1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 #define BTSTACK_FILE__ "sm_pairing_peripheral.c" 39 40 // ***************************************************************************** 41 /* EXAMPLE_START(sm_pairing_peripheral): LE Peripheral - Test pairing combinations 42 * 43 * @text Depending on the Authentication requiremens and IO Capabilities, 44 * the pairing process uses different short and long term key generation method. 45 * This example helps explore the different options incl. LE Secure Connections. 46 */ 47 // ***************************************************************************** 48 49 #include <stdint.h> 50 #include <stdio.h> 51 #include <stdlib.h> 52 #include <string.h> 53 #include <inttypes.h> 54 55 #include "sm_pairing_peripheral.h" 56 #include "btstack.h" 57 58 /* @section Main Application Setup 59 * 60 * @text Listing MainConfiguration shows main application code. 61 * It initializes L2CAP, the Security Manager and configures the ATT Server with the pre-compiled 62 * ATT Database generated from $sm_pairing_peripheral.gatt$. Finally, it configures the advertisements 63 * and boots the Bluetooth stack. 64 * In this example, the Advertisement contains the Flags attribute, the device name, and a 16-bit (test) service 0x1111 65 * The flag 0x06 indicates: LE General Discoverable Mode and BR/EDR not supported. 66 * Various examples for IO Capabilites and Authentication Requirements are given below. 67 */ 68 69 /* LISTING_START(MainConfiguration): Setup stack to advertise */ 70 static btstack_packet_callback_registration_t sm_event_callback_registration; 71 72 static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size); 73 74 const uint8_t adv_data[] = { 75 // Flags general discoverable, BR/EDR not supported 76 0x02, BLUETOOTH_DATA_TYPE_FLAGS, 0x06, 77 // Name 78 0x0b, BLUETOOTH_DATA_TYPE_COMPLETE_LOCAL_NAME, 'S', 'M', ' ', 'P', 'a', 'i', 'r', 'i', 'n', 'g', 79 // Incomplete List of 16-bit Service Class UUIDs -- 1111 - only valid for testing! 80 0x03, BLUETOOTH_DATA_TYPE_INCOMPLETE_LIST_OF_16_BIT_SERVICE_CLASS_UUIDS, 0x11, 0x11, 81 }; 82 const uint8_t adv_data_len = sizeof(adv_data); 83 84 static void sm_peripheral_setup(void){ 85 86 l2cap_init(); 87 88 // setup le device db 89 le_device_db_init(); 90 91 // setup SM: Display only 92 sm_init(); 93 94 /** 95 * Choose ONE of the following configurations 96 * Bonding is disabled to allow for repeated testing. It can be enabled by or'ing 97 * SM_AUTHREQ_BONDING to the authentication requirements like this: 98 * sm_set_authentication_requirements( X | SM_AUTHREQ_BONDING) 99 */ 100 101 // LE Legacy Pairing, Just Works 102 // sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT); 103 // sm_set_authentication_requirements(0); 104 105 // LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays 106 // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 107 // sm_set_authentication_requirements(SM_AUTHREQ_MITM_PROTECTION); 108 // sm_use_fixed_passkey_in_display_role(123456); 109 110 #ifdef ENABLE_LE_SECURE_CONNECTIONS 111 112 // enable LE Secure Connections Only mode - disables Legacy pairing 113 sm_set_secure_connections_only_mode(true); 114 115 // LE Secure Connections, Just Works 116 // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 117 // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION); 118 119 // LE Secure Connections, Numeric Comparison 120 sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); 121 sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 122 123 // LE Legacy Pairing, Passkey entry initiator enter, responder (us) displays 124 // sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); 125 // sm_set_authentication_requirements(SM_AUTHREQ_SECURE_CONNECTION|SM_AUTHREQ_MITM_PROTECTION); 126 // sm_use_fixed_passkey_in_display_role(123456); 127 #endif 128 129 // setup ATT server 130 att_server_init(profile_data, NULL, NULL); 131 132 // setup advertisements 133 uint16_t adv_int_min = 0x0030; 134 uint16_t adv_int_max = 0x0030; 135 uint8_t adv_type = 0; 136 bd_addr_t null_addr; 137 memset(null_addr, 0, 6); 138 gap_advertisements_set_params(adv_int_min, adv_int_max, adv_type, 0, null_addr, 0x07, 0x00); 139 gap_advertisements_set_data(adv_data_len, (uint8_t*) adv_data); 140 gap_advertisements_enable(1); 141 142 // register for SM events 143 sm_event_callback_registration.callback = &packet_handler; 144 sm_add_event_handler(&sm_event_callback_registration); 145 146 // register for ATT 147 att_server_register_packet_handler(packet_handler); 148 } 149 150 /* LISTING_END */ 151 152 /* 153 * @section Packet Handler 154 * 155 * @text The packet handler is used to: 156 * - report connect/disconnect 157 * - handle Security Manager events 158 */ 159 160 /* LISTING_START(packetHandler): Packet Handler */ 161 static void packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 162 UNUSED(channel); 163 UNUSED(size); 164 165 hci_con_handle_t con_handle; 166 bd_addr_t addr; 167 168 switch (packet_type) { 169 case HCI_EVENT_PACKET: 170 switch (hci_event_packet_get_type(packet)) { 171 case HCI_EVENT_LE_META: 172 switch (hci_event_le_meta_get_subevent_code(packet)) { 173 case HCI_SUBEVENT_LE_CONNECTION_COMPLETE: 174 printf("Connection complete\n"); 175 // Uncomment the next lines to trigger explicit pairing on connect 176 // con_handle = hci_subevent_le_connection_complete_get_connection_handle(packet); 177 // sm_send_security_request(con_handle); 178 UNUSED(con_handle); 179 break; 180 default: 181 break; 182 } 183 break; 184 case SM_EVENT_JUST_WORKS_REQUEST: 185 printf("Just Works requested\n"); 186 sm_just_works_confirm(sm_event_just_works_request_get_handle(packet)); 187 break; 188 case SM_EVENT_NUMERIC_COMPARISON_REQUEST: 189 printf("Confirming numeric comparison: %"PRIu32"\n", sm_event_numeric_comparison_request_get_passkey(packet)); 190 sm_numeric_comparison_confirm(sm_event_passkey_display_number_get_handle(packet)); 191 break; 192 case SM_EVENT_PASSKEY_DISPLAY_NUMBER: 193 printf("Display Passkey: %"PRIu32"\n", sm_event_passkey_display_number_get_passkey(packet)); 194 break; 195 case SM_EVENT_IDENTITY_CREATED: 196 sm_event_identity_created_get_identity_address(packet, addr); 197 printf("Identity created: type %u address %s\n", sm_event_identity_created_get_identity_addr_type(packet), bd_addr_to_str(addr)); 198 break; 199 case SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED: 200 sm_event_identity_resolving_succeeded_get_identity_address(packet, addr); 201 printf("Identity resolved: type %u address %s\n", sm_event_identity_resolving_succeeded_get_identity_addr_type(packet), bd_addr_to_str(addr)); 202 break; 203 case SM_EVENT_IDENTITY_RESOLVING_FAILED: 204 sm_event_identity_created_get_address(packet, addr); 205 printf("Identity resolving failed\n"); 206 break; 207 case SM_EVENT_PAIRING_COMPLETE: 208 switch (sm_event_pairing_complete_get_status(packet)){ 209 case ERROR_CODE_SUCCESS: 210 printf("Pairing complete, success\n"); 211 break; 212 case ERROR_CODE_CONNECTION_TIMEOUT: 213 printf("Pairing failed, timeout\n"); 214 break; 215 case ERROR_CODE_REMOTE_USER_TERMINATED_CONNECTION: 216 printf("Pairing failed, disconnected\n"); 217 break; 218 case ERROR_CODE_AUTHENTICATION_FAILURE: 219 printf("Pairing failed, reason = %u\n", sm_event_pairing_complete_get_reason(packet)); 220 break; 221 default: 222 break; 223 } 224 break; 225 default: 226 break; 227 } 228 break; 229 } 230 } 231 /* LISTING_END */ 232 233 int btstack_main(void); 234 int btstack_main(void) 235 { 236 sm_peripheral_setup(); 237 238 // turn on! 239 hci_power_control(HCI_POWER_ON); 240 241 return 0; 242 } 243 /* EXAMPLE_END */ 244