btstack/src/btstack_util.h

182 lines
6.6 KiB
C
Raw Normal View History

/*
2015-02-06 16:19:27 +00:00
* Copyright (C) 2014 BlueKitchen GmbH
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the copyright holders nor the names of
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
2015-02-06 16:19:27 +00:00
* 4. Any redistribution, use, or modification is done solely for
* personal benefit and not for any commercial purpose or for
* monetary gain.
*
2015-02-06 16:19:27 +00:00
* THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
* RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
2015-02-06 16:19:27 +00:00
* Please inquire about commercial licensing options at
* contact@bluekitchen-gmbh.com
*
*/
2009-07-23 21:43:37 +00:00
/*
* btstack_util.h
2009-07-23 21:43:37 +00:00
*
* General utility functions
*
* Created by Matthias Ringwald on 7/23/09.
*/
#ifndef __UTILS_H
#define __UTILS_H
2009-07-23 21:43:37 +00:00
2011-06-05 09:52:22 +00:00
#if defined __cplusplus
extern "C" {
#endif
2011-06-05 11:23:15 +00:00
#include <stdint.h>
2009-07-23 21:43:37 +00:00
/**
* @brief hci connection handle type
*/
typedef uint16_t hci_con_handle_t;
/**
* @brief Length of a bluetooth device address.
*/
#define BD_ADDR_LEN 6
typedef uint8_t bd_addr_t[BD_ADDR_LEN];
/**
2014-01-16 17:51:30 +00:00
* @brief link key and its type
2009-07-23 21:43:37 +00:00
*/
#define LINK_KEY_LEN 16
2015-02-12 14:23:06 +00:00
#define LINK_KEY_STR_LEN (LINK_KEY_LEN*2)
2009-07-23 21:43:37 +00:00
typedef uint8_t link_key_t[LINK_KEY_LEN];
2014-01-16 17:51:30 +00:00
typedef enum {
COMBINATION_KEY = 0, // standard pairing
LOCAL_UNIT_KEY, // ?
REMOTE_UNIT_KEY, // ?
DEBUG_COMBINATION_KEY, // SSP with debug
UNAUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P192, // SSP Simple Pairing
AUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P192, // SSP Passkey, Number confirm, OOB
CHANGED_COMBINATION_KEY, // Link key changed using Change Connection Lnk Key
UNAUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P256, // SSP Simpe Pairing
AUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P256, // SSP Passkey, Number confirm, OOB
2014-01-16 17:51:30 +00:00
} link_key_type_t;
2014-01-03 19:19:37 +00:00
/**
* @brief 128 bit key used with AES128 in Security Manager
*/
typedef uint8_t sm_key_t[16];
/**
* @brief The device name type
*/
#define DEVICE_NAME_LEN 248
typedef uint8_t device_name_t[DEVICE_NAME_LEN+1];
2015-11-13 15:04:41 +01:00
// packet handler
typedef void (*btstack_packet_handler_t) (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size);
2009-07-23 21:43:37 +00:00
// helper for BT little endian format
#define READ_BT_16( buffer, pos) ( ((uint16_t) buffer[pos]) | (((uint16_t)buffer[(pos)+1]) << 8))
#define READ_BT_24( buffer, pos) ( ((uint32_t) buffer[pos]) | (((uint32_t)buffer[(pos)+1]) << 8) | (((uint32_t)buffer[(pos)+2]) << 16))
#define READ_BT_32( buffer, pos) ( ((uint32_t) buffer[pos]) | (((uint32_t)buffer[(pos)+1]) << 8) | (((uint32_t)buffer[(pos)+2]) << 16) | (((uint32_t) buffer[(pos)+3])) << 24)
2009-07-23 21:43:37 +00:00
// helper for SDP big endian format
#define READ_NET_16( buffer, pos) ( ((uint16_t) buffer[(pos)+1]) | (((uint16_t)buffer[ pos ]) << 8))
#define READ_NET_32( buffer, pos) ( ((uint32_t) buffer[(pos)+3]) | (((uint32_t)buffer[(pos)+2]) << 8) | (((uint32_t)buffer[(pos)+1]) << 16) | (((uint32_t) buffer[pos])) << 24)
2009-09-29 19:40:55 +00:00
// HCI CMD OGF/OCF
#define READ_CMD_OGF(buffer) (buffer[1] >> 2)
#define READ_CMD_OCF(buffer) ((buffer[1] & 0x03) << 8 | buffer[0])
2009-09-29 20:13:43 +00:00
// check if command complete event for given command
#define COMMAND_COMPLETE_EVENT(event,cmd) ( event[0] == HCI_EVENT_COMMAND_COMPLETE && READ_BT_16(event,3) == cmd.opcode)
2011-11-26 19:43:08 +00:00
#define COMMAND_STATUS_EVENT(event,cmd) ( event[0] == HCI_EVENT_COMMAND_STATUS && READ_BT_16(event,4) == cmd.opcode)
// Code+Len=2, Pkts+Opcode=3; total=5
#define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5
2009-09-29 20:13:43 +00:00
// ACL Packet
#define READ_ACL_CONNECTION_HANDLE( buffer ) ( READ_BT_16(buffer,0) & 0x0fff)
#define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 )
2010-02-13 12:16:03 +00:00
#define READ_ACL_LENGTH( buffer ) (READ_BT_16(buffer, 2))
// L2CAP Packet
#define READ_L2CAP_LENGTH(buffer) ( READ_BT_16(buffer, 4))
#define READ_L2CAP_CHANNEL_ID(buffer) ( READ_BT_16(buffer, 6))
2009-07-23 21:43:37 +00:00
void bt_store_16(uint8_t *buffer, uint16_t pos, uint16_t value);
void bt_store_32(uint8_t *buffer, uint16_t pos, uint32_t value);
void bt_flip_addr(bd_addr_t dest, bd_addr_t src);
void net_store_16(uint8_t *buffer, uint16_t pos, uint16_t value);
void net_store_32(uint8_t *buffer, uint16_t pos, uint32_t value);
2015-04-03 22:20:11 +02:00
// hack: compilation with the android ndk causes an error as there's a swap64 macro
#ifdef swap64
#undef swap64
#endif
2014-04-11 10:25:05 +00:00
void swapX(const uint8_t *src, uint8_t *dst, int len);
void swap24(const uint8_t src[3], uint8_t dst[3]);
void swap56(const uint8_t src[7], uint8_t dst[7]);
2014-09-07 18:58:05 +00:00
void swap64(const uint8_t src[8], uint8_t dst[8]);
2014-04-11 10:25:05 +00:00
void swap128(const uint8_t src[16], uint8_t dst[16]);
2014-02-28 21:07:59 +00:00
char char_for_nibble(int nibble);
void printf_hexdump(const void *data, int size);
void hexdump(const void *data, int size);
2014-08-29 21:20:21 +00:00
void hexdumpf(const void *data, int size);
2015-03-31 16:15:55 +02:00
char * uuid128_to_str(uint8_t * uuid);
2014-02-28 21:45:33 +00:00
void printUUID128(uint8_t *uuid);
void log_key(const char * name, sm_key_t key);
// @deprecated please use more convenient bd_addr_to_str
void print_bd_addr( bd_addr_t addr);
2011-07-29 19:42:33 +00:00
char * bd_addr_to_str(bd_addr_t addr);
char * link_key_to_str(link_key_t link_key);
char *link_key_type_to_str(link_key_type_t link_key);
2015-11-13 15:04:41 +01:00
void sdp_normalize_uuid(uint8_t *uuid, uint32_t shortUUID);
int sdp_has_blueooth_base_uuid(uint8_t * uuid128);
int sscan_bd_addr(uint8_t * addr_string, bd_addr_t addr);
int sscan_link_key(char * addr_string, link_key_t link_key);
uint8_t crc8_check(uint8_t *data, uint16_t len, uint8_t check_sum);
uint8_t crc8_calc(uint8_t *data, uint16_t len);
#define BD_ADDR_CMP(a,b) memcmp(a,b, BD_ADDR_LEN)
#define BD_ADDR_COPY(dest,src) memcpy(dest,src,BD_ADDR_LEN)
2010-08-03 19:57:39 +00:00
int is_authenticated_link_key(link_key_type_t link_key_type);
#if defined __cplusplus
}
#endif
#endif // __UTILS_H