btm_int.h 47 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094
  1. /******************************************************************************
  2. *
  3. * Copyright (C) 1999-2012 Broadcom Corporation
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at:
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. *
  17. ******************************************************************************/
  18. /******************************************************************************
  19. *
  20. * this file contains the main Bluetooth Manager (BTM) internal
  21. * definitions.
  22. *
  23. ******************************************************************************/
  24. #ifndef BTM_INT_H
  25. #define BTM_INT_H
  26. #include "bt_defs.h"
  27. #include "bt_target.h"
  28. #include "gki.h"
  29. #include "hcidefs.h"
  30. #include "rfcdefs.h"
  31. #include "btm_api.h"
  32. #if (BLE_INCLUDED == TRUE)
  33. #include "btm_ble_int.h"
  34. #if (SMP_INCLUDED == TRUE)
  35. #include "smp_api.h"
  36. #endif
  37. #endif
  38. #if BTM_MAX_LOC_BD_NAME_LEN > 0
  39. typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
  40. #endif
  41. #define BTM_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
  42. /* Definitions for Server Channel Number (SCN) management
  43. */
  44. #define BTM_MAX_SCN PORT_MAX_RFC_PORTS
  45. /* Define masks for supported and exception 2.0 ACL packet types
  46. */
  47. #define BTM_ACL_SUPPORTED_PKTS_MASK (HCI_PKT_TYPES_MASK_DM1 | \
  48. HCI_PKT_TYPES_MASK_DH1 | \
  49. HCI_PKT_TYPES_MASK_DM3 | \
  50. HCI_PKT_TYPES_MASK_DH3 | \
  51. HCI_PKT_TYPES_MASK_DM5 | \
  52. HCI_PKT_TYPES_MASK_DH5)
  53. #define BTM_ACL_EXCEPTION_PKTS_MASK (HCI_PKT_TYPES_MASK_NO_2_DH1 | \
  54. HCI_PKT_TYPES_MASK_NO_3_DH1 | \
  55. HCI_PKT_TYPES_MASK_NO_2_DH3 | \
  56. HCI_PKT_TYPES_MASK_NO_3_DH3 | \
  57. HCI_PKT_TYPES_MASK_NO_2_DH5 | \
  58. HCI_PKT_TYPES_MASK_NO_3_DH5)
  59. #define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
  60. HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
  61. ? TRUE : FALSE)
  62. #define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
  63. /* Define the ACL Management control structure
  64. */
  65. typedef struct {
  66. UINT16 hci_handle;
  67. UINT16 pkt_types_mask;
  68. UINT16 clock_offset;
  69. BD_ADDR remote_addr;
  70. DEV_CLASS remote_dc;
  71. BD_NAME remote_name;
  72. UINT16 manufacturer;
  73. UINT16 lmp_subversion;
  74. UINT16 link_super_tout;
  75. BD_FEATURES peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Peer LMP Extended features mask table for the device */
  76. UINT8 num_read_pages;
  77. UINT8 lmp_version;
  78. BOOLEAN in_use;
  79. UINT8 link_role;
  80. BOOLEAN link_up_issued; /* True if busy_level link up has been issued */
  81. #define BTM_ACL_SWKEY_STATE_IDLE 0
  82. #define BTM_ACL_SWKEY_STATE_MODE_CHANGE 1
  83. #define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF 2
  84. #define BTM_ACL_SWKEY_STATE_SWITCHING 3
  85. #define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON 4
  86. #define BTM_ACL_SWKEY_STATE_IN_PROGRESS 5
  87. UINT8 switch_role_state;
  88. #define BTM_ACL_ENCRYPT_STATE_IDLE 0
  89. #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF 1 /* encryption turning off */
  90. #define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC 2 /* temporarily off for change link key or role switch */
  91. #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON 3 /* encryption turning on */
  92. UINT8 encrypt_state; /* overall BTM encryption state */
  93. #if BLE_INCLUDED == TRUE
  94. tBT_TRANSPORT transport;
  95. BD_ADDR conn_addr; /* local device address used for this connection */
  96. UINT8 conn_addr_type; /* local device address type for this connection */
  97. BD_ADDR active_remote_addr; /* remote address used on this connection */
  98. UINT8 active_remote_addr_type; /* local device address type for this connection */
  99. BD_FEATURES peer_le_features; /* Peer LE Used features mask for the device */
  100. #endif
  101. } tACL_CONN;
  102. /*****************************************************
  103. ** TIMER Definitions
  104. ******************************************************/
  105. #define TT_DEV_RESET 1
  106. #define TT_DEV_RLN 2
  107. #define TT_DEV_RLNKP 4 /* Read Link Policy Settings */
  108. /* Define the Device Management control structure
  109. */
  110. typedef struct {
  111. tBTM_DEV_STATUS_CB *p_dev_status_cb; /* Device status change callback */
  112. tBTM_VS_EVT_CB *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS]; /* Register for vendor specific events */
  113. tBTM_CMPL_CB *p_stored_link_key_cmpl_cb; /* Read/Write/Delete stored link key */
  114. TIMER_LIST_ENT reset_timer;
  115. tBTM_CMPL_CB *p_reset_cmpl_cb;
  116. TIMER_LIST_ENT rln_timer;
  117. tBTM_CMPL_CB *p_rln_cmpl_cb; /* Callback function to be called when */
  118. /* read local name function complete */
  119. TIMER_LIST_ENT rssi_timer;
  120. tBTM_CMPL_CB *p_rssi_cmpl_cb; /* Callback function to be called when */
  121. /* read rssi function completes */
  122. TIMER_LIST_ENT lnk_quality_timer;
  123. tBTM_CMPL_CB *p_lnk_qual_cmpl_cb;/* Callback function to be called when */
  124. /* read link quality function completes */
  125. TIMER_LIST_ENT txpwer_timer;
  126. tBTM_CMPL_CB *p_txpwer_cmpl_cb; /* Callback function to be called when */
  127. /* read inq tx power function completes */
  128. TIMER_LIST_ENT qossu_timer;
  129. tBTM_CMPL_CB *p_qossu_cmpl_cb; /* Callback function to be called when */
  130. /* qos setup function completes */
  131. tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
  132. tBTM_CMPL_CB *p_switch_role_cb; /* Callback function to be called when */
  133. /* requested switch role is completed */
  134. TIMER_LIST_ENT tx_power_timer;
  135. tBTM_CMPL_CB *p_tx_power_cmpl_cb;/* Callback function to be called */
  136. DEV_CLASS dev_class; /* Local device class */
  137. #if BLE_INCLUDED == TRUE
  138. tBTM_CMPL_CB *p_le_test_cmd_cmpl_cb; /* Callback function to be called when
  139. LE test mode command has been sent successfully */
  140. BD_ADDR read_tx_pwr_addr; /* read TX power target address */
  141. #define BTM_LE_SUPPORT_STATE_SIZE 8
  142. UINT8 le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
  143. tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
  144. BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */
  145. #if BTM_BLE_CONFORMANCE_TESTING == TRUE
  146. BOOLEAN no_disc_if_pair_fail;
  147. BOOLEAN enable_test_mac_val;
  148. BT_OCTET8 test_mac;
  149. BOOLEAN enable_test_local_sign_cntr;
  150. UINT32 test_local_sign_cntr;
  151. #endif
  152. #endif /* BLE_INCLUDED */
  153. tBTM_IO_CAP loc_io_caps; /* IO capability of the local device */
  154. tBTM_AUTH_REQ loc_auth_req; /* the auth_req flag */
  155. BOOLEAN secure_connections_only; /* Rejects service level 0 connections if */
  156. /* itself or peer device doesn't support */
  157. /* secure connections */
  158. } tBTM_DEVCB;
  159. /* Define the structures and constants used for inquiry
  160. */
  161. /* Definitions of limits for inquiries */
  162. #define BTM_PER_INQ_MIN_MAX_PERIOD HCI_PER_INQ_MIN_MAX_PERIOD
  163. #define BTM_PER_INQ_MAX_MAX_PERIOD HCI_PER_INQ_MAX_MAX_PERIOD
  164. #define BTM_PER_INQ_MIN_MIN_PERIOD HCI_PER_INQ_MIN_MIN_PERIOD
  165. #define BTM_PER_INQ_MAX_MIN_PERIOD HCI_PER_INQ_MAX_MIN_PERIOD
  166. #define BTM_MAX_INQUIRY_LENGTH HCI_MAX_INQUIRY_LENGTH
  167. #define BTM_MIN_INQUIRY_LEN 0x01
  168. #define BTM_MIN_INQ_TX_POWER -70
  169. #define BTM_MAX_INQ_TX_POWER 20
  170. typedef struct {
  171. UINT32 inq_count; /* Used for determining if a response has already been */
  172. /* received for the current inquiry operation. (We do not */
  173. /* want to flood the caller with multiple responses from */
  174. /* the same device. */
  175. BD_ADDR bd_addr;
  176. } tINQ_BDADDR;
  177. typedef struct {
  178. UINT32 time_of_resp;
  179. UINT32 inq_count; /* "timestamps" the entry with a particular inquiry count */
  180. /* Used for determining if a response has already been */
  181. /* received for the current inquiry operation. (We do not */
  182. /* want to flood the caller with multiple responses from */
  183. /* the same device. */
  184. tBTM_INQ_INFO inq_info;
  185. BOOLEAN in_use;
  186. #if (BLE_INCLUDED == TRUE)
  187. BOOLEAN scan_rsp;
  188. #endif
  189. } tINQ_DB_ENT;
  190. enum {
  191. INQ_NONE,
  192. INQ_LE_OBSERVE,
  193. INQ_GENERAL
  194. };
  195. typedef UINT8 tBTM_INQ_TYPE;
  196. typedef struct {
  197. tBTM_CMPL_CB *p_remname_cmpl_cb;
  198. #define BTM_EXT_RMT_NAME_TIMEOUT 40
  199. TIMER_LIST_ENT rmt_name_timer_ent;
  200. UINT16 discoverable_mode;
  201. UINT16 connectable_mode;
  202. UINT16 page_scan_window;
  203. UINT16 page_scan_period;
  204. UINT16 inq_scan_window;
  205. UINT16 inq_scan_period;
  206. UINT16 inq_scan_type;
  207. UINT16 page_scan_type; /* current page scan type */
  208. tBTM_INQ_TYPE scan_type;
  209. BD_ADDR remname_bda; /* Name of bd addr for active remote name request */
  210. #define BTM_RMT_NAME_INACTIVE 0
  211. #define BTM_RMT_NAME_EXT 0x1 /* Initiated through API */
  212. #define BTM_RMT_NAME_SEC 0x2 /* Initiated internally by security manager */
  213. #define BTM_RMT_NAME_INQ 0x4 /* Remote name initiated internally by inquiry */
  214. BOOLEAN remname_active; /* State of a remote name request by external API */
  215. tBTM_CMPL_CB *p_inq_cmpl_cb;
  216. tBTM_INQ_RESULTS_CB *p_inq_results_cb;
  217. tBTM_CMPL_CB *p_inq_ble_cmpl_cb; /*completion callback exclusively for LE Observe*/
  218. tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
  219. tBTM_CMPL_CB *p_inqfilter_cmpl_cb; /* Called (if not NULL) after inquiry filter completed */
  220. UINT32 inq_counter; /* Counter incremented each time an inquiry completes */
  221. /* Used for determining whether or not duplicate devices */
  222. /* have responded to the same inquiry */
  223. TIMER_LIST_ENT inq_timer_ent;
  224. tINQ_BDADDR *p_bd_db; /* Pointer to memory that holds bdaddrs */
  225. UINT16 num_bd_entries; /* Number of entries in database */
  226. UINT16 max_bd_entries; /* Maximum number of entries that can be stored */
  227. tINQ_DB_ENT inq_db[BTM_INQ_DB_SIZE];
  228. tBTM_INQ_PARMS inqparms; /* Contains the parameters for the current inquiry */
  229. tBTM_INQUIRY_CMPL inq_cmpl_info; /* Status and number of responses from the last inquiry */
  230. UINT16 per_min_delay; /* Current periodic minimum delay */
  231. UINT16 per_max_delay; /* Current periodic maximum delay */
  232. BOOLEAN inqfilt_active;
  233. UINT8 pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
  234. /* inquiry that has been cancelled*/
  235. UINT8 inqfilt_type; /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
  236. #define BTM_INQ_INACTIVE_STATE 0
  237. #define BTM_INQ_CLR_FILT_STATE 1 /* Currently clearing the inquiry filter preceeding the inquiry request */
  238. /* (bypassed if filtering is not used) */
  239. #define BTM_INQ_SET_FILT_STATE 2 /* Sets the new filter (or turns off filtering) in this state */
  240. #define BTM_INQ_ACTIVE_STATE 3 /* Actual inquiry or periodic inquiry is in progress */
  241. #define BTM_INQ_REMNAME_STATE 4 /* Remote name requests are active */
  242. UINT8 state; /* Current state that the inquiry process is in */
  243. UINT8 inq_active; /* Bit Mask indicating type of inquiry is active */
  244. BOOLEAN no_inc_ssp; /* TRUE, to stop inquiry on incoming SSP */
  245. #if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
  246. btm_inq_state next_state; /*interleaving state to determine next mode to be inquired*/
  247. #endif
  248. } tBTM_INQUIRY_VAR_ST;
  249. /* The MSB of the clock offset field indicates that the offset is valid if TRUE */
  250. #define BTM_CLOCK_OFFSET_VALID 0x8000
  251. /* Define the structures needed by security management
  252. */
  253. #define BTM_SEC_INVALID_HANDLE 0xFFFF
  254. typedef UINT8 *BTM_BD_NAME_PTR; /* Pointer to Device name */
  255. /* Security callback is called by this unit when security
  256. ** procedures are completed. Parameters are
  257. ** BD Address of remote
  258. ** Result of the operation
  259. */
  260. typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
  261. typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
  262. /* MACROs to convert from SCO packet types mask to ESCO and back */
  263. #define BTM_SCO_PKT_TYPE_MASK ( HCI_PKT_TYPES_MASK_HV1 \
  264. | HCI_PKT_TYPES_MASK_HV2 \
  265. | HCI_PKT_TYPES_MASK_HV3)
  266. /* Mask defining only the SCO types of an esco packet type */
  267. #define BTM_ESCO_PKT_TYPE_MASK ( HCI_ESCO_PKT_TYPES_MASK_HV1 \
  268. | HCI_ESCO_PKT_TYPES_MASK_HV2 \
  269. | HCI_ESCO_PKT_TYPES_MASK_HV3)
  270. #define BTM_SCO_2_ESCO(scotype) ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
  271. #define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
  272. /* Define masks for supported and exception 2.0 SCO packet types
  273. */
  274. #define BTM_SCO_SUPPORTED_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_HV1 | \
  275. HCI_ESCO_PKT_TYPES_MASK_HV2 | \
  276. HCI_ESCO_PKT_TYPES_MASK_HV3 | \
  277. HCI_ESCO_PKT_TYPES_MASK_EV3 | \
  278. HCI_ESCO_PKT_TYPES_MASK_EV4 | \
  279. HCI_ESCO_PKT_TYPES_MASK_EV5)
  280. #define BTM_SCO_EXCEPTION_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3 | \
  281. HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3 | \
  282. HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5 | \
  283. HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
  284. #define BTM_SCO_ROUTE_UNKNOWN 0xff
  285. /* Define the structure that contains (e)SCO data */
  286. typedef struct {
  287. tBTM_ESCO_CBACK *p_esco_cback; /* Callback for eSCO events */
  288. tBTM_ESCO_PARAMS setup;
  289. tBTM_ESCO_DATA data; /* Connection complete information */
  290. UINT8 hci_status;
  291. } tBTM_ESCO_INFO;
  292. /* Define the structure used for SCO Management
  293. */
  294. typedef struct {
  295. tBTM_ESCO_INFO esco; /* Current settings */
  296. #if BTM_SCO_HCI_INCLUDED == TRUE
  297. BUFFER_Q xmit_data_q; /* SCO data transmitting queue */
  298. #endif
  299. tBTM_SCO_CB *p_conn_cb; /* Callback for when connected */
  300. tBTM_SCO_CB *p_disc_cb; /* Callback for when disconnect */
  301. UINT16 state; /* The state of the SCO link */
  302. UINT16 hci_handle; /* HCI Handle */
  303. BOOLEAN is_orig; /* TRUE if the originator */
  304. BOOLEAN rem_bd_known; /* TRUE if remote BD addr known */
  305. } tSCO_CONN;
  306. /* SCO Management control block */
  307. typedef struct {
  308. tBTM_SCO_IND_CBACK *app_sco_ind_cb;
  309. #if BTM_SCO_HCI_INCLUDED == TRUE
  310. tBTM_SCO_DATA_CB *p_data_cb; /* Callback for SCO data over HCI */
  311. UINT32 xmit_window_size; /* Total SCO window in bytes */
  312. #endif
  313. tSCO_CONN sco_db[BTM_MAX_SCO_LINKS];
  314. tBTM_ESCO_PARAMS def_esco_parms;
  315. BD_ADDR xfer_addr;
  316. UINT16 sco_disc_reason;
  317. BOOLEAN esco_supported; /* TRUE if 1.2 cntlr AND supports eSCO links */
  318. tBTM_SCO_TYPE desired_sco_mode;
  319. tBTM_SCO_TYPE xfer_sco_type;
  320. tBTM_SCO_PCM_PARAM sco_pcm_param;
  321. tBTM_SCO_CODEC_TYPE codec_in_use; /* None, CVSD, MSBC, etc. */
  322. #if BTM_SCO_HCI_INCLUDED == TRUE
  323. tBTM_SCO_ROUTE_TYPE sco_path;
  324. #endif
  325. } tSCO_CB;
  326. #if BTM_SCO_INCLUDED == TRUE
  327. void btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
  328. void btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
  329. tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
  330. void btm_reject_sco_link(UINT16 sco_inx );
  331. void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
  332. #else
  333. #define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
  334. #define btm_reject_sco_link(sco_inx)
  335. #define btm_set_sco_ind_cback(sco_ind_cb)
  336. #define btm_sco_chk_pend_rolechange(hci_handle)
  337. #endif /* BTM_SCO_INCLUDED */
  338. /*
  339. ** Define structure for Security Service Record.
  340. ** A record exists for each service registered with the Security Manager
  341. */
  342. typedef struct {
  343. UINT32 mx_proto_id; /* Service runs over this multiplexer protocol */
  344. UINT32 orig_mx_chan_id; /* Channel on the multiplexer protocol */
  345. UINT32 term_mx_chan_id; /* Channel on the multiplexer protocol */
  346. UINT16 psm; /* L2CAP PSM value */
  347. UINT16 security_flags; /* Bitmap of required security features */
  348. UINT8 service_id; /* Passed in authorization callback */
  349. #if (L2CAP_UCD_INCLUDED == TRUE)
  350. UINT16 ucd_security_flags; /* Bitmap of required security features for UCD */
  351. #endif
  352. #if BTM_SEC_SERVICE_NAME_LEN > 0
  353. UINT8 orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
  354. UINT8 term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
  355. #endif
  356. } tBTM_SEC_SERV_REC;
  357. #if BLE_INCLUDED == TRUE
  358. /* LE Security information of device in Slave Role */
  359. typedef struct {
  360. BT_OCTET16 irk; /* peer diverified identity root */
  361. BT_OCTET16 pltk; /* peer long term key */
  362. BT_OCTET16 pcsrk; /* peer SRK peer device used to secured sign local data */
  363. BT_OCTET16 lltk; /* local long term key */
  364. BT_OCTET16 lcsrk; /* local SRK peer device used to secured sign local data */
  365. BT_OCTET8 rand; /* random vector for LTK generation */
  366. UINT16 ediv; /* LTK diversifier of this slave device */
  367. UINT16 div; /* local DIV to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1) */
  368. UINT8 sec_level; /* local pairing security level */
  369. UINT8 key_size; /* key size of the LTK delivered to peer device */
  370. UINT8 srk_sec_level; /* security property of peer SRK for this device */
  371. UINT8 local_csrk_sec_level; /* security property of local CSRK for this device */
  372. UINT32 counter; /* peer sign counter for verifying rcv signed cmd */
  373. UINT32 local_counter; /* local sign counter for sending signed write cmd*/
  374. } tBTM_SEC_BLE_KEYS;
  375. typedef struct {
  376. BD_ADDR pseudo_addr; /* LE pseudo address of the device if different from device address */
  377. tBLE_ADDR_TYPE ble_addr_type; /* LE device type: public or random address */
  378. tBLE_ADDR_TYPE static_addr_type; /* static address type */
  379. BD_ADDR static_addr; /* static address */
  380. #define BTM_WHITE_LIST_BIT 0x01
  381. #define BTM_RESOLVING_LIST_BIT 0x02
  382. UINT8 in_controller_list; /* in controller resolving list or not */
  383. UINT8 resolving_list_index;
  384. #if BLE_PRIVACY_SPT == TRUE
  385. BD_ADDR cur_rand_addr; /* current random address */
  386. #define BTM_BLE_ADDR_PSEUDO 0 /* address index device record */
  387. #define BTM_BLE_ADDR_RRA 1 /* cur_rand_addr */
  388. #define BTM_BLE_ADDR_STATIC 2 /* static_addr */
  389. UINT8 active_addr_type;
  390. #endif
  391. #if SMP_INCLUDED == TRUE
  392. tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */
  393. tBTM_SEC_BLE_KEYS keys; /* LE device security info in slave rode */
  394. #endif
  395. } tBTM_SEC_BLE;
  396. #endif /* BLE_INCLUDED */
  397. /* Peering bond type */
  398. enum {
  399. BOND_TYPE_UNKNOWN,
  400. BOND_TYPE_PERSISTENT,
  401. BOND_TYPE_TEMPORARY
  402. };
  403. typedef UINT8 tBTM_BOND_TYPE;
  404. /*
  405. ** Define structure for Security Device Record.
  406. ** A record exists for each device authenticated with this device
  407. */
  408. typedef struct {
  409. tBTM_SEC_SERV_REC *p_cur_service;
  410. tBTM_SEC_CALLBACK *p_callback;
  411. void *p_ref_data;
  412. UINT32 timestamp; /* Timestamp of the last connection */
  413. UINT32 trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE]; /* Bitwise OR of trusted services */
  414. UINT16 hci_handle; /* Handle to connection when exists */
  415. UINT16 clock_offset; /* Latest known clock offset */
  416. BD_ADDR bd_addr; /* BD_ADDR of the device */
  417. DEV_CLASS dev_class; /* DEV_CLASS of the device */
  418. LINK_KEY link_key; /* Device link key */
  419. UINT8 pin_code_length; /* Length of the pin_code used for paring */
  420. #define BTM_SEC_AUTHORIZED BTM_SEC_FLAG_AUTHORIZED /* 0x01 */
  421. #define BTM_SEC_AUTHENTICATED BTM_SEC_FLAG_AUTHENTICATED /* 0x02 */
  422. #define BTM_SEC_ENCRYPTED BTM_SEC_FLAG_ENCRYPTED /* 0x04 */
  423. #define BTM_SEC_NAME_KNOWN 0x08
  424. #define BTM_SEC_LINK_KEY_KNOWN BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
  425. #define BTM_SEC_LINK_KEY_AUTHED BTM_SEC_FLAG_LKEY_AUTHED /* 0x20 */
  426. #define BTM_SEC_ROLE_SWITCHED 0x40
  427. #define BTM_SEC_IN_USE 0x80
  428. /* LE link security flag */
  429. #define BTM_SEC_LE_AUTHENTICATED 0x0200 /* LE link is encrypted after pairing with MITM */
  430. #define BTM_SEC_LE_ENCRYPTED 0x0400 /* LE link is encrypted */
  431. #define BTM_SEC_LE_NAME_KNOWN 0x0800 /* not used */
  432. #define BTM_SEC_LE_LINK_KEY_KNOWN 0x1000 /* bonded with peer (peer LTK and/or SRK is saved) */
  433. #define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000 /* pairing is done with MITM */
  434. #define BTM_SEC_16_DIGIT_PIN_AUTHED 0x4000 /* pairing is done with 16 digit pin */
  435. UINT16 sec_flags; /* Current device security state */
  436. tBTM_BD_NAME sec_bd_name; /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
  437. BD_FEATURES features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Features supported by the device */
  438. UINT8 num_read_pages;
  439. #define BTM_SEC_STATE_IDLE 0
  440. #define BTM_SEC_STATE_AUTHENTICATING 1
  441. #define BTM_SEC_STATE_ENCRYPTING 2
  442. #define BTM_SEC_STATE_GETTING_NAME 3
  443. #define BTM_SEC_STATE_AUTHORIZING 4
  444. #define BTM_SEC_STATE_SWITCHING_ROLE 5
  445. #define BTM_SEC_STATE_DISCONNECTING 6 /* disconnecting BR/EDR */
  446. #define BTM_SEC_STATE_DELAY_FOR_ENC 7 /* delay to check for encryption to work around */
  447. /* controller problems */
  448. #define BTM_SEC_STATE_DISCONNECTING_BLE 8 /* disconnecting BLE */
  449. #define BTM_SEC_STATE_DISCONNECTING_BOTH 9 /* disconnecting BR/EDR and BLE */
  450. UINT8 sec_state; /* Operating state */
  451. BOOLEAN is_originator; /* TRUE if device is originating connection */
  452. #if (L2CAP_UCD_INCLUDED == TRUE)
  453. BOOLEAN is_ucd; /* TRUE if device is sending or receiving UCD */
  454. /* if incoming security failed, received UCD will be discarded */
  455. #endif
  456. BOOLEAN role_master; /* TRUE if current mode is master */
  457. UINT16 security_required; /* Security required for connection */
  458. BOOLEAN link_key_not_sent; /* link key notification has not been sent waiting for name */
  459. UINT8 link_key_type; /* Type of key used in pairing */
  460. BOOLEAN link_key_changed; /* Changed link key during current connection */
  461. #define BTM_MAX_PRE_SM4_LKEY_TYPE BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
  462. #define BTM_SM4_UNKNOWN 0x00
  463. #define BTM_SM4_KNOWN 0x10
  464. #define BTM_SM4_TRUE 0x11
  465. #define BTM_SM4_REQ_PEND 0x08 /* set this bit when getting remote features */
  466. #define BTM_SM4_UPGRADE 0x04 /* set this bit when upgrading link key */
  467. #define BTM_SM4_RETRY 0x02 /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
  468. #define BTM_SM4_DD_ACP 0x20 /* set this bit to indicate peer initiated dedicated bonding */
  469. #define BTM_SM4_CONN_PEND 0x40 /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
  470. UINT8 sm4; /* BTM_SM4_TRUE, if the peer supports SM4 */
  471. tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */
  472. tBTM_AUTH_REQ rmt_auth_req; /* the auth_req flag as in the IO caps rsp evt */
  473. BOOLEAN remote_supports_secure_connections;
  474. BOOLEAN remote_features_needed; /* set to true if the local device is in */
  475. /* "Secure Connections Only" mode and it receives */
  476. /* HCI_IO_CAPABILITY_REQUEST_EVT from the peer before */
  477. /* it knows peer's support for Secure Connections */
  478. UINT16 ble_hci_handle; /* use in DUMO connection */
  479. UINT8 enc_key_size; /* current link encryption key size */
  480. tBT_DEVICE_TYPE device_type;
  481. BOOLEAN new_encryption_key_is_p256; /* Set to TRUE when the newly generated LK
  482. ** is generated from P-256.
  483. ** Link encrypted with such LK can be used
  484. ** for SM over BR/EDR.
  485. */
  486. BOOLEAN no_smp_on_br; /* if set to TRUE then SMP on BR/EDR doesn't */
  487. /* work, i.e. link keys crosspairing */
  488. /* SC BR/EDR->SC LE doesn't happen */
  489. tBTM_BOND_TYPE bond_type; /* peering bond type */
  490. #if BLE_INCLUDED == TRUE
  491. tBTM_SEC_BLE ble;
  492. tBTM_LE_CONN_PRAMS conn_params;
  493. #endif
  494. // btla-specific ++
  495. #if BTM_DISC_DURING_RS == TRUE
  496. #define BTM_SEC_RS_NOT_PENDING 0 /* Role Switch not in progress */
  497. #define BTM_SEC_RS_PENDING 1 /* Role Switch in progress */
  498. #define BTM_SEC_DISC_PENDING 2 /* Disconnect is pending */
  499. UINT8 rs_disc_pending;
  500. #endif
  501. // btla-specific --
  502. #define BTM_SEC_NO_LAST_SERVICE_ID 0
  503. UINT8 last_author_service_id; /* ID of last serviced authorized: Reset after each l2cap connection */
  504. } tBTM_SEC_DEV_REC;
  505. #define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
  506. #define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
  507. #define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
  508. #define BTM_SEC_LE_MASK (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
  509. /*
  510. ** Define device configuration structure
  511. */
  512. typedef struct {
  513. #if BTM_MAX_LOC_BD_NAME_LEN > 0
  514. tBTM_LOC_BD_NAME bd_name; /* local Bluetooth device name */
  515. #endif
  516. BOOLEAN pin_type; /* TRUE if PIN type is fixed */
  517. UINT8 pin_code_len; /* Bonding information */
  518. PIN_CODE pin_code; /* PIN CODE if pin type is fixed */
  519. BOOLEAN connectable; /* If TRUE page scan should be enabled */
  520. UINT8 def_inq_scan_mode; /* ??? limited/general/none */
  521. } tBTM_CFG;
  522. enum {
  523. BTM_PM_ST_ACTIVE = BTM_PM_STS_ACTIVE,
  524. BTM_PM_ST_HOLD = BTM_PM_STS_HOLD,
  525. BTM_PM_ST_SNIFF = BTM_PM_STS_SNIFF,
  526. BTM_PM_ST_PARK = BTM_PM_STS_PARK,
  527. BTM_PM_ST_PENDING = BTM_PM_STS_PENDING
  528. };
  529. typedef UINT8 tBTM_PM_STATE;
  530. enum {
  531. BTM_PM_SET_MODE_EVT, /* Set power mode API is called. */
  532. BTM_PM_UPDATE_EVT,
  533. BTM_PM_RD_MODE_EVT /* Read power mode API is called. */
  534. };
  535. typedef UINT8 tBTM_PM_EVENT;
  536. typedef struct {
  537. UINT16 event;
  538. UINT16 len;
  539. UINT8 link_ind;
  540. } tBTM_PM_MSG_DATA;
  541. typedef struct {
  542. UINT8 hci_status;
  543. UINT8 mode;
  544. UINT16 interval;
  545. } tBTM_PM_MD_CHG_DATA;
  546. typedef struct {
  547. UINT8 pm_id; /* the entity that calls SetPowerMode API */
  548. tBTM_PM_PWR_MD *p_pmd;
  549. } tBTM_PM_SET_MD_DATA;
  550. typedef struct {
  551. void *p_data;
  552. UINT8 link_ind;
  553. } tBTM_PM_SM_DATA;
  554. typedef struct {
  555. tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS + 1]; /* the desired mode and parameters of the connection*/
  556. tBTM_PM_PWR_MD set_mode; /* the mode and parameters sent down to the host controller. */
  557. UINT16 interval; /* the interval from last mode change event. */
  558. #if (BTM_SSR_INCLUDED == TRUE)
  559. UINT16 max_lat; /* stored SSR maximum latency */
  560. UINT16 min_rmt_to;/* stored SSR minimum remote timeout */
  561. UINT16 min_loc_to;/* stored SSR minimum local timeout */
  562. #endif
  563. tBTM_PM_STATE state; /* contains the current mode of the connection */
  564. BOOLEAN chg_ind; /* a request change indication */
  565. } tBTM_PM_MCB;
  566. #define BTM_PM_REC_NOT_USED 0
  567. typedef struct {
  568. tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
  569. UINT8 mask; /* registered request mask. 0, if this entry is not used */
  570. } tBTM_PM_RCB;
  571. enum {
  572. BTM_BLI_ACL_UP_EVT,
  573. BTM_BLI_ACL_DOWN_EVT,
  574. BTM_BLI_PAGE_EVT,
  575. BTM_BLI_PAGE_DONE_EVT,
  576. BTM_BLI_INQ_EVT,
  577. BTM_BLI_INQ_CANCEL_EVT,
  578. BTM_BLI_INQ_DONE_EVT
  579. };
  580. typedef UINT8 tBTM_BLI_EVENT;
  581. /* Pairing State */
  582. enum {
  583. BTM_PAIR_STATE_IDLE, /* Idle */
  584. BTM_PAIR_STATE_GET_REM_NAME, /* Getting the remote name (to check for SM4) */
  585. BTM_PAIR_STATE_WAIT_PIN_REQ, /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
  586. BTM_PAIR_STATE_WAIT_LOCAL_PIN, /* Waiting for local PIN code */
  587. BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM, /* Waiting user 'yes' to numeric confirmation */
  588. BTM_PAIR_STATE_KEY_ENTRY, /* Key entry state (we are a keyboard) */
  589. BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP, /* Waiting for local response to peer OOB data */
  590. BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS, /* Waiting for local IO capabilities and OOB data */
  591. BTM_PAIR_STATE_INCOMING_SSP, /* Incoming SSP (got peer IO caps when idle) */
  592. BTM_PAIR_STATE_WAIT_AUTH_COMPLETE, /* All done, waiting authentication cpmplete */
  593. BTM_PAIR_STATE_WAIT_DISCONNECT /* Waiting to disconnect the ACL */
  594. };
  595. typedef UINT8 tBTM_PAIRING_STATE;
  596. #define BTM_PAIR_FLAGS_WE_STARTED_DD 0x01 /* We want to do dedicated bonding */
  597. #define BTM_PAIR_FLAGS_PEER_STARTED_DD 0x02 /* Peer initiated dedicated bonding */
  598. #define BTM_PAIR_FLAGS_DISC_WHEN_DONE 0x04 /* Disconnect when done */
  599. #define BTM_PAIR_FLAGS_PIN_REQD 0x08 /* set this bit when pin_callback is called */
  600. #define BTM_PAIR_FLAGS_PRE_FETCH_PIN 0x10 /* set this bit when pre-fetch pin */
  601. #define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20 /* set this bit when rejected incoming connection */
  602. #define BTM_PAIR_FLAGS_WE_CANCEL_DD 0x40 /* set this bit when cancelling a bonding procedure */
  603. #define BTM_PAIR_FLAGS_LE_ACTIVE 0x80 /* use this bit when SMP pairing is active */
  604. typedef struct {
  605. BOOLEAN is_mux;
  606. BD_ADDR bd_addr;
  607. UINT16 psm;
  608. BOOLEAN is_orig;
  609. tBTM_SEC_CALLBACK *p_callback;
  610. void *p_ref_data;
  611. UINT32 mx_proto_id;
  612. UINT32 mx_chan_id;
  613. tBT_TRANSPORT transport;
  614. } tBTM_SEC_QUEUE_ENTRY;
  615. #if (L2CAP_UCD_INCLUDED == TRUE)
  616. #define CONN_ORIENT_TERM 0x00 /* incoming connection oriented */
  617. #define CONN_ORIENT_ORIG 0x01 /* outgoing connection oriented */
  618. #define CONNLESS_TERM 0x02 /* incoming connectionless */
  619. #define CONNLESS_ORIG 0x03 /* outgoing connectionless */
  620. #define CONNECTION_TYPE_ORIG_MASK 0x01 /* mask for direction */
  621. #define CONNECTION_TYPE_CONNLESS_MASK 0x02 /* mask for connectionless or not */
  622. typedef UINT8 CONNECTION_TYPE;
  623. #else
  624. #define CONN_ORIENT_TERM FALSE
  625. #define CONN_ORIENT_ORIG TRUE
  626. typedef BOOLEAN CONNECTION_TYPE;
  627. #endif /* (L2CAP_UCD_INCLUDED == TRUE) */
  628. /* Define a structure to hold all the BTM data
  629. */
  630. #define BTM_STATE_BUFFER_SIZE 5 /* size of state buffer */
  631. typedef struct {
  632. tBTM_CFG cfg; /* Device configuration */
  633. /****************************************************
  634. ** ACL Management
  635. ****************************************************/
  636. tACL_CONN acl_db[MAX_L2CAP_LINKS];
  637. UINT8 btm_scn[BTM_MAX_SCN]; /* current SCNs: TRUE if SCN is in use */
  638. UINT16 btm_def_link_policy;
  639. UINT16 btm_def_link_super_tout;
  640. tBTM_BL_EVENT_MASK bl_evt_mask;
  641. tBTM_BL_CHANGE_CB *p_bl_changed_cb; /* Callback for when Busy Level changed */
  642. /****************************************************
  643. ** Power Management
  644. ****************************************************/
  645. tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS]; /* per ACL link */
  646. tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS + 1]; /* per application/module */
  647. UINT8 pm_pend_link; /* the index of acl_db, which has a pending PM cmd */
  648. UINT8 pm_pend_id; /* the id pf the module, which has a pending PM cmd */
  649. /*****************************************************
  650. ** Device control
  651. *****************************************************/
  652. tBTM_DEVCB devcb;
  653. /*****************************************************
  654. ** BLE Device controllers
  655. *****************************************************/
  656. #if (BLE_INCLUDED == TRUE)
  657. tBTM_BLE_CB ble_ctr_cb;
  658. UINT16 enc_handle;
  659. BT_OCTET8 enc_rand; /* received rand value from LTK request*/
  660. UINT16 ediv; /* received ediv value from LTK request */
  661. UINT8 key_size;
  662. tBTM_BLE_VSC_CB cmn_ble_vsc_cb;
  663. #endif
  664. /* Packet types supported by the local device */
  665. UINT16 btm_acl_pkt_types_supported;
  666. UINT16 btm_sco_pkt_types_supported;
  667. /*****************************************************
  668. ** Inquiry
  669. *****************************************************/
  670. tBTM_INQUIRY_VAR_ST btm_inq_vars;
  671. /*****************************************************
  672. ** SCO Management
  673. *****************************************************/
  674. #if BTM_SCO_INCLUDED == TRUE
  675. tSCO_CB sco_cb;
  676. #endif
  677. /*****************************************************
  678. ** Security Management
  679. *****************************************************/
  680. tBTM_APPL_INFO api;
  681. #define BTM_SEC_MAX_RMT_NAME_CALLBACKS 2
  682. tBTM_RMT_NAME_CALLBACK *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
  683. tBTM_SEC_DEV_REC *p_collided_dev_rec;
  684. TIMER_LIST_ENT sec_collision_tle;
  685. UINT32 collision_start_time;
  686. UINT32 max_collision_delay;
  687. UINT32 dev_rec_count; /* Counter used for device record timestamp */
  688. UINT8 security_mode;
  689. BOOLEAN pairing_disabled;
  690. BOOLEAN connect_only_paired;
  691. BOOLEAN security_mode_changed; /* mode changed during bonding */
  692. BOOLEAN pin_type_changed; /* pin type changed during bonding */
  693. BOOLEAN sec_req_pending; /* TRUE if a request is pending */
  694. // btla-specific ++
  695. #ifdef PORCHE_PAIRING_CONFLICT
  696. UINT8 pin_code_len_saved; /* for legacy devices */
  697. #endif
  698. // btla-specific --
  699. UINT8 pin_code_len; /* for legacy devices */
  700. PIN_CODE pin_code; /* for legacy devices */
  701. tBTM_PAIRING_STATE pairing_state; /* The current pairing state */
  702. UINT8 pairing_flags; /* The current pairing flags */
  703. BD_ADDR pairing_bda; /* The device currently pairing */
  704. TIMER_LIST_ENT pairing_tle; /* Timer for pairing process */
  705. UINT16 disc_handle; /* for legacy devices */
  706. UINT8 disc_reason; /* for legacy devices */
  707. tBTM_SEC_SERV_REC sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
  708. tBTM_SEC_DEV_REC sec_dev_rec[BTM_SEC_MAX_DEVICE_RECORDS];
  709. tBTM_SEC_SERV_REC *p_out_serv;
  710. tBTM_MKEY_CALLBACK *mkey_cback;
  711. BD_ADDR connecting_bda;
  712. DEV_CLASS connecting_dc;
  713. UINT8 acl_disc_reason;
  714. UINT8 trace_level;
  715. UINT8 busy_level; /* the current busy level */
  716. BOOLEAN is_paging; /* TRUE, if paging is in progess */
  717. BOOLEAN is_inquiry; /* TRUE, if inquiry is in progess */
  718. BUFFER_Q page_queue;
  719. BOOLEAN paging;
  720. BOOLEAN discing;
  721. BUFFER_Q sec_pending_q; /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
  722. #if (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
  723. char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
  724. #endif
  725. } tBTM_CB;
  726. /*
  727. #ifdef __cplusplus
  728. extern "C"
  729. {
  730. #endif
  731. */
  732. #if BTM_DYNAMIC_MEMORY == FALSE
  733. extern tBTM_CB btm_cb;
  734. #else
  735. extern tBTM_CB *btm_cb_ptr;
  736. #define btm_cb (*btm_cb_ptr)
  737. #endif
  738. /* Internal functions provided by btm_main.c
  739. ********************************************
  740. */
  741. void btm_init (void);
  742. /* Internal functions provided by btm_inq.c
  743. *******************************************
  744. */
  745. tBTM_STATUS btm_initiate_rem_name (BD_ADDR remote_bda,
  746. tBTM_INQ_INFO *p_cur,
  747. UINT8 origin, UINT32 timeout,
  748. tBTM_CMPL_CB *p_cb);
  749. void btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
  750. UINT8 hci_status);
  751. void btm_inq_rmt_name_failed(void);
  752. /* Inquiry related functions */
  753. void btm_clr_inq_db (BD_ADDR p_bda);
  754. void btm_inq_db_init (void);
  755. void btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
  756. void btm_process_inq_complete (UINT8 status, UINT8 mode);
  757. void btm_process_cancel_complete(UINT8 status, UINT8 mode);
  758. void btm_event_filter_complete (UINT8 *p);
  759. void btm_inq_stop_on_ssp(void);
  760. void btm_inq_clear_ssp(void);
  761. tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
  762. BOOLEAN btm_inq_find_bdaddr (BD_ADDR p_bda);
  763. BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
  764. /* Internal functions provided by btm_acl.c
  765. ********************************************
  766. */
  767. void btm_acl_init (void);
  768. void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
  769. UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
  770. void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
  771. void btm_acl_device_down (void);
  772. void btm_acl_update_busy_level (tBTM_BLI_EVENT event);
  773. void btm_cont_rswitch (tACL_CONN *p,
  774. tBTM_SEC_DEV_REC *p_dev_rec,
  775. UINT8 hci_status);
  776. UINT8 btm_handle_to_acl_index (UINT16 hci_handle);
  777. void btm_read_link_policy_complete (UINT8 *p);
  778. void btm_read_rssi_complete (UINT8 *p);
  779. void btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble);
  780. void btm_read_link_quality_complete (UINT8 *p);
  781. tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
  782. void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
  783. void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
  784. void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
  785. UINT16 btm_get_acl_disc_reason_code (void);
  786. tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
  787. void btm_read_remote_features_complete (UINT8 *p);
  788. void btm_read_remote_ext_features_complete (UINT8 *p);
  789. void btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
  790. void btm_read_remote_version_complete (UINT8 *p);
  791. void btm_establish_continue (tACL_CONN *p_acl_cb);
  792. // btla-specific ++
  793. void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
  794. // btla-specific --
  795. /* Read maximum data packet that can be sent over current connection */
  796. UINT16 btm_get_max_packet_size (BD_ADDR addr);
  797. tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
  798. BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda);
  799. void btm_pm_reset(void);
  800. void btm_pm_sm_alloc(UINT8 ind);
  801. void btm_pm_proc_cmd_status(UINT8 status);
  802. void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
  803. UINT16 interval);
  804. void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
  805. #if BTM_SCO_INCLUDED == TRUE
  806. void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
  807. #else
  808. #define btm_sco_chk_pend_unpark(hci_status, hci_handle)
  809. #endif /* BTM_SCO_INCLUDED */
  810. void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow);
  811. /* Internal functions provided by btm_sco.c
  812. ********************************************
  813. */
  814. void btm_sco_init (void);
  815. void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
  816. tBTM_ESCO_DATA *p_esco_data);
  817. void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
  818. UINT8 retrans_window, UINT16 rx_pkt_len,
  819. UINT16 tx_pkt_len);
  820. void btm_sco_conn_req (BD_ADDR bda, DEV_CLASS dev_class, UINT8 link_type);
  821. void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
  822. void btm_sco_acl_removed (BD_ADDR bda);
  823. void btm_route_sco_data (BT_HDR *p_msg);
  824. BOOLEAN btm_is_sco_active (UINT16 handle);
  825. void btm_remove_sco_links (BD_ADDR bda);
  826. BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
  827. tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
  828. UINT16 btm_find_scb_by_handle (UINT16 handle);
  829. void btm_sco_flush_sco_data(UINT16 sco_inx);
  830. /* Internal functions provided by btm_devctl.c
  831. **********************************************
  832. */
  833. void btm_dev_init (void);
  834. void btm_dev_timeout (TIMER_LIST_ENT *p_tle);
  835. void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len);
  836. #if (BLE_INCLUDED == TRUE)
  837. void btm_ble_add_2_white_list_complete(UINT8 status);
  838. void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
  839. void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
  840. BOOLEAN btm_ble_addr_resolvable(BD_ADDR rpa, tBTM_SEC_DEV_REC *p_dev_rec);
  841. tBTM_STATUS btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *p_dev_rec);
  842. BOOLEAN btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *p_dev_rec);
  843. void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *p_dev_rec);
  844. #endif /* BLE_INCLUDED */
  845. /* Vendor Specific Command complete evt handler */
  846. void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
  847. tBTM_CMPL_CB *p_vsc_cplt_cback);
  848. void btm_inq_db_reset (void);
  849. void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
  850. void btm_delete_stored_link_key_complete (UINT8 *p);
  851. void btm_report_device_status (tBTM_DEV_STATUS status);
  852. /* Internal functions provided by btm_dev.c
  853. **********************************************
  854. */
  855. BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
  856. tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr);
  857. void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
  858. tBTM_SEC_DEV_REC *btm_find_dev (BD_ADDR bd_addr);
  859. tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr);
  860. tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle);
  861. tBTM_BOND_TYPE btm_get_bond_type_dev(BD_ADDR bd_addr);
  862. BOOLEAN btm_set_bond_type_dev(BD_ADDR bd_addr,
  863. tBTM_BOND_TYPE bond_type);
  864. /* Internal functions provided by btm_sec.c
  865. **********************************************
  866. */
  867. BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
  868. tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
  869. UINT16 handle, CONNECTION_TYPE conn_type,
  870. tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
  871. tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
  872. UINT32 mx_proto_id, UINT32 mx_chan_id,
  873. tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
  874. void btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
  875. void btm_create_conn_cancel_complete (UINT8 *p);
  876. void btm_read_linq_tx_power_complete (UINT8 *p);
  877. void btm_sec_init (UINT8 sec_mode);
  878. void btm_sec_dev_reset (void);
  879. void btm_sec_abort_access_req (BD_ADDR bd_addr);
  880. void btm_sec_auth_complete (UINT16 handle, UINT8 status);
  881. void btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
  882. void btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
  883. tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
  884. void btm_sec_disconnected (UINT16 handle, UINT8 reason);
  885. void btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
  886. void btm_sec_rmt_host_support_feat_evt (UINT8 *p);
  887. void btm_io_capabilities_req (UINT8 *p);
  888. void btm_io_capabilities_rsp (UINT8 *p);
  889. void btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
  890. void btm_keypress_notif_evt (UINT8 *p);
  891. void btm_simple_pair_complete (UINT8 *p);
  892. void btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
  893. void btm_sec_link_key_request (UINT8 *p_bda);
  894. void btm_sec_pin_code_request (UINT8 *p_bda);
  895. void btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
  896. void btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
  897. void btm_sec_set_peer_sec_caps (tACL_CONN *p_acl_cb, tBTM_SEC_DEV_REC *p_dev_rec);
  898. #if BLE_INCLUDED == TRUE
  899. void btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC *p_dev_rec);
  900. BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT8 *p_found_idx, tBTM_SEC_DEV_REC **p_rec);
  901. BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
  902. void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec);
  903. BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
  904. BOOLEAN btm_ble_init_pseudo_addr (tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR new_pseudo_addr);
  905. #endif /* BLE_INCLUDED */
  906. tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
  907. #if BTM_OOB_INCLUDED == TRUE
  908. void btm_rem_oob_req (UINT8 *p);
  909. void btm_read_local_oob_complete (UINT8 *p);
  910. #else
  911. #define btm_rem_oob_req(p)
  912. #define btm_read_local_oob_complete(p)
  913. #endif
  914. void btm_acl_resubmit_page (void);
  915. void btm_acl_reset_paging (void);
  916. void btm_acl_paging (BT_HDR *p, BD_ADDR dest);
  917. UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
  918. void btm_sec_clr_temp_auth_service (BD_ADDR bda);
  919. /*
  920. #ifdef __cplusplus
  921. }
  922. #endif
  923. */
  924. #endif