xref: /btstack/test/gatt_server/mock.c (revision b28dc8004dd8d4fb9020a6dcd2bc81f05d36a008)
1 #include <stdint.h>
2 #include <stdio.h>
3 #include <stdlib.h>
4 #include <string.h>
5 
6 #include "hci.h"
7 #include "gap.h"
8 #include "hci_dump.h"
9 #include "l2cap.h"
10 
11 #include "ble/att_db.h"
12 #include "ble/gatt_client.h"
13 #include "ble/sm.h"
14 
15 #include "btstack_debug.h"
16 
17 static btstack_packet_handler_t att_packet_handler;
18 static void (*registered_hci_event_handler) (uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size) = NULL;
19 
20 static btstack_linked_list_t     connections;
21 static const uint16_t max_mtu = 23;
22 static uint8_t  l2cap_stack_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 8 + max_mtu];	// pre buffer + HCI Header + L2CAP header
23 static uint16_t gatt_client_handle = 0x40;
24 static hci_connection_t hci_connection;
25 
26 uint16_t get_gatt_client_handle(void){
27 	return gatt_client_handle;
28 }
29 
30 void mock_simulate_command_complete(const hci_cmd_t *cmd){
31 	uint8_t packet[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >> 8), 0};
32 	registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet));
33 }
34 
35 void mock_simulate_hci_state_working(void){
36 	uint8_t packet[3] = {BTSTACK_EVENT_STATE, 0, HCI_STATE_WORKING};
37 	registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, 3);
38 }
39 
40 void mock_simulate_connected(void){
41 	uint8_t packet[] = {0x3E, 0x13, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00, 0x9B, 0x77, 0xD1, 0xF7, 0xB1, 0x34, 0x50, 0x00, 0x00, 0x00, 0xD0, 0x07, 0x05};
42 	registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet));
43 }
44 
45 void mock_simulate_scan_response(void){
46 	uint8_t packet[] = {0xE2, 0x13, 0xE2, 0x01, 0x34, 0xB1, 0xF7, 0xD1, 0x77, 0x9B, 0xCC, 0x09, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08};
47 	registered_hci_event_handler(HCI_EVENT_PACKET, 0, (uint8_t *)&packet, sizeof(packet));
48 }
49 
50 void gap_start_scan(void){
51 }
52 void gap_stop_scan(void){
53 }
54 uint8_t gap_connect(const bd_addr_t addr, bd_addr_type_t addr_type){
55 	return 0;
56 }
57 void gap_set_scan_parameters(uint8_t scan_type, uint16_t scan_interval, uint16_t scan_window){
58 }
59 
60 int gap_reconnect_security_setup_active(hci_con_handle_t con_handle){
61 	UNUSED(con_handle);
62 	return 0;
63 }
64 
65 static void att_init_connection(att_connection_t * att_connection){
66     att_connection->mtu = 23;
67     att_connection->max_mtu = 23;
68     att_connection->encryption_key_size = 0;
69     att_connection->authenticated = 0;
70 	att_connection->authorized = 0;
71 }
72 
73 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler){
74     registered_hci_event_handler = callback_handler->callback;
75 }
76 
77 bool hci_can_send_acl_le_packet_now(void){
78 	return true;
79 }
80 
81 bool hci_can_send_command_packet_now(void){
82 	return true;
83 }
84 
85 HCI_STATE hci_get_state(void){
86 	return HCI_STATE_WORKING;
87 }
88 
89 uint8_t hci_send_cmd(const hci_cmd_t *cmd, ...){
90 	btstack_assert(false);
91 	return ERROR_CODE_SUCCESS;
92 }
93 
94 void hci_halting_defer(void){
95 }
96 
97 bool l2cap_can_send_connectionless_packet_now(void){
98 	return 1;
99 }
100 
101 void l2cap_add_event_handler(btstack_packet_callback_registration_t * callback_handler){
102     UNUSED(callback_handler);
103 }
104 
105 uint8_t *l2cap_get_outgoing_buffer(void){
106 	// printf("l2cap_get_outgoing_buffer\n");
107 	return (uint8_t *)&l2cap_stack_buffer; // 8 bytes
108 }
109 
110 uint16_t l2cap_max_mtu(void){
111 	// printf("l2cap_max_mtu\n");
112     return max_mtu;
113 }
114 
115 uint16_t l2cap_max_le_mtu(void){
116 	// printf("l2cap_max_mtu\n");
117     return max_mtu;
118 }
119 
120 void l2cap_init(void){}
121 
122 void l2cap_register_fixed_channel(btstack_packet_handler_t packet_handler, uint16_t channel_id) {
123     att_packet_handler = packet_handler;
124 }
125 
126 bool l2cap_reserve_packet_buffer(void){
127 	return true;
128 }
129 
130 void l2cap_release_packet_buffer(void){
131 }
132 
133 static uint8_t l2cap_can_send_fixed_channel_packet_now_status = 1;
134 
135 void l2cap_can_send_fixed_channel_packet_now_set_status(uint8_t status){
136 	l2cap_can_send_fixed_channel_packet_now_status = status;
137 }
138 
139 bool l2cap_can_send_fixed_channel_packet_now(uint16_t handle, uint16_t channel_id){
140 	return l2cap_can_send_fixed_channel_packet_now_status;
141 }
142 
143 void l2cap_request_can_send_fix_channel_now_event(uint16_t handle, uint16_t channel_id){
144 	uint8_t event[] = { L2CAP_EVENT_CAN_SEND_NOW, 2, 1, 0};
145 	att_packet_handler(HCI_EVENT_PACKET, 0, (uint8_t*)event, sizeof(event));
146 }
147 
148 uint8_t l2cap_send_prepared_connectionless(uint16_t handle, uint16_t cid, uint16_t len){
149 	att_connection_t att_connection;
150 	att_init_connection(&att_connection);
151 	uint8_t response[max_mtu];
152 	uint16_t response_len = att_handle_request(&att_connection, l2cap_get_outgoing_buffer(), len, &response[0]);
153 	if (response_len){
154 		att_packet_handler(ATT_DATA_PACKET, gatt_client_handle, &response[0], response_len);
155 	}
156 	return ERROR_CODE_SUCCESS;
157 }
158 
159 void sm_add_event_handler(btstack_packet_callback_registration_t * callback_handler){
160 }
161 
162 int  sm_cmac_ready(void){
163 	return 1;
164 }
165 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint16_t message_len, const uint8_t * message, uint32_t sign_counter, void (*done_callback)(uint8_t * hash)){
166 	//sm_notify_client(SM_EVENT_IDENTITY_RESOLVING_SUCCEEDED, sm_central_device_addr_type, sm_central_device_address, 0, sm_central_device_matched);
167 }
168 int sm_le_device_index(uint16_t handle ){
169 	return -1;
170 }
171 
172 irk_lookup_state_t sm_identity_resolving_state(hci_con_handle_t con_handle){
173 	return IRK_LOOKUP_SUCCEEDED;
174 }
175 
176 void sm_request_pairing(hci_con_handle_t con_handle){
177 }
178 
179 void btstack_run_loop_set_timer(btstack_timer_source_t *a, uint32_t timeout_in_ms){
180 }
181 
182 // Set callback that will be executed when timer expires.
183 void btstack_run_loop_set_timer_handler(btstack_timer_source_t *ts, void (*process)(btstack_timer_source_t *_ts)){
184 }
185 
186 // Add/Remove timer source.
187 void btstack_run_loop_add_timer(btstack_timer_source_t *timer){
188 }
189 
190 int  btstack_run_loop_remove_timer(btstack_timer_source_t *timer){
191 	return 1;
192 }
193 
194 void * btstack_run_loop_get_timer_context(btstack_timer_source_t *ts){
195     return ts->context;
196 }
197 
198 // todo:
199 hci_connection_t * hci_connection_for_bd_addr_and_type(const bd_addr_t addr, bd_addr_type_t addr_type){
200 	printf("hci_connection_for_bd_addr_and_type not implemented in mock backend\n");
201 	return NULL;
202 }
203 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle){
204 	if (con_handle != 0) return NULL;
205 	return &hci_connection;
206 }
207 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it){
208 	// printf("hci_connections_get_iterator not implemented in mock backend\n");
209     btstack_linked_list_iterator_init(it, &connections);
210 }
211 
212 // int hci_send_cmd(const hci_cmd_t *cmd, ...){
213 // //	printf("hci_send_cmd opcode 0x%02x\n", cmd->opcode);
214 // 	return 0;
215 // }
216 
217 // int hci_can_send_packet_now_using_packet_buffer(uint8_t packet_type){
218 // 	return 1;
219 // }
220 
221 // void hci_disconnect_security_block(hci_con_handle_t con_handle){
222 // 	printf("hci_disconnect_security_block \n");
223 // }
224 
225 // void hci_dump_log(const char * format, ...){
226 // 	printf("hci_disconnect_security_block \n");
227 // }
228 
229 void l2cap_run(void){
230 }
231 
232 void l2cap_register_packet_handler(void (*handler)(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size)){
233 }
234 
235 int gap_authenticated(hci_con_handle_t con_handle){
236 	return 0;
237 }
238 authorization_state_t gap_authorization_state(hci_con_handle_t con_handle){
239 	return AUTHORIZATION_UNKNOWN;
240 }
241 int gap_encryption_key_size(hci_con_handle_t con_handle){
242 	return 0;
243 }
244 int gap_secure_connection(hci_con_handle_t con_handle){
245 	return 0;
246 }
247 gap_connection_type_t gap_get_connection_type(hci_con_handle_t connection_handle){
248 	return GAP_CONNECTION_INVALID;
249 }
250 int gap_request_connection_parameter_update(hci_con_handle_t con_handle, uint16_t conn_interval_min,
251 	uint16_t conn_interval_max, uint16_t conn_latency, uint16_t supervision_timeout){
252 	return 0;
253 }
254