Files
esp-idf/examples/bluetooth/bluedroid/ble/gatt_security_client

Supported Targets ESP32 ESP32-C2 ESP32-C3 ESP32-C5 ESP32-C6 ESP32-C61 ESP32-H2 ESP32-S3

ESP-IDF Gatt Security Client Example

This example shows how to use the ESP BLE security APIs to secure connect to and encrypt with peer devices.

Flow Diagram

    ┌──────────────┐                                    ┌──────────────┐
    │   Security   │                                    │   Security   │
    │    Client    │                                    │    Server    │
    └──────┬───────┘                                    └──────┬───────┘
           │                                                   │
           │  ─────────── Security Parameters Setup ─────────  │
           │                                                   │
           │  1. Set IO Capability                             │
           │  2. Set Auth Mode (Bonding, MITM, SC)             │
           │  3. Set Key Distribution                          │
           │                                                   │
           │  ─────────── Connection Phase ───────────         │
           │                                                   │
           │  4. Scan for Server                               │  Advertising
           │ ───────────────────────────────────────────────>  │
           │                                                   │
           │  5. Connect                                       │
           │ ───────────────────────────────────────────────>  │
           │                                                   │
           │  Connection Established                           │
           │ <─────────────────────────────────────────────────│
           │                                                   │
           │  ─────────── Pairing & Encryption ───────────     │
           │                                                   │
           │  6. Start Encryption (esp_ble_set_encryption)     │
           │ ───────────────────────────────────────────────>  │
           │                                                   │
           │  7. Exchange Pairing Features                     │
           │ <────────────────────────────────────────────────>│
           │                                                   │
           │  8. Generate Keys (LTK, IRK, CSRK)                │
           │ <────────────────────────────────────────────────>│
           │                                                   │
           │  9. Encrypt Link                                  │
           │ <────────────────────────────────────────────────>│
           │                                                   │
           │  10. ESP_GAP_BLE_AUTH_CMPL_EVT                    │
           │ <───────────────────────────────────────────────  │
           │                                                   │
           │  ─────────── Secure Data Exchange ───────────     │
           │                                                   │
           │  Encrypted GATT Operations                        │
           │ <────────────────────────────────────────────────>│
           │                                                   │
    ┌──────┴───────┐                                    ┌──────┴───────┐
    │   Security   │                                    │   Security   │
    │    Client    │                                    │    Server    │
    └──────────────┘                                    └──────────────┘

How to Use Example

Before project configuration and build, be sure to set the correct chip target using:

idf.py set-target <chip_name>

To test this demo, you can run the gatt_security_server_demo, which starts advertising and can be connected to this demo automatically.

There are some important points for this demo:

  1. esp_ble_gap_set_security_param should be used to set the security parameters in the initial stage;
  2. esp_ble_set_encryption should be used to start encryption with peer device. If the peer device initiates the encryption, esp_ble_gap_security_rsp should be used to send security response to the peer device when ESP_GAP_BLE_SEC_REQ_EVT is received.
  3. The gatt_security_client_demo will receive a ESP_GAP_BLE_AUTH_CMPL_EVT once the encryption procedure has completed.

Please, check this tutorial for more information about this example.

Hardware Required

  • A development board with ESP32/ESP32-C3/ESP32-C2/ESP32-H2/ESP32-S3 SoC (e.g., ESP32-DevKitC, ESP-WROVER-KIT, etc.)
  • A USB cable for Power supply and programming

See Development Boards for more information about it.

Build and Flash

Run idf.py -p PORT flash monitor to build, flash and monitor the project.

(To exit the serial monitor, type Ctrl-].)

See the Getting Started Guide for full steps to configure and use ESP-IDF to build projects.

Example Output

I (0) cpu_start: Starting scheduler on APP CPU.
I (572) BTDM_INIT: BT controller compile version [1342a48]
I (572) system_api: Base MAC address is not set
I (572) system_api: read default base MAC address from EFUSE
I (582) phy_init: phy_version 4670,719f9f6,Feb 18 2021,17:07:07
I (1002) SEC_GATTC_DEMO: EVT 0, gattc if 1
I (1002) SEC_GATTC_DEMO: REG_EVT
I (1032) SEC_GATTC_DEMO: Scan start success
I (1242) SEC_GATTC_DEMO: 38 68 a4 69 bb 7c
I (1242) SEC_GATTC_DEMO: Searched Adv Data Len 31, Scan Response Len 14
I (1242) SEC_GATTC_DEMO: Searched Device Name Len 0
I (1242) SEC_GATTC_DEMO:

I (1262) SEC_GATTC_DEMO: 38 68 a4 69 bb 7c
I (1262) SEC_GATTC_DEMO: Searched Adv Data Len 31, Scan Response Len 14
I (1262) SEC_GATTC_DEMO: Searched Device Name Len 0
I (1272) SEC_GATTC_DEMO:

I (1592) SEC_GATTC_DEMO: 38 68 a4 69 bb 7c
I (1592) SEC_GATTC_DEMO: Searched Adv Data Len 31, Scan Response Len 14
I (1592) SEC_GATTC_DEMO: Searched Device Name Len 0
I (1602) SEC_GATTC_DEMO:

I (1912) SEC_GATTC_DEMO: 38 68 a4 69 bb 7c
I (1912) SEC_GATTC_DEMO: Searched Adv Data Len 31, Scan Response Len 14
I (1912) SEC_GATTC_DEMO: Searched Device Name Len 0
I (1922) SEC_GATTC_DEMO:

Troubleshooting

For any technical queries, please open an issue on GitHub. We will get back to you soon.