2018-04-14 19:22:29 +02:00
|
|
|
/* code snippets taken from
|
|
|
|
https://github.com/nkolban/esp32-snippets/tree/master/BLE/scanner
|
|
|
|
*/
|
|
|
|
|
2019-01-20 15:53:31 +01:00
|
|
|
#include "blescan.h"
|
2018-04-14 19:22:29 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
#define BT_BD_ADDR_HEX(addr) \
|
|
|
|
addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]
|
2018-04-14 21:42:30 +02:00
|
|
|
|
2018-04-15 00:51:28 +02:00
|
|
|
// local Tag for logging
|
2018-06-02 18:28:01 +02:00
|
|
|
static const char TAG[] = "bluetooth";
|
2018-04-15 00:51:28 +02:00
|
|
|
|
2018-06-02 18:28:01 +02:00
|
|
|
const char *bt_addr_t_to_string(esp_ble_addr_type_t type) {
|
2018-06-12 19:44:11 +02:00
|
|
|
switch (type) {
|
|
|
|
case BLE_ADDR_TYPE_PUBLIC:
|
|
|
|
return "BLE_ADDR_TYPE_PUBLIC";
|
|
|
|
case BLE_ADDR_TYPE_RANDOM:
|
|
|
|
return "BLE_ADDR_TYPE_RANDOM";
|
|
|
|
case BLE_ADDR_TYPE_RPA_PUBLIC:
|
|
|
|
return "BLE_ADDR_TYPE_RPA_PUBLIC";
|
|
|
|
case BLE_ADDR_TYPE_RPA_RANDOM:
|
|
|
|
return "BLE_ADDR_TYPE_RPA_RANDOM";
|
|
|
|
default:
|
|
|
|
return "Unknown addr_t";
|
|
|
|
}
|
2018-04-15 12:12:06 +02:00
|
|
|
} // bt_addr_t_to_string
|
|
|
|
|
2018-06-02 18:28:01 +02:00
|
|
|
const char *btsig_gap_type(uint32_t gap_type) {
|
2018-06-12 19:44:11 +02:00
|
|
|
switch (gap_type) {
|
|
|
|
case 0x01:
|
|
|
|
return "Flags";
|
|
|
|
case 0x02:
|
|
|
|
return "Incomplete List of 16-bit Service Class UUIDs";
|
|
|
|
case 0x03:
|
|
|
|
return "Complete List of 16-bit Service Class UUIDs";
|
|
|
|
case 0x04:
|
|
|
|
return "Incomplete List of 32-bit Service Class UUIDs";
|
|
|
|
case 0x05:
|
|
|
|
return "Complete List of 32-bit Service Class UUIDs";
|
|
|
|
case 0x06:
|
|
|
|
return "Incomplete List of 128-bit Service Class UUIDs";
|
|
|
|
case 0x07:
|
|
|
|
return "Complete List of 128-bit Service Class UUIDs";
|
|
|
|
case 0x08:
|
|
|
|
return "Shortened Local Name";
|
|
|
|
case 0x09:
|
|
|
|
return "Complete Local Name";
|
|
|
|
case 0x0A:
|
|
|
|
return "Tx Power Level";
|
|
|
|
case 0x0D:
|
|
|
|
return "Class of Device";
|
|
|
|
case 0x0E:
|
|
|
|
return "Simple Pairing Hash C/C-192";
|
|
|
|
case 0x0F:
|
|
|
|
return "Simple Pairing Randomizer R/R-192";
|
|
|
|
case 0x10:
|
|
|
|
return "Device ID/Security Manager TK Value";
|
|
|
|
case 0x11:
|
|
|
|
return "Security Manager Out of Band Flags";
|
|
|
|
case 0x12:
|
|
|
|
return "Slave Connection Interval Range";
|
|
|
|
case 0x14:
|
|
|
|
return "List of 16-bit Service Solicitation UUIDs";
|
|
|
|
case 0x1F:
|
|
|
|
return "List of 32-bit Service Solicitation UUIDs";
|
|
|
|
case 0x15:
|
|
|
|
return "List of 128-bit Service Solicitation UUIDs";
|
|
|
|
case 0x16:
|
|
|
|
return "Service Data - 16-bit UUID";
|
|
|
|
case 0x20:
|
|
|
|
return "Service Data - 32-bit UUID";
|
|
|
|
case 0x21:
|
|
|
|
return "Service Data - 128-bit UUID";
|
|
|
|
case 0x22:
|
|
|
|
return "LE Secure Connections Confirmation Value";
|
|
|
|
case 0x23:
|
|
|
|
return "LE Secure Connections Random Value";
|
|
|
|
case 0x24:
|
|
|
|
return "URI";
|
|
|
|
case 0x25:
|
|
|
|
return "Indoor Positioning";
|
|
|
|
case 0x26:
|
|
|
|
return "Transport Discovery Data";
|
|
|
|
case 0x17:
|
|
|
|
return "Public Target Address";
|
|
|
|
case 0x18:
|
|
|
|
return "Random Target Address";
|
|
|
|
case 0x19:
|
|
|
|
return "Appearance";
|
|
|
|
case 0x1A:
|
|
|
|
return "Advertising Interval";
|
|
|
|
case 0x1B:
|
|
|
|
return "LE Bluetooth Device Address";
|
|
|
|
case 0x1C:
|
|
|
|
return "LE Role";
|
|
|
|
case 0x1D:
|
|
|
|
return "Simple Pairing Hash C-256";
|
|
|
|
case 0x1E:
|
|
|
|
return "Simple Pairing Randomizer R-256";
|
|
|
|
case 0x3D:
|
|
|
|
return "3D Information Data";
|
|
|
|
case 0xFF:
|
|
|
|
return "Manufacturer Specific Data";
|
|
|
|
|
|
|
|
default:
|
|
|
|
return "Unknown type";
|
|
|
|
}
|
2018-04-15 12:12:06 +02:00
|
|
|
} // btsig_gap_type
|
|
|
|
|
2018-05-20 16:28:12 +02:00
|
|
|
// using IRAM_:ATTR here to speed up callback function
|
2018-06-12 19:44:11 +02:00
|
|
|
IRAM_ATTR void gap_callback_handler(esp_gap_ble_cb_event_t event,
|
|
|
|
esp_ble_gap_cb_param_t *param) {
|
|
|
|
esp_ble_gap_cb_param_t *p = (esp_ble_gap_cb_param_t *)param;
|
|
|
|
|
2018-07-04 08:58:00 +02:00
|
|
|
ESP_LOGV(TAG, "BT payload rcvd -> type: 0x%.2x -> %s", *p->scan_rst.ble_adv,
|
2018-06-12 19:44:11 +02:00
|
|
|
btsig_gap_type(*p->scan_rst.ble_adv));
|
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case ESP_GAP_BLE_SCAN_PARAM_SET_COMPLETE_EVT:
|
|
|
|
// restart scan
|
|
|
|
ESP_ERROR_CHECK(esp_ble_gap_start_scanning(BLESCANTIME));
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ESP_GAP_BLE_SCAN_RESULT_EVT:
|
|
|
|
// evaluate scan results
|
|
|
|
if (p->scan_rst.search_evt ==
|
|
|
|
ESP_GAP_SEARCH_INQ_CMPL_EVT) // Inquiry complete, scan is done
|
|
|
|
{ // restart scan
|
|
|
|
ESP_ERROR_CHECK(esp_ble_gap_start_scanning(BLESCANTIME));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p->scan_rst.search_evt ==
|
|
|
|
ESP_GAP_SEARCH_INQ_RES_EVT) // Inquiry result for a peer device
|
|
|
|
{ // evaluate sniffed packet
|
2018-07-04 08:58:00 +02:00
|
|
|
ESP_LOGV(TAG, "Device address (bda): %02x:%02x:%02x:%02x:%02x:%02x",
|
2018-06-12 19:44:11 +02:00
|
|
|
BT_BD_ADDR_HEX(p->scan_rst.bda));
|
2018-07-04 08:58:00 +02:00
|
|
|
ESP_LOGV(TAG, "Addr_type : %s",
|
2018-06-12 19:44:11 +02:00
|
|
|
bt_addr_t_to_string(p->scan_rst.ble_addr_type));
|
2018-07-04 08:58:00 +02:00
|
|
|
ESP_LOGV(TAG, "RSSI : %d", p->scan_rst.rssi);
|
2018-06-12 19:44:11 +02:00
|
|
|
|
|
|
|
if ((cfg.rssilimit) &&
|
|
|
|
(p->scan_rst.rssi < cfg.rssilimit)) { // rssi is negative value
|
|
|
|
ESP_LOGI(TAG, "BLTH RSSI %d -> ignoring (limit: %d)", p->scan_rst.rssi,
|
|
|
|
cfg.rssilimit);
|
2018-06-10 21:03:16 +02:00
|
|
|
break;
|
2018-06-12 19:44:11 +02:00
|
|
|
}
|
|
|
|
|
2019-03-07 15:05:52 +01:00
|
|
|
#if(VENDORFILTER)
|
2018-06-12 19:44:11 +02:00
|
|
|
|
|
|
|
if ((p->scan_rst.ble_addr_type == BLE_ADDR_TYPE_RANDOM) ||
|
|
|
|
(p->scan_rst.ble_addr_type == BLE_ADDR_TYPE_RPA_RANDOM)) {
|
2018-07-04 08:58:00 +02:00
|
|
|
ESP_LOGV(TAG, "BT device filtered");
|
2018-06-12 19:44:11 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// add this device and show new count total if it was not previously added
|
|
|
|
mac_add((uint8_t *)p->scan_rst.bda, p->scan_rst.rssi, MAC_SNIFF_BLE);
|
|
|
|
|
|
|
|
/* to be improved in vendorfilter if:
|
|
|
|
|
|
|
|
|
|
|
|
// you can search for elements in the payload using the
|
|
|
|
// function esp_ble_resolve_adv_data()
|
|
|
|
//
|
|
|
|
// Like this, that scans for the "Complete name" (looking inside the
|
|
|
|
payload buffer)
|
|
|
|
// uint8_t len;
|
|
|
|
// uint8_t *data = esp_ble_resolve_adv_data(p->scan_rst.ble_adv,
|
|
|
|
ESP_BLE_AD_TYPE_NAME_CMPL, &len);
|
|
|
|
|
|
|
|
filter BLE devices using their advertisements to get filter alternative to
|
|
|
|
vendor OUI if vendorfiltering is on, we ...
|
|
|
|
- want to count: mobile phones and tablets
|
|
|
|
- don't want to count: beacons, peripherals (earphones, headsets,
|
|
|
|
printers), cars and machines see
|
|
|
|
https://github.com/nkolban/ESP32_BLE_Arduino/blob/master/src/BLEAdvertisedDevice.cpp
|
|
|
|
|
|
|
|
http://www.libelium.com/products/meshlium/smartphone-detection/
|
|
|
|
|
|
|
|
https://www.question-defense.com/2013/01/12/bluetooth-cod-bluetooth-class-of-deviceclass-of-service-explained
|
|
|
|
|
|
|
|
https://www.bluetooth.com/specifications/assigned-numbers/baseband
|
2018-04-14 19:22:29 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
"The Class of Device (CoD) in case of Bluetooth which allows us to
|
|
|
|
differentiate the type of device (smartphone, handsfree, computer,
|
|
|
|
LAN/network AP). With this parameter we can differentiate among
|
|
|
|
pedestrians and vehicles."
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
} // evaluate sniffed packet
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} // gap_callback_handler
|
2018-06-10 21:03:16 +02:00
|
|
|
|
2018-06-10 21:46:58 +02:00
|
|
|
esp_err_t register_ble_callback(void) {
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_LOGI(TAG, "Register GAP callback");
|
|
|
|
|
|
|
|
// This function is called to occur gap event, such as scan result.
|
|
|
|
// register the scan callback function to the gap module
|
|
|
|
ESP_ERROR_CHECK(esp_ble_gap_register_callback(&gap_callback_handler));
|
|
|
|
|
|
|
|
static esp_ble_scan_params_t ble_scan_params = {
|
|
|
|
.scan_type = BLE_SCAN_TYPE_PASSIVE,
|
|
|
|
.own_addr_type = BLE_ADDR_TYPE_RANDOM,
|
|
|
|
|
2019-03-07 15:05:52 +01:00
|
|
|
#if(VENDORFILTER)
|
2018-06-12 19:44:11 +02:00
|
|
|
.scan_filter_policy = BLE_SCAN_FILTER_ALLOW_WLIST_PRA_DIR,
|
|
|
|
// ADV_IND, ADV_NONCONN_IND, ADV_SCAN_IND packets are used for broadcasting
|
|
|
|
// data in broadcast applications (e.g., Beacons), so we don't want them in
|
|
|
|
// vendorfilter mode
|
|
|
|
#else
|
|
|
|
.scan_filter_policy = BLE_SCAN_FILTER_ALLOW_ALL,
|
|
|
|
#endif
|
|
|
|
|
|
|
|
.scan_interval =
|
|
|
|
(uint16_t)(cfg.blescantime * 10 / 0.625), // Time = N * 0.625 msec
|
|
|
|
.scan_window = (uint16_t)(BLESCANWINDOW / 0.625) // Time = N * 0.625 msec
|
|
|
|
};
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "Set GAP scan parameters");
|
|
|
|
|
|
|
|
// This function is called to set scan parameters.
|
|
|
|
ESP_ERROR_CHECK(esp_ble_gap_set_scan_params(&ble_scan_params));
|
|
|
|
|
|
|
|
return ESP_OK;
|
2018-04-14 19:22:29 +02:00
|
|
|
|
2018-05-20 18:31:41 +02:00
|
|
|
} // register_ble_callback
|
2018-04-14 19:22:29 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
void start_BLEscan(void) {
|
2019-03-07 15:05:52 +01:00
|
|
|
#if(BLECOUNTER)
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_LOGI(TAG, "Initializing bluetooth scanner ...");
|
2018-04-19 15:17:23 +02:00
|
|
|
|
2019-01-19 19:54:54 +01:00
|
|
|
ESP_ERROR_CHECK(esp_coex_preference_set(
|
|
|
|
(esp_coex_prefer_t)
|
|
|
|
ESP_COEX_PREFER_BALANCE)); // configure Wifi/BT coexist lib
|
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
// Initialize BT controller to allocate task and other resource.
|
2018-07-04 00:09:25 +02:00
|
|
|
btStart();
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_ERROR_CHECK(esp_bluedroid_init());
|
|
|
|
ESP_ERROR_CHECK(esp_bluedroid_enable());
|
2018-04-14 19:22:29 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
// Register callback function for capturing bluetooth packets
|
|
|
|
ESP_ERROR_CHECK(register_ble_callback());
|
2018-05-20 13:50:00 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_LOGI(TAG, "Bluetooth scanner started");
|
2019-01-19 19:54:54 +01:00
|
|
|
#endif // BLECOUNTER
|
2018-05-20 13:50:00 +02:00
|
|
|
} // start_BLEscan
|
2018-04-14 20:22:58 +02:00
|
|
|
|
2018-06-12 19:44:11 +02:00
|
|
|
void stop_BLEscan(void) {
|
2019-03-07 15:05:52 +01:00
|
|
|
#if(BLECOUNTER)
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_LOGI(TAG, "Shutting down bluetooth scanner ...");
|
|
|
|
ESP_ERROR_CHECK(esp_ble_gap_register_callback(NULL));
|
|
|
|
ESP_ERROR_CHECK(esp_bluedroid_disable());
|
|
|
|
ESP_ERROR_CHECK(esp_bluedroid_deinit());
|
2019-01-19 19:54:54 +01:00
|
|
|
btStop(); // disable bt_controller
|
|
|
|
ESP_ERROR_CHECK(esp_coex_preference_set((
|
|
|
|
esp_coex_prefer_t)ESP_COEX_PREFER_WIFI)); // configure Wifi/BT coexist lib
|
2018-06-12 19:44:11 +02:00
|
|
|
ESP_LOGI(TAG, "Bluetooth scanner stopped");
|
2018-07-03 13:19:07 +02:00
|
|
|
#endif // BLECOUNTER
|
2019-01-19 19:54:54 +01:00
|
|
|
} // stop_BLEscan
|