zephyr/drivers/nble/gap.c

553 lines
12 KiB
C

/*
* Copyright (c) 2016 Intel Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <errno.h>
#include <nanokernel.h>
#include <device.h>
#include <gpio.h>
#include <bluetooth/bluetooth.h>
#include <bluetooth/conn.h>
#include <bluetooth/log.h>
#include "version.h"
#include "gap_internal.h"
#include "uart.h"
#include "conn.h"
#include "rpc.h"
#if !defined(CONFIG_NBLE_DEBUG_GAP)
#undef BT_DBG
#define BT_DBG(fmt, ...)
#endif
#define NBLE_SWDIO_PIN 6
#define NBLE_RESET_PIN NBLE_SWDIO_PIN
#define NBLE_BTWAKE_PIN 5
static bt_ready_cb_t bt_ready_cb;
static bt_le_scan_cb_t *scan_dev_found_cb;
/* Local Bluetooth LE Device Address */
bt_addr_le_t nble_bdaddr;
extern const struct bt_conn_auth_cb *bt_auth;
#define BT_SMP_IO_DISPLAY_ONLY 0x00
#define BT_SMP_IO_DISPLAY_YESNO 0x01
#define BT_SMP_IO_KEYBOARD_ONLY 0x02
#define BT_SMP_IO_NO_INPUT_OUTPUT 0x03
#define BT_SMP_IO_KEYBOARD_DISPLAY 0x04
#define BT_SMP_OOB_NOT_PRESENT 0x00
#define BT_SMP_OOB_PRESENT 0x01
#define BT_SMP_MAX_ENC_KEY_SIZE 16
#if defined(CONFIG_NBLE_DEBUG_GAP)
static const char *bt_addr_le_str(const bt_addr_le_t *addr)
{
static char str[BT_ADDR_LE_STR_LEN];
bt_addr_le_to_str(addr, str, sizeof(str));
return str;
}
#endif /* CONFIG_BLUETOOTH_DEBUG */
void on_nble_get_version_rsp(const struct nble_version_response *rsp)
{
BT_DBG("VERSION: %d.%d.%d %.20s", rsp->version.major,
rsp->version.minor, rsp->version.patch,
rsp->version.version_string);
if (bt_ready_cb) {
bt_ready_cb(0);
bt_ready_cb = NULL;
}
}
int bt_enable(bt_ready_cb_t cb)
{
struct device *gpio;
int ret;
BT_DBG("");
gpio = device_get_binding(CONFIG_GPIO_DW_0_NAME);
if (!gpio) {
BT_ERR("Cannot find %s", CONFIG_GPIO_DW_0_NAME);
return -ENODEV;
}
ret = gpio_pin_configure(gpio, NBLE_RESET_PIN, GPIO_DIR_OUT);
if (ret) {
BT_ERR("Error configuring pin %d", NBLE_RESET_PIN);
return -ENODEV;
}
/* Reset hold time is 0.2us (normal) or 100us (SWD debug) */
ret = gpio_pin_write(gpio, NBLE_RESET_PIN, 0);
if (ret) {
BT_ERR("Error pin write %d", NBLE_RESET_PIN);
return -EINVAL;
}
ret = gpio_pin_configure(gpio, NBLE_BTWAKE_PIN, GPIO_DIR_OUT);
if (ret) {
BT_ERR("Error configuring pin %d", NBLE_BTWAKE_PIN);
return -ENODEV;
}
ret = gpio_pin_write(gpio, NBLE_BTWAKE_PIN, 1);
if (ret) {
BT_ERR("Error pin write %d", NBLE_BTWAKE_PIN);
return -EINVAL;
}
/**
* NBLE reset is achieved by asserting low the SWDIO pin.
* However, the BLE Core chip can be in SWD debug mode,
* and NRF_POWER->RESET = 0 due to, other constraints: therefore,
* this reset might not work everytime, especially after
* flashing or debugging.
*/
/* sleep 1ms depending on context */
switch (sys_execution_context_type_get()) {
case NANO_CTX_FIBER:
fiber_sleep(MSEC(1));
break;
case NANO_CTX_TASK:
task_sleep(MSEC(1));
break;
default:
BT_ERR("ISR context is not supported");
return -EINVAL;
}
ret = nble_open();
if (ret) {
return ret;
}
ret = gpio_pin_write(gpio, NBLE_RESET_PIN, 1);
if (ret) {
BT_ERR("Error pin write %d", NBLE_RESET_PIN);
return -EINVAL;
}
/* Set back GPIO to input to avoid interfering with external debugger */
ret = gpio_pin_configure(gpio, NBLE_RESET_PIN, GPIO_DIR_IN);
if (ret) {
BT_ERR("Error configuring pin %d", NBLE_RESET_PIN);
return -ENODEV;
}
bt_ready_cb = cb;
return 0;
}
static bool valid_adv_param(const struct bt_le_adv_param *param)
{
switch (param->type) {
case BT_LE_ADV_IND:
case BT_LE_ADV_SCAN_IND:
case BT_LE_ADV_NONCONN_IND:
break;
default:
return false;
}
switch (param->addr_type) {
case BT_LE_ADV_ADDR_IDENTITY:
break;
case BT_LE_ADV_ADDR_NRPA: /* nble doesn't support NRPAs (for now) */
default:
return false;
}
if (param->interval_min > param->interval_max ||
param->interval_min < 0x0020 || param->interval_max > 0x4000) {
return false;
}
return true;
}
int bt_le_adv_start(const struct bt_le_adv_param *param,
const struct bt_data *ad, size_t ad_len,
const struct bt_data *sd, size_t sd_len)
{
struct nble_gap_adv_params params = { 0 };
int i;
if (!valid_adv_param(param)) {
return -EINVAL;
}
for (i = 0; i < ad_len; i++) {
uint8_t *p;
/* Check if ad fit in the remaining buffer */
if (params.ad.len + ad[i].data_len + 2 > 31) {
break;
}
p = &params.ad.data[params.ad.len];
*p++ = ad[i].data_len + 1;
*p++ = ad[i].type;
memcpy(p, ad[i].data, ad[i].data_len);
params.ad.len += ad[i].data_len + 2;
}
/*
* Don't bother with scan response if the advertising type isn't
* a scannable one.
*/
if (param->type != BT_LE_ADV_IND && param->type != BT_LE_ADV_SCAN_IND) {
goto send_set_param;
}
for (i = 0; i < sd_len; i++) {
uint8_t *p;
/* Check if sd fit in the remaining buffer */
if (params.sd.len + sd[i].data_len + 2 > 31) {
break;
}
p = &params.sd.data[params.sd.len];
*p++ = sd[i].data_len + 1;
*p++ = sd[i].type;
memcpy(p, sd[i].data, sd[i].data_len);
params.sd.len += sd[i].data_len + 2;
}
send_set_param:
/* Timeout is handled by application timer */
params.timeout = 0;
/* forced to none currently (no whitelist support) */
params.filter_policy = 0;
params.interval_max = param->interval_max;
params.interval_min = param->interval_min;
params.type = param->type;
nble_gap_start_advertise_req(&params);
return 0;
}
void on_nble_gap_start_advertise_rsp(const struct nble_response *rsp)
{
if (rsp->status) {
BT_ERR("Start advertise falied, status %d", rsp->status);
return;
}
BT_DBG("status %u", rsp->status);
}
int bt_le_adv_stop(void)
{
BT_DBG("");
nble_gap_stop_advertise_req(NULL);
return 0;
}
void on_nble_gap_stop_advertise_rsp(const struct nble_response *rsp)
{
if (rsp->status) {
BT_ERR("Stop advertise failed, status %d", rsp->status);
return;
}
BT_DBG("status %d", rsp->status);
}
static bool valid_le_scan_param(const struct bt_le_scan_param *param)
{
if (param->type != BT_HCI_LE_SCAN_PASSIVE &&
param->type != BT_HCI_LE_SCAN_ACTIVE) {
return false;
}
if (param->filter_dup != BT_HCI_LE_SCAN_FILTER_DUP_DISABLE &&
param->filter_dup != BT_HCI_LE_SCAN_FILTER_DUP_ENABLE) {
return false;
}
if (param->interval < 0x0004 || param->interval > 0x4000) {
return false;
}
if (param->window < 0x0004 || param->window > 0x4000) {
return false;
}
if (param->window > param->interval) {
return false;
}
return true;
}
int bt_le_scan_start(const struct bt_le_scan_param *param, bt_le_scan_cb_t cb)
{
struct nble_gap_scan_params nble_params;
BT_DBG("");
/* Check that the parameters have valid values */
if (!valid_le_scan_param(param)) {
return -EINVAL;
}
nble_params.interval = param->interval;
nble_params.window = param->window;
nble_params.scan_type = param->type;
nble_params.use_whitelist = 0;
/* Check is scan already enabled */
scan_dev_found_cb = cb;
nble_gap_start_scan_req(&nble_params);
return 0;
}
void on_nble_gap_adv_report_evt(const struct nble_gap_adv_report_evt *evt,
const uint8_t *buf, uint8_t len)
{
BT_DBG("");
if (scan_dev_found_cb) {
scan_dev_found_cb(&evt->addr, evt->rssi, evt->adv_type,
buf, len);
}
}
int bt_le_scan_stop(void)
{
BT_DBG("");
scan_dev_found_cb = NULL;
nble_gap_stop_scan_req();
return 0;
}
void on_nble_gap_scan_start_stop_rsp(const struct nble_response *rsp)
{
if (rsp->status) {
BT_ERR("Unable to stop scan, status %d", rsp->status);
return;
}
BT_DBG("");
}
void nble_log(const struct nble_log_s *param, char *format, uint8_t len)
{
#if defined(CONFIG_BLUETOOTH_DEBUG)
/* Build meaningful output */
printf("nble: ");
printf(format, param->param0, param->param1, param->param2,
param->param3);
printf("\n");
#endif
}
void on_nble_gap_read_bda_rsp(const struct nble_service_read_bda_response *rsp)
{
if (rsp->status) {
BT_ERR("Read bdaddr failed, status %d", rsp->status);
return;
}
bt_addr_le_copy(&nble_bdaddr, &rsp->bd);
BT_DBG("Local bdaddr: %s", bt_addr_le_str(&nble_bdaddr));
nble_get_version_req(NULL);
}
/* Security Manager event handling */
static uint8_t get_io_capa(void)
{
if (!bt_auth) {
return BT_SMP_IO_NO_INPUT_OUTPUT;
}
/* Passkey Confirmation is valid only for LE SC */
if (bt_auth->passkey_display && bt_auth->passkey_entry &&
bt_auth->passkey_confirm) {
return BT_SMP_IO_KEYBOARD_DISPLAY;
}
/* DisplayYesNo is useful only for LE SC */
if (bt_auth->passkey_display &&
bt_auth->passkey_confirm) {
return BT_SMP_IO_DISPLAY_YESNO;
}
if (bt_auth->passkey_entry) {
return BT_SMP_IO_KEYBOARD_ONLY;
}
if (bt_auth->passkey_display) {
return BT_SMP_IO_DISPLAY_ONLY;
}
return BT_SMP_IO_NO_INPUT_OUTPUT;
}
static void send_dm_config(void)
{
struct nble_gap_sm_config_params config = {
.key_size = BT_SMP_MAX_ENC_KEY_SIZE,
.oob_present = BT_SMP_OOB_NOT_PRESENT,
};
config.io_caps = get_io_capa();
if (config.io_caps == BT_SMP_IO_NO_INPUT_OUTPUT) {
config.options = BT_SMP_AUTH_MITM;
} else {
config.options = BT_SMP_AUTH_BONDING | BT_SMP_AUTH_MITM;
}
BT_DBG("io_caps %u options %u", config.io_caps, config.options);
nble_gap_sm_config_req(&config);
}
void on_nble_gap_sm_config_rsp(struct nble_gap_sm_config_rsp *rsp)
{
if (rsp->status) {
BT_ERR("SM config failed, status %d", rsp->status);
return;
}
BT_DBG("status %u", rsp->status);
/* Get bdaddr queued after SM setup */
nble_gap_read_bda_req(NULL);
}
void on_nble_gap_sm_common_rsp(const struct nble_gap_sm_response *rsp)
{
if (rsp->status) {
BT_ERR("GAP SM request failed: conn %p err %d", rsp->conn,
rsp->status);
/* TODO: Handle error */
return;
}
}
void on_nble_gap_sm_status_evt(const struct nble_gap_sm_status_evt *ev)
{
struct bt_conn *conn;
if (ev->status) {
BT_ERR("SM request failed, status %d", ev->status);
return;
}
conn = bt_conn_lookup_handle(ev->conn_handle);
if (!conn) {
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
return;
}
BT_DBG("conn %p status %d evt_type %d", conn, ev->status, ev->evt_type);
/* TODO Handle events */
switch (ev->evt_type) {
case NBLE_GAP_SM_EVT_START_PAIRING:
BT_DBG("Start pairing");
break;
case NBLE_GAP_SM_EVT_BONDING_COMPLETE:
BT_DBG("Bonding complete");
break;
case NBLE_GAP_SM_EVT_LINK_ENCRYPTED:
BT_DBG("Link encrypted");
break;
case NBLE_GAP_SM_EVT_LINK_SECURITY_CHANGE:
BT_DBG("Security change");
break;
default:
BT_ERR("Unknown event %d", ev->evt_type);
break;
}
bt_conn_unref(conn);
}
void on_nble_gap_sm_passkey_display_evt(const struct nble_gap_sm_passkey_disp_evt *ev)
{
struct bt_conn *conn;
conn = bt_conn_lookup_handle(ev->conn_handle);
if (!conn) {
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
return;
}
BT_DBG("conn %p passkey %u", conn, ev->passkey);
/* TODO: Check shall we store io_caps globally */
if (get_io_capa() == BT_SMP_IO_DISPLAY_YESNO) {
bt_auth->passkey_confirm(conn, ev->passkey);
} else {
bt_auth->passkey_display(conn, ev->passkey);
}
bt_conn_unref(conn);
}
void on_nble_gap_sm_passkey_req_evt(const struct nble_gap_sm_passkey_req_evt *ev)
{
struct bt_conn *conn;
conn = bt_conn_lookup_handle(ev->conn_handle);
if (!conn) {
BT_ERR("Unable to find conn for handle %u", ev->conn_handle);
return;
}
if (ev->key_type == NBLE_GAP_SM_PK_PASSKEY) {
bt_auth->passkey_entry(conn);
}
bt_conn_unref(conn);
}
void on_nble_up(void)
{
BT_DBG("");
send_dm_config();
}