btm_dev.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657
  1. /******************************************************************************
  2. *
  3. * Copyright (C) 1999-2012 Broadcom Corporation
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at:
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. *
  17. ******************************************************************************/
  18. /******************************************************************************
  19. *
  20. * This file contains functions for the Bluetooth Device Manager
  21. *
  22. ******************************************************************************/
  23. #include <stdlib.h>
  24. #include <string.h>
  25. //#include <stdio.h>
  26. #include <stddef.h>
  27. #include "stack/bt_types.h"
  28. #include "device/controller.h"
  29. #include "stack/hcimsgs.h"
  30. #include "stack/btu.h"
  31. #include "stack/btm_api.h"
  32. #include "btm_int.h"
  33. #include "stack/hcidefs.h"
  34. #include "stack/l2c_api.h"
  35. static tBTM_SEC_DEV_REC *btm_find_oldest_dev (void);
  36. /*******************************************************************************
  37. **
  38. ** Function BTM_SecAddDevice
  39. **
  40. ** Description Add/modify device. This function will be normally called
  41. ** during host startup to restore all required information
  42. ** stored in the NVRAM.
  43. **
  44. ** Parameters: bd_addr - BD address of the peer
  45. ** dev_class - Device Class
  46. ** bd_name - Name of the peer device. NULL if unknown.
  47. ** features - Remote device's features (up to 3 pages). NULL if not known
  48. ** trusted_mask - Bitwise OR of services that do not
  49. ** require authorization. (array of UINT32)
  50. ** link_key - Connection link key. NULL if unknown.
  51. **
  52. ** Returns TRUE if added OK, else FALSE
  53. **
  54. *******************************************************************************/
  55. BOOLEAN BTM_SecAddDevice (BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name,
  56. UINT8 *features, UINT32 trusted_mask[],
  57. LINK_KEY link_key, UINT8 key_type, tBTM_IO_CAP io_cap,
  58. UINT8 pin_length)
  59. {
  60. #if (SMP_INCLUDED == TRUE)
  61. tBTM_SEC_DEV_REC *p_dev_rec;
  62. int i, j;
  63. BOOLEAN found = FALSE;
  64. BTM_TRACE_API("%s, link key type:%x\n", __FUNCTION__, key_type);
  65. p_dev_rec = btm_find_dev (bd_addr);
  66. if (!p_dev_rec) {
  67. /* There is no device record, allocate one.
  68. * If we can not find an empty spot for this one, let it fail. */
  69. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++) {
  70. if (!(btm_cb.sec_dev_rec[i].sec_flags & BTM_SEC_IN_USE)) {
  71. p_dev_rec = &btm_cb.sec_dev_rec[i];
  72. /* Mark this record as in use and initialize */
  73. memset (p_dev_rec, 0, sizeof (tBTM_SEC_DEV_REC));
  74. p_dev_rec->sec_flags = BTM_SEC_IN_USE;
  75. memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
  76. p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_BR_EDR);
  77. #if BLE_INCLUDED == TRUE
  78. /* use default value for background connection params */
  79. /* update conn params, use default value for background connection params */
  80. memset(&p_dev_rec->conn_params, 0xff, sizeof(tBTM_LE_CONN_PRAMS));
  81. #endif
  82. break;
  83. }
  84. }
  85. if (!p_dev_rec) {
  86. return (FALSE);
  87. }
  88. }
  89. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN; /* Default value */
  90. p_dev_rec->timestamp = btm_cb.dev_rec_count++;
  91. if (dev_class) {
  92. memcpy (p_dev_rec->dev_class, dev_class, DEV_CLASS_LEN);
  93. }
  94. memset(p_dev_rec->sec_bd_name, 0, sizeof(tBTM_BD_NAME));
  95. if (bd_name && bd_name[0]) {
  96. p_dev_rec->sec_flags |= BTM_SEC_NAME_KNOWN;
  97. BCM_STRNCPY_S ((char *)p_dev_rec->sec_bd_name, sizeof (p_dev_rec->sec_bd_name),
  98. (char *)bd_name, BTM_MAX_REM_BD_NAME_LEN);
  99. }
  100. p_dev_rec->num_read_pages = 0;
  101. if (features) {
  102. memcpy (p_dev_rec->features, features, sizeof (p_dev_rec->features));
  103. for (i = HCI_EXT_FEATURES_PAGE_MAX; i >= 0; i--) {
  104. for (j = 0; j < HCI_FEATURE_BYTES_PER_PAGE; j++) {
  105. if (p_dev_rec->features[i][j] != 0) {
  106. found = TRUE;
  107. break;
  108. }
  109. }
  110. if (found) {
  111. p_dev_rec->num_read_pages = i + 1;
  112. break;
  113. }
  114. }
  115. } else {
  116. memset (p_dev_rec->features, 0, sizeof (p_dev_rec->features));
  117. }
  118. BTM_SEC_COPY_TRUSTED_DEVICE(trusted_mask, p_dev_rec->trusted_mask);
  119. if (link_key) {
  120. BTM_TRACE_EVENT ("BTM_SecAddDevice() BDA: %02x:%02x:%02x:%02x:%02x:%02x\n",
  121. bd_addr[0], bd_addr[1], bd_addr[2],
  122. bd_addr[3], bd_addr[4], bd_addr[5]);
  123. p_dev_rec->sec_flags |= BTM_SEC_LINK_KEY_KNOWN;
  124. memcpy (p_dev_rec->link_key, link_key, LINK_KEY_LEN);
  125. p_dev_rec->link_key_type = key_type;
  126. p_dev_rec->pin_code_length = pin_length;
  127. if (pin_length >= 16 ||
  128. key_type == BTM_LKEY_TYPE_AUTH_COMB ||
  129. key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) {
  130. // Set the fiag if the link key was made by using either a 16 digit
  131. // pin or MITM.
  132. p_dev_rec->sec_flags |= BTM_SEC_16_DIGIT_PIN_AUTHED;
  133. }
  134. }
  135. #if defined(BTIF_MIXED_MODE_INCLUDED) && (BTIF_MIXED_MODE_INCLUDED == TRUE)
  136. if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) {
  137. p_dev_rec->sm4 = BTM_SM4_KNOWN;
  138. } else {
  139. p_dev_rec->sm4 = BTM_SM4_TRUE;
  140. }
  141. #endif
  142. p_dev_rec->rmt_io_caps = io_cap;
  143. p_dev_rec->device_type |= BT_DEVICE_TYPE_BREDR;
  144. #endif ///SMP_INCLUDED == TRUE
  145. return (TRUE);
  146. }
  147. /*******************************************************************************
  148. **
  149. ** Function BTM_SecDeleteDevice
  150. **
  151. ** Description Free resources associated with the device.
  152. **
  153. ** Parameters: bd_addr - BD address of the peer
  154. ** transport - BT_TRANSPORT_BR_EDR or BT_TRANSPORT_LE
  155. **
  156. ** Returns TRUE if removed OK, FALSE if not found or ACL link is active
  157. **
  158. *******************************************************************************/
  159. BOOLEAN BTM_SecDeleteDevice (BD_ADDR bd_addr, tBT_TRANSPORT transport)
  160. {
  161. tBTM_SEC_DEV_REC *p_dev_rec;
  162. if (BTM_IsAclConnectionUp(bd_addr, transport)) {
  163. BTM_TRACE_WARNING("%s FAILED: Cannot Delete when connection is active\n", __func__);
  164. return FALSE;
  165. }
  166. if ((p_dev_rec = btm_find_dev(bd_addr)) != NULL) {
  167. btm_sec_free_dev(p_dev_rec, transport);
  168. /* Tell controller to get rid of the link key, if it has one stored */
  169. BTM_DeleteStoredLinkKey (p_dev_rec->bd_addr, NULL);
  170. }
  171. return TRUE;
  172. }
  173. /*******************************************************************************
  174. **
  175. ** Function BTM_SecClearSecurityFlags
  176. **
  177. ** Description Reset the security flags (mark as not-paired) for a given
  178. ** remove device.
  179. **
  180. *******************************************************************************/
  181. extern void BTM_SecClearSecurityFlags (BD_ADDR bd_addr)
  182. {
  183. tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev(bd_addr);
  184. if (p_dev_rec == NULL)
  185. return;
  186. p_dev_rec->sec_flags = 0;
  187. p_dev_rec->sec_state = BTM_SEC_STATE_IDLE;
  188. p_dev_rec->sm4 = BTM_SM4_UNKNOWN;
  189. }
  190. /*******************************************************************************
  191. **
  192. ** Function BTM_SecReadDevName
  193. **
  194. ** Description Looks for the device name in the security database for the
  195. ** specified BD address.
  196. **
  197. ** Returns Pointer to the name or NULL
  198. **
  199. *******************************************************************************/
  200. char *BTM_SecReadDevName (BD_ADDR bd_addr)
  201. {
  202. char *p_name = NULL;
  203. tBTM_SEC_DEV_REC *p_srec;
  204. if ((p_srec = btm_find_dev(bd_addr)) != NULL) {
  205. p_name = (char *)p_srec->sec_bd_name;
  206. }
  207. return (p_name);
  208. }
  209. /*******************************************************************************
  210. **
  211. ** Function btm_sec_alloc_dev
  212. **
  213. ** Description Look for the record in the device database for the record
  214. ** with specified address
  215. **
  216. ** Returns Pointer to the record or NULL
  217. **
  218. *******************************************************************************/
  219. tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr)
  220. {
  221. tBTM_SEC_DEV_REC *p_dev_rec = NULL;
  222. tBTM_INQ_INFO *p_inq_info;
  223. int i;
  224. DEV_CLASS old_cod;
  225. int i_new_entry = BTM_SEC_MAX_DEVICE_RECORDS;
  226. int i_old_entry = BTM_SEC_MAX_DEVICE_RECORDS;
  227. BTM_TRACE_EVENT ("btm_sec_alloc_dev\n");
  228. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++) {
  229. /* look for old entry where device details are present */
  230. if (!(btm_cb.sec_dev_rec[i].sec_flags & BTM_SEC_IN_USE) &&
  231. (!memcmp (btm_cb.sec_dev_rec[i].bd_addr, bd_addr, BD_ADDR_LEN))) {
  232. i_old_entry = i;
  233. BTM_TRACE_EVENT ("btm_sec_alloc_dev old device found\n");
  234. break;
  235. }
  236. }
  237. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++) {
  238. if (!(btm_cb.sec_dev_rec[i].sec_flags & BTM_SEC_IN_USE)) {
  239. i_new_entry = i;
  240. break;
  241. }
  242. }
  243. if (i_new_entry == BTM_SEC_MAX_DEVICE_RECORDS) {
  244. p_dev_rec = btm_find_oldest_dev();
  245. } else {
  246. /* if the old device entry not present go with
  247. new entry */
  248. if (i_old_entry == BTM_SEC_MAX_DEVICE_RECORDS) {
  249. p_dev_rec = &btm_cb.sec_dev_rec[i_new_entry];
  250. } else {
  251. p_dev_rec = &btm_cb.sec_dev_rec[i_old_entry];
  252. memcpy (old_cod, p_dev_rec->dev_class, DEV_CLASS_LEN);
  253. }
  254. }
  255. memset (p_dev_rec, 0, sizeof (tBTM_SEC_DEV_REC));
  256. /* Retain the old COD for device */
  257. if (i_old_entry != BTM_SEC_MAX_DEVICE_RECORDS) {
  258. BTM_TRACE_EVENT ("btm_sec_alloc_dev restoring cod \n");
  259. memcpy (p_dev_rec->dev_class, old_cod, DEV_CLASS_LEN);
  260. }
  261. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN; /* Default value */
  262. p_dev_rec->sec_flags = BTM_SEC_IN_USE;
  263. /* Check with the BT manager if details about remote device are known */
  264. /* outgoing connection */
  265. if ((p_inq_info = BTM_InqDbRead(bd_addr)) != NULL) {
  266. memcpy (p_dev_rec->dev_class, p_inq_info->results.dev_class, DEV_CLASS_LEN);
  267. #if BLE_INCLUDED == TRUE
  268. p_dev_rec->device_type = p_inq_info->results.device_type;
  269. p_dev_rec->ble.ble_addr_type = p_inq_info->results.ble_addr_type;
  270. /* update conn params, use default value for background connection params */
  271. memset(&p_dev_rec->conn_params, 0xff, sizeof(tBTM_LE_CONN_PRAMS));
  272. #endif
  273. } else {
  274. #if BLE_INCLUDED == TRUE
  275. /* update conn params, use default value for background connection params */
  276. memset(&p_dev_rec->conn_params, 0xff, sizeof(tBTM_LE_CONN_PRAMS));
  277. #endif
  278. if (!memcmp (bd_addr, btm_cb.connecting_bda, BD_ADDR_LEN)) {
  279. memcpy (p_dev_rec->dev_class, btm_cb.connecting_dc, DEV_CLASS_LEN);
  280. }
  281. }
  282. memcpy (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN);
  283. #if BLE_INCLUDED == TRUE
  284. p_dev_rec->ble_hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_LE);
  285. #endif
  286. p_dev_rec->hci_handle = BTM_GetHCIConnHandle (bd_addr, BT_TRANSPORT_BR_EDR);
  287. p_dev_rec->timestamp = btm_cb.dev_rec_count++;
  288. return (p_dev_rec);
  289. }
  290. /*******************************************************************************
  291. **
  292. ** Function btm_sec_free_dev
  293. **
  294. ** Description Mark device record as not used
  295. **
  296. *******************************************************************************/
  297. void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec, tBT_TRANSPORT transport)
  298. {
  299. if (transport == BT_TRANSPORT_BR_EDR) {
  300. memset(p_dev_rec->link_key, 0, LINK_KEY_LEN);
  301. p_dev_rec->sec_flags &= ~(BTM_SEC_AUTHORIZED | BTM_SEC_AUTHENTICATED
  302. | BTM_SEC_ENCRYPTED | BTM_SEC_NAME_KNOWN
  303. | BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_LINK_KEY_AUTHED
  304. | BTM_SEC_ROLE_SWITCHED | BTM_SEC_16_DIGIT_PIN_AUTHED);
  305. } else if (transport == BT_TRANSPORT_LE) {
  306. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN;
  307. p_dev_rec->sec_flags &= ~(BTM_SEC_LE_AUTHENTICATED | BTM_SEC_LE_ENCRYPTED
  308. | BTM_SEC_LE_NAME_KNOWN | BTM_SEC_LE_LINK_KEY_KNOWN
  309. | BTM_SEC_LE_LINK_KEY_AUTHED | BTM_SEC_ROLE_SWITCHED);
  310. #if BLE_INCLUDED == TRUE
  311. /* Clear out any saved BLE keys */
  312. btm_sec_clear_ble_keys (p_dev_rec);
  313. #endif
  314. } else {
  315. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN;
  316. memset(p_dev_rec->link_key, 0, LINK_KEY_LEN);
  317. p_dev_rec->sec_flags = 0;
  318. #if BLE_INCLUDED == TRUE
  319. /* Clear out any saved BLE keys */
  320. btm_sec_clear_ble_keys (p_dev_rec);
  321. #endif
  322. }
  323. /* No BLE keys and BT keys, clear the sec_flags */
  324. if(p_dev_rec->sec_flags == BTM_SEC_IN_USE) {
  325. p_dev_rec->sec_flags = 0;
  326. }
  327. }
  328. /*******************************************************************************
  329. **
  330. ** Function btm_dev_support_switch
  331. **
  332. ** Description This function is called by the L2CAP to check if remote
  333. ** device supports role switch
  334. **
  335. ** Parameters: bd_addr - Address of the peer device
  336. **
  337. ** Returns TRUE if device is known and role switch is supported
  338. **
  339. *******************************************************************************/
  340. BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr)
  341. {
  342. tBTM_SEC_DEV_REC *p_dev_rec;
  343. UINT8 xx;
  344. BOOLEAN feature_empty = TRUE;
  345. #if BTM_SCO_INCLUDED == TRUE
  346. /* Role switch is not allowed if a SCO is up */
  347. if (btm_is_sco_active_by_bdaddr(bd_addr)) {
  348. return (FALSE);
  349. }
  350. #endif
  351. p_dev_rec = btm_find_dev (bd_addr);
  352. if (p_dev_rec && controller_get_interface()->supports_master_slave_role_switch()) {
  353. if (HCI_SWITCH_SUPPORTED(p_dev_rec->features[HCI_EXT_FEATURES_PAGE_0])) {
  354. BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)\n");
  355. return (TRUE);
  356. }
  357. /* If the feature field is all zero, we never received them */
  358. for (xx = 0 ; xx < BD_FEATURES_LEN ; xx++) {
  359. if (p_dev_rec->features[HCI_EXT_FEATURES_PAGE_0][xx] != 0x00) {
  360. feature_empty = FALSE; /* at least one is != 0 */
  361. break;
  362. }
  363. }
  364. /* If we don't know peer's capabilities, assume it supports Role-switch */
  365. if (feature_empty) {
  366. BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature empty)\n");
  367. return (TRUE);
  368. }
  369. }
  370. BTM_TRACE_DEBUG("btm_dev_support_switch return FALSE\n");
  371. return (FALSE);
  372. }
  373. /*******************************************************************************
  374. **
  375. ** Function btm_find_dev_by_handle
  376. **
  377. ** Description Look for the record in the device database for the record
  378. ** with specified handle
  379. **
  380. ** Returns Pointer to the record or NULL
  381. **
  382. *******************************************************************************/
  383. tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle)
  384. {
  385. tBTM_SEC_DEV_REC *p_dev_rec = &btm_cb.sec_dev_rec[0];
  386. int i;
  387. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++, p_dev_rec++) {
  388. if ((p_dev_rec->sec_flags & BTM_SEC_IN_USE)
  389. && ((p_dev_rec->hci_handle == handle)
  390. #if BLE_INCLUDED == TRUE
  391. || (p_dev_rec->ble_hci_handle == handle)
  392. #endif
  393. )) {
  394. return (p_dev_rec);
  395. }
  396. }
  397. return (NULL);
  398. }
  399. /*******************************************************************************
  400. **
  401. ** Function btm_find_dev
  402. **
  403. ** Description Look for the record in the device database for the record
  404. ** with specified BD address
  405. **
  406. ** Returns Pointer to the record or NULL
  407. **
  408. *******************************************************************************/
  409. tBTM_SEC_DEV_REC *btm_find_dev(BD_ADDR bd_addr)
  410. {
  411. tBTM_SEC_DEV_REC *p_dev_rec = &btm_cb.sec_dev_rec[0];
  412. if (bd_addr) {
  413. for (uint8_t i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++, p_dev_rec++) {
  414. if (p_dev_rec->sec_flags & BTM_SEC_IN_USE) {
  415. if (!memcmp (p_dev_rec->bd_addr, bd_addr, BD_ADDR_LEN)) {
  416. return (p_dev_rec);
  417. }
  418. #if BLE_INCLUDED == TRUE
  419. // If a LE random address is looking for device record
  420. if (!memcmp(p_dev_rec->ble.pseudo_addr, bd_addr, BD_ADDR_LEN)) {
  421. return (p_dev_rec);
  422. }
  423. if (btm_ble_addr_resolvable(bd_addr, p_dev_rec)) {
  424. return (p_dev_rec);
  425. }
  426. #endif
  427. }
  428. }
  429. }
  430. return (NULL);
  431. }
  432. /*******************************************************************************
  433. **
  434. ** Function btm_consolidate_dev
  435. **
  436. ** Description combine security records if identified as same peer
  437. **
  438. ** Returns none
  439. **
  440. *******************************************************************************/
  441. void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec)
  442. {
  443. #if BLE_INCLUDED == TRUE && SMP_INCLUDED == TRUE
  444. tBTM_SEC_DEV_REC *p_dev_rec = &btm_cb.sec_dev_rec[0];
  445. tBTM_SEC_DEV_REC temp_rec = *p_target_rec;
  446. BTM_TRACE_DEBUG("%s\n", __func__);
  447. for (uint8_t i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++, p_dev_rec++) {
  448. if (p_target_rec != p_dev_rec && p_dev_rec->sec_flags & BTM_SEC_IN_USE) {
  449. if (!memcmp (p_dev_rec->bd_addr, p_target_rec->bd_addr, BD_ADDR_LEN)) {
  450. memcpy(p_target_rec, p_dev_rec, sizeof(tBTM_SEC_DEV_REC));
  451. p_target_rec->ble = temp_rec.ble;
  452. p_target_rec->ble_hci_handle = temp_rec.ble_hci_handle;
  453. p_target_rec->enc_key_size = temp_rec.enc_key_size;
  454. p_target_rec->conn_params = temp_rec.conn_params;
  455. p_target_rec->device_type |= temp_rec.device_type;
  456. p_target_rec->sec_flags |= temp_rec.sec_flags;
  457. p_target_rec->new_encryption_key_is_p256 = temp_rec.new_encryption_key_is_p256;
  458. p_target_rec->no_smp_on_br = temp_rec.no_smp_on_br;
  459. p_target_rec->bond_type = temp_rec.bond_type;
  460. /* mark the combined record as unused */
  461. p_dev_rec->sec_flags &= ~BTM_SEC_IN_USE;
  462. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN;
  463. break;
  464. }
  465. /* an RPA device entry is a duplicate of the target record */
  466. if (btm_ble_addr_resolvable(p_dev_rec->bd_addr, p_target_rec)) {
  467. if (memcmp(p_target_rec->ble.pseudo_addr, p_dev_rec->bd_addr, BD_ADDR_LEN) == 0) {
  468. p_target_rec->ble.ble_addr_type = p_dev_rec->ble.ble_addr_type;
  469. p_target_rec->device_type |= p_dev_rec->device_type;
  470. p_dev_rec->sec_flags &= ~BTM_SEC_IN_USE;
  471. p_dev_rec->bond_type = BOND_TYPE_UNKNOWN;
  472. }
  473. break;
  474. }
  475. }
  476. }
  477. #endif
  478. }
  479. /*******************************************************************************
  480. **
  481. ** Function btm_find_or_alloc_dev
  482. **
  483. ** Description Look for the record in the device database for the record
  484. ** with specified BD address
  485. **
  486. ** Returns Pointer to the record or NULL
  487. **
  488. *******************************************************************************/
  489. tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr)
  490. {
  491. tBTM_SEC_DEV_REC *p_dev_rec;
  492. BTM_TRACE_EVENT ("btm_find_or_alloc_dev\n");
  493. if ((p_dev_rec = btm_find_dev (bd_addr)) == NULL) {
  494. /* Allocate a new device record or reuse the oldest one */
  495. p_dev_rec = btm_sec_alloc_dev (bd_addr);
  496. }
  497. return (p_dev_rec);
  498. }
  499. /*******************************************************************************
  500. **
  501. ** Function btm_find_oldest_dev
  502. **
  503. ** Description Locates the oldest device in use. It first looks for
  504. ** the oldest non-paired device. If all devices are paired it
  505. ** deletes the oldest paired device.
  506. **
  507. ** Returns Pointer to the record or NULL
  508. **
  509. *******************************************************************************/
  510. tBTM_SEC_DEV_REC *btm_find_oldest_dev (void)
  511. {
  512. tBTM_SEC_DEV_REC *p_dev_rec = &btm_cb.sec_dev_rec[0];
  513. tBTM_SEC_DEV_REC *p_oldest = p_dev_rec;
  514. UINT32 ot = 0xFFFFFFFF;
  515. int i;
  516. /* First look for the non-paired devices for the oldest entry */
  517. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++, p_dev_rec++) {
  518. if (((p_dev_rec->sec_flags & BTM_SEC_IN_USE) == 0)
  519. || ((p_dev_rec->sec_flags & (BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_LE_LINK_KEY_KNOWN)) != 0)) {
  520. continue; /* Device is paired so skip it */
  521. }
  522. if (p_dev_rec->timestamp < ot) {
  523. p_oldest = p_dev_rec;
  524. ot = p_dev_rec->timestamp;
  525. }
  526. }
  527. if (ot != 0xFFFFFFFF) {
  528. return (p_oldest);
  529. }
  530. /* All devices are paired; find the oldest */
  531. p_dev_rec = &btm_cb.sec_dev_rec[0];
  532. for (i = 0; i < BTM_SEC_MAX_DEVICE_RECORDS; i++, p_dev_rec++) {
  533. if ((p_dev_rec->sec_flags & BTM_SEC_IN_USE) == 0) {
  534. continue;
  535. }
  536. if (p_dev_rec->timestamp < ot) {
  537. p_oldest = p_dev_rec;
  538. ot = p_dev_rec->timestamp;
  539. }
  540. }
  541. return (p_oldest);
  542. }
  543. /*******************************************************************************
  544. **
  545. ** Function btm_get_bond_type_dev
  546. **
  547. ** Description Get the bond type for a device in the device database
  548. ** with specified BD address
  549. **
  550. ** Returns The device bond type if known, otherwise BOND_TYPE_UNKNOWN
  551. **
  552. *******************************************************************************/
  553. tBTM_BOND_TYPE btm_get_bond_type_dev(BD_ADDR bd_addr)
  554. {
  555. tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev(bd_addr);
  556. if (p_dev_rec == NULL) {
  557. return BOND_TYPE_UNKNOWN;
  558. }
  559. return p_dev_rec->bond_type;
  560. }
  561. /*******************************************************************************
  562. **
  563. ** Function btm_set_bond_type_dev
  564. **
  565. ** Description Set the bond type for a device in the device database
  566. ** with specified BD address
  567. **
  568. ** Returns TRUE on success, otherwise FALSE
  569. **
  570. *******************************************************************************/
  571. BOOLEAN btm_set_bond_type_dev(BD_ADDR bd_addr, tBTM_BOND_TYPE bond_type)
  572. {
  573. tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev(bd_addr);
  574. if (p_dev_rec == NULL) {
  575. return FALSE;
  576. }
  577. p_dev_rec->bond_type = bond_type;
  578. return TRUE;
  579. }