2022-08-15 04:20:27 -05:00
|
|
|
/***************************************************************************
|
|
|
|
*
|
|
|
|
* Copyright 2015-2019 BES.
|
|
|
|
* All rights reserved. All unpublished rights reserved.
|
|
|
|
*
|
|
|
|
* No part of this work may be used or reproduced in any form or by any
|
|
|
|
* means, or stored in a database or retrieval system, without prior written
|
|
|
|
* permission of BES.
|
|
|
|
*
|
|
|
|
* Use of this work is governed by a license granted by BES.
|
|
|
|
* This work contains confidential and proprietary information of
|
|
|
|
* BES. which is protected by copyright, trade secret,
|
|
|
|
* trademark and other intellectual property rights.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
/**
|
|
|
|
****************************************************************************************
|
|
|
|
* @addtogroup APP
|
|
|
|
* @{
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* INCLUDE FILES
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "rwip_config.h"
|
|
|
|
|
|
|
|
#if (BLE_APP_SEC)
|
|
|
|
|
|
|
|
#include "co_math.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "gap.h" // GAP Definition
|
|
|
|
#include "gapc.h" // GAPC Definition
|
|
|
|
#include "gapc_task.h" // GAP Controller Task API Definition
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "prf_types.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include <string.h>
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app.h" // Application API Definition
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "app_ble_include.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_sec.h" // Application Security API Definition
|
|
|
|
#include "app_task.h" // Application Manager API Definition
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#if (DISPLAY_SUPPORT)
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_display.h" // Display Application Definitions
|
|
|
|
#endif //(DISPLAY_SUPPORT)
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#if (NVDS_SUPPORT)
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "nvds.h" // NVDS API Definitions
|
|
|
|
#endif //(NVDS_SUPPORT)
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef BLE_APP_AM0
|
|
|
|
#include "am0_app.h"
|
|
|
|
#endif // BLE_APP_AM0
|
|
|
|
|
|
|
|
#if (BLE_APP_ANCC)
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_ancc.h" // ANC Module Definition
|
|
|
|
#endif // (BLE_APP_ANCC)
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#if (BLE_APP_AMS)
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_amsc.h" // AMS Module Definition
|
|
|
|
#endif // (BLE_APP_AMS)
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#include "app_gfps.h"
|
|
|
|
#include "nvrecord_ble.h"
|
|
|
|
#include "nvrecord_extension.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "tgt_hardware.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef _BLE_NVDS_
|
|
|
|
#define BLE_KEY_PRINT
|
|
|
|
BleDeviceinfo ble_save_info;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef TWS_SYSTEM_ENABLED
|
|
|
|
#include "app_tws_if.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GLOBAL VARIABLE DEFINITIONS
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
|
|
|
|
|
|
|
/// Application Security Environment Structure
|
|
|
|
struct app_sec_env_tag app_sec_env;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GLOBAL FUNCTION DEFINITIONS
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void app_sec_init(void) {
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
if (nv_record_ble_record_Once_a_device_has_been_bonded()) {
|
|
|
|
app_sec_env.bonded = true;
|
|
|
|
} else {
|
|
|
|
app_sec_env.bonded = false;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
TRACE(2, "[%s] once bonded:%d", __func__, app_sec_env.bonded);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
bool app_sec_get_bond_status(void) { return app_sec_env.bonded; }
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void app_sec_send_security_req(uint8_t conidx, enum gap_auth authority) {
|
|
|
|
// Send security request
|
|
|
|
struct gapc_security_cmd *cmd =
|
|
|
|
KE_MSG_ALLOC(GAPC_SECURITY_CMD, KE_BUILD_ID(TASK_GAPC, conidx), TASK_APP,
|
|
|
|
gapc_security_cmd);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
cmd->operation = GAPC_SECURITY_REQ;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
cmd->auth = authority;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// Send the message
|
|
|
|
ke_msg_send(cmd);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* MESSAGE HANDLERS
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int gapc_bond_req_ind_handler(ke_msg_id_t const msgid,
|
|
|
|
struct gapc_bond_req_ind const *param,
|
|
|
|
ke_task_id_t const dest_id,
|
2023-02-01 14:52:54 -06:00
|
|
|
ke_task_id_t const src_id) {
|
|
|
|
TRACE(1, "Get bond req %d", param->request);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// Prepare the GAPC_BOND_CFM message
|
|
|
|
struct gapc_bond_cfm *cfm =
|
|
|
|
KE_MSG_ALLOC(GAPC_BOND_CFM, src_id, TASK_APP, gapc_bond_cfm);
|
|
|
|
|
|
|
|
switch (param->request) {
|
|
|
|
case (GAPC_PAIRING_REQ): {
|
|
|
|
cfm->request = GAPC_PAIRING_RSP;
|
|
|
|
|
|
|
|
cfm->accept = true;
|
|
|
|
|
|
|
|
cfm->data.pairing_feat.auth = BLE_AUTHENTICATION_LEVEL;
|
|
|
|
|
|
|
|
#if (BLE_APP_GFPS)
|
|
|
|
cfm->data.pairing_feat.iocap = GAP_IO_CAP_DISPLAY_YES_NO;
|
|
|
|
#else
|
|
|
|
cfm->data.pairing_feat.iocap = GAP_IO_CAP_NO_INPUT_NO_OUTPUT;
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
cfm->data.pairing_feat.key_size = 16;
|
|
|
|
cfm->data.pairing_feat.oob = GAP_OOB_AUTH_DATA_NOT_PRESENT;
|
|
|
|
#if (BLE_APP_GFPS)
|
|
|
|
cfm->data.pairing_feat.sec_req = GAP_SEC1_SEC_CON_PAIR_ENC;
|
|
|
|
#else
|
|
|
|
cfm->data.pairing_feat.sec_req = GAP_SEC1_NOAUTH_PAIR_ENC;
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
|
|
|
|
cfm->data.pairing_feat.ikey_dist =
|
|
|
|
GAP_KDIST_ENCKEY | GAP_KDIST_IDKEY | GAP_KDIST_LINKKEY;
|
|
|
|
cfm->data.pairing_feat.rkey_dist =
|
|
|
|
GAP_KDIST_ENCKEY | GAP_KDIST_IDKEY | GAP_KDIST_LINKKEY;
|
|
|
|
} break;
|
|
|
|
|
|
|
|
case (GAPC_LTK_EXCH): {
|
|
|
|
// Counter
|
|
|
|
uint8_t counter;
|
|
|
|
|
|
|
|
cfm->accept = true;
|
|
|
|
cfm->request = GAPC_LTK_EXCH;
|
|
|
|
|
|
|
|
// Generate all the values
|
|
|
|
cfm->data.ltk.ediv = (uint16_t)co_rand_word();
|
|
|
|
|
|
|
|
for (counter = 0; counter < RAND_NB_LEN; counter++) {
|
|
|
|
cfm->data.ltk.randnb.nb[counter] = (uint8_t)co_rand_word();
|
|
|
|
}
|
|
|
|
|
|
|
|
for (counter = 0; counter < GAP_KEY_LEN; counter++) {
|
|
|
|
cfm->data.ltk.ltk.key[counter] = (uint8_t)co_rand_word();
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
#ifdef _BLE_NVDS_
|
|
|
|
#ifdef BLE_KEY_PRINT
|
|
|
|
TRACE(0, "<==============>LTK IS:");
|
|
|
|
DUMP8("%02x ", (uint8_t *)&cfm->data.ltk, 16);
|
|
|
|
TRACE(1, "<==============>EDIV IS: %04x:", cfm->data.ltk.ediv);
|
|
|
|
TRACE(0, "<==============>RANDOM IS:");
|
|
|
|
DUMP8("%02x ", (uint8_t *)&cfm->data.ltk.randnb.nb, 8);
|
|
|
|
#endif
|
|
|
|
ble_save_info.EDIV = cfm->data.ltk.ediv;
|
|
|
|
memcpy(&ble_save_info.RANDOM, (uint8_t *)&cfm->data.ltk.randnb.nb, 8);
|
|
|
|
memcpy(&ble_save_info.LTK, (uint8_t *)&cfm->data.ltk, 16);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
ble_save_info.bonded = false;
|
|
|
|
#endif
|
|
|
|
} break;
|
|
|
|
|
|
|
|
case (GAPC_IRK_EXCH): {
|
|
|
|
cfm->accept = true;
|
|
|
|
cfm->request = GAPC_IRK_EXCH;
|
|
|
|
|
|
|
|
// Load IRK
|
|
|
|
memcpy(cfm->data.irk.irk.key, app_env.loc_irk, KEY_LEN);
|
|
|
|
// load identity ble address
|
|
|
|
memcpy(cfm->data.irk.addr.addr.addr, ble_addr, BLE_ADDR_SIZE);
|
|
|
|
cfm->data.irk.addr.addr_type = ADDR_PUBLIC;
|
|
|
|
} break;
|
|
|
|
case (GAPC_TK_EXCH): {
|
|
|
|
// Generate a PIN Code- (Between 100000 and 999999)
|
|
|
|
uint32_t pin_code = (100000 + (co_rand_word() % 900000));
|
|
|
|
|
|
|
|
cfm->accept = true;
|
|
|
|
cfm->request = GAPC_TK_EXCH;
|
|
|
|
|
|
|
|
// Set the TK value
|
|
|
|
memset(cfm->data.tk.key, 0, KEY_LEN);
|
|
|
|
|
|
|
|
cfm->data.tk.key[0] = (uint8_t)((pin_code & 0x000000FF) >> 0);
|
|
|
|
cfm->data.tk.key[1] = (uint8_t)((pin_code & 0x0000FF00) >> 8);
|
|
|
|
cfm->data.tk.key[2] = (uint8_t)((pin_code & 0x00FF0000) >> 16);
|
|
|
|
cfm->data.tk.key[3] = (uint8_t)((pin_code & 0xFF000000) >> 24);
|
|
|
|
} break;
|
|
|
|
case GAPC_NC_EXCH:
|
|
|
|
cfm->accept = true;
|
|
|
|
cfm->request = GAPC_NC_EXCH;
|
|
|
|
break;
|
|
|
|
default: {
|
|
|
|
ASSERT_ERR(0);
|
|
|
|
} break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send the message
|
|
|
|
ke_msg_send(cfm);
|
|
|
|
|
|
|
|
return (KE_MSG_CONSUMED);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void app_sec_reset_env_on_connection(void) {
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
memset(&ble_save_info, 0, sizeof(BleDeviceinfo));
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static int gapc_bond_ind_handler(ke_msg_id_t const msgid,
|
|
|
|
struct gapc_bond_ind const *param,
|
|
|
|
ke_task_id_t const dest_id,
|
2023-02-01 14:52:54 -06:00
|
|
|
ke_task_id_t const src_id) {
|
|
|
|
uint8_t conidx = KE_IDX_GET(src_id);
|
|
|
|
switch (param->info) {
|
|
|
|
case (GAPC_PAIRING_SUCCEED): {
|
|
|
|
TRACE(0, "GAPC_PAIRING_SUCCEED");
|
|
|
|
// Update the bonding status in the environment
|
|
|
|
app_sec_env.bonded = true;
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
ble_save_info.bonded = true;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (!nv_record_blerec_add(&ble_save_info)) {
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef TWS_SYSTEM_ENABLED
|
2023-02-01 14:52:54 -06:00
|
|
|
app_ble_sync_ble_info();
|
|
|
|
TRACE(0, "BLE NVDS SETUP SUCCESS!!!,the key is the newest");
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case (GAPC_REPEATED_ATTEMPT): {
|
|
|
|
appm_disconnect(conidx);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case (GAPC_IRK_EXCH): {
|
|
|
|
TRACE(0, "Peer device IRK is:");
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
DUMP8("%02x ", param->data.irk.irk.key, BLE_IRK_SIZE);
|
|
|
|
DUMP8("%02x ", (uint8_t *)&(param->data.irk.addr), BLE_ADDR_SIZE + 1);
|
|
|
|
app_env.context[conidx].isBdAddrResolvingInProgress = false;
|
|
|
|
app_env.context[conidx].isGotSolvedBdAddr = true;
|
|
|
|
memcpy(app_env.context[conidx].solvedBdAddr, param->data.irk.addr.addr.addr,
|
|
|
|
BLE_ADDR_SIZE);
|
|
|
|
memcpy(ble_save_info.IRK, param->data.irk.irk.key, BLE_IRK_SIZE);
|
|
|
|
memcpy(ble_save_info.peer_bleAddr, param->data.irk.addr.addr.addr,
|
|
|
|
BLE_ADDR_SIZE);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
app_exchange_remote_feature(conidx);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case (GAPC_PAIRING_FAILED): {
|
|
|
|
TRACE(1, "GAPC_PAIRING_FAILED!!! Error code 0x%x", param->data.reason);
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
nv_record_ble_delete_entry(app_env.context[conidx].solvedBdAddr);
|
|
|
|
app_sec_env.bonded = false;
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case GAPC_LTK_EXCH: {
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef _BLE_NVDS_
|
2023-02-01 14:52:54 -06:00
|
|
|
TRACE(1, "isLocal %d", param->data.ltk.isLocal);
|
|
|
|
TRACE(0, "Peer device LTK is:");
|
|
|
|
|
|
|
|
DUMP8("%02x ", param->data.ltk.ltk.key, BLE_LTK_SIZE);
|
|
|
|
TRACE(1, "EDIV %04x ", param->data.ltk.ediv);
|
|
|
|
TRACE(0, "Peer device random number is:");
|
|
|
|
DUMP8("%02x ", param->data.ltk.randnb.nb, BLE_ENC_RANDOM_SIZE);
|
|
|
|
|
|
|
|
if (param->data.ltk.isLocal) {
|
|
|
|
ble_save_info.EDIV = param->data.ltk.ediv;
|
|
|
|
memcpy(&ble_save_info.RANDOM, (uint8_t *)¶m->data.ltk.randnb.nb,
|
|
|
|
BLE_ENC_RANDOM_SIZE);
|
|
|
|
memcpy(&ble_save_info.LTK, (uint8_t *)¶m->data.ltk, BLE_LTK_SIZE);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
|
|
|
ASSERT_ERR(0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (KE_MSG_CONSUMED);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static int gapc_encrypt_req_ind_handler(
|
|
|
|
ke_msg_id_t const msgid, struct gapc_encrypt_req_ind const *param,
|
|
|
|
ke_task_id_t const dest_id, ke_task_id_t const src_id) {
|
|
|
|
TRACE(1, "%s, master ask for LTK TO encrypt!!!!", __FUNCTION__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
uint8_t conidx = KE_IDX_GET(src_id);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
appm_check_and_resolve_ble_address(conidx);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (!app_env.context[conidx].isGotSolvedBdAddr) {
|
|
|
|
return (KE_MSG_SAVED);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
TRACE(0, "Random ble address solved. Can rsp enc req.");
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// Prepare the GAPC_ENCRYPT_CFM message
|
|
|
|
struct gapc_encrypt_cfm *cfm =
|
|
|
|
KE_MSG_ALLOC(GAPC_ENCRYPT_CFM, src_id, TASK_APP, gapc_encrypt_cfm);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
cfm->found = false;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef _BLE_NVDS_
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
struct gapc_ltk ltk;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
bool ret;
|
|
|
|
ret = nv_record_ble_record_find_ltk_through_static_bd_addr(
|
|
|
|
app_env.context[conidx].solvedBdAddr, ltk.ltk.key);
|
|
|
|
if (ret) {
|
|
|
|
TRACE(0, "FIND LTK SUCCESSED!!!");
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef BLE_KEY_PRINT
|
2023-02-01 14:52:54 -06:00
|
|
|
DUMP8("%02x ", (uint8_t *)ltk.ltk.key, 16);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
cfm->found = true;
|
|
|
|
cfm->key_size = 16;
|
|
|
|
memcpy(&cfm->ltk, ltk.ltk.key, sizeof(struct gap_sec_key));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
} else {
|
|
|
|
TRACE(0, "FIND LTK failed!!!");
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
TRACE(2, "%s app_sec_env.bonded %d", __FUNCTION__, app_sec_env.bonded);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// Send the message
|
|
|
|
ke_msg_send(cfm);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// encryption has been completed, we can start exchanging remote features now
|
|
|
|
app_exchange_remote_feature(conidx);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (KE_MSG_CONSUMED);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static int gapc_encrypt_ind_handler(ke_msg_id_t const msgid,
|
|
|
|
struct gapc_encrypt_ind const *param,
|
|
|
|
ke_task_id_t const dest_id,
|
2023-02-01 14:52:54 -06:00
|
|
|
ke_task_id_t const src_id) {
|
|
|
|
TRACE(2, "%s param->auth %d", __FUNCTION__, param->auth);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (KE_MSG_CONSUMED);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static int app_sec_msg_dflt_handler(ke_msg_id_t const msgid, void *param,
|
2022-08-15 04:20:27 -05:00
|
|
|
ke_task_id_t const dest_id,
|
2023-02-01 14:52:54 -06:00
|
|
|
ke_task_id_t const src_id) {
|
|
|
|
// Drop the message
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (KE_MSG_CONSUMED);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/*
|
|
|
|
* LOCAL VARIABLE DEFINITIONS
|
|
|
|
****************************************************************************************
|
|
|
|
*/
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
/// Default State handlers definition
|
2023-02-01 14:52:54 -06:00
|
|
|
const struct ke_msg_handler app_sec_msg_handler_list[] = {
|
|
|
|
// Note: first message is latest message checked by kernel so default is put
|
|
|
|
// on top.
|
|
|
|
{KE_MSG_DEFAULT_HANDLER, (ke_msg_func_t)app_sec_msg_dflt_handler},
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
{GAPC_BOND_REQ_IND, (ke_msg_func_t)gapc_bond_req_ind_handler},
|
|
|
|
{GAPC_BOND_IND, (ke_msg_func_t)gapc_bond_ind_handler},
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
{GAPC_ENCRYPT_REQ_IND, (ke_msg_func_t)gapc_encrypt_req_ind_handler},
|
|
|
|
{GAPC_ENCRYPT_IND, (ke_msg_func_t)gapc_encrypt_ind_handler},
|
2022-08-15 04:20:27 -05:00
|
|
|
};
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
const struct ke_state_handler app_sec_table_handler = {
|
|
|
|
&app_sec_msg_handler_list[0],
|
|
|
|
(sizeof(app_sec_msg_handler_list) / sizeof(struct ke_msg_handler))};
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#endif //(BLE_APP_SEC)
|
|
|
|
|
|
|
|
/// @} APP
|