/******************************************************************************
|
*
|
* Copyright 2009-2013 Broadcom Corporation
|
*
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
* you may not use this file except in compliance with the License.
|
* You may obtain a copy of the License at:
|
*
|
* http://www.apache.org/licenses/LICENSE-2.0
|
*
|
* Unless required by applicable law or agreed to in writing, software
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
* See the License for the specific language governing permissions and
|
* limitations under the License.
|
*
|
******************************************************************************/
|
|
#define LOG_TAG "bt_btif_gatt"
|
|
#include "btif_gatt_util.h"
|
|
#include <errno.h>
|
#include <stdio.h>
|
#include <stdlib.h>
|
#include <string.h>
|
|
#include <hardware/bluetooth.h>
|
#include <hardware/bt_gatt.h>
|
|
#include "bt_common.h"
|
#include "bta_api.h"
|
#include "bta_gatt_api.h"
|
#include "bta_jv_api.h"
|
#include "btif_common.h"
|
#include "btif_config.h"
|
#include "btif_dm.h"
|
#include "btif_gatt.h"
|
#include "btif_storage.h"
|
#include "btif_util.h"
|
#include "osi/include/osi.h"
|
|
using bluetooth::Uuid;
|
|
/*******************************************************************************
|
* BTIF -> BTA conversion functions
|
******************************************************************************/
|
void btif_to_bta_response(tGATTS_RSP* p_dest, btgatt_response_t* p_src) {
|
p_dest->attr_value.auth_req = p_src->attr_value.auth_req;
|
p_dest->attr_value.handle = p_src->attr_value.handle;
|
p_dest->attr_value.len = p_src->attr_value.len;
|
p_dest->attr_value.offset = p_src->attr_value.offset;
|
memcpy(p_dest->attr_value.value, p_src->attr_value.value, GATT_MAX_ATTR_LEN);
|
}
|
|
/*******************************************************************************
|
* Encrypted link map handling
|
******************************************************************************/
|
|
#if (BLE_DELAY_REQUEST_ENC == FALSE)
|
static bool btif_gatt_is_link_encrypted(const RawAddress& bd_addr) {
|
return BTA_JvIsEncrypted(bd_addr);
|
}
|
|
static void btif_gatt_set_encryption_cb(UNUSED_ATTR const RawAddress& bd_addr,
|
UNUSED_ATTR tBTA_TRANSPORT transport,
|
tBTA_STATUS result) {
|
if (result != BTA_SUCCESS && result != BTA_BUSY) {
|
BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __func__, result);
|
}
|
}
|
#endif
|
|
#if (BLE_DELAY_REQUEST_ENC == FALSE)
|
void btif_gatt_check_encrypted_link(RawAddress bd_addr,
|
tGATT_TRANSPORT transport_link) {
|
tBTM_LE_PENC_KEYS key;
|
if ((btif_storage_get_ble_bonding_key(
|
&bd_addr, BTIF_DM_LE_KEY_PENC, (uint8_t*)&key,
|
sizeof(tBTM_LE_PENC_KEYS)) == BT_STATUS_SUCCESS) &&
|
!btif_gatt_is_link_encrypted(bd_addr)) {
|
BTIF_TRACE_DEBUG("%s: transport = %d", __func__, transport_link);
|
BTA_DmSetEncryption(bd_addr, transport_link, &btif_gatt_set_encryption_cb,
|
BTM_BLE_SEC_ENCRYPT);
|
}
|
}
|
#else
|
void btif_gatt_check_encrypted_link(UNUSED_ATTR RawAddress bd_addr,
|
UNUSED_ATTR tGATT_TRANSPORT
|
transport_link) {}
|
#endif
|
|
void btif_gatt_move_track_adv_data(btgatt_track_adv_info_t* p_dest,
|
btgatt_track_adv_info_t* p_src) {
|
memset(p_dest, 0, sizeof(btgatt_track_adv_info_t));
|
|
memcpy(p_dest, p_src, sizeof(btgatt_track_adv_info_t));
|
|
if (p_src->adv_pkt_len > 0) {
|
p_dest->p_adv_pkt_data = (uint8_t*)osi_malloc(p_src->adv_pkt_len);
|
memcpy(p_dest->p_adv_pkt_data, p_src->p_adv_pkt_data, p_src->adv_pkt_len);
|
osi_free_and_reset((void**)&p_src->p_adv_pkt_data);
|
}
|
|
if (p_src->scan_rsp_len > 0) {
|
p_dest->p_scan_rsp_data = (uint8_t*)osi_malloc(p_src->scan_rsp_len);
|
memcpy(p_dest->p_scan_rsp_data, p_src->p_scan_rsp_data,
|
p_src->scan_rsp_len);
|
osi_free_and_reset((void**)&p_src->p_scan_rsp_data);
|
}
|
}
|