OSDN Git Service

Refactor usage of osi_free() and osi_freebuf()
[android-x86/system-bt.git] / btif / src / btif_gatt_util.c
1 /******************************************************************************
2  *
3  *  Copyright (C) 2009-2013 Broadcom Corporation
4  *
5  *  Licensed under the Apache License, Version 2.0 (the "License");
6  *  you may not use this file except in compliance with the License.
7  *  You may obtain a copy of the License at:
8  *
9  *  http://www.apache.org/licenses/LICENSE-2.0
10  *
11  *  Unless required by applicable law or agreed to in writing, software
12  *  distributed under the License is distributed on an "AS IS" BASIS,
13  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  *  See the License for the specific language governing permissions and
15  *  limitations under the License.
16  *
17  ******************************************************************************/
18
19 #define LOG_TAG "bt_btif_gatt"
20
21 #include "btif_gatt_util.h"
22
23 #include <errno.h>
24 #include <stdio.h>
25 #include <stdlib.h>
26 #include <string.h>
27
28 #include <hardware/bluetooth.h>
29 #include <hardware/bt_gatt.h>
30
31 #include "bdaddr.h"
32 #include "bta_api.h"
33 #include "bta_gatt_api.h"
34 #include "bta_jv_api.h"
35 #include "btif_common.h"
36 #include "btif_config.h"
37 #include "btif_dm.h"
38 #include "btif_gatt.h"
39 #include "btif_storage.h"
40 #include "btif_util.h"
41 #include "bt_common.h"
42
43 #if BTA_GATT_INCLUDED == TRUE
44
45 #define GATTC_READ_VALUE_TYPE_VALUE          0x0000  /* Attribute value itself */
46 #define GATTC_READ_VALUE_TYPE_AGG_FORMAT     0x2905  /* Characteristic Aggregate Format*/
47
48 static unsigned char BASE_UUID[16] = {
49     0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
50     0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
51 };
52
53 int uuidType(unsigned char* p_uuid)
54 {
55     int i = 0;
56     int match = 0;
57     int all_zero = 1;
58
59     for(i = 0; i != 16; ++i)
60     {
61         if (i == 12 || i == 13)
62             continue;
63
64         if (p_uuid[i] == BASE_UUID[i])
65             ++match;
66
67         if (p_uuid[i] != 0)
68             all_zero = 0;
69     }
70     if (all_zero)
71         return 0;
72     if (match == 12)
73         return LEN_UUID_32;
74     if (match == 14)
75         return LEN_UUID_16;
76     return LEN_UUID_128;
77 }
78
79 /*******************************************************************************
80  * BTIF -> BTA conversion functions
81  *******************************************************************************/
82
83 void btif_to_bta_uuid(tBT_UUID *p_dest, bt_uuid_t *p_src)
84 {
85     char *p_byte = (char*)p_src;
86     int i = 0;
87
88     p_dest->len = uuidType(p_src->uu);
89
90     switch (p_dest->len)
91     {
92         case LEN_UUID_16:
93             p_dest->uu.uuid16 = (p_src->uu[13] << 8) + p_src->uu[12];
94             break;
95
96         case LEN_UUID_32:
97             p_dest->uu.uuid32  = (p_src->uu[13] <<  8) + p_src->uu[12];
98             p_dest->uu.uuid32 += (p_src->uu[15] << 24) + (p_src->uu[14] << 16);
99             break;
100
101         case LEN_UUID_128:
102             for(i = 0; i != 16; ++i)
103                 p_dest->uu.uuid128[i] = p_byte[i];
104             break;
105
106         default:
107             LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __FUNCTION__, p_dest->len);
108             break;
109     }
110 }
111
112 void btif_to_bta_gatt_id(tBTA_GATT_ID *p_dest, btgatt_gatt_id_t *p_src)
113 {
114     p_dest->inst_id = p_src->inst_id;
115     btif_to_bta_uuid(&p_dest->uuid, &p_src->uuid);
116 }
117
118 void btif_to_bta_srvc_id(tBTA_GATT_SRVC_ID *p_dest, btgatt_srvc_id_t *p_src)
119 {
120     p_dest->id.inst_id = p_src->id.inst_id;
121     btif_to_bta_uuid(&p_dest->id.uuid, &p_src->id.uuid);
122     p_dest->is_primary = p_src->is_primary;
123 }
124
125 void btif_to_bta_response(tBTA_GATTS_RSP *p_dest, btgatt_response_t* p_src)
126 {
127     p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
128     p_dest->attr_value.handle   = p_src->attr_value.handle;
129     p_dest->attr_value.len      = p_src->attr_value.len;
130     p_dest->attr_value.offset   = p_src->attr_value.offset;
131     memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN);
132 }
133
134 void btif_to_bta_uuid_mask(tBTA_DM_BLE_PF_COND_MASK *p_mask, bt_uuid_t *p_src)
135 {
136     char *p_byte = (char*)p_src;
137     int i = 0;
138
139     switch (uuidType(p_src->uu))
140     {
141         case LEN_UUID_16:
142             p_mask->uuid16_mask = (p_src->uu[13] << 8) + p_src->uu[12];
143             break;
144
145         case LEN_UUID_32:
146             p_mask->uuid32_mask = (p_src->uu[13] <<  8) + p_src->uu[12];
147             p_mask->uuid32_mask += (p_src->uu[15] << 24) + (p_src->uu[14] << 16);
148             break;
149
150         case LEN_UUID_128:
151             for(i = 0; i != 16; ++i)
152                 p_mask->uuid128_mask[i] = p_byte[i];
153             break;
154
155         default:
156             break;
157     }
158 }
159
160 /*******************************************************************************
161  * BTA -> BTIF conversion functions
162  *******************************************************************************/
163
164 void bta_to_btif_uuid(bt_uuid_t *p_dest, tBT_UUID *p_src)
165 {
166     int i = 0;
167
168     if (p_src->len == LEN_UUID_16 || p_src->len == LEN_UUID_32)
169     {
170         for(i=0; i != 16; ++i)
171             p_dest->uu[i] = BASE_UUID[i];
172     }
173
174     switch (p_src->len)
175     {
176         case 0:
177             break;
178
179         case LEN_UUID_16:
180             p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
181             p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
182             break;
183
184         case LEN_UUID_32:
185             p_dest->uu[12] = p_src->uu.uuid16 & 0xff;
186             p_dest->uu[13] = (p_src->uu.uuid16 >> 8) & 0xff;
187             p_dest->uu[14] = (p_src->uu.uuid32 >> 16) & 0xff;
188             p_dest->uu[15] = (p_src->uu.uuid32 >> 24) & 0xff;
189             break;
190
191         case LEN_UUID_128:
192             for(i=0; i != 16; ++i)
193                 p_dest->uu[i] = p_src->uu.uuid128[i];
194             break;
195
196         default:
197             LOG_ERROR(LOG_TAG, "%s: Unknown UUID length %d!", __FUNCTION__, p_src->len);
198             break;
199     }
200 }
201
202 void bta_to_btif_gatt_id(btgatt_gatt_id_t *p_dest, tBTA_GATT_ID *p_src)
203 {
204     p_dest->inst_id = p_src->inst_id;
205     bta_to_btif_uuid(&p_dest->uuid, &p_src->uuid);
206 }
207
208 void bta_to_btif_srvc_id(btgatt_srvc_id_t *p_dest, tBTA_GATT_SRVC_ID *p_src)
209 {
210     p_dest->id.inst_id = p_src->id.inst_id;
211     bta_to_btif_uuid(&p_dest->id.uuid, &p_src->id.uuid);
212     p_dest->is_primary = p_src->is_primary;
213 }
214
215 /*******************************************************************************
216  * Utility functions
217  *******************************************************************************/
218
219 uint16_t get_uuid16(tBT_UUID *p_uuid)
220 {
221     if (p_uuid->len == LEN_UUID_16)
222     {
223         return p_uuid->uu.uuid16;
224     }
225     else if (p_uuid->len == LEN_UUID_128)
226     {
227         UINT16 u16;
228         UINT8 *p = &p_uuid->uu.uuid128[LEN_UUID_128 - 4];
229         STREAM_TO_UINT16(u16, p);
230         return u16;
231     }
232     else  /* p_uuid->len == LEN_UUID_32 */
233     {
234         return(UINT16) p_uuid->uu.uuid32;
235     }
236 }
237
238 uint16_t set_read_value(btgatt_read_params_t *p_dest, tBTA_GATTC_READ *p_src)
239 {
240     uint16_t descr_type = 0;
241     uint16_t len = 0;
242
243     p_dest->status = p_src->status;
244     bta_to_btif_srvc_id(&p_dest->srvc_id, &p_src->srvc_id);
245     bta_to_btif_gatt_id(&p_dest->char_id, &p_src->char_id);
246     bta_to_btif_gatt_id(&p_dest->descr_id, &p_src->descr_type);
247
248     descr_type = get_uuid16(&p_src->descr_type.uuid);
249
250     switch (descr_type)
251     {
252         case GATT_UUID_CHAR_AGG_FORMAT:
253             /* not supported */
254             p_dest->value_type = GATTC_READ_VALUE_TYPE_AGG_FORMAT;
255             break;
256
257         default:
258             if (( p_src->status == BTA_GATT_OK ) &&(p_src->p_value != NULL))
259             {
260                 LOG_INFO(LOG_TAG, "%s unformat.len = %d ", __FUNCTION__, p_src->p_value->unformat.len);
261                 p_dest->value.len = p_src->p_value->unformat.len;
262                 if ( p_src->p_value->unformat.len > 0  && p_src->p_value->unformat.p_value != NULL )
263                 {
264                     memcpy(p_dest->value.value, p_src->p_value->unformat.p_value,
265                            p_src->p_value->unformat.len);
266                 }
267                 len += p_src->p_value->unformat.len;
268             }
269             else
270             {
271                 p_dest->value.len = 0;
272             }
273
274             p_dest->value_type = GATTC_READ_VALUE_TYPE_VALUE;
275             break;
276     }
277
278     return len;
279 }
280
281 /*******************************************************************************
282  * Encrypted link map handling
283  *******************************************************************************/
284
285 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_TRANSPORT transport, tBTA_STATUS result);
286
287 static BOOLEAN btif_gatt_is_link_encrypted (BD_ADDR bd_addr)
288 {
289     if (bd_addr == NULL)
290         return FALSE;
291
292     return BTA_JvIsEncrypted(bd_addr);
293 }
294
295 static void btif_gatt_set_encryption_cb (BD_ADDR bd_addr, tBTA_TRANSPORT transport, tBTA_STATUS result)
296 {
297     UNUSED(bd_addr);
298     UNUSED(transport);
299
300     if (result != BTA_SUCCESS && result != BTA_BUSY)
301     {
302         BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __FUNCTION__, result);
303     }
304 }
305
306 void btif_gatt_check_encrypted_link (BD_ADDR bd_addr, tBTA_GATT_TRANSPORT transport_link)
307 {
308     char buf[100];
309
310     bt_bdaddr_t bda;
311     bdcpy(bda.address, bd_addr);
312
313 #if (!defined(BLE_DELAY_REQUEST_ENC) || (BLE_DELAY_REQUEST_ENC == FALSE))
314     if ((btif_storage_get_ble_bonding_key(&bda, BTIF_DM_LE_KEY_PENC,
315                     buf, sizeof(tBTM_LE_PENC_KEYS)) == BT_STATUS_SUCCESS)
316         && !btif_gatt_is_link_encrypted(bd_addr))
317     {
318         BTIF_TRACE_DEBUG ("%s: transport = %d", __func__, transport_link);
319         BTA_DmSetEncryption(bd_addr,transport_link,
320                             &btif_gatt_set_encryption_cb, BTM_BLE_SEC_ENCRYPT);
321     }
322 #endif
323 }
324
325 #endif
326
327 void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t *p_dest,
328                               btgatt_track_adv_info_t *p_src)
329 {
330     memset(p_dest, 0, sizeof(btgatt_track_adv_info_t));
331
332     memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t));
333
334     if (p_src->adv_pkt_len > 0)
335     {
336         p_dest->p_adv_pkt_data = osi_getbuf(p_src->adv_pkt_len);
337         memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data,
338                p_src->adv_pkt_len);
339         osi_freebuf_and_reset((void **)&p_src->p_adv_pkt_data);
340     }
341
342     if (p_src->scan_rsp_len > 0)
343     {
344         p_dest->p_scan_rsp_data = osi_getbuf(p_src->scan_rsp_len);
345         memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data,
346                p_src->scan_rsp_len);
347         osi_freebuf_and_reset((void **)&p_src->p_scan_rsp_data);
348     }
349 }
350