Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/smartdevicelink/protocol_spec
Describes the communication protocol between a smartdevicelink enabled head unit and mobile application
https://github.com/smartdevicelink/protocol_spec
Last synced: 4 days ago
JSON representation
Describes the communication protocol between a smartdevicelink enabled head unit and mobile application
- Host: GitHub
- URL: https://github.com/smartdevicelink/protocol_spec
- Owner: smartdevicelink
- License: bsd-3-clause
- Created: 2015-02-23T19:20:49.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2021-10-27T13:45:47.000Z (about 3 years ago)
- Last Synced: 2024-04-13T03:34:29.670Z (7 months ago)
- Homepage: https://smartdevicelink.github.io/protocol_spec/
- Size: 123 KB
- Stars: 14
- Watchers: 10
- Forks: 13
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
README
# SmartDeviceLink Protocol
**Current Version: 5.4.1**
## 1. Overview
The SmartDeviceLink protocol specification describes the method for establishing communication between an application and head unit and registering the application for continued communication with the head unit. The protocol is used as the base formation of packets sent from one module to another.All new SDL implementations should implement the newest version of the protocol.
### 1.1 Common Terms
| Term | Description |
|------|-------------|
|**Module / Head Unit**| Hardware implementing the sdl_core software|
|**Application**| Smart device application that implements the proxy library (iOS or Android)|## 2. Frames
All transported data is formed with a header followed by an optional payload. The combination of header and payload is referred to as a frame.### 2.1 Version 1 Frame Header
>Deprecated: Protocol versions 2 and higher. Only used as initial `StartService` packet for establishing communication and version negotiation from application
Byte 1
Byte 2
Byte 3
Byte 4
Version
C
Frame Type
Service Type
Frame Info
Session ID
Byte 5
Byte 6
Byte 7
Byte 8
Data Size
### 2.2 Version 2 Frame Header
>Required: Protocol versions 2 and higher
Byte 1
Byte 2
Byte 3
Byte 4
Version
E
Frame Type
Service Type
Frame Info
Session ID
Byte 5
Byte 6
Byte 7
Byte 8
Data Size
Byte 9
Byte 10
Byte 11
Byte 12
Message ID
### 2.3 Frame Header Fields
Field
Size
Description
Version
4 bit
Protocol Version
0x1 Protocol version 1 - uses a version 1 Frame Header
0x2 Protocol version 2 - uses a version 2 Frame Header
0x3 Protocol version 3 - uses a version 2 Frame Header
0x4 Protocol version 4 - uses a version 2 Frame Header
0x5 Protocol version 5 - uses a version 2 Frame Header
0x6 - 0xF Reserved
C
1 bit
Compression Flag
0x0 This packet is not compressed
0x1 This packet is compressed
Note: Only available in Protocol Version 1
E
1 bit
Encryption Flag
0x0 This packet is not encrypted
0x1 This packet is encrypted
Note: Only available in Protocol Version 2 and higher. Must be always set to zero for a First Frame
Frame Type
3 bit
0x00 Control Frame
0x01 Single Frame
0x02 First Frame
0x03 Consecutive Frame
0x04 - 0x07 Reserved
Service Type
8 bit
0x00 Control Service
0x01 - 0x06 Reserved
0x07 Remote Procedure Call (RPC) Service
0x08 - 0x09 Reserved
0x0A Audio Service
0x0B Video Service
0x0C - 0x0E Reserved
0x0F Bulk Data (Hybrid Service)
0x10 - 0xFF Reserved
Frame Info
8 bit
Frame Type = 0x00 (Control Frame)
0x00 Heartbeat
0x01 Start Service
0x02 Start Service ACK
0x03 Start Service NAK
0x04 End Service
0x05 End Service ACK
0x06 End Service NAK
0x07 Register Secondary Transport
0x08 Register Secondary Transport ACK
0x09 Register Secondary Transport NAK
0x0A - 0xFC Reserved
0xFD Transport Event Update
0xFE Service Data ACK
0xFF Heartbeat ACK
Frame Type = 0x01 (Single Frame)
0x00 - 0xFF Reserved
Frame Type = 0x02 (First Frame)
0x00 - 0xFF Reserved
Frame Type = 0x03 (Consecutive Frame)
0x00 Last Frame
0x01 - 0xFF Frame Number
Session ID
8 bit
The session identifier
Data Size
32 bit
Frame Type = 0x00 (Control Frame)
0x0 - 0xFFFFFFFF reserved.
Frame Type = 0x02 (First Frame)
0x08 The data size for a first frame is always 8 bytes. In the payload, the first four bytes denote the Total Size of the data contained in all consecutive frames. This is always the size of whole non-encrypted payload (even if consecutive frames are encrypted). The second four bytes denote the number of consecutive frames following this one
Frame Type = 0x01 or 0x03 (Single or Consecutive Frame)
The total bytes in this frame's payload. If frame is encrypted this is the size of encrypted payload, otherwise size of non-encrypted payload.
Message ID
32 bit
The message identifier, used to uniquely identify this message.
Note: Only included in protocol version 2 frame headers and higher
### 2.4 Max Transport Units
The max transport unit (MTU) of a frame varies based on version. The MTU includes the frame header and payload. The current supported versions and their MTU's respectively are described below.| Version | MTU (bytes) |
|------|-------------|
|**1**| 1500|
|**2**| 1500|
|**3**| 131,084 |
|**4**| 131,084|
|**5**| 131,084 default or negotiated *(See Control Frame Payloads)*#### 2.4.1 Payload Size
The payload size is determined by the MTU - Frame Header Size.| Version | Max Payload Size (bytes) |
|------|-------------|
|**1**| 1488|
|**2**| 1488|
|**3**| 131,072 |
|**4**| 131,072|
|**5**| 131,072 default or (Negotiated MTU - 12 bytes) *(See Control Frame Payloads)*#### 2.4.2 Encrypted MTU
While the supported MTU is the maximum size for that version, if a frame is encrypted it will be subject to the MTU of that encryption protocol as well. That means the MTU will have to be the minimum between SDL's MTU and the encryption protocol's MTU.## 3. Frame Types
### 3.1 Control Frame
Control frames are the lowest-level type of packets. They can be sent over any of the defined services. They are used for the control of the services in which they are sent.#### 3.1.1 Special Header Definitions:
| Header Value |Expected values| Description |
|--------------|---------------|-------------|
|Frame Info| `0x00` - `0x06`, `0xFE`, `0xFF`|See below "Frame Info Definitions"|
|Data Size| `0x00`, `0x04`|`0x00` - Majority of control packets do not have payloads
`0x04` - Used for `StartServiceACK` where the payload is a HashID |#### 3.1.2 Frame Info Definitions:
| Frame Info Value| Name | Description |
|------------|------|-------------|
| 0x00| Heartbeat| A ping packet that is sent to ensure the connection is still active and the service is still valid|
| 0x01 | Start Service |Requests that a specific type of service is started |
| 0x02 | Start Service ACK | Acknowledges that the specific service has been started successfully
| 0x03 | Start Service NAK | Negatively acknowledges that the specific service was *not* started
| 0x04 | End Service | Requests that a specific type of service is ended
| 0x05 | End Service ACK | Acknowledges that the specific service has been ended successfully
| 0x06 | End Service NAK | Negatively acknowledges that the specific service was *not* ended or has not yet been started
| 0x07 | Register Secondary Transport | Request for a session registered on a primary transport to use a secondary transport.
This frame should only be sent on the Secondary Transport that the session is requesting.
| 0x08 | Register Secondary Transport ACK | Acknowledges that the supplied session is registered to use the requested Secondary Transport. The application is only allowed to send additional frames on the Secondary Transport after this frame is received.
This frame must be sent on the Secondary Transport in which the original request was sent.
| 0x09 | Register Secondary Transport NAK | Negatively acknowledges that the session is not registered or able to use the current Secondary Transport. The application cannot use this transport for any other messages.
This frame must be sent on the Secondary Transport in which the original request was sent.
| 0xFD | Transport Event Update | Indicates that status or configuration of one or more transports are updated. This frame must only be sent after the successful starting of the RPC service which includes the protocol version negotiation.
| 0xFE | Service Data ACK | *Deprecated*
| 0xFF | Heartbeat ACK | Acknowledges that a Heartbeat control packet has been received#### 3.1.3 Payloads
>Added: Protocol Version 5
>*Note: All parameters are optional*Control frames use [BSON](http://bsonspec.org) to store payload data. All payload types are directly from the BSON spec. Each control frame info type will have a defined set of available data. Most types will also have differently available data based on their service type.
If there is no data to send for a given parameter, the parameter should not be included.
**Note:** Heartbeat, Heartbeat ACK, and Service Data ACK control frame types are not covered for any service as they were deprecated before payloads were introduced.
##### 3.1.3.1 Control Service
###### 3.1.3.1.1 Register Secondary Transport
>No parameters
###### 3.1.3.1.2 Register Secondary Transport ACK
>No parameters
###### 3.1.3.1.3 Register Secondary Transport NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| reason | String | 5.1.0 | A string describing the reason of failure |###### 3.1.3.1.4 Transport Event Update
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| tcpIpAddress | String | 5.1.0 | IP address that can be used to establish a TCP connection. It can be IPv4 address (example: "192.168.1.1") or IPv6 address (example: "fd12:3456:789a::1").
An empty string indicates that the TCP transport becomes unavailable. |
| tcpPort | int32 | 5.1.0 | TCP Port number that can be used along with the supplied `tcpIpAddress` to establish a TCP connection. If parameter is included, the `tcpIpAddress` parameter must also be included.|##### 3.1.3.2 RPC Service
###### 3.1.3.2.1 Start Service
**Note:** While this includes a payload, it will remain a v1 frame header to ensure backwards compatibility with older systems.| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|protocolVersion|String| 5.0.0 | The max version of the protocol supported by client requesting service to start. Must be in the format *"Major.Minor.Patch"*|###### 3.1.3.2.2 Start Service ACK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|protocolVersion|String| 5.0.0 |The negotiated version of the protocol. Must be in the format *"Major.Minor.Patch"*. The frame header version should match the major version exactly.|
|hashId|int32| 5.0.0 | Hash ID to identify this session and used when sending an `EndService` control frame for the RPC service type|
|mtu| int64 | 5.0.0 | Max transport unit to be used for this service|. If not included the client should use the protocol version default.|
|secondaryTransports|String Array| 5.1.0 | Array of transport types which are allowed to be used as a Secondary Transport. Refer to the table below for possible values.
As of this protocol spec version (5.1.0) only a single Secondary Transport may be used beyond a primary transport for a given session.
If there are no currently available Secondary Transports or the functionality is not supported, this parameter should be omitted or be an empty array.|
|audioServiceTransports|int32 array| 5.1.0 | Ordered list of transport priority types that support the audio service (`0x0A`). Only the values of `1` ("Primary Transport") or `2` ("Secondary Transport") shall be used. If both the primary and secondary transport support the audio service, both should be included (`1` and `2`) in the order they are preferred; otherwise only the single transport priority type should be included. An application must not start the audio service on a transport priority type that is not listed in the array.
If this parameter is not included the Primary Transport should be used for the audio service.|
|videoServiceTransports|int32 array| 5.1.0 | Ordered list of transport priority types that support the video service (`0x0B`). Only the values of `1` ("Primary Transport") or `2` ("Secondary Transport") shall be used. If both the primary and secondary transport support the video service, both should be included (`1` and `2`) in the order they are preferred; otherwise only the single transport priority type should be included. An application must not start the video service on a transport priority type that is not listed in the array.
If this parameter is not included the Primary Transport should be used for the video service.|
|authToken|String| 5.2.0 | Included exclusively when communicating with cloud applications. This token is used by a cloud application to authenticate a user account associated with the vehicle. |
|make|String| 5.4.0 | Vehicle make value. Used by OEM exclusive apps to identify whether current vehicle is supported or not. |
|model|String| 5.4.0 | Vehicle model value. Used by OEM exclusive apps to identify whether current vehicle is supported or not. |
|modelYear|String| 5.4.0 | Vehicle model year value. Used by OEM exclusive apps to identify whether current vehicle is supported or not. |
|trim|String| 5.4.0 | Vehicle trim value. Used by OEM exclusive apps to identify whether current vehicle is supported or not. |
|systemSoftwareVersion|String| 5.4.0 | Vehicle system software version value. Can be specified in any format desired by the OEM. |
|systemHardwareVersion|String| 5.4.0 | Vehicle system hardware version value. Can be specified in any format desired by the OEM. |**list of transport type strings**
| String | Description |
|--------|-------------|
| IAP\_BLUETOOTH | iAP over Bluetooth |
| IAP\_USB | iAP over USB where it is not possible to distinguish between host or device mode|
| IAP\_USB\_HOST\_MODE | iAP over USB, and the phone is running as host |
| IAP\_USB\_DEVICE\_MODE | iAP over USB, and the phone is running as device |
| IAP\_CARPLAY | iAP over Carplay wireless |
| SPP\_BLUETOOTH | Bluetooth SPP. |
| AOA\_USB | Android Open Accessory |
| TCP\_WIFI | TCP connection over Wi-Fi |###### 3.1.3.2.3 Start Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters|
| reason | String | 5.3.0 | A string describing the reason of failure |###### 3.1.3.2.4 End Service
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|hashId|int32| 5.0.0 | Hash ID supplied in the `StartServiceACK` for this service type|###### 3.1.3.2.5 End Service ACK
###### 3.1.3.2.6 End Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters such as: [`hashId`] |
| reason | String | 5.3.0 | A string describing the reason of failure |##### 3.1.3.3 Audio Service
###### 3.1.3.3.1 Start Service
>No parameters###### 3.1.3.3.2 Start Service ACK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|mtu| int64 | 5.0.0 | Max transport unit to be used for this service. If not included the client should use the one set via the RPC service or protocol version default.|###### 3.1.3.3.3 Start Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters such as: [`videoProtocol`, `videoCodec`] |
| reason | String | 5.3.0 | A string describing the reason of failure |###### 3.1.3.3.4 End Service
>No parameters###### 3.1.3.3.5 End Service ACK
>No parameters###### 3.1.3.3.6 End Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters such as: [`hashId`] |
| reason | String | 5.3.0 | A string describing the reason of failure |##### 3.1.3.4 Video Service
###### 3.1.3.4.1 Start Service
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|height|int32| 5.0.0 | Desired height from the client requesting the video service to start|
|width|int32| 5.0.0 | Desired width from the client requesting the video service to start|
|videoProtocol|String| 5.0.0 | Desired video protocol to be used. See `VideoStreamingProtocol ` RPC|
|videoCodec|String| 5.0.0 | Desired video codec to be used. See `VideoStreamingCodec` RPC|###### 3.1.3.4.2 Start Service ACK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
|mtu| int64 | 5.0.0 | Max transport unit to be used for this service. If not included the client should use the one set via the RPC service or protocol version default.|
|height|int32| 5.0.0 | Accepted height from the client requesting the video service to start|
|width|int32| 5.0.0 | Accepted width from the client requesting the video service to start|
|videoProtocol|String| 5.0.0 | Accepted video protocol to be used. See `VideoStreamingProtocol ` RPC|
|videoCodec|String| 5.0.0 | Accepted video codec to be used. See `VideoStreamingCodec` RPC|###### 3.1.3.4.3 Start Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters such as: [`videoProtocol`, `videoCodec`] |
| reason | String | 5.3.0 | A string describing the reason of failure |###### 3.1.3.4.4 End Service
>No parameters###### 3.1.3.4.5 End Service ACK
>No parameters###### 3.1.3.4.6 End Service NAK
| Tag Name | Type | Introduced | Description |
|----------|------|------------|-------------|
| rejectedParams |String Array| 5.0.0 | An array of rejected parameters such as: [`hashId`] |
| reason | String | 5.3.0 | A string describing the reason of failure |### 3.2 Single Frame
A frame of type Single Frame contains all the data for a particular packet in the payload. The majority of frames sent over the protocol utilize this frame type.
Single Frame
Header
Payload
Data
#### 3.2.1 Special Header Definitions:
| Header Value |Expected values| Description |
|--------------|---------------|-------------|
|Frame Info| `0x00`|Reserved|
|Data Size| 0x01-0xFFFFFFFF|Total payload size in bytes for this frame|
### 3.3 Multiple Frame Packets
Some payloads will be larger than the maximum transport unit will allow. If that is the case, the payload will be broken up over multiple frames. These frame types are First and Consecutive.
Data
Data Chunk 1
Data Chunk 2
...
Data Chunk n
First Frame
Header
Payload
Consecutive Frame 1
Header
Payload
Consecutive Frame 2
Header
Payload
...
Consecutive Frame n
Header
Payload
#### 3.3.1 First Frame
The First Frame in a multiple frame payload contains information about the entire sequence of frames so that the receiving end can correctly parse all the frames and reassemble the entire payload. The payload of this frame is only eight bytes and contains information regarding the rest of the sequence.##### 3.3.1.1 Payload:
Byte
0
1
2
3
4
5
6
7
Total size of the original payload being parsed
Number of Consecutive Frames in this sequence
##### 3.3.1.2 Special Header Definitions:
| Header Value |Expected values| Description |
|--------------|---------------|-------------|
|Frame Info| `0x00`|Reserved|
|Data Size| `0x08`|This frame contains a fixed data size (8 bytes) for the payload.|#### 3.3.2 Consecutive Frame
The Consecutive Frames in a multiple frame payload contain the actual raw data of the original payload. The parsed payload contained in each of the Consecutive Frames' payloads should be buffered until the entire sequence is complete.##### 3.3.2.1 Special Header Definitions:
| Header Value |Expected values| Description |
|--------------|---------------|-------------|
|Frame Info| `0x00` - `0xFF`|Values `0x01` - `0xFF` are used incrementally as each consecutive frame is created and sent in the sequence. eg The first consecutive packet in the sequence will have the value `0x01`, the next consecutive frame that contains the next chunk of data in the sequence will have the value `0x02`.
If the sequence reaches `0xFF` with more frames to create, it shall rollover to `0x01` **not** `0x00` as it is reserved.
`0x00` is only used for the last consecutive frame in a multi-frame sequence and the last frame must have this value.|
|Data Size| `0x01` - `0xFFFFFFFF`|Payload size in bytes for only this frame |## 4. Establishing Communication
### 4.1 Transport Layer
>Required: All Protocol VersionsA physical transport must be established between a head unit and an application before an SDL session can start.
### 4.2 Version Negotiation
>Required: All Protocol Versions#### 4.2.1 Overview
Once a physical transport is established, each application must negotiate the maximum supported protocol version with the head unit. To establish basic communication and register with the head unit, the application must start an RPC service (Service Type: 0x07), using a *Version 1 Protocol Header*.There are two types of version negotiation. Protocol versions 1 through 4 use an old style of negotiation, where as versions 5 and newer use a faster and more intelligent negotiation scheme.
##### 4.2.1.1 Version 1-4 Negotiation
>Required for Protocol Versions 1 through 4| Proxy| Direction | Core |
|------------|------|-------------|
|`StartService`
**Version:** v1
**Payload:** no payload| ----------->|
|| <-----------|`StartServiceACK`
**Version:** Max supported by Core
**Payload:** raw bytes for hashID
|`SingleFrame` *(or other RPC supporting Frame Type)*
**Version:** Highest version supported by both Core and Proxy
**Payload:** Lots of bytes| ----------->| Sets negotiated version.##### 4.2.1.2 Version 5+ Negotiation
>Required for Protocol Versions 5 and newer| Proxy| Direction | Core |
|------------|------|-------------|
|`StartService`
**Version:** v1
**Payload:** Constructed payload [protocolVersion: 5.x.x]| ----------->| **v4 Core**: Ignores payload, sends protocol version 4 frame and uses previous negotiation scheme.
**v5+ Core:** Reads in payload data, uses this information to determine version.
|| <-----------|`StartServiceACK`
**Version:** Highest version supported by both Core and Proxy
**Payload:** Constructed payload [protocolVersion: 5.x.x, hashId: 0x9873, mtu: 130687]
|`SingleFrame`
**Version:** Highest version supported by both Core and Proxy
**Payload:** Lots of bytes| ----------->|#### 4.2.2 Starting Communication
The application sends a `StartService` frame to the module containing no payload.##### Application -> Head Unit
#### 4.2.2.1 Versions 1 - 4
Version
C
Frame Type
Service Type
Frame Info
Session Id
Data Size
1
no
Control
RPC
Start Service
0
0
0b0001
0b0
0b000
0x07
0x01
0x00
0x00000000
#### 4.2.2.2 Versions 5 and newer
>**Note:** Even though this is a Protocol Version 1 frame header it includes a payload. This is a very special exception.Payload includes a constructed BSON object that has a single parameter of `protocolVersion` that describes the applications max supported Protocol Version.
Version
C
Frame Type
Service Type
Frame Info
Session Id
Data Size
1
no
Control
RPC
Start Service
0
Size of Payload
0b0001
0b0
0b000
0x07
0x01
0x00
0xNNNNNNNN
Payload
[protocolVersion: x.x.x]
#### 4.2.3 Success
If the head unit allows the RPC service to start, it will respond with a `StartServiceACK`. At this time the version will finish its negotiation process.##### Head Unit -> Application
##### 4.2.3.1 Protocol Versions 1-4
The `StartServiceACK` will contain the module's maximum supported protocol version. The packet structure will also match that of the supplied version; if the module's maximum supported version is 1, the packet will contain an 8 byte header (version 1), otherwise it will contain a 12 byte header (version 2). The application will then find the highest version supported by both the module and the application. This will be the determined version used for this session and will be used for all other packets sent from this point forward as well as all other services.
The payload of the `StartServiceACK` will contain a hash of the service which was started on the head unit if the payload size is greater than 0. This hash should be stored by an application and is needed in the end communication flow.
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max Module Version (4)
no
Control
RPC
Start Service ACK
Assigned Session
4
2
0b0100
0b0
0b000
0x07
0x02
0x01
0x00000004
0x0000000n
##### 4.2.3.2 Protocol Versions 5 and newer
The `StartServiceACK` will contain a negotiated version between what the application provided in the `StartService` frame and what the module's maximum supported protocol version. Thus, if it is determined that no such information was sent in the `StartService` frame, the module will assume the previous method of version negotiation and send version 4 to assume it's max version supplied to the application and wait for the incoming `RegisterAppInterface` RPC from the application to finally determine the negotiated version. Either way, the determined version will be used for this session including all other packets sent from this point forward as well as all other services.
The packet structure will also match that of the supplied version; if the module's maximum supported version is 1, the packet will contain an 8 byte header (version 1), otherwise it will contain a 12 byte header (version 2). If the protocol version was determined to be 5 or higher, the payload it contains will be constructed in nature as a BSON object. The application will then find the highest version supported by both the module and the application. This will be the determined version used for this session and will be used for all other packets sent from this point forward as well as all other services.
The payload of the `StartServiceACK` will contain the agreed upon full protocol version *"Major.Minor.Patch"*, a hash of the service which was started on the head unit, and the max transport unit for that session (0x07 RPC). The hash should be stored by an application and is needed in the end communication flow. The MTU should be used as the default MTU for all other services for that session unless otherwise provided in the corresponding `StartServiceACK` for that service.
###### 4.2.3.2.1 Protocol Version Supplied in `StartService`
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max major version supported by module and application
no
Control
RPC
Start Service ACK
Assigned Session
Size of payload
2
0bNNNN
0b0
0b000
0x07
0x02
0x01
0xNNNNNNNN
0x0000000n
Payload
[protocolVersion: x.x.x, hashId: 0xNNNN, mtu: 130687]###### 4.2.3.2.2 Protocol Version Not Supplied in `StartService`
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max version application can possibly support (4)
no
Control
RPC
Start Service ACK
Assigned Session
4
2
0b0100
0b0
0b000
0x07
0x02
0x01
0x00000004
0x0000000n
##### 4.2.4 Failure
If a session has already been started, or can't be started, a `StartServiceNAK` will be sent in response to the `StartService` packet.##### Head Unit -> Application
##### 4.2.4.1 Protocol Versions 1 through 4
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max Module Version (4)
no
Control
RPC
Start Service NAK
0
0
0
0b0100
0b0
0b000
0x07
0x03
0x00
0x00000000
0x00000000
##### 4.2.4.1 Protocol Versions 5 and Newer
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max Module Version (4)
no
Control
RPC
Start Service NAK
0
Size of Payload
0
0b0100
0b0
0b000
0x07
0x03
0x00
0xNNNNNNNN
0x00000000
Payload
[rejectedParams:[protocolVersion, x, x]]##### 4.2.5 Start Service
The RPC service always needs to be started as unencrypted first, then it can be moved to an encrypted state by sending another `StartService` request containing an encryption flag set to `1` at a later point. Services of another type can be started as encrypted initially, i.e. it is not necessary to start them as unencrypted and then move to encrypted state using second `StartService` request (however such sequence of actions is also valid). See "7. Secured Communication" section for more details.
### 4.3 Registration
>Required: All Protocol VersionsEach application registers for continued communication with the head unit by sending a `RegisterAppInterface` Request RPC to the head unit via the RPC Service. Additional services can only be started after a successful `RegisterAppInterface` Response RPC has been sent from the head unit to the application.
### 4.4 Starting other services
While the RPC service is the default service that is started to establish a connection and a session, the application may wish to start other services. Similar to the process in Section 4, all services that are to be to started in a session require a `StartService` packet to be sent from the application. If the module supports and allows that service type to be started, it will respond with a `StartServiceACK` that has a payload of the hash ID for that service. If the module is unable to start that service or that application does not have access to that service, it will respond with a `StartServiceNAK`.### 4.5 Heartbeat
>**Deprecated: Protocol Versions 4 and higher**
>Required: Protocol Version 3
>Added: Protocol Version 3After a successful start service exchange between the application and head unit both the application and head unit are required to be able to respond to heartbeat messages if the negotiated protocol version is 3. After sending a heartbeat, if the application or head unit does not respond within a timeout (custom per app/head unit), the sender will disconnect. The sender's timer for the heartbeat timeout should be reset every time any message is received. Heartbeats are sent using the Control Service Type (0x00)
#### 4.5.1 Heartbeat Request
>Note: The request can originate from either the Head Unit or the Application
##### Head Unit -> Application
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
4
no
Control
Control
Heartbeat
0
0
0
0b0100
0b0
0b000
0x00
0x00
0x00
0x00000000
0x00000000
#### 4.5.2 Heartbeat ACK
>Note: The response ACK will originate from the Head Unit or the Application based on the origin of the request
##### Application -> Head Unit
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
4
no
Control
Control
Heartbeat ACK
0
0
0
0b0100
0b0
0b000
0x00
0xFF
0x00
0x00000000
0x00000000
#### 4.5.3 Heartbeat NAK
There is currently no heartbeat NAK.### 4.6 Secondary Transport
>Added: Protocol version 5.1.0
After the RPC service has been established on an initial transport, it is possible to utilize a different transport beyond the initial transport for certain services. This additional transport is called the "Secondary Transport". The initial transport used to start the RPC service is called the "Primary Transport".
#### 4.6.1 Secondary Transport Registration
The RPC `StartServiceACK` will include information on potential Secondary Transports in the parameter `secondaryTransports` if any are supported. Once received, it is possible to register the session on the Secondary Transport if connected; if the transport is not connected it will have to either wait until an update is received through the `TransportEventUpdated` frame or the physical connection is made.
Once the connection for Secondary Transport is established, if the application wishes to utilize that transport as a SecondaryTransport, the application is required to send a `RegisterSecondaryTransport` frame on that transport. The head unit will respond with either a`RegisterSecondaryTransportACK` or `RegisterSecondaryTransportNAK` frame. If the registration was successful and the application receives a `RegisterSecondaryTransportACK`, it may then utilize the Secondary Transport to start services.
##### 4.6.1.1 RegisterSecondaryTransport
##### Application -> Head Unit
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max major version supported by module and application
no
Control
Control
Register Secondary Transport
Session Id assigned on Primary Transport
0
1
0bNNNN
0b0
0b000
0x00
0x07
0xNN
0x00000000
0x00000001
##### 4.6.1.2 RegisterSecondaryTransportACK
##### Head Unit -> Application
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max major version supported by module and application
no
Control
Control
Register Secondary Transport ACK
Session Id assigned on Primary Transport
0
2
0bNNNN
0b0
0b000
0x00
0x08
0xNN
0x00000000
0x00000002
##### 4.6.1.3 RegisterSecondaryTransportNAK
##### Head Unit -> Application
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max major version supported by module and application if known, otherwise 5
no
Control
Control
Register Secondary Transport NAK
Session Id assigned on Primary Transport
0
2
0bNNNN
0b0
0b000
0x00
0x09
0xNN
0x00000000
0x00000002
#### 4.6.2 Transport Event Update
Some Secondary Transports might require additional details on how they can be established. For example, in order to establish a TCP connection between the application and head unit the IP address and port number are required. The `TransportEventUpdate` control frame is used for this purpose.
The head unit will send out a `TransportEventUpdate` frame whenever its transport configuration is changed, for example when its IP address is updated or Wi-Fi network goes down. The head unit will also send out a `TransportEventUpdate` frame right after the `StartServiceACK` frame that establishes the RPC service so the application can initiate a connection immediately.
The `TransportEventUpdate` frame must always be sent through the Primary Transport. The head unit should not send the frame to applications that don't support protocol versions 5.1.0 or newer.
##### 4.6.2.1 TransportEventUpdate
##### Head Unit -> Application
Version
E
Frame Type
Service Type
Frame Info
Session Id
Data Size
Message ID
Max major version supported by module and application
no
Control
Control
Transport Event Update
Session Id assigned on Primary Transport
Size of payload
Variable
0bNNNN
0b0
0b000
0x00
0xFD
0xNN
0xNNNNNNNN
0xNNNNNNNN
Payload
[tcpIpAddress:"x.x.x.x", tcpPort:NNNN]#### 4.6.3 Starting Services on Secondary Transports
A Secondary Transport is capable of carrying the video and audio services. Other services, including RPC and Hybrid service, must always run on the Primary Transport. (Note: Control service is an inherently started service on a transport and does not need to be established, but frames will be handled on a frame by frame basis of Primary vs Secondary Transport support)
The RPC `StartServiceACK` might include the parameters `audioServiceTransports` and `videoServiceTransports` describing which service is allowed to run on which transport priority type (Primary, Secondary or both). An application honors this information and starts the service(s) only on an allowed transport. For example, if video service is allowed only on a Secondary Transport, the application will not start video streaming until Secondary Transport is established and registered.
The transport priority types included in these parameters are listed in preferred order, for example, `[2,1]` (Secondary , Primary). In this case the priority of the Secondary Transport is higher than that of Primary Transport, the application may stop and restart service(s) when the Secondary Transport is added or removed. However, each service type must only be started and carried on a single transport at a time.
When starting a service over a Secondary Transport the application, it must follow the previous sections to establish the transport connection and register its session over that transport. At that point it runs the normal sequence described in section 4.4. When starting a service over a Secondary Transport, the session ID that was provided during the establishment of the RPC service should be used.
#### 4.6.4 Terminating Secondary Transport
There is no procedure to terminate a Secondary Transport. However, if the Primary Transport is disconnected or the RPC service is stopped, any Secondary Transport for that session should be unregistered and if no other sessions are registered over that Secondary Transport it should be disconnected.
## 5. Services
Every active session has the ability to start any of the services defined in this protocol spec as long as they have permission on the module in which they are connected. Every session can only have one of each type of service open at a time.
Messages sent have a priority based on their Service Type. Lower values for service type have higher delivery priority. A message's payload's format is based on the different service types defined below.### 5.1 Control Service
>Required: All Protocol VersionsThe control service is the lowest level service available. While Control Frame packets are used frequently, the control service itself is rarely used.
#### 5.1.1 Security Query
When establishing a secure connection, the TLS Payload is sent in a control service message with a binary query header. The size of this header is 12 bytes, similar to the RPC Payload Binary Header.
##### 5.1.1.1 Payload
The security query is able to contain JSON data as well as binary data. During the handshake the TLS handshake data is sent as binary data. See "Send Handshake Data" section for details.
In case of an error, a notification is sent with an error code and error message as JSON data. See "Send Internal Error" section for details.
Binary Query Header
JSON Data
Binary Data##### 5.1.1.2 Binary Header
Byte 1
Byte 2
Byte 3
Byte 4
Query Type
Query ID
Sequential Number
JSON Size
###### 5.1.1.2.1 Binary Header Fields
Field
Size
Description
Query Type
8 bit
0x00 Request
0x01 - 0x0F Reserved
0x10 Response
0x11 - 0x1F Reserved
0x20 Notification
0x21 - 0xFE Reserved
0xFF Invalid Query Type
Query ID
24 bit
0x000001 Send Handshake Data
0x000002 Send Internal Error
0x000003 - 0xFFFFFE Reserved
0xFFFFFF Invalid Query ID
Sequential Number
32 bit
Message ID can be set by the mobile libraries to track security messages.
The system uses the same Message ID when replying to the query allowing the mobile libraries to correlate messages.
JSON Size
32 bit
The size of the JSON data following the binary query header.
Any additional data following the JSON data in the payload is binary data.
##### 5.1.1.3 Send Handshake Data
When performing the TLS handshake, the server sends a "Send Handshake Data" request containing its handshake data to the client, and the client sends a response with its own handshake data accordingly.
###### 5.1.1.3.1 Request Payload
**Note:** Prior to SDL Core version 8.0.0, Core sent the "Notification" type (`0x20`) in this message instead of "Request" (`0x00`). Client libraries should account for this when communicating with older versions of SDL Core.
Binary Query Header
Query Type
TLS Message Type
Sequential Number
JSON Size
Request
Send Handshake Data
Any number to be used to correlate query messages
Zero
0x00
0x000001
0xNNNNNNNN
0x00000000
Binary Data: SSL Handshake Request
###### 5.1.1.3.2 Response Payload
Binary Query Header
Query Type
TLS Message Type
Sequential Number
JSON Size
Response
Send Handshake Data
Any number to be used to correlate query messages
Zero
0x10
0x000001
0xNNNNNNNN
0x00000000
Binary Data: SSL Handshake Response
#### 5.1.1.4 Send Internal Error
If an error occurs during the TLS handshake, a notification is sent with both JSON data and binary data describing the error. The JSON data contains the error code and an error text. The binary data is one single byte and only contains the error code.
The error code in JSON data and the binary data are the same value from the same code list.
##### 5.1.1.4.1 Payload
The following query header is used by the system and the application to send error messages.
Binary Query Header
Query Type
TLS Message Type
Sequential Number
JSON Size
Notification
Send Internal Error
Unused
Size of the JSON data
0x20
0x000002
0xNNNNNNNN
0xNNNNNNNN
JSON Data
Binary Data: Single Byte Error Code
##### 5.1.1.4.2 JSON structure
Key
Description
id
A decimal value representing an Error code.
text
A string describing the error.
##### 5.1.1.4.3 Error codes
Error code
Byte
Value
Description
ERROR_SUCCESS
0x000
Internal Security Manager value
ERROR_INVALID_QUERY_SIZE
0x011
Wrong size of query data
ERROR_INVALID_QUERY_ID
0x022
Unknown Query ID
ERROR_NOT_SUPPORTED
0x033
SDL does not support encryption
ERROR_SERVICE_ALREADY_PROTECTED
0x044
Received request to protect a service that was protected before
ERROR_SERVICE_NOT_PROTECTED
0x055
Received handshake or encrypted data for not protected service
ERROR_DECRYPTION_FAILED
0x066
Decryption failed
ERROR_ENCRYPTION_FAILED
0x077
Encryption failed
ERROR_SSL_INVALID_DATA
0x088
SSL invalid data
ERROR_HANDSHAKE_FAILED
0x099
In case of all other handshake errors
INVALID_CERT
0x0A10
Handshake failed because certificate is invalid
EXPIRED_CERT
0x0B11
Handshake failed because certificate is expired
ERROR_INTERNAL
0xFF255
Internal error
ERROR_UNKNOWN_INTERNAL_ERROR
0xFE254
Error value for testing
### 5.2 RPC Service
>Required: All Protocol VersionsThe RPC service is used to send requests, responses, and notifications between an application and a head unit. Valid messages are defined in the [RPC Specification](https://github.com/smartdevicelink/sdl_core/blob/master/src/components/interfaces/MOBILE_API.xml).
The payload of a message sent via the RPC service, which directly follows the Frame Header in the packet, consists of a Binary Header, and JSON data representing the RPC.
##### RPC Payload
Binary Header
JSON Data
#### 5.2.1 Binary Header
>Required: Protocol Version 2 and greater
Byte 1
Byte 2
Byte 3
Byte 4
RPC Type
RPC Function ID
Correlation ID
JSON Size
##### 5.2.1.1 Binary Header Fields
Field
Size
Description
RPC Type
4 bit
0x0 Request
0x1 Response
0x2 Notification
0x3 Erroneous Response
0x4 - 0xF Reserved
RPC Function ID
28 bit
The Function ID of each RPC is specific to each version of the RPC Specification but in general do not change from version to version.
Correlation ID
32 bits (signed)
The Correlation ID is used to map a request to its response. Requests sent in the same session with the same Correlation ID as a pending request will be rejected with an `INVALID_ID` response. Requests that use a Correlation ID less than 0 will be rejected with an `INVALID_ID` response. In Protocol Version 1, when the Binary Header did not exist, the Correlation ID was included as part of the JSON and has a max value of 65536.
JSON Size
32 bits
The size of the JSON Data following the Binary Header in the RPC Payload
### 5.3 Hybrid (Bulk Data) Service
>Required: Protocol Version 2 and greaterThe Hybrid Service does not need to be explicitly started; all applications that have successfully started the RPC Service have access to the Hybrid Service.
The Hybrid Service is similar to the RPC Service but adds a bulk data field. The payload of a message sent via the Hybrid service consists of a Binary Header, JSON Data, and Bulk Data.
The size of the Bulk Data field is the Data Size (Found in the Frame Header) minus the 12 Bytes of the Binary Header minus the JSON Size (Found in the Binary Header).
The Binary Header of a message using the Hybrid Service is the same as the Binary Header of a message using the RPC Service.
##### Hybrid Service Payload
Binary Header
JSON Data
Bulk Data
### 5.4 Audio Service (PCM)
>Available: Protocol Version 3 and greaterThe application can start the audio service to send PCM audio data to the head unit. After the `StartService` packet is sent and the ACK received, the payload for the Audio Service is only PCM audio data.
### 5.5 Video Service (H.264)
>Available: Protocol Version 3 and greaterThe application can start the video service to send H.264 video data to the head unit. After the `StartService` packet is sent and the ACK received, the payload for the Video Service is only H.264 video data.
## 6. Ending Communication
The application may request it's session to be ended outside of a transport disconnect, module power cycle, etc.
### 6.1 Completely Closing a Session and Ending All Services
To close out a communication session with the head unit, an application sends an `EndService` packet with service type 7 (RPC) to the module. The `EndService` packet payload should include the correct hash ID supplied with the `StartServiceACK`.### 6.2 Closing Specific Services
If the application doesn't want to completely stop its session, but only wishes to close a specific session it can do so using an `EndService` packet that's service type matches the service that the application is trying to close. The `EndService` packet should include the hash ID in its payload that was contained in the `StartServiceACK` for that specific service.## 7. Secured Communication
It is possible to establish a secured and encrypted communication with the system by setting the frame header encryption flag to `1` when starting a new service or by sending another `StartService` with the encryption flag set to `1` when the service is already established (this the required flow for the RPC service). If the authentication is successful, the system will reply with a `StartService ACK` frame with the encryption flag also set to `1` indicating that encrypted data is now accepted. If the authentication fails for some reason, the system will reset the TLS connection and return a `StartService NAK` frame.
Below are possible combinations of the service encryption status and RPCs protection flag value.
Service Encryption Status
RPC Type
Requires Protection
Expected SDL Behavior
Encryption is not established
Request
yes
SDL Core rejects the request with result code `ENCRYPTION_NEEDED` (please see policy updates for which RPCs need protection).
no
SDL Core continues processing the RPC request.
Notification
yes
SDL Core does not send the notification.
no
SDL Core sends the notification unencrypted.
Encryption is established
Request
yes
If unencrypted, SDL Core rejects the request with an unencrypted response and result code `ENCRYPTION_NEEDED`.
If encrypted, SDL Core continues processing the request and sends an encrypted response.
no
If unencrypted, SDL Core continues processing the request and sends an unencrypted response.
If encrypted, SDL Core continues processing the request and sends an encrypted response.
Notification
yes
SDL Core sends the notification encrypted.
no
SDL Core sends the notification unencrypted.
### 7.1 Authentication
The authentication is done using TLS handshake. The TLS handshake process is defined by TLS and is not part of the SDL protocol.
The below diagram shows the sequence of how the TLS handshake exchanges certificates to compute the master secret.
![TLS Handshake activity diagram](https://user-images.githubusercontent.com/5848997/122258220-cb8b7100-ce9e-11eb-9b2a-a6194b0d1b68.png)
Please see [SDL Overview Guides](https://smartdevicelink.com/en/guides/pull_request/sdl-overview-guides/security/protected-services/) for more details.
The system can be configured to support one encryption method. The following methods are supported:
- TLSv1
- TLSv1.1
- TLSv1.2
- DTLSv1
- SSLv3 (not supported on most newer systems)The system has to initiate with the corresponding client method. For instance, if the system is configured to use `DTLSv1`, it has to use the method `DTLSv1_client`. The application role has to be server and must use `DTLSv1_server`.
The system also supports configurable [SSL Security level](https://www.openssl.org/docs/man1.1.0/man3/SSL_CTX_get_security_level.html) introduced in OpenSSL 1.1.0. This parameter can be changed by `SecurityLevel` parameter in the Core configuration file. By default, system uses security level 1 for TLS handshakes. At this time setting the security level higher than 1 for general internet use is likely to cause considerable interoperability issues and is not recommended. This is because the SHA1 algorithm is very widely used in certificates and will be rejected at levels higher than 1 because it only offers 80 bits of security.
### 7.2 Handshake Frames
The system will initiate a TLS handshake to authenticate the application where the system's role will be the client while the application's role will be the server. The system will do this only once if the application was not authenticated before in the current transport connection. The TLS handshake data is always sent in single frames. The service type for TLS handshake is the control service.
#### 7.2.1 SDL Protocol Frame Header
The following SDL frame header is used for every frame related to TLS handshake.
SDL Protocol Frame Header
Version
E
Frame Type
Service Type
Frame Info
Session ID
Data Size
Message ID
Max major version supported
by module and application
no
Single Frame
Control Service
Single Frame Info
Assigned Session ID
Query Binary Header +
JSON Data size +
Binary Handshake Data size
Enumerated number
0xN
0b0
0b001
0x00
0x00
0xNN
0xC + 0xNNNNNNNN + 0xNNNNNNNN
0xNNNNNNNN
#### 7.2.2 Security Query Binary Header
The following query header is used by the system and the application to send TLS handshake data.
Binary Query Header
Query Type
TLS Message Type
Sequential Number
JSON Size
Request
Send Handshake Data
Any number to be used to correlate query messages
Zero
0x00
0x000001
0xNNNNNNNN
0x00000000
Binary TLS Handshake Data
### 7.3 Error handling
In case of an error, the system and the application should reset the active SSL connection of the current transport connection. This impacts already established secured service sessions as all of them will be closed. The application will need to restart all services which require protection.