mirror of
https://github.com/bluekitchen/btstack.git
synced 2025-02-05 09:40:00 +00:00
169 lines
6.1 KiB
C
169 lines
6.1 KiB
C
/*
|
|
* Copyright (C) 2014 BlueKitchen GmbH
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the copyright holders nor the names of
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
* 4. Any redistribution, use, or modification is done solely for
|
|
* personal benefit and not for any commercial purpose or for
|
|
* monetary gain.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS
|
|
* RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* Please inquire about commercial licensing options at
|
|
* contact@bluekitchen-gmbh.com
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* utils.h
|
|
*
|
|
* General utility functions
|
|
*
|
|
* Created by Matthias Ringwald on 7/23/09.
|
|
*/
|
|
|
|
#ifndef __UTILS_H
|
|
#define __UTILS_H
|
|
|
|
|
|
#if defined __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
#include <stdint.h>
|
|
|
|
/**
|
|
* @brief hci connection handle type
|
|
*/
|
|
typedef uint16_t hci_con_handle_t;
|
|
|
|
/**
|
|
* @brief Length of a bluetooth device address.
|
|
*/
|
|
#define BD_ADDR_LEN 6
|
|
typedef uint8_t bd_addr_t[BD_ADDR_LEN];
|
|
|
|
/**
|
|
* @brief link key and its type
|
|
*/
|
|
#define LINK_KEY_LEN 16
|
|
#define LINK_KEY_STR_LEN (LINK_KEY_LEN*2)
|
|
typedef uint8_t link_key_t[LINK_KEY_LEN];
|
|
|
|
typedef enum {
|
|
COMBINATION_KEY = 0, // standard pairing
|
|
LOCAL_UNIT_KEY, // ?
|
|
REMOTE_UNIT_KEY, // ?
|
|
DEBUG_COMBINATION_KEY, // SSP with debug
|
|
UNAUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P192, // SSP Simple Pairing
|
|
AUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P192, // SSP Passkey, Number confirm, OOB
|
|
CHANGED_COMBINATION_KEY, // Link key changed using Change Connection Lnk Key
|
|
UNAUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P256, // SSP Simpe Pairing
|
|
AUTHENTICATED_COMBINATION_KEY_GENERATED_FROM_P256, // SSP Passkey, Number confirm, OOB
|
|
} link_key_type_t;
|
|
|
|
/**
|
|
* @brief 128 bit key used with AES128 in Security Manager
|
|
*/
|
|
typedef uint8_t sm_key_t[16];
|
|
|
|
/**
|
|
* @brief The device name type
|
|
*/
|
|
#define DEVICE_NAME_LEN 248
|
|
typedef uint8_t device_name_t[DEVICE_NAME_LEN+1];
|
|
|
|
|
|
// helper for BT little endian format
|
|
#define READ_BT_16( buffer, pos) ( ((uint16_t) buffer[pos]) | (((uint16_t)buffer[pos+1]) << 8))
|
|
#define READ_BT_24( buffer, pos) ( ((uint32_t) buffer[pos]) | (((uint32_t)buffer[pos+1]) << 8) | (((uint32_t)buffer[pos+2]) << 16))
|
|
#define READ_BT_32( buffer, pos) ( ((uint32_t) buffer[pos]) | (((uint32_t)buffer[pos+1]) << 8) | (((uint32_t)buffer[pos+2]) << 16) | (((uint32_t) buffer[pos+3])) << 24)
|
|
|
|
// helper for SDP big endian format
|
|
#define READ_NET_16( buffer, pos) ( ((uint16_t) buffer[pos+1]) | (((uint16_t)buffer[pos ]) << 8))
|
|
#define READ_NET_32( buffer, pos) ( ((uint32_t) buffer[pos+3]) | (((uint32_t)buffer[pos+2]) << 8) | (((uint32_t)buffer[pos+1]) << 16) | (((uint32_t) buffer[pos])) << 24)
|
|
|
|
// HCI CMD OGF/OCF
|
|
#define READ_CMD_OGF(buffer) (buffer[1] >> 2)
|
|
#define READ_CMD_OCF(buffer) ((buffer[1] & 0x03) << 8 | buffer[0])
|
|
|
|
// check if command complete event for given command
|
|
#define COMMAND_COMPLETE_EVENT(event,cmd) ( event[0] == HCI_EVENT_COMMAND_COMPLETE && READ_BT_16(event,3) == cmd.opcode)
|
|
#define COMMAND_STATUS_EVENT(event,cmd) ( event[0] == HCI_EVENT_COMMAND_STATUS && READ_BT_16(event,4) == cmd.opcode)
|
|
|
|
// Code+Len=2, Pkts+Opcode=3; total=5
|
|
#define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5
|
|
|
|
// ACL Packet
|
|
#define READ_ACL_CONNECTION_HANDLE( buffer ) ( READ_BT_16(buffer,0) & 0x0fff)
|
|
#define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 )
|
|
#define READ_ACL_LENGTH( buffer ) (READ_BT_16(buffer, 2))
|
|
|
|
// L2CAP Packet
|
|
#define READ_L2CAP_LENGTH(buffer) ( READ_BT_16(buffer, 4))
|
|
#define READ_L2CAP_CHANNEL_ID(buffer) ( READ_BT_16(buffer, 6))
|
|
|
|
void bt_store_16(uint8_t *buffer, uint16_t pos, uint16_t value);
|
|
void bt_store_32(uint8_t *buffer, uint16_t pos, uint32_t value);
|
|
void bt_flip_addr(bd_addr_t dest, bd_addr_t src);
|
|
|
|
void net_store_16(uint8_t *buffer, uint16_t pos, uint16_t value);
|
|
void net_store_32(uint8_t *buffer, uint16_t pos, uint32_t value);
|
|
|
|
void swapX(const uint8_t *src, uint8_t *dst, int len);
|
|
void swap24(const uint8_t src[3], uint8_t dst[3]);
|
|
void swap56(const uint8_t src[7], uint8_t dst[7]);
|
|
void swap64(const uint8_t src[8], uint8_t dst[8]);
|
|
void swap128(const uint8_t src[16], uint8_t dst[16]);
|
|
|
|
void printf_hexdump(const void *data, int size);
|
|
void hexdump(const void *data, int size);
|
|
void hexdumpf(const void *data, int size);
|
|
void printUUID128(uint8_t *uuid);
|
|
void log_key(const char * name, sm_key_t key);
|
|
|
|
// @deprecated please use more convenient bd_addr_to_str
|
|
void print_bd_addr( bd_addr_t addr);
|
|
|
|
char * bd_addr_to_str(bd_addr_t addr);
|
|
char * link_key_to_str(link_key_t link_key);
|
|
char *link_key_type_to_str(link_key_type_t link_key);
|
|
|
|
int sscan_bd_addr(uint8_t * addr_string, bd_addr_t addr);
|
|
int sscan_link_key(char * addr_string, link_key_t link_key);
|
|
|
|
uint8_t crc8_check(uint8_t *data, uint16_t len, uint8_t check_sum);
|
|
uint8_t crc8_calc(uint8_t *data, uint16_t len);
|
|
|
|
#define BD_ADDR_CMP(a,b) memcmp(a,b, BD_ADDR_LEN)
|
|
#define BD_ADDR_COPY(dest,src) memcpy(dest,src,BD_ADDR_LEN)
|
|
|
|
int is_authenticated_link_key(link_key_type_t link_key_type);
|
|
|
|
#if defined __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif // __UTILS_H
|