blob: 34635a58eadc74de1faa32e8cdfdf49124bf1f50 [file] [log] [blame]
/******************************************************************************
*
* Copyright (C) 2009-2013 Broadcom Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
#include <hardware/bluetooth.h>
#include <hardware/bt_gatt.h>
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#define LOG_TAG "BtGatt.btif"
#include "bta_api.h"
#include "bta_gatt_api.h"
#include "bd.h"
#include "btif_storage.h"
#include "btif_common.h"
#include "btif_dm.h"
#include "btif_util.h"
#include "btif_gatt.h"
#include "btif_gatt_util.h"
#define GATTC_READ_VALUE_TYPE_VALUE 0x0000 /* Attribute value itself */
#define GATTC_READ_VALUE_TYPE_AGG_FORMAT 0x2905 /* Characteristic Aggregate Format*/
#define BTIF_GATT_MAX_ENC_LINK_RECORDS 10
typedef struct
{
BD_ADDR bd_addr;
BOOLEAN in_use;
}__attribute__((packed)) btif_gatt_encrypted_link_t;
static char BASE_UUID[16] = {
0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
};
static btif_gatt_encrypted_link_t encrypted_links[BTIF_GATT_MAX_ENC_LINK_RECORDS];
extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
int uuidType(unsigned char* p_uuid)
{
int i = 0;
int match = 0;
int all_zero = 1;
for(i = 0; i != 16; ++i)
{
if (i == 12 || i == 13)
continue;
if (p_uuid[i] == BASE_UUID[i])
++match;
if (p_uuid[i] != 0)
all_zero = 0;
}
if (all_zero)
return 0;
if (match == 12)
return LEN_UUID_32;
if (match == 14)
return LEN_UUID_16;
return LEN_UUID_128;
}
/*******************************************************************************
* BTIF -> BTA conversion functions
*******************************************************************************/
void btif_to_bta_uuid(tBT_UUID *p_dest, bt_uuid_t *p_src)
{
char *p_byte = (char*)p_src;
int i = 0;
p_dest->len = uuidType(p_src->uu);
switch (p_dest->len)
{
case LEN_UUID_16:
p_dest->uu.uuid16 = (p_src->uu[13] << 8) + p_src->uu[12];
break;
case LEN_UUID_32:
p_dest->uu.uuid32 = (p_src->uu[13] << 8) + p_src->uu[12];
p_dest->uu.uuid32 += (p_src->uu[15] << 24) + (p_src->uu[14] << 16);
break;
case LEN_UUID_128:
for(i = 0; i != 16; ++i)
p_dest->uu.uuid128[i] = p_byte[i];
break;
default:
ALOGE("%s: Unknown UUID length %d!", __FUNCTION__, p_dest->len);
break;
}
}
void btif_to_bta_char_id(tBTA_GATT_ID *p_dest, btgatt_char_id_t *p_src)
{
p_dest->inst_id = p_src->inst_id;
btif_to_bta_uuid(&p_dest->uuid, &p_src->uuid);
}
void btif_to_bta_srvc_id(tBTA_GATT_SRVC_ID *p_dest, btgatt_srvc_id_t *p_src)
{
p_dest->id.inst_id = p_src->id.inst_id;
btif_to_bta_uuid(&p_dest->id.uuid, &p_src->id.uuid);
p_dest->is_primary = p_src->is_primary;
}
void btif_to_bta_response(tBTA_GATTS_RSP *p_dest, btgatt_response_t* p_src)
{
p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
p_dest->attr_value.handle = p_src->attr_value.handle;
p_dest->attr_value.len = p_src->attr_value.len;
p_dest->attr_value.offset = p_src->attr_value.offset;
memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN);
}
/*******************************************************************************
* BTA -> BTIF conversion functions
*******************************************************************************/
void bta_to_btif_uuid(bt_uuid_t *p_dest, tBT_UUID *p_src)
{
int i = 0;
if (p_src->len == LEN_UUID_16 || p_src->len == LEN_UUID_32)
{
for(i=0; i != 16; ++i)
p_dest->uu[i] = BASE_UUID[i];
}
switch (p_src->len)
{
case 0:
break;
case LEN_UUID_16:
p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
break;
case LEN_UUID_32:
p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
p_dest->uu[14] = (p_src->uu.uuid32 >> 16) & 0xff;
p_dest->uu[15] = (p_src->uu.uuid32 >> 24) & 0xff;
break;
case LEN_UUID_128:
for(i=0; i != 16; ++i)
p_dest->uu[i] = p_src->uu.uuid128[i];
break;
default:
ALOGE("%s: Unknown UUID length %d!", __FUNCTION__, p_src->len);
break;
}
}
void bta_to_btif_char_id(btgatt_char_id_t *p_dest, tBTA_GATT_ID *p_src)
{
p_dest->inst_id = p_src->inst_id;
bta_to_btif_uuid(&p_dest->uuid, &p_src->uuid);
}
void bta_to_btif_srvc_id(btgatt_srvc_id_t *p_dest, tBTA_GATT_SRVC_ID *p_src)
{
p_dest->id.inst_id = p_src->id.inst_id;
bta_to_btif_uuid(&p_dest->id.uuid, &p_src->id.uuid);
p_dest->is_primary = p_src->is_primary;
}
/*******************************************************************************
* Utility functions
*******************************************************************************/
uint16_t get_uuid16(tBT_UUID *p_uuid)
{
if (p_uuid->len == LEN_UUID_16)
{
return p_uuid->uu.uuid16;
}
else if (p_uuid->len == LEN_UUID_128)
{
UINT16 u16;
UINT8 *p = &p_uuid->uu.uuid128[LEN_UUID_128 - 4];
STREAM_TO_UINT16(u16, p);
return u16;
}
else /* p_uuid->len == LEN_UUID_32 */
{
return(UINT16) p_uuid->uu.uuid32;
}
}
uint16_t set_read_value(btgatt_read_params_t *p_dest, tBTA_GATTC_READ *p_src)
{
int i = 0;
uint16_t descr_type = 0;
uint16_t len = 0;
p_dest->status = p_src->status;
bta_to_btif_srvc_id(&p_dest->srvc_id, &p_src->srvc_id);
bta_to_btif_char_id(&p_dest->char_id, &p_src->char_id);
bta_to_btif_uuid(&p_dest->descr_id, &p_src->descr_type);
descr_type = get_uuid16(&p_src->descr_type);
switch (descr_type)
{
case GATT_UUID_CHAR_AGG_FORMAT:
/* not supported */
p_dest->value_type = GATTC_READ_VALUE_TYPE_AGG_FORMAT;
break;
default:
if ( p_src->status == BTA_GATT_OK )
{
ALOGI("%s unformat.len = %d ", __FUNCTION__, p_src->p_value->unformat.len);
p_dest->value.len = p_src->p_value->unformat.len;
if ( p_src->p_value->unformat.len > 0 && p_src->p_value->unformat.p_value != NULL )
{
memcpy(p_dest->value.value, p_src->p_value->unformat.p_value,
p_src->p_value->unformat.len);
}
len += p_src->p_value->unformat.len;
}
else
{
p_dest->value.len = 0;
}
p_dest->value_type = GATTC_READ_VALUE_TYPE_VALUE;
break;
}
return len;
}
/*******************************************************************************
* Encrypted link map handling
*******************************************************************************/
static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result);
static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr)
{
btif_gatt_encrypted_link_t *p_link = &encrypted_links[0];
int i;
if (bd_addr == NULL)
return FALSE;
for (i = 0; i != BTIF_GATT_MAX_ENC_LINK_RECORDS; ++i, ++p_link)
{
if (p_link->in_use && (!memcmp(p_link->bd_addr, bd_addr, BD_ADDR_LEN)))
return TRUE;
}
return FALSE;
}
static BOOLEAN btif_gatt_add_encrypted_link (BD_ADDR bd_addr)
{
btif_gatt_encrypted_link_t *p_link = &encrypted_links[0];
int i;
if (bd_addr == NULL)
return FALSE;
if (btif_gatt_is_link_encrypted(bd_addr))
return TRUE;
for (i = 0; i != BTIF_GATT_MAX_ENC_LINK_RECORDS; ++i, ++p_link)
{
if (!p_link->in_use)
{
p_link->in_use = TRUE;
memcpy( p_link->bd_addr, bd_addr, sizeof(BD_ADDR) );
return TRUE;
}
}
return FALSE;
}
void btif_gatt_remove_encrypted_link (BD_ADDR bd_addr)
{
btif_gatt_encrypted_link_t *p_link = &encrypted_links[0];
int i;
if (bd_addr == NULL)
return;
for (i = 0; i != BTIF_GATT_MAX_ENC_LINK_RECORDS; ++i, ++p_link)
{
if (p_link->in_use && (!memcmp (p_link->bd_addr, bd_addr, BD_ADDR_LEN)))
{
p_link->in_use = FALSE;
break;
}
}
}
static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_STATUS result)
{
if (result == BTA_SUCCESS)
{
btif_gatt_add_encrypted_link(bd_addr);
} else {
bt_bdaddr_t bda;
bdcpy(bda.address, bd_addr);
btif_gatt_remove_encrypted_link(bd_addr);
btif_dm_remove_bond(&bda);
}
}
void btif_gatt_check_encrypted_link (BD_ADDR bd_addr)
{
char buf[100];
bt_bdaddr_t bda;
bdcpy(bda.address, bd_addr);
if ((btif_storage_get_ble_bonding_key(&bda, BTIF_DM_LE_KEY_PENC,
buf, sizeof(btif_dm_ble_penc_keys_t)) == BT_STATUS_SUCCESS)
&& !btif_gatt_is_link_encrypted(bd_addr))
{
BTA_DmSetEncryption(bd_addr,
&btif_gatt_set_encryption_cb, BTM_BLE_SEC_ENCRYPT);
}
}