/****************************************************************************** * * Copyright 2009-2012 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ #include <stdio.h> #include <stdlib.h> #include "bt_utils.h" #include "bta_api.h" #include "bta_dm_ci.h" #include "bta_dm_co.h" #include "bta_sys.h" #include "bte_appl.h" #include "btif_dm.h" #include "btif_storage.h" #include "osi/include/osi.h" // tBTE_APPL_CFG.ble_io_cap is set to BTM_IO_CAP_UNKNOWN at structure // initialization since btif_storage isn't ready yet for data to be fetched. // This value is initialized properly during first use by fetching properly // from btif_storage. tBTE_APPL_CFG bte_appl_cfg = { BTA_LE_AUTH_REQ_SC_MITM_BOND, // Authentication requirements BTM_IO_CAP_UNKNOWN, BTM_BLE_INITIATOR_KEY_SIZE, BTM_BLE_RESPONDER_KEY_SIZE, BTM_BLE_MAX_KEY_SIZE}; /******************************************************************************* * * Function bta_dm_co_get_compress_memory * * Description This callout function is executed by DM to get memory for compression * Parameters id - BTA SYS ID * memory_p - memory return by callout * memory_size - memory size * * Returns true for success, false for fail. * ******************************************************************************/ bool bta_dm_co_get_compress_memory(UNUSED_ATTR tBTA_SYS_ID id, UNUSED_ATTR uint8_t** memory_p, UNUSED_ATTR uint32_t* memory_size) { return true; } /******************************************************************************* * * Function bta_dm_co_io_req * * Description This callout function is executed by DM to get IO * capabilities of the local device for the Simple Pairing * process. * * Parameters bd_addr - The peer device * *p_io_cap - The local Input/Output capabilities * *p_oob_data - true, if OOB data is available for the peer * device. * *p_auth_req - true, if MITM protection is required. * * Returns void. * ******************************************************************************/ void bta_dm_co_io_req(UNUSED_ATTR const RawAddress& bd_addr, tBTA_IO_CAP* p_io_cap, tBTA_OOB_DATA* p_oob_data, tBTA_AUTH_REQ* p_auth_req, bool is_orig) { btif_dm_set_oob_for_io_req(p_oob_data); btif_dm_proc_io_req(bd_addr, p_io_cap, p_oob_data, p_auth_req, is_orig); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_oob_data = %d", *p_oob_data); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_io_cap = %d", *p_io_cap); BTIF_TRACE_DEBUG("bta_dm_co_io_req *p_auth_req = %d", *p_auth_req); BTIF_TRACE_DEBUG("bta_dm_co_io_req is_orig = %d", is_orig); } /******************************************************************************* * * Function bta_dm_co_io_rsp * * Description This callout function is executed by DM to report IO * capabilities of the peer device for the Simple Pairing * process. * * Parameters bd_addr - The peer device * io_cap - The remote Input/Output capabilities * oob_data - true, if OOB data is available for the peer * device. * auth_req - true, if MITM protection is required. * * Returns void. * ******************************************************************************/ void bta_dm_co_io_rsp(const RawAddress& bd_addr, tBTA_IO_CAP io_cap, tBTA_OOB_DATA oob_data, tBTA_AUTH_REQ auth_req) { btif_dm_proc_io_rsp(bd_addr, io_cap, oob_data, auth_req); } /******************************************************************************* * * Function bta_dm_co_lk_upgrade * * Description This callout function is executed by DM to check if the * platform wants allow link key upgrade * * Parameters bd_addr - The peer device * *p_upgrade - true, if link key upgrade is desired. * * Returns void. * ******************************************************************************/ void bta_dm_co_lk_upgrade(UNUSED_ATTR const RawAddress& bd_addr, UNUSED_ATTR bool* p_upgrade) {} /******************************************************************************* * * Function bta_dm_co_loc_oob * * Description This callout function is executed by DM to report the OOB * data of the local device for the Simple Pairing process * * Parameters valid - true, if the local OOB data is retrieved from LM * c - Simple Pairing Hash C * r - Simple Pairing Randomnizer R * * Returns void. * ******************************************************************************/ void bta_dm_co_loc_oob(bool valid, const Octet16& c, const Octet16& r) { BTIF_TRACE_DEBUG("bta_dm_co_loc_oob, valid = %d", valid); #ifdef BTIF_DM_OOB_TEST btif_dm_proc_loc_oob(valid, c, r); #endif } /******************************************************************************* * * Function bta_dm_co_rmt_oob * * Description This callout function is executed by DM to request the OOB * data for the remote device for the Simple Pairing process * Need to call bta_dm_ci_rmt_oob() in response * * Parameters bd_addr - The peer device * * Returns void. * ******************************************************************************/ void bta_dm_co_rmt_oob(const RawAddress& bd_addr) { Octet16 c; Octet16 r; bool result = false; #ifdef BTIF_DM_OOB_TEST result = btif_dm_proc_rmt_oob(bd_addr, &c, &r); #endif BTIF_TRACE_DEBUG("bta_dm_co_rmt_oob: result=%d", result); bta_dm_ci_rmt_oob(result, bd_addr, c, r); } /******************************************************************************* * * Function bta_dm_co_le_io_key_req * * Description This callout function is executed by DM to get BLE key * information * before SMP pairing gets going. * * Parameters bd_addr - The peer device * *p_max_key_size - max key size local device supported. * *p_init_key - initiator keys. * *p_resp_key - responder keys. * * Returns void. * ******************************************************************************/ void bta_dm_co_le_io_key_req(UNUSED_ATTR const RawAddress& bd_addr, uint8_t* p_max_key_size, tBTA_LE_KEY_TYPE* p_init_key, tBTA_LE_KEY_TYPE* p_resp_key) { BTIF_TRACE_ERROR("##################################"); BTIF_TRACE_ERROR("bta_dm_co_le_io_key_req: only setting max size to 16"); BTIF_TRACE_ERROR("##################################"); *p_max_key_size = 16; *p_init_key = *p_resp_key = (BTA_LE_KEY_PENC | BTA_LE_KEY_PID | BTA_LE_KEY_PCSRK | BTA_LE_KEY_LENC | BTA_LE_KEY_LID | BTA_LE_KEY_LCSRK); } /******************************************************************************* * * Function bta_dm_co_ble_local_key_reload * * Description This callout function is to load the local BLE keys if * available on the device. * * Parameters none * * Returns void. * ******************************************************************************/ void bta_dm_co_ble_load_local_keys(tBTA_DM_BLE_LOCAL_KEY_MASK* p_key_mask, Octet16* p_er, tBTA_BLE_LOCAL_ID_KEYS* p_id_keys) { BTIF_TRACE_DEBUG("##################################"); BTIF_TRACE_DEBUG( "bta_dm_co_ble_load_local_keys: Load local keys if any are persisted"); BTIF_TRACE_DEBUG("##################################"); btif_dm_get_ble_local_keys(p_key_mask, p_er, p_id_keys); } /******************************************************************************* * * Function bta_dm_co_ble_io_req * * Description This callout function is executed by DM to get BLE IO * capabilities before SMP pairing gets going. * * Parameters bd_addr - The peer device * *p_io_cap - The local Input/Output capabilities * *p_oob_data - true, if OOB data is available for the peer * device. * *p_auth_req - Auth request setting (Bonding and MITM * required or not) * *p_max_key_size - max key size local device supported. * *p_init_key - initiator keys. * *p_resp_key - responder keys. * * Returns void. * ******************************************************************************/ void bta_dm_co_ble_io_req(const RawAddress& bd_addr, tBTA_IO_CAP* p_io_cap, tBTA_OOB_DATA* p_oob_data, tBTA_LE_AUTH_REQ* p_auth_req, uint8_t* p_max_key_size, tBTA_LE_KEY_TYPE* p_init_key, tBTA_LE_KEY_TYPE* p_resp_key) { bte_appl_cfg.ble_io_cap = btif_storage_get_local_io_caps_ble(); /* Retrieve the properties from file system if possible */ tBTE_APPL_CFG nv_config; if (btif_dm_get_smp_config(&nv_config)) bte_appl_cfg = nv_config; /* *p_auth_req by default is false for devices with NoInputNoOutput; true for * other devices. */ if (bte_appl_cfg.ble_auth_req) *p_auth_req = bte_appl_cfg.ble_auth_req | (bte_appl_cfg.ble_auth_req & 0x04) | ((*p_auth_req) & 0x04); /* if OOB is not supported, this call-out function does not need to do * anything * otherwise, look for the OOB data associated with the address and set * *p_oob_data accordingly. * If the answer can not be obtained right away, * set *p_oob_data to BTA_OOB_UNKNOWN and call bta_dm_ci_io_req() when the * answer is available. */ btif_dm_set_oob_for_le_io_req(bd_addr, p_oob_data, p_auth_req); if (bte_appl_cfg.ble_io_cap <= 4) *p_io_cap = bte_appl_cfg.ble_io_cap; if (bte_appl_cfg.ble_init_key <= BTM_BLE_INITIATOR_KEY_SIZE) *p_init_key = bte_appl_cfg.ble_init_key; if (bte_appl_cfg.ble_resp_key <= BTM_BLE_RESPONDER_KEY_SIZE) *p_resp_key = bte_appl_cfg.ble_resp_key; if (bte_appl_cfg.ble_max_key_size > 7 && bte_appl_cfg.ble_max_key_size <= 16) *p_max_key_size = bte_appl_cfg.ble_max_key_size; }