btif_gatt_util.cc revision 904aefe1a9c2808a7460ebb9896391acdaa39f4e
1/****************************************************************************** 2 * 3 * Copyright (C) 2009-2013 Broadcom Corporation 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at: 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 ******************************************************************************/ 18 19#define LOG_TAG "bt_btif_gatt" 20 21#include "btif_gatt_util.h" 22 23#include <errno.h> 24#include <stdio.h> 25#include <stdlib.h> 26#include <string.h> 27 28#include <hardware/bluetooth.h> 29#include <hardware/bt_gatt.h> 30 31#include "bdaddr.h" 32#include "bta_api.h" 33#include "bta_gatt_api.h" 34#include "bta_jv_api.h" 35#include "btif_common.h" 36#include "btif_config.h" 37#include "btif_dm.h" 38#include "btif_gatt.h" 39#include "btif_storage.h" 40#include "btif_util.h" 41#include "bt_common.h" 42 43#if BTA_GATT_INCLUDED == TRUE 44 45#define GATTC_READ_VALUE_TYPE_VALUE 0x0000 /* Attribute value itself */ 46#define GATTC_READ_VALUE_TYPE_AGG_FORMAT 0x2905 /* Characteristic Aggregate Format*/ 47 48static unsigned char BASE_UUID[16] = { 49 0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80, 50 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 51}; 52 53int uuidType(const unsigned char* p_uuid) 54{ 55 int i = 0; 56 int match = 0; 57 int all_zero = 1; 58 59 for(i = 0; i != 16; ++i) 60 { 61 if (i == 12 || i == 13) 62 continue; 63 64 if (p_uuid[i] == BASE_UUID[i]) 65 ++match; 66 67 if (p_uuid[i] != 0) 68 all_zero = 0; 69 } 70 if (all_zero) 71 return 0; 72 if (match == 12) 73 return LEN_UUID_32; 74 if (match == 14) 75 return LEN_UUID_16; 76 return LEN_UUID_128; 77} 78 79/******************************************************************************* 80 * BTIF -> BTA conversion functions 81 *******************************************************************************/ 82 83void btif_to_bta_uuid(tBT_UUID *p_dest, const bt_uuid_t *p_src) 84{ 85 char *p_byte = (char*)p_src; 86 int i = 0; 87 88 p_dest->len = uuidType(p_src->uu); 89 90 switch (p_dest->len) 91 { 92 case LEN_UUID_16: 93 p_dest->uu.uuid16 = (p_src->uu[13] << 8) + p_src->uu[12]; 94 break; 95 96 case LEN_UUID_32: 97 p_dest->uu.uuid32 = (p_src->uu[13] << 8) + p_src->uu[12]; 98 p_dest->uu.uuid32 += (p_src->uu[15] << 24) + (p_src->uu[14] << 16); 99 break; 100 101 case LEN_UUID_128: 102 for(i = 0; i != 16; ++i) 103 p_dest->uu.uuid128[i] = p_byte[i]; 104 break; 105 106 default: 107 LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __FUNCTION__, p_dest->len); 108 break; 109 } 110} 111 112void btif_to_bta_response(tBTA_GATTS_RSP *p_dest, btgatt_response_t* p_src) 113{ 114 p_dest->attr_value.auth_req = p_src->attr_value.auth_req; 115 p_dest->attr_value.handle = p_src->attr_value.handle; 116 p_dest->attr_value.len = p_src->attr_value.len; 117 p_dest->attr_value.offset = p_src->attr_value.offset; 118 memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN); 119} 120 121void btif_to_bta_uuid_mask(tBTA_DM_BLE_PF_COND_MASK *p_mask, const bt_uuid_t *p_src) 122{ 123 char *p_byte = (char*)p_src; 124 int i = 0; 125 126 switch (uuidType(p_src->uu)) 127 { 128 case LEN_UUID_16: 129 p_mask->uuid16_mask = (p_src->uu[13] << 8) + p_src->uu[12]; 130 break; 131 132 case LEN_UUID_32: 133 p_mask->uuid32_mask = (p_src->uu[13] << 8) + p_src->uu[12]; 134 p_mask->uuid32_mask += (p_src->uu[15] << 24) + (p_src->uu[14] << 16); 135 break; 136 137 case LEN_UUID_128: 138 for(i = 0; i != 16; ++i) 139 p_mask->uuid128_mask[i] = p_byte[i]; 140 break; 141 142 default: 143 break; 144 } 145} 146 147/******************************************************************************* 148 * BTA -> BTIF conversion functions 149 *******************************************************************************/ 150 151void bta_to_btif_uuid(bt_uuid_t *p_dest, tBT_UUID *p_src) 152{ 153 int i = 0; 154 155 if (p_src->len == LEN_UUID_16 || p_src->len == LEN_UUID_32) 156 { 157 for(i=0; i != 16; ++i) 158 p_dest->uu[i] = BASE_UUID[i]; 159 } 160 161 switch (p_src->len) 162 { 163 case 0: 164 break; 165 166 case LEN_UUID_16: 167 p_dest->uu[12] = p_src->uu.uuid16 & 0xff; 168 p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff; 169 break; 170 171 case LEN_UUID_32: 172 p_dest->uu[12] = p_src->uu.uuid16 & 0xff; 173 p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff; 174 p_dest->uu[14] = (p_src->uu.uuid32 >> 16) & 0xff; 175 p_dest->uu[15] = (p_src->uu.uuid32 >> 24) & 0xff; 176 break; 177 178 case LEN_UUID_128: 179 for(i=0; i != 16; ++i) 180 p_dest->uu[i] = p_src->uu.uuid128[i]; 181 break; 182 183 default: 184 LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __FUNCTION__, p_src->len); 185 break; 186 } 187} 188 189/******************************************************************************* 190 * Utility functions 191 *******************************************************************************/ 192 193uint16_t get_uuid16(tBT_UUID *p_uuid) 194{ 195 if (p_uuid->len == LEN_UUID_16) 196 { 197 return p_uuid->uu.uuid16; 198 } 199 else if (p_uuid->len == LEN_UUID_128) 200 { 201 UINT16 u16; 202 UINT8 *p = &p_uuid->uu.uuid128[LEN_UUID_128 - 4]; 203 STREAM_TO_UINT16(u16, p); 204 return u16; 205 } 206 else /* p_uuid->len == LEN_UUID_32 */ 207 { 208 return(UINT16) p_uuid->uu.uuid32; 209 } 210} 211 212uint16_t set_read_value(btgatt_read_params_t *p_dest, tBTA_GATTC_READ *p_src) 213{ 214 uint16_t len = 0; 215 216 p_dest->status = p_src->status; 217 p_dest->handle = p_src->handle; 218 219 if (( p_src->status == BTA_GATT_OK ) &&(p_src->p_value != NULL)) 220 { 221 LOG_INFO(LOG_TAG, "%s len = %d ", __FUNCTION__, p_src->p_value->len); 222 p_dest->value.len = p_src->p_value->len; 223 if ( p_src->p_value->len > 0 && p_src->p_value->p_value != NULL ) 224 memcpy(p_dest->value.value, p_src->p_value->p_value, 225 p_src->p_value->len); 226 227 len += p_src->p_value->len; 228 } else { 229 p_dest->value.len = 0; 230 } 231 232 p_dest->value_type = GATTC_READ_VALUE_TYPE_VALUE; 233 return len; 234} 235 236/******************************************************************************* 237 * Encrypted link map handling 238 *******************************************************************************/ 239 240#if (!defined(BLE_DELAY_REQUEST_ENC) || (BLE_DELAY_REQUEST_ENC == FALSE)) 241static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr) 242{ 243 if (bd_addr == NULL) 244 return FALSE; 245 246 return BTA_JvIsEncrypted(bd_addr); 247} 248 249static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_TRANSPORT transport, tBTA_STATUS result) 250{ 251 UNUSED(bd_addr); 252 UNUSED(transport); 253 254 if (result != BTA_SUCCESS && result != BTA_BUSY) 255 { 256 BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __FUNCTION__, result); 257 } 258} 259#endif 260 261void btif_gatt_check_encrypted_link (BD_ADDR bd_addr, tBTA_GATT_TRANSPORT transport_link) 262{ 263#if (!defined(BLE_DELAY_REQUEST_ENC) || (BLE_DELAY_REQUEST_ENC == FALSE)) 264 char buf[100]; 265 266 bt_bdaddr_t bda; 267 bdcpy(bda.address, bd_addr); 268 269 if ((btif_storage_get_ble_bonding_key(&bda, BTIF_DM_LE_KEY_PENC, 270 buf, sizeof(tBTM_LE_PENC_KEYS)) == BT_STATUS_SUCCESS) 271 && !btif_gatt_is_link_encrypted(bd_addr)) 272 { 273 BTIF_TRACE_DEBUG ("%s: transport = %d", __func__, transport_link); 274 BTA_DmSetEncryption(bd_addr,transport_link, 275 &btif_gatt_set_encryption_cb, BTM_BLE_SEC_ENCRYPT); 276 } 277#else 278 UNUSED(bd_addr); 279 UNUSED(transport_link); 280#endif 281} 282 283#endif 284 285void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t *p_dest, 286 btgatt_track_adv_info_t *p_src) 287{ 288 memset(p_dest, 0, sizeof(btgatt_track_adv_info_t)); 289 290 memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t)); 291 292 if (p_src->adv_pkt_len > 0) 293 { 294 p_dest->p_adv_pkt_data = (uint8_t*)osi_malloc(p_src->adv_pkt_len); 295 memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data, 296 p_src->adv_pkt_len); 297 osi_free_and_reset((void **)&p_src->p_adv_pkt_data); 298 } 299 300 if (p_src->scan_rsp_len > 0) 301 { 302 p_dest->p_scan_rsp_data = (uint8_t*)osi_malloc(p_src->scan_rsp_len); 303 memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data, 304 p_src->scan_rsp_len); 305 osi_free_and_reset((void **)&p_src->p_scan_rsp_data); 306 } 307} 308 309