| /****************************************************************************** |
| * |
| * Copyright (C) 2009-2013 Broadcom Corporation |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| ******************************************************************************/ |
| |
| #define LOG_TAG "bt_btif_gatt" |
| |
| #include "btif_gatt_util.h" |
| |
| #include <errno.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| |
| #include <hardware/bluetooth.h> |
| #include <hardware/bt_gatt.h> |
| |
| #include "bt_common.h" |
| #include "bta_api.h" |
| #include "bta_gatt_api.h" |
| #include "bta_jv_api.h" |
| #include "btif_common.h" |
| #include "btif_config.h" |
| #include "btif_dm.h" |
| #include "btif_gatt.h" |
| #include "btif_storage.h" |
| #include "btif_util.h" |
| #include "osi/include/osi.h" |
| |
| #define GATTC_READ_VALUE_TYPE_VALUE 0x0000 /* Attribute value itself */ |
| #define GATTC_READ_VALUE_TYPE_AGG_FORMAT \ |
| 0x2905 /* Characteristic Aggregate Format*/ |
| |
| static unsigned char BASE_UUID[16] = {0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, |
| 0x00, 0x80, 0x00, 0x10, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00}; |
| |
| int uuidType(const unsigned char* p_uuid) { |
| int i = 0; |
| int match = 0; |
| int all_zero = 1; |
| |
| for (i = 0; i != 16; ++i) { |
| if (i == 12 || i == 13) continue; |
| |
| if (p_uuid[i] == BASE_UUID[i]) ++match; |
| |
| if (p_uuid[i] != 0) all_zero = 0; |
| } |
| if (all_zero) return 0; |
| if (match == 12) return LEN_UUID_32; |
| if (match == 14) return LEN_UUID_16; |
| return LEN_UUID_128; |
| } |
| |
| /******************************************************************************* |
| * BTIF -> BTA conversion functions |
| ******************************************************************************/ |
| |
| void btif_to_bta_uuid(tBT_UUID* p_dest, const bt_uuid_t* p_src) { |
| char* p_byte = (char*)p_src; |
| int i = 0; |
| |
| p_dest->len = uuidType(p_src->uu); |
| |
| switch (p_dest->len) { |
| case LEN_UUID_16: |
| p_dest->uu.uuid16 = (p_src->uu[13] << 8) + p_src->uu[12]; |
| break; |
| |
| case LEN_UUID_32: |
| p_dest->uu.uuid32 = (p_src->uu[13] << 8) + p_src->uu[12]; |
| p_dest->uu.uuid32 += (p_src->uu[15] << 24) + (p_src->uu[14] << 16); |
| break; |
| |
| case LEN_UUID_128: |
| for (i = 0; i != 16; ++i) p_dest->uu.uuid128[i] = p_byte[i]; |
| break; |
| |
| default: |
| LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __func__, p_dest->len); |
| break; |
| } |
| } |
| |
| void btif_to_bta_response(tBTA_GATTS_RSP* p_dest, btgatt_response_t* p_src) { |
| p_dest->attr_value.auth_req = p_src->attr_value.auth_req; |
| p_dest->attr_value.handle = p_src->attr_value.handle; |
| p_dest->attr_value.len = p_src->attr_value.len; |
| p_dest->attr_value.offset = p_src->attr_value.offset; |
| memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN); |
| } |
| |
| void btif_to_bta_uuid_mask(tBTM_BLE_PF_COND_MASK* p_mask, |
| const bt_uuid_t* uuid_mask, |
| const bt_uuid_t* svc_uuid) { |
| char* p_byte = (char*)uuid_mask; |
| int uuid_len = uuidType(svc_uuid->uu); |
| int i = 0; |
| |
| switch (uuid_len) { |
| case LEN_UUID_16: |
| p_mask->uuid16_mask = (uuid_mask->uu[13] << 8) + uuid_mask->uu[12]; |
| break; |
| |
| case LEN_UUID_32: |
| p_mask->uuid32_mask = (uuid_mask->uu[13] << 8) + uuid_mask->uu[12]; |
| p_mask->uuid32_mask += |
| (uuid_mask->uu[15] << 24) + (uuid_mask->uu[14] << 16); |
| break; |
| |
| case LEN_UUID_128: |
| for (i = 0; i != 16; ++i) p_mask->uuid128_mask[i] = p_byte[i]; |
| break; |
| |
| default: |
| break; |
| } |
| } |
| |
| /******************************************************************************* |
| * BTA -> BTIF conversion functions |
| ******************************************************************************/ |
| |
| void bta_to_btif_uuid(bt_uuid_t* p_dest, tBT_UUID* p_src) { |
| int i = 0; |
| |
| if (p_src->len == LEN_UUID_16 || p_src->len == LEN_UUID_32) { |
| for (i = 0; i != 16; ++i) p_dest->uu[i] = BASE_UUID[i]; |
| } |
| |
| switch (p_src->len) { |
| case 0: |
| break; |
| |
| case LEN_UUID_16: |
| p_dest->uu[12] = p_src->uu.uuid16 & 0xff; |
| p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff; |
| break; |
| |
| case LEN_UUID_32: |
| p_dest->uu[12] = p_src->uu.uuid16 & 0xff; |
| p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff; |
| p_dest->uu[14] = (p_src->uu.uuid32 >> 16) & 0xff; |
| p_dest->uu[15] = (p_src->uu.uuid32 >> 24) & 0xff; |
| break; |
| |
| case LEN_UUID_128: |
| for (i = 0; i != 16; ++i) p_dest->uu[i] = p_src->uu.uuid128[i]; |
| break; |
| |
| default: |
| LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __func__, p_src->len); |
| break; |
| } |
| } |
| |
| /******************************************************************************* |
| * Utility functions |
| ******************************************************************************/ |
| |
| uint16_t get_uuid16(tBT_UUID* p_uuid) { |
| if (p_uuid->len == LEN_UUID_16) { |
| return p_uuid->uu.uuid16; |
| } else if (p_uuid->len == LEN_UUID_128) { |
| uint16_t u16; |
| uint8_t* p = &p_uuid->uu.uuid128[LEN_UUID_128 - 4]; |
| STREAM_TO_UINT16(u16, p); |
| return u16; |
| } else /* p_uuid->len == LEN_UUID_32 */ |
| { |
| return (uint16_t)p_uuid->uu.uuid32; |
| } |
| } |
| |
| uint16_t set_read_value(btgatt_read_params_t* p_dest, tBTA_GATTC_READ* p_src) { |
| uint16_t len = 0; |
| |
| p_dest->status = p_src->status; |
| p_dest->handle = p_src->handle; |
| |
| if ((p_src->status == BTA_GATT_OK) && (p_src->len != 0)) { |
| LOG_INFO(LOG_TAG, "%s len = %d ", __func__, p_src->len); |
| p_dest->value.len = p_src->len; |
| memcpy(p_dest->value.value, p_src->value, p_src->len); |
| |
| len += p_src->len; |
| } else { |
| p_dest->value.len = 0; |
| } |
| |
| p_dest->value_type = GATTC_READ_VALUE_TYPE_VALUE; |
| return len; |
| } |
| |
| /******************************************************************************* |
| * Encrypted link map handling |
| ******************************************************************************/ |
| |
| #if (BLE_DELAY_REQUEST_ENC == FALSE) |
| static bool btif_gatt_is_link_encrypted(const RawAddress& bd_addr) { |
| return BTA_JvIsEncrypted(bd_addr); |
| } |
| |
| static void btif_gatt_set_encryption_cb(UNUSED_ATTR const RawAddress& bd_addr, |
| UNUSED_ATTR tBTA_TRANSPORT transport, |
| tBTA_STATUS result) { |
| if (result != BTA_SUCCESS && result != BTA_BUSY) { |
| BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __func__, result); |
| } |
| } |
| #endif |
| |
| #if (BLE_DELAY_REQUEST_ENC == FALSE) |
| void btif_gatt_check_encrypted_link(RawAddress bd_addr, |
| tBTA_GATT_TRANSPORT transport_link) { |
| char buf[100]; |
| |
| if ((btif_storage_get_ble_bonding_key(&bd_addr, BTIF_DM_LE_KEY_PENC, buf, |
| sizeof(tBTM_LE_PENC_KEYS)) == |
| BT_STATUS_SUCCESS) && |
| !btif_gatt_is_link_encrypted(bd_addr)) { |
| BTIF_TRACE_DEBUG("%s: transport = %d", __func__, transport_link); |
| BTA_DmSetEncryption(bd_addr, transport_link, &btif_gatt_set_encryption_cb, |
| BTM_BLE_SEC_ENCRYPT); |
| } |
| } |
| #else |
| void btif_gatt_check_encrypted_link(UNUSED_ATTR RawAddress bd_addr, |
| UNUSED_ATTR tBTA_GATT_TRANSPORT |
| transport_link) {} |
| #endif |
| |
| void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t* p_dest, |
| btgatt_track_adv_info_t* p_src) { |
| memset(p_dest, 0, sizeof(btgatt_track_adv_info_t)); |
| |
| memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t)); |
| |
| if (p_src->adv_pkt_len > 0) { |
| p_dest->p_adv_pkt_data = (uint8_t*)osi_malloc(p_src->adv_pkt_len); |
| memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data, p_src->adv_pkt_len); |
| osi_free_and_reset((void**)&p_src->p_adv_pkt_data); |
| } |
| |
| if (p_src->scan_rsp_len > 0) { |
| p_dest->p_scan_rsp_data = (uint8_t*)osi_malloc(p_src->scan_rsp_len); |
| memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data, |
| p_src->scan_rsp_len); |
| osi_free_and_reset((void**)&p_src->p_scan_rsp_data); |
| } |
| } |