1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 #define __BTSTACK_FILE__ "pbap_client.c" 39 40 // ***************************************************************************** 41 // 42 #if 0 43 0x0000 = uint32(65542), 44 // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE 45 0x0001 = { uuid16(11 2f) }, 46 // BLUETOOTH_PROTOCOL_L2CAP, BLUETOOTH_PROTOCOL_RFCOMM, BLUETOOTH_PROTOCOL_OBEX 47 0x0004 = { { uuid16(01 00) }, { uuid16(00 03), uint8(19) }, { uuid16(00 08) } } 48 0x0005 = { uuid16(10 02) }, 49 // BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS, v1.01 = 0x101 50 0x0009 = { { uuid16(11 30), uint16(257) } }, 51 0x0100 = string(OBEX Phonebook Access Server 52 // BLUETOOTH_ATTRIBUTE_SUPPORTED_FEATURES -- should be 0x317 BLUETOOTH_ATTRIBUTE_PBAP_SUPPORTED_FEATURES? 53 0x0311 = uint8(3), 54 // BLUETOOTH_ATTRIBUTE_SUPPORTED_REPOSITORIES 55 0x0314 = uint8(1), 56 #endif 57 // 58 // ***************************************************************************** 59 60 #include "btstack_config.h" 61 62 #include <stdint.h> 63 #include <stdio.h> 64 #include <stdlib.h> 65 #include <string.h> 66 67 #include "hci_cmd.h" 68 #include "btstack_run_loop.h" 69 #include "btstack_debug.h" 70 #include "hci.h" 71 #include "btstack_memory.h" 72 #include "hci_dump.h" 73 #include "l2cap.h" 74 #include "bluetooth_sdp.h" 75 #include "classic/sdp_client_rfcomm.h" 76 #include "btstack_event.h" 77 #include "md5.h" 78 79 #include "classic/obex.h" 80 #include "classic/obex_iterator.h" 81 #include "classic/goep_client.h" 82 #include "classic/pbap_client.h" 83 84 // 796135f0-f0c5-11d8-0966- 0800200c9a66 85 uint8_t pbap_uuid[] = { 0x79, 0x61, 0x35, 0xf0, 0xf0, 0xc5, 0x11, 0xd8, 0x09, 0x66, 0x08, 0x00, 0x20, 0x0c, 0x9a, 0x66}; 86 const char * pbap_type = "x-bt/phonebook"; 87 const char * pbap_name = "pb.vcf"; 88 89 typedef enum { 90 PBAP_INIT = 0, 91 PBAP_W4_GOEP_CONNECTION, 92 PBAP_W2_SEND_CONNECT_REQUEST, 93 PBAP_W4_CONNECT_RESPONSE, 94 PBAP_W4_USER_AUTHENTICATION, 95 PBAP_W2_SEND_AUTHENTICATED_CONNECT, 96 PBAP_CONNECT_RESPONSE_RECEIVED, 97 PBAP_CONNECTED, 98 // 99 PBAP_W2_SEND_DISCONNECT_REQUEST, 100 PBAP_W4_DISCONNECT_RESPONSE, 101 // 102 PBAP_W2_PULL_PHONEBOOK, 103 PBAP_W4_PHONEBOOK, 104 PBAP_W2_SET_PATH_ROOT, 105 PBAP_W4_SET_PATH_ROOT_COMPLETE, 106 PBAP_W2_SET_PATH_ELEMENT, 107 PBAP_W4_SET_PATH_ELEMENT_COMPLETE, 108 PBAP_W2_GET_PHONEBOOK_SIZE, 109 PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE, 110 } pbap_state_t; 111 112 typedef struct pbap_client { 113 pbap_state_t state; 114 uint16_t cid; 115 bd_addr_t bd_addr; 116 hci_con_handle_t con_handle; 117 uint8_t incoming; 118 uint16_t goep_cid; 119 btstack_packet_handler_t client_handler; 120 const char * current_folder; 121 uint16_t set_path_offset; 122 uint8_t authentication_options; 123 uint16_t authentication_nonce[16]; 124 const char * authentication_password; 125 } pbap_client_t; 126 127 static pbap_client_t _pbap_client; 128 static pbap_client_t * pbap_client = &_pbap_client; 129 130 static void pbap_client_emit_connected_event(pbap_client_t * context, uint8_t status){ 131 uint8_t event[15]; 132 int pos = 0; 133 event[pos++] = HCI_EVENT_PBAP_META; 134 pos++; // skip len 135 event[pos++] = PBAP_SUBEVENT_CONNECTION_OPENED; 136 little_endian_store_16(event,pos,context->cid); 137 pos+=2; 138 event[pos++] = status; 139 memcpy(&event[pos], context->bd_addr, 6); 140 pos += 6; 141 little_endian_store_16(event,pos,context->con_handle); 142 pos += 2; 143 event[pos++] = context->incoming; 144 event[1] = pos - 2; 145 if (pos != sizeof(event)) log_error("goep_client_emit_connected_event size %u", pos); 146 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 147 } 148 149 static void pbap_client_emit_connection_closed_event(pbap_client_t * context){ 150 uint8_t event[5]; 151 int pos = 0; 152 event[pos++] = HCI_EVENT_PBAP_META; 153 pos++; // skip len 154 event[pos++] = PBAP_SUBEVENT_CONNECTION_CLOSED; 155 little_endian_store_16(event,pos,context->cid); 156 pos+=2; 157 event[1] = pos - 2; 158 if (pos != sizeof(event)) log_error("pbap_client_emit_connection_closed_event size %u", pos); 159 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 160 } 161 162 static void pbap_client_emit_operation_complete_event(pbap_client_t * context, uint8_t status){ 163 uint8_t event[6]; 164 int pos = 0; 165 event[pos++] = HCI_EVENT_PBAP_META; 166 pos++; // skip len 167 event[pos++] = PBAP_SUBEVENT_OPERATION_COMPLETED; 168 little_endian_store_16(event,pos,context->cid); 169 pos+=2; 170 event[pos++]= status; 171 event[1] = pos - 2; 172 if (pos != sizeof(event)) log_error("pbap_client_emit_can_send_now_event size %u", pos); 173 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 174 } 175 176 static void pbap_client_emit_phonebook_size_event(pbap_client_t * context, uint8_t status, uint16_t phonebook_size){ 177 uint8_t event[8]; 178 int pos = 0; 179 event[pos++] = HCI_EVENT_PBAP_META; 180 pos++; // skip len 181 event[pos++] = PBAP_SUBEVENT_PHONEBOOK_SIZE; 182 little_endian_store_16(event,pos,context->cid); 183 pos+=2; 184 event[pos++] = status; 185 little_endian_store_16(event,pos, phonebook_size); 186 pos+=2; 187 event[1] = pos - 2; 188 if (pos != sizeof(event)) log_error("pbap_client_emit_phonebook_size_event size %u", pos); 189 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 190 } 191 192 static void pbap_client_emit_authentication_event(pbap_client_t * context, uint8_t options){ 193 // split options 194 uint8_t user_id_required = options & 1 ? 1 : 0; 195 uint8_t full_access = options & 2 ? 1 : 0; 196 197 uint8_t event[7]; 198 int pos = 0; 199 event[pos++] = HCI_EVENT_PBAP_META; 200 pos++; // skip len 201 event[pos++] = PBAP_SUBEVENT_AUTHENTICATION_REQUEST; 202 little_endian_store_16(event,pos,context->cid); 203 pos+=2; 204 event[pos++] = user_id_required; 205 event[pos++] = full_access; 206 if (pos != sizeof(event)) log_error("pbap_client_emit_authentication_event size %u", pos); 207 context->client_handler(HCI_EVENT_PACKET, context->cid, &event[0], pos); 208 } 209 210 static const uint8_t collon = (uint8_t) ':'; 211 212 static void pbap_handle_can_send_now(void){ 213 uint8_t path_element[20]; 214 uint16_t path_element_start; 215 uint16_t path_element_len; 216 uint8_t application_parameters[20]; 217 uint8_t challenge_response[36]; 218 int i; 219 220 MD5_CTX md5_ctx; 221 222 switch (pbap_client->state){ 223 case PBAP_W2_SEND_CONNECT_REQUEST: 224 goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT); 225 goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid); 226 pbap_client->state = PBAP_W4_CONNECT_RESPONSE; 227 goep_client_execute(pbap_client->goep_cid); 228 break; 229 case PBAP_W2_SEND_AUTHENTICATED_CONNECT: 230 goep_client_create_connect_request(pbap_client->goep_cid, OBEX_VERSION, 0, OBEX_MAX_PACKETLEN_DEFAULT); 231 goep_client_add_header_target(pbap_client->goep_cid, 16, pbap_uuid); 232 // setup authentication challenge response 233 i = 0; 234 challenge_response[i++] = 0; // Tag Digest 235 challenge_response[i++] = 16; // Len 236 // calculate md5 237 MD5_Init(&md5_ctx); 238 MD5_Update(&md5_ctx, pbap_client->authentication_nonce, 16); 239 MD5_Update(&md5_ctx, &collon, 1); 240 MD5_Update(&md5_ctx, pbap_client->authentication_password, strlen(pbap_client->authentication_password)); 241 MD5_Final(&challenge_response[i], &md5_ctx); 242 i += 16; 243 challenge_response[i++] = 2; // Tag Nonce 244 challenge_response[i++] = 16; // Len 245 memcpy(&challenge_response[i], pbap_client->authentication_nonce, 16); 246 i += 16; 247 goep_client_add_header_challenge_response(pbap_client->goep_cid, i, challenge_response); 248 pbap_client->state = PBAP_W4_CONNECT_RESPONSE; 249 goep_client_execute(pbap_client->goep_cid); 250 break; 251 case PBAP_W2_SEND_DISCONNECT_REQUEST: 252 goep_client_create_disconnect_request(pbap_client->goep_cid); 253 pbap_client->state = PBAP_W4_DISCONNECT_RESPONSE; 254 goep_client_execute(pbap_client->goep_cid); 255 return; 256 case PBAP_W2_PULL_PHONEBOOK: 257 case PBAP_W2_GET_PHONEBOOK_SIZE: 258 goep_client_create_get_request(pbap_client->goep_cid); 259 goep_client_add_header_type(pbap_client->goep_cid, pbap_type); 260 goep_client_add_header_name(pbap_client->goep_cid, pbap_name); 261 if (pbap_client->state == PBAP_W2_GET_PHONEBOOK_SIZE){ 262 // Regular TLV wih 1-byte len 263 application_parameters[0] = PBAP_APPLICATION_PARAMETER_MAX_LIST_COUNT; 264 application_parameters[1] = 2; 265 big_endian_store_16(application_parameters, 2, 0); 266 goep_client_add_header_application_parameters(pbap_client->goep_cid, 4, &application_parameters[0]); 267 // state 268 pbap_client->state = PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE; 269 } else { 270 // state 271 pbap_client->state = PBAP_W4_PHONEBOOK; 272 } 273 // send packet 274 goep_client_execute(pbap_client->goep_cid); 275 break; 276 case PBAP_W2_SET_PATH_ROOT: 277 goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory 278 // On Android 4.2 Cyanogenmod, using "" as path fails 279 // goep_client_add_header_name(pbap_client->goep_cid, ""); // empty == / 280 // state 281 pbap_client->state = PBAP_W4_SET_PATH_ROOT_COMPLETE; 282 // send packet 283 goep_client_execute(pbap_client->goep_cid); 284 break; 285 case PBAP_W2_SET_PATH_ELEMENT: 286 // find '/' or '\0' 287 path_element_start = pbap_client->set_path_offset; 288 while (pbap_client->current_folder[pbap_client->set_path_offset] != '\0' && 289 pbap_client->current_folder[pbap_client->set_path_offset] != '/'){ 290 pbap_client->set_path_offset++; 291 } 292 // skip / 293 if (pbap_client->current_folder[pbap_client->set_path_offset] == '/'){ 294 pbap_client->set_path_offset++; 295 } 296 path_element_len = pbap_client->set_path_offset-path_element_start; 297 memcpy(path_element, &pbap_client->current_folder[path_element_start], path_element_len); 298 path_element[path_element_len] = 0; 299 300 goep_client_create_set_path_request(pbap_client->goep_cid, 1 << 1); // Don’t create directory 301 goep_client_add_header_name(pbap_client->goep_cid, (const char *) path_element); // next element 302 // state 303 pbap_client->state = PBAP_W4_SET_PATH_ELEMENT_COMPLETE; 304 // send packet 305 goep_client_execute(pbap_client->goep_cid); 306 break; 307 default: 308 break; 309 } 310 } 311 312 static void pbap_parse_authentication_challenge(pbap_client_t * context, const uint8_t * challenge_data, uint16_t challenge_len){ 313 // printf("Challenge: "); 314 // printf_hexdump(challenge_data, challenge_len); 315 int i; 316 uint8_t charset_code = 0; 317 for (i=0 ; i<challenge_len ; ){ 318 int tag = challenge_data[i]; 319 int len = challenge_data[i + 1]; 320 i += 2; 321 switch (tag) { 322 case 0: 323 if (len != 0x10) { 324 log_error("Invalid OBEX digest len %u", len); 325 return; 326 } 327 memcpy(context->authentication_nonce, &challenge_data[i], 16); 328 // printf("Nonce: "); 329 // printf_hexdump(context->authentication_nonce, 16); 330 break; 331 case 1: 332 context->authentication_options = challenge_data[i]; 333 // printf("Options %u\n", context->authentication_options); 334 break; 335 case 2: 336 // TODO: handle charset 337 charset_code = challenge_data[i]; 338 break; 339 } 340 i += len; 341 } 342 } 343 344 static void pbap_packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ 345 346 UNUSED(channel); // ok: there is no channel 347 UNUSED(size); // ok: handling own geop events 348 349 obex_iterator_t it; 350 uint8_t status; 351 switch (packet_type){ 352 case HCI_EVENT_PACKET: 353 switch (hci_event_packet_get_type(packet)) { 354 case HCI_EVENT_GOEP_META: 355 switch (hci_event_goep_meta_get_subevent_code(packet)){ 356 case GOEP_SUBEVENT_CONNECTION_OPENED: 357 status = goep_subevent_connection_opened_get_status(packet); 358 pbap_client->con_handle = goep_subevent_connection_opened_get_con_handle(packet); 359 pbap_client->incoming = goep_subevent_connection_opened_get_incoming(packet); 360 goep_subevent_connection_opened_get_bd_addr(packet, pbap_client->bd_addr); 361 if (status){ 362 log_info("pbap: connection failed %u", status); 363 pbap_client->state = PBAP_INIT; 364 pbap_client_emit_connected_event(pbap_client, status); 365 } else { 366 log_info("pbap: connection established"); 367 pbap_client->goep_cid = goep_subevent_connection_opened_get_goep_cid(packet); 368 pbap_client->state = PBAP_W2_SEND_CONNECT_REQUEST; 369 goep_client_request_can_send_now(pbap_client->goep_cid); 370 } 371 break; 372 case GOEP_SUBEVENT_CONNECTION_CLOSED: 373 if (pbap_client->state != PBAP_CONNECTED){ 374 pbap_client_emit_operation_complete_event(pbap_client, OBEX_DISCONNECTED); 375 } 376 pbap_client->state = PBAP_INIT; 377 pbap_client_emit_connection_closed_event(pbap_client); 378 break; 379 case GOEP_SUBEVENT_CAN_SEND_NOW: 380 pbap_handle_can_send_now(); 381 break; 382 } 383 break; 384 default: 385 break; 386 } 387 break; 388 case GOEP_DATA_PACKET: 389 // TODO: handle chunked data 390 #if 1 391 // obex_dump_packet(goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); 392 #endif 393 switch (pbap_client->state){ 394 case PBAP_W4_CONNECT_RESPONSE: 395 switch (packet[0]){ 396 case OBEX_RESP_SUCCESS: 397 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 398 uint8_t hi = obex_iterator_get_hi(&it); 399 if (hi == OBEX_HEADER_CONNECTION_ID){ 400 goep_client_set_connection_id(pbap_client->goep_cid, obex_iterator_get_data_32(&it)); 401 } 402 } 403 pbap_client->state = PBAP_CONNECTED; 404 pbap_client_emit_connected_event(pbap_client, 0); 405 break; 406 case OBEX_RESP_UNAUTHORIZED: 407 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 408 uint8_t hi = obex_iterator_get_hi(&it); 409 if (hi == OBEX_HEADER_AUTHENTICATION_CHALLENGE){ 410 pbap_parse_authentication_challenge(pbap_client, obex_iterator_get_data(&it), obex_iterator_get_data_len(&it)); 411 } 412 } 413 pbap_client->state = PBAP_W4_USER_AUTHENTICATION; 414 pbap_client_emit_authentication_event(pbap_client, pbap_client->authentication_options); 415 break; 416 default: 417 log_info("pbap: obex connect failed, result 0x%02x", packet[0]); 418 pbap_client->state = PBAP_INIT; 419 pbap_client_emit_connected_event(pbap_client, OBEX_CONNECT_FAILED); 420 break; 421 } 422 break; 423 case PBAP_W4_DISCONNECT_RESPONSE: 424 goep_client_disconnect(pbap_client->goep_cid); 425 break; 426 case PBAP_W4_SET_PATH_ROOT_COMPLETE: 427 case PBAP_W4_SET_PATH_ELEMENT_COMPLETE: 428 if (packet[0] == OBEX_RESP_SUCCESS){ 429 if (pbap_client->current_folder){ 430 pbap_client->state = PBAP_W2_SET_PATH_ELEMENT; 431 goep_client_request_can_send_now(pbap_client->goep_cid); 432 } else { 433 pbap_client_emit_operation_complete_event(pbap_client, 0); 434 } 435 } else if (packet[0] == OBEX_RESP_NOT_FOUND){ 436 pbap_client->state = PBAP_CONNECTED; 437 pbap_client_emit_operation_complete_event(pbap_client, OBEX_NOT_FOUND); 438 } else { 439 pbap_client->state = PBAP_CONNECTED; 440 pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR); 441 } 442 break; 443 case PBAP_W4_PHONEBOOK: 444 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 445 uint8_t hi = obex_iterator_get_hi(&it); 446 if (hi == OBEX_HEADER_BODY || hi == OBEX_HEADER_END_OF_BODY){ 447 uint16_t data_len = obex_iterator_get_data_len(&it); 448 const uint8_t * data = obex_iterator_get_data(&it); 449 pbap_client->client_handler(PBAP_DATA_PACKET, pbap_client->cid, (uint8_t *) data, data_len); 450 } 451 } 452 if (packet[0] == OBEX_RESP_CONTINUE){ 453 pbap_client->state = PBAP_W2_PULL_PHONEBOOK; 454 goep_client_request_can_send_now(pbap_client->goep_cid); 455 } else if (packet[0] == OBEX_RESP_SUCCESS){ 456 pbap_client->state = PBAP_CONNECTED; 457 pbap_client_emit_operation_complete_event(pbap_client, 0); 458 } else { 459 pbap_client->state = PBAP_CONNECTED; 460 pbap_client_emit_operation_complete_event(pbap_client, OBEX_UNKNOWN_ERROR); 461 } 462 break; 463 case PBAP_W4_GET_PHONEBOOK_SIZE_COMPLETE: 464 pbap_client->state = PBAP_CONNECTED; 465 if (packet[0] == OBEX_RESP_SUCCESS){ 466 int have_size = 0; 467 uint16_t phonebook_size; 468 for (obex_iterator_init_with_response_packet(&it, goep_client_get_request_opcode(pbap_client->goep_cid), packet, size); obex_iterator_has_more(&it) ; obex_iterator_next(&it)){ 469 uint8_t hi = obex_iterator_get_hi(&it); 470 if (hi == OBEX_HEADER_APPLICATION_PARAMETERS){ 471 uint16_t data_len = obex_iterator_get_data_len(&it); 472 const uint8_t * data = obex_iterator_get_data(&it); 473 // iterate over application headers (TLV with 1 bytes len) 474 unsigned int i = 0; 475 while (i<data_len){ 476 uint8_t tag = data[i++]; 477 uint8_t len = data[i++]; 478 if (tag == PBAP_APPLICATION_PARAMETER_PHONEBOOK_SIZE && len == 2){ 479 have_size = 1; 480 phonebook_size = big_endian_read_16(data, i); 481 } 482 i+=len; 483 } 484 } 485 } 486 if (have_size){ 487 pbap_client_emit_phonebook_size_event(pbap_client, 0, phonebook_size); 488 break; 489 } 490 } 491 pbap_client_emit_phonebook_size_event(pbap_client, OBEX_UNKNOWN_ERROR, 0); 492 break; 493 default: 494 break; 495 } 496 break; 497 default: 498 break; 499 } 500 } 501 502 void pbap_client_init(void){ 503 memset(pbap_client, 0, sizeof(pbap_client_t)); 504 pbap_client->state = PBAP_INIT; 505 pbap_client->cid = 1; 506 } 507 508 uint8_t pbap_connect(btstack_packet_handler_t handler, bd_addr_t addr, uint16_t * out_cid){ 509 if (pbap_client->state != PBAP_INIT) return BTSTACK_MEMORY_ALLOC_FAILED; 510 pbap_client->state = PBAP_W4_GOEP_CONNECTION; 511 pbap_client->client_handler = handler; 512 uint8_t err = goep_client_create_connection(&pbap_packet_handler, addr, BLUETOOTH_SERVICE_CLASS_PHONEBOOK_ACCESS_PSE, &pbap_client->goep_cid); 513 *out_cid = pbap_client->cid; 514 if (err) return err; 515 return 0; 516 } 517 518 uint8_t pbap_disconnect(uint16_t pbap_cid){ 519 UNUSED(pbap_cid); 520 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 521 pbap_client->state = PBAP_W2_SEND_DISCONNECT_REQUEST; 522 goep_client_request_can_send_now(pbap_client->goep_cid); 523 return 0; 524 } 525 526 uint8_t pbap_get_phonebook_size(uint16_t pbap_cid){ 527 UNUSED(pbap_cid); 528 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 529 pbap_client->state = PBAP_W2_GET_PHONEBOOK_SIZE; 530 goep_client_request_can_send_now(pbap_client->goep_cid); 531 return 0; 532 } 533 534 uint8_t pbap_pull_phonebook(uint16_t pbap_cid){ 535 UNUSED(pbap_cid); 536 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 537 pbap_client->state = PBAP_W2_PULL_PHONEBOOK; 538 goep_client_request_can_send_now(pbap_client->goep_cid); 539 return 0; 540 } 541 542 uint8_t pbap_set_phonebook(uint16_t pbap_cid, const char * path){ 543 UNUSED(pbap_cid); 544 if (pbap_client->state != PBAP_CONNECTED) return BTSTACK_BUSY; 545 pbap_client->state = PBAP_W2_SET_PATH_ROOT; 546 pbap_client->current_folder = path; 547 pbap_client->set_path_offset = 0; 548 goep_client_request_can_send_now(pbap_client->goep_cid); 549 return 0; 550 } 551 552 uint8_t pbap_authentication_password(uint16_t pbap_cid, const char * password){ 553 UNUSED(pbap_cid); 554 if (pbap_client->state != PBAP_W4_USER_AUTHENTICATION) return BTSTACK_BUSY; 555 pbap_client->state = PBAP_W2_SEND_AUTHENTICATED_CONNECT; 556 pbap_client->authentication_password = password; 557 goep_client_request_can_send_now(pbap_client->goep_cid); 558 return 0; 559 } 560