/****************************************************************************** * * Copyright (C) 2009-2012 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ #include #include #include "bta/bta_api.h" #include "bta/bta_sys.h" #include "bta/bta_dm_co.h" #include "bta/bta_dm_ci.h" #include "btc/btc_dm.h" #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) #include "common/bt_defs.h" #if (BTM_OOB_INCLUDED == TRUE) #include "btif_dm.h" #endif #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE && SMP_INCLUDED == TRUE) #include "common/bte_appl.h" #define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE 0 #define BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE 1 #define BTM_BLE_OOB_DISABLE 0 #define BTM_BLE_OOB_ENABLE 1 tBTE_APPL_CFG bte_appl_cfg = { #if SMP_INCLUDED == TRUE BTA_LE_AUTH_REQ_SC_MITM_BOND, // Authentication requirements #else BTM_AUTH_SPGB_YES, // Authentication requirements #endif BTM_LOCAL_IO_CAPS_BLE, BTM_BLE_INITIATOR_KEY_SIZE, BTM_BLE_RESPONDER_KEY_SIZE, BTM_BLE_MAX_KEY_SIZE, BTM_BLE_MIN_KEY_SIZE, BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_DISABLE, BTM_BLE_OOB_DISABLE, }; #endif #if (defined CLASSIC_BT_INCLUDED && CLASSIC_BT_INCLUDED == TRUE) #include "btm_int.h" #endif /******************************************************************************* ** ** Function bta_dm_co_get_compress_memory ** ** Description This callout function is executed by DM to get memory for compression ** Parameters id - BTA SYS ID ** memory_p - memory return by callout ** memory_size - memory size ** ** Returns TRUE for success, FALSE for fail. ** *******************************************************************************/ BOOLEAN bta_dm_co_get_compress_memory(tBTA_SYS_ID id, UINT8 **memory_p, UINT32 *memory_size) { UNUSED(id); UNUSED(memory_p); UNUSED(memory_size); return TRUE; } /******************************************************************************* ** ** Function bta_dm_co_bt_set_io_cap ** ** Description This function is used to set IO capabilities ** ** Parameters bt_io_cap - IO capabilities ** ** @return - ESP_BT_STATUS_SUCCESS : success ** - other : failed ** *******************************************************************************/ #if (CLASSIC_BT_INCLUDED == TRUE) esp_err_t bta_dm_co_bt_set_io_cap(UINT8 bt_io_cap) { esp_err_t ret = ESP_BT_STATUS_SUCCESS; if(bt_io_cap < BTM_IO_CAP_MAX ) { btm_cb.devcb.loc_io_caps = bt_io_cap; ret = ESP_BT_STATUS_SUCCESS; } else { ret = ESP_BT_STATUS_FAIL; APPL_TRACE_ERROR("%s error:Invalid io cap value.",__func__); } return ret; } #endif /* (CLASSIC_BT_INCLUDED == TRUE) */ /******************************************************************************* ** ** Function bta_dm_co_io_req ** ** Description This callout function is executed by DM to get IO capabilities ** of the local device for the Simple Pairing process ** ** Parameters bd_addr - The peer device ** *p_io_cap - The local Input/Output capabilities ** *p_oob_data - TRUE, if OOB data is available for the peer device. ** *p_auth_req - TRUE, if MITM protection is required. ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_AUTH_REQ *p_auth_req, BOOLEAN is_orig) { UNUSED(bd_addr); #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) #if (BTM_OOB_INCLUDED == TRUE) btif_dm_set_oob_for_io_req(p_oob_data); #endif btif_dm_proc_io_req(bd_addr, p_io_cap, p_oob_data, p_auth_req, is_orig); #else BTIF_TRACE_DEBUG("bta_dm_co_io_req: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_oob_data = %d", *p_oob_data); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_io_cap = %d", *p_io_cap); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_auth_req = %d", *p_auth_req); BTIF_TRACE_DEBUG("bta_dm_co_io_req is_orig = %d", is_orig); } /******************************************************************************* ** ** Function bta_dm_co_io_rsp ** ** Description This callout function is executed by DM to report IO capabilities ** of the peer device for the Simple Pairing process ** ** Parameters bd_addr - The peer device ** io_cap - The remote Input/Output capabilities ** oob_data - TRUE, if OOB data is available for the peer device. ** auth_req - TRUE, if MITM protection is required. ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_io_rsp(BD_ADDR bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); #else BTIF_TRACE_DEBUG("bta_dm_co_io_rsp: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ } /******************************************************************************* ** ** Function bta_dm_co_lk_upgrade ** ** Description This callout function is executed by DM to check if the ** platform wants allow link key upgrade ** ** Parameters bd_addr - The peer device ** *p_upgrade - TRUE, if link key upgrade is desired. ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_lk_upgrade(BD_ADDR bd_addr, BOOLEAN *p_upgrade ) { UNUSED(bd_addr); UNUSED(p_upgrade); } #if (BTM_OOB_INCLUDED == TRUE) /******************************************************************************* ** ** Function bta_dm_co_loc_oob ** ** Description This callout function is executed by DM to report the OOB ** data of the local device for the Simple Pairing process ** ** Parameters valid - TRUE, if the local OOB data is retrieved from LM ** c - Simple Pairing Hash C ** r - Simple Pairing Randomnizer R ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_loc_oob(BOOLEAN valid, BT_OCTET16 c, BT_OCTET16 r) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) BTIF_TRACE_DEBUG("bta_dm_co_loc_oob, valid = %d", valid); #ifdef BTIF_DM_OOB_TEST btif_dm_proc_loc_oob(valid, c, r); #endif #else BTIF_TRACE_DEBUG("bta_dm_co_loc_oob: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ } /******************************************************************************* ** ** Function bta_dm_co_rmt_oob ** ** Description This callout function is executed by DM to request the OOB ** data for the remote device for the Simple Pairing process ** Need to call bta_dm_ci_rmt_oob() in response ** ** Parameters bd_addr - The peer device ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_rmt_oob(BD_ADDR bd_addr) { BT_OCTET16 p_c = {0}; BT_OCTET16 p_r = {0}; BOOLEAN result = FALSE; #ifdef BTIF_DM_OOB_TEST #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) result = btif_dm_proc_rmt_oob(bd_addr, p_c, p_r); #else BTIF_TRACE_DEBUG("bta_dm_rmt_oob: func not ported\n"); #endif /* #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) */ #endif BTIF_TRACE_DEBUG("bta_dm_co_rmt_oob: result=%d", result); bta_dm_ci_rmt_oob(result, bd_addr, p_c, p_r); } #endif /* BTM_OOB_INCLUDED */ // REMOVE FOR BLUEDROID ? #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE) /******************************************************************************* ** ** Function bta_dm_co_le_io_key_req ** ** Description This callout function is executed by DM to get BLE key information ** before SMP pairing gets going. ** ** Parameters bd_addr - The peer device ** *p_max_key_size - max key size local device supported. ** *p_init_key - initiator keys. ** *p_resp_key - responder keys. ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_le_io_key_req(BD_ADDR bd_addr, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) { UNUSED(bd_addr); #if (SMP_INCLUDED == TRUE) BTIF_TRACE_DEBUG("##################################"); BTIF_TRACE_DEBUG("bta_dm_co_le_io_key_req: only setting max size to 16"); BTIF_TRACE_DEBUG("##################################"); *p_max_key_size = 16; *p_init_key = *p_resp_key = (BTA_LE_KEY_PENC | BTA_LE_KEY_PID | BTA_LE_KEY_PCSRK | BTA_LE_KEY_LENC | BTA_LE_KEY_LID | BTA_LE_KEY_LCSRK); #endif ///SMP_INCLUDED == TRUE } /******************************************************************************* ** ** Function bta_dm_co_ble_local_key_reload ** ** Description This callout function is to load the local BLE keys if available ** on the device. ** ** Parameters none ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_ble_load_local_keys(tBTA_DM_BLE_LOCAL_KEY_MASK *p_key_mask, BT_OCTET16 er, tBTA_BLE_LOCAL_ID_KEYS *p_id_keys) { #if (defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE) BTIF_TRACE_DEBUG("##################################"); BTIF_TRACE_DEBUG("bta_dm_co_ble_load_local_keys: Load local keys if any are persisted"); BTIF_TRACE_DEBUG("##################################"); btif_dm_get_ble_local_keys( p_key_mask, er, p_id_keys); #endif ///defined(BTIF_INCLUDED) && BTIF_INCLUDED == TRUE #if (SMP_INCLUDED == TRUE) btc_dm_get_ble_local_keys( p_key_mask, er, p_id_keys); #endif ///SMP_INCLUDED == TRUE } /******************************************************************************* ** ** Function bta_dm_co_ble_io_req ** ** Description This callout function is executed by DM to get BLE IO capabilities ** before SMP pairing gets going. ** ** Parameters bd_addr - The peer device ** *p_io_cap - The local Input/Output capabilities ** *p_oob_data - TRUE, if OOB data is available for the peer device. ** *p_auth_req - Auth request setting (Bonding and MITM required or not) ** *p_max_key_size - max key size local device supported. ** *p_init_key - initiator keys. ** *p_resp_key - responder keys. ** ** Returns void. ** *******************************************************************************/ void bta_dm_co_ble_io_req(BD_ADDR bd_addr, tBTA_IO_CAP *p_io_cap, tBTA_OOB_DATA *p_oob_data, tBTA_LE_AUTH_REQ *p_auth_req, UINT8 *p_max_key_size, tBTA_LE_KEY_TYPE *p_init_key, tBTA_LE_KEY_TYPE *p_resp_key ) { #if (SMP_INCLUDED == TRUE) UNUSED(bd_addr); /* if OOB is not supported, this call-out function does not need to do anything * otherwise, look for the OOB data associated with the address and set *p_oob_data accordingly * If the answer can not be obtained right away, * set *p_oob_data to BTA_OOB_UNKNOWN and call bta_dm_ci_io_req() when the answer is available */ *p_oob_data = bte_appl_cfg.oob_support; /* *p_auth_req by default is FALSE for devices with NoInputNoOutput; TRUE for other devices. */ *p_auth_req = bte_appl_cfg.ble_auth_req | (bte_appl_cfg.ble_auth_req & BTA_LE_AUTH_REQ_MITM) | ((*p_auth_req) & BTA_LE_AUTH_REQ_MITM); if (bte_appl_cfg.ble_io_cap <= 4) { *p_io_cap = bte_appl_cfg.ble_io_cap; } if (bte_appl_cfg.ble_init_key <= BTM_BLE_INITIATOR_KEY_SIZE) { *p_init_key = bte_appl_cfg.ble_init_key; } if (bte_appl_cfg.ble_resp_key <= BTM_BLE_RESPONDER_KEY_SIZE) { *p_resp_key = bte_appl_cfg.ble_resp_key; } if (bte_appl_cfg.ble_max_key_size > 7 && bte_appl_cfg.ble_max_key_size <= 16) { *p_max_key_size = bte_appl_cfg.ble_max_key_size; } #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_io_cap(UINT8 ble_io_cap) { #if (SMP_INCLUDED == TRUE) if(ble_io_cap < BTM_IO_CAP_MAX ) { bte_appl_cfg.ble_io_cap = ble_io_cap; } else { APPL_TRACE_ERROR("%s error:Invalid io cap value.",__func__); } #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_auth_req(UINT8 ble_auth_req) { #if (SMP_INCLUDED == TRUE) bte_appl_cfg.ble_auth_req = ble_auth_req; #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_init_key_req(UINT8 init_key) { #if (SMP_INCLUDED == TRUE) init_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit bte_appl_cfg.ble_init_key = init_key; #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_rsp_key_req(UINT8 rsp_key) { #if (SMP_INCLUDED == TRUE) rsp_key &= 0x0f; // 4~7bit reservd, only used the 0~3bit bte_appl_cfg.ble_resp_key = rsp_key; #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_max_key_size(UINT8 ble_key_size) { #if (SMP_INCLUDED == TRUE) if(ble_key_size >= bte_appl_cfg.ble_min_key_size && ble_key_size <= BTM_BLE_MAX_KEY_SIZE) { bte_appl_cfg.ble_max_key_size = ble_key_size; } else { APPL_TRACE_ERROR("%s error:Invalid key size value, key_size =%d",__func__, ble_key_size); } #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_min_key_size(UINT8 ble_key_size) { #if (SMP_INCLUDED == TRUE) if(ble_key_size >= BTM_BLE_MIN_KEY_SIZE && ble_key_size <= bte_appl_cfg.ble_max_key_size) { bte_appl_cfg.ble_min_key_size = ble_key_size; } else { APPL_TRACE_ERROR("%s error:Invalid key size value, key_size =%d",__func__, ble_key_size); } #endif ///SMP_INCLUDED == TRUE } void bta_dm_co_ble_set_accept_auth_enable(UINT8 enable) { #if (SMP_INCLUDED == TRUE) if (enable) { enable = BTM_BLE_ONLY_ACCEPT_SPECIFIED_SEC_AUTH_ENABLE; } bte_appl_cfg.ble_accept_auth_enable = enable; #endif ///SMP_INCLUDED == TRUE } UINT8 bta_dm_co_ble_get_accept_auth_enable(void) { #if (SMP_INCLUDED == TRUE) return bte_appl_cfg.ble_accept_auth_enable; #endif ///SMP_INCLUDED == TRUE return 0; } UINT8 bta_dm_co_ble_get_auth_req(void) { #if (SMP_INCLUDED == TRUE) return bte_appl_cfg.ble_auth_req; #endif ///SMP_INCLUDED == TRUE return 0; } void bta_dm_co_ble_oob_support(UINT8 enable) { #if (SMP_INCLUDED == TRUE) if (enable) { bte_appl_cfg.oob_support = BTM_BLE_OOB_ENABLE; } else { bte_appl_cfg.oob_support = BTM_BLE_OOB_DISABLE; } #endif ///SMP_INCLUDED == TRUE } #endif