/** * Copyright (c) 2015 - 2017, Nordic Semiconductor ASA * * All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * 2. Redistributions in binary form, except as embedded into a Nordic * Semiconductor ASA integrated circuit in a product or a software update for * such product, must reproduce the above copyright notice, this list of * conditions and the following disclaimer in the documentation and/or other * materials provided with the distribution. * * 3. Neither the name of Nordic Semiconductor ASA nor the names of its * contributors may be used to endorse or promote products derived from this * software without specific prior written permission. * * 4. This software, with or without modification, must only be used with a * Nordic Semiconductor ASA integrated circuit. * * 5. Any software provided in binary form under this license must not be reverse * engineered, decompiled, modified and/or disassembled. * * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ #include "sdk_common.h" #if NRF_MODULE_ENABLED(PEER_MANAGER) #include "peer_manager.h" #include #include "security_manager.h" #include "security_dispatcher.h" #include "gatt_cache_manager.h" #include "gatts_cache_manager.h" #include "peer_database.h" #include "peer_data_storage.h" #include "id_manager.h" #include "ble_conn_state.h" #include "peer_manager_internal.h" /**< The number of event handlers that can be registered with the module. */ #define MAX_REGISTRANTS (3) /**< Macro indicating whether the module has been initialized properly. */ #define MODULE_INITIALIZED (m_module_initialized) static bool m_module_initialized; /**< Whether or not @ref pm_init has been called successfully. */ static bool m_peer_rank_initialized; /**< Whether or not @ref rank_init has been called successfully. */ static bool m_deleting_all; /**< True from when @ref pm_peers_delete is called until all peers have been deleted. */ static pm_store_token_t m_peer_rank_token; /**< The store token of an ongoing peer rank update via a call to @ref pm_peer_rank_highest. If @ref PM_STORE_TOKEN_INVALID, there is no ongoing update. */ static uint32_t m_current_highest_peer_rank; /**< The current highest peer rank. Used by @ref pm_peer_rank_highest. */ static pm_peer_id_t m_highest_ranked_peer; /**< The peer with the highest peer rank. Used by @ref pm_peer_rank_highest. */ static pm_evt_handler_t m_evt_handlers[MAX_REGISTRANTS]; /**< The subscribers to Peer Manager events, as registered through @ref pm_register. */ static uint8_t m_n_registrants; /**< The number of event handlers registered through @ref pm_register. */ static ble_conn_state_user_flag_id_t m_pairing_flag_id; /**< The flag ID for which connections are paired. */ static ble_conn_state_user_flag_id_t m_bonding_flag_id; /**< The flag ID for which connections are bonded. */ /**@brief Function for sending a Peer Manager event to all subscribers. * * @param[in] p_pm_evt The event to send. */ static void evt_send(pm_evt_t * p_pm_evt) { for (int i = 0; i < m_n_registrants; i++) { m_evt_handlers[i](p_pm_evt); } } /**@brief Event handler for events from the Peer Database module. * This handler is extern in the Peer Database module. * * @param[in] p_pdb_evt The incoming Peer Database event. */ void pm_pdb_evt_handler(pdb_evt_t const * p_pdb_evt) { bool send_evt = true; pm_evt_t pm_evt; memset(&pm_evt, 0, sizeof(pm_evt_t)); pm_evt.peer_id = p_pdb_evt->peer_id; pm_evt.conn_handle = im_conn_handle_get(pm_evt.peer_id); switch (p_pdb_evt->evt_id) { case PDB_EVT_WRITE_BUF_STORED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.data_id = p_pdb_evt->data_id; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.token = PM_STORE_TOKEN_INVALID; pm_evt.params.peer_data_update_succeeded.flash_changed = true; break; case PDB_EVT_RAW_STORED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.data_id = p_pdb_evt->data_id; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.token = p_pdb_evt->params.raw_stored_evt.store_token; pm_evt.params.peer_data_update_succeeded.flash_changed = true; if ( (m_peer_rank_token != PM_STORE_TOKEN_INVALID) && (m_peer_rank_token == p_pdb_evt->params.raw_stored_evt.store_token)) { m_peer_rank_token = PM_STORE_TOKEN_INVALID; m_highest_ranked_peer = pm_evt.peer_id; pm_evt.params.peer_data_update_succeeded.token = PM_STORE_TOKEN_INVALID; } break; case PDB_EVT_RAW_STORE_FAILED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_FAILED; pm_evt.params.peer_data_update_failed.data_id = p_pdb_evt->data_id; pm_evt.params.peer_data_update_failed.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_failed.token = p_pdb_evt->params.error_raw_store_evt.store_token; pm_evt.params.peer_data_update_failed.error = p_pdb_evt->params.error_raw_store_evt.err_code; if ( (m_peer_rank_token != PM_STORE_TOKEN_INVALID) && (m_peer_rank_token == p_pdb_evt->params.raw_stored_evt.store_token)) { m_peer_rank_token = PM_STORE_TOKEN_INVALID; m_current_highest_peer_rank -= 1; pm_evt.params.peer_data_update_succeeded.token = PM_STORE_TOKEN_INVALID; } break; case PDB_EVT_CLEARED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.data_id = p_pdb_evt->data_id; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_DELETE; pm_evt.params.peer_data_update_succeeded.token = PM_STORE_TOKEN_INVALID; break; case PDB_EVT_CLEAR_FAILED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_FAILED; pm_evt.params.peer_data_update_failed.data_id = p_pdb_evt->data_id; pm_evt.params.peer_data_update_failed.action = PM_PEER_DATA_OP_DELETE; pm_evt.params.peer_data_update_failed.error = p_pdb_evt->params.clear_failed_evt.err_code; break; case PDB_EVT_PEER_FREED: pm_evt.evt_id = PM_EVT_PEER_DELETE_SUCCEEDED; // Check that no peers marked for deletion are left. if (m_deleting_all && (pdb_next_peer_id_get(PM_PEER_ID_INVALID) == PM_PEER_ID_INVALID) && (pdb_next_deleted_peer_id_get(PM_PEER_ID_INVALID) == PM_PEER_ID_INVALID)) { // pm_peers_delete() has been called and this is the last peer to be deleted. m_deleting_all = false; pm_evt_t pm_delete_all_evt; memset(&pm_delete_all_evt, 0, sizeof(pm_evt_t)); pm_delete_all_evt.evt_id = PM_EVT_PEERS_DELETE_SUCCEEDED; pm_delete_all_evt.peer_id = PM_PEER_ID_INVALID; pm_delete_all_evt.conn_handle = BLE_CONN_HANDLE_INVALID; evt_send(&pm_delete_all_evt); } break; case PDB_EVT_PEER_FREE_FAILED: pm_evt.evt_id = PM_EVT_PEER_DELETE_FAILED; pm_evt.params.peer_delete_failed.error = p_pdb_evt->params.peer_free_failed_evt.err_code; if (m_deleting_all) { // pm_peers_delete() has been called and has thus failed. m_deleting_all = false; pm_evt_t pm_delete_all_evt; memset(&pm_delete_all_evt, 0, sizeof(pm_evt_t)); pm_delete_all_evt.evt_id = PM_EVT_PEERS_DELETE_FAILED; pm_delete_all_evt.peer_id = PM_PEER_ID_INVALID; pm_delete_all_evt.conn_handle = BLE_CONN_HANDLE_INVALID; pm_delete_all_evt.params.peers_delete_failed_evt.error = p_pdb_evt->params.peer_free_failed_evt.err_code; evt_send(&pm_delete_all_evt); } break; case PDB_EVT_COMPRESSED: send_evt = false; // Do nothing break; case PDB_EVT_ERROR_NO_MEM: pm_evt.evt_id = PM_EVT_STORAGE_FULL; break; case PDB_EVT_ERROR_UNEXPECTED: pm_evt.evt_id = PM_EVT_ERROR_UNEXPECTED; break; default: send_evt = false; break; } if (send_evt) { evt_send(&pm_evt); } } /**@brief Event handler for events from the Security Manager module. * This handler is extern in the Security Manager module. * * @param[in] p_sm_evt The incoming Security Manager event. */ void pm_sm_evt_handler(sm_evt_t const * p_sm_evt) { bool find_peer_id = true; bool send_evt = true; pm_evt_t pm_evt; memset(&pm_evt, 0, sizeof(pm_evt_t)); pm_evt.conn_handle = p_sm_evt->conn_handle; switch (p_sm_evt->evt_id) { case SM_EVT_SLAVE_SECURITY_REQ: find_peer_id = false; send_evt = false; break; case SM_EVT_SEC_PROCEDURE_START: { pm_evt.evt_id = PM_EVT_CONN_SEC_START; bool pairing = p_sm_evt->params.sec_procedure_start.procedure != PM_LINK_SECURED_PROCEDURE_ENCRYPTION; bool bonding = p_sm_evt->params.sec_procedure_start.procedure == PM_LINK_SECURED_PROCEDURE_BONDING; ble_conn_state_user_flag_set(p_sm_evt->conn_handle, m_pairing_flag_id, pairing); ble_conn_state_user_flag_set(p_sm_evt->conn_handle, m_bonding_flag_id, bonding); break; } case SM_EVT_PAIRING_SUCCESS: pm_evt.evt_id = PM_EVT_CONN_SEC_SUCCEEDED; pm_evt.params.conn_sec_succeeded.procedure = p_sm_evt->params.pairing_success.bonded ? PM_LINK_SECURED_PROCEDURE_BONDING : PM_LINK_SECURED_PROCEDURE_PAIRING; ble_conn_state_user_flag_set(p_sm_evt->conn_handle, m_pairing_flag_id, true); ble_conn_state_user_flag_set(p_sm_evt->conn_handle, m_bonding_flag_id, p_sm_evt->params.pairing_success.bonded ); break; case SM_EVT_PAIRING_FAIL: pm_evt.evt_id = PM_EVT_CONN_SEC_FAILED; pm_evt.params.conn_sec_failed.procedure = ble_conn_state_user_flag_get(p_sm_evt->conn_handle, m_bonding_flag_id) ? PM_LINK_SECURED_PROCEDURE_BONDING : PM_LINK_SECURED_PROCEDURE_PAIRING; pm_evt.params.conn_sec_failed.error_src = p_sm_evt->params.pairing_failed.error_src; pm_evt.params.conn_sec_failed.error = p_sm_evt->params.pairing_failed.error; break; case SM_EVT_LINK_ENCRYPTION_UPDATE: if (!ble_conn_state_user_flag_get(p_sm_evt->conn_handle, m_pairing_flag_id)) { pm_evt.evt_id = PM_EVT_CONN_SEC_SUCCEEDED; pm_evt.params.conn_sec_succeeded.procedure = PM_LINK_SECURED_PROCEDURE_ENCRYPTION; } else { find_peer_id = false; send_evt = false; } break; case SM_EVT_LINK_ENCRYPTION_FAILED: pm_evt.evt_id = PM_EVT_CONN_SEC_FAILED; pm_evt.params.conn_sec_failed.procedure = PM_LINK_SECURED_PROCEDURE_ENCRYPTION; pm_evt.params.conn_sec_failed.error_src = p_sm_evt->params.link_encryption_failed.error_src; pm_evt.params.conn_sec_failed.error = p_sm_evt->params.link_encryption_failed.error; break; case SM_EVT_BONDING_INFO_STORED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.peer_id = p_sm_evt->params.bonding_info_stored.peer_id; pm_evt.params.peer_data_update_succeeded.data_id = PM_PEER_DATA_ID_BONDING; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; find_peer_id = false; break; case SM_EVT_ERROR_BONDING_INFO: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_FAILED; pm_evt.peer_id = p_sm_evt->params.error_bonding_info.peer_id; pm_evt.params.peer_data_update_failed.data_id = PM_PEER_DATA_ID_BONDING; pm_evt.params.peer_data_update_failed.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_failed.error = p_sm_evt->params.error_bonding_info.error; find_peer_id = false; break; case SM_EVT_ERROR_UNEXPECTED: pm_evt.evt_id = PM_EVT_ERROR_UNEXPECTED; pm_evt.params.error_unexpected.error = p_sm_evt->params.error_unexpected.error; break; case SM_EVT_ERROR_NO_MEM: pm_evt.evt_id = PM_EVT_STORAGE_FULL; break; case SM_EVT_ERROR_SMP_TIMEOUT: pm_evt.evt_id = PM_EVT_CONN_SEC_FAILED; pm_evt.params.conn_sec_failed.procedure = ble_conn_state_user_flag_get(p_sm_evt->conn_handle, m_bonding_flag_id) ? PM_LINK_SECURED_PROCEDURE_BONDING : PM_LINK_SECURED_PROCEDURE_PAIRING; pm_evt.params.conn_sec_failed.error_src = BLE_GAP_SEC_STATUS_SOURCE_LOCAL; pm_evt.params.conn_sec_failed.error = PM_CONN_SEC_ERROR_SMP_TIMEOUT; break; case SM_EVT_CONN_SEC_CONFIG_REQ: pm_evt.evt_id = PM_EVT_CONN_SEC_CONFIG_REQ; break; default: send_evt = false; break; } if (find_peer_id) { pm_evt.peer_id = im_peer_id_get_by_conn_handle(p_sm_evt->conn_handle); } if (send_evt) { evt_send(&pm_evt); } } /**@brief Event handler for events from the GATT Cache Manager module. * This handler is extern in GATT Cache Manager. * * @param[in] p_gcm_evt The incoming GATT Cache Manager event. */ void pm_gcm_evt_handler(gcm_evt_t const * p_gcm_evt) { bool send_evt = true; pm_evt_t pm_evt; memset(&pm_evt, 0, sizeof(pm_evt_t)); pm_evt.peer_id = p_gcm_evt->peer_id; pm_evt.conn_handle = im_conn_handle_get(pm_evt.peer_id); switch (p_gcm_evt->evt_id) { case GCM_EVT_LOCAL_DB_CACHE_STORED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.data_id = PM_PEER_DATA_ID_GATT_LOCAL; break; case GCM_EVT_LOCAL_DB_CACHE_UPDATED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.data_id = PM_PEER_DATA_ID_GATT_LOCAL; break; case GCM_EVT_LOCAL_DB_CACHE_APPLIED: pm_evt.evt_id = PM_EVT_LOCAL_DB_CACHE_APPLIED; break; case GCM_EVT_ERROR_LOCAL_DB_CACHE_APPLY: pm_evt.evt_id = PM_EVT_LOCAL_DB_CACHE_APPLY_FAILED; break; case GCM_EVT_REMOTE_DB_CACHE_UPDATED: pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.data_id = PM_PEER_DATA_ID_GATT_REMOTE; break; case GCM_EVT_SERVICE_CHANGED_IND_SENT: pm_evt.evt_id = PM_EVT_SERVICE_CHANGED_IND_SENT; break; case GCM_EVT_SERVICE_CHANGED_IND_CONFIRMED: pm_evt.evt_id = PM_EVT_SERVICE_CHANGED_IND_CONFIRMED; break; case GCM_EVT_ERROR_DATA_SIZE: send_evt = false; break; case GCM_EVT_ERROR_STORAGE_FULL: pm_evt.evt_id = PM_EVT_STORAGE_FULL; break; case GCM_EVT_ERROR_UNEXPECTED: pm_evt.evt_id = PM_EVT_ERROR_UNEXPECTED; pm_evt.params.error_unexpected.error = p_gcm_evt->params.error_unexpected.error; pm_evt.conn_handle = p_gcm_evt->params.error_unexpected.conn_handle; break; } if (send_evt) { evt_send(&pm_evt); } } /**@brief Event handler for events from the ID Manager module. * This function is registered in the ID Manager. * * @param[in] p_im_evt The incoming ID Manager event. */ void pm_im_evt_handler(im_evt_t const * p_im_evt) { pm_evt_t pm_evt; ret_code_t err_code; switch (p_im_evt->evt_id) { case IM_EVT_DUPLICATE_ID: // Attempt to delete the duplicate data to free space and avoid finding old data when // scanning in the future err_code = pm_peer_delete(p_im_evt->params.duplicate_id.peer_id_2); UNUSED_VARIABLE(err_code); break; case IM_EVT_BONDED_PEER_CONNECTED: ble_conn_state_user_flag_set(p_im_evt->conn_handle, m_bonding_flag_id, true); memset(&pm_evt, 0, sizeof(pm_evt_t)); pm_evt.conn_handle = p_im_evt->conn_handle; pm_evt.peer_id = im_peer_id_get_by_conn_handle(p_im_evt->conn_handle); pm_evt.evt_id = PM_EVT_BONDED_PEER_CONNECTED; evt_send(&pm_evt); break; } } void pm_on_ble_evt(ble_evt_t * p_ble_evt) { VERIFY_MODULE_INITIALIZED_VOID(); im_ble_evt_handler(p_ble_evt); sm_ble_evt_handler(p_ble_evt); gcm_ble_evt_handler(p_ble_evt); } /**@brief Function for resetting the internal state of this module. */ static void internal_state_reset() { m_highest_ranked_peer = PM_PEER_ID_INVALID; m_peer_rank_token = PM_STORE_TOKEN_INVALID; m_pairing_flag_id = BLE_CONN_STATE_USER_FLAG_INVALID; m_bonding_flag_id = BLE_CONN_STATE_USER_FLAG_INVALID; } ret_code_t pm_init(void) { ret_code_t err_code; err_code = pds_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = pdb_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = sm_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = smd_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = gcm_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = gscm_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } err_code = im_init(); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } internal_state_reset(); m_pairing_flag_id = ble_conn_state_user_flag_acquire(); if (m_pairing_flag_id == BLE_CONN_STATE_USER_FLAG_INVALID) { return NRF_ERROR_INTERNAL; } m_bonding_flag_id = ble_conn_state_user_flag_acquire(); if (m_bonding_flag_id == BLE_CONN_STATE_USER_FLAG_INVALID) { return NRF_ERROR_INTERNAL; } m_peer_rank_initialized = false; m_module_initialized = true; return NRF_SUCCESS; } ret_code_t pm_register(pm_evt_handler_t event_handler) { VERIFY_MODULE_INITIALIZED(); if (m_n_registrants >= MAX_REGISTRANTS) { return NRF_ERROR_NO_MEM; } m_evt_handlers[m_n_registrants] = event_handler; m_n_registrants += 1; return NRF_SUCCESS; } ret_code_t pm_sec_params_set(ble_gap_sec_params_t * p_sec_params) { VERIFY_MODULE_INITIALIZED(); ret_code_t err_code; err_code = sm_sec_params_set(p_sec_params); // NRF_ERROR_INVALID_PARAM if parameters are invalid, // NRF_SUCCESS otherwise. return err_code; } ret_code_t pm_conn_secure(uint16_t conn_handle, bool force_repairing) { VERIFY_MODULE_INITIALIZED(); ret_code_t err_code; err_code = sm_link_secure(conn_handle, force_repairing); return err_code; } void pm_conn_sec_config_reply(uint16_t conn_handle, pm_conn_sec_config_t * p_conn_sec_config) { sm_conn_sec_config_reply(conn_handle, p_conn_sec_config); } ret_code_t pm_sec_params_reply(uint16_t conn_handle, ble_gap_sec_params_t * p_sec_params) { VERIFY_MODULE_INITIALIZED(); return NRF_SUCCESS; } void pm_local_database_has_changed(void) { VERIFY_MODULE_INITIALIZED_VOID(); gcm_local_database_has_changed(); } ret_code_t pm_id_addr_set(ble_gap_addr_t const * p_addr) { VERIFY_MODULE_INITIALIZED(); return im_id_addr_set(p_addr); } ret_code_t pm_id_addr_get(ble_gap_addr_t * p_addr) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_addr); return im_id_addr_get(p_addr); } ret_code_t pm_privacy_set(pm_privacy_params_t const * p_privacy_params) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_privacy_params); return im_privacy_set(p_privacy_params); } ret_code_t pm_privacy_get(pm_privacy_params_t * p_privacy_params) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_privacy_params); VERIFY_PARAM_NOT_NULL(p_privacy_params->p_device_irk); return im_privacy_get(p_privacy_params); } ret_code_t pm_whitelist_set(pm_peer_id_t const * p_peers, uint32_t peer_cnt) { VERIFY_MODULE_INITIALIZED(); return im_whitelist_set(p_peers, peer_cnt); } ret_code_t pm_whitelist_get(ble_gap_addr_t * p_addrs, uint32_t * p_addr_cnt, ble_gap_irk_t * p_irks, uint32_t * p_irk_cnt) { VERIFY_MODULE_INITIALIZED(); if (((p_addrs == NULL) && (p_irks == NULL)) || ((p_addrs != NULL) && (p_addr_cnt == NULL)) || ((p_irks != NULL) && (p_irk_cnt == NULL))) { // The buffers can't be both NULL, and if a buffer is provided its size must be specified. return NRF_ERROR_NULL; } return im_whitelist_get(p_addrs, p_addr_cnt, p_irks, p_irk_cnt); } ret_code_t pm_device_identities_list_set(pm_peer_id_t const * p_peers, uint32_t peer_cnt) { VERIFY_MODULE_INITIALIZED(); return im_device_identities_list_set(p_peers, peer_cnt); } ret_code_t pm_conn_sec_status_get(uint16_t conn_handle, pm_conn_sec_status_t * p_conn_sec_status) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_conn_sec_status); ble_conn_state_status_t status = ble_conn_state_status(conn_handle); if (status == BLE_CONN_STATUS_INVALID) { return BLE_ERROR_INVALID_CONN_HANDLE; } p_conn_sec_status->connected = (status == BLE_CONN_STATUS_CONNECTED); p_conn_sec_status->bonded = ble_conn_state_user_flag_get(conn_handle, m_bonding_flag_id); p_conn_sec_status->encrypted = ble_conn_state_encrypted(conn_handle); p_conn_sec_status->mitm_protected = ble_conn_state_mitm_protected(conn_handle); return NRF_SUCCESS; } ret_code_t pm_lesc_public_key_set(ble_gap_lesc_p256_pk_t * p_public_key) { VERIFY_MODULE_INITIALIZED(); return sm_lesc_public_key_set(p_public_key); } ret_code_t pm_conn_handle_get(pm_peer_id_t peer_id, uint16_t * p_conn_handle) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_conn_handle); *p_conn_handle = im_conn_handle_get(peer_id); return NRF_SUCCESS; } ret_code_t pm_peer_id_get(uint16_t conn_handle, pm_peer_id_t * p_peer_id) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_peer_id); *p_peer_id = im_peer_id_get_by_conn_handle(conn_handle); return NRF_SUCCESS; } uint32_t pm_peer_count(void) { if (!MODULE_INITIALIZED) { return 0; } return pdb_n_peers(); } pm_peer_id_t pm_next_peer_id_get(pm_peer_id_t prev_peer_id) { if (!MODULE_INITIALIZED) { return PM_PEER_ID_INVALID; } return pdb_next_peer_id_get(prev_peer_id); } ret_code_t pm_peer_data_load(pm_peer_id_t peer_id, pm_peer_data_id_t data_id, void * p_data, uint16_t * p_length) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_data); VERIFY_PARAM_NOT_NULL(p_length); if (ALIGN_NUM(4, *p_length) != *p_length) { return NRF_ERROR_INVALID_PARAM; } pm_peer_data_t peer_data; memset(&peer_data, 0, sizeof(peer_data)); peer_data.length_words = BYTES_TO_WORDS(*p_length); peer_data.data_id = data_id; peer_data.p_all_data = p_data; ret_code_t err_code = pdb_peer_data_load(peer_id, data_id, &peer_data); *p_length = peer_data.length_words * BYTES_PER_WORD; return err_code; } ret_code_t pm_peer_data_bonding_load(pm_peer_id_t peer_id, pm_peer_data_bonding_t * p_data) { uint16_t length = sizeof(pm_peer_data_bonding_t); return pm_peer_data_load(peer_id, PM_PEER_DATA_ID_BONDING, p_data, &length); } ret_code_t pm_peer_data_remote_db_load(pm_peer_id_t peer_id, ble_gatt_db_srv_t * p_data, uint16_t * p_length) { return pm_peer_data_load(peer_id, PM_PEER_DATA_ID_GATT_REMOTE, p_data, p_length); } ret_code_t pm_peer_data_app_data_load(pm_peer_id_t peer_id, uint8_t * p_data, uint16_t * p_length) { return pm_peer_data_load(peer_id, PM_PEER_DATA_ID_APPLICATION, p_data, p_length); } ret_code_t pm_peer_data_store(pm_peer_id_t peer_id, pm_peer_data_id_t data_id, void const * p_data, uint16_t length, pm_store_token_t * p_token) { VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_data); if (ALIGN_NUM(4, length) != length) { return NRF_ERROR_INVALID_PARAM; } pm_peer_data_flash_t peer_data; memset(&peer_data, 0, sizeof(peer_data)); peer_data.length_words = BYTES_TO_WORDS(length); peer_data.data_id = data_id; peer_data.p_all_data = p_data; return pdb_raw_store(peer_id, &peer_data, p_token); } ret_code_t pm_peer_data_bonding_store(pm_peer_id_t peer_id, pm_peer_data_bonding_t const * p_data, pm_store_token_t * p_token) { return pm_peer_data_store(peer_id, PM_PEER_DATA_ID_BONDING, p_data, ALIGN_NUM(4, sizeof(pm_peer_data_bonding_t)), p_token); } ret_code_t pm_peer_data_remote_db_store(pm_peer_id_t peer_id, ble_gatt_db_srv_t const * p_data, uint16_t length, pm_store_token_t * p_token) { return pm_peer_data_store(peer_id, PM_PEER_DATA_ID_GATT_REMOTE, p_data, length, p_token); } ret_code_t pm_peer_data_app_data_store(pm_peer_id_t peer_id, uint8_t const * p_data, uint16_t length, pm_store_token_t * p_token) { return pm_peer_data_store(peer_id, PM_PEER_DATA_ID_APPLICATION, p_data, length, p_token); } ret_code_t pm_peer_data_delete(pm_peer_id_t peer_id, pm_peer_data_id_t data_id) { VERIFY_MODULE_INITIALIZED(); if (data_id == PM_PEER_DATA_ID_BONDING) { return NRF_ERROR_INVALID_PARAM; } return pdb_clear(peer_id, data_id); } ret_code_t pm_peer_new(pm_peer_id_t * p_new_peer_id, pm_peer_data_bonding_t * p_bonding_data, pm_store_token_t * p_token) { ret_code_t err_code; pm_peer_id_t peer_id; pm_peer_data_flash_t peer_data; VERIFY_MODULE_INITIALIZED(); VERIFY_PARAM_NOT_NULL(p_bonding_data); VERIFY_PARAM_NOT_NULL(p_new_peer_id); memset(&peer_data, 0, sizeof(pm_peer_data_flash_t)); // Search through existing bonds to look for a duplicate. pds_peer_data_iterate_prepare(); // @note emdi: should maybe use a critical section, since data is not copied while iterating. while (pds_peer_data_iterate(PM_PEER_DATA_ID_BONDING, &peer_id, &peer_data)) { if (im_is_duplicate_bonding_data(p_bonding_data, peer_data.p_bonding_data)) { *p_new_peer_id = peer_id; return NRF_SUCCESS; } } // If no duplicate data is found, prepare to write a new bond to flash. *p_new_peer_id = pdb_peer_allocate(); if (*p_new_peer_id == PM_PEER_ID_INVALID) { return NRF_ERROR_NO_MEM; } memset(&peer_data, 0, sizeof(pm_peer_data_flash_t)); peer_data.data_id = PM_PEER_DATA_ID_BONDING; peer_data.p_bonding_data = p_bonding_data; peer_data.length_words = BYTES_TO_WORDS(sizeof(pm_peer_data_bonding_t)); err_code = pdb_raw_store(*p_new_peer_id, &peer_data, p_token); if (err_code != NRF_SUCCESS) { if (im_peer_free(*p_new_peer_id) != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } // NRF_ERROR_STORAGE_FULL, if no space in flash. // NRF_ERROR_BUSY, if flash filesystem was busy. // NRF_ERROR_INTENRAL, on internal error. return err_code; } return NRF_SUCCESS; } ret_code_t pm_peer_delete(pm_peer_id_t peer_id) { VERIFY_MODULE_INITIALIZED(); return im_peer_free(peer_id); } ret_code_t pm_peers_delete(void) { VERIFY_MODULE_INITIALIZED(); m_deleting_all = true; pm_peer_id_t current_peer_id = pdb_next_peer_id_get(PM_PEER_ID_INVALID); if (current_peer_id == PM_PEER_ID_INVALID) { // No peers bonded. m_deleting_all = false; pm_evt_t pm_delete_all_evt; memset(&pm_delete_all_evt, 0, sizeof(pm_evt_t)); pm_delete_all_evt.evt_id = PM_EVT_PEERS_DELETE_SUCCEEDED; pm_delete_all_evt.peer_id = PM_PEER_ID_INVALID; pm_delete_all_evt.conn_handle = BLE_CONN_HANDLE_INVALID; evt_send(&pm_delete_all_evt); } while (current_peer_id != PM_PEER_ID_INVALID) { ret_code_t err_code = pm_peer_delete(current_peer_id); if (err_code != NRF_SUCCESS) { return NRF_ERROR_INTERNAL; } current_peer_id = pdb_next_peer_id_get(current_peer_id); } return NRF_SUCCESS; } ret_code_t pm_peer_ranks_get(pm_peer_id_t * p_highest_ranked_peer, uint32_t * p_highest_rank, pm_peer_id_t * p_lowest_ranked_peer, uint32_t * p_lowest_rank) { VERIFY_MODULE_INITIALIZED(); pm_peer_id_t peer_id = pdb_next_peer_id_get(PM_PEER_ID_INVALID); uint32_t peer_rank = 0; //lint -save -e65 -e64 pm_peer_data_t peer_data = {.length_words = BYTES_TO_WORDS(sizeof(peer_rank)), .p_peer_rank = &peer_rank}; //lint -restore ret_code_t err_code = pdb_peer_data_load(peer_id, PM_PEER_DATA_ID_PEER_RANK, &peer_data); uint32_t highest_rank = 0; uint32_t lowest_rank = 0xFFFFFFFF; pm_peer_id_t highest_ranked_peer = PM_PEER_ID_INVALID; pm_peer_id_t lowest_ranked_peer = PM_PEER_ID_INVALID; if (err_code == NRF_ERROR_INVALID_PARAM) { // No peer IDs exist. return NRF_ERROR_NOT_FOUND; } while ((err_code == NRF_SUCCESS) || (err_code == NRF_ERROR_NOT_FOUND)) { if (err_code == NRF_ERROR_NOT_FOUND) { peer_rank = 0; } if (peer_rank >= highest_rank) { highest_rank = peer_rank; highest_ranked_peer = peer_id; } if (peer_rank < lowest_rank) { lowest_rank = peer_rank; lowest_ranked_peer = peer_id; } peer_id = pdb_next_peer_id_get(peer_id); err_code = pdb_peer_data_load(peer_id, PM_PEER_DATA_ID_PEER_RANK, &peer_data); } if (peer_id == PM_PEER_ID_INVALID) { err_code = NRF_SUCCESS; if (p_highest_ranked_peer != NULL) { *p_highest_ranked_peer = highest_ranked_peer; } if (p_highest_rank != NULL) { *p_highest_rank = highest_rank; } if (p_lowest_ranked_peer != NULL) { *p_lowest_ranked_peer = lowest_ranked_peer; } if (p_lowest_rank != NULL) { *p_lowest_rank = lowest_rank; } } else { err_code = NRF_ERROR_INTERNAL; } return err_code; } /**@brief Function for initializing peer rank statistics. */ static void rank_init(void) { ret_code_t err_code = pm_peer_ranks_get(&m_highest_ranked_peer, &m_current_highest_peer_rank, NULL, NULL); if ((err_code == NRF_SUCCESS) || (err_code == NRF_ERROR_NOT_FOUND)) { m_peer_rank_initialized = true; } } ret_code_t pm_peer_rank_highest(pm_peer_id_t peer_id) { VERIFY_MODULE_INITIALIZED(); ret_code_t err_code; //lint -save -e65 -e64 pm_peer_data_flash_t peer_data = {.length_words = BYTES_TO_WORDS(sizeof(m_current_highest_peer_rank)), .data_id = PM_PEER_DATA_ID_PEER_RANK, .p_peer_rank = &m_current_highest_peer_rank}; //lint -restore if (!m_peer_rank_initialized) { rank_init(); } if (!m_peer_rank_initialized || (m_peer_rank_token != PM_STORE_TOKEN_INVALID)) { err_code = NRF_ERROR_BUSY; } else { if ((peer_id == m_highest_ranked_peer) && (m_current_highest_peer_rank > 0)) { pm_evt_t pm_evt; // The reported peer is already regarded as highest (provided it has an index at all) err_code = NRF_SUCCESS; memset(&pm_evt, 0, sizeof(pm_evt)); pm_evt.evt_id = PM_EVT_PEER_DATA_UPDATE_SUCCEEDED; pm_evt.conn_handle = im_conn_handle_get(peer_id); pm_evt.peer_id = peer_id; pm_evt.params.peer_data_update_succeeded.data_id = PM_PEER_DATA_ID_PEER_RANK; pm_evt.params.peer_data_update_succeeded.action = PM_PEER_DATA_OP_UPDATE; pm_evt.params.peer_data_update_succeeded.token = PM_STORE_TOKEN_INVALID; pm_evt.params.peer_data_update_succeeded.flash_changed = false; evt_send(&pm_evt); } else { m_current_highest_peer_rank += 1; err_code = pdb_raw_store(peer_id, &peer_data, &m_peer_rank_token); if (err_code != NRF_SUCCESS) { m_peer_rank_token = PM_STORE_TOKEN_INVALID; m_current_highest_peer_rank -= 1; { if ((err_code != NRF_ERROR_BUSY) && (err_code != NRF_ERROR_STORAGE_FULL)) err_code = NRF_ERROR_INTERNAL; } } } } return err_code; } #endif // NRF_MODULE_ENABLED(PEER_MANAGER)