553 lines
12 KiB
C
553 lines
12 KiB
C
/*
|
|
* Copyright (c) 2016 Intel Corporation
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
|
|
#include <nanokernel.h>
|
|
#include <device.h>
|
|
#include <gpio.h>
|
|
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/conn.h>
|
|
#include <bluetooth/log.h>
|
|
|
|
#include "version.h"
|
|
#include "gap_internal.h"
|
|
#include "uart.h"
|
|
#include "conn.h"
|
|
#include "rpc.h"
|
|
|
|
#if !defined(CONFIG_NBLE_DEBUG_GAP)
|
|
#undef BT_DBG
|
|
#define BT_DBG(fmt, ...)
|
|
#endif
|
|
|
|
#define NBLE_SWDIO_PIN 6
|
|
#define NBLE_RESET_PIN NBLE_SWDIO_PIN
|
|
#define NBLE_BTWAKE_PIN 5
|
|
|
|
static bt_ready_cb_t bt_ready_cb;
|
|
static bt_le_scan_cb_t *scan_dev_found_cb;
|
|
|
|
/* Local Bluetooth LE Device Address */
|
|
bt_addr_le_t nble_bdaddr;
|
|
|
|
extern const struct bt_conn_auth_cb *bt_auth;
|
|
|
|
#define BT_SMP_IO_DISPLAY_ONLY 0x00
|
|
#define BT_SMP_IO_DISPLAY_YESNO 0x01
|
|
#define BT_SMP_IO_KEYBOARD_ONLY 0x02
|
|
#define BT_SMP_IO_NO_INPUT_OUTPUT 0x03
|
|
#define BT_SMP_IO_KEYBOARD_DISPLAY 0x04
|
|
|
|
#define BT_SMP_OOB_NOT_PRESENT 0x00
|
|
#define BT_SMP_OOB_PRESENT 0x01
|
|
|
|
#define BT_SMP_MAX_ENC_KEY_SIZE 16
|
|
|
|
#if defined(CONFIG_NBLE_DEBUG_GAP)
|
|
static const char *bt_addr_le_str(const bt_addr_le_t *addr)
|
|
{
|
|
static char str[BT_ADDR_LE_STR_LEN];
|
|
|
|
bt_addr_le_to_str(addr, str, sizeof(str));
|
|
|
|
return str;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_DEBUG */
|
|
|
|
void on_nble_get_version_rsp(const struct nble_version_response *rsp)
|
|
{
|
|
BT_DBG("VERSION: %d.%d.%d %.20s", rsp->version.major,
|
|
rsp->version.minor, rsp->version.patch,
|
|
rsp->version.version_string);
|
|
|
|
if (bt_ready_cb) {
|
|
bt_ready_cb(0);
|
|
bt_ready_cb = NULL;
|
|
}
|
|
}
|
|
|
|
int bt_enable(bt_ready_cb_t cb)
|
|
{
|
|
struct device *gpio;
|
|
int ret;
|
|
|
|
BT_DBG("");
|
|
|
|
gpio = device_get_binding(CONFIG_GPIO_DW_0_NAME);
|
|
if (!gpio) {
|
|
BT_ERR("Cannot find %s", CONFIG_GPIO_DW_0_NAME);
|
|
return -ENODEV;
|
|
}
|
|
|
|
ret = gpio_pin_configure(gpio, NBLE_RESET_PIN, GPIO_DIR_OUT);
|
|
if (ret) {
|
|
BT_ERR("Error configuring pin %d", NBLE_RESET_PIN);
|
|
return -ENODEV;
|
|
}
|
|
|
|
/* Reset hold time is 0.2us (normal) or 100us (SWD debug) */
|
|
ret = gpio_pin_write(gpio, NBLE_RESET_PIN, 0);
|
|
if (ret) {
|
|
BT_ERR("Error pin write %d", NBLE_RESET_PIN);
|
|
return -EINVAL;
|
|
}
|
|
|
|
ret = gpio_pin_configure(gpio, NBLE_BTWAKE_PIN, GPIO_DIR_OUT);
|
|
if (ret) {
|
|
BT_ERR("Error configuring pin %d", NBLE_BTWAKE_PIN);
|
|
return -ENODEV;
|
|
}
|
|
|
|
ret = gpio_pin_write(gpio, NBLE_BTWAKE_PIN, 1);
|
|
if (ret) {
|
|
BT_ERR("Error pin write %d", NBLE_BTWAKE_PIN);
|
|
return -EINVAL;
|
|
}
|
|
|
|
/**
|
|
* NBLE reset is achieved by asserting low the SWDIO pin.
|
|
* However, the BLE Core chip can be in SWD debug mode,
|
|
* and NRF_POWER->RESET = 0 due to, other constraints: therefore,
|
|
* this reset might not work everytime, especially after
|
|
* flashing or debugging.
|
|
*/
|
|
|
|
/* sleep 1ms depending on context */
|
|
switch (sys_execution_context_type_get()) {
|
|
case NANO_CTX_FIBER:
|
|
fiber_sleep(MSEC(1));
|
|
break;
|
|
case NANO_CTX_TASK:
|
|
task_sleep(MSEC(1));
|
|
break;
|
|
default:
|
|
BT_ERR("ISR context is not supported");
|
|
return -EINVAL;
|
|
}
|
|
|
|
ret = nble_open();
|
|
if (ret) {
|
|
return ret;
|
|
}
|
|
|
|
ret = gpio_pin_write(gpio, NBLE_RESET_PIN, 1);
|
|
if (ret) {
|
|
BT_ERR("Error pin write %d", NBLE_RESET_PIN);
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Set back GPIO to input to avoid interfering with external debugger */
|
|
ret = gpio_pin_configure(gpio, NBLE_RESET_PIN, GPIO_DIR_IN);
|
|
if (ret) {
|
|
BT_ERR("Error configuring pin %d", NBLE_RESET_PIN);
|
|
return -ENODEV;
|
|
}
|
|
|
|
bt_ready_cb = cb;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static bool valid_adv_param(const struct bt_le_adv_param *param)
|
|
{
|
|
switch (param->type) {
|
|
case BT_LE_ADV_IND:
|
|
case BT_LE_ADV_SCAN_IND:
|
|
case BT_LE_ADV_NONCONN_IND:
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
|
|
switch (param->addr_type) {
|
|
case BT_LE_ADV_ADDR_IDENTITY:
|
|
break;
|
|
case BT_LE_ADV_ADDR_NRPA: /* nble doesn't support NRPAs (for now) */
|
|
default:
|
|
return false;
|
|
}
|
|
|
|
if (param->interval_min > param->interval_max ||
|
|
param->interval_min < 0x0020 || param->interval_max > 0x4000) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
int bt_le_adv_start(const struct bt_le_adv_param *param,
|
|
const struct bt_data *ad, size_t ad_len,
|
|
const struct bt_data *sd, size_t sd_len)
|
|
{
|
|
struct nble_gap_adv_params params = { 0 };
|
|
int i;
|
|
|
|
if (!valid_adv_param(param)) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
for (i = 0; i < ad_len; i++) {
|
|
uint8_t *p;
|
|
|
|
/* Check if ad fit in the remaining buffer */
|
|
if (params.ad.len + ad[i].data_len + 2 > 31) {
|
|
break;
|
|
}
|
|
|
|
p = ¶ms.ad.data[params.ad.len];
|
|
*p++ = ad[i].data_len + 1;
|
|
*p++ = ad[i].type;
|
|
memcpy(p, ad[i].data, ad[i].data_len);
|
|
params.ad.len += ad[i].data_len + 2;
|
|
}
|
|
|
|
/*
|
|
* Don't bother with scan response if the advertising type isn't
|
|
* a scannable one.
|
|
*/
|
|
if (param->type != BT_LE_ADV_IND && param->type != BT_LE_ADV_SCAN_IND) {
|
|
goto send_set_param;
|
|
}
|
|
|
|
for (i = 0; i < sd_len; i++) {
|
|
uint8_t *p;
|
|
|
|
/* Check if sd fit in the remaining buffer */
|
|
if (params.sd.len + sd[i].data_len + 2 > 31) {
|
|
break;
|
|
}
|
|
|
|
p = ¶ms.sd.data[params.sd.len];
|
|
*p++ = sd[i].data_len + 1;
|
|
*p++ = sd[i].type;
|
|
memcpy(p, sd[i].data, sd[i].data_len);
|
|
params.sd.len += sd[i].data_len + 2;
|
|
}
|
|
|
|
send_set_param:
|
|
/* Timeout is handled by application timer */
|
|
params.timeout = 0;
|
|
/* forced to none currently (no whitelist support) */
|
|
params.filter_policy = 0;
|
|
params.interval_max = param->interval_max;
|
|
params.interval_min = param->interval_min;
|
|
params.type = param->type;
|
|
|
|
nble_gap_start_advertise_req(¶ms);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void on_nble_gap_start_advertise_rsp(const struct nble_response *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("Start advertise falied, status %d", rsp->status);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("status %u", rsp->status);
|
|
}
|
|
|
|
int bt_le_adv_stop(void)
|
|
{
|
|
BT_DBG("");
|
|
|
|
nble_gap_stop_advertise_req(NULL);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void on_nble_gap_stop_advertise_rsp(const struct nble_response *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("Stop advertise failed, status %d", rsp->status);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("status %d", rsp->status);
|
|
}
|
|
|
|
static bool valid_le_scan_param(const struct bt_le_scan_param *param)
|
|
{
|
|
if (param->type != BT_HCI_LE_SCAN_PASSIVE &&
|
|
param->type != BT_HCI_LE_SCAN_ACTIVE) {
|
|
return false;
|
|
}
|
|
|
|
if (param->filter_dup != BT_HCI_LE_SCAN_FILTER_DUP_DISABLE &&
|
|
param->filter_dup != BT_HCI_LE_SCAN_FILTER_DUP_ENABLE) {
|
|
return false;
|
|
}
|
|
|
|
if (param->interval < 0x0004 || param->interval > 0x4000) {
|
|
return false;
|
|
}
|
|
|
|
if (param->window < 0x0004 || param->window > 0x4000) {
|
|
return false;
|
|
}
|
|
|
|
if (param->window > param->interval) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
int bt_le_scan_start(const struct bt_le_scan_param *param, bt_le_scan_cb_t cb)
|
|
{
|
|
struct nble_gap_scan_params nble_params;
|
|
|
|
BT_DBG("");
|
|
|
|
/* Check that the parameters have valid values */
|
|
if (!valid_le_scan_param(param)) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
nble_params.interval = param->interval;
|
|
nble_params.window = param->window;
|
|
nble_params.scan_type = param->type;
|
|
nble_params.use_whitelist = 0;
|
|
|
|
/* Check is scan already enabled */
|
|
|
|
scan_dev_found_cb = cb;
|
|
|
|
nble_gap_start_scan_req(&nble_params);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void on_nble_gap_adv_report_evt(const struct nble_gap_adv_report_evt *evt,
|
|
const uint8_t *buf, uint8_t len)
|
|
{
|
|
BT_DBG("");
|
|
|
|
if (scan_dev_found_cb) {
|
|
scan_dev_found_cb(&evt->addr, evt->rssi, evt->adv_type,
|
|
buf, len);
|
|
}
|
|
}
|
|
|
|
int bt_le_scan_stop(void)
|
|
{
|
|
BT_DBG("");
|
|
|
|
scan_dev_found_cb = NULL;
|
|
|
|
nble_gap_stop_scan_req();
|
|
|
|
return 0;
|
|
}
|
|
|
|
void on_nble_gap_scan_start_stop_rsp(const struct nble_response *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("Unable to stop scan, status %d", rsp->status);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("");
|
|
}
|
|
|
|
void nble_log(const struct nble_log_s *param, char *format, uint8_t len)
|
|
{
|
|
#if defined(CONFIG_BLUETOOTH_DEBUG)
|
|
/* Build meaningful output */
|
|
printf("nble: ");
|
|
printf(format, param->param0, param->param1, param->param2,
|
|
param->param3);
|
|
printf("\n");
|
|
#endif
|
|
}
|
|
|
|
void on_nble_gap_read_bda_rsp(const struct nble_service_read_bda_response *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("Read bdaddr failed, status %d", rsp->status);
|
|
return;
|
|
}
|
|
|
|
bt_addr_le_copy(&nble_bdaddr, &rsp->bd);
|
|
|
|
BT_DBG("Local bdaddr: %s", bt_addr_le_str(&nble_bdaddr));
|
|
|
|
nble_get_version_req(NULL);
|
|
}
|
|
|
|
/* Security Manager event handling */
|
|
|
|
static uint8_t get_io_capa(void)
|
|
{
|
|
if (!bt_auth) {
|
|
return BT_SMP_IO_NO_INPUT_OUTPUT;
|
|
}
|
|
|
|
/* Passkey Confirmation is valid only for LE SC */
|
|
if (bt_auth->passkey_display && bt_auth->passkey_entry &&
|
|
bt_auth->passkey_confirm) {
|
|
return BT_SMP_IO_KEYBOARD_DISPLAY;
|
|
}
|
|
|
|
/* DisplayYesNo is useful only for LE SC */
|
|
if (bt_auth->passkey_display &&
|
|
bt_auth->passkey_confirm) {
|
|
return BT_SMP_IO_DISPLAY_YESNO;
|
|
}
|
|
|
|
if (bt_auth->passkey_entry) {
|
|
return BT_SMP_IO_KEYBOARD_ONLY;
|
|
}
|
|
|
|
if (bt_auth->passkey_display) {
|
|
return BT_SMP_IO_DISPLAY_ONLY;
|
|
}
|
|
|
|
return BT_SMP_IO_NO_INPUT_OUTPUT;
|
|
}
|
|
|
|
static void send_dm_config(void)
|
|
{
|
|
struct nble_gap_sm_config_params config = {
|
|
.key_size = BT_SMP_MAX_ENC_KEY_SIZE,
|
|
.oob_present = BT_SMP_OOB_NOT_PRESENT,
|
|
};
|
|
|
|
config.io_caps = get_io_capa();
|
|
|
|
if (config.io_caps == BT_SMP_IO_NO_INPUT_OUTPUT) {
|
|
config.options = BT_SMP_AUTH_MITM;
|
|
} else {
|
|
config.options = BT_SMP_AUTH_BONDING | BT_SMP_AUTH_MITM;
|
|
}
|
|
|
|
BT_DBG("io_caps %u options %u", config.io_caps, config.options);
|
|
|
|
nble_gap_sm_config_req(&config);
|
|
}
|
|
|
|
void on_nble_gap_sm_config_rsp(struct nble_gap_sm_config_rsp *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("SM config failed, status %d", rsp->status);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("status %u", rsp->status);
|
|
|
|
/* Get bdaddr queued after SM setup */
|
|
nble_gap_read_bda_req(NULL);
|
|
}
|
|
|
|
void on_nble_gap_sm_common_rsp(const struct nble_gap_sm_response *rsp)
|
|
{
|
|
if (rsp->status) {
|
|
BT_ERR("GAP SM request failed: conn %p err %d", rsp->conn,
|
|
rsp->status);
|
|
|
|
/* TODO: Handle error */
|
|
return;
|
|
}
|
|
}
|
|
|
|
void on_nble_gap_sm_status_evt(const struct nble_gap_sm_status_evt *ev)
|
|
{
|
|
struct bt_conn *conn;
|
|
|
|
if (ev->status) {
|
|
BT_ERR("SM request failed, status %d", ev->status);
|
|
return;
|
|
}
|
|
|
|
conn = bt_conn_lookup_handle(ev->conn_handle);
|
|
if (!conn) {
|
|
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("conn %p status %d evt_type %d", conn, ev->status, ev->evt_type);
|
|
|
|
/* TODO Handle events */
|
|
switch (ev->evt_type) {
|
|
case NBLE_GAP_SM_EVT_START_PAIRING:
|
|
BT_DBG("Start pairing");
|
|
break;
|
|
case NBLE_GAP_SM_EVT_BONDING_COMPLETE:
|
|
BT_DBG("Bonding complete");
|
|
break;
|
|
case NBLE_GAP_SM_EVT_LINK_ENCRYPTED:
|
|
BT_DBG("Link encrypted");
|
|
break;
|
|
case NBLE_GAP_SM_EVT_LINK_SECURITY_CHANGE:
|
|
BT_DBG("Security change");
|
|
break;
|
|
default:
|
|
BT_ERR("Unknown event %d", ev->evt_type);
|
|
break;
|
|
}
|
|
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
void on_nble_gap_sm_passkey_display_evt(const struct nble_gap_sm_passkey_disp_evt *ev)
|
|
{
|
|
struct bt_conn *conn;
|
|
|
|
conn = bt_conn_lookup_handle(ev->conn_handle);
|
|
if (!conn) {
|
|
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("conn %p passkey %u", conn, ev->passkey);
|
|
|
|
/* TODO: Check shall we store io_caps globally */
|
|
if (get_io_capa() == BT_SMP_IO_DISPLAY_YESNO) {
|
|
bt_auth->passkey_confirm(conn, ev->passkey);
|
|
} else {
|
|
bt_auth->passkey_display(conn, ev->passkey);
|
|
}
|
|
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
void on_nble_gap_sm_passkey_req_evt(const struct nble_gap_sm_passkey_req_evt *ev)
|
|
{
|
|
struct bt_conn *conn;
|
|
|
|
conn = bt_conn_lookup_handle(ev->conn_handle);
|
|
if (!conn) {
|
|
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
|
|
return;
|
|
}
|
|
|
|
if (ev->key_type == NBLE_GAP_SM_PK_PASSKEY) {
|
|
bt_auth->passkey_entry(conn);
|
|
}
|
|
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
void on_nble_up(void)
|
|
{
|
|
BT_DBG("");
|
|
|
|
send_dm_config();
|
|
}
|