blob: 44a85230d61dc3e185a080874d97b1b84da21fe7 [file] [log] [blame]
/******************************************************************************
*
* Copyright (C) 2009-2012 Broadcom Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
/******************************************************************************
*
* this file contains GATT database building and query functions
*
******************************************************************************/
#include "bt_target.h"
#include "bt_trace.h"
#include "bt_utils.h"
#include <stdio.h>
#include <string.h>
#include "btm_int.h"
#include "gatt_int.h"
#include "l2c_api.h"
#include "osi/include/osi.h"
/*******************************************************************************
* L O C A L F U N C T I O N P R O T O T Y P E S *
******************************************************************************/
static bool allocate_svc_db_buf(tGATT_SVC_DB* p_db);
static void* allocate_attr_in_db(tGATT_SVC_DB* p_db, tBT_UUID* p_uuid,
tGATT_PERM perm);
static bool deallocate_attr_in_db(tGATT_SVC_DB* p_db, void* p_attr);
static bool copy_extra_byte_in_db(tGATT_SVC_DB* p_db, void** p_dst,
uint16_t len);
static bool gatts_db_add_service_declaration(tGATT_SVC_DB* p_db,
tBT_UUID* p_service, bool is_pri);
static tGATT_STATUS gatts_send_app_read_request(
tGATT_TCB* p_tcb, uint8_t op_code, uint16_t handle, uint16_t offset,
uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type);
/*******************************************************************************
*
* Function gatts_init_service_db
*
* Description Initialize a memory space to be a service database.
*
* Parameter p_db: database pointer.
* len: size of the memory space.
*
* Returns Status of te operation.
*
******************************************************************************/
bool gatts_init_service_db(tGATT_SVC_DB* p_db, tBT_UUID* p_service, bool is_pri,
uint16_t s_hdl, uint16_t num_handle) {
p_db->svc_buffer = fixed_queue_new(SIZE_MAX);
if (!allocate_svc_db_buf(p_db)) {
GATT_TRACE_ERROR("gatts_init_service_db failed, no resources");
return false;
}
GATT_TRACE_DEBUG("gatts_init_service_db");
GATT_TRACE_DEBUG("s_hdl = %d num_handle = %d", s_hdl, num_handle);
/* update service database information */
p_db->next_handle = s_hdl;
p_db->end_handle = s_hdl + num_handle;
return gatts_db_add_service_declaration(p_db, p_service, is_pri);
}
/*******************************************************************************
*
* Function gatts_init_service_db
*
* Description Initialize a memory space to be a service database.
*
* Parameter p_db: database pointer.
* len: size of the memory space.
*
* Returns Status of te operation.
*
******************************************************************************/
tBT_UUID* gatts_get_service_uuid(tGATT_SVC_DB* p_db) {
if (!p_db || !p_db->p_attr_list) {
GATT_TRACE_ERROR("service DB empty");
return NULL;
} else {
return &((tGATT_ATTR*)p_db->p_attr_list)->p_value->uuid;
}
}
/*******************************************************************************
*
* Function gatts_check_attr_readability
*
* Description check attribute readability
*
* Returns status of operation.
*
******************************************************************************/
static tGATT_STATUS gatts_check_attr_readability(tGATT_ATTR* p_attr,
UNUSED_ATTR uint16_t offset,
bool read_long,
tGATT_SEC_FLAG sec_flag,
uint8_t key_size) {
uint16_t min_key_size;
tGATT_PERM perm = p_attr->permission;
min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
if (min_key_size != 0) {
min_key_size += 6;
}
if (!(perm & GATT_READ_ALLOWED)) {
GATT_TRACE_ERROR("%s: GATT_READ_NOT_PERMIT", __func__);
return GATT_READ_NOT_PERMIT;
}
if ((perm & GATT_READ_AUTH_REQUIRED) &&
!(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) &&
!(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) {
GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION", __func__);
return GATT_INSUF_AUTHENTICATION;
}
if ((perm & GATT_READ_MITM_REQUIRED) &&
!(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) {
GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION: MITM Required", __func__);
return GATT_INSUF_AUTHENTICATION;
}
if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
!(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
GATT_TRACE_ERROR("%s: GATT_INSUF_ENCRYPTION", __func__);
return GATT_INSUF_ENCRYPTION;
}
if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
(sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) {
GATT_TRACE_ERROR("%s: GATT_INSUF_KEY_SIZE", __func__);
return GATT_INSUF_KEY_SIZE;
}
if (read_long && p_attr->uuid.len == LEN_UUID_16) {
switch (p_attr->uuid.uu.uuid16) {
case GATT_UUID_PRI_SERVICE:
case GATT_UUID_SEC_SERVICE:
case GATT_UUID_CHAR_DECLARE:
case GATT_UUID_INCLUDE_SERVICE:
case GATT_UUID_CHAR_EXT_PROP:
case GATT_UUID_CHAR_CLIENT_CONFIG:
case GATT_UUID_CHAR_SRVR_CONFIG:
case GATT_UUID_CHAR_PRESENT_FORMAT:
GATT_TRACE_ERROR("%s: GATT_NOT_LONG", __func__);
return GATT_NOT_LONG;
default:
break;
}
}
return GATT_SUCCESS;
}
/*******************************************************************************
*
* Function read_attr_value
*
* Description Utility function to read an attribute value.
*
* Parameter p_attr: pointer to the attribute to read.
* offset: read offset.
* p_value: output parameter to carry out the attribute value.
* p_len: output parameter to carry out the attribute length.
* read_long: this is a read blob request.
* mtu: MTU
* sec_flag: current link security status.
* key_size: encryption key size.
*
* Returns status of operation.
*
******************************************************************************/
static tGATT_STATUS read_attr_value(void* p_attr, uint16_t offset,
uint8_t** p_data, bool read_long,
uint16_t mtu, uint16_t* p_len,
tGATT_SEC_FLAG sec_flag, uint8_t key_size) {
uint16_t len = 0, uuid16 = 0;
uint8_t* p = *p_data;
tGATT_STATUS status;
tGATT_ATTR* p_attr16 = (tGATT_ATTR*)p_attr;
GATT_TRACE_DEBUG(
"read_attr_value uuid=0x%04x perm=0x%02x sec_flag=0x%x offset=%d "
"read_long=%d",
p_attr16->uuid, p_attr16->permission, sec_flag, offset, read_long);
status = gatts_check_attr_readability((tGATT_ATTR*)p_attr, offset, read_long,
sec_flag, key_size);
if (status != GATT_SUCCESS) return status;
if (p_attr16->uuid.len == LEN_UUID_16) uuid16 = p_attr16->uuid.uu.uuid16;
status = GATT_NO_RESOURCES;
if (uuid16 == GATT_UUID_PRI_SERVICE || uuid16 == GATT_UUID_SEC_SERVICE) {
len = p_attr16->p_value->uuid.len;
if (mtu >= p_attr16->p_value->uuid.len) {
gatt_build_uuid_to_stream(&p, p_attr16->p_value->uuid);
status = GATT_SUCCESS;
}
} else if (uuid16 == GATT_UUID_CHAR_DECLARE) {
len = (((tGATT_ATTR*)(p_attr16->p_next))->uuid.len == LEN_UUID_16) ? 5 : 19;
if (mtu >= len) {
UINT8_TO_STREAM(p, p_attr16->p_value->char_decl.property);
UINT16_TO_STREAM(p, p_attr16->p_value->char_decl.char_val_handle);
if (((tGATT_ATTR*)(p_attr16->p_next))->uuid.len == LEN_UUID_16) {
UINT16_TO_STREAM(p, ((tGATT_ATTR*)(p_attr16->p_next))->uuid.uu.uuid16);
}
/* convert a 32bits UUID to 128 bits */
else if (((tGATT_ATTR*)(p_attr16->p_next))->uuid.len == LEN_UUID_32) {
gatt_convert_uuid32_to_uuid128(
p, ((tGATT_ATTR*)(p_attr16->p_next))->uuid.uu.uuid32);
p += LEN_UUID_128;
} else {
ARRAY_TO_STREAM(p, ((tGATT_ATTR*)(p_attr16->p_next))->uuid.uu.uuid128,
LEN_UUID_128);
}
status = GATT_SUCCESS;
}
} else if (uuid16 == GATT_UUID_INCLUDE_SERVICE) {
if (p_attr16->p_value->incl_handle.service_type.len == LEN_UUID_16)
len = 6;
else
len = 4;
if (mtu >= len) {
UINT16_TO_STREAM(p, p_attr16->p_value->incl_handle.s_handle);
UINT16_TO_STREAM(p, p_attr16->p_value->incl_handle.e_handle);
if (p_attr16->p_value->incl_handle.service_type.len == LEN_UUID_16) {
UINT16_TO_STREAM(p,
p_attr16->p_value->incl_handle.service_type.uu.uuid16);
}
status = GATT_SUCCESS;
}
} else /* characteristic description or characteristic value */
{
status = GATT_PENDING;
}
*p_len = len;
*p_data = p;
return status;
}
/*******************************************************************************
*
* Function gatts_db_read_attr_value_by_type
*
* Description Query attribute value by attribute type.
*
* Parameter p_db: pointer to the attribute database.
* p_rsp: Read By type response data.
* s_handle: starting handle of the range we are looking for.
* e_handle: ending handle of the range we are looking for.
* type: Attribute type.
* mtu: MTU.
* sec_flag: current link security status.
* key_size: encryption key size.
*
* Returns Status of the operation.
*
******************************************************************************/
tGATT_STATUS gatts_db_read_attr_value_by_type(
tGATT_TCB* p_tcb, tGATT_SVC_DB* p_db, uint8_t op_code, BT_HDR* p_rsp,
uint16_t s_handle, uint16_t e_handle, tBT_UUID type, uint16_t* p_len,
tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id,
uint16_t* p_cur_handle) {
tGATT_STATUS status = GATT_NOT_FOUND;
tGATT_ATTR* p_attr;
uint16_t len = 0;
uint8_t* p = (uint8_t*)(p_rsp + 1) + p_rsp->len + L2CAP_MIN_OFFSET;
tBT_UUID attr_uuid;
if (p_db && p_db->p_attr_list) {
p_attr = (tGATT_ATTR*)p_db->p_attr_list;
while (p_attr && p_attr->handle <= e_handle) {
attr_uuid = p_attr->uuid;
if (p_attr->handle >= s_handle && gatt_uuid_compare(type, attr_uuid)) {
if (*p_len <= 2) {
status = GATT_NO_RESOURCES;
break;
}
UINT16_TO_STREAM(p, p_attr->handle);
status =
read_attr_value((void*)p_attr, 0, &p, false, (uint16_t)(*p_len - 2),
&len, sec_flag, key_size);
if (status == GATT_PENDING) {
status = gatts_send_app_read_request(p_tcb, op_code, p_attr->handle,
0, trans_id, p_attr->gatt_type);
/* one callback at a time */
break;
} else if (status == GATT_SUCCESS) {
if (p_rsp->offset == 0) p_rsp->offset = len + 2;
if (p_rsp->offset == len + 2) {
p_rsp->len += (len + 2);
*p_len -= (len + 2);
} else {
GATT_TRACE_ERROR("format mismatch");
status = GATT_NO_RESOURCES;
break;
}
} else {
*p_cur_handle = p_attr->handle;
break;
}
}
p_attr = (tGATT_ATTR*)p_attr->p_next;
}
}
#if (BLE_DELAY_REQUEST_ENC == TRUE)
uint8_t flag = 0;
if (BTM_GetSecurityFlags(p_tcb->peer_bda, &flag)) {
if ((p_tcb->att_lcid == L2CAP_ATT_CID) && (status == GATT_PENDING) &&
(type.uu.uuid16 == GATT_UUID_GAP_DEVICE_NAME)) {
if ((flag & (BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_FLAG_ENCRYPTED)) ==
BTM_SEC_LINK_KEY_KNOWN) {
tACL_CONN* p = btm_bda_to_acl(p_tcb->peer_bda, BT_TRANSPORT_LE);
if ((p != NULL) && (p->link_role == BTM_ROLE_MASTER))
btm_ble_set_encryption(p_tcb->peer_bda, BTM_BLE_SEC_ENCRYPT,
p->link_role);
}
}
}
#endif
return status;
}
/*******************************************************************************
*
* Function gatts_add_included_service
*
* Description This function adds an included service into a database.
*
* Parameter p_db: database pointer.
* inc_srvc_type: included service type.
*
* Returns Status of the operation.
*
******************************************************************************/
uint16_t gatts_add_included_service(tGATT_SVC_DB* p_db, uint16_t s_handle,
uint16_t e_handle, tBT_UUID service) {
tGATT_ATTR* p_attr;
tBT_UUID uuid = {LEN_UUID_16, {GATT_UUID_INCLUDE_SERVICE}};
GATT_TRACE_DEBUG(
"gatts_add_included_service: s_hdl = 0x%04x e_hdl = 0x%04x uuid = 0x%04x",
s_handle, e_handle, service.uu.uuid16);
if (service.len == 0 || s_handle == 0 || e_handle == 0) {
GATT_TRACE_ERROR("gatts_add_included_service Illegal Params.");
return 0;
}
p_attr = (tGATT_ATTR*)allocate_attr_in_db(p_db, &uuid, GATT_PERM_READ);
if (p_attr != NULL) {
if (copy_extra_byte_in_db(p_db, (void**)&p_attr->p_value,
sizeof(tGATT_INCL_SRVC))) {
p_attr->p_value->incl_handle.s_handle = s_handle;
p_attr->p_value->incl_handle.e_handle = e_handle;
memcpy(&p_attr->p_value->incl_handle.service_type, &service,
sizeof(tBT_UUID));
return p_attr->handle;
} else {
deallocate_attr_in_db(p_db, p_attr);
}
}
return 0;
}
/*******************************************************************************
*
* Function gatts_add_characteristic
*
* Description This function add a characteristics and its descriptor into
* a servce identified by the service database pointer.
*
* Parameter p_db: database pointer.
* perm: permission (authentication and key size requirements)
* property: property of the characteristic.
* p_char: characteristic value information.
*
* Returns Status of te operation.
*
******************************************************************************/
uint16_t gatts_add_characteristic(tGATT_SVC_DB* p_db, tGATT_PERM perm,
tGATT_CHAR_PROP property,
tBT_UUID* p_char_uuid) {
tGATT_ATTR *p_char_decl, *p_char_val;
tBT_UUID uuid = {LEN_UUID_16, {GATT_UUID_CHAR_DECLARE}};
GATT_TRACE_DEBUG("%s: perm=0x%0x property=0x%0x", __func__, perm, property);
p_char_decl = (tGATT_ATTR*)allocate_attr_in_db(p_db, &uuid, GATT_PERM_READ);
if (p_char_decl != NULL) {
if (!copy_extra_byte_in_db(p_db, (void**)&p_char_decl->p_value,
sizeof(tGATT_CHAR_DECL))) {
deallocate_attr_in_db(p_db, p_char_decl);
return 0;
}
p_char_val = (tGATT_ATTR*)allocate_attr_in_db(p_db, p_char_uuid, perm);
if (p_char_val == NULL) {
deallocate_attr_in_db(p_db, p_char_decl);
return 0;
}
p_char_decl->p_value->char_decl.property = property;
p_char_decl->p_value->char_decl.char_val_handle = p_char_val->handle;
p_char_val->gatt_type = BTGATT_DB_CHARACTERISTIC;
p_char_val->p_value = NULL;
return p_char_val->handle;
}
return 0;
}
/*******************************************************************************
*
* Function gatt_convertchar_descr_type
*
* Description Convert a char descript UUID into descriptor type.
*
* Returns descriptor type.
*
******************************************************************************/
uint8_t gatt_convertchar_descr_type(tBT_UUID* p_descr_uuid) {
tBT_UUID std_descr = {LEN_UUID_16, {GATT_UUID_CHAR_EXT_PROP}};
if (gatt_uuid_compare(std_descr, *p_descr_uuid))
return GATT_DESCR_EXT_DSCPTOR;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid))
return GATT_DESCR_USER_DSCPTOR;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid)) return GATT_DESCR_CLT_CONFIG;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid)) return GATT_DESCR_SVR_CONFIG;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid))
return GATT_DESCR_PRES_FORMAT;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid))
return GATT_DESCR_AGGR_FORMAT;
std_descr.uu.uuid16++;
if (gatt_uuid_compare(std_descr, *p_descr_uuid))
return GATT_DESCR_VALID_RANGE;
return GATT_DESCR_UNKNOWN;
}
/*******************************************************************************
*
* Function gatts_add_char_descr
*
* Description This function add a characteristics descriptor.
*
* Parameter p_db: database pointer.
* perm: characteristic descriptor permission type.
* char_dscp_tpye: the characteristic descriptor masks.
* p_dscp_params: characteristic descriptors values.
*
* Returns Status of the operation.
*
******************************************************************************/
uint16_t gatts_add_char_descr(tGATT_SVC_DB* p_db, tGATT_PERM perm,
tBT_UUID* p_descr_uuid) {
tGATT_ATTR* p_char_dscptr;
GATT_TRACE_DEBUG("gatts_add_char_descr uuid=0x%04x", p_descr_uuid->uu.uuid16);
/* Add characteristic descriptors */
p_char_dscptr = (tGATT_ATTR*)allocate_attr_in_db(p_db, p_descr_uuid, perm);
if (p_char_dscptr == NULL) {
GATT_TRACE_DEBUG("gatts_add_char_descr Fail for adding char descriptors.");
return 0;
} else {
p_char_dscptr->gatt_type = BTGATT_DB_DESCRIPTOR;
return p_char_dscptr->handle;
}
}
/******************************************************************************/
/* Service Attribute Database Query Utility Functions */
/******************************************************************************/
/*******************************************************************************
*
* Function gatts_read_attr_value_by_handle
*
* Description Query attribute value by attribute handle.
*
* Parameter p_db: pointer to the attribute database.
* handle: Attribute handle to read.
* offset: Read offset.
* p_value: output parameter to carry out the attribute value.
* p_len: output parameter as attribute length read.
* read_long: this is a read blob request.
* mtu: MTU.
* sec_flag: current link security status.
* key_size: encryption key size
*
* Returns Status of operation.
*
******************************************************************************/
tGATT_STATUS gatts_read_attr_value_by_handle(
tGATT_TCB* p_tcb, tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle,
uint16_t offset, uint8_t* p_value, uint16_t* p_len, uint16_t mtu,
tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) {
tGATT_STATUS status = GATT_NOT_FOUND;
tGATT_ATTR* p_attr;
uint8_t* pp = p_value;
if (p_db && p_db->p_attr_list) {
p_attr = (tGATT_ATTR*)p_db->p_attr_list;
while (p_attr && handle >= p_attr->handle) {
if (p_attr->handle == handle) {
status = read_attr_value(p_attr, offset, &pp,
(bool)(op_code == GATT_REQ_READ_BLOB), mtu,
p_len, sec_flag, key_size);
if (status == GATT_PENDING) {
status =
gatts_send_app_read_request(p_tcb, op_code, p_attr->handle,
offset, trans_id, p_attr->gatt_type);
}
break;
}
p_attr = (tGATT_ATTR*)p_attr->p_next;
}
}
return status;
}
/*******************************************************************************
*
* Function gatts_read_attr_perm_check
*
* Description Check attribute readability.
*
* Parameter p_db: pointer to the attribute database.
* handle: Attribute handle to read.
* offset: Read offset.
* p_value: output parameter to carry out the attribute value.
* p_len: output parameter as attribute length read.
* read_long: this is a read blob request.
* mtu: MTU.
* sec_flag: current link security status.
* key_size: encryption key size
*
* Returns Status of operation.
*
******************************************************************************/
tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB* p_db, bool is_long,
uint16_t handle,
tGATT_SEC_FLAG sec_flag,
uint8_t key_size) {
tGATT_STATUS status = GATT_NOT_FOUND;
tGATT_ATTR* p_attr;
if (p_db && p_db->p_attr_list) {
p_attr = (tGATT_ATTR*)p_db->p_attr_list;
while (p_attr && handle >= p_attr->handle) {
if (p_attr->handle == handle) {
status = gatts_check_attr_readability(p_attr, 0, is_long, sec_flag,
key_size);
break;
}
p_attr = (tGATT_ATTR*)p_attr->p_next;
}
}
return status;
}
/*******************************************************************************
*
* Function gatts_write_attr_perm_check
*
* Description Write attribute value into database.
*
* Parameter p_db: pointer to the attribute database.
* op_code:op code of this write.
* handle: handle of the attribute to write.
* offset: Write offset if write op code is write blob.
* p_data: Attribute value to write.
* len: attribute data length.
* sec_flag: current link security status.
* key_size: encryption key size
*
* Returns Status of the operation.
*
******************************************************************************/
tGATT_STATUS gatts_write_attr_perm_check(tGATT_SVC_DB* p_db, uint8_t op_code,
uint16_t handle, uint16_t offset,
uint8_t* p_data, uint16_t len,
tGATT_SEC_FLAG sec_flag,
uint8_t key_size) {
tGATT_STATUS status = GATT_NOT_FOUND;
tGATT_ATTR* p_attr;
uint16_t max_size = 0;
tGATT_PERM perm;
uint16_t min_key_size;
GATT_TRACE_DEBUG(
"%s: op_code=0x%0x handle=0x%04x offset=%d len=%d sec_flag=0x%0x "
"key_size=%d",
__func__, op_code, handle, offset, len, sec_flag, key_size);
if (p_db != NULL) {
p_attr = (tGATT_ATTR*)p_db->p_attr_list;
while (p_attr != NULL) {
if (p_attr->handle == handle) {
perm = p_attr->permission;
min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
if (min_key_size != 0) {
min_key_size += 6;
}
GATT_TRACE_DEBUG("%s: p_attr->permission =0x%04x min_key_size==0x%04x",
__func__, p_attr->permission, min_key_size);
if ((op_code == GATT_CMD_WRITE || op_code == GATT_REQ_WRITE) &&
(perm & GATT_WRITE_SIGNED_PERM)) {
/* use the rules for the mixed security see section 10.2.3*/
/* use security mode 1 level 2 when the following condition follows */
/* LE security mode 2 level 1 and LE security mode 1 level 2 */
if ((perm & GATT_PERM_WRITE_SIGNED) &&
(perm & GATT_PERM_WRITE_ENCRYPTED)) {
perm = GATT_PERM_WRITE_ENCRYPTED;
}
/* use security mode 1 level 3 when the following condition follows */
/* LE security mode 2 level 2 and security mode 1 and LE */
else if (((perm & GATT_PERM_WRITE_SIGNED_MITM) &&
(perm & GATT_PERM_WRITE_ENCRYPTED)) ||
/* LE security mode 2 and security mode 1 level 3 */
((perm & GATT_WRITE_SIGNED_PERM) &&
(perm & GATT_PERM_WRITE_ENC_MITM))) {
perm = GATT_PERM_WRITE_ENC_MITM;
}
}
if ((op_code == GATT_SIGN_CMD_WRITE) &&
!(perm & GATT_WRITE_SIGNED_PERM)) {
status = GATT_WRITE_NOT_PERMIT;
GATT_TRACE_DEBUG("%s: sign cmd write not allowed", __func__);
}
if ((op_code == GATT_SIGN_CMD_WRITE) &&
(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
status = GATT_INVALID_PDU;
GATT_TRACE_ERROR("%s: Error!! sign cmd write sent on a encypted link",
__func__);
} else if (!(perm & GATT_WRITE_ALLOWED)) {
status = GATT_WRITE_NOT_PERMIT;
GATT_TRACE_ERROR("%s: GATT_WRITE_NOT_PERMIT", __func__);
}
/* require authentication, but not been authenticated */
else if ((perm & GATT_WRITE_AUTH_REQUIRED) &&
!(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED)) {
status = GATT_INSUF_AUTHENTICATION;
GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION", __func__);
} else if ((perm & GATT_WRITE_MITM_REQUIRED) &&
!(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) {
status = GATT_INSUF_AUTHENTICATION;
GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION: MITM required",
__func__);
} else if ((perm & GATT_WRITE_ENCRYPTED_PERM) &&
!(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
status = GATT_INSUF_ENCRYPTION;
GATT_TRACE_ERROR("%s: GATT_INSUF_ENCRYPTION", __func__);
} else if ((perm & GATT_WRITE_ENCRYPTED_PERM) &&
(sec_flag & GATT_SEC_FLAG_ENCRYPTED) &&
(key_size < min_key_size)) {
status = GATT_INSUF_KEY_SIZE;
GATT_TRACE_ERROR("%s: GATT_INSUF_KEY_SIZE", __func__);
}
/* LE security mode 2 attribute */
else if (perm & GATT_WRITE_SIGNED_PERM &&
op_code != GATT_SIGN_CMD_WRITE &&
!(sec_flag & GATT_SEC_FLAG_ENCRYPTED) &&
(perm & GATT_WRITE_ALLOWED) == 0) {
status = GATT_INSUF_AUTHENTICATION;
GATT_TRACE_ERROR(
"%s: GATT_INSUF_AUTHENTICATION: LE security mode 2 required",
__func__);
} else /* writable: must be char value declaration or char descritpors
*/
{
if (p_attr->uuid.len == LEN_UUID_16) {
switch (p_attr->uuid.uu.uuid16) {
case GATT_UUID_CHAR_PRESENT_FORMAT: /* should be readable only */
case GATT_UUID_CHAR_EXT_PROP: /* should be readable only */
case GATT_UUID_CHAR_AGG_FORMAT: /* should be readable only */
case GATT_UUID_CHAR_VALID_RANGE:
status = GATT_WRITE_NOT_PERMIT;
break;
case GATT_UUID_CHAR_CLIENT_CONFIG:
/* fall through */
case GATT_UUID_CHAR_SRVR_CONFIG:
max_size = 2;
/* fall through */
case GATT_UUID_CHAR_DESCRIPTION:
default: /* any other must be character value declaration */
status = GATT_SUCCESS;
break;
}
} else if (p_attr->uuid.len == LEN_UUID_128 ||
p_attr->uuid.len == LEN_UUID_32) {
status = GATT_SUCCESS;
} else {
status = GATT_INVALID_PDU;
}
if (p_data == NULL && len > 0) {
status = GATT_INVALID_PDU;
}
/* these attribute does not allow write blob */
else if ((p_attr->uuid.len == LEN_UUID_16) &&
(p_attr->uuid.uu.uuid16 == GATT_UUID_CHAR_CLIENT_CONFIG ||
p_attr->uuid.uu.uuid16 == GATT_UUID_CHAR_SRVR_CONFIG)) {
if (op_code == GATT_REQ_PREPARE_WRITE &&
offset != 0) /* does not allow write blob */
{
status = GATT_NOT_LONG;
GATT_TRACE_ERROR("%s: GATT_NOT_LONG", __func__);
} else if (len !=
max_size) /* data does not match the required format */
{
status = GATT_INVALID_ATTR_LEN;
GATT_TRACE_ERROR("%s: GATT_INVALID_PDU", __func__);
} else {
status = GATT_SUCCESS;
}
}
}
break;
} else
p_attr = (tGATT_ATTR*)p_attr->p_next;
}
}
return status;
}
static void uuid_to_str(const tBT_UUID bt_uuid, char* str_buf, size_t buf_len) {
if (bt_uuid.len == LEN_UUID_16) {
snprintf(str_buf, buf_len, "0x%04x", bt_uuid.uu.uuid16);
} else if (bt_uuid.len == LEN_UUID_32) {
snprintf(str_buf, buf_len, "0x%08x", bt_uuid.uu.uuid32);
} else if (bt_uuid.len == LEN_UUID_128) {
int x = snprintf(str_buf, buf_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-",
bt_uuid.uu.uuid128[15], bt_uuid.uu.uuid128[14],
bt_uuid.uu.uuid128[13], bt_uuid.uu.uuid128[12],
bt_uuid.uu.uuid128[11], bt_uuid.uu.uuid128[10],
bt_uuid.uu.uuid128[9], bt_uuid.uu.uuid128[8]);
snprintf(&str_buf[x], buf_len - x, "%02x%02x-%02x%02x%02x%02x%02x%02x",
bt_uuid.uu.uuid128[7], bt_uuid.uu.uuid128[6],
bt_uuid.uu.uuid128[5], bt_uuid.uu.uuid128[4],
bt_uuid.uu.uuid128[3], bt_uuid.uu.uuid128[2],
bt_uuid.uu.uuid128[1], bt_uuid.uu.uuid128[0]);
} else
snprintf(str_buf, buf_len, "Unknown (len=%d)", bt_uuid.len);
}
/*******************************************************************************
*
* Function allocate_attr_in_db
*
* Description Allocate a memory space for a new attribute, and link this
* attribute into the database attribute list.
*
*
* Parameter p_db : database pointer.
* p_uuid: pointer to attribute UUID
* service : type of attribute to be added.
*
* Returns pointer to the newly allocated attribute.
*
******************************************************************************/
static void* allocate_attr_in_db(tGATT_SVC_DB* p_db, tBT_UUID* p_uuid,
tGATT_PERM perm) {
if (p_uuid == NULL) {
GATT_TRACE_ERROR("illegal UUID");
return NULL;
}
if (p_db->end_handle <= p_db->next_handle) {
GATT_TRACE_DEBUG("handle space full. handle_max = %d next_handle = %d",
p_db->end_handle, p_db->next_handle);
return NULL;
}
uint16_t len = sizeof(tGATT_ATTR);
if (p_db->mem_free < len) {
if (!allocate_svc_db_buf(p_db)) {
GATT_TRACE_ERROR("allocate_attr_in_db failed, no resources");
return NULL;
}
}
memset(p_db->p_free_mem, 0, len);
tGATT_ATTR* p_attr = (tGATT_ATTR*)p_db->p_free_mem;
p_db->p_free_mem += len;
p_db->mem_free -= len;
p_attr->handle = p_db->next_handle++;
p_attr->uuid = *p_uuid;
p_attr->permission = perm;
p_attr->p_next = NULL;
/* link the attribute record into the end of DB */
if (p_db->p_attr_list == NULL)
p_db->p_attr_list = p_attr;
else {
tGATT_ATTR* p_last = (tGATT_ATTR*)p_db->p_attr_list;
while (p_last != NULL && p_last->p_next != NULL)
p_last = (tGATT_ATTR*)p_last->p_next;
p_last->p_next = p_attr;
}
char uuid_str[37];
uuid_to_str(p_attr->uuid, uuid_str, sizeof(uuid_str));
GATT_TRACE_ERROR("=====> handle = [0x%04x] uuid = [%s] perm=0x%02x ",
p_attr->handle, uuid_str, p_attr->permission);
return (void*)p_attr;
}
/*******************************************************************************
*
* Function deallocate_attr_in_db
*
* Description Free an attribute within the database.
*
* Parameter p_db: database pointer.
* p_attr: pointer to the attribute record to be freed.
*
* Returns bool : success
*
******************************************************************************/
static bool deallocate_attr_in_db(tGATT_SVC_DB* p_db, void* p_attr) {
tGATT_ATTR *p_cur, *p_next;
bool found = false;
if (p_db->p_attr_list == NULL) return found;
p_cur = (tGATT_ATTR*)p_db->p_attr_list;
p_next = (tGATT_ATTR*)p_cur->p_next;
for (; p_cur != NULL && p_next != NULL;
p_cur = p_next, p_next = (tGATT_ATTR*)p_next->p_next) {
if (p_next == p_attr) {
p_cur->p_next = p_next->p_next;
found = true;
}
}
if (p_cur == p_attr && p_cur == p_db->p_attr_list) {
p_db->p_attr_list = p_cur->p_next;
found = true;
}
/* else attr not found */
if (found) p_db->next_handle--;
return found;
}
/*******************************************************************************
*
* Function copy_extra_byte_in_db
*
* Description Utility function to allocate extra bytes memory in DB and
* copy the value from a source place.
*
*
* Parameter p_db: database pointer.
* p_dst: destination data pointer.
* p_src: source data pointer.
* len: data length to be copied.
*
* Returns None.
*
******************************************************************************/
static bool copy_extra_byte_in_db(tGATT_SVC_DB* p_db, void** p_dst,
uint16_t len) {
uint8_t* p = (uint8_t*)*p_dst;
if (p_db->mem_free < len) {
if (!allocate_svc_db_buf(p_db)) {
GATT_TRACE_ERROR("copy_extra_byte_in_db failed, no resources");
return false;
}
}
p = p_db->p_free_mem;
p_db->p_free_mem += len;
p_db->mem_free -= len;
memset((void*)p, 0, len);
*p_dst = (void*)p;
return true;
}
/*******************************************************************************
*
* Function allocate_svc_db_buf
*
* Description Utility function to allocate extra buffer for service
* database.
*
* Returns true if allocation succeed, otherwise false.
*
******************************************************************************/
static bool allocate_svc_db_buf(tGATT_SVC_DB* p_db) {
BT_HDR* p_buf = (BT_HDR*)osi_calloc(GATT_DB_BUF_SIZE);
GATT_TRACE_DEBUG("%s allocating extra buffer", __func__);
p_db->p_free_mem = (uint8_t*)p_buf;
p_db->mem_free = GATT_DB_BUF_SIZE;
fixed_queue_enqueue(p_db->svc_buffer, p_buf);
return true;
}
/*******************************************************************************
*
* Function gatts_send_app_read_request
*
* Description Send application read request callback
*
* Returns status of operation.
*
******************************************************************************/
static tGATT_STATUS gatts_send_app_read_request(
tGATT_TCB* p_tcb, uint8_t op_code, uint16_t handle, uint16_t offset,
uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type) {
tGATTS_DATA sr_data;
uint8_t i_rcb;
tGATT_SR_REG* p_sreg;
uint16_t conn_id;
i_rcb = gatt_sr_find_i_rcb_by_handle(handle);
p_sreg = &gatt_cb.sr_reg[i_rcb];
conn_id = GATT_CREATE_CONN_ID(p_tcb->tcb_idx, p_sreg->gatt_if);
if (trans_id == 0) {
trans_id = gatt_sr_enqueue_cmd(p_tcb, op_code, handle);
gatt_sr_update_cback_cnt(p_tcb, p_sreg->gatt_if, true, true);
}
if (trans_id != 0) {
memset(&sr_data, 0, sizeof(tGATTS_DATA));
sr_data.read_req.handle = handle;
sr_data.read_req.is_long = (bool)(op_code == GATT_REQ_READ_BLOB);
sr_data.read_req.offset = offset;
uint8_t opcode;
if (gatt_type == BTGATT_DB_DESCRIPTOR) {
opcode = GATTS_REQ_TYPE_READ_DESCRIPTOR;
} else if (gatt_type == BTGATT_DB_CHARACTERISTIC) {
opcode = GATTS_REQ_TYPE_READ_CHARACTERISTIC;
} else {
GATT_TRACE_ERROR(
"%s: Attempt to read attribute that's not tied with"
" characteristic or descriptor value.",
__func__);
return GATT_ERROR;
}
gatt_sr_send_req_callback(conn_id, trans_id, opcode, &sr_data);
return (tGATT_STATUS)GATT_PENDING;
} else
return (tGATT_STATUS)GATT_BUSY; /* max pending command, application error */
}
/*******************************************************************************
*
* Function gatts_db_add_service_declaration
*
* Description Update a service database service declaration record.
*
* Parameter p_db: database pointer.
* service: UUID of the service.
*
* Returns void
*
******************************************************************************/
static bool gatts_db_add_service_declaration(tGATT_SVC_DB* p_db,
tBT_UUID* p_service, bool is_pri) {
tGATT_ATTR* p_attr;
tBT_UUID uuid = {LEN_UUID_16, {0}};
bool rt = false;
GATT_TRACE_DEBUG("add_service_declaration");
if (is_pri)
uuid.uu.uuid16 = GATT_UUID_PRI_SERVICE;
else
uuid.uu.uuid16 = GATT_UUID_SEC_SERVICE;
/* add service declration record */
p_attr = (tGATT_ATTR*)(allocate_attr_in_db(p_db, &uuid, GATT_PERM_READ));
if (p_attr != NULL) {
if (copy_extra_byte_in_db(p_db, (void**)&p_attr->p_value,
sizeof(tBT_UUID))) {
if (p_service->len == LEN_UUID_16) {
p_attr->p_value->uuid.len = LEN_UUID_16;
p_attr->p_value->uuid.uu.uuid16 = p_service->uu.uuid16;
} else if (p_service->len == LEN_UUID_32) {
p_attr->p_value->uuid.len = LEN_UUID_128;
gatt_convert_uuid32_to_uuid128(p_attr->p_value->uuid.uu.uuid128,
p_service->uu.uuid32);
} else {
p_attr->p_value->uuid.len = LEN_UUID_128;
memcpy(p_attr->p_value->uuid.uu.uuid128, p_service->uu.uuid128,
LEN_UUID_128);
}
rt = true;
}
}
return rt;
}