pinebuds/services/ble_app/app_gfps/app_gfps.c

1309 lines
43 KiB
C

/***************************************************************************
*
* Copyright 2015-2019 BES.
* All rights reserved. All unpublished rights reserved.
*
* No part of this work may be used or reproduced in any form or by any
* means, or stored in a database or retrieval system, without prior written
* permission of BES.
*
* Use of this work is governed by a license granted by BES.
* This work contains confidential and proprietary information of
* BES. which is protected by copyright, trade secret,
* trademark and other intellectual property rights.
*
****************************************************************************/
/**
****************************************************************************************
* @addtogroup APP
* @{
****************************************************************************************
*/
#include "rwip_config.h" // SW configuration
#if (BLE_APP_GFPS)
/*
* INCLUDE FILES
****************************************************************************************
*/
#include "cmsis_os.h"
#include "app.h" // Application Manager Definitions
#include "apps.h"
#include "app_gfps.h" // Device Information Service Application Definitions
#include "gfps_provider_task.h" // Device Information Profile Functions
#include "prf_types.h" // Profile Common Types Definitions
#include "gapm_task.h" // GAP Manager Task API
#include <string.h>
#include "gfps_crypto.h"
#include "gfps_provider.h"
#include "gfps_provider_errors.h"
#include "gap.h"
#include "app_ble_mode_switch.h"
#include "nvrecord.h"
#include "nvrecord_fp_account_key.h"
#include "gfps_crypto.h"
#include "gapm.h"
#include "me_api.h"
#include "app_bt.h"
#include "bt_if.h"
#ifdef IBRT
#include "app_tws_ibrt.h"
#include "app_tws_if.h"
#endif
/************************private macro defination***************************/
#define USE_BLE_ADDR_AS_SALT 0
#define USE_RANDOM_NUM_AS_SALT 1
#define GFPS_ACCOUNTKEY_SALT_TYPE USE_BLE_ADDR_AS_SALT
#define FP_SERVICE_LEN 0x06
#define FP_SERVICE_UUID 0x2CFE
#define FP_DEVICE_MODEL_ID 0x2B677D
#define GFPS_INITIAL_ADV_RAND_SALT 0xFF
#define BLE_FASTPAIR_NORMAL_ADVERTISING_INTERVAL (160)
#define BLE_FASTPAIR_FAST_ADVERTISING_INTERVAL (48)
/************************private type defination****************************/
/************************extern function declearation***********************/
extern void AES128_ECB_decrypt(uint8_t *input, const uint8_t *key, uint8_t *output);
/**********************private function declearation************************/
/*---------------------------------------------------------------------------
* gfps_ble_data_fill_handler
*---------------------------------------------------------------------------
*
*Synopsis:
* BLE advertisement and scan response data fill handler for Google fast pair
*
* Parameters:
* param - pointer of BLE parameter to be configure
*
* Return:
* void
*/
static void gfps_ble_data_fill_handler(void *param);
/************************private variable defination************************/
struct app_gfps_env_tag app_gfps_env;
static char app_gfps_power_uuid[APP_GFPS_ADV_POWER_UUID_LEN] = APP_GFPS_ADV_POWER_UUID;
/****************************function defination****************************/
static void app_gfps_init_env(void)
{
memset(( uint8_t * )&app_gfps_env, 0, sizeof(struct app_gfps_env_tag));
app_gfps_env.connectionIndex = BLE_INVALID_CONNECTION_INDEX;
app_gfps_env.batteryDataType = HIDE_UI_INDICATION;
app_gfps_env.advRandSalt = GFPS_INITIAL_ADV_RAND_SALT;
app_ble_register_data_fill_handle(USER_GFPS, ( BLE_DATA_FILL_FUNC_T )gfps_ble_data_fill_handler, false);
}
static void big_little_switch(const uint8_t *in, uint8_t *out, uint8_t len)
{
if (len < 1)
return;
for (int i = 0; i < len; i++)
{
out[i] = in[len - i - 1];
}
return;
}
/*
* GLOBAL FUNCTION DEFINITIONS
****************************************************************************************
*/
extern uint8_t bt_addr[6];
void app_gfps_connected_evt_handler(uint8_t conidx)
{
app_gfps_env.connectionIndex = conidx;
TRACE(0,"local LE addr: ");
bd_addr_t *pBdAddr = gapm_get_connected_bdaddr(conidx);
big_little_switch(pBdAddr->addr, &app_gfps_env.local_le_addr.addr[0], 6);
DUMP8("0x%02x ", pBdAddr->addr, 6);
#if !defined(IBRT)
big_little_switch((&bt_addr[0]), &app_gfps_env.local_bt_addr.addr[0], 6);
TRACE(0,"local bt addr: ");
DUMP8("0x%02x ", &bt_addr[0], 6);
#else
big_little_switch(app_tws_ibrt_get_bt_ctrl_ctx()->local_addr.address,
&app_gfps_env.local_bt_addr.addr[0], 6);
TRACE(0,"local bt addr: ");
DUMP8("0x%02x ", app_tws_ibrt_get_bt_ctrl_ctx()->local_addr.address, 6);
#endif
}
void app_gfps_disconnected_evt_handler(uint8_t conidx)
{
if (conidx == app_gfps_env.connectionIndex)
{
//recover classic bt iocap
if (app_gfps_env.bt_set_iocap != NULL)
{
app_gfps_env.bt_set_iocap(app_gfps_env.bt_iocap);
}
if(app_gfps_env.bt_set_authrequirements!=NULL)
{
app_gfps_env.bt_set_authrequirements(app_gfps_env.bt_authrequirements);
}
app_gfps_env.isKeyBasedPairingNotificationEnabled = false;
app_gfps_env.isPassKeyNotificationEnabled = false;
app_gfps_env.isPendingForWritingNameReq = false;
app_gfps_env.connectionIndex = BLE_INVALID_CONNECTION_INDEX;
}
}
/*
* LOCAL FUNCTION DEFINITIONS
****************************************************************************************
*/
static int gfpsp_value_req_ind_handler(ke_msg_id_t const msgid,
struct gfpsp_value_req_ind const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
// Initialize length
uint8_t len = 0;
// Pointer to the data
uint8_t *data = NULL;
TRACE(1,"val %d", param->value);
// Check requested value
switch (param->value)
{
case GFPSP_MANUFACTURER_NAME_CHAR:
case GFPSP_MODEL_NB_STR_CHAR:
case GFPSP_SYSTEM_ID_CHAR:
case GFPSP_PNP_ID_CHAR:
case GFPSP_SERIAL_NB_STR_CHAR:
case GFPSP_HARD_REV_STR_CHAR:
case GFPSP_FIRM_REV_STR_CHAR:
case GFPSP_SW_REV_STR_CHAR:
case GFPSP_IEEE_CHAR:
{
// Set information
len = APP_GFPS_IEEE_LEN;
data = ( uint8_t * )APP_GFPS_IEEE;
}
break;
default:
ASSERT_ERR(0);
break;
}
// Allocate confirmation to send the value
struct gfpsp_value_cfm *cfm_value = KE_MSG_ALLOC_DYN(GFPSP_VALUE_CFM,
src_id,
dest_id,
gfpsp_value_cfm,
len);
// Set parameters
cfm_value->value = param->value;
cfm_value->length = len;
if (len)
{
// Copy data
memcpy(&cfm_value->data[0], data, len);
}
// Send message
ke_msg_send(cfm_value);
return (KE_MSG_CONSUMED);
}
/*
* GLOBAL FUNCTION DEFINITIONS
****************************************************************************************
*/
//MSB->LSB
const uint8_t bes_demo_Public_anti_spoofing_key[64] = {
0x3E,0x08,0x3B,0x0A,0x5C,0x04,0x78,0x84,0xBE,0x41,
0xBE,0x7E,0x52,0xD1,0x0C,0x68,0x64,0x6C,0x4D,0xB6,
0xD9,0x20,0x95,0xA7,0x32,0xE9,0x42,0x40,0xAC,0x02,
0x54,0x48,0x99,0x49,0xDA,0xE1,0x0D,0x9C,0xF5,0xEB,
0x29,0x35,0x7F,0xB1,0x70,0x55,0xCB,0x8C,0x8F,0xBF,
0xEB,0x17,0x15,0x3F,0xA0,0xAA,0xA5,0xA2,0xC4,0x3C,
0x1B,0x48,0x60,0xDA
};
//MSB->LSB
const uint8_t bes_demo_private_anti_spoofing_key[32]= {
0xCD,0xF8,0xAA,0xC0,0xDF,0x4C,0x93,0x63,0x2F,0x48,
0x20,0xA6,0xD8,0xAB,0x22,0xF3,0x3A,0x94,0xBF,0x8E,
0x4C,0x90,0x25,0xB3,0x44,0xD2,0x2E,0xDE,0x0F,0xB7,
0x22,0x1F
};
extern void fast_pair_enter_pairing_mode_handler(void);
void app_gfps_init(void)
{
nv_record_fp_account_key_init();
app_gfps_init_env();
app_gfps_env.enter_pairing_mode =NULL;
app_gfps_env.bt_set_iocap =NULL;
app_gfps_env.bt_set_authrequirements =NULL;
gfps_crypto_init();
app_bt_get_fast_pair_info();
#ifndef IS_USE_CUSTOM_FP_INFO
gfps_crypto_set_p256_key(bes_demo_Public_anti_spoofing_key, bes_demo_private_anti_spoofing_key);
#else
gfps_crypto_set_p256_key(app_bt_get_fast_pair_public_key(),app_bt_get_fast_pair_private_key());
#endif
app_gfps_set_bt_access_mode(fast_pair_enter_pairing_mode_handler);
app_gfps_set_io_cap(( gfps_bt_io_cap_set )btif_sec_set_io_capabilities);
app_gfps_set_authrequirements((gfps_bt_io_authrequirements_set)btif_sec_set_authrequirements);
app_gfps_enable_battery_info(true);
}
void app_gfps_set_bt_access_mode(gfps_enter_pairing_mode cb)
{
app_gfps_env.enter_pairing_mode = cb;
}
void app_gfps_set_io_cap(gfps_bt_io_cap_set cb)
{
app_gfps_env.bt_set_iocap = cb;
}
void app_gfps_set_authrequirements(gfps_bt_io_authrequirements_set cb)
{
app_gfps_env.bt_set_authrequirements = cb;
}
void app_gfps_set_battery_info_acquire_handler(gfps_get_battery_info_handler cb)
{
app_gfps_env.get_battery_info_handler = cb;
}
void app_gfps_add_gfps(void)
{
struct gfpsp_db_cfg *db_cfg;
// Allocate the DISS_CREATE_DB_REQ
struct gapm_profile_task_add_cmd *req = KE_MSG_ALLOC_DYN(GAPM_PROFILE_TASK_ADD_CMD,
TASK_GAPM,
TASK_APP,
gapm_profile_task_add_cmd,
sizeof(struct gfpsp_db_cfg));
// Fill message
req->operation = GAPM_PROFILE_TASK_ADD;
#if BLE_CONNECTION_MAX > 1
req->sec_lvl = PERM(SVC_AUTH, ENABLE) | PERM(SVC_MI, ENABLE);
#else
req->sec_lvl = PERM(SVC_AUTH, ENABLE);
#endif
req->prf_task_id = TASK_ID_GFPSP;
req->app_task = TASK_APP;
req->start_hdl = 0;
// Set parameters
db_cfg = ( struct gfpsp_db_cfg * )req->param;
db_cfg->features = APP_GFPS_FEATURES;
// Send the message
ke_msg_send(req);
}
void app_gfps_send_keybase_pairing_via_notification(uint8_t *ptrData, uint32_t length)
{
struct gfpsp_send_data_req_t *req =
KE_MSG_ALLOC_DYN(GFPSP_KEY_BASED_PAIRING_WRITE_NOTIFY,
KE_BUILD_ID(prf_get_task_from_id(TASK_ID_GFPSP),
app_gfps_env.connectionIndex),
TASK_APP,
gfpsp_send_data_req_t,
length);
req->connecionIndex = app_gfps_env.connectionIndex;
req->length = length;
memcpy(req->value, ptrData, length);
ke_msg_send(req);
}
int app_gfps_send_passkey_via_notification(uint8_t *ptrData, uint32_t length)
{
struct gfpsp_send_data_req_t *req =
KE_MSG_ALLOC_DYN(GFPSP_KEY_PASS_KEY_WRITE_NOTIFY,
KE_BUILD_ID(prf_get_task_from_id(TASK_ID_GFPSP),
app_gfps_env.connectionIndex),
TASK_APP,
gfpsp_send_data_req_t,
length);
req->connecionIndex = app_gfps_env.connectionIndex;
req->length = length;
memcpy(req->value, ptrData, length);
ke_msg_send(req);
return (KE_MSG_CONSUMED);
}
static void app_gfps_send_naming_packet_via_notification(uint8_t *ptrData, uint32_t length)
{
struct gfpsp_send_data_req_t *req =
KE_MSG_ALLOC_DYN(GFPSP_NAME_NOTIFY,
KE_BUILD_ID(prf_get_task_from_id(TASK_ID_GFPSP),
app_gfps_env.connectionIndex),
TASK_APP,
gfpsp_send_data_req_t,
length);
req->connecionIndex = app_gfps_env.connectionIndex;
req->length = length;
memcpy(req->value, ptrData, length);
ke_msg_send(req);
}
void app_gfps_handling_on_mobile_link_disconnection(btif_remote_device_t* pRemDev)
{
bool isDisconnectedWithMobile = false;
#ifdef IBRT
ibrt_link_type_e link_type =
app_tws_ibrt_get_remote_link_type(pRemDev);
if (MOBILE_LINK == link_type)
{
isDisconnectedWithMobile = true;
}
#else
isDisconnectedWithMobile = true;
#endif
if (isDisconnectedWithMobile)
{
if (app_gfps_is_last_response_pending())
{
app_gfps_enter_connectable_mode_req_handler(app_gfps_get_last_response());
}
}
}
void app_gfps_enter_connectable_mode_req_handler(uint8_t *response)
{
TRACE(2,"%s isLastResponsePending:%d", __func__, app_gfps_env.isLastResponsePending);
TRACE(0,"response data:");
DUMP8("%02x ", response, GFPSP_ENCRYPTED_RSP_LEN);
#ifdef __BT_ONE_BRING_TWO__
app_gfps_send_keybase_pairing_via_notification(response, GFPSP_ENCRYPTED_RSP_LEN);
#else
#ifndef IBRT
if (btif_me_get_activeCons() > 0)
#else
if (app_tws_ibrt_mobile_link_connected())
#endif
{
memcpy(app_gfps_env.pendingLastResponse, response, GFPSP_ENCRYPTED_RSP_LEN);
app_gfps_env.isLastResponsePending = true;
#ifndef IBRT
app_disconnect_all_bt_connections();
#else
app_tws_ibrt_disconnect_mobile();
#endif
}
else
{
app_gfps_env.isLastResponsePending = false;
app_gfps_send_keybase_pairing_via_notification(response, GFPSP_ENCRYPTED_RSP_LEN);
TRACE(0,"wait for pair req maybe classic or ble");
app_gfps_env.isWaitingForFpToConnect = true;
if (app_gfps_env.enter_pairing_mode != NULL)
{
app_gfps_env.enter_pairing_mode();
}
if (app_gfps_env.bt_set_iocap != NULL)
{
TRACE(0,"SET IOC");
app_gfps_env.bt_iocap = app_gfps_env.bt_set_iocap(1); //IO_display_yesno
}
if(app_gfps_env.bt_set_authrequirements!=NULL)
{
TRACE(0,"SET authrequirements");
app_gfps_env.bt_authrequirements = app_gfps_env.bt_set_authrequirements(1);//Man in the Middle protection req
}
}
#endif
}
uint8_t *app_gfps_get_last_response(void)
{
return app_gfps_env.pendingLastResponse;
}
bool app_gfps_is_last_response_pending(void)
{
return app_gfps_env.isLastResponsePending;
}
static uint8_t app_gfps_handle_decrypted_keybase_pairing_request(gfpsp_req_resp *raw_req,
uint8_t *out_key)
{
gfpsp_encrypted_resp en_rsp;
gfpsp_raw_resp raw_rsp;
memcpy(app_gfps_env.keybase_pair_key, out_key, 16);
memcpy(&app_gfps_env.seeker_bt_addr.addr[0] ,&raw_req->rx_tx.key_based_pairing_req.seeker_addr[0],6);
if(raw_req->rx_tx.key_based_pairing_req.flags_discoverability ==RAW_REQ_FLAGS_DISCOVERABILITY_BIT0_EN)
{
TRACE(0,"TODO discoverable 10S");
//TODO start a timer keep discoverable 10S...
//TODO make sure there is no ble ADV with the MODEL ID data
}
raw_rsp.message_type = KEY_BASED_PAIRING_RSP;// Key-based Pairing Response
memcpy(raw_rsp.provider_addr, app_gfps_env.local_bt_addr.addr, 6);
TRACE(0,"raw_rsp.provider_addr:");
DUMP8("%02x ",raw_rsp.provider_addr, 6);
for (uint8_t index = 0; index < 9; index++)
{
raw_rsp.salt[index] = ( uint8_t )rand();
}
gfps_crypto_encrypt(( const uint8_t * )(&raw_rsp.message_type),
sizeof(raw_rsp),
app_gfps_env.keybase_pair_key,
en_rsp.uint128_array);
TRACE(1,"message type is 0x%x", raw_req->rx_tx.raw_req.message_type);
TRACE(4,"bit 0: %d, bit 1: %d, bit 2: %d, bit 3: %d",
raw_req->rx_tx.key_based_pairing_req.flags_discoverability,
raw_req->rx_tx.key_based_pairing_req.flags_bonding_addr,
raw_req->rx_tx.key_based_pairing_req.flags_get_existing_name,
raw_req->rx_tx.key_based_pairing_req.flags_retroactively_write_account_key);
bool isReturnName = raw_req->rx_tx.key_based_pairing_req.flags_get_existing_name;
if(raw_req->rx_tx.key_based_pairing_req.flags_bonding_addr == RAW_REQ_FLAGS_INTBONDING_SEEKERADDR_BIT1_EN)
{
TRACE(0,"try connect to remote BR/EDR addr");
// TODO:
app_gfps_send_keybase_pairing_via_notification(( uint8_t * )en_rsp.uint128_array, sizeof(en_rsp));
}
else if (raw_req->rx_tx.key_based_pairing_req.flags_retroactively_write_account_key)
{
// check whether the seeker's bd address is the same as already connected mobile
uint8_t swapedBtAddr[6];
big_little_switch(app_gfps_env.seeker_bt_addr.addr, swapedBtAddr, sizeof(swapedBtAddr));
uint8_t isMatchMobileAddr = false;
for (uint32_t devId = 0; devId < btif_me_get_activeCons(); devId++)
{
uint8_t connectedAddr[6];
app_bt_get_device_bdaddr(devId, connectedAddr);
if (!memcmp(connectedAddr, swapedBtAddr, 6))
{
isMatchMobileAddr = true;
break;
}
}
if (isMatchMobileAddr)
{
app_gfps_send_keybase_pairing_via_notification(( uint8_t * )en_rsp.uint128_array, sizeof(en_rsp));
}
else
{
// reject the write request
return ATT_ERR_WRITE_NOT_PERMITTED;
}
}
else if (raw_req->rx_tx.key_based_pairing_req.flags_bonding_addr == RAW_REQ_FLAGS_INTBONDING_SEEKERADDR_BIT1_DIS)
{
app_gfps_enter_connectable_mode_req_handler((uint8_t *)en_rsp.uint128_array);
}
else
{
app_gfps_send_keybase_pairing_via_notification(( uint8_t * )en_rsp.uint128_array, sizeof(en_rsp));
}
if (isReturnName)
{
app_gfps_env.isPendingForWritingNameReq = true;
TRACE(0,"get existing name.");
uint8_t response[16+FP_MAX_NAME_LEN];
uint8_t* ptrRawName;
uint32_t rawNameLen;
ptrRawName = nv_record_fp_get_name_ptr(&rawNameLen);
gfps_encrypt_name(app_gfps_env.keybase_pair_key,
ptrRawName,
rawNameLen,
&response[16],
response,
&response[8]);
app_gfps_send_naming_packet_via_notification(response, 16 + rawNameLen);
}
else
{
TRACE(0,"Unusable bit.");
}
return GAP_ERR_NO_ERROR;
}
static void app_gfps_update_local_bt_name(void)
{
uint8_t* ptrRawName;
uint32_t rawNameLen;
// name has been updated to fp nv record
ptrRawName = nv_record_fp_get_name_ptr(&rawNameLen);
if(rawNameLen > 0)
{
bt_set_local_dev_name((const unsigned char*)(ptrRawName),
strlen((char *)(ptrRawName)) + 1);
btif_update_bt_name((const unsigned char*)(ptrRawName),
strlen((char *)(ptrRawName)) + 1);
}
}
static bool app_gfps_decrypt_keybase_pairing_request(uint8_t *pairing_req, uint8_t *output)
{
uint8_t keyCount = nv_record_fp_account_key_count();
if (0 == keyCount)
{
return false;
}
gfpsp_req_resp raw_req;
uint8_t accountKey[FP_ACCOUNT_KEY_SIZE];
for (uint8_t keyIndex = 0; keyIndex < keyCount; keyIndex++)
{
nv_record_fp_account_key_get_by_index(keyIndex, accountKey);
AES128_ECB_decrypt(pairing_req, ( const uint8_t * )accountKey, ( uint8_t * )&raw_req);
TRACE(0,"Decrypted keybase pairing req result:");
DUMP8("0x%02x ", ( uint8_t * )&raw_req, 16);
if ((memcmp(raw_req.rx_tx.key_based_pairing_req.provider_addr,
app_gfps_env.local_bt_addr.addr , 6)==0) ||
(memcmp(raw_req.rx_tx.key_based_pairing_req.provider_addr,
app_gfps_env.local_le_addr.addr , 6)==0))
{
memcpy(output, accountKey, FP_ACCOUNT_KEY_SIZE);
TRACE(1,"fp message type 0x%02x.", raw_req.rx_tx.raw_req.message_type);
if (KEY_BASED_PAIRING_REQ == raw_req.rx_tx.raw_req.message_type)
{
app_gfps_handle_decrypted_keybase_pairing_request(&raw_req, accountKey);
return true;
}
else if (ACTION_REQUEST == raw_req.rx_tx.raw_req.message_type)
{
memcpy(app_gfps_env.keybase_pair_key, accountKey, 16);
memcpy(&app_gfps_env.seeker_bt_addr.addr[0],
&(raw_req.rx_tx.key_based_pairing_req.seeker_addr[0]), 6);
gfpsp_encrypted_resp en_rsp;
gfpsp_raw_resp raw_rsp;
raw_rsp.message_type = KEY_BASED_PAIRING_RSP;// Key-based Pairing Response
memcpy(raw_rsp.provider_addr, app_gfps_env.local_bt_addr.addr, 6);
TRACE(0,"raw_rsp.provider_addr:");
DUMP8("%02x ",raw_rsp.provider_addr, 6);
for (uint8_t index = 0;index < 9;index++)
{
raw_rsp.salt[index] = (uint8_t)rand();
}
gfps_crypto_encrypt((const uint8_t *)(&raw_rsp.message_type), sizeof(raw_rsp),
app_gfps_env.keybase_pair_key,en_rsp.uint128_array);
app_gfps_send_keybase_pairing_via_notification((uint8_t *)en_rsp.uint128_array, sizeof(en_rsp));
if (raw_req.rx_tx.action_req.isDeviceAction)
{
// TODO: device action via BLE
}
else if (raw_req.rx_tx.action_req.isFollowedByAdditionalDataCh)
{
// write name request will be received
TRACE(0,"FP write name request will be received.");
app_gfps_env.isPendingForWritingNameReq = true;
}
return true;
}
}
}
return false;
}
int app_gfps_write_key_based_pairing_ind_hander(ke_msg_id_t const msgid,
struct gfpsp_write_ind_t const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
gfpsp_Key_based_Pairing_req en_req;
gfpsp_req_resp *ptr_raw_req;
en_req.en_req = ( gfpsp_encrypted_req_uint128 * )&(param->data[0]);
en_req.pub_key = ( gfpsp_64B_public_key * )&(param->data[16]);
uint8_t out_key[16] = {0};
uint8_t decryptdata[16] = {0};
uint8_t write_rsp_status = GAP_ERR_NO_ERROR;
TRACE(3,"length = %d value = 0x%x 0x%x", param->length, param->data[0], param->data[1]);
DUMP8("%02x ", param->data, 80);
if (param->length == GFPSP_KEY_BASED_PAIRING_REQ_LEN_WITH_PUBLIC_KEY)
{
memset(app_gfps_env.keybase_pair_key, 0, 6);
uint32_t gfps_state = gfps_crypto_get_secret_decrypt(( const uint8_t * )en_req.en_req,
( const uint8_t * )en_req.pub_key,
out_key,
decryptdata);
if (gfps_state == GFPS_SUCCESS)
{
memcpy(app_gfps_env.aesKeyFromECDH, out_key, 16);
app_gfps_env.isInitialPairing = true;
ptr_raw_req = (gfpsp_req_resp *)decryptdata;
TRACE(0,"raw req provider's addr:");
DUMP8("%02x ", ptr_raw_req->rx_tx.key_based_pairing_req.provider_addr, 6);
TRACE(0,"raw req seeker's addr:");
DUMP8("%02x ", ptr_raw_req->rx_tx.key_based_pairing_req.seeker_addr, 6);
TRACE(1,"fp message type 0x%02x.", ptr_raw_req->rx_tx.raw_req.message_type);
if ((KEY_BASED_PAIRING_REQ == ptr_raw_req->rx_tx.raw_req.message_type) &&
((memcmp(ptr_raw_req->rx_tx.key_based_pairing_req.provider_addr,
app_gfps_env.local_bt_addr.addr , 6)==0) ||
(memcmp(ptr_raw_req->rx_tx.key_based_pairing_req.provider_addr,
app_gfps_env.local_le_addr.addr , 6)==0)))
{
write_rsp_status = app_gfps_handle_decrypted_keybase_pairing_request(ptr_raw_req, out_key);
}else{
TRACE(0,"decrypt false..ingore");
}
}else{
TRACE(1,"error = %x",gfps_state);
}
}
else if (param->length == GFPSP_KEY_BASED_PAIRING_REQ_LEN_WITHOUT_PUBLIC_KEY)
{
app_gfps_env.isInitialPairing = false;
bool isDecryptedSuccessful =
app_gfps_decrypt_keybase_pairing_request(( uint8_t * )en_req.en_req, out_key);
TRACE(1,"Decrypt keybase pairing req without public key result: %d", isDecryptedSuccessful);
}
else
{
TRACE(0,"who you are??");
}
struct gfpsp_send_write_rsp_t *response = KE_MSG_ALLOC(
GFPSP_SEND_WRITE_RESPONSE, src_id, dest_id, gfpsp_send_write_rsp_t);
*response = param->pendingWriteRsp;
response->status = write_rsp_status;
ke_msg_send(response);
return (KE_MSG_CONSUMED);
}
int app_gfps_write_passkey_ind_hander(ke_msg_id_t const msgid,
struct gfpsp_write_ind_t const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
gfpsp_raw_pass_key_resp raw_rsp;
gfpsp_encrypted_resp en_rsp;
uint8_t decryptdata[16] = {0};
TRACE(1,"length = %d value = 0x", param->length);
DUMP8("%02X, ", param->data, 16);
gfps_crypto_decrypt(param->data, 16, app_gfps_env.keybase_pair_key, decryptdata);
TRACE(0,"decrypt data =0x");
TRACE(0,"===============================");
DUMP8("%02X", decryptdata, 16);
TRACE(0,"===============================");
TRACE(0,"pass key = 1-3 bytes");
raw_rsp.message_type = 0x03; //Provider's passkey
raw_rsp.passkey[0] = decryptdata[1];
raw_rsp.passkey[1] = decryptdata[2];
raw_rsp.passkey[2] = decryptdata[3];
raw_rsp.reserved[0] = 0x38; //my magic num temp test
raw_rsp.reserved[1] = 0x30;
raw_rsp.reserved[2] = 0x23;
raw_rsp.reserved[3] = 0x30;
raw_rsp.reserved[4] = 0x06;
raw_rsp.reserved[5] = 0x10;
raw_rsp.reserved[6] = 0x05;
raw_rsp.reserved[7] = 0x13;
raw_rsp.reserved[8] = 0x06;
raw_rsp.reserved[9] = 0x12;
raw_rsp.reserved[10] = 0x12;
raw_rsp.reserved[11] = 0x01;
gfps_crypto_encrypt(( const uint8_t * )(&raw_rsp.message_type), sizeof(raw_rsp), app_gfps_env.keybase_pair_key, en_rsp.uint128_array);
app_gfps_send_passkey_via_notification(( uint8_t * )en_rsp.uint128_array, sizeof(en_rsp));
return (KE_MSG_CONSUMED);
}
static int app_gfps_write_name_ind_hander(ke_msg_id_t const msgid,
struct gfpsp_write_ind_t const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
bool isSuccessful = false;
if (!app_gfps_env.isPendingForWritingNameReq)
{
TRACE(0,"Pre fp write name request is not received.");
}
else
{
uint8_t rawName[FP_MAX_NAME_LEN];
struct gfpsp_write_ind_t* pWriteInd = (struct gfpsp_write_ind_t *)param;
if (app_gfps_env.isInitialPairing)
{
isSuccessful = gfps_decrypt_name(app_gfps_env.aesKeyFromECDH,
pWriteInd->data, &(pWriteInd->data[8]), &(pWriteInd->data[16]),
rawName, pWriteInd->length-16);
}
else
{
isSuccessful = gfps_decrypt_name(app_gfps_env.keybase_pair_key,
pWriteInd->data, &(pWriteInd->data[8]), &(pWriteInd->data[16]),
rawName, pWriteInd->length-16);
}
TRACE(1,"write name successful flag %d", isSuccessful);
if (isSuccessful)
{
nv_record_fp_update_name(rawName, pWriteInd->length-16);
TRACE(1,"Rename BT name: [%s]", rawName);
app_gfps_update_local_bt_name();
#ifdef IBRT
app_tws_send_fastpair_info_to_slave();
#endif
}
app_gfps_env.isPendingForWritingNameReq = false;
}
struct gfpsp_send_write_rsp_t *response = KE_MSG_ALLOC(
GFPSP_SEND_WRITE_RESPONSE, src_id, dest_id, gfpsp_send_write_rsp_t);
*response = param->pendingWriteRsp;
if (isSuccessful)
{
response->status = ATT_ERR_NO_ERROR;
}
else
{
response->status = ATT_ERR_WRITE_NOT_PERMITTED;
}
ke_msg_send(response);
return (KE_MSG_CONSUMED);
}
static int app_gfps_write_accountkey_ind_hander(ke_msg_id_t const msgid,
struct gfpsp_write_ind_t const *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
NV_FP_ACCOUNT_KEY_ENTRY_T accountkey;
TRACE(1,"length = %d value = 0x", param->length);
DUMP8("%02X, ", param->data, FP_ACCOUNT_KEY_SIZE);
gfps_crypto_decrypt(param->data, FP_ACCOUNT_KEY_SIZE, app_gfps_env.keybase_pair_key, accountkey.key);
TRACE(0,"decrypt account key:");
//TRACE(0,"===============================");
DUMP8("%02X", accountkey.key, FP_ACCOUNT_KEY_SIZE);
//TRACE(0,"===============================");
nv_record_fp_account_key_add(&accountkey);
#ifdef IBRT
app_tws_send_fastpair_info_to_slave();
#endif
// update the BLE ADV as account key has been added
if (!app_is_in_fastpairing_mode())
{
// restart the BLE adv if it's retro-active pairing
app_ble_refresh_adv_state(BLE_ADVERTISING_INTERVAL);
}
return (KE_MSG_CONSUMED);
}
void app_gfps_set_battery_datatype(GFPS_BATTERY_DATA_TYPE_E batteryDataType)
{
if (app_gfps_env.batteryDataType != batteryDataType)
{
app_gfps_env.batteryDataType = batteryDataType;
app_ble_refresh_adv_state(BLE_ADVERTISING_INTERVAL);
}
}
GFPS_BATTERY_DATA_TYPE_E app_gfps_get_battery_datatype(void)
{
return app_gfps_env.batteryDataType;
}
void app_gfps_enable_battery_info(bool isEnable)
{
app_gfps_env.isBatteryInfoIncluded = isEnable;
app_ble_refresh_adv_state(BLE_ADVERTISING_INTERVAL);
}
void app_gfps_get_battery_levels(uint8_t *pCount, uint8_t *pBatteryLevel)
{
*pCount = 0;
if (app_gfps_env.get_battery_info_handler)
{
app_gfps_env.get_battery_info_handler(
pCount, pBatteryLevel);
}
}
void app_gfps_update_random_salt(void)
{
app_gfps_env.advRandSalt = (uint8_t)rand();
}
uint8_t app_gfps_generate_accountkey_data(uint8_t *outputData)
{
uint8_t keyCount = nv_record_fp_account_key_count();
if (0 == keyCount)
{
outputData[0] = 0;
outputData[1] = 0;
return 2;
}
uint8_t accountKeyData[32];
accountKeyData[0] = 0;
uint8_t accountKeyDataLen = 2;
uint8_t hash256Result[32];
uint8_t sizeOfFilter = (((uint8_t)(( float )1.2 * keyCount)) + 3);
uint8_t FArray[2 * FP_ACCOUNT_KEY_RECORD_NUM + 3];
memset(FArray, 0, sizeof(FArray));
#if GFPS_ACCOUNTKEY_SALT_TYPE == USE_BLE_ADDR_AS_SALT
uint8_t VArray[FP_ACCOUNT_KEY_SIZE + 6 + 4];
#else
uint8_t VArray[FP_ACCOUNT_KEY_SIZE + 1 + 4];
uint8_t randomSalt;
if (GFPS_INITIAL_ADV_RAND_SALT != app_gfps_env.advRandSalt)
{
randomSalt = app_gfps_env.advRandSalt;
}
else
{
randomSalt = (uint8_t)rand();
}
#endif
uint8_t index;
uint8_t batteryFollowingData[1 + GFPS_BATTERY_VALUE_MAX_COUNT];
uint8_t batteryFollowingDataLen = 0;
for (uint8_t keyIndex = 0; keyIndex < keyCount; keyIndex++)
{
uint8_t offsetOfVArray;
nv_record_fp_account_key_get_by_index(keyIndex, VArray);
#if GFPS_ACCOUNTKEY_SALT_TYPE == USE_BLE_ADDR_AS_SALT
uint8_t *currentBleAddr = appm_get_current_ble_addr();
for (index = 0; index < 6; index++)
{
VArray[FP_ACCOUNT_KEY_SIZE + index] = currentBleAddr[5 - index];
}
offsetOfVArray = FP_ACCOUNT_KEY_SIZE + 6;
#else
VArray[FP_ACCOUNT_KEY_SIZE] = randomSalt;
offsetOfVArray = FP_ACCOUNT_KEY_SIZE + 1;
#endif
if (app_gfps_env.isBatteryInfoIncluded)
{
uint8_t batteryLevelCount = 0;
uint8_t batteryLevel[GFPS_BATTERY_VALUE_MAX_COUNT];
app_gfps_get_battery_levels(&batteryLevelCount, batteryLevel);
uint8_t startOffsetOfBatteryInfo = offsetOfVArray;
VArray[offsetOfVArray++] = app_gfps_env.batteryDataType | (batteryLevelCount << 4);
for (index = 0; index < batteryLevelCount; index++)
{
VArray[offsetOfVArray++] = batteryLevel[index];
}
batteryFollowingDataLen = offsetOfVArray - startOffsetOfBatteryInfo;
memcpy(batteryFollowingData, &VArray[startOffsetOfBatteryInfo], batteryFollowingDataLen);
}
TRACE(0,"To hash256 on:");
DUMP8("%02x ", VArray, offsetOfVArray);
gfps_SHA256_hash(VArray, offsetOfVArray, hash256Result);
// K = Xi % (s * 8)
// F[K/8] = F[K/8] | (1 << (K % 8))
uint32_t pX[8];
for (index = 0; index < 8; index++)
{
pX[index] = (((uint32_t)(hash256Result[index * 4])) << 24) |
(((uint32_t)(hash256Result[index * 4 + 1])) << 16) |
(((uint32_t)(hash256Result[index * 4 + 2])) << 8) |
(((uint32_t)(hash256Result[index * 4 + 3])) << 0);
}
for (index = 0; index < 8; index++)
{
uint32_t K = pX[index] % (sizeOfFilter * 8);
FArray[K / 8] = FArray[K / 8] | (1 << (K % 8));
}
}
memcpy(&accountKeyData[2], FArray, sizeOfFilter);
accountKeyDataLen += sizeOfFilter;
accountKeyData[1] = (sizeOfFilter<<4);
#if GFPS_ACCOUNTKEY_SALT_TYPE==USE_RANDOM_NUM_AS_SALT
accountKeyData[2+sizeOfFilter] = 0x11;
accountKeyData[2 + sizeOfFilter + 1] = randomSalt;
accountKeyDataLen += 2;
#endif
TRACE(1,"Generated accountkey data len:%d", accountKeyDataLen);
DUMP8("%02x ", accountKeyData, accountKeyDataLen);
memcpy(outputData, accountKeyData, accountKeyDataLen);
memcpy(outputData + accountKeyDataLen, batteryFollowingData, batteryFollowingDataLen);
return (accountKeyDataLen + batteryFollowingDataLen);
}
static void gfpsp_update_connection_state(uint8_t conidx)
{
if (BLE_INVALID_CONNECTION_INDEX == app_gfps_env.connectionIndex)
{
app_gfps_connected_evt_handler(conidx);
}
}
static int app_gfpsp_key_based_pairing_ntf_handler(ke_msg_id_t const msgid,
struct app_gfps_key_based_notif_config_t *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
app_gfps_env.isKeyBasedPairingNotificationEnabled = param->isNotificationEnabled;
if (app_gfps_env.isKeyBasedPairingNotificationEnabled)
{
uint8_t conidx = KE_IDX_GET(src_id);
gfpsp_update_connection_state(conidx);
}
return (KE_MSG_CONSUMED);
}
static int app_gfpsp_pass_key_ntf_handler(ke_msg_id_t const msgid,
struct app_gfps_pass_key_notif_config_t *param,
ke_task_id_t const dest_id,
ke_task_id_t const src_id)
{
app_gfps_env.isPassKeyNotificationEnabled = param->isNotificationEnabled;
if (app_gfps_env.isPassKeyNotificationEnabled)
{
uint8_t conidx = KE_IDX_GET(src_id);
gfpsp_update_connection_state(conidx);
}
return (KE_MSG_CONSUMED);
}
/*
* GLOBAL VARIABLE DEFINITIONS
****************************************************************************************
*/
/// Default State handlers definition
const struct ke_msg_handler app_gfps_msg_handler_list[] =
{
{GFPSP_VALUE_REQ_IND, ( ke_msg_func_t )gfpsp_value_req_ind_handler},
{GFPSP_KEY_BASED_PAIRING_WRITE_IND, ( ke_msg_func_t )app_gfps_write_key_based_pairing_ind_hander},
{GFPSP_KEY_PASS_KEY_WRITE_IND, ( ke_msg_func_t )app_gfps_write_passkey_ind_hander},
{GFPSP_KEY_ACCOUNT_KEY_WRITE_IND, ( ke_msg_func_t )app_gfps_write_accountkey_ind_hander},
{GFPSP_KEY_BASED_PAIRING_NTF_CFG, ( ke_msg_func_t )app_gfpsp_key_based_pairing_ntf_handler},
{GFPSP_KEY_PASS_KEY_NTF_CFG, ( ke_msg_func_t )app_gfpsp_pass_key_ntf_handler},
{GFPSP_NAME_WRITE_IND, ( ke_msg_func_t )app_gfps_write_name_ind_hander},
};
const struct ke_state_handler app_gfps_table_handler = {
&app_gfps_msg_handler_list[0],
(sizeof(app_gfps_msg_handler_list) / sizeof(struct ke_msg_handler)),
};
static uint8_t is_in_fastpairing_mode = false;
bool app_is_in_fastpairing_mode(void)
{
return is_in_fastpairing_mode;
}
void app_set_in_fastpairing_mode_flag(bool isEnabled)
{
is_in_fastpairing_mode = isEnabled;
TRACE(1,"[FP]mode is set to %d", is_in_fastpairing_mode);
}
void app_exit_fastpairing_mode(void)
{
if (app_is_in_fastpairing_mode())
{
TRACE(0,"[FP]exit fast pair mode");
app_stop_10_second_timer(APP_FASTPAIR_LASTING_TIMER_ID);
app_set_in_fastpairing_mode_flag(false);
// reset ble adv
app_ble_refresh_adv_state(BLE_ADVERTISING_INTERVAL);
}
}
void app_fast_pairing_timeout_timehandler(void)
{
app_exit_fastpairing_mode();
}
void app_enter_fastpairing_mode(void)
{
TRACE(0,"[FP] enter fast pair mode");
app_set_in_fastpairing_mode_flag(true);
app_ble_start_connectable_adv(BLE_FAST_ADVERTISING_INTERVAL);
app_start_10_second_timer(APP_FASTPAIR_LASTING_TIMER_ID);
}
/*---------------------------------------------------------------------------
* gfps_ble_data_fill_handler
*---------------------------------------------------------------------------
*
*Synopsis:
* BLE advertisement and scan response data fill handler for Google fast pair
*
* Parameters:
* param - pointer of BLE parameter to be configure
*
* Return:
* void
*/
static void gfps_ble_data_fill_handler(void *param)
{
TRACE(1,"[%s]+++", __func__);
ASSERT(param, "invalid param");
bool adv_enable = false;
BLE_ADV_PARAM_T *advInfo = ( BLE_ADV_PARAM_T * )param;
TRACE(2,"adv data offset:%d, scan response data offset:%d",
advInfo->advDataLen,
advInfo->scanRspDataLen);
#ifdef IBRT
ibrt_ctrl_t *p_ibrt_ctrl = app_tws_ibrt_get_bt_ctrl_ctx();
TRACE(1,"current role:%s", app_tws_ibrt_role2str(p_ibrt_ctrl->current_role));
if (IBRT_SLAVE != p_ibrt_ctrl->current_role && p_ibrt_ctrl->init_done)
#endif
{
TRACE(0,"GFPS data will add in adv data");
adv_enable = true;
if (app_is_in_fastpairing_mode())
{
TRACE(0,"fast pair mode");
advInfo->advInterval = BLE_FASTPAIR_FAST_ADVERTISING_INTERVAL;
advInfo->advData[advInfo->advDataLen++] = FP_SERVICE_LEN;
advInfo->advData[advInfo->advDataLen++] = BLE_ADV_SVC_FLAG;
advInfo->advData[advInfo->advDataLen++] = (FP_SERVICE_UUID >> 8) & 0xFF;
advInfo->advData[advInfo->advDataLen++] = (FP_SERVICE_UUID >> 0) & 0xFF;
uint32_t modelId;
#ifndef IS_USE_CUSTOM_FP_INFO
modelId = FP_DEVICE_MODEL_ID;
#else
modelId = app_bt_get_model_id();
#endif
advInfo->advData[advInfo->advDataLen++] = (modelId >> 16) & 0xFF;
advInfo->advData[advInfo->advDataLen++] = (modelId >> 8) & 0xFF;
advInfo->advData[advInfo->advDataLen++] = (modelId >> 0) & 0xFF;
#ifndef IS_USE_CUSTOM_FP_INFO
memcpy(&advInfo->advData[advInfo->advDataLen],
APP_GFPS_ADV_POWER_UUID,
APP_GFPS_ADV_POWER_UUID_LEN);
#else
memcpy(&advInfo->advData[advInfo->advDataLen],
app_gfps_power_uuid,
APP_GFPS_ADV_POWER_UUID_LEN);
#endif
advInfo->advDataLen += APP_GFPS_ADV_POWER_UUID_LEN;
}
else
{
TRACE(0,"not in fast pair mode");
advInfo->advInterval = BLE_FASTPAIR_NORMAL_ADVERTISING_INTERVAL;
#if BLE_APP_GFPS_VER == FAST_PAIR_REV_2_0
uint8_t serviceData[32];
// service UUID part
serviceData[0] = 0x03; // original length of service length
serviceData[1] = BLE_ADV_SVC_FLAG;
serviceData[2] = (FP_SERVICE_UUID >> 8) & 0xFF;;
serviceData[3] = (FP_SERVICE_UUID >> 0) & 0xFF;
// account key part
uint8_t dataLen = app_gfps_generate_accountkey_data(&serviceData[4]);
serviceData[0] += dataLen;
memcpy(&advInfo->advData[advInfo->advDataLen],
serviceData,
serviceData[0] + 1);
advInfo->advDataLen += (serviceData[0] + 1);
// power part
memcpy(&advInfo->advData[advInfo->advDataLen],
APP_GFPS_ADV_POWER_UUID,
APP_GFPS_ADV_POWER_UUID_LEN);
advInfo->advDataLen += APP_GFPS_ADV_POWER_UUID_LEN;
#endif
}
}
app_ble_data_fill_enable(USER_GFPS, adv_enable);
TRACE(1,"[%s]---", __func__);
}
void gfps_info_prepare_handler(uint8_t *buf, uint16_t *length)
{
*length = sizeof(NV_FP_ACCOUNT_KEY_RECORD_T);
NV_FP_ACCOUNT_KEY_RECORD_T *info = nv_record_get_fp_data_structure_info();
memcpy(buf, info, *length);
}
void gfps_info_received_handler(uint8_t *buf, uint16_t length)
{
NV_FP_ACCOUNT_KEY_RECORD_T *pInfo = ( NV_FP_ACCOUNT_KEY_RECORD_T * )buf;
nv_record_fp_update_all(( uint8_t * )pInfo);
}
void app_gfps_tws_sync_init(void)
{
#ifdef IBRT
// TODO: freddie move to isolated ota file
TWS_SYNC_USER_T userGfps = {
gfps_info_prepare_handler,
gfps_info_received_handler,
NULL,
NULL,
NULL,
};
app_tws_if_register_sync_user(TWS_SYNC_USER_GFPS_INFO, &userGfps);
#endif
}
static FastPairInfo g_fast_pair_info;
uint32_t app_bt_get_model_id(void)
{
return g_fast_pair_info.model_id;
}
extern uint32_t Get_ModelId();
void app_bt_get_fast_pair_info(void)
{
g_fast_pair_info.model_id = Get_ModelId();
switch(g_fast_pair_info.model_id)
{
//default model id(bes moddel id)
case FP_DEVICE_MODEL_ID:
{
memcpy (g_fast_pair_info.public_anti_spoofing_key,
bes_demo_Public_anti_spoofing_key, sizeof(bes_demo_Public_anti_spoofing_key));
memcpy (g_fast_pair_info.private_anti_spoofing_key,
bes_demo_private_anti_spoofing_key, sizeof(bes_demo_private_anti_spoofing_key));
}
break;
//customer add customer model id here;
default:
{
g_fast_pair_info.model_id = FP_DEVICE_MODEL_ID;
memcpy (g_fast_pair_info.public_anti_spoofing_key,
bes_demo_Public_anti_spoofing_key, sizeof(bes_demo_Public_anti_spoofing_key));
memcpy (g_fast_pair_info.private_anti_spoofing_key,
bes_demo_private_anti_spoofing_key, sizeof(bes_demo_private_anti_spoofing_key));
}
}
}
void app_bt_set_fast_pair_info(FastPairInfo fast_pair_info)
{
memcpy(&g_fast_pair_info, &fast_pair_info,sizeof(fast_pair_info));
}
void app_gfps_set_tx_power_in_adv(char rssi)
{
app_gfps_power_uuid[APP_GFPS_ADV_POWER_UUID_LEN-1] = rssi;
}
void app_bt_set_fast_pair_tx_power(int8_t tx_power) {
app_gfps_set_tx_power_in_adv(tx_power);
}
const uint8_t* app_bt_get_fast_pair_public_key(void) {
return g_fast_pair_info.public_anti_spoofing_key;
}
const uint8_t* app_bt_get_fast_pair_private_key(void) {
return g_fast_pair_info.private_anti_spoofing_key;
}
#endif //BLE_APP_GFPS
/// @} APP