1 /* 2 * Copyright (C) 2019 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BLUEKITCHEN 24 * GMBH OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 #define BTSTACK_FILE__ "mesh.c" 39 40 #include <string.h> 41 #include <stdio.h> 42 43 #include "mesh/mesh.h" 44 45 #include "btstack_util.h" 46 #include "btstack_config.h" 47 #include "btstack_event.h" 48 #include "btstack_tlv.h" 49 #include "btstack_memory.h" 50 #include "btstack_debug.h" 51 52 #include "mesh/adv_bearer.h" 53 #include "mesh/beacon.h" 54 #include "mesh/gatt_bearer.h" 55 #include "mesh/mesh_access.h" 56 #include "mesh/mesh_configuration_server.h" 57 #include "mesh/mesh_health_server.h" 58 #include "mesh/mesh_foundation.h" 59 #include "mesh/mesh_generic_model.h" 60 #include "mesh/mesh_generic_on_off_server.h" 61 #include "mesh/mesh_iv_index_seq_number.h" 62 #include "mesh/mesh_lower_transport.h" 63 #include "mesh/mesh_peer.h" 64 #include "mesh/mesh_proxy.h" 65 #include "mesh/mesh_upper_transport.h" 66 #include "mesh/mesh_virtual_addresses.h" 67 #include "mesh/pb_adv.h" 68 #include "mesh/pb_gatt.h" 69 #include "mesh/provisioning.h" 70 #include "mesh/provisioning_device.h" 71 #include "mesh/provisioning_provisioner.h" 72 73 static void mesh_node_store_provisioning_data(mesh_provisioning_data_t * provisioning_data); 74 static int mesh_node_startup_from_tlv(void); 75 76 // Persistent storage structures 77 78 typedef struct { 79 uint16_t hash; 80 uint8_t label_uuid[16]; 81 } mesh_persistent_virtual_address_t; 82 83 typedef struct { 84 uint16_t netkey_index; 85 86 uint8_t version; 87 88 // net_key from provisioner or Config Model Client 89 uint8_t net_key[16]; 90 91 // derived data 92 93 // k1 94 uint8_t identity_key[16]; 95 uint8_t beacon_key[16]; 96 97 // k3 98 uint8_t network_id[8]; 99 100 // k2 101 uint8_t nid; 102 uint8_t encryption_key[16]; 103 uint8_t privacy_key[16]; 104 } mesh_persistent_net_key_t; 105 106 typedef struct { 107 uint16_t netkey_index; 108 uint16_t appkey_index; 109 uint8_t aid; 110 uint8_t version; 111 uint8_t key[16]; 112 } mesh_persistent_app_key_t; 113 114 typedef struct { 115 uint8_t gatt_proxy; 116 uint8_t beacon; 117 uint8_t default_ttl; 118 uint8_t network_transmit; 119 uint8_t relay; 120 uint8_t relay_retransmit; 121 uint8_t friend; 122 } mesh_persistent_foundation_t; 123 124 typedef struct { 125 uint16_t publish_address; 126 uint16_t appkey_index; 127 uint8_t friendship_credential_flag; 128 uint8_t publish_period; 129 uint8_t publish_ttl; 130 uint8_t publish_retransmit; 131 } mesh_persistent_publication_t; 132 133 typedef struct { 134 uint32_t iv_index; 135 uint32_t seq_number; 136 } iv_index_and_sequence_number_t; 137 138 static btstack_packet_handler_t provisioning_device_packet_handler; 139 static btstack_packet_callback_registration_t hci_event_callback_registration; 140 static int provisioned; 141 142 // Mandatory Confiuration Server 143 static mesh_model_t mesh_configuration_server_model; 144 static mesh_configuration_server_model_context_t mesh_configuration_server_model_context; 145 146 // Mandatory Health Server 147 static mesh_publication_model_t mesh_health_server_publication; 148 static mesh_model_t mesh_health_server_model; 149 static mesh_health_state_t mesh_health_server_model_context; 150 151 // Random UUID on start 152 static btstack_crypto_random_t mesh_access_crypto_random; 153 static uint8_t random_device_uuid[16]; 154 155 // TLV 156 static const btstack_tlv_t * btstack_tlv_singleton_impl; 157 static void * btstack_tlv_singleton_context; 158 159 // IV Index persistence 160 static uint32_t sequence_number_last_stored; 161 static uint32_t sequence_number_storage_trigger; 162 163 // Attention Timer 164 static uint8_t attention_timer_timeout_s; 165 static btstack_timer_source_t attention_timer_timer; 166 167 // used to log all keys to packet log for log viewer 168 // mesh-appkey-0xxx: 1234567890abcdef1234567890abcdef 169 static void mesh_log_key(const char * prefix, uint16_t id, const uint8_t * key){ 170 char line[60]; 171 strcpy(line, prefix); 172 uint16_t pos = strlen(line); 173 if (id != 0xffff){ 174 line[pos++] = '-'; 175 line[pos++] = '0'; 176 line[pos++] = char_for_nibble((id >> 8) & 0x0f); 177 line[pos++] = char_for_nibble((id >> 4) & 0x0f); 178 line[pos++] = char_for_nibble( id & 0x0f); 179 } 180 line[pos++] = ':'; 181 line[pos++] = ' '; 182 uint16_t i; 183 for (i=0;i<16;i++){ 184 line[pos++] = char_for_nibble((key[i] >> 4) & 0x0f); 185 line[pos++] = char_for_nibble( key[i] & 0x0f); 186 } 187 line[pos++] = 0; 188 hci_dump_log(HCI_DUMP_LOG_LEVEL_INFO, "%s", line); 189 } 190 191 static void mesh_setup_from_provisioning_data(const mesh_provisioning_data_t * provisioning_data){ 192 193 // set iv_index and iv index update active 194 int iv_index_update_active = (provisioning_data->flags & 2) >> 1; 195 mesh_iv_index_recovered(iv_index_update_active, provisioning_data->iv_index); 196 197 // set unicast address 198 mesh_node_primary_element_address_set(provisioning_data->unicast_address); 199 200 // set device_key 201 mesh_transport_set_device_key(provisioning_data->device_key); 202 203 if (provisioning_data->network_key){ 204 205 // setup primary network with provisioned netkey 206 mesh_network_key_add(provisioning_data->network_key); 207 208 // setup primary network 209 mesh_subnet_setup_for_netkey_index(provisioning_data->network_key->netkey_index); 210 211 // start sending Secure Network Beacons 212 mesh_subnet_t * provisioned_subnet = mesh_subnet_get_by_netkey_index(provisioning_data->network_key->netkey_index); 213 beacon_secure_network_start(provisioned_subnet); 214 } 215 216 // Mesh Proxy 217 #ifdef ENABLE_MESH_PROXY_SERVER 218 // Setup Proxy 219 mesh_proxy_init(provisioning_data->unicast_address); 220 mesh_proxy_start_advertising_with_network_id(); 221 #endif 222 } 223 224 // Attention Timer state 225 static void mesh_emit_attention_timer_event(uint8_t timer_s){ 226 if (!provisioning_device_packet_handler) return; 227 uint8_t event[4] = { HCI_EVENT_MESH_META, 4, MESH_SUBEVENT_ATTENTION_TIMER}; 228 event[3] = timer_s; 229 provisioning_device_packet_handler(HCI_EVENT_PACKET, 0, event, sizeof(event)); 230 } 231 232 static void mesh_attention_timer_handler(btstack_timer_source_t * ts){ 233 UNUSED(ts); 234 attention_timer_timeout_s--; 235 mesh_emit_attention_timer_event(attention_timer_timeout_s); 236 if (attention_timer_timeout_s == 0) return; 237 238 btstack_run_loop_set_timer(&attention_timer_timer, 1000); 239 btstack_run_loop_add_timer(&attention_timer_timer); 240 } 241 242 void mesh_attention_timer_set(uint8_t timer_s){ 243 // stop old timer if running 244 if (attention_timer_timeout_s){ 245 btstack_run_loop_remove_timer(&attention_timer_timer); 246 } 247 248 attention_timer_timeout_s = timer_s; 249 mesh_emit_attention_timer_event(attention_timer_timeout_s); 250 251 if (attention_timer_timeout_s){ 252 btstack_run_loop_set_timer_handler(&attention_timer_timer, &mesh_attention_timer_handler); 253 btstack_run_loop_set_timer(&attention_timer_timer, 1000); 254 btstack_run_loop_add_timer(&attention_timer_timer); 255 } 256 } 257 258 uint8_t mesh_attention_timer_get(void){ 259 return attention_timer_timeout_s; 260 } 261 262 static void mesh_provisioning_message_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 263 mesh_provisioning_data_t provisioning_data; 264 switch(packet[0]){ 265 case HCI_EVENT_MESH_META: 266 switch(packet[2]){ 267 case MESH_SUBEVENT_PB_PROV_ATTENTION_TIMER: 268 mesh_attention_timer_set(mesh_subevent_pb_prov_attention_timer_get_attention_time(packet)); 269 break; 270 case MESH_SUBEVENT_PB_PROV_COMPLETE: 271 // get provisioning data 272 provisioning_device_data_get(&provisioning_data); 273 274 // and store in TLV 275 mesh_node_store_provisioning_data(&provisioning_data); 276 277 // setup node after provisioned 278 mesh_setup_from_provisioning_data(&provisioning_data); 279 280 #ifdef ENABLE_MESH_PROXY_SERVER 281 // start advertising with node id after provisioning 282 mesh_proxy_set_advertising_with_node_id(provisioning_data.network_key->netkey_index, MESH_NODE_IDENTITY_STATE_ADVERTISING_RUNNING); 283 #endif 284 285 provisioned = 1; 286 break; 287 default: 288 break; 289 } 290 break; 291 default: 292 break; 293 } 294 if (provisioning_device_packet_handler == NULL) return; 295 296 // forward 297 (*provisioning_device_packet_handler)(packet_type, channel, packet, size); 298 } 299 300 static void hci_packet_handler (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 301 UNUSED(channel); 302 UNUSED(size); 303 304 if (packet_type != HCI_EVENT_PACKET) return; 305 306 switch (hci_event_packet_get_type(packet)) { 307 case BTSTACK_EVENT_STATE: 308 if (btstack_event_state_get_state(packet) != HCI_STATE_WORKING) break; 309 // get TLV instance 310 btstack_tlv_get_instance(&btstack_tlv_singleton_impl, &btstack_tlv_singleton_context); 311 312 // startup from static provisioning data stored in TLV 313 provisioned = mesh_node_startup_from_tlv(); 314 break; 315 316 #ifdef ENABLE_MESH_PROXY_SERVER 317 case HCI_EVENT_DISCONNECTION_COMPLETE: 318 // enable PB_GATT 319 if (provisioned == 0){ 320 mesh_proxy_start_advertising_unprovisioned_device(); 321 } else { 322 mesh_proxy_start_advertising_with_network_id(); 323 } 324 break; 325 326 case HCI_EVENT_LE_META: 327 if (hci_event_le_meta_get_subevent_code(packet) != HCI_SUBEVENT_LE_CONNECTION_COMPLETE) break; 328 // disable PB_GATT 329 mesh_proxy_stop_advertising_unprovisioned_device(); 330 break; 331 #endif 332 default: 333 break; 334 } 335 } 336 337 static void report_store_error(int result, const char * type){ 338 if (result != 0){ 339 log_error("Store %s data failed", type); 340 } 341 } 342 343 // Foundation state 344 static const uint32_t mesh_foundation_state_tag = ((uint32_t) 'M' << 24) | ((uint32_t) 'F' << 16) | ((uint32_t) 'N' << 8) | ((uint32_t) 'D' << 8); 345 346 void mesh_foundation_state_load(void){ 347 mesh_persistent_foundation_t data; 348 349 int foundation_state_len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, mesh_foundation_state_tag, (uint8_t *) &data, sizeof(data)); 350 if (foundation_state_len != sizeof(data)) return; 351 352 mesh_foundation_gatt_proxy_set(data.gatt_proxy); 353 mesh_foundation_beacon_set(data.beacon); 354 mesh_foundation_default_ttl_set(data.default_ttl); 355 mesh_foundation_friend_set(data.friend); 356 mesh_foundation_network_transmit_set(data.network_transmit); 357 mesh_foundation_relay_set(data.relay); 358 mesh_foundation_relay_retransmit_set(data.relay_retransmit); 359 } 360 361 void mesh_foundation_state_store(void){ 362 mesh_persistent_foundation_t data; 363 data.gatt_proxy = mesh_foundation_gatt_proxy_get(); 364 data.beacon = mesh_foundation_beacon_get(); 365 data.default_ttl = mesh_foundation_default_ttl_get(); 366 data.friend = mesh_foundation_friend_get(); 367 data.network_transmit = mesh_foundation_network_transmit_get(); 368 data.relay = mesh_foundation_relay_get(); 369 data.relay_retransmit = mesh_foundation_relay_retransmit_get(); 370 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, mesh_foundation_state_tag, (uint8_t *) &data, sizeof(data)); 371 report_store_error(result, "foundation"); 372 } 373 374 // Mesh Virtual Address Management 375 static uint32_t mesh_virtual_address_tag_for_pseudo_dst(uint16_t pseudo_dst){ 376 return ((uint32_t) 'M' << 24) | ((uint32_t) 'V' << 16) | ((uint32_t) pseudo_dst); 377 } 378 379 static void mesh_store_virtual_address(uint16_t pseudo_dest, uint16_t hash, const uint8_t * label_uuid){ 380 mesh_persistent_virtual_address_t data; 381 uint32_t tag = mesh_virtual_address_tag_for_pseudo_dst(pseudo_dest); 382 data.hash = hash; 383 (void)memcpy(data.label_uuid, label_uuid, 16); 384 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(data)); 385 report_store_error(result, "virtual address"); 386 } 387 388 static void mesh_delete_virtual_address(uint16_t pseudo_dest){ 389 uint32_t tag = mesh_virtual_address_tag_for_pseudo_dst(pseudo_dest); 390 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 391 } 392 393 void mesh_load_virtual_addresses(void){ 394 uint16_t pseudo_dst; 395 for (pseudo_dst = 0x8000; pseudo_dst < (0x8000 + MAX_NR_MESH_VIRTUAL_ADDRESSES); pseudo_dst++){ 396 mesh_virtual_address_tag_for_pseudo_dst(pseudo_dst); 397 mesh_persistent_virtual_address_t data; 398 uint32_t tag = mesh_virtual_address_tag_for_pseudo_dst(pseudo_dst); 399 int virtual_address_len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(data)); 400 if (virtual_address_len == 0) continue; 401 402 mesh_virtual_address_t * virtual_address = btstack_memory_mesh_virtual_address_get(); 403 if (virtual_address == NULL) return; 404 405 virtual_address->pseudo_dst = pseudo_dst; 406 virtual_address->hash = data.hash; 407 (void)memcpy(virtual_address->label_uuid, data.label_uuid, 16); 408 mesh_virtual_address_add(virtual_address); 409 } 410 } 411 412 void mesh_delete_virtual_addresses(void){ 413 uint16_t pseudo_dest; 414 for (pseudo_dest = 0x8000; pseudo_dest < (0x8000 + MAX_NR_MESH_VIRTUAL_ADDRESSES); pseudo_dest++){ 415 mesh_delete_virtual_address(pseudo_dest); 416 } 417 } 418 419 void mesh_virtual_address_decrease_refcount(mesh_virtual_address_t * virtual_address){ 420 if (virtual_address == NULL){ 421 log_error("virtual_address == NULL"); 422 } 423 // decrease refcount 424 virtual_address->ref_count--; 425 // Free virtual address if ref count reaches zero 426 if (virtual_address->ref_count > 0) return; 427 // delete from TLV 428 mesh_delete_virtual_address(virtual_address->pseudo_dst); 429 // remove from list 430 mesh_virtual_address_remove(virtual_address); 431 // free memory 432 btstack_memory_mesh_virtual_address_free(virtual_address); 433 } 434 435 void mesh_virtual_address_increase_refcount(mesh_virtual_address_t * virtual_address){ 436 if (virtual_address == NULL){ 437 log_error("virtual_address == NULL"); 438 } 439 virtual_address->ref_count++; 440 if (virtual_address->ref_count > 1) return; 441 // store in TLV 442 mesh_store_virtual_address(virtual_address->pseudo_dst, virtual_address->hash, virtual_address->label_uuid); 443 } 444 445 // Mesh Subscriptions 446 static uint32_t mesh_model_subscription_tag_for_index(uint16_t internal_model_id){ 447 return ((uint32_t) 'M' << 24) | ((uint32_t) 'S' << 16) | ((uint32_t) internal_model_id); 448 } 449 450 static void mesh_model_load_subscriptions(mesh_model_t * mesh_model){ 451 uint32_t tag = mesh_model_subscription_tag_for_index(mesh_model->mid); 452 btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &mesh_model->subscriptions, sizeof(mesh_model->subscriptions)); 453 // update ref count 454 455 // increase ref counts for virtual subscriptions 456 uint16_t i; 457 for (i = 0; i<MAX_NR_MESH_SUBSCRIPTION_PER_MODEL ; i++){ 458 uint16_t src = mesh_model->subscriptions[i]; 459 if (mesh_network_address_virtual(src)){ 460 mesh_virtual_address_t * virtual_address = mesh_virtual_address_for_pseudo_dst(src); 461 mesh_virtual_address_increase_refcount(virtual_address); 462 } 463 } 464 } 465 466 void mesh_model_store_subscriptions(mesh_model_t * model){ 467 uint32_t tag = mesh_model_subscription_tag_for_index(model->mid); 468 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &model->subscriptions, sizeof(model->subscriptions)); 469 report_store_error(result, "subscription"); 470 } 471 472 static void mesh_model_delete_subscriptions(mesh_model_t * model){ 473 uint32_t tag = mesh_model_subscription_tag_for_index(model->mid); 474 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 475 } 476 477 void mesh_load_subscriptions(void){ 478 printf("Load Model Subscription Lists\n"); 479 // iterate over elements and models 480 mesh_element_iterator_t element_it; 481 mesh_element_iterator_init(&element_it); 482 while (mesh_element_iterator_has_next(&element_it)){ 483 mesh_element_t * element = mesh_element_iterator_next(&element_it); 484 mesh_model_iterator_t model_it; 485 mesh_model_iterator_init(&model_it, element); 486 while (mesh_model_iterator_has_next(&model_it)){ 487 mesh_model_t * model = mesh_model_iterator_next(&model_it); 488 mesh_model_load_subscriptions(model); 489 } 490 } 491 } 492 493 void mesh_delete_subscriptions(void){ 494 printf("Delete Model Subscription Lists\n"); 495 // iterate over elements and models 496 mesh_element_iterator_t element_it; 497 mesh_element_iterator_init(&element_it); 498 while (mesh_element_iterator_has_next(&element_it)){ 499 mesh_element_t * element = mesh_element_iterator_next(&element_it); 500 mesh_model_iterator_t model_it; 501 mesh_model_iterator_init(&model_it, element); 502 while (mesh_model_iterator_has_next(&model_it)){ 503 mesh_model_t * model = mesh_model_iterator_next(&model_it); 504 mesh_model_delete_subscriptions(model); 505 } 506 } 507 } 508 509 // Model Publication 510 511 static uint32_t mesh_model_publication_tag_for_index(uint16_t internal_model_id){ 512 return ((uint32_t) 'M' << 24) | ((uint32_t) 'P' << 16) | ((uint32_t) internal_model_id); 513 } 514 515 static void mesh_model_load_publication(mesh_model_t * mesh_model){ 516 mesh_publication_model_t * publication = mesh_model->publication_model; 517 if (publication == NULL) return; 518 519 mesh_persistent_publication_t data; 520 uint32_t tag = mesh_model_publication_tag_for_index(mesh_model->mid); 521 btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(mesh_persistent_publication_t)); 522 523 publication->address = data.publish_address; 524 publication->appkey_index = data.appkey_index; 525 publication->friendship_credential_flag = data.friendship_credential_flag; 526 publication->ttl = data.publish_ttl; 527 publication->period = data.publish_period; 528 publication->retransmit = data.publish_retransmit; 529 530 // increase ref counts for current virtual publicataion address 531 uint16_t src = publication->address; 532 if (mesh_network_address_virtual(src)){ 533 mesh_virtual_address_t * virtual_address = mesh_virtual_address_for_pseudo_dst(src); 534 if (virtual_address){ 535 mesh_virtual_address_increase_refcount(virtual_address); 536 } 537 } 538 539 mesh_model_publication_start(mesh_model); 540 } 541 542 void mesh_model_store_publication(mesh_model_t * mesh_model){ 543 mesh_publication_model_t * publication = mesh_model->publication_model; 544 if (publication == NULL) return; 545 546 mesh_persistent_publication_t data; 547 data.publish_address = publication->address; 548 data.appkey_index = publication->appkey_index; 549 data.friendship_credential_flag = publication->friendship_credential_flag; 550 data.publish_ttl = publication->ttl; 551 data.publish_period = publication->period; 552 data.publish_retransmit = publication->retransmit; 553 uint32_t tag = mesh_model_publication_tag_for_index(mesh_model->mid); 554 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(mesh_persistent_publication_t)); 555 report_store_error(result, "publication"); 556 } 557 558 static void mesh_model_delete_publication(mesh_model_t * mesh_model){ 559 if (mesh_model->publication_model == NULL) return; 560 uint32_t tag = mesh_model_publication_tag_for_index(mesh_model->mid); 561 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 562 } 563 564 void mesh_load_publications(void){ 565 printf("Load Model Publications\n"); 566 // iterate over elements and models 567 mesh_element_iterator_t element_it; 568 mesh_element_iterator_init(&element_it); 569 while (mesh_element_iterator_has_next(&element_it)){ 570 mesh_element_t * element = mesh_element_iterator_next(&element_it); 571 mesh_model_iterator_t model_it; 572 mesh_model_iterator_init(&model_it, element); 573 while (mesh_model_iterator_has_next(&model_it)){ 574 mesh_model_t * model = mesh_model_iterator_next(&model_it); 575 mesh_model_load_publication(model); 576 } 577 } 578 } 579 580 void mesh_delete_publications(void){ 581 printf("Delete Model Publications\n"); 582 // iterate over elements and models 583 mesh_element_iterator_t element_it; 584 mesh_element_iterator_init(&element_it); 585 while (mesh_element_iterator_has_next(&element_it)){ 586 mesh_element_t * element = mesh_element_iterator_next(&element_it); 587 mesh_model_iterator_t model_it; 588 mesh_model_iterator_init(&model_it, element); 589 while (mesh_model_iterator_has_next(&model_it)){ 590 mesh_model_t * model = mesh_model_iterator_next(&model_it); 591 mesh_model_delete_publication(model); 592 } 593 } 594 } 595 596 // Mesh Network Keys 597 static uint32_t mesh_network_key_tag_for_internal_index(uint16_t internal_index){ 598 return ((uint32_t) 'M' << 24) | ((uint32_t) 'N' << 16) | ((uint32_t) internal_index); 599 } 600 601 void mesh_store_network_key(mesh_network_key_t * network_key){ 602 mesh_persistent_net_key_t data; 603 printf("Store NetKey: internal index 0x%x, NetKey Index 0x%06x, NID %02x: ", network_key->internal_index, network_key->netkey_index, network_key->nid); 604 printf_hexdump(network_key->net_key, 16); 605 uint32_t tag = mesh_network_key_tag_for_internal_index(network_key->internal_index); 606 data.netkey_index = network_key->netkey_index; 607 (void)memcpy(data.net_key, network_key->net_key, 16); 608 (void)memcpy(data.identity_key, network_key->identity_key, 16); 609 (void)memcpy(data.beacon_key, network_key->beacon_key, 16); 610 (void)memcpy(data.network_id, network_key->network_id, 8); 611 data.nid = network_key->nid; 612 data.version = network_key->version; 613 (void)memcpy(data.encryption_key, network_key->encryption_key, 16); 614 (void)memcpy(data.privacy_key, network_key->privacy_key, 16); 615 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(mesh_persistent_net_key_t)); 616 report_store_error(result, "network key"); 617 } 618 619 void mesh_delete_network_key(uint16_t internal_index){ 620 uint32_t tag = mesh_network_key_tag_for_internal_index(internal_index); 621 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 622 } 623 624 void mesh_load_network_keys(void){ 625 printf("Load Network Keys\n"); 626 uint16_t internal_index; 627 for (internal_index = 0; internal_index < MAX_NR_MESH_NETWORK_KEYS; internal_index++){ 628 mesh_persistent_net_key_t data; 629 uint32_t tag = mesh_network_key_tag_for_internal_index(internal_index); 630 int netkey_len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(data)); 631 if (netkey_len != sizeof(mesh_persistent_net_key_t)) continue; 632 633 mesh_network_key_t * network_key = btstack_memory_mesh_network_key_get(); 634 if (network_key == NULL) return; 635 636 network_key->internal_index = internal_index; 637 network_key->netkey_index = data.netkey_index; 638 (void)memcpy(network_key->net_key, data.net_key, 16); 639 (void)memcpy(network_key->identity_key, data.identity_key, 16); 640 (void)memcpy(network_key->beacon_key, data.beacon_key, 16); 641 (void)memcpy(network_key->network_id, data.network_id, 8); 642 network_key->nid = data.nid; 643 network_key->version = data.version; 644 (void)memcpy(network_key->encryption_key, data.encryption_key, 16); 645 (void)memcpy(network_key->privacy_key, data.privacy_key, 16); 646 647 #ifdef ENABLE_GATT_BEARER 648 // setup advertisement with network id 649 network_key->advertisement_with_network_id.adv_length = mesh_proxy_setup_advertising_with_network_id(network_key->advertisement_with_network_id.adv_data, network_key->network_id); 650 #endif 651 652 mesh_network_key_add(network_key); 653 654 mesh_subnet_setup_for_netkey_index(network_key->netkey_index); 655 656 printf("- internal index 0x%x, NetKey Index 0x%06x, NID %02x: ", network_key->internal_index, network_key->netkey_index, network_key->nid); 657 printf_hexdump(network_key->net_key, 16); 658 659 // dump into packet log 660 mesh_log_key("mesh-netkey", network_key->netkey_index, network_key->net_key); 661 } 662 } 663 664 void mesh_delete_network_keys(void){ 665 printf("Delete Network Keys\n"); 666 667 uint16_t internal_index; 668 for (internal_index = 0; internal_index < MAX_NR_MESH_NETWORK_KEYS; internal_index++){ 669 mesh_delete_network_key(internal_index); 670 } 671 } 672 673 // Mesh App Keys 674 675 static uint32_t mesh_transport_key_tag_for_internal_index(uint16_t internal_index){ 676 return ((uint32_t) 'M' << 24) | ((uint32_t) 'A' << 16) | ((uint32_t) internal_index); 677 } 678 679 void mesh_store_app_key(mesh_transport_key_t * app_key){ 680 mesh_persistent_app_key_t data; 681 printf("Store AppKey: internal index 0x%x, AppKey Index 0x%06x, AID %02x: ", app_key->internal_index, app_key->appkey_index, app_key->aid); 682 printf_hexdump(app_key->key, 16); 683 uint32_t tag = mesh_transport_key_tag_for_internal_index(app_key->internal_index); 684 data.netkey_index = app_key->netkey_index; 685 data.appkey_index = app_key->appkey_index; 686 data.aid = app_key->aid; 687 data.version = app_key->version; 688 (void)memcpy(data.key, app_key->key, 16); 689 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(data)); 690 report_store_error(result, "app key"); 691 } 692 693 void mesh_delete_app_key(uint16_t internal_index){ 694 uint32_t tag = mesh_transport_key_tag_for_internal_index(internal_index); 695 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 696 } 697 698 void mesh_load_app_keys(void){ 699 printf("Load App Keys\n"); 700 uint16_t internal_index; 701 for (internal_index = 0; internal_index < MAX_NR_MESH_TRANSPORT_KEYS; internal_index++){ 702 mesh_persistent_app_key_t data; 703 uint32_t tag = mesh_transport_key_tag_for_internal_index(internal_index); 704 int app_key_len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &data, sizeof(data)); 705 if (app_key_len == 0) continue; 706 707 mesh_transport_key_t * key = btstack_memory_mesh_transport_key_get(); 708 if (key == NULL) return; 709 710 key->internal_index = internal_index; 711 key->appkey_index = data.appkey_index; 712 key->netkey_index = data.netkey_index; 713 key->aid = data.aid; 714 key->akf = 1; 715 key->version = data.version; 716 (void)memcpy(key->key, data.key, 16); 717 mesh_transport_key_add(key); 718 printf("- internal index 0x%x, AppKey Index 0x%06x, AID %02x: ", key->internal_index, key->appkey_index, key->aid); 719 printf_hexdump(key->key, 16); 720 721 // dump into packet log 722 mesh_log_key("mesh-appkey", key->appkey_index, key->key); 723 } 724 } 725 726 void mesh_delete_app_keys(void){ 727 printf("Delete App Keys\n"); 728 729 uint16_t internal_index; 730 for (internal_index = 0; internal_index < MAX_NR_MESH_TRANSPORT_KEYS; internal_index++){ 731 mesh_delete_app_key(internal_index); 732 } 733 } 734 735 736 // Model to Appkey List 737 738 static uint32_t mesh_model_tag_for_index(uint16_t internal_model_id){ 739 return ((uint32_t) 'M' << 24) | ((uint32_t) 'B' << 16) | ((uint32_t) internal_model_id); 740 } 741 742 static void mesh_load_appkey_list(mesh_model_t * model){ 743 uint32_t tag = mesh_model_tag_for_index(model->mid); 744 btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &model->appkey_indices, sizeof(model->appkey_indices)); 745 } 746 747 static void mesh_store_appkey_list(mesh_model_t * model){ 748 uint32_t tag = mesh_model_tag_for_index(model->mid); 749 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, tag, (uint8_t *) &model->appkey_indices, sizeof(model->appkey_indices)); 750 report_store_error(result, "appkey list"); 751 } 752 753 static void mesh_delete_appkey_list(mesh_model_t * model){ 754 uint32_t tag = mesh_model_tag_for_index(model->mid); 755 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, tag); 756 } 757 758 void mesh_load_appkey_lists(void){ 759 printf("Load Appkey Lists\n"); 760 // iterate over elements and models 761 mesh_element_iterator_t element_it; 762 mesh_element_iterator_init(&element_it); 763 while (mesh_element_iterator_has_next(&element_it)){ 764 mesh_element_t * element = mesh_element_iterator_next(&element_it); 765 mesh_model_iterator_t model_it; 766 mesh_model_iterator_init(&model_it, element); 767 while (mesh_model_iterator_has_next(&model_it)){ 768 mesh_model_t * model = mesh_model_iterator_next(&model_it); 769 mesh_load_appkey_list(model); 770 } 771 } 772 } 773 774 void mesh_delete_appkey_lists(void){ 775 printf("Delete Appkey Lists\n"); 776 // iterate over elements and models 777 mesh_element_iterator_t element_it; 778 mesh_element_iterator_init(&element_it); 779 while (mesh_element_iterator_has_next(&element_it)){ 780 mesh_element_t * element = mesh_element_iterator_next(&element_it); 781 mesh_model_iterator_t model_it; 782 mesh_model_iterator_init(&model_it, element); 783 while (mesh_model_iterator_has_next(&model_it)){ 784 mesh_model_t * model = mesh_model_iterator_next(&model_it); 785 mesh_delete_appkey_list(model); 786 } 787 } 788 } 789 790 uint8_t mesh_model_bind_appkey(mesh_model_t * mesh_model, uint16_t appkey_index){ 791 uint16_t i; 792 for (i=0;i<MAX_NR_MESH_APPKEYS_PER_MODEL;i++){ 793 if (mesh_model->appkey_indices[i] == appkey_index) return MESH_FOUNDATION_STATUS_SUCCESS; 794 } 795 for (i=0;i<MAX_NR_MESH_APPKEYS_PER_MODEL;i++){ 796 if (mesh_model->appkey_indices[i] == MESH_APPKEY_INVALID) { 797 mesh_model->appkey_indices[i] = appkey_index; 798 mesh_store_appkey_list(mesh_model); 799 return MESH_FOUNDATION_STATUS_SUCCESS; 800 } 801 } 802 return MESH_FOUNDATION_STATUS_INSUFFICIENT_RESOURCES; 803 } 804 805 void mesh_model_unbind_appkey(mesh_model_t * mesh_model, uint16_t appkey_index){ 806 uint16_t i; 807 for (i=0;i<MAX_NR_MESH_APPKEYS_PER_MODEL;i++){ 808 if (mesh_model->appkey_indices[i] == appkey_index) { 809 mesh_model->appkey_indices[i] = MESH_APPKEY_INVALID; 810 mesh_store_appkey_list(mesh_model); 811 } 812 } 813 } 814 815 int mesh_model_contains_appkey(mesh_model_t * mesh_model, uint16_t appkey_index){ 816 uint16_t i; 817 for (i=0;i<MAX_NR_MESH_APPKEYS_PER_MODEL;i++){ 818 if (mesh_model->appkey_indices[i] == appkey_index) return 1; 819 } 820 return 0; 821 } 822 823 void mesh_access_netkey_finalize(mesh_network_key_t * network_key){ 824 mesh_network_key_remove(network_key); 825 mesh_delete_network_key(network_key->internal_index); 826 btstack_memory_mesh_network_key_free(network_key); 827 } 828 829 void mesh_access_appkey_finalize(mesh_transport_key_t * transport_key){ 830 mesh_transport_key_remove(transport_key); 831 mesh_delete_app_key(transport_key->appkey_index); 832 btstack_memory_mesh_transport_key_free(transport_key); 833 } 834 835 void mesh_access_key_refresh_revoke_keys(mesh_subnet_t * subnet){ 836 // delete old netkey index 837 mesh_access_netkey_finalize(subnet->old_key); 838 subnet->old_key = subnet->new_key; 839 subnet->new_key = NULL; 840 841 // delete old appkeys, if any 842 mesh_transport_key_iterator_t it; 843 mesh_transport_key_iterator_init(&it, subnet->netkey_index); 844 while (mesh_transport_key_iterator_has_more(&it)){ 845 mesh_transport_key_t * transport_key = mesh_transport_key_iterator_get_next(&it); 846 if (transport_key->old_key == 0) continue; 847 mesh_access_appkey_finalize(transport_key); 848 } 849 } 850 851 // Mesh IV Index 852 static const uint32_t mesh_tag_for_iv_index_and_seq_number = ((uint32_t) 'M' << 24) | ((uint32_t) 'F' << 16) | ((uint32_t) 'I' << 9) | ((uint32_t) 'S'); 853 854 static int mesh_load_iv_index_and_sequence_number(uint32_t * iv_index, uint32_t * sequence_number){ 855 iv_index_and_sequence_number_t data; 856 uint32_t len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, mesh_tag_for_iv_index_and_seq_number, (uint8_t *) &data, sizeof(data)); 857 if (len == sizeof(iv_index_and_sequence_number_t)){ 858 *iv_index = data.iv_index; 859 *sequence_number = data.seq_number; 860 return 1; 861 } 862 return 0; 863 } 864 865 static void mesh_store_iv_index_and_sequence_number(uint32_t iv_index, uint32_t sequence_number){ 866 iv_index_and_sequence_number_t data; 867 data.iv_index = iv_index; 868 data.seq_number = sequence_number; 869 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, mesh_tag_for_iv_index_and_seq_number, (uint8_t *) &data, sizeof(data)); 870 report_store_error(result, "index and sequence number"); 871 872 sequence_number_last_stored = data.seq_number; 873 sequence_number_storage_trigger = sequence_number_last_stored + MESH_SEQUENCE_NUMBER_STORAGE_INTERVAL; 874 } 875 876 static void mesh_persist_iv_index_and_sequence_number(void){ 877 mesh_store_iv_index_and_sequence_number(mesh_get_iv_index(), mesh_sequence_number_peek()); 878 } 879 880 881 // higher layer - only store if sequence number is higher than trigger 882 static void mesh_persist_iv_index_and_sequence_number_if_needed(void){ 883 if (mesh_sequence_number_peek() >= sequence_number_storage_trigger){ 884 mesh_persist_iv_index_and_sequence_number(); 885 } 886 } 887 888 static void mesh_access_secure_network_beacon_handler(uint8_t packet_type, uint16_t channel, uint8_t * packet, uint16_t size){ 889 UNUSED(channel); 890 UNUSED(size); 891 892 if (packet_type != MESH_BEACON_PACKET) return; 893 894 // lookup subnet and netkey by network id 895 uint8_t * beacon_network_id = &packet[2]; 896 mesh_subnet_iterator_t it; 897 mesh_subnet_iterator_init(&it); 898 mesh_subnet_t * subnet = NULL; 899 uint8_t new_key = 0; 900 while (mesh_subnet_iterator_has_more(&it)){ 901 mesh_subnet_t * item = mesh_subnet_iterator_get_next(&it); 902 if (memcmp(item->old_key->network_id, beacon_network_id, 8) == 0 ) { 903 subnet = item; 904 } 905 if (item->new_key != NULL && memcmp(item->new_key->network_id, beacon_network_id, 8) == 0 ) { 906 subnet = item; 907 new_key = 1; 908 } 909 break; 910 } 911 if (subnet == NULL) return; 912 913 uint8_t flags = packet[1]; 914 915 // Key refresh via secure network beacons that are authenticated with new netkey 916 if (new_key){ 917 // either first or second phase (in phase 0, new key is not set) 918 int key_refresh_flag = flags & 1; 919 if (key_refresh_flag){ 920 // transition to phase 3 from either phase 1 or 2 921 switch (subnet->key_refresh){ 922 case MESH_KEY_REFRESH_FIRST_PHASE: 923 case MESH_KEY_REFRESH_SECOND_PHASE: 924 mesh_access_key_refresh_revoke_keys(subnet); 925 subnet->key_refresh = MESH_KEY_REFRESH_NOT_ACTIVE; 926 break; 927 default: 928 break; 929 } 930 } else { 931 // transition to phase 2 from either phase 1 932 switch (subnet->key_refresh){ 933 case MESH_KEY_REFRESH_FIRST_PHASE: 934 // -- update state 935 subnet->key_refresh = MESH_KEY_REFRESH_SECOND_PHASE; 936 break; 937 default: 938 break; 939 } 940 } 941 } 942 943 // IV Update 944 945 int beacon_iv_update_active = flags & 2; 946 int local_iv_update_active = mesh_iv_update_active(); 947 uint32_t beacon_iv_index = big_endian_read_32(packet, 10); 948 uint32_t local_iv_index = mesh_get_iv_index(); 949 950 int32_t iv_index_delta = (int32_t)(beacon_iv_index - local_iv_index); 951 952 // "If a node in Normal Operation receives a Secure Network beacon with an IV index less than the last known IV Index or greater than 953 // the last known IV Index + 42, the Secure Network beacon shall be ignored." 954 if (iv_index_delta < 0 || iv_index_delta > 42){ 955 return; 956 } 957 958 // "If a node in Normal Operation receives a Secure Network beacon with an IV index equal to the last known IV index+1 and 959 // the IV Update Flag set to 0, the node may update its IV without going to the IV Update in Progress state, or it may initiate 960 // an IV Index Recovery procedure (Section 3.10.6), or it may ignore the Secure Network beacon. The node makes the choice depending 961 // on the time since last IV update and the likelihood that the node has missed the Secure Network beacons with the IV update Flag set to 1."" 962 if (local_iv_update_active == 0 && beacon_iv_update_active == 0 && iv_index_delta == 1){ 963 // instant iv update 964 mesh_set_iv_index( beacon_iv_index ); 965 // store updated iv index 966 mesh_persist_iv_index_and_sequence_number(); 967 return; 968 } 969 970 // "If this node is a member of a primary subnet and receives a Secure Network beacon on a secondary subnet with an IV Index greater than 971 // the last known IV Index of the primary subnet, the Secure Network beacon shall be ignored." 972 int member_of_primary_subnet = mesh_subnet_get_by_netkey_index(0) != NULL; 973 int beacon_on_secondary_subnet = subnet->netkey_index != 0; 974 if (member_of_primary_subnet && beacon_on_secondary_subnet && iv_index_delta > 0){ 975 return; 976 } 977 978 // "If a node in Normal Operation receives a Secure Network beacon with an IV index greater than the last known IV Index + 1..." 979 // "... it may initiate an IV Index Recovery procedure, see Section 3.10.6." 980 if (local_iv_update_active == 0 && iv_index_delta > 1){ 981 // "Upon receiving and successfully authenticating a Secure Network beacon for a primary subnet... " 982 int beacon_on_primary_subnet = subnet->netkey_index == 0; 983 if (!beacon_on_primary_subnet) return; 984 // "... whose IV Index is 1 or more higher than the current known IV Index, the node shall " 985 // " set its current IV Index and its current IV Update procedure state from the values in this Secure Network beacon." 986 mesh_iv_index_recovered(beacon_iv_update_active, beacon_iv_index); 987 // store updated iv index if in normal mode 988 if (beacon_iv_update_active == 0){ 989 mesh_persist_iv_index_and_sequence_number(); 990 } 991 return; 992 } 993 994 if (local_iv_update_active == 0){ 995 if (beacon_iv_update_active){ 996 mesh_trigger_iv_update(); 997 } 998 } else { 999 if (beacon_iv_update_active == 0){ 1000 // " At the point of transition, the node shall reset the sequence number to 0x000000." 1001 mesh_sequence_number_set(0); 1002 mesh_iv_update_completed(); 1003 // store updated iv index 1004 mesh_persist_iv_index_and_sequence_number(); 1005 } 1006 } 1007 } 1008 1009 static const uint32_t mesh_tag_for_prov_data = ((uint32_t) 'P' << 24) | ((uint32_t) 'R' << 16) | ((uint32_t) 'O' << 8) | (uint32_t)'V'; 1010 1011 typedef struct { 1012 uint16_t unicast_address; 1013 uint8_t flags; 1014 uint8_t device_key[16]; 1015 1016 } mesh_persistent_provisioning_data_t; 1017 1018 static void mesh_node_store_provisioning_data(mesh_provisioning_data_t * provisioning_data){ 1019 1020 // fill persistent prov data 1021 mesh_persistent_provisioning_data_t persistent_provisioning_data; 1022 1023 persistent_provisioning_data.unicast_address = provisioning_data->unicast_address; 1024 persistent_provisioning_data.flags = provisioning_data->flags; 1025 (void)memcpy(persistent_provisioning_data.device_key, 1026 provisioning_data->device_key, 16); 1027 1028 // store in tlv 1029 btstack_tlv_get_instance(&btstack_tlv_singleton_impl, &btstack_tlv_singleton_context); 1030 int result = btstack_tlv_singleton_impl->store_tag(btstack_tlv_singleton_context, mesh_tag_for_prov_data, (uint8_t *) &persistent_provisioning_data, sizeof(mesh_persistent_provisioning_data_t)); 1031 report_store_error(result, "provisioning"); 1032 1033 // store IV Index and sequence number 1034 mesh_store_iv_index_and_sequence_number(provisioning_data->iv_index, 0); 1035 1036 // store primary network key 1037 mesh_store_network_key(provisioning_data->network_key); 1038 } 1039 1040 static void mesh_access_setup_unprovisioned_device(const uint8_t * device_uuid){ 1041 #ifdef ENABLE_MESH_PB_ADV 1042 // PB-ADV 1043 beacon_unprovisioned_device_start(device_uuid, 0); 1044 #else 1045 UNUSED(device_uuid);; 1046 #endif 1047 #ifdef ENABLE_MESH_PB_GATT 1048 mesh_proxy_start_advertising_unprovisioned_device(); 1049 #endif 1050 } 1051 1052 static void mesh_access_setup_without_provisiong_data_random(void * arg){ 1053 UNUSED(arg); 1054 // set random value 1055 mesh_node_set_device_uuid(random_device_uuid); 1056 mesh_access_setup_unprovisioned_device(random_device_uuid); 1057 } 1058 1059 void mesh_node_reset(void){ 1060 // PROV 1061 btstack_tlv_singleton_impl->delete_tag(btstack_tlv_singleton_context, mesh_tag_for_prov_data); 1062 // everything else 1063 mesh_delete_network_keys(); 1064 mesh_delete_app_keys(); 1065 mesh_delete_appkey_lists(); 1066 mesh_delete_virtual_addresses(); 1067 mesh_delete_subscriptions(); 1068 mesh_delete_publications(); 1069 // also reset iv index + sequence number 1070 mesh_set_iv_index(0); 1071 mesh_sequence_number_set(0); 1072 // start advertising as unprovisioned device 1073 mesh_access_setup_unprovisioned_device(mesh_node_get_device_uuid()); 1074 } 1075 1076 static void mesh_access_setup_with_provisiong_data_random(void * arg){ 1077 UNUSED(arg); 1078 // set random value 1079 mesh_node_set_device_uuid(random_device_uuid); 1080 } 1081 1082 static int mesh_node_startup_from_tlv(void){ 1083 1084 mesh_persistent_provisioning_data_t persistent_provisioning_data; 1085 btstack_tlv_get_instance(&btstack_tlv_singleton_impl, &btstack_tlv_singleton_context); 1086 1087 // load provisioning data 1088 uint32_t prov_len = btstack_tlv_singleton_impl->get_tag(btstack_tlv_singleton_context, mesh_tag_for_prov_data, (uint8_t *) &persistent_provisioning_data, sizeof(mesh_persistent_provisioning_data_t)); 1089 printf("Provisioning data available: %u\n", prov_len ? 1 : 0); 1090 int prov_data_valid = prov_len == sizeof(mesh_persistent_provisioning_data_t); 1091 if (prov_data_valid){ 1092 1093 // copy into mesh_provisioning_data 1094 mesh_provisioning_data_t provisioning_data; 1095 (void)memcpy(provisioning_data.device_key, 1096 persistent_provisioning_data.device_key, 16); 1097 provisioning_data.unicast_address = persistent_provisioning_data.unicast_address; 1098 provisioning_data.flags = persistent_provisioning_data.flags; 1099 provisioning_data.network_key = NULL; 1100 printf("Provisioning Data: Flags %x, unicast_address %04x\n", persistent_provisioning_data.flags, provisioning_data.unicast_address); 1101 1102 // try load iv index and sequence number 1103 uint32_t iv_index = 0; 1104 uint32_t sequence_number = 0; 1105 (void) mesh_load_iv_index_and_sequence_number(&iv_index, &sequence_number); 1106 1107 // bump sequence number to account for interval updates 1108 sequence_number += MESH_SEQUENCE_NUMBER_STORAGE_INTERVAL; 1109 mesh_store_iv_index_and_sequence_number(iv_index, sequence_number); 1110 1111 mesh_set_iv_index(iv_index); 1112 mesh_sequence_number_set(sequence_number); 1113 provisioning_data.iv_index = iv_index; 1114 printf("IV Index: %08x, Sequence Number %08x\n", (int) iv_index, (int) sequence_number); 1115 1116 // setup iv update, node address, device key ... 1117 mesh_setup_from_provisioning_data(&provisioning_data); 1118 1119 // load network keys 1120 mesh_load_network_keys(); 1121 1122 // load app keys 1123 mesh_load_app_keys(); 1124 1125 // load foundation state 1126 mesh_foundation_state_load(); 1127 1128 // load model to appkey bindings 1129 mesh_load_appkey_lists(); 1130 1131 // load virtual addresses 1132 mesh_load_virtual_addresses(); 1133 1134 // load model subscriptions 1135 mesh_load_subscriptions(); 1136 1137 // load model publications 1138 mesh_load_publications(); 1139 1140 #if defined(ENABLE_MESH_ADV_BEARER) || defined(ENABLE_MESH_PB_ADV) 1141 // start sending Secure Network Beacon 1142 mesh_subnet_t * subnet = mesh_subnet_get_by_netkey_index(0); 1143 if (subnet){ 1144 beacon_secure_network_start(subnet); 1145 } 1146 #endif 1147 // create random uuid if not already set 1148 if (mesh_node_get_device_uuid() == NULL){ 1149 btstack_crypto_random_generate(&mesh_access_crypto_random, random_device_uuid, 16, &mesh_access_setup_with_provisiong_data_random, NULL); 1150 } 1151 1152 // dump into packet log 1153 hci_dump_log(HCI_DUMP_LOG_LEVEL_INFO, "mesh-iv-index: %08x", iv_index); 1154 mesh_log_key("mesh-devkey", 0xffff, persistent_provisioning_data.device_key); 1155 1156 } else { 1157 1158 const uint8_t * device_uuid = mesh_node_get_device_uuid(); 1159 if (device_uuid){ 1160 mesh_access_setup_unprovisioned_device(device_uuid); 1161 } else{ 1162 btstack_crypto_random_generate(&mesh_access_crypto_random, random_device_uuid, 16, &mesh_access_setup_without_provisiong_data_random, NULL); 1163 } 1164 1165 } 1166 1167 return prov_data_valid; 1168 } 1169 1170 static void mesh_control_message_handler(mesh_transport_callback_type_t callback_type, mesh_transport_status_t status, mesh_pdu_t * pdu){ 1171 UNUSED(callback_type); 1172 UNUSED(status); 1173 1174 // get opcode 1175 uint8_t opcode = mesh_pdu_control_opcode(pdu); 1176 printf("MESH Control Message, Opcode: 0x%02x + ", opcode); 1177 printf_hexdump(mesh_pdu_data(pdu), mesh_pdu_len(pdu)); 1178 1179 uint8_t init_ttl; 1180 uint8_t hops = 0; 1181 uint16_t features = 0; 1182 switch(opcode){ 1183 case 0x0a: 1184 // read params 1185 init_ttl = (*mesh_pdu_data(pdu)) & 0x7fu; 1186 features = big_endian_read_16(mesh_pdu_data(pdu), 1); 1187 // calculates hops 1188 hops = init_ttl - mesh_pdu_ttl(pdu) + 1; 1189 // process heartbeat info 1190 mesh_configuration_server_process_heartbeat(&mesh_configuration_server_model, mesh_pdu_src(pdu), mesh_pdu_dst(pdu), hops, features); 1191 break; 1192 default: 1193 break; 1194 } 1195 mesh_upper_transport_message_processed_by_higher_layer(pdu); 1196 } 1197 1198 static void mesh_node_setup_default_models(void){ 1199 // configure Config Server 1200 mesh_configuration_server_model.model_identifier = mesh_model_get_model_identifier_bluetooth_sig(MESH_SIG_MODEL_ID_CONFIGURATION_SERVER); 1201 mesh_configuration_server_model.model_data = &mesh_configuration_server_model_context; 1202 mesh_configuration_server_model.operations = mesh_configuration_server_get_operations(); 1203 mesh_element_add_model(mesh_node_get_primary_element(), &mesh_configuration_server_model); 1204 1205 // Config Health Server 1206 mesh_health_server_model.model_identifier = mesh_model_get_model_identifier_bluetooth_sig(MESH_SIG_MODEL_ID_HEALTH_SERVER); 1207 mesh_health_server_model.model_data = &mesh_health_server_model_context; 1208 mesh_health_server_model.operations = mesh_health_server_get_operations(); 1209 mesh_health_server_model.publication_model = &mesh_health_server_publication; 1210 mesh_element_add_model(mesh_node_get_primary_element(), &mesh_health_server_model); 1211 mesh_health_server_set_publication_model(&mesh_health_server_model, &mesh_health_server_publication); 1212 } 1213 1214 void mesh_init(void){ 1215 1216 // register for HCI events 1217 hci_event_callback_registration.callback = &hci_packet_handler; 1218 hci_add_event_handler(&hci_event_callback_registration); 1219 1220 // ADV Bearer also used for GATT Proxy Advertisements and PB-GATT 1221 adv_bearer_init(); 1222 1223 #ifdef ENABLE_MESH_GATT_BEARER 1224 // Setup GATT bearer 1225 gatt_bearer_init(); 1226 #endif 1227 1228 #ifdef ENABLE_MESH_ADV_BEARER 1229 // Setup Unprovisioned Device Beacon 1230 beacon_init(); 1231 #endif 1232 1233 provisioning_device_init(); 1234 provisioning_device_register_packet_handler(&mesh_provisioning_message_handler); 1235 1236 #ifdef ENABLE_MESH_PROVISIONER 1237 provisioning_provisioner_init(); 1238 provisioning_provisioner_register_packet_handler(&mesh_provisioning_message_handler); 1239 #endif 1240 1241 // Node Configuration 1242 mesh_node_init(); 1243 1244 // Network layer 1245 mesh_network_init(); 1246 1247 // Transport layers (lower + upper)) 1248 mesh_lower_transport_init(); 1249 mesh_upper_transport_init(); 1250 1251 // Access layer 1252 mesh_access_init(); 1253 1254 // Add mandatory models: Config Server and Health Server 1255 mesh_node_setup_default_models(); 1256 1257 // register for secure network beacons 1258 beacon_register_for_secure_network_beacons(&mesh_access_secure_network_beacon_handler); 1259 1260 // register for seq number updates 1261 mesh_sequence_number_set_update_callback(&mesh_persist_iv_index_and_sequence_number_if_needed); 1262 1263 // register for control messages 1264 mesh_upper_transport_register_control_message_handler(&mesh_control_message_handler); 1265 } 1266 1267 /** 1268 * Register for Mesh Provisioning Device events 1269 * @param packet_handler 1270 */ 1271 void mesh_register_provisioning_device_packet_handler(btstack_packet_handler_t packet_handler){ 1272 provisioning_device_packet_handler = packet_handler; 1273 } 1274