/****************************************************************************** * * Copyright 2009-2013 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ #define LOG_TAG "bt_btif_gatt" #include "btif_gatt_util.h" #include #include #include #include #include #include #include "bt_common.h" #include "bta_api.h" #include "bta_gatt_api.h" #include "bta_jv_api.h" #include "btif_common.h" #include "btif_config.h" #include "btif_dm.h" #include "btif_gatt.h" #include "btif_storage.h" #include "btif_util.h" #include "osi/include/osi.h" using bluetooth::Uuid; /******************************************************************************* * BTIF -> BTA conversion functions ******************************************************************************/ void btif_to_bta_response(tGATTS_RSP* p_dest, btgatt_response_t* p_src) { p_dest->attr_value.auth_req = p_src->attr_value.auth_req; p_dest->attr_value.handle = p_src->attr_value.handle; p_dest->attr_value.len = p_src->attr_value.len; p_dest->attr_value.offset = p_src->attr_value.offset; memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN); } /******************************************************************************* * Encrypted link map handling ******************************************************************************/ #if (BLE_DELAY_REQUEST_ENC == FALSE) static bool btif_gatt_is_link_encrypted(const RawAddress& bd_addr) { return BTA_JvIsEncrypted(bd_addr); } static void btif_gatt_set_encryption_cb(UNUSED_ATTR const RawAddress& bd_addr, UNUSED_ATTR tBTA_TRANSPORT transport, tBTA_STATUS result) { if (result != BTA_SUCCESS && result != BTA_BUSY) { BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __func__, result); } } #endif #if (BLE_DELAY_REQUEST_ENC == FALSE) void btif_gatt_check_encrypted_link(RawAddress bd_addr, tGATT_TRANSPORT transport_link) { tBTM_LE_PENC_KEYS key; if ((btif_storage_get_ble_bonding_key( bd_addr, BTIF_DM_LE_KEY_PENC, (uint8_t*)&key, sizeof(tBTM_LE_PENC_KEYS)) == BT_STATUS_SUCCESS) && !btif_gatt_is_link_encrypted(bd_addr)) { BTIF_TRACE_DEBUG("%s: transport = %d", __func__, transport_link); BTA_DmSetEncryption(bd_addr, transport_link, &btif_gatt_set_encryption_cb, BTM_BLE_SEC_ENCRYPT); } } #else void btif_gatt_check_encrypted_link(UNUSED_ATTR RawAddress bd_addr, UNUSED_ATTR tGATT_TRANSPORT transport_link) {} #endif void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t* p_dest, btgatt_track_adv_info_t* p_src) { memset(p_dest, 0, sizeof(btgatt_track_adv_info_t)); memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t)); if (p_src->adv_pkt_len > 0) { p_dest->p_adv_pkt_data = (uint8_t*)osi_malloc(p_src->adv_pkt_len); memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data, p_src->adv_pkt_len); osi_free_and_reset((void**)&p_src->p_adv_pkt_data); } if (p_src->scan_rsp_len > 0) { p_dest->p_scan_rsp_data = (uint8_t*)osi_malloc(p_src->scan_rsp_len); memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data, p_src->scan_rsp_len); osi_free_and_reset((void**)&p_src->p_scan_rsp_data); } }