blob: f00b10d2bbf2684a2f595d711c1287e804d66681 [file] [log] [blame]
/******************************************************************************
*
* Copyright (C) 2009-2013 Broadcom Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
#define LOG_TAG "bt_btif_gatt"
#include "btif_gatt_util.h"
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <hardware/bluetooth.h>
#include <hardware/bt_gatt.h>
#include "bdaddr.h"
#include "bt_common.h"
#include "bta_api.h"
#include "bta_gatt_api.h"
#include "bta_jv_api.h"
#include "btif_common.h"
#include "btif_config.h"
#include "btif_dm.h"
#include "btif_gatt.h"
#include "btif_storage.h"
#include "btif_util.h"
#include "osi/include/osi.h"
#if (BTA_GATT_INCLUDED == TRUE)
#define GATTC_READ_VALUE_TYPE_VALUE 0x0000 /* Attribute value itself */
#define GATTC_READ_VALUE_TYPE_AGG_FORMAT \
0x2905 /* Characteristic Aggregate Format*/
static unsigned char BASE_UUID[16] = {0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00,
0x00, 0x80, 0x00, 0x10, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00};
int uuidType(const unsigned char* p_uuid) {
int i = 0;
int match = 0;
int all_zero = 1;
for (i = 0; i != 16; ++i) {
if (i == 12 || i == 13) continue;
if (p_uuid[i] == BASE_UUID[i]) ++match;
if (p_uuid[i] != 0) all_zero = 0;
}
if (all_zero) return 0;
if (match == 12) return LEN_UUID_32;
if (match == 14) return LEN_UUID_16;
return LEN_UUID_128;
}
/*******************************************************************************
* BTIF -> BTA conversion functions
*******************************************************************************/
void btif_to_bta_uuid(tBT_UUID* p_dest, const bt_uuid_t* p_src) {
char* p_byte = (char*)p_src;
int i = 0;
p_dest->len = uuidType(p_src->uu);
switch (p_dest->len) {
case LEN_UUID_16:
p_dest->uu.uuid16 = (p_src->uu[13] << 8) + p_src->uu[12];
break;
case LEN_UUID_32:
p_dest->uu.uuid32 = (p_src->uu[13] << 8) + p_src->uu[12];
p_dest->uu.uuid32 += (p_src->uu[15] << 24) + (p_src->uu[14] << 16);
break;
case LEN_UUID_128:
for (i = 0; i != 16; ++i) p_dest->uu.uuid128[i] = p_byte[i];
break;
default:
LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __func__, p_dest->len);
break;
}
}
void btif_to_bta_response(tBTA_GATTS_RSP* p_dest, btgatt_response_t* p_src) {
p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
p_dest->attr_value.handle = p_src->attr_value.handle;
p_dest->attr_value.len = p_src->attr_value.len;
p_dest->attr_value.offset = p_src->attr_value.offset;
memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN);
}
void btif_to_bta_uuid_mask(tBTA_DM_BLE_PF_COND_MASK* p_mask,
const bt_uuid_t* uuid_mask,
const bt_uuid_t* svc_uuid) {
char* p_byte = (char*)uuid_mask;
int uuid_len = uuidType(svc_uuid->uu);
int i = 0;
switch (uuid_len) {
case LEN_UUID_16:
p_mask->uuid16_mask = (uuid_mask->uu[13] << 8) + uuid_mask->uu[12];
break;
case LEN_UUID_32:
p_mask->uuid32_mask = (uuid_mask->uu[13] << 8) + uuid_mask->uu[12];
p_mask->uuid32_mask +=
(uuid_mask->uu[15] << 24) + (uuid_mask->uu[14] << 16);
break;
case LEN_UUID_128:
for (i = 0; i != 16; ++i) p_mask->uuid128_mask[i] = p_byte[i];
break;
default:
break;
}
}
/*******************************************************************************
* BTA -> BTIF conversion functions
*******************************************************************************/
void bta_to_btif_uuid(bt_uuid_t* p_dest, tBT_UUID* p_src) {
int i = 0;
if (p_src->len == LEN_UUID_16 || p_src->len == LEN_UUID_32) {
for (i = 0; i != 16; ++i) p_dest->uu[i] = BASE_UUID[i];
}
switch (p_src->len) {
case 0:
break;
case LEN_UUID_16:
p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
break;
case LEN_UUID_32:
p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
p_dest->uu[14] = (p_src->uu.uuid32 >> 16) & 0xff;
p_dest->uu[15] = (p_src->uu.uuid32 >> 24) & 0xff;
break;
case LEN_UUID_128:
for (i = 0; i != 16; ++i) p_dest->uu[i] = p_src->uu.uuid128[i];
break;
default:
LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __func__, p_src->len);
break;
}
}
/*******************************************************************************
* Utility functions
*******************************************************************************/
uint16_t get_uuid16(tBT_UUID* p_uuid) {
if (p_uuid->len == LEN_UUID_16) {
return p_uuid->uu.uuid16;
} else if (p_uuid->len == LEN_UUID_128) {
uint16_t u16;
uint8_t* p = &p_uuid->uu.uuid128[LEN_UUID_128 - 4];
STREAM_TO_UINT16(u16, p);
return u16;
} else /* p_uuid->len == LEN_UUID_32 */
{
return (uint16_t)p_uuid->uu.uuid32;
}
}
uint16_t set_read_value(btgatt_read_params_t* p_dest, tBTA_GATTC_READ* p_src) {
uint16_t len = 0;
p_dest->status = p_src->status;
p_dest->handle = p_src->handle;
if ((p_src->status == BTA_GATT_OK) && (p_src->len != 0)) {
LOG_INFO(LOG_TAG, "%s len = %d ", __func__, p_src->len);
p_dest->value.len = p_src->len;
memcpy(p_dest->value.value, p_src->value, p_src->len);
len += p_src->len;
} else {
p_dest->value.len = 0;
}
p_dest->value_type = GATTC_READ_VALUE_TYPE_VALUE;
return len;
}
/*******************************************************************************
* Encrypted link map handling
*******************************************************************************/
#if (BLE_DELAY_REQUEST_ENC == FALSE)
static bool btif_gatt_is_link_encrypted(BD_ADDR bd_addr) {
if (bd_addr == NULL) return false;
return BTA_JvIsEncrypted(bd_addr);
}
static void btif_gatt_set_encryption_cb(UNUSED_ATTR BD_ADDR bd_addr,
UNUSED_ATTR tBTA_TRANSPORT transport,
tBTA_STATUS result) {
if (result != BTA_SUCCESS && result != BTA_BUSY) {
BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __func__, result);
}
}
#endif
#if (BLE_DELAY_REQUEST_ENC == FALSE)
void btif_gatt_check_encrypted_link(BD_ADDR bd_addr,
tBTA_GATT_TRANSPORT transport_link) {
char buf[100];
bt_bdaddr_t bda;
bdcpy(bda.address, bd_addr);
if ((btif_storage_get_ble_bonding_key(&bda, BTIF_DM_LE_KEY_PENC, buf,
sizeof(tBTM_LE_PENC_KEYS)) ==
BT_STATUS_SUCCESS) &&
!btif_gatt_is_link_encrypted(bd_addr)) {
BTIF_TRACE_DEBUG("%s: transport = %d", __func__, transport_link);
BTA_DmSetEncryption(bd_addr, transport_link, &btif_gatt_set_encryption_cb,
BTM_BLE_SEC_ENCRYPT);
}
}
#else
void btif_gatt_check_encrypted_link(UNUSED_ATTR BD_ADDR bd_addr,
UNUSED_ATTR tBTA_GATT_TRANSPORT transport_link) {
}
#endif
#endif // BTA_GATT_INCLUDED
void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t* p_dest,
btgatt_track_adv_info_t* p_src) {
memset(p_dest, 0, sizeof(btgatt_track_adv_info_t));
memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t));
if (p_src->adv_pkt_len > 0) {
p_dest->p_adv_pkt_data = (uint8_t*)osi_malloc(p_src->adv_pkt_len);
memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data, p_src->adv_pkt_len);
osi_free_and_reset((void**)&p_src->p_adv_pkt_data);
}
if (p_src->scan_rsp_len > 0) {
p_dest->p_scan_rsp_data = (uint8_t*)osi_malloc(p_src->scan_rsp_len);
memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data,
p_src->scan_rsp_len);
osi_free_and_reset((void**)&p_src->p_scan_rsp_data);
}
}