1/******************************************************************************
2 *
3 *  Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/******************************************************************************
20 *
21 *  this file contains GATT database building and query functions
22 *
23 ******************************************************************************/
24
25#include "bt_target.h"
26
27#include "bt_trace.h"
28#include "bt_utils.h"
29
30#include <stdio.h>
31#include <string.h>
32#include "btm_int.h"
33#include "gatt_int.h"
34#include "l2c_api.h"
35#include "osi/include/osi.h"
36
37/*******************************************************************************
38 *             L O C A L    F U N C T I O N     P R O T O T Y P E S            *
39 ******************************************************************************/
40static tGATT_ATTR& allocate_attr_in_db(tGATT_SVC_DB& db, const tBT_UUID& uuid,
41                                       tGATT_PERM perm);
42static tGATT_STATUS gatts_send_app_read_request(
43    tGATT_TCB* p_tcb, uint8_t op_code, uint16_t handle, uint16_t offset,
44    uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type);
45
46/**
47 * Initialize a memory space to be a service database.
48 */
49void gatts_init_service_db(tGATT_SVC_DB& db, tBT_UUID* p_service, bool is_pri,
50                           uint16_t s_hdl, uint16_t num_handle) {
51  db.attr_list.reserve(num_handle);
52
53  GATT_TRACE_DEBUG("%s: s_hdl= %d num_handle= %d", __func__, s_hdl, num_handle);
54
55  /* update service database information */
56  db.next_handle = s_hdl;
57  db.end_handle = s_hdl + num_handle;
58
59  /* add service declration record */
60  tBT_UUID uuid = {LEN_UUID_16, {0}};
61  uuid.uu.uuid16 = is_pri ? GATT_UUID_PRI_SERVICE : GATT_UUID_SEC_SERVICE;
62  tGATT_ATTR& attr = allocate_attr_in_db(db, uuid, GATT_PERM_READ);
63  attr.p_value.reset((tGATT_ATTR_VALUE*)(new tBT_UUID));
64  memcpy(&attr.p_value->uuid, p_service, sizeof(tBT_UUID));
65}
66
67tBT_UUID* gatts_get_service_uuid(tGATT_SVC_DB* p_db) {
68  if (!p_db || p_db->attr_list.empty()) {
69    GATT_TRACE_ERROR("service DB empty");
70    return NULL;
71  } else {
72    return &p_db->attr_list[0].p_value->uuid;
73  }
74}
75
76/** Check attribute readability. Returns status of operation. */
77static tGATT_STATUS gatts_check_attr_readability(const tGATT_ATTR& attr,
78                                                 UNUSED_ATTR uint16_t offset,
79                                                 bool read_long,
80                                                 tGATT_SEC_FLAG sec_flag,
81                                                 uint8_t key_size) {
82  uint16_t min_key_size;
83  tGATT_PERM perm = attr.permission;
84
85  min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
86  if (min_key_size != 0) {
87    min_key_size += 6;
88  }
89
90  if (!(perm & GATT_READ_ALLOWED)) {
91    GATT_TRACE_ERROR("%s: GATT_READ_NOT_PERMIT", __func__);
92    return GATT_READ_NOT_PERMIT;
93  }
94
95  if ((perm & GATT_READ_AUTH_REQUIRED) &&
96      !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) &&
97      !(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) {
98    GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION", __func__);
99    return GATT_INSUF_AUTHENTICATION;
100  }
101
102  if ((perm & GATT_READ_MITM_REQUIRED) &&
103      !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) {
104    GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION: MITM Required", __func__);
105    return GATT_INSUF_AUTHENTICATION;
106  }
107
108  if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
109      !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
110    GATT_TRACE_ERROR("%s: GATT_INSUF_ENCRYPTION", __func__);
111    return GATT_INSUF_ENCRYPTION;
112  }
113
114  if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
115      (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) {
116    GATT_TRACE_ERROR("%s: GATT_INSUF_KEY_SIZE", __func__);
117    return GATT_INSUF_KEY_SIZE;
118  }
119
120  if (read_long && attr.uuid.len == LEN_UUID_16) {
121    switch (attr.uuid.uu.uuid16) {
122      case GATT_UUID_PRI_SERVICE:
123      case GATT_UUID_SEC_SERVICE:
124      case GATT_UUID_CHAR_DECLARE:
125      case GATT_UUID_INCLUDE_SERVICE:
126      case GATT_UUID_CHAR_EXT_PROP:
127      case GATT_UUID_CHAR_CLIENT_CONFIG:
128      case GATT_UUID_CHAR_SRVR_CONFIG:
129      case GATT_UUID_CHAR_PRESENT_FORMAT:
130        GATT_TRACE_ERROR("%s: GATT_NOT_LONG", __func__);
131        return GATT_NOT_LONG;
132
133      default:
134        break;
135    }
136  }
137
138  return GATT_SUCCESS;
139}
140
141/*******************************************************************************
142 *
143 * Function         read_attr_value
144 *
145 * Description      Utility function to read an attribute value.
146 *
147 * Parameter        p_attr: pointer to the attribute to read.
148 *                  offset: read offset.
149 *                  p_value: output parameter to carry out the attribute value.
150 *                  p_len: output parameter to carry out the attribute length.
151 *                  read_long: this is a read blob request.
152 *                  mtu: MTU
153 *                  sec_flag: current link security status.
154 *                  key_size: encryption key size.
155 *
156 * Returns          status of operation.
157 *
158 ******************************************************************************/
159static tGATT_STATUS read_attr_value(tGATT_ATTR& attr16, uint16_t offset,
160                                    uint8_t** p_data, bool read_long,
161                                    uint16_t mtu, uint16_t* p_len,
162                                    tGATT_SEC_FLAG sec_flag, uint8_t key_size) {
163  uint16_t len = 0, uuid16 = 0;
164  uint8_t* p = *p_data;
165
166  GATT_TRACE_DEBUG(
167      "%s: uuid=0x%04x perm=0x%02x sec_flag=0x%x offset=%d read_long=%d",
168      __func__, attr16.uuid, attr16.permission, sec_flag, offset, read_long);
169
170  tGATT_STATUS status = gatts_check_attr_readability(attr16, offset, read_long,
171                                                     sec_flag, key_size);
172
173  if (status != GATT_SUCCESS) return status;
174
175  if (attr16.uuid.len == LEN_UUID_16) uuid16 = attr16.uuid.uu.uuid16;
176
177  status = GATT_NO_RESOURCES;
178
179  if (uuid16 == GATT_UUID_PRI_SERVICE || uuid16 == GATT_UUID_SEC_SERVICE) {
180    len = attr16.p_value->uuid.len;
181    if (mtu >= attr16.p_value->uuid.len) {
182      gatt_build_uuid_to_stream(&p, attr16.p_value->uuid);
183      status = GATT_SUCCESS;
184    }
185  } else if (uuid16 == GATT_UUID_CHAR_DECLARE) {
186    tGATT_ATTR* val_attr = &attr16 + 1;
187    len = (val_attr->uuid.len == LEN_UUID_16) ? 5 : 19;
188
189    if (mtu >= len) {
190      UINT8_TO_STREAM(p, attr16.p_value->char_decl.property);
191      UINT16_TO_STREAM(p, attr16.p_value->char_decl.char_val_handle);
192
193      if (val_attr->uuid.len == LEN_UUID_16) {
194        UINT16_TO_STREAM(p, val_attr->uuid.uu.uuid16);
195      }
196      /* convert a 32bits UUID to 128 bits */
197      else if (val_attr->uuid.len == LEN_UUID_32) {
198        gatt_convert_uuid32_to_uuid128(p, val_attr->uuid.uu.uuid32);
199        p += LEN_UUID_128;
200      } else {
201        ARRAY_TO_STREAM(p, val_attr->uuid.uu.uuid128, LEN_UUID_128);
202      }
203      status = GATT_SUCCESS;
204    }
205
206  } else if (uuid16 == GATT_UUID_INCLUDE_SERVICE) {
207    if (attr16.p_value->incl_handle.service_type.len == LEN_UUID_16)
208      len = 6;
209    else
210      len = 4;
211
212    if (mtu >= len) {
213      UINT16_TO_STREAM(p, attr16.p_value->incl_handle.s_handle);
214      UINT16_TO_STREAM(p, attr16.p_value->incl_handle.e_handle);
215
216      if (attr16.p_value->incl_handle.service_type.len == LEN_UUID_16) {
217        UINT16_TO_STREAM(p, attr16.p_value->incl_handle.service_type.uu.uuid16);
218      }
219      status = GATT_SUCCESS;
220    }
221  } else /* characteristic description or characteristic value */
222  {
223    status = GATT_PENDING;
224  }
225
226  *p_len = len;
227  *p_data = p;
228  return status;
229}
230
231/*******************************************************************************
232 *
233 * Function         gatts_db_read_attr_value_by_type
234 *
235 * Description      Query attribute value by attribute type.
236 *
237 * Parameter        p_db: pointer to the attribute database.
238 *                  p_rsp: Read By type response data.
239 *                  s_handle: starting handle of the range we are looking for.
240 *                  e_handle: ending handle of the range we are looking for.
241 *                  type: Attribute type.
242 *                  mtu: MTU.
243 *                  sec_flag: current link security status.
244 *                  key_size: encryption key size.
245 *
246 * Returns          Status of the operation.
247 *
248 ******************************************************************************/
249tGATT_STATUS gatts_db_read_attr_value_by_type(
250    tGATT_TCB* p_tcb, tGATT_SVC_DB* p_db, uint8_t op_code, BT_HDR* p_rsp,
251    uint16_t s_handle, uint16_t e_handle, tBT_UUID type, uint16_t* p_len,
252    tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id,
253    uint16_t* p_cur_handle) {
254  tGATT_STATUS status = GATT_NOT_FOUND;
255  uint16_t len = 0;
256  uint8_t* p = (uint8_t*)(p_rsp + 1) + p_rsp->len + L2CAP_MIN_OFFSET;
257
258  if (p_db) {
259    for (tGATT_ATTR& attr : p_db->attr_list) {
260      tBT_UUID attr_uuid = attr.uuid;
261
262      if (attr.handle >= s_handle && gatt_uuid_compare(type, attr_uuid)) {
263        if (*p_len <= 2) {
264          status = GATT_NO_RESOURCES;
265          break;
266        }
267
268        UINT16_TO_STREAM(p, attr.handle);
269
270        status = read_attr_value(attr, 0, &p, false, (uint16_t)(*p_len - 2),
271                                 &len, sec_flag, key_size);
272
273        if (status == GATT_PENDING) {
274          status = gatts_send_app_read_request(p_tcb, op_code, attr.handle, 0,
275                                               trans_id, attr.gatt_type);
276
277          /* one callback at a time */
278          break;
279        } else if (status == GATT_SUCCESS) {
280          if (p_rsp->offset == 0) p_rsp->offset = len + 2;
281
282          if (p_rsp->offset == len + 2) {
283            p_rsp->len += (len + 2);
284            *p_len -= (len + 2);
285          } else {
286            GATT_TRACE_ERROR("format mismatch");
287            status = GATT_NO_RESOURCES;
288            break;
289          }
290        } else {
291          *p_cur_handle = attr.handle;
292          break;
293        }
294      }
295    }
296  }
297
298#if (BLE_DELAY_REQUEST_ENC == TRUE)
299  uint8_t flag = 0;
300  if (BTM_GetSecurityFlags(p_tcb->peer_bda, &flag)) {
301    if ((p_tcb->att_lcid == L2CAP_ATT_CID) && (status == GATT_PENDING) &&
302        (type.uu.uuid16 == GATT_UUID_GAP_DEVICE_NAME)) {
303      if ((flag & (BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_FLAG_ENCRYPTED)) ==
304          BTM_SEC_LINK_KEY_KNOWN) {
305        tACL_CONN* p = btm_bda_to_acl(p_tcb->peer_bda, BT_TRANSPORT_LE);
306        if ((p != NULL) && (p->link_role == BTM_ROLE_MASTER))
307          btm_ble_set_encryption(p_tcb->peer_bda, BTM_BLE_SEC_ENCRYPT,
308                                 p->link_role);
309      }
310    }
311  }
312#endif
313  return status;
314}
315
316/**
317 * This function adds an included service into a database.
318 *
319 * Parameter        db: database pointer.
320 *                  inc_srvc_type: included service type.
321 *
322 * Returns          Status of the operation.
323 *
324 */
325uint16_t gatts_add_included_service(tGATT_SVC_DB& db, uint16_t s_handle,
326                                    uint16_t e_handle, tBT_UUID service) {
327  tBT_UUID uuid = {LEN_UUID_16, {GATT_UUID_INCLUDE_SERVICE}};
328
329  GATT_TRACE_DEBUG("%s: s_hdl = 0x%04x e_hdl = 0x%04x uuid = 0x%04x", __func__,
330                   s_handle, e_handle, service.uu.uuid16);
331
332  if (service.len == 0 || s_handle == 0 || e_handle == 0) {
333    GATT_TRACE_ERROR("%s: Illegal Params.", __func__);
334    return 0;
335  }
336
337  tGATT_ATTR& attr = allocate_attr_in_db(db, uuid, GATT_PERM_READ);
338
339  attr.p_value.reset((tGATT_ATTR_VALUE*)(new tGATT_INCL_SRVC));
340  attr.p_value->incl_handle.s_handle = s_handle;
341  attr.p_value->incl_handle.e_handle = e_handle;
342  memcpy(&attr.p_value->incl_handle.service_type, &service, sizeof(tBT_UUID));
343
344  return attr.handle;
345}
346
347/*******************************************************************************
348 *
349 * Function         gatts_add_characteristic
350 *
351 * Description      This function add a characteristics and its descriptor into
352 *                  a servce identified by the service database pointer.
353 *
354 * Parameter        db: database.
355 *                  perm: permission (authentication and key size requirements)
356 *                  property: property of the characteristic.
357 *                  p_char: characteristic value information.
358 *
359 * Returns          Status of te operation.
360 *
361 ******************************************************************************/
362uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm,
363                                  tGATT_CHAR_PROP property,
364                                  tBT_UUID& char_uuid) {
365  tBT_UUID uuid = {LEN_UUID_16, {GATT_UUID_CHAR_DECLARE}};
366
367  GATT_TRACE_DEBUG("%s: perm=0x%0x property=0x%0x", __func__, perm, property);
368
369  tGATT_ATTR& char_decl = allocate_attr_in_db(db, uuid, GATT_PERM_READ);
370  tGATT_ATTR& char_val = allocate_attr_in_db(db, char_uuid, perm);
371
372  char_decl.p_value.reset((tGATT_ATTR_VALUE*)(new tGATT_CHAR_DECL));
373  char_decl.p_value->char_decl.property = property;
374  char_decl.p_value->char_decl.char_val_handle = char_val.handle;
375  char_val.gatt_type = BTGATT_DB_CHARACTERISTIC;
376  return char_val.handle;
377}
378
379/*******************************************************************************
380 *
381 * Function         gatt_convertchar_descr_type
382 *
383 * Description      Convert a char descript UUID into descriptor type.
384 *
385 * Returns          descriptor type.
386 *
387 ******************************************************************************/
388uint8_t gatt_convertchar_descr_type(tBT_UUID* p_descr_uuid) {
389  tBT_UUID std_descr = {LEN_UUID_16, {GATT_UUID_CHAR_EXT_PROP}};
390
391  if (gatt_uuid_compare(std_descr, *p_descr_uuid))
392    return GATT_DESCR_EXT_DSCPTOR;
393
394  std_descr.uu.uuid16++;
395  if (gatt_uuid_compare(std_descr, *p_descr_uuid))
396    return GATT_DESCR_USER_DSCPTOR;
397
398  std_descr.uu.uuid16++;
399  if (gatt_uuid_compare(std_descr, *p_descr_uuid)) return GATT_DESCR_CLT_CONFIG;
400
401  std_descr.uu.uuid16++;
402  if (gatt_uuid_compare(std_descr, *p_descr_uuid)) return GATT_DESCR_SVR_CONFIG;
403
404  std_descr.uu.uuid16++;
405  if (gatt_uuid_compare(std_descr, *p_descr_uuid))
406    return GATT_DESCR_PRES_FORMAT;
407
408  std_descr.uu.uuid16++;
409  if (gatt_uuid_compare(std_descr, *p_descr_uuid))
410    return GATT_DESCR_AGGR_FORMAT;
411
412  std_descr.uu.uuid16++;
413  if (gatt_uuid_compare(std_descr, *p_descr_uuid))
414    return GATT_DESCR_VALID_RANGE;
415
416  return GATT_DESCR_UNKNOWN;
417}
418
419/*******************************************************************************
420 *
421 * Function         gatts_add_char_descr
422 *
423 * Description      This function add a characteristics descriptor.
424 *
425 * Parameter        p_db: database pointer.
426 *                  perm: characteristic descriptor permission type.
427 *                  char_dscp_tpye: the characteristic descriptor masks.
428 *                  p_dscp_params: characteristic descriptors values.
429 *
430 * Returns          Status of the operation.
431 *
432 ******************************************************************************/
433uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm,
434                              tBT_UUID& descr_uuid) {
435  GATT_TRACE_DEBUG("gatts_add_char_descr uuid=0x%04x", descr_uuid.uu.uuid16);
436
437  /* Add characteristic descriptors */
438  tGATT_ATTR& char_dscptr = allocate_attr_in_db(db, descr_uuid, perm);
439  char_dscptr.gatt_type = BTGATT_DB_DESCRIPTOR;
440  return char_dscptr.handle;
441}
442
443/******************************************************************************/
444/* Service Attribute Database Query Utility Functions */
445/******************************************************************************/
446tGATT_ATTR* find_attr_by_handle(tGATT_SVC_DB* p_db, uint16_t handle) {
447  if (!p_db) return nullptr;
448
449  for (auto& attr : p_db->attr_list) {
450    if (attr.handle == handle) return &attr;
451    if (attr.handle > handle) return nullptr;
452  }
453
454  return nullptr;
455}
456
457/*******************************************************************************
458 *
459 * Function         gatts_read_attr_value_by_handle
460 *
461 * Description      Query attribute value by attribute handle.
462 *
463 * Parameter        p_db: pointer to the attribute database.
464 *                  handle: Attribute handle to read.
465 *                  offset: Read offset.
466 *                  p_value: output parameter to carry out the attribute value.
467 *                  p_len: output parameter as attribute length read.
468 *                  read_long: this is a read blob request.
469 *                  mtu: MTU.
470 *                  sec_flag: current link security status.
471 *                  key_size: encryption key size
472 *
473 * Returns          Status of operation.
474 *
475 ******************************************************************************/
476tGATT_STATUS gatts_read_attr_value_by_handle(
477    tGATT_TCB* p_tcb, tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle,
478    uint16_t offset, uint8_t* p_value, uint16_t* p_len, uint16_t mtu,
479    tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) {
480  tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle);
481  if (!p_attr) return GATT_NOT_FOUND;
482
483  uint8_t* pp = p_value;
484  tGATT_STATUS status = read_attr_value(*p_attr, offset, &pp,
485                                        (bool)(op_code == GATT_REQ_READ_BLOB),
486                                        mtu, p_len, sec_flag, key_size);
487
488  if (status == GATT_PENDING) {
489    status = gatts_send_app_read_request(p_tcb, op_code, p_attr->handle, offset,
490                                         trans_id, p_attr->gatt_type);
491  }
492  return status;
493}
494
495/*******************************************************************************
496 *
497 * Function         gatts_read_attr_perm_check
498 *
499 * Description      Check attribute readability.
500 *
501 * Parameter        p_db: pointer to the attribute database.
502 *                  handle: Attribute handle to read.
503 *                  offset: Read offset.
504 *                  p_value: output parameter to carry out the attribute value.
505 *                  p_len: output parameter as attribute length read.
506 *                  read_long: this is a read blob request.
507 *                  mtu: MTU.
508 *                  sec_flag: current link security status.
509 *                  key_size: encryption key size
510 *
511 * Returns          Status of operation.
512 *
513 ******************************************************************************/
514tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB* p_db, bool is_long,
515                                        uint16_t handle,
516                                        tGATT_SEC_FLAG sec_flag,
517                                        uint8_t key_size) {
518  tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle);
519  if (!p_attr) return GATT_NOT_FOUND;
520
521  return gatts_check_attr_readability(*p_attr, 0, is_long, sec_flag, key_size);
522}
523
524/*******************************************************************************
525 *
526 * Function         gatts_write_attr_perm_check
527 *
528 * Description      Write attribute value into database.
529 *
530 * Parameter        p_db: pointer to the attribute database.
531 *                  op_code:op code of this write.
532 *                  handle: handle of the attribute to write.
533 *                  offset: Write offset if write op code is write blob.
534 *                  p_data: Attribute value to write.
535 *                  len: attribute data length.
536 *                  sec_flag: current link security status.
537 *                  key_size: encryption key size
538 *
539 * Returns          Status of the operation.
540 *
541 ******************************************************************************/
542tGATT_STATUS gatts_write_attr_perm_check(tGATT_SVC_DB* p_db, uint8_t op_code,
543                                         uint16_t handle, uint16_t offset,
544                                         uint8_t* p_data, uint16_t len,
545                                         tGATT_SEC_FLAG sec_flag,
546                                         uint8_t key_size) {
547  GATT_TRACE_DEBUG(
548      "%s: op_code=0x%0x handle=0x%04x offset=%d len=%d sec_flag=0x%0x "
549      "key_size=%d",
550      __func__, op_code, handle, offset, len, sec_flag, key_size);
551
552  tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle);
553  if (!p_attr) return GATT_NOT_FOUND;
554
555  tGATT_PERM perm = p_attr->permission;
556  uint16_t min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
557  if (min_key_size != 0) {
558    min_key_size += 6;
559  }
560  GATT_TRACE_DEBUG("%s: p_attr->permission =0x%04x min_key_size==0x%04x",
561                   __func__, p_attr->permission, min_key_size);
562
563  if ((op_code == GATT_CMD_WRITE || op_code == GATT_REQ_WRITE) &&
564      (perm & GATT_WRITE_SIGNED_PERM)) {
565    /* use the rules for the mixed security see section 10.2.3*/
566    /* use security mode 1 level 2 when the following condition follows */
567    /* LE security mode 2 level 1 and LE security mode 1 level 2 */
568    if ((perm & GATT_PERM_WRITE_SIGNED) && (perm & GATT_PERM_WRITE_ENCRYPTED)) {
569      perm = GATT_PERM_WRITE_ENCRYPTED;
570    }
571    /* use security mode 1 level 3 when the following condition follows */
572    /* LE security mode 2 level 2 and security mode 1 and LE */
573    else if (((perm & GATT_PERM_WRITE_SIGNED_MITM) &&
574              (perm & GATT_PERM_WRITE_ENCRYPTED)) ||
575             /* LE security mode 2 and security mode 1 level 3 */
576             ((perm & GATT_WRITE_SIGNED_PERM) &&
577              (perm & GATT_PERM_WRITE_ENC_MITM))) {
578      perm = GATT_PERM_WRITE_ENC_MITM;
579    }
580  }
581
582  tGATT_STATUS status = GATT_NOT_FOUND;
583  if ((op_code == GATT_SIGN_CMD_WRITE) && !(perm & GATT_WRITE_SIGNED_PERM)) {
584    status = GATT_WRITE_NOT_PERMIT;
585    GATT_TRACE_DEBUG("%s: sign cmd write not allowed", __func__);
586  }
587  if ((op_code == GATT_SIGN_CMD_WRITE) &&
588      (sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
589    status = GATT_INVALID_PDU;
590    GATT_TRACE_ERROR("%s: Error!! sign cmd write sent on a encypted link",
591                     __func__);
592  } else if (!(perm & GATT_WRITE_ALLOWED)) {
593    status = GATT_WRITE_NOT_PERMIT;
594    GATT_TRACE_ERROR("%s: GATT_WRITE_NOT_PERMIT", __func__);
595  }
596  /* require authentication, but not been authenticated */
597  else if ((perm & GATT_WRITE_AUTH_REQUIRED) &&
598           !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED)) {
599    status = GATT_INSUF_AUTHENTICATION;
600    GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION", __func__);
601  } else if ((perm & GATT_WRITE_MITM_REQUIRED) &&
602             !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) {
603    status = GATT_INSUF_AUTHENTICATION;
604    GATT_TRACE_ERROR("%s: GATT_INSUF_AUTHENTICATION: MITM required", __func__);
605  } else if ((perm & GATT_WRITE_ENCRYPTED_PERM) &&
606             !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) {
607    status = GATT_INSUF_ENCRYPTION;
608    GATT_TRACE_ERROR("%s: GATT_INSUF_ENCRYPTION", __func__);
609  } else if ((perm & GATT_WRITE_ENCRYPTED_PERM) &&
610             (sec_flag & GATT_SEC_FLAG_ENCRYPTED) &&
611             (key_size < min_key_size)) {
612    status = GATT_INSUF_KEY_SIZE;
613    GATT_TRACE_ERROR("%s: GATT_INSUF_KEY_SIZE", __func__);
614  }
615  /* LE security mode 2 attribute  */
616  else if (perm & GATT_WRITE_SIGNED_PERM && op_code != GATT_SIGN_CMD_WRITE &&
617           !(sec_flag & GATT_SEC_FLAG_ENCRYPTED) &&
618           (perm & GATT_WRITE_ALLOWED) == 0) {
619    status = GATT_INSUF_AUTHENTICATION;
620    GATT_TRACE_ERROR(
621        "%s: GATT_INSUF_AUTHENTICATION: LE security mode 2 required", __func__);
622  } else /* writable: must be char value declaration or char descritpors
623            */
624  {
625    uint16_t max_size = 0;
626
627    if (p_attr->uuid.len == LEN_UUID_16) {
628      switch (p_attr->uuid.uu.uuid16) {
629        case GATT_UUID_CHAR_PRESENT_FORMAT: /* should be readable only */
630        case GATT_UUID_CHAR_EXT_PROP:       /* should be readable only */
631        case GATT_UUID_CHAR_AGG_FORMAT:     /* should be readable only */
632        case GATT_UUID_CHAR_VALID_RANGE:
633          status = GATT_WRITE_NOT_PERMIT;
634          break;
635
636        case GATT_UUID_CHAR_CLIENT_CONFIG:
637        /* fall through */
638        case GATT_UUID_CHAR_SRVR_CONFIG:
639          max_size = 2;
640        /* fall through */
641        case GATT_UUID_CHAR_DESCRIPTION:
642        default: /* any other must be character value declaration */
643          status = GATT_SUCCESS;
644          break;
645      }
646    } else if (p_attr->uuid.len == LEN_UUID_128 ||
647               p_attr->uuid.len == LEN_UUID_32) {
648      status = GATT_SUCCESS;
649    } else {
650      status = GATT_INVALID_PDU;
651    }
652
653    if (p_data == NULL && len > 0) {
654      status = GATT_INVALID_PDU;
655    }
656    /* these attribute does not allow write blob */
657    else if ((p_attr->uuid.len == LEN_UUID_16) &&
658             (p_attr->uuid.uu.uuid16 == GATT_UUID_CHAR_CLIENT_CONFIG ||
659              p_attr->uuid.uu.uuid16 == GATT_UUID_CHAR_SRVR_CONFIG)) {
660      if (op_code == GATT_REQ_PREPARE_WRITE &&
661          offset != 0) /* does not allow write blob */
662      {
663        status = GATT_NOT_LONG;
664        GATT_TRACE_ERROR("%s: GATT_NOT_LONG", __func__);
665      } else if (len != max_size) /* data does not match the required format */
666      {
667        status = GATT_INVALID_ATTR_LEN;
668        GATT_TRACE_ERROR("%s: GATT_INVALID_PDU", __func__);
669      } else {
670        status = GATT_SUCCESS;
671      }
672    }
673  }
674
675  return status;
676}
677
678static void uuid_to_str(const tBT_UUID bt_uuid, char* str_buf, size_t buf_len) {
679  if (bt_uuid.len == LEN_UUID_16) {
680    snprintf(str_buf, buf_len, "0x%04x", bt_uuid.uu.uuid16);
681  } else if (bt_uuid.len == LEN_UUID_32) {
682    snprintf(str_buf, buf_len, "0x%08x", bt_uuid.uu.uuid32);
683  } else if (bt_uuid.len == LEN_UUID_128) {
684    int x = snprintf(str_buf, buf_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-",
685                     bt_uuid.uu.uuid128[15], bt_uuid.uu.uuid128[14],
686                     bt_uuid.uu.uuid128[13], bt_uuid.uu.uuid128[12],
687                     bt_uuid.uu.uuid128[11], bt_uuid.uu.uuid128[10],
688                     bt_uuid.uu.uuid128[9], bt_uuid.uu.uuid128[8]);
689    snprintf(&str_buf[x], buf_len - x, "%02x%02x-%02x%02x%02x%02x%02x%02x",
690             bt_uuid.uu.uuid128[7], bt_uuid.uu.uuid128[6],
691             bt_uuid.uu.uuid128[5], bt_uuid.uu.uuid128[4],
692             bt_uuid.uu.uuid128[3], bt_uuid.uu.uuid128[2],
693             bt_uuid.uu.uuid128[1], bt_uuid.uu.uuid128[0]);
694  } else
695    snprintf(str_buf, buf_len, "Unknown (len=%d)", bt_uuid.len);
696}
697
698/**
699 * Description      Allocate a memory space for a new attribute, and link this
700 *                  attribute into the database attribute list.
701 *
702 *
703 * Parameter        p_db    : database pointer.
704 *                  uuid:     attribute UUID
705 *
706 * Returns          pointer to the newly allocated attribute.
707 *
708 */
709static tGATT_ATTR& allocate_attr_in_db(tGATT_SVC_DB& db, const tBT_UUID& uuid,
710                                       tGATT_PERM perm) {
711  if (db.next_handle >= db.end_handle) {
712    LOG(FATAL) << __func__
713               << " wrong number of handles! handle_max = " << +db.end_handle
714               << ", next_handle = " << +db.next_handle;
715  }
716
717  db.attr_list.emplace_back();
718  tGATT_ATTR& attr = db.attr_list.back();
719  attr.handle = db.next_handle++;
720  attr.uuid = uuid;
721  attr.permission = perm;
722
723  char uuid_str[37];
724  uuid_to_str(attr.uuid, uuid_str, sizeof(uuid_str));
725
726  return attr;
727}
728
729/*******************************************************************************
730 *
731 * Function         gatts_send_app_read_request
732 *
733 * Description      Send application read request callback
734 *
735 * Returns          status of operation.
736 *
737 ******************************************************************************/
738static tGATT_STATUS gatts_send_app_read_request(
739    tGATT_TCB* p_tcb, uint8_t op_code, uint16_t handle, uint16_t offset,
740    uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type) {
741  tGATT_SRV_LIST_ELEM& el = *gatt_sr_find_i_rcb_by_handle(handle);
742  uint16_t conn_id = GATT_CREATE_CONN_ID(p_tcb->tcb_idx, el.gatt_if);
743
744  if (trans_id == 0) {
745    trans_id = gatt_sr_enqueue_cmd(p_tcb, op_code, handle);
746    gatt_sr_update_cback_cnt(p_tcb, el.gatt_if, true, true);
747  }
748
749  if (trans_id != 0) {
750    tGATTS_DATA sr_data;
751    memset(&sr_data, 0, sizeof(tGATTS_DATA));
752
753    sr_data.read_req.handle = handle;
754    sr_data.read_req.is_long = (bool)(op_code == GATT_REQ_READ_BLOB);
755    sr_data.read_req.offset = offset;
756
757    uint8_t opcode;
758    if (gatt_type == BTGATT_DB_DESCRIPTOR) {
759      opcode = GATTS_REQ_TYPE_READ_DESCRIPTOR;
760    } else if (gatt_type == BTGATT_DB_CHARACTERISTIC) {
761      opcode = GATTS_REQ_TYPE_READ_CHARACTERISTIC;
762    } else {
763      GATT_TRACE_ERROR(
764          "%s: Attempt to read attribute that's not tied with"
765          " characteristic or descriptor value.",
766          __func__);
767      return GATT_ERROR;
768    }
769
770    gatt_sr_send_req_callback(conn_id, trans_id, opcode, &sr_data);
771    return (tGATT_STATUS)GATT_PENDING;
772  } else
773    return (tGATT_STATUS)GATT_BUSY; /* max pending command, application error */
774}
775