#include "ble_service.h" #include "app_common.h" #include "ble_modem.h" #include "host/ble_hs.h" #include "services/gap/ble_svc_gap.h" #include "wm_bt_util.h" #include "bluetooth_sig_values.h" #include "FreeRTOS.h" #define USABLE_DEFAULT_MTU (20) //23 - 3 of header bytes /* ble service internal workings attributes */ static volatile ble_service_state_e _ble_service_state = BLE_SERVICE_MODE_STOPPED; static nus_data_rx_fn_t _ble_service_nus_data_rx_cb = NULL; static ble_service_state_change_fn_t _ble_service_state_change_cb = NULL; static uint32_t _pairing_passkey = 0; /* Connection handle to the connected device : only one simultaneous connection */ static uint16_t ble_device_conn_handle = BLE_HS_CONN_HANDLE_NONE; static uint16_t usable_mtu = USABLE_DEFAULT_MTU; static uint8_t _device_mac_address[6] = {0x00}; /** * @brief Structure used to store the various data to carry out a chunked notification or indication data transfer * */ typedef struct { uint16_t length; // The length of the data being sent uint16_t offset; // The offset used to be ableto send the next chunk of data in the array uint16_t sent_chunk_size; // The size of the chunk sent const uint8_t *data; // The address of the data to send bool transfer_in_progress; // Is a transfer already in progress ? } data_being_sent_t; // Only one transfer of a type can occur at any given time ie // one notification and one indication can happen at the same time but not more. static data_being_sent_t notification_data = {.data = NULL, .length = 0, .offset = 0, .transfer_in_progress = false}; static data_being_sent_t indication_data = {.data = NULL, .length = 0, .offset = 0, .transfer_in_progress = false}; static struct ble_gap_event_listener ble_gap_event_listener; static int battery_level_char_access_cb(uint16_t conn_handle, uint16_t attr_handle, struct ble_gatt_access_ctxt *ctxt, void *arg); static uint16_t battery_level_char_handle = 0; // Default battery value set to 100% static uint8_t _battery_level_value = 100; static int gatt_nus_char_access_cb(uint16_t conn_handle, uint16_t attr_handle, struct ble_gatt_access_ctxt *ctxt, void *arg); static const ble_uuid128_t gatt_nus_service_uuid = BLE_UUID128_INIT(0x9E, 0xCA, 0xDC, 0x24, 0x0E, 0xE5, 0xA9, 0xE0, 0x93, 0xF3, 0xA3, 0xB5, 0x01, 0x00, 0x40, 0x6E); static uint16_t gatt_nus_char_rx_handle = 0; static const ble_uuid128_t gatt_nus_char_rx_uuid = BLE_UUID128_INIT(0x9E, 0xCA, 0xDC, 0x24, 0x0E, 0xE5, 0xA9, 0xE0, 0x93, 0xF3, 0xA3, 0xB5, 0x02, 0x00, 0x40, 0x6E); static uint16_t gatt_nus_char_tx_handle = 0; static const ble_uuid128_t gatt_nus_char_tx_uuid = BLE_UUID128_INIT(0x9E, 0xCA, 0xDC, 0x24, 0x0E, 0xE5, 0xA9, 0xE0, 0x93, 0xF3, 0xA3, 0xB5, 0x03, 0x00, 0x40, 0x6E); static struct ble_gatt_svc_def gatt_svc[] = { { .type = BLE_GATT_SVC_TYPE_PRIMARY, .uuid = BLE_UUID16_DECLARE(BLE_DEVICE_ADV_SERVICE), .characteristics = (struct ble_gatt_chr_def[]) { { .uuid = BLE_UUID16_DECLARE(0x2A19), .val_handle = &battery_level_char_handle, .access_cb = &(battery_level_char_access_cb), .flags = BLE_GATT_CHR_F_READ | BLE_GATT_CHR_F_NOTIFY, /*.descriptors = (struct ble_gatt_dsc_def[]) { { .uuid = BLE_UUID, .access_cb = , .att_flags = BLE_ATT_F_READ; }, { .uuid = NULL } }*/ }, { .uuid = NULL } } }, { .type = BLE_GATT_SVC_TYPE_PRIMARY, .uuid = &gatt_nus_service_uuid.u, .characteristics = (struct ble_gatt_chr_def[]) { { .uuid = &gatt_nus_char_rx_uuid.u, .val_handle = &gatt_nus_char_rx_handle, .access_cb = &(gatt_nus_char_access_cb), .flags = BLE_GATT_CHR_F_WRITE | BLE_GATT_CHR_F_WRITE_NO_RSP } , { .uuid = &gatt_nus_char_tx_uuid.u, .val_handle = &gatt_nus_char_tx_handle, .access_cb = &(gatt_nus_char_access_cb), .flags = BLE_GATT_CHR_F_NOTIFY } , { .uuid = NULL } } }, { .type = BLE_GATT_SVC_TYPE_END } }; static bool ble_service_define_gatt(const struct ble_gatt_svc_def *gatt_svc); static bool ble_service_advertise(bool enable); static int ble_gap_event_cb(struct ble_gap_event *event, void *arg); static int ble_advertise_gap_event_cb(struct ble_gap_event *event, void *arg); static int ble_conn_gap_event_cb(struct ble_gap_event *event, void *arg); static void print_conn_desc(const struct ble_gap_conn_desc *desc); // Raw because it doesn't handle payload fragmentation if mtu size is smaller than the payload size static bool ble_service_send_raw_custom_notification(uint16_t characteristic_handle, const uint8_t *data, uint16_t length); static bool ble_service_send_custom_notification(uint16_t characteristic_handle, data_being_sent_t * const data); static void reset_data_being_sent(data_being_sent_t * const data); // Needed to get the reponse after a mtu exchange request static int ble_gatt_mtu_cb(uint16_t conn_handle, const struct ble_gatt_error *error, uint16_t mtu, void *arg); const char *ble_service_state_2_str(ble_service_state_e state) { switch(state) { CASE_RETURN_STR(BLE_SERVICE_MODE_STOPPED) CASE_RETURN_STR(BLE_SERVICE_MODE_IDLE) CASE_RETURN_STR(BLE_SERVICE_MODE_ADVERTISING) CASE_RETURN_STR(BLE_SERVICE_MODE_CONNECTED) CASE_RETURN_STR(BLE_SERVICE_MODE_INDICATING) CASE_RETURN_STR(BLE_SERVICE_MODE_EXITING) default: return "Unkown ble service state"; } } /** * PUBLIC FUNCTION DEFINITION */ bool ble_service_start(void) { int status = BLE_HS_ENOERR; // 1 We first check if the BLE service is stopped if(_ble_service_state != BLE_SERVICE_MODE_STOPPED) { TLS_BT_APPL_TRACE_WARNING("%s, ble service already running (%s)"NEW_LINE, __FUNCTION__, ble_service_state_2_str(_ble_service_state)); return true; } // 2 We check if the BLE MODEM is turned on if(!is_ble_modem_on()) { TLS_BT_APPL_TRACE_ERROR("%s, ble modem is not turned on"NEW_LINE, __FUNCTION__); return false; } // 3 We set our device name and appearance if((status = ble_svc_gap_device_name_set(BLE_DEVICE_NAME)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_svc_gap_device_name_set "NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } if((status = ble_svc_gap_device_appearance_set(BLE_DEVICE_APPEARANCE)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_svc_gap_device_appearance_set "NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } // 4 We register our gatt (service structure) if(!ble_service_define_gatt(gatt_svc)) { TLS_BT_APPL_TRACE_ERROR("%s, failed to define gatt"NEW_LINE, __FUNCTION__); return false; } // 5 We register a gap event handler callback if((status = ble_gap_event_listener_register(&ble_gap_event_listener, &(ble_gap_event_cb), NULL)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_event_listener_register %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } // 6 We are now ready to make all registered services available to peers if((status = ble_gatts_start()) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gatts_start failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } // 7 Finally we can start advertising if(!ble_service_advertise(true)) { return false; } _ble_service_state = BLE_SERVICE_MODE_ADVERTISING; return true; } bool ble_service_stop(void) { int status = BLE_HS_ENOERR; // 1 We first check if the BLE service is not stopped if(_ble_service_state == BLE_SERVICE_MODE_STOPPED) { TLS_BT_APPL_TRACE_WARNING("%s, ble service already stopped"NEW_LINE, __FUNCTION__); return true; } // 2 We check if the BLE MODEM is turned on if(!is_ble_modem_on()) { TLS_BT_APPL_TRACE_ERROR("%s, ble modem is not turned on"NEW_LINE, __FUNCTION__); return false; } switch(_ble_service_state) { case BLE_SERVICE_MODE_CONNECTED: case BLE_SERVICE_MODE_INDICATING: status = ble_gap_terminate(ble_device_conn_handle, BLE_ERR_REM_USER_CONN_TERM); if(status == BLE_HS_ENOERR) { _ble_service_state = BLE_SERVICE_MODE_EXITING; } else //BLE_HS_EDISABLED || BLE_HS_ENOTCONN or any other error { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_terminate %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); _ble_service_state = BLE_SERVICE_MODE_STOPPED; //Unregister gap event listener if((status = ble_gap_event_listener_unregister(&ble_gap_event_listener)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_event_listener_unregister %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } } break; case BLE_SERVICE_MODE_ADVERTISING: if(!ble_service_advertise(false)) { TLS_BT_APPL_TRACE_WARNING("%s, ble_service_advertise failed to stop"NEW_LINE, __FUNCTION__); } else { _ble_service_state = BLE_SERVICE_MODE_STOPPED; //Unregister gap event listener if((status = ble_gap_event_listener_unregister(&ble_gap_event_listener)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_event_listener_unregister %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } } break; default: //Just to keep compiler happy since BLE_SERVICE_MODE_STOPPED is rulled out earlier break; } if(_ble_service_state == BLE_SERVICE_MODE_STOPPED) { // We finally clean the gatt registered services if((status = ble_gatts_reset()) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gatts_reset %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } } return true; } bool ble_service_is_started(void) { return _ble_service_state != BLE_SERVICE_MODE_STOPPED; } bool ble_service_is_device_connected(void) { return _ble_service_state == BLE_SERVICE_MODE_CONNECTED; } const uint8_t *ble_service_get_device_mac_address(void) { // We only need to read from efuse section once. if( _device_mac_address[0] == 0 && _device_mac_address[1] == 0 && _device_mac_address[2] == 0 && _device_mac_address[3] == 0 && _device_mac_address[4] == 0 && _device_mac_address[5] == 0 ) { extern int tls_get_bt_mac_addr(u8 *mac); tls_get_bt_mac_addr(_device_mac_address); // Make sure the device address is compliant with the random address specification : _device_mac_address[5] |= 0xC0; } return _device_mac_address; } void ble_service_register_state_change_cb(ble_service_state_change_fn_t ble_service_state_change_cb) { _ble_service_state_change_cb = ble_service_state_change_cb; } ble_service_state_e ble_service_get_state(void) { return _ble_service_state; } void ble_service_set_pairing_passkey(uint32_t passkey) { _pairing_passkey = passkey; } uint32_t ble_service_get_active_pairing_passkey(void) { return _pairing_passkey; } bool ble_service_update_connection_parameters( uint16_t itvl_min, uint16_t itvl_max, uint16_t latency, uint16_t supervision_timeout, uint16_t min_ce_len, uint16_t max_ce_len) { if(BLE_HS_CONN_HANDLE_NONE == ble_device_conn_handle) { TLS_BT_APPL_TRACE_ERROR("%s, no active connection" NEW_LINE, __FUNCTION__); return false; } int status = BLE_HS_ENOERR; struct ble_gap_upd_params gap_params_to_apply = {0}; gap_params_to_apply.itvl_min = itvl_min; gap_params_to_apply.itvl_max = itvl_max; gap_params_to_apply.latency = latency; gap_params_to_apply.supervision_timeout = supervision_timeout; gap_params_to_apply.min_ce_len = min_ce_len; gap_params_to_apply.max_ce_len = max_ce_len; if((status = ble_gap_update_params(ble_device_conn_handle, &gap_params_to_apply)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_update_params failed %s" NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } return true; } bool ble_service_request_mtu_exchange(void) { if(BLE_HS_CONN_HANDLE_NONE == ble_device_conn_handle) { TLS_BT_APPL_TRACE_ERROR("%s, no active connection" NEW_LINE, __FUNCTION__); return false; } int status = BLE_HS_ENOERR; if((status = ble_gattc_exchange_mtu(ble_device_conn_handle, &(ble_gatt_mtu_cb), NULL)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gattc_exchange_mtu %s" NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } return true; } bool ble_service_send_nus_data(const uint8_t *data, uint16_t length) { // The NUS is TX is using notifications if(notification_data.transfer_in_progress) { TLS_BT_APPL_TRACE_WARNING("%s, a transfer is already in progress"NEW_LINE, __FUNCTION__); return false; } notification_data.transfer_in_progress = true; notification_data.data = data; notification_data.length = length; return ble_service_send_custom_notification(gatt_nus_char_tx_handle, ¬ification_data); } void ble_service_register_nus_data_rx_cb(nus_data_rx_fn_t nus_data_rx_cb) { _ble_service_nus_data_rx_cb = nus_data_rx_cb; } void ble_service_set_battery_value(uint8_t value) { _battery_level_value = value > 100 ? 100 : value; } /** * PRIVATE FUNCTION DEFINITION * Used for the internal workings of the service */ static bool ble_service_send_raw_custom_notification(uint16_t characteristic_handle, const uint8_t *data, uint16_t length) { if(BLE_HS_CONN_HANDLE_NONE == ble_device_conn_handle) { TLS_BT_APPL_TRACE_ERROR("%s, no active connection" NEW_LINE, __FUNCTION__); return false; } if(!data || !length) { TLS_BT_APPL_TRACE_ERROR("%s, no data" NEW_LINE, __FUNCTION__); return false; } int status = BLE_HS_ENOERR; struct os_mbuf *om_buf = ble_hs_mbuf_from_flat(data, length); if(!om_buf) { TLS_BT_APPL_TRACE_ERROR("%s, ble_hs_mbuf_from_flat" NEW_LINE, __FUNCTION__); return false; } if((status = ble_gattc_notify_custom(ble_device_conn_handle, characteristic_handle, om_buf)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_hs_mbuf_from_flat %s" NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } return true; } static bool ble_service_send_custom_notification(uint16_t characteristic_handle, data_being_sent_t * const notif_data) { if(!notif_data) { TLS_BT_APPL_TRACE_WARNING("%s, notif_data is NULL"NEW_LINE, __FUNCTION__); return false; } // We compute the maximum size of the data we can send: uint16_t remaining_data_to_send = notif_data->length - notif_data->offset; notif_data->sent_chunk_size = remaining_data_to_send <= usable_mtu ? remaining_data_to_send : usable_mtu; if(!ble_service_send_raw_custom_notification(characteristic_handle, ¬if_data->data[notif_data->offset], notif_data->sent_chunk_size)) { //Transfer failed : reset_data_being_sent(notif_data); return false; } return true; } int ble_gatt_mtu_cb(uint16_t conn_handle, const struct ble_gatt_error *error, uint16_t mtu, void *arg) { TLS_BT_APPL_TRACE_DEBUG("ble_gatt_mtu_cb"NEW_LINE); switch(error->status) { case 0: TLS_BT_APPL_TRACE_DEBUG("mtu exchange complete: conn_handle=%d mtu=%d"NEW_LINE, conn_handle, mtu); usable_mtu = mtu - 3; break; default: TLS_BT_APPL_TRACE_ERROR("Update MTU failed...error->status=%d"NEW_LINE, error->status); break; } return BLE_HS_ENOERR; } static bool ble_service_define_gatt(const struct ble_gatt_svc_def *gatt_svc) { int status = BLE_HS_ENOERR; if((status = ble_gatts_count_cfg(gatt_svc)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gatts_count_cfg failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } if((status = ble_gatts_add_svcs(gatt_svc)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gatts_add_svcs failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } return status == BLE_HS_ENOERR ? true : false; } static bool ble_service_advertise(bool enable) { int status = BLE_HS_ENOERR; if(enable) { if(!ble_modem_is_sleeping())ble_modem_sleep(); struct ble_hs_adv_fields advertisement_fields = {0}; uint8_t own_addr_type = BLE_OWN_ADDR_RANDOM; advertisement_fields.flags = BLE_HS_ADV_F_DISC_GEN | BLE_HS_ADV_F_BREDR_UNSUP; advertisement_fields.appearance = ble_svc_gap_device_appearance(); advertisement_fields.appearance_is_present = 1; // Set the name of the BLE device advertisement_fields.name = (uint8_t *)ble_svc_gap_device_name(); advertisement_fields.name_len = strlen(ble_svc_gap_device_name()); advertisement_fields.name_is_complete = 1; advertisement_fields.uuids16 = (ble_uuid16_t[]) { BLE_UUID16_INIT(BLE_DEVICE_ADV_SERVICE) }; advertisement_fields.num_uuids16 = 1; advertisement_fields.uuids16_is_complete = 1; // Lets apply the advertisement data if((status = ble_gap_adv_set_fields(&advertisement_fields)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_adv_set_fields failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } // We set the device address const uint8_t *device_mac_address = ble_service_get_device_mac_address(); if((status = ble_hs_id_set_rnd(device_mac_address)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_hs_id_set_rnd failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } else { TLS_BT_APPL_TRACE_VERBOSE("addr type : %s"NEW_LINE"device addr : %02X:%02X:%02X:%02X:%02X:%02X"NEW_LINE, tls_bt_addr_type_2_str(own_addr_type), device_mac_address[5], device_mac_address[4], device_mac_address[3], device_mac_address[2], device_mac_address[1], device_mac_address[0]); } // We are now ready to configure the advertisement parameters struct ble_gap_adv_params advertisement_params = {0}; advertisement_params.conn_mode = BLE_GAP_CONN_MODE_UND; advertisement_params.disc_mode = BLE_GAP_DISC_MODE_GEN; advertisement_params.itvl_min = 160; advertisement_params.itvl_max = 160; //160 / 0.625 = 100 ms advertisement_params.filter_policy = 0; advertisement_params.channel_map = 0; // Use sane default advertisement_params.high_duty_cycle = 0; if((status = ble_gap_adv_start(BLE_OWN_ADDR_RANDOM, NULL, BLE_HS_FOREVER, &advertisement_params, &(ble_advertise_gap_event_cb), NULL)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_adv_start failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } } else { if((status = ble_gap_adv_stop()) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_adv_stop failed : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return false; } } return true; } // This is the brain of the ble service, here we handle all the possible GAP events static int ble_gap_event_cb(struct ble_gap_event *event, void *arg) { int status = BLE_HS_ENOERR; struct ble_gap_conn_desc desc; bool error = false; TLS_BT_APPL_TRACE_EVENT("ble_gap_event_cb : %s"NEW_LINE, tls_bt_gap_evt_2_str(event->type)); switch(event->type) { case BLE_GAP_EVENT_CONNECT: if(event->connect.status == BLE_HS_ENOERR) { if((status = ble_gap_conn_find(event->connect.conn_handle, &desc)) == BLE_HS_ENOERR) { print_conn_desc(&desc); if(desc.role == BLE_GAP_ROLE_SLAVE) { _ble_service_state = BLE_SERVICE_MODE_CONNECTED; usable_mtu = USABLE_DEFAULT_MTU; ble_device_conn_handle = event->connect.conn_handle; // We register an event callback on the connection, // this allows to be notified on the passkey action event if((status = ble_gap_set_event_cb(event->connect.conn_handle, &(ble_conn_gap_event_cb), NULL)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_set_event_cb %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } //We call the state change callback if registered if(_ble_service_state_change_cb)_ble_service_state_change_cb(_ble_service_state); if(ble_modem_is_sleeping())ble_modem_wake(); } else { error = true; if((status = ble_gap_terminate(event->connect.conn_handle, BLE_ERR_REM_USER_CONN_TERM)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_terminate %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } } } } else { error = true; } //Resume advertising : if(error) { TLS_BT_APPL_TRACE_VERBOSE("Remote device failed to connect, advertise again"NEW_LINE); if(!ble_service_advertise(true)) { _ble_service_state = BLE_SERVICE_MODE_IDLE; return BLE_HS_EUNKNOWN; } _ble_service_state = BLE_SERVICE_MODE_ADVERTISING; } break; case BLE_GAP_EVENT_DISCONNECT: if(event->disconnect.conn.role != BLE_GAP_ROLE_SLAVE) return 0; TLS_BT_APPL_TRACE_DEBUG("Server disconnect reason=%d[0x%02x],state=%s"NEW_LINE, event->disconnect.reason,event->disconnect.reason-0x200, ble_service_state_2_str(_ble_service_state)); // Don't forget to invalidate the connection handle : ble_device_conn_handle = BLE_HS_CONN_HANDLE_NONE; if(_ble_service_state == BLE_SERVICE_MODE_EXITING) { _ble_service_state = BLE_SERVICE_MODE_STOPPED; if((status = ble_gap_event_listener_unregister(&ble_gap_event_listener)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_event_listener_unregister %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } // We finally clean the gatt registered services if((status = ble_gatts_reset()) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gatts_reset %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } } else { // Let's advertise again TLS_BT_APPL_TRACE_VERBOSE("Service disconnect event, advertise again"NEW_LINE); if(!ble_service_advertise(true)) { _ble_service_state = BLE_SERVICE_MODE_IDLE; return BLE_HS_EUNKNOWN; } _ble_service_state = BLE_SERVICE_MODE_ADVERTISING; } //We call the state change callback if registered if(_ble_service_state_change_cb)_ble_service_state_change_cb(_ble_service_state); break; case BLE_GAP_EVENT_CONN_UPDATE: TLS_BT_APPL_TRACE_DEBUG("Conn update status : %s"NEW_LINE, tls_bt_rc_2_str(event->conn_update.status)); if((status = ble_gap_conn_find(event->connect.conn_handle, &desc)) == BLE_HS_ENOERR) { print_conn_desc(&desc); TLS_BT_APPL_TRACE_VERBOSE("ble_gap_security_initiate %s"NEW_LINE, tls_bt_rc_2_str(ble_gap_security_initiate(ble_device_conn_handle))); } else { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_conn_find %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } break; case BLE_GAP_EVENT_SUBSCRIBE: TLS_BT_APPL_TRACE_VERBOSE("Attr handle : %u"NEW_LINE "cur_indicate : %u"NEW_LINE "prev_indicate : %u"NEW_LINE "cur_notify : %u"NEW_LINE "prev_notify : %u"NEW_LINE, event->subscribe.attr_handle, event->subscribe.cur_indicate, event->subscribe.prev_indicate, event->subscribe.cur_notify, event->subscribe.prev_notify ); if(gatt_nus_char_tx_handle == event->subscribe.attr_handle) { if(event->subscribe.cur_notify || event->subscribe.cur_indicate) { //We call the state change callback if registered if(_ble_service_state_change_cb)_ble_service_state_change_cb(BLE_SERVICE_MODE_SUBSCRIBED); } else if(!event->subscribe.cur_notify && !event->subscribe.cur_indicate) { //We call the state change callback if registered if(_ble_service_state_change_cb)_ble_service_state_change_cb(BLE_SERVICE_MODE_UNSUBSCRIBED); } } break; case BLE_GAP_EVENT_MTU: TLS_BT_APPL_TRACE_VERBOSE("MTU update : %u"NEW_LINE, event->mtu.value); usable_mtu = event->mtu.value - 3; break; case BLE_GAP_EVENT_NOTIFY_TX: if(event->notify_tx.indication == 0) // Notification { TLS_BT_APPL_TRACE_VERBOSE("Type : notification"NEW_LINE); if(event->notify_tx.status != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_WARNING("%s, notify_tx notification error %d, transfer in progress : %u"NEW_LINE, __FUNCTION__, event->notify_tx.status, notification_data.transfer_in_progress); reset_data_being_sent(¬ification_data); return BLE_HS_EUNKNOWN; } TLS_BT_APPL_TRACE_DEBUG("transfer : %u"NEW_LINE"length : %u"NEW_LINE"offset : %u"NEW_LINE, notification_data.transfer_in_progress, notification_data.length, notification_data.offset); // We update the offset : notification_data.offset += notification_data.sent_chunk_size; if(notification_data.offset < notification_data.length) // Still data to send ? { if(!ble_service_send_custom_notification(event->notify_tx.attr_handle, ¬ification_data)) { TLS_BT_APPL_TRACE_ERROR("Failed to send next notification chunk, aborting"NEW_LINE); reset_data_being_sent(¬ification_data); return BLE_HS_EUNKNOWN; } } else { TLS_BT_APPL_TRACE_VERBOSE("last data chunk sent, end of the transfer"NEW_LINE); // All data have been sent, end of the transfer reset_data_being_sent(¬ification_data); } } else // Indication { TLS_BT_APPL_TRACE_WARNING("Indication not yet handled"NEW_LINE); } break; default: TLS_BT_APPL_TRACE_WARNING("unhandled event !"NEW_LINE); } return BLE_HS_ENOERR; } static int ble_advertise_gap_event_cb(struct ble_gap_event *event, void *arg) { return BLE_HS_ENOERR; } static int ble_conn_gap_event_cb(struct ble_gap_event *event, void *arg) { int status = BLE_HS_ENOERR; struct ble_gap_conn_desc desc; TLS_BT_APPL_TRACE_EVENT("%s : %s"NEW_LINE, __FUNCTION__, tls_bt_gap_evt_2_str(event->type)); switch(event->type) { case BLE_GAP_EVENT_PASSKEY_ACTION: TLS_BT_APPL_TRACE_VERBOSE("conn_handle : %u"NEW_LINE "action : %s"NEW_LINE, event->passkey.conn_handle, tls_bt_sm_ioact_2_str(event->passkey.params.action)); if(BLE_SM_IOACT_NUMCMP == event->passkey.params.action) { TLS_BT_APPL_TRACE_VERBOSE("numcmp : %u"NEW_LINE, event->passkey.params.numcmp); } struct ble_sm_io sm_io = { .action = BLE_SM_IOACT_DISP, .passkey = _pairing_passkey, }; if((status = ble_sm_inject_io(event->passkey.conn_handle, &sm_io)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_sm_inject_io %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } break; case BLE_GAP_EVENT_CONN_UPDATE: TLS_BT_APPL_TRACE_DEBUG("Conn update status : %s"NEW_LINE, tls_bt_rc_2_str(event->conn_update.status)); if((status = ble_gap_conn_find(event->connect.conn_handle, &desc)) == BLE_HS_ENOERR) { print_conn_desc(&desc); } else { TLS_BT_APPL_TRACE_WARNING("%s, ble_gap_conn_find %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } break; case BLE_GAP_EVENT_ENC_CHANGE: TLS_BT_APPL_TRACE_DEBUG("Enc change status : (%u) -> %s"NEW_LINE, event->enc_change.status, tls_bt_rc_2_str(event->enc_change.status)); break; case BLE_GAP_EVENT_REPEAT_PAIRING: { // If this event is triggered, then we shall remove the device from the bonded device list // and tell it to pair again. uint16_t conn_handle = event->repeat_pairing.conn_handle; TLS_BT_APPL_TRACE_VERBOSE("conn_handle : %u"NEW_LINE "cur_key_size : %u"NEW_LINE "cur_authenticated : %u"NEW_LINE "cur_sc : %u"NEW_LINE "new_key_size : %u"NEW_LINE "new_authenticated : %u"NEW_LINE "new_sc : %u"NEW_LINE "new_bonding : %u"NEW_LINE, event->repeat_pairing.conn_handle, event->repeat_pairing.cur_key_size, event->repeat_pairing.cur_authenticated, event->repeat_pairing.cur_sc, event->repeat_pairing.new_key_size, event->repeat_pairing.new_authenticated, event->repeat_pairing.new_sc, event->repeat_pairing.new_bonding); if((status = ble_gap_conn_find(conn_handle, &desc)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_conn_find %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return status; } TLS_BT_APPL_TRACE_VERBOSE("sec_state_encrypted : %u"NEW_LINE "sec_state_authenticated : %u"NEW_LINE "sec_state_bonded : %u"NEW_LINE "sec_state_key_size : %u"NEW_LINE "our_id_addr(%u) : %02X:%02X:%02X:%02X:%02X:%02X"NEW_LINE "our_ota_addr(%u) : %02X:%02X:%02X:%02X:%02X:%02X"NEW_LINE "peer_id_addr(%u) : %02X:%02X:%02X:%02X:%02X:%02X"NEW_LINE "peer_ota_addr(%u) : %02X:%02X:%02X:%02X:%02X:%02X"NEW_LINE, desc.sec_state.encrypted, desc.sec_state.authenticated, desc.sec_state.bonded, desc.sec_state.key_size, desc.our_id_addr.type, desc.our_id_addr.val[5], desc.our_id_addr.val[4], desc.our_id_addr.val[3], desc.our_id_addr.val[2], desc.our_id_addr.val[1], desc.our_id_addr.val[0], desc.our_ota_addr.type, desc.our_ota_addr.val[5], desc.our_ota_addr.val[4], desc.our_ota_addr.val[3], desc.our_ota_addr.val[2], desc.our_ota_addr.val[1], desc.our_ota_addr.val[0], desc.peer_id_addr.type, desc.peer_id_addr.val[5], desc.peer_id_addr.val[4], desc.peer_id_addr.val[3], desc.peer_id_addr.val[2], desc.peer_id_addr.val[1], desc.peer_id_addr.val[0], desc.peer_ota_addr.type, desc.peer_ota_addr.val[5], desc.peer_ota_addr.val[4], desc.peer_ota_addr.val[3], desc.peer_ota_addr.val[2], desc.peer_ota_addr.val[1], desc.peer_ota_addr.val[0]); if((status = ble_gap_unpair(&desc.peer_id_addr)) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, ble_gap_unpair %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); return status; } return BLE_GAP_REPEAT_PAIRING_RETRY; } break; default: TLS_BT_APPL_TRACE_WARNING("unhandled event !"NEW_LINE); } return BLE_HS_ENOERR; } static int battery_level_char_access_cb(uint16_t conn_handle, uint16_t attr_handle, struct ble_gatt_access_ctxt *ctxt, void *arg) { int status = BLE_HS_ENOERR; TLS_BT_APPL_TRACE_EVENT("battery_level_char_access_cb op : %s"NEW_LINE, tls_bt_access_opt_2_str(ctxt->op)); switch(ctxt->op) { case BLE_GATT_ACCESS_OP_READ_CHR: if(attr_handle == battery_level_char_handle) { TLS_BT_APPL_TRACE_VERBOSE("battery level reading"NEW_LINE); if((status = os_mbuf_append(ctxt->om, &_battery_level_value, sizeof(_battery_level_value))) != BLE_HS_ENOERR) { TLS_BT_APPL_TRACE_ERROR("%s, battery level os_mbuf : %s"NEW_LINE, __FUNCTION__, tls_bt_rc_2_str(status)); } } break; default: TLS_BT_APPL_TRACE_WARNING("unhandled operation !"NEW_LINE); } return BLE_HS_ENOERR; } static int gatt_nus_char_access_cb(uint16_t conn_handle, uint16_t attr_handle, struct ble_gatt_access_ctxt *ctxt, void *arg) { //TLS_BT_APPL_TRACE_EVENT("gatt_nus_char_access_cb op : %s"NEW_LINE, tls_bt_access_opt_2_str(ctxt->op)); switch(ctxt->op) { case BLE_GATT_ACCESS_OP_WRITE_CHR: { if(ble_modem_is_sleeping())ble_modem_wake(); struct os_mbuf *om_buf = ctxt->om; while(om_buf) { // Call the nus rx cb function if one is registered if(_ble_service_nus_data_rx_cb) _ble_service_nus_data_rx_cb(om_buf->om_data, om_buf->om_len); om_buf = SLIST_NEXT(om_buf, om_next); } } break; default: TLS_BT_APPL_TRACE_WARNING("unhandled operation !"NEW_LINE); } return BLE_HS_ENOERR; } static void print_conn_desc(const struct ble_gap_conn_desc *desc) { TLS_BT_APPL_TRACE_VERBOSE("conn_handle : %u"NEW_LINE"conn_itvl : %u"NEW_LINE"conn_latency : %u"NEW_LINE"master_clock_accuracy : %u"NEW_LINE"role : %s"NEW_LINE"supervision_timeout : %u"NEW_LINE "encrypted : %u"NEW_LINE"authenticated : %u"NEW_LINE"bonded : %u"NEW_LINE, desc->conn_handle, desc->conn_itvl, desc->conn_latency, desc->master_clock_accuracy, desc->role == BLE_GAP_ROLE_MASTER ? "MASTER" : "SLAVE", desc->supervision_timeout, desc->sec_state.encrypted, desc->sec_state.authenticated, desc->sec_state.bonded); } static void reset_data_being_sent(data_being_sent_t * const data) { if(data) { memset(data, 0, sizeof(data_being_sent_t)); } }