2029c22b849SMatthias Ringwald break; 2039c22b849SMatthias Ringwald case SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED: 2049c22b849SMatthias Ringwald sm_event_identity_resolving_succeeded_get_identity_address(packet, addr); 2059c22b849SMatthias Ringwald printf("Identity resolved: type %u address %s\n", sm_event_identity_resolving_succeeded_get_identity_addr_type(packet), bd_addr_to_str(addr)); 2069c22b849SMatthias Ringwald break; 2079c22b849SMatthias Ringwald case SM_EVENT_IDENTITY_RESOLVING_FAILED: 2089c22b849SMatthias Ringwald sm_event_identity_created_get_address(packet, addr); 2099c22b849SMatthias Ringwald printf("Identity resolving failed\n"); 2109c22b849SMatthias Ringwald break; 2110614d679SMatthias Ringwald case SM_EVENT_PAIRING_COMPLETE: 2120614d679SMatthias Ringwald switch (sm_event_pairing_complete_get_status(packet)){ 2130614d679SMatthias Ringwald case ERROR_CODE_SUCCESS: 2140614d679SMatthias Ringwald printf("Pairing complete, success\n"); 2150614d679SMatthias Ringwald break; 2160614d679SMatthias Ringwald case ERROR_CODE_CONNECTION_TIMEOUT: 2170614d679SMatthias Ringwald printf("Pairing failed, timeout\n"); 2180614d679SMatthias Ringwald break; 2190614d679SMatthias Ringwald case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION: 2203cdbe9dbSMatthias Ringwald printf("Pairing failed, disconnected\n"); 2210614d679SMatthias Ringwald break; 2220614d679SMatthias Ringwald case ERROR_CODE_AUTHENTICATION_FAILURE: 2230614d679SMatthias Ringwald printf("Pairing failed, reason = %u\n", sm_event_pairing_complete_get_reason(packet)); 2240614d679SMatthias Ringwald break; 2250614d679SMatthias Ringwald default: 2260614d679SMatthias Ringwald break; 2270614d679SMatthias Ringwald } 2280614d679SMatthias Ringwald break; 229*7e65711bSMatthias Ringwald case SM_EVENT_REENCRYPTION_STARTED: 230*7e65711bSMatthias Ringwald sm_event_reencryption_complete_get_address(packet, addr); 231*7e65711bSMatthias Ringwald printf("Bonding information exists for addr type %u, identity addr %s -> re-encryption started\n", 232*7e65711bSMatthias Ringwald sm_event_reencryption_started_get_addr_type(packet), bd_addr_to_str(addr)); 233*7e65711bSMatthias Ringwald break; 234*7e65711bSMatthias Ringwald case SM_EVENT_REENCRYPTION_COMPLETE: 235*7e65711bSMatthias Ringwald switch (sm_event_reencryption_complete_get_status(packet)){ 236*7e65711bSMatthias Ringwald case ERROR_CODE_SUCCESS: 237*7e65711bSMatthias Ringwald printf("Re-encryption complete, success\n"); 238*7e65711bSMatthias Ringwald break; 239*7e65711bSMatthias Ringwald case ERROR_CODE_CONNECTION_TIMEOUT: 240*7e65711bSMatthias Ringwald printf("Re-encryption failed, timeout\n"); 241*7e65711bSMatthias Ringwald break; 242*7e65711bSMatthias Ringwald case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION: 243*7e65711bSMatthias Ringwald printf("Re-encryption failed, disconnected\n"); 244*7e65711bSMatthias Ringwald break; 245*7e65711bSMatthias Ringwald case ERROR_CODE_AUTHENTICATION_FAILURE: 246*7e65711bSMatthias Ringwald printf("Re-encryption failed, authentication failure\n"); 247*7e65711bSMatthias Ringwald break; 248*7e65711bSMatthias Ringwald default: 249*7e65711bSMatthias Ringwald break; 250*7e65711bSMatthias Ringwald } 251*7e65711bSMatthias Ringwald break; 2520614d679SMatthias Ringwald default: 2530614d679SMatthias Ringwald break; 254d7ee901aSMatthias Ringwald } 255d7ee901aSMatthias Ringwald } 256d7ee901aSMatthias Ringwald /* LISTING_END */ 257d7ee901aSMatthias Ringwald 258d7ee901aSMatthias Ringwald int btstack_main(void); 259d7ee901aSMatthias Ringwald int btstack_main(void) 260d7ee901aSMatthias Ringwald { 261d7ee901aSMatthias Ringwald sm_peripheral_setup(); 262d7ee901aSMatthias Ringwald 263d7ee901aSMatthias Ringwald // turn on! 264d7ee901aSMatthias Ringwald hci_power_control(HCI_POWER_ON); 265d7ee901aSMatthias Ringwald 266d7ee901aSMatthias Ringwald return 0; 267d7ee901aSMatthias Ringwald } 268d7ee901aSMatthias Ringwald /* EXAMPLE_END */ 269