aboutsummaryrefslogtreecommitdiff
path: root/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c
diff options
context:
space:
mode:
Diffstat (limited to 'thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c')
-rw-r--r--thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c246
1 files changed, 246 insertions, 0 deletions
diff --git a/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c b/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c
new file mode 100644
index 0000000..6ab51de
--- /dev/null
+++ b/thirdparty/nRF5_SDK_15.0.0_a53641a/components/ble/ble_services/eddystone/es_gatts_read.c
@@ -0,0 +1,246 @@
+/**
+ * Copyright (c) 2016 - 2018, Nordic Semiconductor ASA
+ *
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form, except as embedded into a Nordic
+ * Semiconductor ASA integrated circuit in a product or a software update for
+ * such product, must reproduce the above copyright notice, this list of
+ * conditions and the following disclaimer in the documentation and/or other
+ * materials provided with the distribution.
+ *
+ * 3. Neither the name of Nordic Semiconductor ASA nor the names of its
+ * contributors may be used to endorse or promote products derived from this
+ * software without specific prior written permission.
+ *
+ * 4. This software, with or without modification, must only be used with a
+ * Nordic Semiconductor ASA integrated circuit.
+ *
+ * 5. Any software provided in binary form under this license must not be reverse
+ * engineered, decompiled, modified and/or disassembled.
+ *
+ * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
+ * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#include "es_gatts_read.h"
+#include "es_adv.h"
+#include "es_gatts.h"
+#include "es_security.h"
+#include "es_slot.h"
+
+static ret_code_t send_read_reply(nrf_ble_escs_t * p_escs, ble_gatts_rw_authorize_reply_params_t * p_reply)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+ VERIFY_PARAM_NOT_NULL(p_reply);
+
+ p_reply->type = BLE_GATTS_AUTHORIZE_TYPE_READ;
+ p_reply->params.read.update = 1;
+ p_reply->params.read.offset = 0;
+
+ return es_gatts_send_reply(p_escs, p_reply);
+}
+
+
+static ret_code_t read_value(nrf_ble_escs_t * p_escs, uint8_t length, const void * p_value)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+ VERIFY_PARAM_NOT_NULL(p_value);
+
+ ble_gatts_rw_authorize_reply_params_t reply = {0};
+ reply.params.read.len = length;
+ reply.params.read.p_data = p_value;
+ reply.params.read.gatt_status = BLE_GATT_STATUS_SUCCESS;
+
+ return send_read_reply(p_escs, &reply);
+}
+
+
+static ret_code_t read_from_gattdb(nrf_ble_escs_t * p_escs, uint16_t val_handle)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+
+ ret_code_t err_code;
+
+ // Go straight to the characteristic
+ uint8_t value_buffer[ESCS_ADV_SLOT_CHAR_LENGTH_MAX] = {0};
+ ble_gatts_value_t value = {.len = sizeof(value_buffer),
+ .offset = 0,
+ .p_value = &(value_buffer[0])};
+
+ err_code = sd_ble_gatts_value_get(p_escs->conn_handle, val_handle, &value);
+ RETURN_IF_ERROR(err_code);
+
+ return read_value(p_escs, value.len, value.p_value);
+}
+
+
+static ret_code_t read_adv_slot(nrf_ble_escs_t * p_escs, uint8_t active_slot, const es_slot_reg_t * p_reg)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+
+ ble_gatts_rw_authorize_reply_params_t reply = {0};
+ uint8_t eid_buf[14];
+
+ // If an EID slot is read, load scaler, clock value and ephemeral ID.
+ if (p_reg->slots[active_slot].adv_frame.type == ES_FRAME_TYPE_EID)
+ {
+ /*lint -save -e666 */
+ uint32_t clock_value = es_security_clock_get(active_slot);
+ clock_value = BYTES_REVERSE_32BIT(clock_value);
+ /*lint -restore */
+
+ reply.params.read.len = ES_EID_GATTS_READ_LENGTH;
+
+ // Fill EID buffer with data
+ eid_buf[ES_EID_GATTS_READ_FRAME_TYPE_IDX] = ES_FRAME_TYPE_EID;
+ eid_buf[ES_EID_GATTS_READ_EXPONENT_IDX] = es_security_scaler_get(active_slot);
+
+ memcpy(&eid_buf[ES_EID_GATTS_READ_CLCK_VALUE_IDX], &clock_value, sizeof(clock_value));
+ /*lint -save -e545 */
+ memcpy(&eid_buf[ES_EID_GATTS_READ_EID_IDX],
+ &p_reg->slots[active_slot].adv_frame.frame.eid.eid,
+ ES_EID_ID_LENGTH);
+ /*lint -restore */
+ reply.params.read.p_data = eid_buf;
+ }
+
+ // Otherwise, simply load the contents of the frame.
+ else
+ {
+ // Check if slot being read is an eTLM slot.
+ if ((p_reg->num_configured_eid_slots > 0) && p_reg->tlm_configured && (p_reg->tlm_slot == active_slot))
+ {
+ // Fill eTLM slot using EID key from first EID slot.
+ es_slot_etlm_update(p_reg->eid_slots_configured[0]);
+ }
+ reply.params.read.len = p_reg->slots[active_slot].adv_frame.length;
+ reply.params.read.p_data = (uint8_t *)&p_reg->slots[active_slot].adv_frame.frame;
+ }
+
+ reply.params.read.gatt_status = BLE_GATT_STATUS_SUCCESS;
+
+ return send_read_reply(p_escs, &reply);
+}
+
+
+ret_code_t es_gatts_read_handle_locked_read(nrf_ble_escs_t * p_escs, uint16_t uuid, uint8_t lock_state)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+
+ if (uuid == BLE_UUID_ESCS_REMAIN_CONNECTABLE_CHAR)
+ {
+ uint8_t retval = APP_IS_REMAIN_CONNECTABLE_SUPPORTED;
+ return read_value(p_escs, sizeof(retval), &retval);
+ }
+
+ else if (uuid == BLE_UUID_ESCS_LOCK_STATE_CHAR)
+ {
+ return read_value(p_escs, sizeof(lock_state), &lock_state);
+ }
+
+ else
+ {
+ return es_gatts_send_op_not_permitted(p_escs, true);
+ }
+}
+
+
+ret_code_t es_gatts_read_handle_unlock(nrf_ble_escs_t * p_escs)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+
+ ret_code_t err_code;
+ uint8_t key_buff[ESCS_AES_KEY_SIZE];
+
+ err_code = es_security_random_challenge_generate(key_buff);
+ RETURN_IF_ERROR(err_code);
+
+ es_security_unlock_prepare(key_buff);
+
+ return read_value(p_escs, ESCS_AES_KEY_SIZE, key_buff);
+}
+
+
+ret_code_t es_gatts_read_handle_unlocked_read(nrf_ble_escs_t * p_escs,
+ uint16_t uuid,
+ uint16_t val_handle,
+ uint8_t active_slot,
+ uint8_t lock_state)
+{
+ VERIFY_PARAM_NOT_NULL(p_escs);
+
+ const es_slot_reg_t * p_reg = es_slot_get_registry();
+
+ switch (uuid)
+ {
+ case BLE_UUID_ESCS_BROADCAST_CAP_CHAR:
+ case BLE_UUID_ESCS_UNLOCK_CHAR:
+ case BLE_UUID_ESCS_PUBLIC_ECDH_KEY_CHAR:
+ case BLE_UUID_ESCS_ACTIVE_SLOT_CHAR:
+ return read_from_gattdb(p_escs, val_handle);
+
+ case BLE_UUID_ESCS_LOCK_STATE_CHAR:
+ return read_value(p_escs, sizeof(lock_state), &lock_state);
+
+ case BLE_UUID_ESCS_ADV_INTERVAL_CHAR:
+ {
+ nrf_ble_escs_adv_interval_t adv_interval = es_adv_interval_get();
+ adv_interval = BYTES_SWAP_16BIT(adv_interval);
+ return read_value(p_escs, sizeof(adv_interval), &adv_interval);
+ }
+
+ case BLE_UUID_ESCS_RADIO_TX_PWR_CHAR:
+ return read_value(p_escs,
+ sizeof(nrf_ble_escs_radio_tx_pwr_t),
+ &p_reg->slots[active_slot].radio_tx_pwr);
+
+ case BLE_UUID_ESCS_ADV_TX_PWR_CHAR:
+ return read_value(p_escs,
+ sizeof(nrf_ble_escs_radio_tx_pwr_t),
+ p_reg->slots[active_slot].adv_custom_tx_power
+ ? (uint8_t *)(&p_reg->slots[active_slot].custom_tx_power)
+ : (uint8_t *)(&p_reg->slots[active_slot].radio_tx_pwr));
+
+ case BLE_UUID_ESCS_REMAIN_CONNECTABLE_CHAR:
+ {
+ uint8_t retval = APP_IS_REMAIN_CONNECTABLE_SUPPORTED;
+ return read_value(p_escs, sizeof(retval), &retval);
+ }
+
+ case BLE_UUID_ESCS_EID_ID_KEY_CHAR:
+ if (p_reg->slots[active_slot].configured &&
+ (p_reg->slots[active_slot].adv_frame.type == ES_FRAME_TYPE_EID))
+ {
+ return read_value(p_escs,
+ sizeof(nrf_ble_escs_eid_id_key_t),
+ &p_reg->slots[active_slot].encrypted_eid_id_key);
+ }
+
+ else
+ {
+ return es_gatts_send_op_not_permitted(p_escs, true);
+ }
+
+ case BLE_UUID_ESCS_RW_ADV_SLOT_CHAR:
+ return read_adv_slot(p_escs, active_slot, p_reg);
+
+ default:
+ return NRF_ERROR_INVALID_PARAM;
+ }
+}