xref: /btstack/src/classic/pbap_client.c (revision 8aee7be2bb0c8b43bca4bd821fe34961b31db7aa)
1 /*
2  * Copyright (C) 2014 BlueKitchen GmbH
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions
6  * are met:
7  *
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the copyright holders nor the names of
14  *    contributors may be used to endorse or promote products derived
15  *    from this software without specific prior written permission.
16  * 4. Any redistribution, use, or modification is done solely for
17  *    personal benefit and not for any commercial purpose or for
18  *    monetary gain.
19  *
20  * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
21  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
24  * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
25  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
26  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
27  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
28  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
30  * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * Please inquire about commercial licensing options at
34  * [email protected]
35  *
36  */
37 
38 #define __BTSTACK_FILE__ "pbap_client.c"
39 
40 // *****************************************************************************
41 //
42 #if 0
43     0x0000 = uint32(65542),
44     // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE
45     0x0001 = { uuid16(11 2f) },
46     // BLUETOOTH_PROTOCOL_L2CAP, BLUETOOTH_PROTOCOL_RFCOMM, BLUETOOTH_PROTOCOL_OBEX
47     0x0004 = { { uuid16(01 00) }, { uuid16(00 03), uint8(19) }, { uuid16(00 08) } }
48     0x0005 = { uuid16(10 02) },
49     // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS, v1.01 = 0x101
50     0x0009 = { { uuid16(11 30), uint16(257) } },
51     0x0100 = string(OBEX Phonebook Access Server
52     // BLUETOOTH_ATTRIBUTE_SUPPORTED_FEATURES -- should be 0x317 BLUETOOTH_ATTRIBUTE_PBAP_SUPPORTED_FEATURES?
53     0x0311 = uint8(3),
54     // BLUETOOTH_ATTRIBUTE_SUPPORTED_REPOSITORIES
55     0x0314 = uint8(1),
56 #endif
57 //
58 // *****************************************************************************
59 
60 #include "btstack_config.h"
61 
62 #include <stdint.h>
63 #include <stdio.h>
64 #include <stdlib.h>
65 #include <string.h>
66 
67 #include "hci_cmd.h"
68 #include "btstack_run_loop.h"
69 #include "btstack_debug.h"
70 #include "hci.h"
71 #include "btstack_memory.h"
72 #include "hci_dump.h"
73 #include "l2cap.h"
74 #include "bluetooth_sdp.h"
75 #include "classic/sdp_client_rfcomm.h"
76 #include "btstack_event.h"
77 #include "md5.h"
78 
79 #include "classic/obex.h"
80 #include "classic/obex_iterator.h"
81 #include "classic/goep_client.h"
82 #include "classic/pbap_client.h"
83 
84 // 796135f0-f0c5-11d8-0966- 0800200c9a66
85 uint8_t pbap_uuid[] = { 0x79, 0x61, 0x35, 0xf0, 0xf0, 0xc5, 0x11, 0xd8, 0x09, 0x66, 0x08, 0x00, 0x20, 0x0c, 0x9a, 0x66};
86 const char * pbap_type = "x-bt/phonebook";
87 const char * pbap_name = "pb.vcf";
88 
89 typedef enum {
90     PBAP_INIT = 0,
91     PBAP_W4_GOEP_CONNECTION,
92     PBAP_W2_SEND_CONNECT_REQUEST,
93     PBAP_W4_CONNECT_RESPONSE,
94     PBAP_W4_USER_AUTHENTICATION,
95     PBAP_W2_SEND_AUTHENTICATED_CONNECT,
96     PBAP_CONNECT_RESPONSE_RECEIVED,
97     PBAP_CONNECTED,
98     //
99     PBAP_W2_SEND_DISCONNECT_REQUEST,
100     PBAP_W4_DISCONNECT_RESPONSE,
101     //
102     PBAP_W2_PULL_PHONEBOOK,
103     PBAP_W4_PHONEBOOK,
104     PBAP_W2_SET_PATH_ROOT,
105     PBAP_W4_SET_PATH_ROOT_COMPLETE,
106     PBAP_W2_SET_PATH_ELEMENT,
107     PBAP_W4_SET_PATH_ELEMENT_COMPLETE,
108     PBAP_W2_GET_PHONEBOOK_SIZE,
109     PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE,
110 } pbap_state_t;
111 
112 typedef struct pbap_client {
113     pbap_state_t state;
114     uint16_t  cid;
115     bd_addr_t bd_addr;
116     hci_con_handle_t con_handle;
117     uint8_t   incoming;
118     uint16_t  goep_cid;
119     btstack_packet_handler_t client_handler;
120     const char * current_folder;
121     uint16_t set_path_offset;
122     uint8_t  authentication_options;
123     uint16_t authentication_nonce[16];
124     const char * authentication_password;
125 } pbap_client_t;
126 
127 static pbap_client_t _pbap_client;
128 static pbap_client_t * pbap_client = &_pbap_client;
129 
130 static void pbap_client_emit_connected_event(pbap_client_t * context, uint8_t status){
131     uint8_t event[15];
132     int pos = 0;
133     event[pos++] = HCI_EVENT_PBAP_META;
134     pos++;  // skip len
135     event[pos++] = PBAP_SUBEVENT_CONNECTION_OPENED;
136     little_endian_store_16(event,pos,context->cid);
137     pos+=2;
138     event[pos++] = status;
139     memcpy(&event[pos], context->bd_addr, 6);
140     pos += 6;
141     little_endian_store_16(event,pos,context->con_handle);
142     pos += 2;
143     event[pos++] = context->incoming;
144     event[1] = pos - 2;
145     if (pos != sizeof(event)) log_error("goep_client_emit_connected_event size %u", pos);
146     context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos);
147 }
148 
149 static void pbap_client_emit_connection_closed_event(pbap_client_t * context){
150     uint8_t event[5];
151     int pos = 0;
152     event[pos++] = HCI_EVENT_PBAP_META;
153     pos++;  // skip len
154     event[pos++] = PBAP_SUBEVENT_CONNECTION_CLOSED;
155     little_endian_store_16(event,pos,context->cid);
156     pos+=2;
157     event[1] = pos - 2;
158     if (pos != sizeof(event)) log_error("pbap_client_emit_connection_closed_event size %u", pos);
159     context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos);
160 }
161 
162 static void pbap_client_emit_operation_complete_event(pbap_client_t * context, uint8_t status){
163     uint8_t event[6];
164     int pos = 0;
165     event[pos++] = HCI_EVENT_PBAP_META;
166     pos++;  // skip len
167     event[pos++] = PBAP_SUBEVENT_OPERATION_COMPLETED;
168     little_endian_store_16(event,pos,context->cid);
169     pos+=2;
170     event[pos++]= status;
171     event[1] = pos - 2;
172     if (pos != sizeof(event)) log_error("pbap_client_emit_can_send_now_event size %u", pos);
173     context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos);
174 }
175 
176 static void pbap_client_emit_phonebook_size_event(pbap_client_t * context, uint8_t status, uint16_t phonebook_size){
177     uint8_t event[8];
178     int pos = 0;
179     event[pos++] = HCI_EVENT_PBAP_META;
180     pos++;  // skip len
181     event[pos++] = PBAP_SUBEVENT_PHONEBOOK_SIZE;
182     little_endian_store_16(event,pos,context->cid);
183     pos+=2;
184     event[pos++] = status;
185     little_endian_store_16(event,pos, phonebook_size);
186     pos+=2;
187     event[1] = pos - 2;
188     if (pos != sizeof(event)) log_error("pbap_client_emit_phonebook_size_event size %u", pos);
189     context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos);
190 }
191 
192 static void pbap_client_emit_authentication_event(pbap_client_t * context, uint8_t options){
193     // split options
194     uint8_t user_id_required = options & 1 ? 1 : 0;
195     uint8_t full_access      = options & 2 ? 1 : 0;
196 
197     uint8_t event[7];
198     int pos = 0;
199     event[pos++] = HCI_EVENT_PBAP_META;
200     pos++;  // skip len
201     event[pos++] = PBAP_SUBEVENT_AUTHENTICATION_REQUEST;
202     little_endian_store_16(event,pos,context->cid);
203     pos+=2;
204     event[pos++] = user_id_required;
205     event[pos++] = full_access;
206     if (pos != sizeof(event)) log_error("pbap_client_emit_authentication_event size %u", pos);
207     context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos);
208 }
209 
210 static const uint8_t collon = (uint8_t) ':';
211 
212 static void pbap_handle_can_send_now(void){
213     uint8_t  path_element[20];
214     uint16_t path_element_start;
215     uint16_t path_element_len;
216     uint8_t  application_parameters[20];
217     uint8_t  challenge_response[36];
218     int i;
219 
220     MD5_CTX md5_ctx;
221 
222     switch (pbap_client->state){
223         case PBAP_W2_SEND_CONNECT_REQUEST:
224             goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT);
225             goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid);
226             // Add PbapSupportedFeatures
227             application_parameters[0] = PBAP_APPLICATION_PARAMETER_PBAP_SUPPORTED_FEATURES;
228             application_parameters[1] = 4;
229             big_endian_store_32(application_parameters, 2, goep_client_get_pbap_supported_features(pbap_client->goep_cid));
230             goep_client_add_header_application_parameters(pbap_client->goep_cid, 6, &application_parameters[0]);
231             pbap_client->state = PBAP_W4_CONNECT_RESPONSE;
232             goep_client_execute(pbap_client->goep_cid);
233             break;
234         case PBAP_W2_SEND_AUTHENTICATED_CONNECT:
235             goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT);
236             goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid);
237             // setup authentication challenge response
238             i = 0;
239             challenge_response[i++] = 0;  // Tag Digest
240             challenge_response[i++] = 16; // Len
241             // calculate md5
242             MD5_Init(&md5_ctx);
243             MD5_Update(&md5_ctx, pbap_client->authentication_nonce, 16);
244             MD5_Update(&md5_ctx, &collon, 1);
245             MD5_Update(&md5_ctx, pbap_client->authentication_password, strlen(pbap_client->authentication_password));
246             MD5_Final(&challenge_response[i], &md5_ctx);
247             i += 16;
248             challenge_response[i++] = 2;  // Tag Nonce
249             challenge_response[i++] = 16; // Len
250             memcpy(&challenge_response[i], pbap_client->authentication_nonce, 16);
251             i += 16;
252             goep_client_add_header_challenge_response(pbap_client->goep_cid, i, challenge_response);
253             pbap_client->state = PBAP_W4_CONNECT_RESPONSE;
254             goep_client_execute(pbap_client->goep_cid);
255             break;
256         case PBAP_W2_SEND_DISCONNECT_REQUEST:
257             goep_client_create_disconnect_request(pbap_client->goep_cid);
258             pbap_client->state = PBAP_W4_DISCONNECT_RESPONSE;
259             goep_client_execute(pbap_client->goep_cid);
260             return;
261         case PBAP_W2_PULL_PHONEBOOK:
262         case PBAP_W2_GET_PHONEBOOK_SIZE:
263             goep_client_create_get_request(pbap_client->goep_cid);
264             goep_client_add_header_type(pbap_client->goep_cid, pbap_type);
265             goep_client_add_header_name(pbap_client->goep_cid, pbap_name);
266             if (pbap_client->state == PBAP_W2_GET_PHONEBOOK_SIZE){
267                 // Regular TLV wih 1-byte len
268                 application_parameters[0] = PBAP_APPLICATION_PARAMETER_MAX_LIST_COUNT;
269                 application_parameters[1] = 2;
270                 big_endian_store_16(application_parameters, 2, 0);
271                 goep_client_add_header_application_parameters(pbap_client->goep_cid, 4, &application_parameters[0]);
272                 // state
273                 pbap_client->state = PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE;
274             } else {
275                 // state
276                 pbap_client->state = PBAP_W4_PHONEBOOK;
277             }
278             // send packet
279             goep_client_execute(pbap_client->goep_cid);
280             break;
281         case PBAP_W2_SET_PATH_ROOT:
282             goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory
283             // On Android 4.2 Cyanogenmod, using "" as path fails
284             // goep_client_add_header_name(pbap_client->goep_cid, "");     // empty == /
285             // state
286             pbap_client->state = PBAP_W4_SET_PATH_ROOT_COMPLETE;
287             // send packet
288             goep_client_execute(pbap_client->goep_cid);
289             break;
290         case PBAP_W2_SET_PATH_ELEMENT:
291             // find '/' or '\0'
292             path_element_start = pbap_client->set_path_offset;
293             while (pbap_client->current_folder[pbap_client->set_path_offset] != '\0' &&
294                 pbap_client->current_folder[pbap_client->set_path_offset] != '/'){
295                 pbap_client->set_path_offset++;
296             }
297             // skip /
298             if (pbap_client->current_folder[pbap_client->set_path_offset] == '/'){
299                 pbap_client->set_path_offset++;
300             }
301             path_element_len = pbap_client->set_path_offset-path_element_start;
302             memcpy(path_element, &pbap_client->current_folder[path_element_start], path_element_len);
303             path_element[path_element_len] = 0;
304 
305             goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory
306             goep_client_add_header_name(pbap_client->goep_cid, (const char *) path_element); // next element
307             // state
308             pbap_client->state = PBAP_W4_SET_PATH_ELEMENT_COMPLETE;
309             // send packet
310             goep_client_execute(pbap_client->goep_cid);
311             break;
312         default:
313             break;
314     }
315 }
316 
317 static void pbap_parse_authentication_challenge(pbap_client_t * context, const uint8_t * challenge_data, uint16_t challenge_len){
318     // printf("Challenge:  ");
319     // printf_hexdump(challenge_data, challenge_len);
320     int i;
321     // uint8_t charset_code = 0;
322     for (i=0 ; i<challenge_len ; ){
323         int tag = challenge_data[i];
324         int len = challenge_data[i + 1];
325         i += 2;
326         switch (tag) {
327             case 0:
328                 if (len != 0x10) {
329                     log_error("Invalid OBEX digest len %u", len);
330                     return;
331                 }
332                 memcpy(context->authentication_nonce, &challenge_data[i], 16);
333                 // printf("Nonce: ");
334                 // printf_hexdump(context->authentication_nonce, 16);
335                 break;
336             case 1:
337                 context->authentication_options = challenge_data[i];
338                 // printf("Options %u\n", context->authentication_options);
339                 break;
340             case 2:
341                 // TODO: handle charset
342                 // charset_code = challenge_data[i];
343                 break;
344         }
345         i += len;
346     }
347 }
348 
349 static void pbap_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){
350 
351     UNUSED(channel); // ok: there is no channel
352     UNUSED(size);    // ok: handling own geop events
353 
354     obex_iterator_t it;
355     uint8_t status;
356     switch (packet_type){
357         case HCI_EVENT_PACKET:
358             switch (hci_event_packet_get_type(packet)) {
359                 case HCI_EVENT_GOEP_META:
360                     switch (hci_event_goep_meta_get_subevent_code(packet)){
361                         case GOEP_SUBEVENT_CONNECTION_OPENED:
362                             status = goep_subevent_connection_opened_get_status(packet);
363                             pbap_client->con_handle = goep_subevent_connection_opened_get_con_handle(packet);
364                             pbap_client->incoming = goep_subevent_connection_opened_get_incoming(packet);
365                             goep_subevent_connection_opened_get_bd_addr(packet, pbap_client->bd_addr);
366                             if (status){
367                                 log_info("pbap: connection failed %u", status);
368                                 pbap_client->state = PBAP_INIT;
369                                 pbap_client_emit_connected_event(pbap_client, status);
370                             } else {
371                                 log_info("pbap: connection established");
372                                 pbap_client->goep_cid = goep_subevent_connection_opened_get_goep_cid(packet);
373                                 pbap_client->state = PBAP_W2_SEND_CONNECT_REQUEST;
374                                 goep_client_request_can_send_now(pbap_client->goep_cid);
375                             }
376                             break;
377                         case GOEP_SUBEVENT_CONNECTION_CLOSED:
378                             if (pbap_client->state != PBAP_CONNECTED){
379                                 pbap_client_emit_operation_complete_event(pbap_client, OBEX_DISCONNECTED);
380                             }
381                             pbap_client->state = PBAP_INIT;
382                             pbap_client_emit_connection_closed_event(pbap_client);
383                             break;
384                         case GOEP_SUBEVENT_CAN_SEND_NOW:
385                             pbap_handle_can_send_now();
386                             break;
387                     }
388                     break;
389                 default:
390                     break;
391             }
392             break;
393         case GOEP_DATA_PACKET:
394             // TODO: handle chunked data
395 #if 1
396             // obex_dump_packet(goep_client_get_request_opcode(pbap_client->goep_cid), packet, size);
397 #endif
398             switch (pbap_client->state){
399                 case PBAP_W4_CONNECT_RESPONSE:
400                     switch (packet[0]){
401                         case OBEX_RESP_SUCCESS:
402                             for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){
403                                 uint8_t hi = obex_iterator_get_hi(&it);
404                                 if (hi == OBEX_HEADER_CONNECTION_ID){
405                                     goep_client_set_connection_id(pbap_client->goep_cid, obex_iterator_get_data_32(&it));
406                                 }
407                             }
408                             pbap_client->state = PBAP_CONNECTED;
409                             pbap_client_emit_connected_event(pbap_client, 0);
410                             break;
411                         case OBEX_RESP_UNAUTHORIZED:
412                             for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){
413                                 uint8_t hi = obex_iterator_get_hi(&it);
414                                 if (hi == OBEX_HEADER_AUTHENTICATION_CHALLENGE){
415                                     pbap_parse_authentication_challenge(pbap_client, obex_iterator_get_data(&it), obex_iterator_get_data_len(&it));
416                                 }
417                             }
418                             pbap_client->state = PBAP_W4_USER_AUTHENTICATION;
419                             pbap_client_emit_authentication_event(pbap_client, pbap_client->authentication_options);
420                             break;
421                         default:
422                             log_info("pbap: obex connect failed, result 0x%02x", packet[0]);
423                             pbap_client->state = PBAP_INIT;
424                             pbap_client_emit_connected_event(pbap_client, OBEX_CONNECT_FAILED);
425                             break;
426                     }
427                     break;
428                 case PBAP_W4_DISCONNECT_RESPONSE:
429                         goep_client_disconnect(pbap_client->goep_cid);
430                         break;
431                 case PBAP_W4_SET_PATH_ROOT_COMPLETE:
432                 case PBAP_W4_SET_PATH_ELEMENT_COMPLETE:
433                     if (packet[0] == OBEX_RESP_SUCCESS){
434                         if (pbap_client->current_folder){
435                             pbap_client->state = PBAP_W2_SET_PATH_ELEMENT;
436                             goep_client_request_can_send_now(pbap_client->goep_cid);
437                         } else {
438                             pbap_client_emit_operation_complete_event(pbap_client, 0);
439                         }
440                     } else if (packet[0] == OBEX_RESP_NOT_FOUND){
441                         pbap_client->state = PBAP_CONNECTED;
442                         pbap_client_emit_operation_complete_event(pbap_client, OBEX_NOT_FOUND);
443                     } else {
444                         pbap_client->state = PBAP_CONNECTED;
445                         pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR);
446                     }
447                     break;
448                 case PBAP_W4_PHONEBOOK:
449                     for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){
450                         uint8_t hi = obex_iterator_get_hi(&it);
451                         if (hi == OBEX_HEADER_BODY || hi == OBEX_HEADER_END_OF_BODY){
452                             uint16_t     data_len = obex_iterator_get_data_len(&it);
453                             const uint8_t  * data =  obex_iterator_get_data(&it);
454                             pbap_client->client_handler(PBAP_DATA_PACKET, pbap_client->cid, (uint8_t *) data, data_len);
455                         }
456                     }
457                     if (packet[0] == OBEX_RESP_CONTINUE){
458                         pbap_client->state = PBAP_W2_PULL_PHONEBOOK;
459                         goep_client_request_can_send_now(pbap_client->goep_cid);
460                     } else if (packet[0] == OBEX_RESP_SUCCESS){
461                         pbap_client->state = PBAP_CONNECTED;
462                         pbap_client_emit_operation_complete_event(pbap_client, 0);
463                     } else {
464                         pbap_client->state = PBAP_CONNECTED;
465                         pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR);
466                     }
467                     break;
468                 case PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE:
469                     pbap_client->state = PBAP_CONNECTED;
470                     if (packet[0] == OBEX_RESP_SUCCESS){
471                         int have_size = 0;
472                         uint16_t phonebook_size;
473                         for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){
474                             uint8_t hi = obex_iterator_get_hi(&it);
475                             if (hi == OBEX_HEADER_APPLICATION_PARAMETERS){
476                                 uint16_t     data_len = obex_iterator_get_data_len(&it);
477                                 const uint8_t  * data =  obex_iterator_get_data(&it);
478                                 // iterate over application headers (TLV with 1 bytes len)
479                                 unsigned int i = 0;
480                                 while (i<data_len){
481                                     uint8_t tag = data[i++];
482                                     uint8_t len = data[i++];
483                                     if (tag == PBAP_APPLICATION_PARAMETER_PHONEBOOK_SIZE && len == 2){
484                                         have_size = 1;
485                                         phonebook_size = big_endian_read_16(data, i);
486                                     }
487                                     i+=len;
488                                 }
489                             }
490                         }
491                         if (have_size){
492                             pbap_client_emit_phonebook_size_event(pbap_client, 0, phonebook_size);
493                             break;
494                         }
495                     }
496                     pbap_client_emit_phonebook_size_event(pbap_client, OBEX_UNKNOWN_ERROR, 0);
497                     break;
498                 default:
499                     break;
500             }
501             break;
502         default:
503             break;
504     }
505 }
506 
507 void pbap_client_init(void){
508     memset(pbap_client, 0, sizeof(pbap_client_t));
509     pbap_client->state = PBAP_INIT;
510     pbap_client->cid = 1;
511 }
512 
513 uint8_t pbap_connect(btstack_packet_handler_t handler, bd_addr_t addr, uint16_t * out_cid){
514     if (pbap_client->state != PBAP_INIT) return BTSTACK_MEMORY_ALLOC_FAILED;
515     pbap_client->state = PBAP_W4_GOEP_CONNECTION;
516     pbap_client->client_handler = handler;
517     uint8_t err = goep_client_create_connection(&pbap_packet_handler, addr, BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE, &pbap_client->goep_cid);
518     *out_cid = pbap_client->cid;
519     if (err) return err;
520     return 0;
521 }
522 
523 uint8_t pbap_disconnect(uint16_t pbap_cid){
524     UNUSED(pbap_cid);
525     if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY;
526     pbap_client->state = PBAP_W2_SEND_DISCONNECT_REQUEST;
527     goep_client_request_can_send_now(pbap_client->goep_cid);
528     return 0;
529 }
530 
531 uint8_t pbap_get_phonebook_size(uint16_t pbap_cid){
532     UNUSED(pbap_cid);
533     if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY;
534     pbap_client->state = PBAP_W2_GET_PHONEBOOK_SIZE;
535     goep_client_request_can_send_now(pbap_client->goep_cid);
536     return 0;
537 }
538 
539 uint8_t pbap_pull_phonebook(uint16_t pbap_cid){
540     UNUSED(pbap_cid);
541     if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY;
542     pbap_client->state = PBAP_W2_PULL_PHONEBOOK;
543     goep_client_request_can_send_now(pbap_client->goep_cid);
544     return 0;
545 }
546 
547 uint8_t pbap_set_phonebook(uint16_t pbap_cid, const char * path){
548     UNUSED(pbap_cid);
549     if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY;
550     pbap_client->state = PBAP_W2_SET_PATH_ROOT;
551     pbap_client->current_folder = path;
552     pbap_client->set_path_offset = 0;
553     goep_client_request_can_send_now(pbap_client->goep_cid);
554     return 0;
555 }
556 
557 uint8_t pbap_authentication_password(uint16_t pbap_cid, const char * password){
558     UNUSED(pbap_cid);
559     if (pbap_client->state != PBAP_W4_USER_AUTHENTICATION) return BTSTACK_BUSY;
560     pbap_client->state = PBAP_W2_SEND_AUTHENTICATED_CONNECT;
561     pbap_client->authentication_password = password;
562     goep_client_request_can_send_now(pbap_client->goep_cid);
563     return 0;
564 }
565