Delta
/
BLE_HIDScanner_DELTA
Example for BLE HID scanner
Fork of BLE_HIDScanner_DELTA by
main.cpp
- Committer:
- silviaChen
- Date:
- 2017-07-26
- Revision:
- 4:fd7572166cbb
- Parent:
- 3:9d6e0ddf3fbe
- Child:
- 5:8f0f8b8a85eb
File content as of revision 4:fd7572166cbb:
/* mbed Microcontroller Library * Copyright (c) 2006-2015 ARM Limited * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "mbed.h" #include "ble/BLE.h" #include "ble/services/BatteryService.h" #include "ble/services/DeviceInformationService.h" #include "HIDService.h" #include "ble/services/UARTService.h" //DigitalOut led1(LED1); Serial uart(USBTX, USBRX); InterruptIn testHID_btn(BUTTON1); HIDService *hidService; unsigned char keyData; const static char DEVICE_NAME[] = "HID_Keyboard"; static const uint16_t uuid16_list[] = {GattService::UUID_HUMAN_INTERFACE_DEVICE_SERVICE, GattService::UUID_BATTERY_SERVICE, GattService::UUID_DEVICE_INFORMATION_SERVICE}; static volatile bool triggerSensorPolling = false; bool isConnectionSecured = false; bool isSecuritySetup = false; unsigned char serial_buf[20]; uint16_t serialLen = 0; static uint8_t key_press_scan_buff[50]; static uint8_t modifyKey[50]; int index_b = 0; DeviceInformationService *deviceInfo; BatteryService *batteryService; static UARTService *uartServicePtr; void passkeyDisplayCallback(Gap::Handle_t handle, const SecurityManager::Passkey_t passkey) { uart.printf("Input passKey: "); for (unsigned i = 0; i < Gap::ADDR_LEN; i++) { uart.printf("%c ", passkey[i]); } uart.printf("\r\n"); } void securitySetupInitiatedCallback(Gap::Handle_t, bool allowBonding, bool requireMITM, SecurityManager::SecurityIOCapabilities_t iocaps) { uart.printf("securitySetupInitiatedCallback\r\n"); isSecuritySetup = true; } void securitySetupCompletedCallback(Gap::Handle_t handle, SecurityManager::SecurityCompletionStatus_t status) { if (status == SecurityManager::SEC_STATUS_SUCCESS) { uart.printf("Security success\r\n", status); isConnectionSecured = true; } else { uart.printf("Security failed\r\n", status); } } void linkSecuredCallback(Gap::Handle_t handle, SecurityManager::SecurityMode_t securityMode) { uart.printf("linkSecuredCallback\r\n"); if (!isSecuritySetup) { isConnectionSecured = true; } } void securityContextStoredCallback(Gap::Handle_t handle) { uart.printf("securityContextStoredCallback\r\n"); isConnectionSecured = true; isSecuritySetup = false; } void onConnectionCallback(const Gap::ConnectionCallbackParams_t *params) { uart.printf("Connected\r\n"); } void disconnectionCallback(const Gap::DisconnectionCallbackParams_t *params) { uart.printf("Disconnected\r\n"); isConnectionSecured = false; BLE::Instance(BLE::DEFAULT_INSTANCE).gap().startAdvertising(); // restart advertising } void onTimeoutCallback(Gap::TimeoutSource_t source) { switch (source) { case Gap::TIMEOUT_SRC_ADVERTISING: uart.printf("Advertising timeout\r\n"); break; case Gap::TIMEOUT_SRC_SECURITY_REQUEST: uart.printf("Security request timeout\r\n"); break; case Gap::TIMEOUT_SRC_SCAN: uart.printf("Scanning timeout\r\n"); break; case Gap::TIMEOUT_SRC_CONN: uart.printf("Connection timeout\r\n"); break; } } void serverDataWrittenCallback(const GattWriteCallbackParams *response) { uart.printf("serverDataWrittenCallback\r\n"); if (response->handle == uartServicePtr->getTXCharacteristicHandle()) { serialLen = response->len; for(int j=0;j<response->len;j++) { //uart.printf("data: %02X\r\n", response->data[j]); serial_buf[j] = response->data[j]; } } } void periodicCallback(void) { //led1 = !led1; /* Do blinky on LED1 while we're waiting for BLE events */ /* Note that the periodicCallback() executes in interrupt context, so it is safer to do * heavy-weight sensor polling from the main thread. */ //triggerSensorPolling = true; } void testHIDRiseInterrupt() { triggerSensorPolling = true; } void transferReportData(unsigned char keyData) { if(keyData <= 0x39 && keyData >= 0x30){ //number if(keyData == 0x30){ modifyKey[index_b] = 0x00; key_press_scan_buff[index_b] = 0x27; index_b++; key_press_scan_buff[index_b] = 0x73; } else { modifyKey[index_b] = 0x00; key_press_scan_buff[index_b] = keyData-0x13; index_b++; key_press_scan_buff[index_b] = 0x73; } } else if(keyData <= 0x7a && keyData >= 0x61 ){ //lowercase letters modifyKey[index_b] = 0x00; key_press_scan_buff[index_b] = keyData-0x5d; index_b++; key_press_scan_buff[index_b] = 0x73; } else if(keyData <= 0x5a && keyData >= 0x41){ //uppercase letters modifyKey[index_b] = 0x02; key_press_scan_buff[index_b] = keyData-0x3d; index_b++; key_press_scan_buff[index_b] = 0x73; } else if (keyData == 0x20) { //space modifyKey[index_b] = 0x00; key_press_scan_buff[index_b] = 0x2c; index_b++; key_press_scan_buff[index_b] = 0x73; } else { modifyKey[index_b] = 0x00; //key_press_scan_buff[index_b] = 0x73; //this is dummy data. //msg[index_w+1] = '\0'; } index_b++; } void dataSentCallback(const unsigned callback) { //uart.printf("dataSentCallback\r\n"); } void bleInitComplete(BLE::InitializationCompleteCallbackContext *params) { BLE &ble = params->ble; ble_error_t error = params->error; if (error != BLE_ERROR_NONE) { return; } bool enableBonding = true; bool requireMITM = false; //uint8_t pKey[6] = {'1', '1', '1', '1', '1', '1'}; //set the passkey ble.securityManager().init(enableBonding, requireMITM, SecurityManager::IO_CAPS_NONE); ble.securityManager().onPasskeyDisplay(passkeyDisplayCallback); ble.securityManager().onSecuritySetupInitiated(securitySetupInitiatedCallback); ble.securityManager().onSecuritySetupCompleted(securitySetupCompletedCallback); ble.securityManager().onLinkSecured(linkSecuredCallback); ble.securityManager().onSecurityContextStored(securityContextStoredCallback); ble.gap().onDisconnection(disconnectionCallback); ble.gap().onConnection(onConnectionCallback); ble.gap().onTimeout(onTimeoutCallback); //ble.gattServer().onDataRead(onDataReadCallback); ble.gattServer().onDataWritten(serverDataWrittenCallback); ble.gattServer().onDataSent(dataSentCallback); /* Setup primary service. */ hidService = new HIDService(ble); /* Setup auxiliary service. */ uartServicePtr = new UARTService(ble); batteryService = new BatteryService(ble, 100); deviceInfo = new DeviceInformationService(ble, "DELTA", "NQ620", "SN1", "hw-rev1", "fw-rev1", "soft-rev1"); /* Setup advertising. */ ble.gap().accumulateAdvertisingPayload(GapAdvertisingData::BREDR_NOT_SUPPORTED | GapAdvertisingData::LE_GENERAL_DISCOVERABLE); ble.gap().accumulateAdvertisingPayload(GapAdvertisingData::COMPLETE_LIST_16BIT_SERVICE_IDS, (uint8_t *)uuid16_list, sizeof(uuid16_list)); ble.gap().accumulateAdvertisingPayload(GapAdvertisingData::KEYBOARD); ble.gap().accumulateAdvertisingPayload(GapAdvertisingData::COMPLETE_LOCAL_NAME, (uint8_t *)DEVICE_NAME, sizeof(DEVICE_NAME)); ble.gap().setAdvertisingType(GapAdvertisingParams::ADV_CONNECTABLE_UNDIRECTED); ble.gap().setAdvertisingInterval(50); /* 50ms */ ble.gap().startAdvertising(); uart.printf("Start advertising\r\n"); } int main(void) { //led1 = 1; // Ticker ticker; // ticker.attach(periodicCallback, 0.1); // blink LED every second testHID_btn.rise(&testHIDRiseInterrupt); uart.baud(115200); uart.printf("Srarting HID Service\r\n"); BLE& ble = BLE::Instance(BLE::DEFAULT_INSTANCE); ble.init(bleInitComplete); /* SpinWait for initialization to complete. This is necessary because the * BLE object is used in the main loop below. */ while (ble.hasInitialized() == false) { /* spin loop */ } // infinite loop while (1) { if (isConnectionSecured) { if (uart.readable() == 1) { keyData = uart.getc(); //uart.printf("keyData: %c\r\n", keyData); transferReportData(keyData); if(keyData == 0x0a && ble.getGapState().connected){ for(int i = 0; i < index_b ; i++){ //uart.printf("m[%x] k[%x] ", modifyKey[i], key_press_scan_buff[i]); hidService->updateReport(modifyKey[i], key_press_scan_buff[i]); ble.waitForEvent(); wait(0.01); } index_b = 0; memset(modifyKey, 0, 50); memset(key_press_scan_buff, 0, 50); } } else if(triggerSensorPolling) { //Demo HID/Serial at the same time triggerSensorPolling = false; for(int j=0;j<serialLen;j++) { keyData = serial_buf[j]; //uart.printf("keyData: %c\r\n", keyData); transferReportData(keyData); } for(int i = 0; i < index_b ; i++){ //uart.printf("m[%x] k[%x] ", modifyKey[i], key_press_scan_buff[i]); hidService->updateReport(modifyKey[i], key_press_scan_buff[i]); ble.waitForEvent(); wait(0.01); } index_b = 0; memset(modifyKey, 0, 50); memset(key_press_scan_buff, 0, 50); } else { ble.waitForEvent(); } } else { ble.waitForEvent(); // low power wait for event wait(1); } } }