| /****************************************************************************** |
| * |
| * Copyright 2009-2012 Broadcom Corporation |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| ******************************************************************************/ |
| |
| /****************************************************************************** |
| * |
| * this file contains GATT database building and query functions |
| * |
| ******************************************************************************/ |
| |
| #include "bt_target.h" |
| |
| #include "bt_trace.h" |
| #include "bt_utils.h" |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include "btm_int.h" |
| #include "gatt_int.h" |
| #include "l2c_api.h" |
| #include "osi/include/osi.h" |
| |
| using base::StringPrintf; |
| using bluetooth::Uuid; |
| |
| /******************************************************************************* |
| * L O C A L F U N C T I O N P R O T O T Y P E S * |
| ******************************************************************************/ |
| static tGATT_ATTR& allocate_attr_in_db(tGATT_SVC_DB& db, const Uuid& uuid, |
| tGATT_PERM perm); |
| static tGATT_STATUS gatts_send_app_read_request( |
| tGATT_TCB& tcb, uint8_t op_code, uint16_t handle, uint16_t offset, |
| uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type); |
| |
| /** |
| * Initialize a memory space to be a service database. |
| */ |
| void gatts_init_service_db(tGATT_SVC_DB& db, const Uuid& service_uuid, |
| bool is_pri, uint16_t s_hdl, uint16_t num_handle) { |
| db.attr_list.reserve(num_handle); |
| |
| VLOG(1) << StringPrintf("%s: s_hdl= %d num_handle= %d", __func__, s_hdl, |
| num_handle); |
| |
| /* update service database information */ |
| db.next_handle = s_hdl; |
| db.end_handle = s_hdl + num_handle; |
| |
| /* add service declration record */ |
| Uuid uuid = |
| Uuid::From16Bit(is_pri ? GATT_UUID_PRI_SERVICE : GATT_UUID_SEC_SERVICE); |
| tGATT_ATTR& attr = allocate_attr_in_db(db, uuid, GATT_PERM_READ); |
| attr.p_value.reset((tGATT_ATTR_VALUE*)(new Uuid)); |
| attr.p_value->uuid = service_uuid; |
| } |
| |
| Uuid* gatts_get_service_uuid(tGATT_SVC_DB* p_db) { |
| if (!p_db || p_db->attr_list.empty()) { |
| LOG(ERROR) << "service DB empty"; |
| return NULL; |
| } else { |
| return &p_db->attr_list[0].p_value->uuid; |
| } |
| } |
| |
| /** Check attribute readability. Returns status of operation. */ |
| static tGATT_STATUS gatts_check_attr_readability(const tGATT_ATTR& attr, |
| UNUSED_ATTR uint16_t offset, |
| bool read_long, |
| tGATT_SEC_FLAG sec_flag, |
| uint8_t key_size) { |
| uint16_t min_key_size; |
| tGATT_PERM perm = attr.permission; |
| |
| min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); |
| if (min_key_size != 0) { |
| min_key_size += 6; |
| } |
| |
| if (!(perm & GATT_READ_ALLOWED)) { |
| LOG(ERROR) << __func__ << ": GATT_READ_NOT_PERMIT"; |
| return GATT_READ_NOT_PERMIT; |
| } |
| |
| if ((perm & GATT_READ_AUTH_REQUIRED) && |
| !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && |
| !(sec_flag & BTM_SEC_FLAG_ENCRYPTED)) { |
| LOG(ERROR) << __func__ << ": GATT_INSUF_AUTHENTICATION"; |
| return GATT_INSUF_AUTHENTICATION; |
| } |
| |
| if ((perm & GATT_READ_MITM_REQUIRED) && |
| !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) { |
| LOG(ERROR) << __func__ << ": GATT_INSUF_AUTHENTICATION: MITM Required"; |
| return GATT_INSUF_AUTHENTICATION; |
| } |
| |
| if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && |
| !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { |
| LOG(ERROR) << __func__ << ": GATT_INSUF_ENCRYPTION"; |
| return GATT_INSUF_ENCRYPTION; |
| } |
| |
| if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && |
| (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) { |
| LOG(ERROR) << __func__ << ": GATT_INSUF_KEY_SIZE"; |
| return GATT_INSUF_KEY_SIZE; |
| } |
| |
| if (read_long && attr.uuid.Is16Bit()) { |
| switch (attr.uuid.As16Bit()) { |
| case GATT_UUID_PRI_SERVICE: |
| case GATT_UUID_SEC_SERVICE: |
| case GATT_UUID_CHAR_DECLARE: |
| case GATT_UUID_INCLUDE_SERVICE: |
| case GATT_UUID_CHAR_EXT_PROP: |
| case GATT_UUID_CHAR_CLIENT_CONFIG: |
| case GATT_UUID_CHAR_SRVR_CONFIG: |
| case GATT_UUID_CHAR_PRESENT_FORMAT: |
| LOG(ERROR) << __func__ << ": GATT_NOT_LONG"; |
| return GATT_NOT_LONG; |
| |
| default: |
| break; |
| } |
| } |
| |
| return GATT_SUCCESS; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function read_attr_value |
| * |
| * Description Utility function to read an attribute value. |
| * |
| * Parameter attr16: pointer to the attribute to read. |
| * offset: read offset. |
| * p_data: output parameter to carry out the attribute value. |
| * read_long: this is a read blob request. |
| * mtu: MTU |
| * p_len: output parameter to carry out the attribute length. |
| * sec_flag: current link security status. |
| * key_size: encryption key size. |
| * |
| * Returns status of operation. |
| * |
| ******************************************************************************/ |
| static tGATT_STATUS read_attr_value(tGATT_ATTR& attr16, uint16_t offset, |
| uint8_t** p_data, bool read_long, |
| uint16_t mtu, uint16_t* p_len, |
| tGATT_SEC_FLAG sec_flag, uint8_t key_size) { |
| uint8_t* p = *p_data; |
| |
| VLOG(1) << __func__ << " uuid=" << attr16.uuid |
| << StringPrintf(" perm=0x%02x sec_flag=0x%x offset=%d read_long=%d", |
| attr16.permission, sec_flag, offset, read_long); |
| |
| tGATT_STATUS status = gatts_check_attr_readability(attr16, offset, read_long, |
| sec_flag, key_size); |
| if (status != GATT_SUCCESS) return status; |
| |
| if (!attr16.uuid.Is16Bit()) { |
| /* characteristic description or characteristic value */ |
| return GATT_PENDING; |
| } |
| |
| uint16_t uuid16 = attr16.uuid.As16Bit(); |
| |
| if (uuid16 == GATT_UUID_PRI_SERVICE || uuid16 == GATT_UUID_SEC_SERVICE) { |
| *p_len = gatt_build_uuid_to_stream_len(attr16.p_value->uuid); |
| if (mtu < *p_len) return GATT_NO_RESOURCES; |
| |
| gatt_build_uuid_to_stream(&p, attr16.p_value->uuid); |
| *p_data = p; |
| return GATT_SUCCESS; |
| } |
| |
| if (uuid16 == GATT_UUID_CHAR_DECLARE) { |
| tGATT_ATTR* val_attr = &attr16 + 1; |
| uint8_t val_len = val_attr->uuid.GetShortestRepresentationSize(); |
| *p_len = (val_len == Uuid::kNumBytes16) ? 5 : 19; |
| |
| if (mtu < *p_len) return GATT_NO_RESOURCES; |
| |
| UINT8_TO_STREAM(p, attr16.p_value->char_decl.property); |
| UINT16_TO_STREAM(p, attr16.p_value->char_decl.char_val_handle); |
| |
| if (val_len == Uuid::kNumBytes16) { |
| UINT16_TO_STREAM(p, val_attr->uuid.As16Bit()); |
| } else { |
| /* if 32 bit UUID, convert to 128 bit */ |
| ARRAY_TO_STREAM(p, val_attr->uuid.To128BitLE(), (int)Uuid::kNumBytes128); |
| } |
| *p_data = p; |
| return GATT_SUCCESS; |
| } |
| |
| if (uuid16 == GATT_UUID_INCLUDE_SERVICE) { |
| tGATT_INCL_SRVC& incl_handle = attr16.p_value->incl_handle; |
| if (incl_handle.service_type.Is16Bit()) |
| *p_len = 6; |
| else |
| *p_len = 4; |
| |
| if (mtu < *p_len) return GATT_NO_RESOURCES; |
| |
| UINT16_TO_STREAM(p, incl_handle.s_handle); |
| UINT16_TO_STREAM(p, incl_handle.e_handle); |
| |
| if (incl_handle.service_type.Is16Bit()) { |
| UINT16_TO_STREAM(p, incl_handle.service_type.As16Bit()); |
| } |
| *p_data = p; |
| return GATT_SUCCESS; |
| } |
| |
| /* characteristic description or characteristic value (again) */ |
| return GATT_PENDING; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_db_read_attr_value_by_type |
| * |
| * Description Query attribute value by attribute type. |
| * |
| * Parameter p_db: pointer to the attribute database. |
| * p_rsp: Read By type response data. |
| * s_handle: starting handle of the range we are looking for. |
| * e_handle: ending handle of the range we are looking for. |
| * type: Attribute type. |
| * mtu: MTU. |
| * sec_flag: current link security status. |
| * key_size: encryption key size. |
| * |
| * Returns Status of the operation. |
| * |
| ******************************************************************************/ |
| tGATT_STATUS gatts_db_read_attr_value_by_type( |
| tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, BT_HDR* p_rsp, |
| uint16_t s_handle, uint16_t e_handle, const Uuid& type, uint16_t* p_len, |
| tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id, |
| uint16_t* p_cur_handle) { |
| tGATT_STATUS status = GATT_NOT_FOUND; |
| uint16_t len = 0; |
| uint8_t* p = (uint8_t*)(p_rsp + 1) + p_rsp->len + L2CAP_MIN_OFFSET; |
| |
| if (p_db) { |
| for (tGATT_ATTR& attr : p_db->attr_list) { |
| if (attr.handle >= s_handle && type == attr.uuid) { |
| if (*p_len <= 2) { |
| status = GATT_NO_RESOURCES; |
| break; |
| } |
| |
| UINT16_TO_STREAM(p, attr.handle); |
| |
| status = read_attr_value(attr, 0, &p, false, (uint16_t)(*p_len - 2), |
| &len, sec_flag, key_size); |
| |
| if (status == GATT_PENDING) { |
| status = gatts_send_app_read_request(tcb, op_code, attr.handle, 0, |
| trans_id, attr.gatt_type); |
| |
| /* one callback at a time */ |
| break; |
| } else if (status == GATT_SUCCESS) { |
| if (p_rsp->offset == 0) p_rsp->offset = len + 2; |
| |
| if (p_rsp->offset == len + 2) { |
| p_rsp->len += (len + 2); |
| *p_len -= (len + 2); |
| } else { |
| LOG(ERROR) << "format mismatch"; |
| status = GATT_NO_RESOURCES; |
| break; |
| } |
| } else { |
| *p_cur_handle = attr.handle; |
| break; |
| } |
| } |
| } |
| } |
| |
| #if (BLE_DELAY_REQUEST_ENC == TRUE) |
| uint8_t flag = 0; |
| if (BTM_GetSecurityFlags(tcb.peer_bda, &flag)) { |
| if ((tcb.att_lcid == L2CAP_ATT_CID) && (status == GATT_PENDING) && |
| (type.As16Bit() == GATT_UUID_GAP_DEVICE_NAME)) { |
| if ((flag & (BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_FLAG_ENCRYPTED)) == |
| BTM_SEC_LINK_KEY_KNOWN) { |
| tACL_CONN* p = btm_bda_to_acl(tcb.peer_bda, BT_TRANSPORT_LE); |
| if ((p != NULL) && (p->link_role == BTM_ROLE_MASTER)) |
| btm_ble_set_encryption(tcb.peer_bda, BTM_BLE_SEC_ENCRYPT, |
| p->link_role); |
| } |
| } |
| } |
| #endif |
| return status; |
| } |
| |
| /** |
| * This function adds an included service into a database. |
| * |
| * Parameter db: database pointer. |
| * inc_srvc_type: included service type. |
| * |
| * Returns Status of the operation. |
| * |
| */ |
| uint16_t gatts_add_included_service(tGATT_SVC_DB& db, uint16_t s_handle, |
| uint16_t e_handle, const Uuid& service) { |
| Uuid uuid = Uuid::From16Bit(GATT_UUID_INCLUDE_SERVICE); |
| |
| VLOG(1) << __func__ |
| << StringPrintf(": s_hdl=0x%04x e_hdl=0x%04x ", s_handle, e_handle) |
| << "service uuid = " << service; |
| |
| if (service.IsEmpty() || s_handle == 0 || e_handle == 0) { |
| LOG(ERROR) << __func__ << ": Illegal Params."; |
| return 0; |
| } |
| |
| tGATT_ATTR& attr = allocate_attr_in_db(db, uuid, GATT_PERM_READ); |
| |
| attr.p_value.reset((tGATT_ATTR_VALUE*)(new tGATT_INCL_SRVC)); |
| attr.p_value->incl_handle.s_handle = s_handle; |
| attr.p_value->incl_handle.e_handle = e_handle; |
| attr.p_value->incl_handle.service_type = service; |
| |
| return attr.handle; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_add_characteristic |
| * |
| * Description This function add a characteristics and its descriptor into |
| * a servce identified by the service database pointer. |
| * |
| * Parameter db: database. |
| * perm: permission (authentication and key size requirements) |
| * property: property of the characteristic. |
| * p_char: characteristic value information. |
| * |
| * Returns Status of te operation. |
| * |
| ******************************************************************************/ |
| uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, |
| tGATT_CHAR_PROP property, |
| const Uuid& char_uuid) { |
| Uuid uuid = Uuid::From16Bit(GATT_UUID_CHAR_DECLARE); |
| |
| VLOG(1) << StringPrintf("%s: perm=0x%0x property=0x%0x", __func__, perm, |
| property); |
| |
| tGATT_ATTR& char_decl = allocate_attr_in_db(db, uuid, GATT_PERM_READ); |
| tGATT_ATTR& char_val = allocate_attr_in_db(db, char_uuid, perm); |
| |
| char_decl.p_value.reset((tGATT_ATTR_VALUE*)(new tGATT_CHAR_DECL)); |
| char_decl.p_value->char_decl.property = property; |
| char_decl.p_value->char_decl.char_val_handle = char_val.handle; |
| char_val.gatt_type = BTGATT_DB_CHARACTERISTIC; |
| return char_val.handle; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_add_char_descr |
| * |
| * Description This function add a characteristics descriptor. |
| * |
| * Parameter p_db: database pointer. |
| * perm: characteristic descriptor permission type. |
| * char_dscp_tpye: the characteristic descriptor masks. |
| * p_dscp_params: characteristic descriptors values. |
| * |
| * Returns Status of the operation. |
| * |
| ******************************************************************************/ |
| uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm, |
| const Uuid& descr_uuid) { |
| VLOG(1) << StringPrintf("gatts_add_char_descr uuid=%s", |
| descr_uuid.ToString().c_str()); |
| |
| /* Add characteristic descriptors */ |
| tGATT_ATTR& char_dscptr = allocate_attr_in_db(db, descr_uuid, perm); |
| char_dscptr.gatt_type = BTGATT_DB_DESCRIPTOR; |
| return char_dscptr.handle; |
| } |
| |
| /******************************************************************************/ |
| /* Service Attribute Database Query Utility Functions */ |
| /******************************************************************************/ |
| tGATT_ATTR* find_attr_by_handle(tGATT_SVC_DB* p_db, uint16_t handle) { |
| if (!p_db) return nullptr; |
| |
| for (auto& attr : p_db->attr_list) { |
| if (attr.handle == handle) return &attr; |
| if (attr.handle > handle) return nullptr; |
| } |
| |
| return nullptr; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_read_attr_value_by_handle |
| * |
| * Description Query attribute value by attribute handle. |
| * |
| * Parameter p_db: pointer to the attribute database. |
| * handle: Attribute handle to read. |
| * offset: Read offset. |
| * p_value: output parameter to carry out the attribute value. |
| * p_len: output parameter as attribute length read. |
| * read_long: this is a read blob request. |
| * mtu: MTU. |
| * sec_flag: current link security status. |
| * key_size: encryption key size |
| * |
| * Returns Status of operation. |
| * |
| ******************************************************************************/ |
| tGATT_STATUS gatts_read_attr_value_by_handle( |
| tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle, |
| uint16_t offset, uint8_t* p_value, uint16_t* p_len, uint16_t mtu, |
| tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) { |
| tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle); |
| if (!p_attr) return GATT_NOT_FOUND; |
| |
| uint8_t* pp = p_value; |
| tGATT_STATUS status = read_attr_value(*p_attr, offset, &pp, |
| (bool)(op_code == GATT_REQ_READ_BLOB), |
| mtu, p_len, sec_flag, key_size); |
| |
| if (status == GATT_PENDING) { |
| status = gatts_send_app_read_request(tcb, op_code, p_attr->handle, offset, |
| trans_id, p_attr->gatt_type); |
| } |
| return status; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_read_attr_perm_check |
| * |
| * Description Check attribute readability. |
| * |
| * Parameter p_db: pointer to the attribute database. |
| * handle: Attribute handle to read. |
| * offset: Read offset. |
| * p_value: output parameter to carry out the attribute value. |
| * p_len: output parameter as attribute length read. |
| * read_long: this is a read blob request. |
| * mtu: MTU. |
| * sec_flag: current link security status. |
| * key_size: encryption key size |
| * |
| * Returns Status of operation. |
| * |
| ******************************************************************************/ |
| tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB* p_db, bool is_long, |
| uint16_t handle, |
| tGATT_SEC_FLAG sec_flag, |
| uint8_t key_size) { |
| tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle); |
| if (!p_attr) return GATT_NOT_FOUND; |
| |
| return gatts_check_attr_readability(*p_attr, 0, is_long, sec_flag, key_size); |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_write_attr_perm_check |
| * |
| * Description Write attribute value into database. |
| * |
| * Parameter p_db: pointer to the attribute database. |
| * op_code:op code of this write. |
| * handle: handle of the attribute to write. |
| * offset: Write offset if write op code is write blob. |
| * p_data: Attribute value to write. |
| * len: attribute data length. |
| * sec_flag: current link security status. |
| * key_size: encryption key size |
| * |
| * Returns Status of the operation. |
| * |
| ******************************************************************************/ |
| tGATT_STATUS gatts_write_attr_perm_check(tGATT_SVC_DB* p_db, uint8_t op_code, |
| uint16_t handle, uint16_t offset, |
| uint8_t* p_data, uint16_t len, |
| tGATT_SEC_FLAG sec_flag, |
| uint8_t key_size) { |
| VLOG(1) << StringPrintf( |
| "%s: op_code=0x%0x handle=0x%04x offset=%d len=%d sec_flag=0x%0x " |
| "key_size=%d", |
| __func__, op_code, handle, offset, len, sec_flag, key_size); |
| |
| tGATT_ATTR* p_attr = find_attr_by_handle(p_db, handle); |
| if (!p_attr) return GATT_NOT_FOUND; |
| |
| tGATT_PERM perm = p_attr->permission; |
| uint16_t min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); |
| if (min_key_size != 0) { |
| min_key_size += 6; |
| } |
| VLOG(1) << StringPrintf("%s: p_attr->permission =0x%04x min_key_size==0x%04x", |
| __func__, p_attr->permission, min_key_size); |
| |
| if ((op_code == GATT_CMD_WRITE || op_code == GATT_REQ_WRITE) && |
| (perm & GATT_WRITE_SIGNED_PERM)) { |
| /* use the rules for the mixed security see section 10.2.3*/ |
| /* use security mode 1 level 2 when the following condition follows */ |
| /* LE security mode 2 level 1 and LE security mode 1 level 2 */ |
| if ((perm & GATT_PERM_WRITE_SIGNED) && (perm & GATT_PERM_WRITE_ENCRYPTED)) { |
| perm = GATT_PERM_WRITE_ENCRYPTED; |
| } |
| /* use security mode 1 level 3 when the following condition follows */ |
| /* LE security mode 2 level 2 and security mode 1 and LE */ |
| else if (((perm & GATT_PERM_WRITE_SIGNED_MITM) && |
| (perm & GATT_PERM_WRITE_ENCRYPTED)) || |
| /* LE security mode 2 and security mode 1 level 3 */ |
| ((perm & GATT_WRITE_SIGNED_PERM) && |
| (perm & GATT_PERM_WRITE_ENC_MITM))) { |
| perm = GATT_PERM_WRITE_ENC_MITM; |
| } |
| } |
| |
| tGATT_STATUS status = GATT_NOT_FOUND; |
| if ((op_code == GATT_SIGN_CMD_WRITE) && !(perm & GATT_WRITE_SIGNED_PERM)) { |
| status = GATT_WRITE_NOT_PERMIT; |
| VLOG(1) << __func__ << ": sign cmd write not allowed"; |
| } |
| if ((op_code == GATT_SIGN_CMD_WRITE) && |
| (sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { |
| status = GATT_INVALID_PDU; |
| LOG(ERROR) << __func__ |
| << ": Error!! sign cmd write sent on a encypted link"; |
| } else if (!(perm & GATT_WRITE_ALLOWED)) { |
| status = GATT_WRITE_NOT_PERMIT; |
| LOG(ERROR) << __func__ << ": GATT_WRITE_NOT_PERMIT"; |
| } |
| /* require authentication, but not been authenticated */ |
| else if ((perm & GATT_WRITE_AUTH_REQUIRED) && |
| !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED)) { |
| status = GATT_INSUF_AUTHENTICATION; |
| LOG(ERROR) << __func__ << ": GATT_INSUF_AUTHENTICATION"; |
| } else if ((perm & GATT_WRITE_MITM_REQUIRED) && |
| !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) { |
| status = GATT_INSUF_AUTHENTICATION; |
| LOG(ERROR) << __func__ << ": GATT_INSUF_AUTHENTICATION: MITM required"; |
| } else if ((perm & GATT_WRITE_ENCRYPTED_PERM) && |
| !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) { |
| status = GATT_INSUF_ENCRYPTION; |
| LOG(ERROR) << __func__ << ": GATT_INSUF_ENCRYPTION"; |
| } else if ((perm & GATT_WRITE_ENCRYPTED_PERM) && |
| (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && |
| (key_size < min_key_size)) { |
| status = GATT_INSUF_KEY_SIZE; |
| LOG(ERROR) << __func__ << ": GATT_INSUF_KEY_SIZE"; |
| } |
| /* LE security mode 2 attribute */ |
| else if (perm & GATT_WRITE_SIGNED_PERM && op_code != GATT_SIGN_CMD_WRITE && |
| !(sec_flag & GATT_SEC_FLAG_ENCRYPTED) && |
| (perm & GATT_WRITE_ALLOWED) == 0) { |
| status = GATT_INSUF_AUTHENTICATION; |
| LOG(ERROR) << __func__ |
| << ": GATT_INSUF_AUTHENTICATION: LE security mode 2 required"; |
| } else /* writable: must be char value declaration or char descritpors */ |
| { |
| uint16_t max_size = 0; |
| |
| if (p_attr->uuid.IsEmpty()) { |
| status = GATT_INVALID_PDU; |
| } else if (p_attr->uuid.Is16Bit()) { |
| switch (p_attr->uuid.As16Bit()) { |
| case GATT_UUID_CHAR_PRESENT_FORMAT: /* should be readable only */ |
| case GATT_UUID_CHAR_EXT_PROP: /* should be readable only */ |
| case GATT_UUID_CHAR_AGG_FORMAT: /* should be readable only */ |
| case GATT_UUID_CHAR_VALID_RANGE: |
| status = GATT_WRITE_NOT_PERMIT; |
| break; |
| |
| case GATT_UUID_CHAR_CLIENT_CONFIG: |
| FALLTHROUGH_INTENDED; /* FALLTHROUGH */ |
| case GATT_UUID_CHAR_SRVR_CONFIG: |
| max_size = 2; |
| FALLTHROUGH_INTENDED; /* FALLTHROUGH */ |
| case GATT_UUID_CHAR_DESCRIPTION: |
| default: /* any other must be character value declaration */ |
| status = GATT_SUCCESS; |
| break; |
| } |
| } else { // 32 or 128 bit UUID |
| status = GATT_SUCCESS; |
| } |
| |
| if (p_data == NULL && len > 0) { |
| return GATT_INVALID_PDU; |
| } |
| |
| /* these attribute does not allow write blob */ |
| if (p_attr->uuid.Is16Bit() && |
| (p_attr->uuid.As16Bit() == GATT_UUID_CHAR_CLIENT_CONFIG || |
| p_attr->uuid.As16Bit() == GATT_UUID_CHAR_SRVR_CONFIG)) { |
| if (op_code == GATT_REQ_PREPARE_WRITE && offset != 0) { |
| /* does not allow write blob */ |
| status = GATT_NOT_LONG; |
| LOG(ERROR) << __func__ << ": GATT_NOT_LONG"; |
| } else if (len != max_size) { |
| /* data does not match the required format */ |
| status = GATT_INVALID_ATTR_LEN; |
| LOG(ERROR) << __func__ << ": GATT_INVALID_PDU"; |
| } else { |
| return GATT_SUCCESS; |
| } |
| } |
| } |
| |
| return status; |
| } |
| |
| /** |
| * Description Allocate a memory space for a new attribute, and link this |
| * attribute into the database attribute list. |
| * |
| * |
| * Parameter p_db : database pointer. |
| * uuid: attribute UUID |
| * |
| * Returns pointer to the newly allocated attribute. |
| * |
| */ |
| static tGATT_ATTR& allocate_attr_in_db(tGATT_SVC_DB& db, const Uuid& uuid, |
| tGATT_PERM perm) { |
| if (db.next_handle >= db.end_handle) { |
| LOG(FATAL) << __func__ |
| << " wrong number of handles! handle_max = " << +db.end_handle |
| << ", next_handle = " << +db.next_handle; |
| } |
| |
| db.attr_list.emplace_back(); |
| tGATT_ATTR& attr = db.attr_list.back(); |
| attr.handle = db.next_handle++; |
| attr.uuid = uuid; |
| attr.permission = perm; |
| return attr; |
| } |
| |
| /******************************************************************************* |
| * |
| * Function gatts_send_app_read_request |
| * |
| * Description Send application read request callback |
| * |
| * Returns status of operation. |
| * |
| ******************************************************************************/ |
| static tGATT_STATUS gatts_send_app_read_request( |
| tGATT_TCB& tcb, uint8_t op_code, uint16_t handle, uint16_t offset, |
| uint32_t trans_id, bt_gatt_db_attribute_type_t gatt_type) { |
| tGATT_SRV_LIST_ELEM& el = *gatt_sr_find_i_rcb_by_handle(handle); |
| uint16_t conn_id = GATT_CREATE_CONN_ID(tcb.tcb_idx, el.gatt_if); |
| |
| if (trans_id == 0) { |
| trans_id = gatt_sr_enqueue_cmd(tcb, op_code, handle); |
| gatt_sr_update_cback_cnt(tcb, el.gatt_if, true, true); |
| } |
| |
| if (trans_id != 0) { |
| tGATTS_DATA sr_data; |
| memset(&sr_data, 0, sizeof(tGATTS_DATA)); |
| |
| sr_data.read_req.handle = handle; |
| sr_data.read_req.is_long = (bool)(op_code == GATT_REQ_READ_BLOB); |
| sr_data.read_req.offset = offset; |
| |
| uint8_t opcode; |
| if (gatt_type == BTGATT_DB_DESCRIPTOR) { |
| opcode = GATTS_REQ_TYPE_READ_DESCRIPTOR; |
| } else if (gatt_type == BTGATT_DB_CHARACTERISTIC) { |
| opcode = GATTS_REQ_TYPE_READ_CHARACTERISTIC; |
| } else { |
| LOG(ERROR) << __func__ |
| << ": Attempt to read attribute that's not tied with " |
| "characteristic or descriptor value."; |
| return GATT_ERROR; |
| } |
| |
| gatt_sr_send_req_callback(conn_id, trans_id, opcode, &sr_data); |
| return (tGATT_STATUS)GATT_PENDING; |
| } else |
| return (tGATT_STATUS)GATT_BUSY; /* max pending command, application error */ |
| } |