/****************************************************************************** * * Copyright (C) 2000-2012 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ /***************************************************************************** ** ** Name: btm_acl.c ** ** Description: This file contains functions that handle ACL connections. ** This includes operations such as hold and sniff modes, ** supported packet types. ** ** This module contains both internal and external (API) ** functions. External (API) functions are distinguishable ** by their names beginning with uppercase BTM. ** ** ******************************************************************************/ #include #include //#include #include #include "stack/bt_types.h" #include "common/bt_target.h" #include "device/controller.h" #include "stack/hcimsgs.h" #include "stack/btu.h" #include "stack/btm_api.h" #include "btm_int.h" #include "l2c_int.h" #include "stack/hcidefs.h" //#include "bt_utils.h" #include "osi/list.h" static void btm_read_remote_features (UINT16 handle); static void btm_read_remote_ext_features (UINT16 handle, UINT8 page_number); static void btm_process_remote_ext_features (tACL_CONN *p_acl_cb, UINT8 num_read_pages); #define BTM_DEV_REPLY_TIMEOUT 3 /* 3 second timeout waiting for responses */ /******************************************************************************* ** ** Function btm_acl_init ** ** Description This function is called at BTM startup to initialize ** ** Returns void ** *******************************************************************************/ void btm_acl_init (void) { BTM_TRACE_DEBUG ("btm_acl_init\n"); #if 0 /* cleared in btm_init; put back in if called from anywhere else! */ memset (&btm_cb.acl_db, 0, sizeof (btm_cb.acl_db)); memset (btm_cb.btm_scn, 0, BTM_MAX_SCN); /* Initialize the SCN usage to FALSE */ btm_cb.btm_def_link_policy = 0; btm_cb.p_bl_changed_cb = NULL; #endif btm_cb.p_acl_db_list = list_new(osi_free_func); btm_cb.p_pm_mode_db_list = list_new(osi_free_func); /* Initialize nonzero defaults */ btm_cb.btm_def_link_super_tout = HCI_DEFAULT_INACT_TOUT; btm_cb.acl_disc_reason = 0xff ; } /******************************************************************************* ** ** Function btm_bda_to_acl ** ** Description This function returns the FIRST acl_db entry for the passed BDA. ** ** Parameters bda : BD address of the remote device ** transport : Physical transport used for ACL connection (BR/EDR or LE) ** ** Returns Returns pointer to the ACL DB for the requested BDA if found. ** NULL if not found. ** *******************************************************************************/ BOOLEAN btm_get_acl_db(void *p_acl_db_node, void *context) { tACL_CONN *p_acl_db =(tACL_CONN *)p_acl_db_node; BOOLEAN ret = TRUE; tACL_DB_PARAM *p_param = (tACL_DB_PARAM *)context; switch(p_param->type) { case ACL_DB_BDA: { UINT8 *p_bda = (UINT8 *)p_param->p_data1; #if BLE_INCLUDED == TRUE tBT_TRANSPORT transport = (tBT_TRANSPORT)(*((UINT8 *)p_param->p_data2)); #endif if (p_acl_db->in_use && !memcmp(p_bda, p_acl_db->remote_addr, BD_ADDR_LEN) #if BLE_INCLUDED == TRUE && transport == p_acl_db->transport #endif ) { ret = FALSE; } break; } case ACL_DB_HANDLE: { UINT16 handle = (UINT16) *((UINT16 *)p_param->p_data1); if (p_acl_db->in_use && handle == p_acl_db->hci_handle) { ret = FALSE; } break; } default: break; } return ret; } tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport) { tACL_CONN *p_acl_db = NULL; list_node_t *p_node = NULL; tACL_DB_PARAM acl_params; acl_params.type = ACL_DB_BDA; acl_params.p_data1 = (void *)bda; acl_params.p_data2 = (void *)&transport; p_node = list_foreach(btm_cb.p_acl_db_list, btm_get_acl_db, (void *)&acl_params); if (p_node) { p_acl_db = list_node(p_node); } return (p_acl_db); } /******************************************************************************* ** ** Function btm_handle_to_acl ** ** Description This function returns the FIRST acl_db entry for the passed hci_handle. ** ** Returns Returns pointer to the ACL DB for the requested BDA if found. ** NULL if not found. ** *******************************************************************************/ tACL_CONN *btm_handle_to_acl (UINT16 hci_handle) { tACL_CONN *p_acl_db = NULL; tACL_DB_PARAM acl_params; list_node_t *p_node = NULL; BTM_TRACE_DEBUG ("btm_handle_to_acl_index: %d\n", hci_handle); acl_params.type = ACL_DB_HANDLE; acl_params.p_data1 = (void *)&hci_handle; acl_params.p_data2 = NULL; p_node = list_foreach(btm_cb.p_acl_db_list, btm_get_acl_db, (void *)&acl_params); if (p_node) { p_acl_db = list_node(p_node); } return (p_acl_db); } #if BLE_PRIVACY_SPT == TRUE /******************************************************************************* ** ** Function btm_ble_get_acl_remote_addr ** ** Description This function reads the active remote address used for the ** connection. ** ** Returns success return TRUE, otherwise FALSE. ** *******************************************************************************/ BOOLEAN btm_ble_get_acl_remote_addr(tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR conn_addr, tBLE_ADDR_TYPE *p_addr_type) { #if BLE_INCLUDED == TRUE BOOLEAN st = TRUE; if (p_dev_rec == NULL) { BTM_TRACE_ERROR("btm_ble_get_acl_remote_addr can not find device with matching address\n"); return FALSE; } switch (p_dev_rec->ble.active_addr_type) { case BTM_BLE_ADDR_PSEUDO: memcpy(conn_addr, p_dev_rec->bd_addr, BD_ADDR_LEN); * p_addr_type = p_dev_rec->ble.ble_addr_type; break; case BTM_BLE_ADDR_RRA: memcpy(conn_addr, p_dev_rec->ble.cur_rand_addr, BD_ADDR_LEN); * p_addr_type = BLE_ADDR_RANDOM; break; case BTM_BLE_ADDR_STATIC: memcpy(conn_addr, p_dev_rec->ble.static_addr, BD_ADDR_LEN); * p_addr_type = p_dev_rec->ble.static_addr_type; break; default: BTM_TRACE_ERROR("Unknown active address: %d\n", p_dev_rec->ble.active_addr_type); st = FALSE; break; } return st; #else UNUSED(p_dev_rec); UNUSED(conn_addr); UNUSED(p_addr_type); return FALSE; #endif } #endif /******************************************************************************* ** ** Function btm_acl_created ** ** Description This function is called by L2CAP when an ACL connection ** is created. ** ** Returns void ** *******************************************************************************/ void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, UINT8 bdn[BTM_MAX_REM_BD_NAME_LEN], UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport) { tBTM_SEC_DEV_REC *p_dev_rec = NULL; tACL_CONN *p; BTM_TRACE_DEBUG ("btm_acl_created hci_handle=%d link_role=%d transport=%d\n", hci_handle, link_role, transport); /* Ensure we don't have duplicates */ p = btm_bda_to_acl(bda, transport); if (p != (tACL_CONN *)NULL) { p->hci_handle = hci_handle; p->link_role = link_role; #if BLE_INCLUDED == TRUE p->transport = transport; #endif BTM_TRACE_DEBUG ("Duplicate btm_acl_created: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", bda[0], bda[1], bda[2], bda[3], bda[4], bda[5]); BTM_SetLinkPolicy(p->remote_addr, &btm_cb.btm_def_link_policy); return; } /* Allocate acl_db entry */ if (list_length(btm_cb.p_acl_db_list) >= MAX_L2CAP_LINKS) { return; } else { p = (tACL_CONN *)osi_malloc(sizeof(tACL_CONN)); if (p && list_append(btm_cb.p_acl_db_list, p)) { memset(p, 0, sizeof(tACL_CONN)); p->in_use = TRUE; p->hci_handle = hci_handle; p->link_role = link_role; p->link_up_issued = FALSE; memcpy (p->remote_addr, bda, BD_ADDR_LEN); /* Set the default version of the peer device to version4.0 before exchange the version with it. If the peer device act as a master and don't exchange the version with us, then it can only use the legacy connect instead of secure connection in the pairing step. */ p->lmp_version = HCI_PROTO_VERSION_4_0; #if BLE_INCLUDED == TRUE p->transport = transport; #if BLE_PRIVACY_SPT == TRUE if (transport == BT_TRANSPORT_LE) { btm_ble_refresh_local_resolvable_private_addr(bda, btm_cb.ble_ctr_cb.addr_mgnt_cb.private_addr); } #else p->conn_addr_type = BLE_ADDR_PUBLIC; memcpy(p->conn_addr, &controller_get_interface()->get_address()->address, BD_ADDR_LEN); BTM_TRACE_DEBUG ("conn_addr: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", p->conn_addr[0], p->conn_addr[1], p->conn_addr[2], p->conn_addr[3], p->conn_addr[4], p->conn_addr[5]); #endif #endif p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; p->p_pm_mode_db = btm_pm_sm_alloc(); #if BTM_PM_DEBUG == TRUE BTM_TRACE_DEBUG( "btm_pm_sm_alloc handle:%d st:%d", hci_handle, p->p_pm_mode_db->state); #endif // BTM_PM_DEBUG #if (CLASSIC_BT_INCLUDED == TRUE) btm_sec_update_legacy_auth_state(p, BTM_ACL_LEGACY_AUTH_NONE); #endif if (dc) { memcpy (p->remote_dc, dc, DEV_CLASS_LEN); } if (bdn) { memcpy (p->remote_name, bdn, BTM_MAX_REM_BD_NAME_LEN); } /* if BR/EDR do something more */ if (transport == BT_TRANSPORT_BR_EDR) { btsnd_hcic_read_rmt_clk_offset (p->hci_handle); btsnd_hcic_rmt_ver_req (p->hci_handle); } p_dev_rec = btm_find_dev_by_handle (hci_handle); #if (BLE_INCLUDED == TRUE) if (p_dev_rec ) { BTM_TRACE_DEBUG ("device_type=0x%x\n", p_dev_rec->device_type); } #endif if (p_dev_rec && !(transport == BT_TRANSPORT_LE)) { if (!p_dev_rec->remote_secure_connection_previous_state) { /* If remote features already known, copy them and continue connection setup */ if ((p_dev_rec->num_read_pages) && (p_dev_rec->num_read_pages <= (HCI_EXT_FEATURES_PAGE_MAX + 1))) { memcpy (p->peer_lmp_features, p_dev_rec->features, (HCI_FEATURE_BYTES_PER_PAGE * p_dev_rec->num_read_pages)); p->num_read_pages = p_dev_rec->num_read_pages; #if (CLASSIC_BT_INCLUDED == TRUE) const UINT8 req_pend = (p_dev_rec->sm4 & BTM_SM4_REQ_PEND); #endif ///CLASSIC_BT_INCLUDED == TRUE /* Store the Peer Security Capabilites (in SM4 and rmt_sec_caps) */ #if (SMP_INCLUDED == TRUE) btm_sec_set_peer_sec_caps(p, p_dev_rec); #endif ///SMP_INCLUDED == TRUE #if (CLASSIC_BT_INCLUDED == TRUE) BTM_TRACE_API("%s: pend:%d\n", __FUNCTION__, req_pend); if (req_pend) { /* Request for remaining Security Features (if any) */ l2cu_resubmit_pending_sec_req (p_dev_rec->bd_addr); } #endif ///CLASSIC_BT_INCLUDED == TRUE btm_establish_continue (p); return; } } } #if (BLE_INCLUDED == TRUE) /* If here, features are not known yet */ if (p_dev_rec && transport == BT_TRANSPORT_LE) { #if BLE_PRIVACY_SPT == TRUE btm_ble_get_acl_remote_addr (p_dev_rec, p->active_remote_addr, &p->active_remote_addr_type); #endif if (link_role == HCI_ROLE_MASTER) { btsnd_hcic_ble_read_remote_feat(p->hci_handle); } else if (HCI_LE_SLAVE_INIT_FEAT_EXC_SUPPORTED(controller_get_interface()->get_features_ble()->as_array) && link_role == HCI_ROLE_SLAVE) { btsnd_hcic_rmt_ver_req (p->hci_handle); } else { btm_establish_continue(p); } } else #endif { btm_read_remote_features (p->hci_handle); } /* read page 1 - on rmt feature event for buffer reasons */ return; } } } /******************************************************************************* ** ** Function btm_acl_report_role_change ** ** Description This function is called when the local device is deemed ** to be down. It notifies L2CAP of the failure. ** ** Returns void ** *******************************************************************************/ void btm_acl_report_role_change (UINT8 hci_status, BD_ADDR bda) { tBTM_ROLE_SWITCH_CMPL ref_data; BTM_TRACE_DEBUG ("btm_acl_report_role_change\n"); if (btm_cb.devcb.p_switch_role_cb && (bda && (0 == memcmp(btm_cb.devcb.switch_role_ref_data.remote_bd_addr, bda, BD_ADDR_LEN)))) { memcpy (&ref_data, &btm_cb.devcb.switch_role_ref_data, sizeof(tBTM_ROLE_SWITCH_CMPL)); ref_data.hci_status = hci_status; (*btm_cb.devcb.p_switch_role_cb)(&ref_data); memset (&btm_cb.devcb.switch_role_ref_data, 0, sizeof(tBTM_ROLE_SWITCH_CMPL)); btm_cb.devcb.p_switch_role_cb = NULL; } } /******************************************************************************* ** ** Function btm_acl_removed ** ** Description This function is called by L2CAP when an ACL connection ** is removed. Since only L2CAP creates ACL links, we use ** the L2CAP link index as our index into the control blocks. ** ** Returns void ** *******************************************************************************/ void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport) { tACL_CONN *p; tBTM_BL_EVENT_DATA evt_data; #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE) tBTM_SEC_DEV_REC *p_dev_rec = NULL; #endif BTM_TRACE_DEBUG ("btm_acl_removed\n"); p = btm_bda_to_acl(bda, transport); if (p != (tACL_CONN *)NULL) { p->in_use = FALSE; /* if the disconnected channel has a pending role switch, clear it now */ btm_acl_report_role_change(HCI_ERR_NO_CONNECTION, bda); /* Only notify if link up has had a chance to be issued */ if (p->link_up_issued) { p->link_up_issued = FALSE; /* If anyone cares, tell him database changed */ if (btm_cb.p_bl_changed_cb) { evt_data.event = BTM_BL_DISCN_EVT; evt_data.discn.p_bda = bda; #if BLE_INCLUDED == TRUE evt_data.discn.handle = p->hci_handle; evt_data.discn.transport = p->transport; #endif (*btm_cb.p_bl_changed_cb)(&evt_data); } btm_acl_update_busy_level (BTM_BLI_ACL_DOWN_EVT); } #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE) BTM_TRACE_DEBUG ("acl hci_handle=%d transport=%d connectable_mode=0x%0x link_role=%d\n", p->hci_handle, p->transport, btm_cb.ble_ctr_cb.inq_var.connectable_mode, p->link_role); p_dev_rec = btm_find_dev(bda); if ( p_dev_rec) { BTM_TRACE_DEBUG("before update p_dev_rec->sec_flags=0x%x\n", p_dev_rec->sec_flags); if (p->transport == BT_TRANSPORT_LE) { BTM_TRACE_DEBUG("LE link down\n"); p_dev_rec->sec_flags &= ~(BTM_SEC_LE_ENCRYPTED | BTM_SEC_ROLE_SWITCHED); if ( (p_dev_rec->sec_flags & BTM_SEC_LE_LINK_KEY_KNOWN) == 0) { BTM_TRACE_DEBUG("Not Bonded\n"); p_dev_rec->sec_flags &= ~(BTM_SEC_LE_LINK_KEY_AUTHED | BTM_SEC_LE_AUTHENTICATED); } else { BTM_TRACE_DEBUG("Bonded\n"); } } else { BTM_TRACE_DEBUG("Bletooth link down\n"); p_dev_rec->sec_flags &= ~(BTM_SEC_AUTHORIZED | BTM_SEC_AUTHENTICATED | BTM_SEC_ENCRYPTED | BTM_SEC_ROLE_SWITCHED); } BTM_TRACE_DEBUG("after update p_dev_rec->sec_flags=0x%x\n", p_dev_rec->sec_flags); } else { BTM_TRACE_ERROR("Device not found\n"); } #endif list_remove(btm_cb.p_pm_mode_db_list, p->p_pm_mode_db); /* Clear the ACL connection data */ memset(p, 0, sizeof(tACL_CONN)); if (list_remove(btm_cb.p_acl_db_list, p)) { p = NULL; } } } /******************************************************************************* ** ** Function btm_acl_device_down ** ** Description This function is called when the local device is deemed ** to be down. It notifies L2CAP of the failure. ** ** Returns void ** *******************************************************************************/ void btm_acl_device_down (void) { tACL_CONN *p = NULL; BTM_TRACE_DEBUG ("btm_acl_device_down\n"); for (list_node_t *p_node = list_begin(btm_cb.p_acl_db_list); p_node; p_node = list_next(p_node)) { p = list_node(p_node); if (p && p->in_use) { BTM_TRACE_DEBUG ("hci_handle=%d HCI_ERR_HW_FAILURE \n", p->hci_handle ); l2c_link_hci_disc_comp (p->hci_handle, HCI_ERR_HW_FAILURE); } } } /******************************************************************************* ** ** Function btm_acl_update_busy_level ** ** Description This function is called to update the busy level of the system ** . ** ** Returns void ** *******************************************************************************/ void btm_acl_update_busy_level (tBTM_BLI_EVENT event) { tBTM_BL_UPDATE_DATA evt; UINT8 busy_level; BTM_TRACE_DEBUG ("btm_acl_update_busy_level\n"); BOOLEAN old_inquiry_state = btm_cb.is_inquiry; switch (event) { case BTM_BLI_ACL_UP_EVT: BTM_TRACE_DEBUG ("BTM_BLI_ACL_UP_EVT\n"); break; case BTM_BLI_ACL_DOWN_EVT: BTM_TRACE_DEBUG ("BTM_BLI_ACL_DOWN_EVT\n"); break; case BTM_BLI_PAGE_EVT: BTM_TRACE_DEBUG ("BTM_BLI_PAGE_EVT\n"); btm_cb.is_paging = TRUE; evt.busy_level_flags = BTM_BL_PAGING_STARTED; break; case BTM_BLI_PAGE_DONE_EVT: BTM_TRACE_DEBUG ("BTM_BLI_PAGE_DONE_EVT\n"); btm_cb.is_paging = FALSE; evt.busy_level_flags = BTM_BL_PAGING_COMPLETE; break; case BTM_BLI_INQ_EVT: BTM_TRACE_DEBUG ("BTM_BLI_INQ_EVT\n"); btm_cb.is_inquiry = TRUE; evt.busy_level_flags = BTM_BL_INQUIRY_STARTED; break; case BTM_BLI_INQ_CANCEL_EVT: BTM_TRACE_DEBUG ("BTM_BLI_INQ_CANCEL_EVT\n"); btm_cb.is_inquiry = FALSE; evt.busy_level_flags = BTM_BL_INQUIRY_CANCELLED; break; case BTM_BLI_INQ_DONE_EVT: BTM_TRACE_DEBUG ("BTM_BLI_INQ_DONE_EVT\n"); btm_cb.is_inquiry = FALSE; evt.busy_level_flags = BTM_BL_INQUIRY_COMPLETE; break; } if (btm_cb.is_paging || btm_cb.is_inquiry) { busy_level = 10; } else { busy_level = BTM_GetNumAclLinks(); } if ((busy_level != btm_cb.busy_level) || (old_inquiry_state != btm_cb.is_inquiry)) { evt.event = BTM_BL_UPDATE_EVT; evt.busy_level = busy_level; btm_cb.busy_level = busy_level; if (btm_cb.p_bl_changed_cb && (btm_cb.bl_evt_mask & BTM_BL_UPDATE_MASK)) { (*btm_cb.p_bl_changed_cb)((tBTM_BL_EVENT_DATA *)&evt); } } } /******************************************************************************* ** ** Function BTM_GetRole ** ** Description This function is called to get the role of the local device ** for the ACL connection with the specified remote device ** ** Returns BTM_SUCCESS if connection exists. ** BTM_UNKNOWN_ADDR if no active link with bd addr specified ** *******************************************************************************/ tBTM_STATUS BTM_GetRole (BD_ADDR remote_bd_addr, UINT8 *p_role) { tACL_CONN *p; BTM_TRACE_DEBUG ("BTM_GetRole\n"); if ((p = btm_bda_to_acl(remote_bd_addr, BT_TRANSPORT_BR_EDR)) == NULL) { *p_role = BTM_ROLE_UNDEFINED; return (BTM_UNKNOWN_ADDR); } /* Get the current role */ *p_role = p->link_role; return (BTM_SUCCESS); } /******************************************************************************* ** ** Function BTM_SwitchRole ** ** Description This function is called to switch role between master and ** slave. If role is already set it will do nothing. If the ** command was initiated, the callback function is called upon ** completion. ** ** Returns BTM_SUCCESS if already in specified role. ** BTM_CMD_STARTED if command issued to controller. ** BTM_NO_RESOURCES if couldn't allocate memory to issue command ** BTM_UNKNOWN_ADDR if no active link with bd addr specified ** BTM_MODE_UNSUPPORTED if local device does not support role switching ** BTM_BUSY if the previous command is not completed ** *******************************************************************************/ tBTM_STATUS BTM_SwitchRole (BD_ADDR remote_bd_addr, UINT8 new_role, tBTM_CMPL_CB *p_cb) { tACL_CONN *p; tBTM_SEC_DEV_REC *p_dev_rec = NULL; #if BTM_SCO_INCLUDED == TRUE BOOLEAN is_sco_active; #endif tBTM_STATUS status; tBTM_PM_MODE pwr_mode; tBTM_PM_PWR_MD settings; #if (BT_USE_TRACES == TRUE) BD_ADDR_PTR p_bda; #endif BTM_TRACE_API ("BTM_SwitchRole BDA: %02x-%02x-%02x-%02x-%02x-%02x\n", remote_bd_addr[0], remote_bd_addr[1], remote_bd_addr[2], remote_bd_addr[3], remote_bd_addr[4], remote_bd_addr[5]); /* Make sure the local device supports switching */ if (!controller_get_interface()->supports_master_slave_role_switch()) { return (BTM_MODE_UNSUPPORTED); } if (btm_cb.devcb.p_switch_role_cb && p_cb) { #if (BT_USE_TRACES == TRUE) p_bda = btm_cb.devcb.switch_role_ref_data.remote_bd_addr; BTM_TRACE_DEBUG ("Role switch on other device is in progress 0x%02x%02x%02x%02x%02x%02x\n", p_bda[0], p_bda[1], p_bda[2], p_bda[3], p_bda[4], p_bda[5]); #endif return (BTM_BUSY); } if ((p = btm_bda_to_acl(remote_bd_addr, BT_TRANSPORT_BR_EDR)) == NULL) { return (BTM_UNKNOWN_ADDR); } /* Finished if already in desired role */ if (p->link_role == new_role) { return (BTM_SUCCESS); } #if BTM_SCO_INCLUDED == TRUE /* Check if there is any SCO Active on this BD Address */ is_sco_active = btm_is_sco_active_by_bdaddr(remote_bd_addr); if (is_sco_active == TRUE) { return (BTM_NO_RESOURCES); } #endif /* Ignore role switch request if the previous request was not completed */ if (p->switch_role_state != BTM_ACL_SWKEY_STATE_IDLE) { BTM_TRACE_DEBUG ("BTM_SwitchRole busy: %d\n", p->switch_role_state); return (BTM_BUSY); } if ((status = BTM_ReadPowerMode(p->remote_addr, &pwr_mode)) != BTM_SUCCESS) { return (status); } /* Wake up the link if in sniff or park before attempting switch */ if (pwr_mode == BTM_PM_MD_PARK || pwr_mode == BTM_PM_MD_SNIFF) { memset( (void *)&settings, 0, sizeof(settings)); settings.mode = BTM_PM_MD_ACTIVE; status = BTM_SetPowerMode (BTM_PM_SET_ONLY_ID, p->remote_addr, &settings); if (status != BTM_CMD_STARTED) { return (BTM_WRONG_MODE); } p->switch_role_state = BTM_ACL_SWKEY_STATE_MODE_CHANGE; } /* some devices do not support switch while encryption is on */ else { p_dev_rec = btm_find_dev (remote_bd_addr); if ((p_dev_rec != NULL) && ((p_dev_rec->sec_flags & BTM_SEC_ENCRYPTED) != 0) && !BTM_EPR_AVAILABLE(p)) { /* bypass turning off encryption if change link key is already doing it */ if (p->encrypt_state != BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF) { if (!btsnd_hcic_set_conn_encrypt (p->hci_handle, FALSE)) { return (BTM_NO_RESOURCES); } else { p->encrypt_state = BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF; } } p->switch_role_state = BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF; } else { if (!btsnd_hcic_switch_role (remote_bd_addr, new_role)) { return (BTM_NO_RESOURCES); } p->switch_role_state = BTM_ACL_SWKEY_STATE_IN_PROGRESS; #if BTM_DISC_DURING_RS == TRUE if (p_dev_rec) { p_dev_rec->rs_disc_pending = BTM_SEC_RS_PENDING; } #endif } } /* Initialize return structure in case request fails */ if (p_cb) { memcpy (btm_cb.devcb.switch_role_ref_data.remote_bd_addr, remote_bd_addr, BD_ADDR_LEN); btm_cb.devcb.switch_role_ref_data.role = new_role; /* initialized to an error code */ btm_cb.devcb.switch_role_ref_data.hci_status = HCI_ERR_UNSUPPORTED_VALUE; btm_cb.devcb.p_switch_role_cb = p_cb; } return (BTM_CMD_STARTED); } /******************************************************************************* ** ** Function btm_acl_encrypt_change ** ** Description This function is when encryption of the connection is ** completed by the LM. Checks to see if a role switch or ** change of link key was active and initiates or continues ** process if needed. ** ** Returns void ** *******************************************************************************/ void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable) { tACL_CONN *p; tBTM_SEC_DEV_REC *p_dev_rec; tBTM_BL_ROLE_CHG_DATA evt; BTM_TRACE_DEBUG ("btm_acl_encrypt_change handle=%d status=%d encr_enabl=%d\n", handle, status, encr_enable); p = btm_handle_to_acl(handle); if (p == NULL) { return; } /* Process Role Switch if active */ if (p->switch_role_state == BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF) { /* if encryption turn off failed we still will try to switch role */ if (encr_enable) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; p->encrypt_state = BTM_ACL_ENCRYPT_STATE_IDLE; } else { p->switch_role_state = BTM_ACL_SWKEY_STATE_SWITCHING; p->encrypt_state = BTM_ACL_ENCRYPT_STATE_TEMP_FUNC; } if (!btsnd_hcic_switch_role (p->remote_addr, (UINT8)!p->link_role)) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; p->encrypt_state = BTM_ACL_ENCRYPT_STATE_IDLE; btm_acl_report_role_change(btm_cb.devcb.switch_role_ref_data.hci_status, p->remote_addr); } #if BTM_DISC_DURING_RS == TRUE else { if ((p_dev_rec = btm_find_dev (p->remote_addr)) != NULL) { p_dev_rec->rs_disc_pending = BTM_SEC_RS_PENDING; } } #endif } /* Finished enabling Encryption after role switch */ else if (p->switch_role_state == BTM_ACL_SWKEY_STATE_ENCRYPTION_ON) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; p->encrypt_state = BTM_ACL_ENCRYPT_STATE_IDLE; btm_acl_report_role_change(btm_cb.devcb.switch_role_ref_data.hci_status, p->remote_addr); /* if role change event is registered, report it now */ if (btm_cb.p_bl_changed_cb && (btm_cb.bl_evt_mask & BTM_BL_ROLE_CHG_MASK)) { evt.event = BTM_BL_ROLE_CHG_EVT; evt.new_role = btm_cb.devcb.switch_role_ref_data.role; evt.p_bda = btm_cb.devcb.switch_role_ref_data.remote_bd_addr; evt.hci_status = btm_cb.devcb.switch_role_ref_data.hci_status; (*btm_cb.p_bl_changed_cb)((tBTM_BL_EVENT_DATA *)&evt); BTM_TRACE_DEBUG("Role Switch Event: new_role 0x%02x, HCI Status 0x%02x, rs_st:%d\n", evt.new_role, evt.hci_status, p->switch_role_state); } #if BTM_DISC_DURING_RS == TRUE /* If a disconnect is pending, issue it now that role switch has completed */ if ((p_dev_rec = btm_find_dev (p->remote_addr)) != NULL) { if (p_dev_rec->rs_disc_pending == BTM_SEC_DISC_PENDING) { BTM_TRACE_WARNING("btm_acl_encrypt_change -> Issuing delayed HCI_Disconnect!!!\n"); btsnd_hcic_disconnect(p_dev_rec->hci_handle, HCI_ERR_PEER_USER); } BTM_TRACE_WARNING("btm_acl_encrypt_change: tBTM_SEC_DEV:0x%x rs_disc_pending=%d\n", (UINT32)p_dev_rec, p_dev_rec->rs_disc_pending); p_dev_rec->rs_disc_pending = BTM_SEC_RS_NOT_PENDING; /* reset flag */ } #endif } #if (CLASSIC_BT_INCLUDED == TRUE) /* If authentication is done through legacy authentication and esp32 has * not authenticated peer deivce yet, do not proceed for encrytion and * first authenticate it. */ else if ((BTM_BothEndsSupportSecureConnections(p->remote_addr) == 0) && ((p->legacy_auth_state & BTM_ACL_LEGACY_AUTH_SELF) == 0)) { if ((p_dev_rec = btm_find_dev (p->remote_addr)) != NULL) { if (btm_sec_legacy_authentication_mutual(p_dev_rec)) { btm_sec_update_legacy_auth_state(btm_bda_to_acl(p_dev_rec->bd_addr, BT_TRANSPORT_BR_EDR), BTM_ACL_LEGACY_AUTH_SELF); } else { BTM_TRACE_ERROR("%s failed, Resources not available for Authentication procedure", __FUNCTION__); } } } #endif } /******************************************************************************* ** ** Function BTM_SetLinkPolicy ** ** Description Create and send HCI "Write Policy Set" command ** ** Returns status of the operation ** *******************************************************************************/ tBTM_STATUS BTM_SetLinkPolicy (BD_ADDR remote_bda, UINT16 *settings) { tACL_CONN *p; UINT8 *localFeatures = BTM_ReadLocalFeatures(); BTM_TRACE_DEBUG ("BTM_SetLinkPolicy\n"); /* BTM_TRACE_API ("BTM_SetLinkPolicy: requested settings: 0x%04x", *settings ); */ /* First, check if hold mode is supported */ if (*settings != HCI_DISABLE_ALL_LM_MODES) { if ( (*settings & HCI_ENABLE_MASTER_SLAVE_SWITCH) && (!HCI_SWITCH_SUPPORTED(localFeatures)) ) { *settings &= (~HCI_ENABLE_MASTER_SLAVE_SWITCH); BTM_TRACE_API ("BTM_SetLinkPolicy switch not supported (settings: 0x%04x)\n", *settings ); } if ( (*settings & HCI_ENABLE_HOLD_MODE) && (!HCI_HOLD_MODE_SUPPORTED(localFeatures)) ) { *settings &= (~HCI_ENABLE_HOLD_MODE); BTM_TRACE_API ("BTM_SetLinkPolicy hold not supported (settings: 0x%04x)\n", *settings ); } if ( (*settings & HCI_ENABLE_SNIFF_MODE) && (!HCI_SNIFF_MODE_SUPPORTED(localFeatures)) ) { *settings &= (~HCI_ENABLE_SNIFF_MODE); BTM_TRACE_API ("BTM_SetLinkPolicy sniff not supported (settings: 0x%04x)\n", *settings ); } if ( (*settings & HCI_ENABLE_PARK_MODE) && (!HCI_PARK_MODE_SUPPORTED(localFeatures)) ) { *settings &= (~HCI_ENABLE_PARK_MODE); BTM_TRACE_API ("BTM_SetLinkPolicy park not supported (settings: 0x%04x)\n", *settings ); } } if ((p = btm_bda_to_acl(remote_bda, BT_TRANSPORT_BR_EDR)) != NULL) { return (btsnd_hcic_write_policy_set (p->hci_handle, *settings) ? BTM_CMD_STARTED : BTM_NO_RESOURCES); } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function BTM_SetDefaultLinkPolicy ** ** Description Set the default value for HCI "Write Policy Set" command ** to use when an ACL link is created. ** ** Returns void ** *******************************************************************************/ void BTM_SetDefaultLinkPolicy (UINT16 settings) { UINT8 *localFeatures = BTM_ReadLocalFeatures(); BTM_TRACE_DEBUG("BTM_SetDefaultLinkPolicy setting:0x%04x\n", settings); if ((settings & HCI_ENABLE_MASTER_SLAVE_SWITCH) && (!HCI_SWITCH_SUPPORTED(localFeatures))) { settings &= ~HCI_ENABLE_MASTER_SLAVE_SWITCH; BTM_TRACE_DEBUG("BTM_SetDefaultLinkPolicy switch not supported (settings: 0x%04x)\n", settings); } if ((settings & HCI_ENABLE_HOLD_MODE) && (!HCI_HOLD_MODE_SUPPORTED(localFeatures))) { settings &= ~HCI_ENABLE_HOLD_MODE; BTM_TRACE_DEBUG("BTM_SetDefaultLinkPolicy hold not supported (settings: 0x%04x)\n", settings); } if ((settings & HCI_ENABLE_SNIFF_MODE) && (!HCI_SNIFF_MODE_SUPPORTED(localFeatures))) { settings &= ~HCI_ENABLE_SNIFF_MODE; BTM_TRACE_DEBUG("BTM_SetDefaultLinkPolicy sniff not supported (settings: 0x%04x)\n", settings); } if ((settings & HCI_ENABLE_PARK_MODE) && (!HCI_PARK_MODE_SUPPORTED(localFeatures))) { settings &= ~HCI_ENABLE_PARK_MODE; BTM_TRACE_DEBUG("BTM_SetDefaultLinkPolicy park not supported (settings: 0x%04x)\n", settings); } BTM_TRACE_DEBUG("Set DefaultLinkPolicy:0x%04x\n", settings); btm_cb.btm_def_link_policy = settings; /* Set the default Link Policy of the controller */ btsnd_hcic_write_def_policy_set(settings); } /******************************************************************************* ** ** Function btm_read_remote_version_complete ** ** Description This function is called when the command complete message ** is received from the HCI for the remote version info. ** ** Returns void ** *******************************************************************************/ void btm_read_remote_version_complete (UINT8 *p) { tACL_CONN *p_acl_cb = NULL; UINT8 status; UINT16 handle; BTM_TRACE_DEBUG ("btm_read_remote_version_complete\n"); STREAM_TO_UINT8 (status, p); STREAM_TO_UINT16 (handle, p); /* Look up the connection by handle and copy features */ p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb) { if (status == HCI_SUCCESS) { STREAM_TO_UINT8 (p_acl_cb->lmp_version, p); STREAM_TO_UINT16 (p_acl_cb->manufacturer, p); STREAM_TO_UINT16 (p_acl_cb->lmp_subversion, p); } #if BLE_INCLUDED == TRUE if (p_acl_cb->transport == BT_TRANSPORT_LE) { if(p_acl_cb->link_role == HCI_ROLE_MASTER) { if (HCI_LE_DATA_LEN_EXT_SUPPORTED(p_acl_cb->peer_le_features)) { uint16_t data_length = controller_get_interface()->get_ble_default_data_packet_length(); uint16_t data_txtime = controller_get_interface()->get_ble_default_data_packet_txtime(); if (data_length != p_acl_cb->data_length_params.tx_len) { p_acl_cb->data_len_updating = true; btsnd_hcic_ble_set_data_length(p_acl_cb->hci_handle, data_length, data_txtime); } } l2cble_notify_le_connection (p_acl_cb->remote_addr); } else { //slave role, read remote feature btsnd_hcic_ble_read_remote_feat(p_acl_cb->hci_handle); } } #endif } } /******************************************************************************* ** ** Function btm_process_remote_ext_features ** ** Description Local function called to process all extended features pages ** read from a remote device. ** ** Returns void ** *******************************************************************************/ void btm_process_remote_ext_features (tACL_CONN *p_acl_cb, UINT8 num_read_pages) { UINT16 handle = p_acl_cb->hci_handle; tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev_by_handle (handle); UINT8 page_idx; BTM_TRACE_DEBUG ("btm_process_remote_ext_features\n"); /* Make sure we have the record to save remote features information */ if (p_dev_rec == NULL) { /* Get a new device; might be doing dedicated bonding */ p_dev_rec = btm_find_or_alloc_dev (p_acl_cb->remote_addr); } p_acl_cb->num_read_pages = num_read_pages; p_dev_rec->num_read_pages = num_read_pages; /* Move the pages to placeholder */ for (page_idx = 0; page_idx < num_read_pages; page_idx++) { if (page_idx > HCI_EXT_FEATURES_PAGE_MAX) { BTM_TRACE_ERROR("%s: page=%d unexpected\n", __FUNCTION__, page_idx); break; } memcpy (p_dev_rec->features[page_idx], p_acl_cb->peer_lmp_features[page_idx], HCI_FEATURE_BYTES_PER_PAGE); } const UINT8 req_pend = (p_dev_rec->sm4 & BTM_SM4_REQ_PEND); #if (SMP_INCLUDED == TRUE) /* Store the Peer Security Capabilites (in SM4 and rmt_sec_caps) */ btm_sec_set_peer_sec_caps(p_acl_cb, p_dev_rec); #endif ///SMP_INCLUDED == TRUE BTM_TRACE_API("%s: pend:%d\n", __FUNCTION__, req_pend); if (req_pend) { #if (CLASSIC_BT_INCLUDED == TRUE) /* Request for remaining Security Features (if any) */ l2cu_resubmit_pending_sec_req (p_dev_rec->bd_addr); #endif ///CLASSIC_BT_INCLUDED == TRUE } } /******************************************************************************* ** ** Function btm_read_remote_features ** ** Description Local function called to send a read remote supported features/ ** remote extended features page[0]. ** ** Returns void ** *******************************************************************************/ void btm_read_remote_features (UINT16 handle) { tACL_CONN *p_acl_cb; BTM_TRACE_DEBUG("btm_read_remote_features() handle: %d\n", handle); p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb == NULL) { BTM_TRACE_ERROR("btm_read_remote_features handle=%d invalid\n", handle); return; } p_acl_cb->num_read_pages = 0; memset (p_acl_cb->peer_lmp_features, 0, sizeof(p_acl_cb->peer_lmp_features)); /* first send read remote supported features HCI command */ /* because we don't know whether the remote support extended feature command */ btsnd_hcic_rmt_features_req (handle); } /******************************************************************************* ** ** Function btm_read_remote_ext_features ** ** Description Local function called to send a read remote extended features ** ** Returns void ** *******************************************************************************/ void btm_read_remote_ext_features (UINT16 handle, UINT8 page_number) { BTM_TRACE_DEBUG("btm_read_remote_ext_features() handle: %d page: %d\n", handle, page_number); btsnd_hcic_rmt_ext_features(handle, page_number); } /******************************************************************************* ** ** Function btm_read_remote_features_complete ** ** Description This function is called when the remote supported features ** complete event is received from the HCI. ** ** Returns void ** *******************************************************************************/ void btm_read_remote_features_complete (UINT8 *p) { tACL_CONN *p_acl_cb; UINT8 status; UINT16 handle; BTM_TRACE_DEBUG ("btm_read_remote_features_complete\n"); STREAM_TO_UINT8 (status, p); if (status != HCI_SUCCESS) { BTM_TRACE_ERROR ("btm_read_remote_features_complete failed (status 0x%02x)\n", status); return; } STREAM_TO_UINT16 (handle, p); p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb == NULL) { BTM_TRACE_ERROR("btm_read_remote_features_complete handle=%d invalid\n", handle); return; } /* Copy the received features page */ STREAM_TO_ARRAY(p_acl_cb->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0], p, HCI_FEATURE_BYTES_PER_PAGE); if ((HCI_LMP_EXTENDED_SUPPORTED(p_acl_cb->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) && (controller_get_interface()->supports_reading_remote_extended_features())) { /* if the remote controller has extended features and local controller supports ** HCI_Read_Remote_Extended_Features command then start reading these feature starting ** with extended features page 1 */ BTM_TRACE_DEBUG ("Start reading remote extended features\n"); btm_read_remote_ext_features(handle, HCI_EXT_FEATURES_PAGE_1); return; } /* Remote controller has no extended features. Process remote controller supported features (features page HCI_EXT_FEATURES_PAGE_0). */ btm_process_remote_ext_features (p_acl_cb, 1); /* Continue with HCI connection establishment */ btm_establish_continue (p_acl_cb); } /******************************************************************************* ** ** Function btm_read_remote_ext_features_complete ** ** Description This function is called when the remote extended features ** complete event is received from the HCI. ** ** Returns void ** *******************************************************************************/ void btm_read_remote_ext_features_complete (UINT8 *p) { tACL_CONN *p_acl_cb; UINT8 page_num, max_page; UINT16 handle; BTM_TRACE_DEBUG ("btm_read_remote_ext_features_complete\n"); ++p; STREAM_TO_UINT16 (handle, p); STREAM_TO_UINT8 (page_num, p); STREAM_TO_UINT8 (max_page, p); /* Validate parameters */ p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb == NULL) { BTM_TRACE_ERROR("btm_read_remote_ext_features_complete handle=%d invalid\n", handle); return; } if (max_page > HCI_EXT_FEATURES_PAGE_MAX) { BTM_TRACE_ERROR("btm_read_remote_ext_features_complete page=%d unknown", max_page); } /* Copy the received features page */ STREAM_TO_ARRAY(p_acl_cb->peer_lmp_features[page_num], p, HCI_FEATURE_BYTES_PER_PAGE); /* If there is the next remote features page and * we have space to keep this page data - read this page */ if ((page_num < max_page) && (page_num < HCI_EXT_FEATURES_PAGE_MAX)) { page_num++; BTM_TRACE_DEBUG("BTM reads next remote extended features page (%d)\n", page_num); btm_read_remote_ext_features (handle, page_num); return; } /* Reading of remote feature pages is complete */ BTM_TRACE_DEBUG("BTM reached last remote extended features page (%d)\n", page_num); /* Process the pages */ btm_process_remote_ext_features (p_acl_cb, (UINT8) (page_num + 1)); /* Continue with HCI connection establishment */ btm_establish_continue (p_acl_cb); } /******************************************************************************* ** ** Function btm_read_remote_ext_features_failed ** ** Description This function is called when the remote extended features ** complete event returns a failed status. ** ** Returns void ** *******************************************************************************/ void btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle) { tACL_CONN *p_acl_cb; BTM_TRACE_WARNING ("btm_read_remote_ext_features_failed (status 0x%02x) for handle %d\n", status, handle); p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb == NULL) { BTM_TRACE_ERROR("btm_read_remote_ext_features_failed handle=%d invalid\n", handle); return; } /* Process supported features only */ btm_process_remote_ext_features (p_acl_cb, 1); /* Continue HCI connection establishment */ btm_establish_continue (p_acl_cb); } /******************************************************************************* ** ** Function btm_establish_continue ** ** Description This function is called when the command complete message ** is received from the HCI for the read local link policy request. ** ** Returns void ** *******************************************************************************/ void btm_establish_continue (tACL_CONN *p_acl_cb) { tBTM_BL_EVENT_DATA evt_data; BTM_TRACE_DEBUG ("btm_establish_continue\n"); #if (!defined(BTM_BYPASS_EXTRA_ACL_SETUP) || BTM_BYPASS_EXTRA_ACL_SETUP == FALSE) #if (defined BLE_INCLUDED && BLE_INCLUDED == TRUE) if (p_acl_cb->transport == BT_TRANSPORT_BR_EDR) #endif { /* For now there are a some devices that do not like sending */ /* commands events and data at the same time. */ /* Set the packet types to the default allowed by the device */ btm_set_packet_types (p_acl_cb, btm_cb.btm_acl_pkt_types_supported); if (btm_cb.btm_def_link_policy) { BTM_SetLinkPolicy (p_acl_cb->remote_addr, &btm_cb.btm_def_link_policy); } } #endif p_acl_cb->link_up_issued = TRUE; /* If anyone cares, tell him database changed */ if (btm_cb.p_bl_changed_cb) { evt_data.event = BTM_BL_CONN_EVT; evt_data.conn.p_bda = p_acl_cb->remote_addr; evt_data.conn.p_bdn = p_acl_cb->remote_name; evt_data.conn.p_dc = p_acl_cb->remote_dc; evt_data.conn.p_features = p_acl_cb->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]; evt_data.conn.sc_downgrade = p_acl_cb->sc_downgrade; #if BLE_INCLUDED == TRUE evt_data.conn.handle = p_acl_cb->hci_handle; evt_data.conn.transport = p_acl_cb->transport; #endif (*btm_cb.p_bl_changed_cb)(&evt_data); } btm_acl_update_busy_level (BTM_BLI_ACL_UP_EVT); } /******************************************************************************* ** ** Function BTM_SetDefaultLinkSuperTout ** ** Description Set the default value for HCI "Write Link Supervision Timeout" ** command to use when an ACL link is created. ** ** Returns void ** *******************************************************************************/ void BTM_SetDefaultLinkSuperTout (UINT16 timeout) { BTM_TRACE_DEBUG ("BTM_SetDefaultLinkSuperTout\n"); btm_cb.btm_def_link_super_tout = timeout; } /******************************************************************************* ** ** Function BTM_GetLinkSuperTout ** ** Description Read the link supervision timeout value of the connection ** ** Returns status of the operation ** *******************************************************************************/ tBTM_STATUS BTM_GetLinkSuperTout (BD_ADDR remote_bda, UINT16 *p_timeout) { tACL_CONN *p = btm_bda_to_acl(remote_bda, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_GetLinkSuperTout\n"); if (p != (tACL_CONN *)NULL) { *p_timeout = p->link_super_tout; return (BTM_SUCCESS); } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function BTM_SetLinkSuperTout ** ** Description Create and send HCI "Write Link Supervision Timeout" command ** ** Returns status of the operation ** *******************************************************************************/ tBTM_STATUS BTM_SetLinkSuperTout (BD_ADDR remote_bda, UINT16 timeout) { tACL_CONN *p = btm_bda_to_acl(remote_bda, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_SetLinkSuperTout\n"); if (p != (tACL_CONN *)NULL) { p->link_super_tout = timeout; /* Only send if current role is Master; 2.0 spec requires this */ if (p->link_role == BTM_ROLE_MASTER) { if (!btsnd_hcic_write_link_super_tout (LOCAL_BR_EDR_CONTROLLER_ID, p->hci_handle, timeout)) { return (BTM_NO_RESOURCES); } return (BTM_CMD_STARTED); } else { return (BTM_SUCCESS); } } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function BTM_IsAclConnectionUp ** ** Description This function is called to check if an ACL connection exists ** to a specific remote BD Address. ** ** Returns TRUE if connection is up, else FALSE. ** *******************************************************************************/ BOOLEAN BTM_IsAclConnectionUp (BD_ADDR remote_bda, tBT_TRANSPORT transport) { tACL_CONN *p; BTM_TRACE_API ("BTM_IsAclConnectionUp: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", remote_bda[0], remote_bda[1], remote_bda[2], remote_bda[3], remote_bda[4], remote_bda[5]); p = btm_bda_to_acl(remote_bda, transport); if (p != (tACL_CONN *)NULL) { return (TRUE); } /* If here, no BD Addr found */ return (FALSE); } /******************************************************************************* ** ** Function BTM_GetNumAclLinks ** ** Description This function is called to count the number of ** ACL links that are active. ** ** Returns UINT16 Number of active ACL links ** *******************************************************************************/ UINT16 BTM_GetNumAclLinks (void) { uint16_t num_acl = 0; num_acl = list_length(btm_cb.p_acl_db_list); return num_acl; } /******************************************************************************* ** ** Function btm_get_acl_disc_reason_code ** ** Description This function is called to get the disconnection reason code ** returned by the HCI at disconnection complete event. ** ** Returns TRUE if connection is up, else FALSE. ** *******************************************************************************/ UINT16 btm_get_acl_disc_reason_code (void) { UINT8 res = btm_cb.acl_disc_reason; BTM_TRACE_DEBUG ("btm_get_acl_disc_reason_code\n"); return (res); } /******************************************************************************* ** ** Function BTM_GetHCIConnHandle ** ** Description This function is called to get the handle for an ACL connection ** to a specific remote BD Address. ** ** Returns the handle of the connection, or 0xFFFF if none. ** *******************************************************************************/ UINT16 BTM_GetHCIConnHandle (BD_ADDR remote_bda, tBT_TRANSPORT transport) { tACL_CONN *p; BTM_TRACE_DEBUG ("BTM_GetHCIConnHandle\n"); p = btm_bda_to_acl(remote_bda, transport); if (p != (tACL_CONN *)NULL) { return (p->hci_handle); } /* If here, no BD Addr found */ return (0xFFFF); } /******************************************************************************* ** ** Function btm_process_clk_off_comp_evt ** ** Description This function is called when clock offset command completes. ** ** Input Parms hci_handle - connection handle associated with the change ** clock offset ** ** Returns void ** *******************************************************************************/ void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset) { tACL_CONN *p_acl_cb = NULL; BTM_TRACE_DEBUG ("btm_process_clk_off_comp_evt\n"); /* Look up the connection by handle and set the current mode */ p_acl_cb = btm_handle_to_acl(hci_handle); if (p_acl_cb) { p_acl_cb->clock_offset = clock_offset; } } /******************************************************************************* ** ** Function btm_acl_role_changed ** ** Description This function is called whan a link's master/slave role change ** event or command status event (with error) is received. ** It updates the link control block, and calls ** the registered callback with status and role (if registered). ** ** Returns void ** *******************************************************************************/ void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role) { UINT8 *p_bda = (bd_addr) ? bd_addr : btm_cb.devcb.switch_role_ref_data.remote_bd_addr; tACL_CONN *p = btm_bda_to_acl(p_bda, BT_TRANSPORT_BR_EDR); tBTM_ROLE_SWITCH_CMPL *p_data = &btm_cb.devcb.switch_role_ref_data; tBTM_SEC_DEV_REC *p_dev_rec; tBTM_BL_ROLE_CHG_DATA evt; BTM_TRACE_DEBUG ("btm_acl_role_changed\n"); /* Ignore any stray events */ if (p == NULL) { /* it could be a failure */ if (hci_status != HCI_SUCCESS) { btm_acl_report_role_change(hci_status, bd_addr); } return; } p_data->hci_status = hci_status; if (hci_status == HCI_SUCCESS) { p_data->role = new_role; memcpy(p_data->remote_bd_addr, p_bda, BD_ADDR_LEN); /* Update cached value */ p->link_role = new_role; /* Reload LSTO: link supervision timeout is reset in the LM after a role switch */ if (new_role == BTM_ROLE_MASTER) { BTM_SetLinkSuperTout (p->remote_addr, p->link_super_tout); } } else { /* so the BTM_BL_ROLE_CHG_EVT uses the old role */ new_role = p->link_role; } /* Check if any SCO req is pending for role change */ btm_sco_chk_pend_rolechange (p->hci_handle); /* if switching state is switching we need to turn encryption on */ /* if idle, we did not change encryption */ if (p->switch_role_state == BTM_ACL_SWKEY_STATE_SWITCHING) { if (btsnd_hcic_set_conn_encrypt (p->hci_handle, TRUE)) { p->encrypt_state = BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON; p->switch_role_state = BTM_ACL_SWKEY_STATE_ENCRYPTION_ON; return; } } /* Set the switch_role_state to IDLE since the reply received from HCI */ /* regardless of its result either success or failed. */ if (p->switch_role_state == BTM_ACL_SWKEY_STATE_IN_PROGRESS) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; p->encrypt_state = BTM_ACL_ENCRYPT_STATE_IDLE; } /* if role switch complete is needed, report it now */ btm_acl_report_role_change(hci_status, bd_addr); /* if role change event is registered, report it now */ if (btm_cb.p_bl_changed_cb && (btm_cb.bl_evt_mask & BTM_BL_ROLE_CHG_MASK)) { evt.event = BTM_BL_ROLE_CHG_EVT; evt.new_role = new_role; evt.p_bda = p_bda; evt.hci_status = hci_status; (*btm_cb.p_bl_changed_cb)((tBTM_BL_EVENT_DATA *)&evt); } BTM_TRACE_DEBUG("Role Switch Event: new_role 0x%02x, HCI Status 0x%02x, rs_st:%d\n", p_data->role, p_data->hci_status, p->switch_role_state); #if BTM_DISC_DURING_RS == TRUE /* If a disconnect is pending, issue it now that role switch has completed */ if ((p_dev_rec = btm_find_dev (p_bda)) != NULL) { if (p_dev_rec->rs_disc_pending == BTM_SEC_DISC_PENDING) { BTM_TRACE_WARNING("btm_acl_role_changed -> Issuing delayed HCI_Disconnect!!!\n"); btsnd_hcic_disconnect(p_dev_rec->hci_handle, HCI_ERR_PEER_USER); } BTM_TRACE_ERROR("tBTM_SEC_DEV:0x%x rs_disc_pending=%d\n", (UINT32)p_dev_rec, p_dev_rec->rs_disc_pending); p_dev_rec->rs_disc_pending = BTM_SEC_RS_NOT_PENDING; /* reset flag */ } #endif } /******************************************************************************* ** ** Function BTM_AllocateSCN ** ** Description Look through the Server Channel Numbers for a free one. ** ** Returns Allocated SCN number or 0 if none. ** *******************************************************************************/ #if (CLASSIC_BT_INCLUDED == TRUE) UINT8 BTM_AllocateSCN(void) { UINT8 x; BTM_TRACE_DEBUG ("BTM_AllocateSCN\n"); for (x = 1; x < BTM_MAX_SCN; x++) { if (!btm_cb.btm_scn[x - 1]) { btm_cb.btm_scn[x - 1] = TRUE; return x; } } return (0); /* No free ports */ } #endif ///CLASSIC_BT_INCLUDED == TRUE /******************************************************************************* ** ** Function BTM_TryAllocateSCN ** ** Description Try to allocate a fixed server channel ** ** Returns Returns TRUE if server channel was available ** *******************************************************************************/ #if (CLASSIC_BT_INCLUDED == TRUE) BOOLEAN BTM_TryAllocateSCN(UINT8 scn) { if (scn >= BTM_MAX_SCN) { return FALSE; } /* check if this port is available */ if (!btm_cb.btm_scn[scn - 1]) { btm_cb.btm_scn[scn - 1] = TRUE; return TRUE; } return (FALSE); /* Port was busy */ } /******************************************************************************* ** ** Function BTM_FreeSCN ** ** Description Free the specified SCN. ** ** Returns TRUE or FALSE ** *******************************************************************************/ BOOLEAN BTM_FreeSCN(UINT8 scn) { BTM_TRACE_DEBUG ("BTM_FreeSCN \n"); if (scn <= BTM_MAX_SCN) { btm_cb.btm_scn[scn - 1] = FALSE; return (TRUE); } else { return (FALSE); /* Illegal SCN passed in */ } return (FALSE); } #endif ///CLASSIC_BT_INCLUDED == TRUE /******************************************************************************* ** ** Function btm_set_packet_types ** ** Description This function sets the packet types used for a specific ** ACL connection. It is called internally by btm_acl_created ** or by an application/profile by BTM_SetPacketTypes. ** ** Returns status of the operation ** *******************************************************************************/ tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types) { UINT16 temp_pkt_types; BTM_TRACE_DEBUG ("btm_set_packet_types\n"); /* Save in the ACL control blocks, types that we support */ temp_pkt_types = (pkt_types & BTM_ACL_SUPPORTED_PKTS_MASK & btm_cb.btm_acl_pkt_types_supported); /* OR in any exception packet types if at least 2.0 version of spec */ temp_pkt_types |= ((pkt_types & BTM_ACL_EXCEPTION_PKTS_MASK) | (btm_cb.btm_acl_pkt_types_supported & BTM_ACL_EXCEPTION_PKTS_MASK)); /* Exclude packet types not supported by the peer */ btm_acl_chk_peer_pkt_type_support (p, &temp_pkt_types); BTM_TRACE_DEBUG ("SetPacketType Mask -> 0x%04x\n", temp_pkt_types); if (!btsnd_hcic_change_conn_type (p->hci_handle, temp_pkt_types)) { return (BTM_NO_RESOURCES); } p->pkt_types_mask = temp_pkt_types; return (BTM_CMD_STARTED); } /******************************************************************************* ** ** Function btm_get_max_packet_size ** ** Returns Returns maximum packet size that can be used for current ** connection, 0 if connection is not established ** *******************************************************************************/ UINT16 btm_get_max_packet_size (BD_ADDR addr) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); UINT16 pkt_types = 0; UINT16 pkt_size = 0; BTM_TRACE_DEBUG ("btm_get_max_packet_size\n"); if (p != NULL) { pkt_types = p->pkt_types_mask; } else { /* Special case for when info for the local device is requested */ if (memcmp (controller_get_interface()->get_address(), addr, BD_ADDR_LEN) == 0) { pkt_types = btm_cb.btm_acl_pkt_types_supported; } } if (pkt_types) { if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_3_DH5)) { pkt_size = HCI_EDR3_DH5_PACKET_SIZE; } else if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_2_DH5)) { pkt_size = HCI_EDR2_DH5_PACKET_SIZE; } else if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_3_DH3)) { pkt_size = HCI_EDR3_DH3_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DH5) { pkt_size = HCI_DH5_PACKET_SIZE; } else if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_2_DH3)) { pkt_size = HCI_EDR2_DH3_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DM5) { pkt_size = HCI_DM5_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DH3) { pkt_size = HCI_DH3_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DM3) { pkt_size = HCI_DM3_PACKET_SIZE; } else if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_3_DH1)) { pkt_size = HCI_EDR3_DH1_PACKET_SIZE; } else if (!(pkt_types & BTM_ACL_PKT_TYPES_MASK_NO_2_DH1)) { pkt_size = HCI_EDR2_DH1_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DH1) { pkt_size = HCI_DH1_PACKET_SIZE; } else if (pkt_types & BTM_ACL_PKT_TYPES_MASK_DM1) { pkt_size = HCI_DM1_PACKET_SIZE; } } return (pkt_size); } /******************************************************************************* ** ** Function BTM_ReadRemoteVersion ** ** Returns If connected report peer device info ** *******************************************************************************/ tBTM_STATUS BTM_ReadRemoteVersion (BD_ADDR addr, UINT8 *lmp_version, UINT16 *manufacturer, UINT16 *lmp_sub_version) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_ReadRemoteVersion\n"); if (p == NULL) { return (BTM_UNKNOWN_ADDR); } if (lmp_version) { *lmp_version = p->lmp_version; } if (manufacturer) { *manufacturer = p->manufacturer; } if (lmp_sub_version) { *lmp_sub_version = p->lmp_subversion; } return (BTM_SUCCESS); } /******************************************************************************* ** ** Function BTM_ReadRemoteFeatures ** ** Returns pointer to the remote supported features mask (8 bytes) ** *******************************************************************************/ UINT8 *BTM_ReadRemoteFeatures (BD_ADDR addr) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_ReadRemoteFeatures\n"); if (p == NULL) { return (NULL); } return (p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]); } /******************************************************************************* ** ** Function BTM_ReadRemoteExtendedFeatures ** ** Returns pointer to the remote extended features mask (8 bytes) ** or NULL if bad page ** *******************************************************************************/ UINT8 *BTM_ReadRemoteExtendedFeatures (BD_ADDR addr, UINT8 page_number) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_ReadRemoteExtendedFeatures\n"); if (p == NULL) { return (NULL); } if (page_number > HCI_EXT_FEATURES_PAGE_MAX) { BTM_TRACE_ERROR("Warning: BTM_ReadRemoteExtendedFeatures page %d unknown\n", page_number); return NULL; } return (p->peer_lmp_features[page_number]); } /******************************************************************************* ** ** Function BTM_ReadNumberRemoteFeaturesPages ** ** Returns number of features pages read from the remote device. ** *******************************************************************************/ UINT8 BTM_ReadNumberRemoteFeaturesPages (BD_ADDR addr) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_ReadNumberRemoteFeaturesPages\n"); if (p == NULL) { return (0); } return (p->num_read_pages); } /******************************************************************************* ** ** Function BTM_ReadAllRemoteFeatures ** ** Returns pointer to all features of the remote (24 bytes). ** *******************************************************************************/ UINT8 *BTM_ReadAllRemoteFeatures (BD_ADDR addr) { tACL_CONN *p = btm_bda_to_acl(addr, BT_TRANSPORT_BR_EDR); BTM_TRACE_DEBUG ("BTM_ReadAllRemoteFeatures\n"); if (p == NULL) { return (NULL); } return (p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]); } /******************************************************************************* ** ** Function BTM_RegBusyLevelNotif ** ** Description This function is called to register a callback to receive ** busy level change events. ** ** Returns BTM_SUCCESS if successfully registered, otherwise error ** *******************************************************************************/ tBTM_STATUS BTM_RegBusyLevelNotif (tBTM_BL_CHANGE_CB *p_cb, UINT8 *p_level, tBTM_BL_EVENT_MASK evt_mask) { BTM_TRACE_DEBUG ("BTM_RegBusyLevelNotif\n"); if (p_level) { *p_level = btm_cb.busy_level; } btm_cb.bl_evt_mask = evt_mask; if (!p_cb) { btm_cb.p_bl_changed_cb = NULL; } else if (btm_cb.p_bl_changed_cb) { return (BTM_BUSY); } else { btm_cb.p_bl_changed_cb = p_cb; } return (BTM_SUCCESS); } /******************************************************************************* ** ** Function BTM_SetQoS ** ** Description This function is called to setup QoS ** ** Returns status of the operation ** *******************************************************************************/ tBTM_STATUS BTM_SetQoS (BD_ADDR bd, FLOW_SPEC *p_flow, tBTM_CMPL_CB *p_cb) { tACL_CONN *p = NULL; BTM_TRACE_API ("BTM_SetQoS: BdAddr: %02x%02x%02x%02x%02x%02x\n", bd[0], bd[1], bd[2], bd[3], bd[4], bd[5]); /* If someone already waiting on the version, do not allow another */ if (btm_cb.devcb.p_qossu_cmpl_cb) { return (BTM_BUSY); } if ( (p = btm_bda_to_acl(bd, BT_TRANSPORT_BR_EDR)) != NULL) { btu_start_timer (&btm_cb.devcb.qossu_timer, BTU_TTYPE_BTM_QOS, BTM_DEV_REPLY_TIMEOUT); btm_cb.devcb.p_qossu_cmpl_cb = p_cb; if (!btsnd_hcic_qos_setup (p->hci_handle, p_flow->qos_flags, p_flow->service_type, p_flow->token_rate, p_flow->peak_bandwidth, p_flow->latency, p_flow->delay_variation)) { btm_cb.devcb.p_qossu_cmpl_cb = NULL; btu_stop_timer(&btm_cb.devcb.qossu_timer); return (BTM_NO_RESOURCES); } else { return (BTM_CMD_STARTED); } } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function btm_qos_setup_complete ** ** Description This function is called when the command complete message ** is received from the HCI for the qos setup request. ** ** Returns void ** *******************************************************************************/ void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow) { tBTM_CMPL_CB *p_cb = btm_cb.devcb.p_qossu_cmpl_cb; tBTM_QOS_SETUP_CMPL qossu; BTM_TRACE_DEBUG ("btm_qos_setup_complete\n"); btu_stop_timer (&btm_cb.devcb.qossu_timer); btm_cb.devcb.p_qossu_cmpl_cb = NULL; if (p_cb) { memset(&qossu, 0, sizeof(tBTM_QOS_SETUP_CMPL)); qossu.status = status; qossu.handle = handle; tACL_CONN *p = btm_handle_to_acl(handle); if (p != NULL) { memcpy (qossu.rem_bda, p->remote_addr, BD_ADDR_LEN); } if (p_flow != NULL) { qossu.flow.qos_flags = p_flow->qos_flags; qossu.flow.service_type = p_flow->service_type; qossu.flow.token_rate = p_flow->token_rate; qossu.flow.peak_bandwidth = p_flow->peak_bandwidth; qossu.flow.latency = p_flow->latency; qossu.flow.delay_variation = p_flow->delay_variation; } BTM_TRACE_DEBUG ("BTM: p_flow->delay_variation: 0x%02x\n", qossu.flow.delay_variation); (*p_cb)(&qossu); } } /******************************************************************************* ** ** Function btm_qos_setup_timeout ** ** Description This function processes a timeout. ** Currently, we just report an error log ** ** Returns void ** *******************************************************************************/ void btm_qos_setup_timeout (void *p_tle) { BTM_TRACE_DEBUG ("%s\n", __func__); btm_qos_setup_complete (HCI_ERR_HOST_TIMEOUT, 0, NULL); } /******************************************************************************* ** ** Function BTM_ReadRSSI ** ** Description This function is called to read the link policy settings. ** The address of link policy results are returned in the callback. ** (tBTM_RSSI_RESULTS) ** ** Returns BTM_CMD_STARTED if successfully initiated or error code ** *******************************************************************************/ tBTM_STATUS BTM_ReadRSSI (BD_ADDR remote_bda, tBT_TRANSPORT transport, tBTM_CMPL_CB *p_cb) { tACL_CONN *p; BTM_TRACE_API ("BTM_ReadRSSI: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", remote_bda[0], remote_bda[1], remote_bda[2], remote_bda[3], remote_bda[4], remote_bda[5]); tBTM_RSSI_RESULTS result; /* If someone already waiting on the version, do not allow another */ if (btm_cb.devcb.p_rssi_cmpl_cb) { result.status = BTM_BUSY; (*p_cb)(&result); return (BTM_BUSY); } p = btm_bda_to_acl(remote_bda, transport); if (p != (tACL_CONN *)NULL) { btu_start_timer (&btm_cb.devcb.rssi_timer, BTU_TTYPE_BTM_ACL, BTM_DEV_REPLY_TIMEOUT); btm_cb.devcb.p_rssi_cmpl_cb = p_cb; if (!btsnd_hcic_read_rssi (p->hci_handle)) { btm_cb.devcb.p_rssi_cmpl_cb = NULL; btu_stop_timer (&btm_cb.devcb.rssi_timer); result.status = BTM_NO_RESOURCES; (*p_cb)(&result); return (BTM_NO_RESOURCES); } else { return (BTM_CMD_STARTED); } } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function BTM_ReadLinkQuality ** ** Description This function is called to read the link qulaity. ** The value of the link quality is returned in the callback. ** (tBTM_LINK_QUALITY_RESULTS) ** ** Returns BTM_CMD_STARTED if successfully initiated or error code ** *******************************************************************************/ tBTM_STATUS BTM_ReadLinkQuality (BD_ADDR remote_bda, tBTM_CMPL_CB *p_cb) { tACL_CONN *p; BTM_TRACE_API ("BTM_ReadLinkQuality: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", remote_bda[0], remote_bda[1], remote_bda[2], remote_bda[3], remote_bda[4], remote_bda[5]); /* If someone already waiting on the version, do not allow another */ if (btm_cb.devcb.p_lnk_qual_cmpl_cb) { return (BTM_BUSY); } p = btm_bda_to_acl(remote_bda, BT_TRANSPORT_BR_EDR); if (p != (tACL_CONN *)NULL) { btu_start_timer (&btm_cb.devcb.lnk_quality_timer, BTU_TTYPE_BTM_ACL, BTM_DEV_REPLY_TIMEOUT); btm_cb.devcb.p_lnk_qual_cmpl_cb = p_cb; if (!btsnd_hcic_get_link_quality (p->hci_handle)) { btu_stop_timer (&btm_cb.devcb.lnk_quality_timer); btm_cb.devcb.p_lnk_qual_cmpl_cb = NULL; return (BTM_NO_RESOURCES); } else { return (BTM_CMD_STARTED); } } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } /******************************************************************************* ** ** Function BTM_ReadTxPower ** ** Description This function is called to read the current ** TX power of the connection. The tx power level results ** are returned in the callback. ** (tBTM_RSSI_RESULTS) ** ** Returns BTM_CMD_STARTED if successfully initiated or error code ** *******************************************************************************/ tBTM_STATUS BTM_ReadTxPower (BD_ADDR remote_bda, tBT_TRANSPORT transport, tBTM_CMPL_CB *p_cb) { tACL_CONN *p; BOOLEAN ret; #define BTM_READ_RSSI_TYPE_CUR 0x00 #define BTM_READ_RSSI_TYPE_MAX 0X01 BTM_TRACE_API ("BTM_ReadTxPower: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", remote_bda[0], remote_bda[1], remote_bda[2], remote_bda[3], remote_bda[4], remote_bda[5]); /* If someone already waiting on the version, do not allow another */ if (btm_cb.devcb.p_tx_power_cmpl_cb) { return (BTM_BUSY); } p = btm_bda_to_acl(remote_bda, transport); if (p != (tACL_CONN *)NULL) { btu_start_timer (&btm_cb.devcb.tx_power_timer, BTU_TTYPE_BTM_ACL, BTM_DEV_REPLY_TIMEOUT); btm_cb.devcb.p_tx_power_cmpl_cb = p_cb; #if BLE_INCLUDED == TRUE if (p->transport == BT_TRANSPORT_LE) { memcpy(btm_cb.devcb.read_tx_pwr_addr, remote_bda, BD_ADDR_LEN); ret = btsnd_hcic_ble_read_adv_chnl_tx_power(); } else #endif { ret = btsnd_hcic_read_tx_power (p->hci_handle, BTM_READ_RSSI_TYPE_CUR); } if (!ret) { btm_cb.devcb.p_tx_power_cmpl_cb = NULL; btu_stop_timer (&btm_cb.devcb.tx_power_timer); return (BTM_NO_RESOURCES); } else { return (BTM_CMD_STARTED); } } /* If here, no BD Addr found */ return (BTM_UNKNOWN_ADDR); } #if (BLE_INCLUDED == TRUE) tBTM_STATUS BTM_BleReadAdvTxPower(tBTM_CMPL_CB *p_cb) { BOOLEAN ret; tBTM_TX_POWER_RESULTS result; /* If someone already waiting on the version, do not allow another */ if (btm_cb.devcb.p_tx_power_cmpl_cb) { result.status = BTM_BUSY; (*p_cb)(&result); return (BTM_BUSY); } btm_cb.devcb.p_tx_power_cmpl_cb = p_cb; btu_start_timer (&btm_cb.devcb.tx_power_timer, BTU_TTYPE_BTM_ACL, BTM_DEV_REPLY_TIMEOUT); ret = btsnd_hcic_ble_read_adv_chnl_tx_power(); if(!ret) { btm_cb.devcb.p_tx_power_cmpl_cb = NULL; btu_stop_timer (&btm_cb.devcb.tx_power_timer); result.status = BTM_NO_RESOURCES; (*p_cb)(&result); return (BTM_NO_RESOURCES); } else { return BTM_CMD_STARTED; } } void BTM_BleGetWhiteListSize(uint16_t *length) { tBTM_BLE_CB *p_cb = &btm_cb.ble_ctr_cb; if (p_cb->white_list_avail_size == 0) { BTM_TRACE_WARNING("%s Whitelist full.", __func__); } *length = p_cb->white_list_avail_size; return; } #endif ///BLE_INCLUDED == TRUE /******************************************************************************* ** ** Function btm_read_tx_power_complete ** ** Description This function is called when the command complete message ** is received from the HCI for the read tx power request. ** ** Returns void ** *******************************************************************************/ void btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble) { tBTM_CMPL_CB *p_cb = btm_cb.devcb.p_tx_power_cmpl_cb; tBTM_TX_POWER_RESULTS results; UINT16 handle; tACL_CONN *p_acl_cb = NULL; BTM_TRACE_DEBUG ("btm_read_tx_power_complete\n"); btu_stop_timer (&btm_cb.devcb.tx_power_timer); /* If there was a callback registered for read rssi, call it */ btm_cb.devcb.p_tx_power_cmpl_cb = NULL; if (p_cb) { STREAM_TO_UINT8 (results.hci_status, p); if (results.hci_status == HCI_SUCCESS) { results.status = BTM_SUCCESS; if (!is_ble) { STREAM_TO_UINT16 (handle, p); STREAM_TO_UINT8 (results.tx_power, p); /* Search through the list of active channels for the correct BD Addr */ p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb) { memcpy (results.rem_bda, p_acl_cb->remote_addr, BD_ADDR_LEN); } } #if BLE_INCLUDED == TRUE else { STREAM_TO_UINT8 (results.tx_power, p); memcpy(results.rem_bda, btm_cb.devcb.read_tx_pwr_addr, BD_ADDR_LEN); } #endif BTM_TRACE_DEBUG ("BTM TX power Complete: tx_power %d, hci status 0x%02x\n", results.tx_power, results.hci_status); } else { results.status = BTM_ERR_PROCESSING; } (*p_cb)(&results); } } /******************************************************************************* ** ** Function btm_read_rssi_complete ** ** Description This function is called when the command complete message ** is received from the HCI for the read rssi request. ** ** Returns void ** *******************************************************************************/ void btm_read_rssi_complete (UINT8 *p) { tBTM_CMPL_CB *p_cb = btm_cb.devcb.p_rssi_cmpl_cb; tBTM_RSSI_RESULTS results; UINT16 handle; tACL_CONN *p_acl_cb = NULL; BTM_TRACE_DEBUG ("btm_read_rssi_complete\n"); btu_stop_timer (&btm_cb.devcb.rssi_timer); /* If there was a callback registered for read rssi, call it */ btm_cb.devcb.p_rssi_cmpl_cb = NULL; if (p_cb) { STREAM_TO_UINT8 (results.hci_status, p); if (results.hci_status == HCI_SUCCESS) { results.status = BTM_SUCCESS; STREAM_TO_UINT16 (handle, p); STREAM_TO_UINT8 (results.rssi, p); BTM_TRACE_DEBUG ("BTM RSSI Complete: rssi %d, hci status 0x%02x\n", results.rssi, results.hci_status); /* Search through the list of active channels for the correct BD Addr */ p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb) { memcpy (results.rem_bda, p_acl_cb->remote_addr, BD_ADDR_LEN); } } else { results.status = BTM_ERR_PROCESSING; } (*p_cb)(&results); } } /******************************************************************************* ** ** Function btm_read_link_quality_complete ** ** Description This function is called when the command complete message ** is received from the HCI for the read link quality. ** ** Returns void ** *******************************************************************************/ void btm_read_link_quality_complete (UINT8 *p) { tBTM_CMPL_CB *p_cb = btm_cb.devcb.p_lnk_qual_cmpl_cb; tBTM_LINK_QUALITY_RESULTS results; UINT16 handle; tACL_CONN *p_acl_cb = NULL; BTM_TRACE_DEBUG ("btm_read_link_quality_complete\n"); btu_stop_timer (&btm_cb.devcb.lnk_quality_timer); /* If there was a callback registered for read rssi, call it */ btm_cb.devcb.p_lnk_qual_cmpl_cb = NULL; if (p_cb) { STREAM_TO_UINT8 (results.hci_status, p); if (results.hci_status == HCI_SUCCESS) { results.status = BTM_SUCCESS; STREAM_TO_UINT16 (handle, p); STREAM_TO_UINT8 (results.link_quality, p); BTM_TRACE_DEBUG ("BTM Link Quality Complete: Link Quality %d, hci status 0x%02x\n", results.link_quality, results.hci_status); /* Search through the list of active channels for the correct BD Addr */ p_acl_cb = btm_handle_to_acl(handle); if (p_acl_cb) { memcpy (results.rem_bda, p_acl_cb->remote_addr, BD_ADDR_LEN); } } else { results.status = BTM_ERR_PROCESSING; } (*p_cb)(&results); } } /******************************************************************************* ** ** Function btm_remove_acl ** ** Description This function is called to disconnect an ACL connection ** ** Returns BTM_SUCCESS if successfully initiated, otherwise BTM_NO_RESOURCES. ** *******************************************************************************/ tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport) { UINT16 hci_handle = BTM_GetHCIConnHandle(bd_addr, transport); tBTM_STATUS status = BTM_SUCCESS; BTM_TRACE_DEBUG ("btm_remove_acl\n"); #if BTM_DISC_DURING_RS == TRUE tBTM_SEC_DEV_REC *p_dev_rec = btm_find_dev (bd_addr); /* Role Switch is pending, postpone until completed */ if (p_dev_rec && (p_dev_rec->rs_disc_pending == BTM_SEC_RS_PENDING)) { p_dev_rec->rs_disc_pending = BTM_SEC_DISC_PENDING; } else /* otherwise can disconnect right away */ #endif { if (hci_handle != 0xFFFF && p_dev_rec && p_dev_rec->sec_state != BTM_SEC_STATE_DISCONNECTING) { if (!btsnd_hcic_disconnect (hci_handle, HCI_ERR_PEER_USER)) { status = BTM_NO_RESOURCES; } } else { status = BTM_UNKNOWN_ADDR; } } return status; } /******************************************************************************* ** ** Function BTM_SetTraceLevel ** ** Description This function sets the trace level for BTM. If called with ** a value of 0xFF, it simply returns the current trace level. ** ** Returns The new or current trace level ** *******************************************************************************/ UINT8 BTM_SetTraceLevel (UINT8 new_level) { BTM_TRACE_DEBUG ("BTM_SetTraceLevel\n"); if (new_level != 0xFF) { btm_cb.trace_level = new_level; } return (btm_cb.trace_level); } /******************************************************************************* ** ** Function btm_cont_rswitch ** ** Description This function is called to continue processing an active ** role switch. It first disables encryption if enabled and ** EPR is not supported ** ** Returns void ** *******************************************************************************/ void btm_cont_rswitch (tACL_CONN *p, tBTM_SEC_DEV_REC *p_dev_rec, UINT8 hci_status) { BOOLEAN sw_ok = TRUE; BTM_TRACE_DEBUG ("btm_cont_rswitch\n"); /* Check to see if encryption needs to be turned off if pending change of link key or role switch */ if (p->switch_role_state == BTM_ACL_SWKEY_STATE_MODE_CHANGE) { /* Must turn off Encryption first if necessary */ /* Some devices do not support switch or change of link key while encryption is on */ if (p_dev_rec != NULL && ((p_dev_rec->sec_flags & BTM_SEC_ENCRYPTED) != 0) && !BTM_EPR_AVAILABLE(p)) { if (btsnd_hcic_set_conn_encrypt (p->hci_handle, FALSE)) { p->encrypt_state = BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF; if (p->switch_role_state == BTM_ACL_SWKEY_STATE_MODE_CHANGE) { p->switch_role_state = BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF; } } else { /* Error occurred; set states back to Idle */ if (p->switch_role_state == BTM_ACL_SWKEY_STATE_MODE_CHANGE) { sw_ok = FALSE; } } } else /* Encryption not used or EPR supported, continue with switch and/or change of link key */ { if (p->switch_role_state == BTM_ACL_SWKEY_STATE_MODE_CHANGE) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IN_PROGRESS; #if BTM_DISC_DURING_RS == TRUE if (p_dev_rec) { p_dev_rec->rs_disc_pending = BTM_SEC_RS_PENDING; } #endif sw_ok = btsnd_hcic_switch_role (p->remote_addr, (UINT8)!p->link_role); } } if (!sw_ok) { p->switch_role_state = BTM_ACL_SWKEY_STATE_IDLE; btm_acl_report_role_change(hci_status, p->remote_addr); } } } /******************************************************************************* ** ** Function btm_acl_resubmit_page ** ** Description send pending page request ** *******************************************************************************/ void btm_acl_resubmit_page (void) { #if (SMP_INCLUDED == TRUE) tBTM_SEC_DEV_REC *p_dev_rec; BT_HDR *p_buf; UINT8 *pp; BD_ADDR bda; BTM_TRACE_DEBUG ("btm_acl_resubmit_page\n"); /* If there were other page request schedule can start the next one */ if ((p_buf = (BT_HDR *)fixed_queue_dequeue(btm_cb.page_queue, 0)) != NULL) { /* skip 3 (2 bytes opcode and 1 byte len) to get to the bd_addr * for both create_conn and rmt_name */ pp = (UINT8 *)(p_buf + 1) + p_buf->offset + 3; STREAM_TO_BDADDR (bda, pp); p_dev_rec = btm_find_or_alloc_dev (bda); memcpy (btm_cb.connecting_bda, p_dev_rec->bd_addr, BD_ADDR_LEN); memcpy (btm_cb.connecting_dc, p_dev_rec->dev_class, DEV_CLASS_LEN); btu_hcif_send_cmd (LOCAL_BR_EDR_CONTROLLER_ID, p_buf); } else { btm_cb.paging = FALSE; } #endif ///SMP_INCLUDED == TRUE } /******************************************************************************* ** ** Function btm_acl_reset_paging ** ** Description set paging to FALSE and free the page queue - called at hci_reset ** *******************************************************************************/ void btm_acl_reset_paging (void) { BT_HDR *p; BTM_TRACE_DEBUG ("btm_acl_reset_paging\n"); /* If we sent reset we are definitely not paging any more */ while ((p = (BT_HDR *)fixed_queue_dequeue(btm_cb.page_queue, 0)) != NULL) { osi_free (p); } btm_cb.paging = FALSE; } /******************************************************************************* ** ** Function btm_acl_paging ** ** Description send a paging command or queue it in btm_cb ** *******************************************************************************/ #if (SMP_INCLUDED == TRUE && CLASSIC_BT_INCLUDED == TRUE) void btm_acl_paging (BT_HDR *p, BD_ADDR bda) { tBTM_SEC_DEV_REC *p_dev_rec; BTM_TRACE_DEBUG ("btm_acl_paging discing:%d, paging:%d BDA: %06x%06x\n", btm_cb.discing, btm_cb.paging, (bda[0] << 16) + (bda[1] << 8) + bda[2], (bda[3] << 16) + (bda[4] << 8) + bda[5]); if (btm_cb.discing) { btm_cb.paging = TRUE; fixed_queue_enqueue(btm_cb.page_queue, p, FIXED_QUEUE_MAX_TIMEOUT); } else { if (!BTM_ACL_IS_CONNECTED (bda)) { BTM_TRACE_DEBUG ("connecting_bda: %06x%06x\n", (btm_cb.connecting_bda[0] << 16) + (btm_cb.connecting_bda[1] << 8) + btm_cb.connecting_bda[2], (btm_cb.connecting_bda[3] << 16) + (btm_cb.connecting_bda[4] << 8) + btm_cb.connecting_bda[5]); if (btm_cb.paging && memcmp (bda, btm_cb.connecting_bda, BD_ADDR_LEN) != 0) { fixed_queue_enqueue(btm_cb.page_queue, p, FIXED_QUEUE_MAX_TIMEOUT); } else { p_dev_rec = btm_find_or_alloc_dev (bda); memcpy (btm_cb.connecting_bda, p_dev_rec->bd_addr, BD_ADDR_LEN); memcpy (btm_cb.connecting_dc, p_dev_rec->dev_class, DEV_CLASS_LEN); btu_hcif_send_cmd (LOCAL_BR_EDR_CONTROLLER_ID, p); } btm_cb.paging = TRUE; } else { /* ACL is already up */ btu_hcif_send_cmd (LOCAL_BR_EDR_CONTROLLER_ID, p); } } } #endif ///SMP_INCLUDED == TRUE /******************************************************************************* ** ** Function btm_acl_notif_conn_collision ** ** Description Send connection collision event to upper layer if registered ** ** Returns TRUE if sent out to upper layer, ** FALSE if no one needs the notification. ** *******************************************************************************/ BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda) { tBTM_BL_EVENT_DATA evt_data; /* Report possible collision to the upper layer. */ if (btm_cb.p_bl_changed_cb) { BTM_TRACE_DEBUG ("btm_acl_notif_conn_collision: RemBdAddr: %02x%02x%02x%02x%02x%02x\n", bda[0], bda[1], bda[2], bda[3], bda[4], bda[5]); evt_data.event = BTM_BL_COLLISION_EVT; evt_data.conn.p_bda = bda; #if BLE_INCLUDED == TRUE evt_data.conn.transport = BT_TRANSPORT_BR_EDR; evt_data.conn.handle = BTM_INVALID_HCI_HANDLE; #endif (*btm_cb.p_bl_changed_cb)(&evt_data); return TRUE; } else { return FALSE; } } /******************************************************************************* ** ** Function btm_acl_chk_peer_pkt_type_support ** ** Description Check if peer supports requested packets ** *******************************************************************************/ void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type) { /* 3 and 5 slot packets? */ if (!HCI_3_SLOT_PACKETS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) { *p_pkt_type &= ~(BTM_ACL_PKT_TYPES_MASK_DH3 + BTM_ACL_PKT_TYPES_MASK_DM3); } if (!HCI_5_SLOT_PACKETS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) { *p_pkt_type &= ~(BTM_ACL_PKT_TYPES_MASK_DH5 + BTM_ACL_PKT_TYPES_MASK_DM5); } /* 2 and 3 MPS support? */ if (!HCI_EDR_ACL_2MPS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) { /* Not supported. Add 'not_supported' mask for all 2MPS packet types */ *p_pkt_type |= (BTM_ACL_PKT_TYPES_MASK_NO_2_DH1 + BTM_ACL_PKT_TYPES_MASK_NO_2_DH3 + BTM_ACL_PKT_TYPES_MASK_NO_2_DH5); } if (!HCI_EDR_ACL_3MPS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) { /* Not supported. Add 'not_supported' mask for all 3MPS packet types */ *p_pkt_type |= (BTM_ACL_PKT_TYPES_MASK_NO_3_DH1 + BTM_ACL_PKT_TYPES_MASK_NO_3_DH3 + BTM_ACL_PKT_TYPES_MASK_NO_3_DH5); } /* EDR 3 and 5 slot support? */ if (HCI_EDR_ACL_2MPS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) || HCI_EDR_ACL_3MPS_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) { if (!HCI_3_SLOT_EDR_ACL_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) /* Not supported. Add 'not_supported' mask for all 3-slot EDR packet types */ { *p_pkt_type |= (BTM_ACL_PKT_TYPES_MASK_NO_2_DH3 + BTM_ACL_PKT_TYPES_MASK_NO_3_DH3); } if (!HCI_5_SLOT_EDR_ACL_SUPPORTED(p->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0])) /* Not supported. Add 'not_supported' mask for all 5-slot EDR packet types */ { *p_pkt_type |= (BTM_ACL_PKT_TYPES_MASK_NO_2_DH5 + BTM_ACL_PKT_TYPES_MASK_NO_3_DH5); } } } /******************************************************************************* ** ** Function btm_acl_free ** ** Description Free acl specific lists from btm control block ** *******************************************************************************/ void btm_acl_free(void) { list_free(btm_cb.p_acl_db_list); list_free(btm_cb.p_pm_mode_db_list); }