1 #include <stdint.h> 2 #include <stdio.h> 3 #include <string.h> 4 5 #include "hci.h" 6 #include "hci_dump.h" 7 #include "l2cap.h" 8 9 #include "ble/att_db.h" 10 #include "ble/sm.h" 11 #include "gap.h" 12 #include "btstack_debug.h" 13 14 #define PREBUFFER_SIZE (HCI_INCOMING_PRE_BUFFER_SIZE + 8) 15 #define TEST_MAX_MTU 23 16 17 static btstack_packet_handler_t att_packet_handler; 18 static void (*registered_hci_event_handler) (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size) = NULL; 19 20 static btstack_linked_list_t connections; 21 static uint8_t l2cap_stack_buffer[PREBUFFER_SIZE + TEST_MAX_MTU]; // pre buffer + HCI Header + L2CAP header 22 static uint16_t gatt_client_handle = 0x40; 23 static hci_connection_t hci_connection; 24 25 static uint8_t packet_buffer[256]; 26 static uint16_t packet_buffer_len; 27 28 uint16_t get_gatt_client_handle(void){ 29 return gatt_client_handle; 30 } 31 32 void mock_simulate_command_complete(const hci_cmd_t *cmd){ 33 uint8_t packet[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >> 8), 0}; 34 registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet)); 35 } 36 37 void mock_simulate_hci_state_working(void){ 38 uint8_t packet[3] = {BTSTACK_EVENT_STATE, 0, HCI_STATE_WORKING}; 39 registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, 3); 40 } 41 42 void mock_simulate_connected(void){ 43 uint8_t packet[] = {HCI_EVENT_LE_META, 0x13, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x9B, 0x77, 0xD1, 0xF7, 0xB1, 0x34, 0x50, 0x00, 0x00, 0x00, 0xD0, 0x07, 0x05}; 44 registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet)); 45 } 46 47 void mock_simulate_scan_response(void){ 48 uint8_t packet[] = {GAP_EVENT_ADVERTISING_REPORT, 0x13, 0xE2, 0x01, 0x34, 0xB1, 0xF7, 0xD1, 0x77, 0x9B, 0xCC, 0x09, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08}; 49 registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet)); 50 } 51 bool gap_authenticated(hci_con_handle_t con_handle){ 52 UNUSED(con_handle); 53 return false; 54 } 55 uint8_t gap_encryption_key_size(hci_con_handle_t con_handle){ 56 UNUSED(con_handle); 57 return 0; 58 } 59 bool gap_bonded(hci_con_handle_t con_handle){ 60 UNUSED(con_handle); 61 return true; 62 } 63 void sm_request_pairing(hci_con_handle_t con_handle){ 64 UNUSED(con_handle); 65 } 66 void gap_start_scan(void){ 67 } 68 void gap_stop_scan(void){ 69 } 70 uint8_t gap_connect(const bd_addr_t addr, bd_addr_type_t addr_type){ 71 return 0; 72 } 73 void gap_set_scan_parameters(uint8_t scan_type, uint16_t scan_interval, uint16_t scan_window){ 74 } 75 76 int gap_reconnect_security_setup_active(hci_con_handle_t con_handle){ 77 UNUSED(con_handle); 78 return 0; 79 } 80 81 static void att_init_connection(att_connection_t * att_connection){ 82 att_connection->mtu = TEST_MAX_MTU; 83 att_connection->max_mtu = TEST_MAX_MTU; 84 att_connection->encryption_key_size = 0; 85 att_connection->authenticated = 0; 86 att_connection->authorized = 0; 87 } 88 89 HCI_STATE hci_get_state(void){ 90 return HCI_STATE_WORKING; 91 } 92 93 uint8_t hci_send_cmd(const hci_cmd_t *cmd, ...){ 94 95 btstack_assert(false); 96 97 va_list argptr; 98 va_start(argptr, cmd); 99 uint16_t len = hci_cmd_create_from_template(packet_buffer, cmd, argptr); 100 va_end(argptr); 101 hci_dump_packet(HCI_COMMAND_DATA_PACKET, 0, packet_buffer, len); 102 // dump_packet(HCI_COMMAND_DATA_PACKET, packet_buffer, len); 103 packet_buffer_len = len; 104 return ERROR_CODE_SUCCESS; 105 } 106 107 bool hci_can_send_command_packet_now(void){ 108 return true; 109 } 110 111 bool hci_can_send_acl_le_packet_now(void){ 112 return true; 113 } 114 115 bool l2cap_can_send_connectionless_packet_now(void){ 116 return true; 117 } 118 119 uint8_t *l2cap_get_outgoing_buffer(void){ 120 return (uint8_t *)&l2cap_stack_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 8]; 121 } 122 123 uint16_t l2cap_max_mtu(void){ 124 return TEST_MAX_MTU; 125 } 126 127 uint16_t l2cap_max_le_mtu(void){ 128 return TEST_MAX_MTU; 129 } 130 131 void l2cap_init(void){} 132 133 void l2cap_register_fixed_channel(btstack_packet_handler_t packet_handler, uint16_t channel_id) { 134 att_packet_handler = packet_handler; 135 } 136 137 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler){ 138 registered_hci_event_handler = callback_handler->callback; 139 } 140 141 bool l2cap_reserve_packet_buffer(void){ 142 return true; 143 } 144 145 bool l2cap_can_send_fixed_channel_packet_now(uint16_t handle, uint16_t channel_id){ 146 return true; 147 } 148 149 void l2cap_request_can_send_fix_channel_now_event(uint16_t handle, uint16_t channel_id){ 150 uint8_t event[] = { L2CAP_EVENT_CAN_SEND_NOW, 2, 1, 0}; 151 att_packet_handler(HCI_EVENT_PACKET, 0, (uint8_t*)event, sizeof(event)); 152 } 153 154 uint8_t l2cap_send_prepared_connectionless(uint16_t handle, uint16_t cid, uint16_t len){ 155 att_connection_t att_connection; 156 att_init_connection(&att_connection); 157 uint8_t response_buffer[PREBUFFER_SIZE + TEST_MAX_MTU]; 158 uint8_t * response = &response_buffer[PREBUFFER_SIZE]; 159 uint16_t response_len = att_handle_request(&att_connection, l2cap_get_outgoing_buffer(), len, response); 160 if (response_len){ 161 att_packet_handler(ATT_DATA_PACKET, gatt_client_handle, &response[0], response_len); 162 } 163 return ERROR_CODE_SUCCESS; 164 } 165 166 void sm_add_event_handler(btstack_packet_callback_registration_t * callback_handler){ 167 } 168 169 int sm_cmac_ready(void){ 170 return 1; 171 } 172 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint16_t message_len, const uint8_t * message, uint32_t sign_counter, void (*done_callback)(uint8_t * hash)){ 173 //sm_notify_client(SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED, sm_central_device_addr_type, sm_central_device_address, 0, sm_central_device_matched); 174 } 175 int sm_le_device_index(uint16_t handle ){ 176 return 0; 177 } 178 void sm_send_security_request(hci_con_handle_t con_handle){ 179 } 180 181 uint8_t sm_get_ltk(hci_con_handle_t con_handle, sm_key_t ltk){ 182 memset((uint8_t*) ltk, 0x22, 16); 183 return ERROR_CODE_SUCCESS; 184 } 185 186 irk_lookup_state_t sm_identity_resolving_state(hci_con_handle_t con_handle){ 187 return IRK_LOOKUP_SUCCEEDED; 188 } 189 void btstack_run_loop_set_timer(btstack_timer_source_t *a, uint32_t timeout_in_ms){ 190 } 191 192 // Set callback that will be executed when timer expires. 193 void btstack_run_loop_set_timer_handler(btstack_timer_source_t *ts, void (*process)(btstack_timer_source_t *_ts)){ 194 } 195 196 // Add/Remove timer source. 197 void btstack_run_loop_add_timer(btstack_timer_source_t *timer){ 198 } 199 200 int btstack_run_loop_remove_timer(btstack_timer_source_t *timer){ 201 return 1; 202 } 203 204 // todo: 205 hci_connection_t * hci_connection_for_bd_addr_and_type(const bd_addr_t addr, bd_addr_type_t addr_type){ 206 printf("hci_connection_for_bd_addr_and_type not implemented in mock backend\n"); 207 return NULL; 208 } 209 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle){ 210 if (con_handle == hci_connection.con_handle){ 211 return &hci_connection; 212 } else { 213 return NULL; 214 } 215 } 216 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it){ 217 // printf("hci_connections_get_iterator not implemented in mock backend\n"); 218 btstack_linked_list_iterator_init(it, &connections); 219 } 220 221 static void hci_setup_connection(uint16_t con_handle, bd_addr_type_t type){ 222 hci_connection.att_connection.mtu = 23; 223 hci_connection.att_connection.con_handle = con_handle; 224 hci_connection.att_connection.max_mtu = 23; 225 hci_connection.att_connection.encryption_key_size = 0; 226 hci_connection.att_connection.authenticated = 0; 227 hci_connection.att_connection.authorized = 0; 228 229 hci_connection.att_server.ir_le_device_db_index = 0; 230 231 hci_connection.con_handle = con_handle; 232 hci_connection.address_type = type; 233 234 if (btstack_linked_list_empty(&connections)){ 235 btstack_linked_list_add(&connections, (btstack_linked_item_t *)&hci_connection); 236 } 237 } 238 239 void hci_setup_le_connection(uint16_t con_handle){ 240 hci_setup_connection(con_handle, BD_ADDR_TYPE_LE_PUBLIC); 241 } 242 243 // int hci_send_cmd(const hci_cmd_t *cmd, ...){ 244 // // printf("hci_send_cmd opcode 0x%02x\n", cmd->opcode); 245 // return 0; 246 // } 247 248 // int hci_can_send_packet_now_using_packet_buffer(uint8_t packet_type){ 249 // return 1; 250 // } 251 252 // void hci_disconnect_security_block(hci_con_handle_t con_handle){ 253 // printf("hci_disconnect_security_block \n"); 254 // } 255 256 // void hci_dump_log(const char * format, ...){ 257 // printf("hci_disconnect_security_block \n"); 258 // } 259 260 void l2cap_run(void){ 261 } 262