1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 #define __BTSTACK_FILE__ "pbap_client.c" 39 40 // ***************************************************************************** 41 // 42 #if 0 43 0x0000 = uint32(65542), 44 // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE 45 0x0001 = { uuid16(11 2f) }, 46 // BLUETOOTH_PROTOCOL_L2CAP, BLUETOOTH_PROTOCOL_RFCOMM, BLUETOOTH_PROTOCOL_OBEX 47 0x0004 = { { uuid16(01 00) }, { uuid16(00 03), uint8(19) }, { uuid16(00 08) } } 48 0x0005 = { uuid16(10 02) }, 49 // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS, v1.01 = 0x101 50 0x0009 = { { uuid16(11 30), uint16(257) } }, 51 0x0100 = string(OBEX Phonebook Access Server 52 // BLUETOOTH_ATTRIBUTE_SUPPORTED_FEATURES -- should be 0x317 BLUETOOTH_ATTRIBUTE_PBAP_SUPPORTED_FEATURES? 53 0x0311 = uint8(3), 54 // BLUETOOTH_ATTRIBUTE_SUPPORTED_REPOSITORIES 55 0x0314 = uint8(1), 56 #endif 57 // 58 // ***************************************************************************** 59 60 #include "btstack_config.h" 61 62 #include <stdint.h> 63 #include <stdio.h> 64 #include <stdlib.h> 65 #include <string.h> 66 67 #include "hci_cmd.h" 68 #include "btstack_run_loop.h" 69 #include "btstack_debug.h" 70 #include "hci.h" 71 #include "btstack_memory.h" 72 #include "hci_dump.h" 73 #include "l2cap.h" 74 #include "bluetooth_sdp.h" 75 #include "classic/sdp_client_rfcomm.h" 76 #include "btstack_event.h" 77 #include "md5.h" 78 79 #include "classic/obex.h" 80 #include "classic/obex_iterator.h" 81 #include "classic/goep_client.h" 82 #include "classic/pbap_client.h" 83 84 // 796135f0-f0c5-11d8-0966- 0800200c9a66 85 uint8_t pbap_uuid[] = { 0x79, 0x61, 0x35, 0xf0, 0xf0, 0xc5, 0x11, 0xd8, 0x09, 0x66, 0x08, 0x00, 0x20, 0x0c, 0x9a, 0x66}; 86 const char * pbap_type = "x-bt/phonebook"; 87 const char * pbap_name = "pb.vcf"; 88 89 typedef enum { 90 PBAP_INIT = 0, 91 PBAP_W4_GOEP_CONNECTION, 92 PBAP_W2_SEND_CONNECT_REQUEST, 93 PBAP_W4_CONNECT_RESPONSE, 94 PBAP_W4_USER_AUTHENTICATION, 95 PBAP_W2_SEND_AUTHENTICATED_CONNECT, 96 PBAP_CONNECT_RESPONSE_RECEIVED, 97 PBAP_CONNECTED, 98 // 99 PBAP_W2_SEND_DISCONNECT_REQUEST, 100 PBAP_W4_DISCONNECT_RESPONSE, 101 // 102 PBAP_W2_PULL_PHONEBOOK, 103 PBAP_W4_PHONEBOOK, 104 PBAP_W2_SET_PATH_ROOT, 105 PBAP_W4_SET_PATH_ROOT_COMPLETE, 106 PBAP_W2_SET_PATH_ELEMENT, 107 PBAP_W4_SET_PATH_ELEMENT_COMPLETE, 108 PBAP_W2_GET_PHONEBOOK_SIZE, 109 PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE, 110 } pbap_state_t; 111 112 typedef struct pbap_client { 113 pbap_state_t state; 114 uint16_t cid; 115 bd_addr_t bd_addr; 116 hci_con_handle_t con_handle; 117 uint8_t incoming; 118 uint16_t goep_cid; 119 btstack_packet_handler_t client_handler; 120 const char * current_folder; 121 uint16_t set_path_offset; 122 uint8_t authentication_options; 123 uint16_t authentication_nonce[16]; 124 const char * authentication_password; 125 } pbap_client_t; 126 127 static pbap_client_t _pbap_client; 128 static pbap_client_t * pbap_client = &_pbap_client; 129 130 static void pbap_client_emit_connected_event(pbap_client_t * context, uint8_t status){ 131 uint8_t event[15]; 132 int pos = 0; 133 event[pos++] = HCI_EVENT_PBAP_META; 134 pos++; // skip len 135 event[pos++] = PBAP_SUBEVENT_CONNECTION_OPENED; 136 little_endian_store_16(event,pos,context->cid); 137 pos+=2; 138 event[pos++] = status; 139 memcpy(&event[pos], context->bd_addr, 6); 140 pos += 6; 141 little_endian_store_16(event,pos,context->con_handle); 142 pos += 2; 143 event[pos++] = context->incoming; 144 event[1] = pos - 2; 145 if (pos != sizeof(event)) log_error("goep_client_emit_connected_event size %u", pos); 146 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 147 } 148 149 static void pbap_client_emit_connection_closed_event(pbap_client_t * context){ 150 uint8_t event[5]; 151 int pos = 0; 152 event[pos++] = HCI_EVENT_PBAP_META; 153 pos++; // skip len 154 event[pos++] = PBAP_SUBEVENT_CONNECTION_CLOSED; 155 little_endian_store_16(event,pos,context->cid); 156 pos+=2; 157 event[1] = pos - 2; 158 if (pos != sizeof(event)) log_error("pbap_client_emit_connection_closed_event size %u", pos); 159 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 160 } 161 162 static void pbap_client_emit_operation_complete_event(pbap_client_t * context, uint8_t status){ 163 uint8_t event[6]; 164 int pos = 0; 165 event[pos++] = HCI_EVENT_PBAP_META; 166 pos++; // skip len 167 event[pos++] = PBAP_SUBEVENT_OPERATION_COMPLETED; 168 little_endian_store_16(event,pos,context->cid); 169 pos+=2; 170 event[pos++]= status; 171 event[1] = pos - 2; 172 if (pos != sizeof(event)) log_error("pbap_client_emit_can_send_now_event size %u", pos); 173 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 174 } 175 176 static void pbap_client_emit_phonebook_size_event(pbap_client_t * context, uint8_t status, uint16_t phonebook_size){ 177 uint8_t event[8]; 178 int pos = 0; 179 event[pos++] = HCI_EVENT_PBAP_META; 180 pos++; // skip len 181 event[pos++] = PBAP_SUBEVENT_PHONEBOOK_SIZE; 182 little_endian_store_16(event,pos,context->cid); 183 pos+=2; 184 event[pos++] = status; 185 little_endian_store_16(event,pos, phonebook_size); 186 pos+=2; 187 event[1] = pos - 2; 188 if (pos != sizeof(event)) log_error("pbap_client_emit_phonebook_size_event size %u", pos); 189 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 190 } 191 192 static void pbap_client_emit_authentication_event(pbap_client_t * context, uint8_t options){ 193 // split options 194 uint8_t user_id_required = options & 1 ? 1 : 0; 195 uint8_t full_access = options & 2 ? 1 : 0; 196 197 uint8_t event[7]; 198 int pos = 0; 199 event[pos++] = HCI_EVENT_PBAP_META; 200 pos++; // skip len 201 event[pos++] = PBAP_SUBEVENT_AUTHENTICATION_REQUEST; 202 little_endian_store_16(event,pos,context->cid); 203 pos+=2; 204 event[pos++] = user_id_required; 205 event[pos++] = full_access; 206 if (pos != sizeof(event)) log_error("pbap_client_emit_authentication_event size %u", pos); 207 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 208 } 209 210 static const uint8_t collon = (uint8_t) ':'; 211 212 static void pbap_handle_can_send_now(void){ 213 uint8_t path_element[20]; 214 uint16_t path_element_start; 215 uint16_t path_element_len; 216 uint8_t application_parameters[20]; 217 uint8_t challenge_response[36]; 218 int i; 219 220 MD5_CTX md5_ctx; 221 222 switch (pbap_client->state){ 223 case PBAP_W2_SEND_CONNECT_REQUEST: 224 goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT); 225 goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid); 226 // Add PbapSupportedFeatures 227 application_parameters[0] = PBAP_APPLICATION_PARAMETER_PBAP_SUPPORTED_FEATURES; 228 application_parameters[1] = 4; 229 big_endian_store_32(application_parameters, 2, goep_client_get_pbap_supported_features(pbap_client->goep_cid)); 230 goep_client_add_header_application_parameters(pbap_client->goep_cid, 6, &application_parameters[0]); 231 pbap_client->state = PBAP_W4_CONNECT_RESPONSE; 232 goep_client_execute(pbap_client->goep_cid); 233 break; 234 case PBAP_W2_SEND_AUTHENTICATED_CONNECT: 235 goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT); 236 goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid); 237 // setup authentication challenge response 238 i = 0; 239 challenge_response[i++] = 0; // Tag Digest 240 challenge_response[i++] = 16; // Len 241 // calculate md5 242 MD5_Init(&md5_ctx); 243 MD5_Update(&md5_ctx, pbap_client->authentication_nonce, 16); 244 MD5_Update(&md5_ctx, &collon, 1); 245 MD5_Update(&md5_ctx, pbap_client->authentication_password, strlen(pbap_client->authentication_password)); 246 MD5_Final(&challenge_response[i], &md5_ctx); 247 i += 16; 248 challenge_response[i++] = 2; // Tag Nonce 249 challenge_response[i++] = 16; // Len 250 memcpy(&challenge_response[i], pbap_client->authentication_nonce, 16); 251 i += 16; 252 goep_client_add_header_challenge_response(pbap_client->goep_cid, i, challenge_response); 253 pbap_client->state = PBAP_W4_CONNECT_RESPONSE; 254 goep_client_execute(pbap_client->goep_cid); 255 break; 256 case PBAP_W2_SEND_DISCONNECT_REQUEST: 257 goep_client_create_disconnect_request(pbap_client->goep_cid); 258 pbap_client->state = PBAP_W4_DISCONNECT_RESPONSE; 259 goep_client_execute(pbap_client->goep_cid); 260 return; 261 case PBAP_W2_PULL_PHONEBOOK: 262 case PBAP_W2_GET_PHONEBOOK_SIZE: 263 goep_client_create_get_request(pbap_client->goep_cid); 264 goep_client_add_header_type(pbap_client->goep_cid, pbap_type); 265 goep_client_add_header_name(pbap_client->goep_cid, pbap_name); 266 if (pbap_client->state == PBAP_W2_GET_PHONEBOOK_SIZE){ 267 // Regular TLV wih 1-byte len 268 application_parameters[0] = PBAP_APPLICATION_PARAMETER_MAX_LIST_COUNT; 269 application_parameters[1] = 2; 270 big_endian_store_16(application_parameters, 2, 0); 271 goep_client_add_header_application_parameters(pbap_client->goep_cid, 4, &application_parameters[0]); 272 // state 273 pbap_client->state = PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE; 274 } else { 275 // state 276 pbap_client->state = PBAP_W4_PHONEBOOK; 277 } 278 // send packet 279 goep_client_execute(pbap_client->goep_cid); 280 break; 281 case PBAP_W2_SET_PATH_ROOT: 282 goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory 283 // On Android 4.2 Cyanogenmod, using "" as path fails 284 // goep_client_add_header_name(pbap_client->goep_cid, ""); // empty == / 285 // state 286 pbap_client->state = PBAP_W4_SET_PATH_ROOT_COMPLETE; 287 // send packet 288 goep_client_execute(pbap_client->goep_cid); 289 break; 290 case PBAP_W2_SET_PATH_ELEMENT: 291 // find '/' or '\0' 292 path_element_start = pbap_client->set_path_offset; 293 while (pbap_client->current_folder[pbap_client->set_path_offset] != '\0' && 294 pbap_client->current_folder[pbap_client->set_path_offset] != '/'){ 295 pbap_client->set_path_offset++; 296 } 297 // skip / 298 if (pbap_client->current_folder[pbap_client->set_path_offset] == '/'){ 299 pbap_client->set_path_offset++; 300 } 301 path_element_len = pbap_client->set_path_offset-path_element_start; 302 memcpy(path_element, &pbap_client->current_folder[path_element_start], path_element_len); 303 path_element[path_element_len] = 0; 304 305 goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory 306 goep_client_add_header_name(pbap_client->goep_cid, (const char *) path_element); // next element 307 // state 308 pbap_client->state = PBAP_W4_SET_PATH_ELEMENT_COMPLETE; 309 // send packet 310 goep_client_execute(pbap_client->goep_cid); 311 break; 312 default: 313 break; 314 } 315 } 316 317 static void pbap_parse_authentication_challenge(pbap_client_t * context, const uint8_t * challenge_data, uint16_t challenge_len){ 318 // printf("Challenge: "); 319 // printf_hexdump(challenge_data, challenge_len); 320 int i; 321 // uint8_t charset_code = 0; 322 for (i=0 ; i<challenge_len ; ){ 323 int tag = challenge_data[i]; 324 int len = challenge_data[i + 1]; 325 i += 2; 326 switch (tag) { 327 case 0: 328 if (len != 0x10) { 329 log_error("Invalid OBEX digest len %u", len); 330 return; 331 } 332 memcpy(context->authentication_nonce, &challenge_data[i], 16); 333 // printf("Nonce: "); 334 // printf_hexdump(context->authentication_nonce, 16); 335 break; 336 case 1: 337 context->authentication_options = challenge_data[i]; 338 // printf("Options %u\n", context->authentication_options); 339 break; 340 case 2: 341 // TODO: handle charset 342 // charset_code = challenge_data[i]; 343 break; 344 } 345 i += len; 346 } 347 } 348 349 static void pbap_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 350 351 UNUSED(channel); // ok: there is no channel 352 UNUSED(size); // ok: handling own geop events 353 354 obex_iterator_t it; 355 uint8_t status; 356 switch (packet_type){ 357 case HCI_EVENT_PACKET: 358 switch (hci_event_packet_get_type(packet)) { 359 case HCI_EVENT_GOEP_META: 360 switch (hci_event_goep_meta_get_subevent_code(packet)){ 361 case GOEP_SUBEVENT_CONNECTION_OPENED: 362 status = goep_subevent_connection_opened_get_status(packet); 363 pbap_client->con_handle = goep_subevent_connection_opened_get_con_handle(packet); 364 pbap_client->incoming = goep_subevent_connection_opened_get_incoming(packet); 365 goep_subevent_connection_opened_get_bd_addr(packet, pbap_client->bd_addr); 366 if (status){ 367 log_info("pbap: connection failed %u", status); 368 pbap_client->state = PBAP_INIT; 369 pbap_client_emit_connected_event(pbap_client, status); 370 } else { 371 log_info("pbap: connection established"); 372 pbap_client->goep_cid = goep_subevent_connection_opened_get_goep_cid(packet); 373 pbap_client->state = PBAP_W2_SEND_CONNECT_REQUEST; 374 goep_client_request_can_send_now(pbap_client->goep_cid); 375 } 376 break; 377 case GOEP_SUBEVENT_CONNECTION_CLOSED: 378 if (pbap_client->state != PBAP_CONNECTED){ 379 pbap_client_emit_operation_complete_event(pbap_client, OBEX_DISCONNECTED); 380 } 381 pbap_client->state = PBAP_INIT; 382 pbap_client_emit_connection_closed_event(pbap_client); 383 break; 384 case GOEP_SUBEVENT_CAN_SEND_NOW: 385 pbap_handle_can_send_now(); 386 break; 387 } 388 break; 389 default: 390 break; 391 } 392 break; 393 case GOEP_DATA_PACKET: 394 // TODO: handle chunked data 395 #if 1 396 // obex_dump_packet(goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); 397 #endif 398 switch (pbap_client->state){ 399 case PBAP_W4_CONNECT_RESPONSE: 400 switch (packet[0]){ 401 case OBEX_RESP_SUCCESS: 402 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 403 uint8_t hi = obex_iterator_get_hi(&it); 404 if (hi == OBEX_HEADER_CONNECTION_ID){ 405 goep_client_set_connection_id(pbap_client->goep_cid, obex_iterator_get_data_32(&it)); 406 } 407 } 408 pbap_client->state = PBAP_CONNECTED; 409 pbap_client_emit_connected_event(pbap_client, 0); 410 break; 411 case OBEX_RESP_UNAUTHORIZED: 412 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 413 uint8_t hi = obex_iterator_get_hi(&it); 414 if (hi == OBEX_HEADER_AUTHENTICATION_CHALLENGE){ 415 pbap_parse_authentication_challenge(pbap_client, obex_iterator_get_data(&it), obex_iterator_get_data_len(&it)); 416 } 417 } 418 pbap_client->state = PBAP_W4_USER_AUTHENTICATION; 419 pbap_client_emit_authentication_event(pbap_client, pbap_client->authentication_options); 420 break; 421 default: 422 log_info("pbap: obex connect failed, result 0x%02x", packet[0]); 423 pbap_client->state = PBAP_INIT; 424 pbap_client_emit_connected_event(pbap_client, OBEX_CONNECT_FAILED); 425 break; 426 } 427 break; 428 case PBAP_W4_DISCONNECT_RESPONSE: 429 goep_client_disconnect(pbap_client->goep_cid); 430 break; 431 case PBAP_W4_SET_PATH_ROOT_COMPLETE: 432 case PBAP_W4_SET_PATH_ELEMENT_COMPLETE: 433 if (packet[0] == OBEX_RESP_SUCCESS){ 434 if (pbap_client->current_folder){ 435 pbap_client->state = PBAP_W2_SET_PATH_ELEMENT; 436 goep_client_request_can_send_now(pbap_client->goep_cid); 437 } else { 438 pbap_client_emit_operation_complete_event(pbap_client, 0); 439 } 440 } else if (packet[0] == OBEX_RESP_NOT_FOUND){ 441 pbap_client->state = PBAP_CONNECTED; 442 pbap_client_emit_operation_complete_event(pbap_client, OBEX_NOT_FOUND); 443 } else { 444 pbap_client->state = PBAP_CONNECTED; 445 pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR); 446 } 447 break; 448 case PBAP_W4_PHONEBOOK: 449 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 450 uint8_t hi = obex_iterator_get_hi(&it); 451 if (hi == OBEX_HEADER_BODY || hi == OBEX_HEADER_END_OF_BODY){ 452 uint16_t data_len = obex_iterator_get_data_len(&it); 453 const uint8_t * data = obex_iterator_get_data(&it); 454 pbap_client->client_handler(PBAP_DATA_PACKET, pbap_client->cid, (uint8_t *) data, data_len); 455 } 456 } 457 if (packet[0] == OBEX_RESP_CONTINUE){ 458 pbap_client->state = PBAP_W2_PULL_PHONEBOOK; 459 goep_client_request_can_send_now(pbap_client->goep_cid); 460 } else if (packet[0] == OBEX_RESP_SUCCESS){ 461 pbap_client->state = PBAP_CONNECTED; 462 pbap_client_emit_operation_complete_event(pbap_client, 0); 463 } else { 464 pbap_client->state = PBAP_CONNECTED; 465 pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR); 466 } 467 break; 468 case PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE: 469 pbap_client->state = PBAP_CONNECTED; 470 if (packet[0] == OBEX_RESP_SUCCESS){ 471 int have_size = 0; 472 uint16_t phonebook_size; 473 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 474 uint8_t hi = obex_iterator_get_hi(&it); 475 if (hi == OBEX_HEADER_APPLICATION_PARAMETERS){ 476 uint16_t data_len = obex_iterator_get_data_len(&it); 477 const uint8_t * data = obex_iterator_get_data(&it); 478 // iterate over application headers (TLV with 1 bytes len) 479 unsigned int i = 0; 480 while (i<data_len){ 481 uint8_t tag = data[i++]; 482 uint8_t len = data[i++]; 483 if (tag == PBAP_APPLICATION_PARAMETER_PHONEBOOK_SIZE && len == 2){ 484 have_size = 1; 485 phonebook_size = big_endian_read_16(data, i); 486 } 487 i+=len; 488 } 489 } 490 } 491 if (have_size){ 492 pbap_client_emit_phonebook_size_event(pbap_client, 0, phonebook_size); 493 break; 494 } 495 } 496 pbap_client_emit_phonebook_size_event(pbap_client, OBEX_UNKNOWN_ERROR, 0); 497 break; 498 default: 499 break; 500 } 501 break; 502 default: 503 break; 504 } 505 } 506 507 void pbap_client_init(void){ 508 memset(pbap_client, 0, sizeof(pbap_client_t)); 509 pbap_client->state = PBAP_INIT; 510 pbap_client->cid = 1; 511 } 512 513 uint8_t pbap_connect(btstack_packet_handler_t handler, bd_addr_t addr, uint16_t * out_cid){ 514 if (pbap_client->state != PBAP_INIT) return BTSTACK_MEMORY_ALLOC_FAILED; 515 pbap_client->state = PBAP_W4_GOEP_CONNECTION; 516 pbap_client->client_handler = handler; 517 uint8_t err = goep_client_create_connection(&pbap_packet_handler, addr, BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE, &pbap_client->goep_cid); 518 *out_cid = pbap_client->cid; 519 if (err) return err; 520 return 0; 521 } 522 523 uint8_t pbap_disconnect(uint16_t pbap_cid){ 524 UNUSED(pbap_cid); 525 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 526 pbap_client->state = PBAP_W2_SEND_DISCONNECT_REQUEST; 527 goep_client_request_can_send_now(pbap_client->goep_cid); 528 return 0; 529 } 530 531 uint8_t pbap_get_phonebook_size(uint16_t pbap_cid){ 532 UNUSED(pbap_cid); 533 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 534 pbap_client->state = PBAP_W2_GET_PHONEBOOK_SIZE; 535 goep_client_request_can_send_now(pbap_client->goep_cid); 536 return 0; 537 } 538 539 uint8_t pbap_pull_phonebook(uint16_t pbap_cid){ 540 UNUSED(pbap_cid); 541 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 542 pbap_client->state = PBAP_W2_PULL_PHONEBOOK; 543 goep_client_request_can_send_now(pbap_client->goep_cid); 544 return 0; 545 } 546 547 uint8_t pbap_set_phonebook(uint16_t pbap_cid, const char * path){ 548 UNUSED(pbap_cid); 549 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 550 pbap_client->state = PBAP_W2_SET_PATH_ROOT; 551 pbap_client->current_folder = path; 552 pbap_client->set_path_offset = 0; 553 goep_client_request_can_send_now(pbap_client->goep_cid); 554 return 0; 555 } 556 557 uint8_t pbap_authentication_password(uint16_t pbap_cid, const char * password){ 558 UNUSED(pbap_cid); 559 if (pbap_client->state != PBAP_W4_USER_AUTHENTICATION) return BTSTACK_BUSY; 560 pbap_client->state = PBAP_W2_SEND_AUTHENTICATED_CONNECT; 561 pbap_client->authentication_password = password; 562 goep_client_request_can_send_now(pbap_client->goep_cid); 563 return 0; 564 } 565