1/****************************************************************************** 2 * 3 * Copyright (C) 2011-2012 Broadcom Corporation 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at: 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 ******************************************************************************/ 18 19/****************************************************************************** 20 * 21 * This file contains the action functions the NFA_CE state machine. 22 * 23 ******************************************************************************/ 24#include <string.h> 25#include "nfa_ce_int.h" 26#include "nfa_dm_int.h" 27#include "nfa_sys_int.h" 28#include "nfa_mem_co.h" 29#include "ndef_utils.h" 30#include "ce_api.h" 31#if (NFC_NFCEE_INCLUDED == TRUE) 32#include "nfa_ee_int.h" 33#endif 34 35/***************************************************************************** 36* Protocol-specific event handlers 37*****************************************************************************/ 38 39/******************************************************************************* 40** 41** Function nfa_ce_handle_t3t_evt 42** 43** Description Handler for Type-3 tag card emulation events 44** 45** Returns Nothing 46** 47*******************************************************************************/ 48void nfa_ce_handle_t3t_evt (tCE_EVENT event, tCE_DATA *p_ce_data) 49{ 50 tNFA_CE_CB *p_cb = &nfa_ce_cb; 51 tNFA_CONN_EVT_DATA conn_evt; 52 53 NFA_TRACE_DEBUG1 ("nfa_ce_handle_t3t_evt: event 0x%x", event); 54 55 switch (event) 56 { 57 case CE_T3T_NDEF_UPDATE_START_EVT: 58 /* Notify app using callback associated with the active ndef */ 59 if (p_cb->idx_cur_active == NFA_CE_LISTEN_INFO_IDX_NDEF) 60 { 61 conn_evt.status = NFA_STATUS_OK; 62 (*p_cb->p_active_conn_cback) (NFA_CE_NDEF_WRITE_START_EVT, &conn_evt); 63 } 64 else 65 { 66 NFA_TRACE_ERROR0 ("nfa_ce_handle_t3t_evt: got CE_T3T_UPDATE_START_EVT, but no active NDEF"); 67 } 68 break; 69 70 case CE_T3T_NDEF_UPDATE_CPLT_EVT: 71 /* Notify app using callback associated with the active ndef */ 72 if (p_cb->idx_cur_active == NFA_CE_LISTEN_INFO_IDX_NDEF) 73 { 74 conn_evt.ndef_write_cplt.status = NFA_STATUS_OK; 75 conn_evt.ndef_write_cplt.len = p_ce_data->update_info.length; 76 conn_evt.ndef_write_cplt.p_data = p_ce_data->update_info.p_data; 77 (*p_cb->p_active_conn_cback) (NFA_CE_NDEF_WRITE_CPLT_EVT, &conn_evt); 78 } 79 else 80 { 81 NFA_TRACE_ERROR0 ("nfa_ce_handle_t3t_evt: got CE_T3T_UPDATE_CPLT_EVT, but no active NDEF"); 82 } 83 break; 84 85 case CE_T3T_RAW_FRAME_EVT: 86 if (p_cb->idx_cur_active == NFA_CE_LISTEN_INFO_IDX_NDEF) 87 { 88 conn_evt.data.p_data = (UINT8 *) (p_ce_data->raw_frame.p_data + 1) + p_ce_data->raw_frame.p_data->offset; 89 conn_evt.data.len = p_ce_data->raw_frame.p_data->len; 90 (*p_cb->p_active_conn_cback) (NFA_DATA_EVT, &conn_evt); 91 } 92 else 93 { 94 conn_evt.ce_data.handle = (NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE)p_cb->idx_cur_active)); 95 conn_evt.ce_data.p_data = (UINT8 *) (p_ce_data->raw_frame.p_data + 1) + p_ce_data->raw_frame.p_data->offset; 96 conn_evt.ce_data.len = p_ce_data->raw_frame.p_data->len; 97 (*p_cb->p_active_conn_cback) (NFA_CE_DATA_EVT, &conn_evt); 98 } 99 GKI_freebuf (p_ce_data->raw_frame.p_data); 100 break; 101 102 default: 103 NFA_TRACE_DEBUG1 ("nfa_ce_handle_t3t_evt unhandled event=0x%02x", event); 104 break; 105 } 106} 107 108/******************************************************************************* 109** 110** Function nfa_ce_handle_t4t_evt 111** 112** Description Handler for Type-4 tag card emulation events (for NDEF case) 113** 114** Returns Nothing 115** 116*******************************************************************************/ 117void nfa_ce_handle_t4t_evt (tCE_EVENT event, tCE_DATA *p_ce_data) 118{ 119 tNFA_CE_CB *p_cb = &nfa_ce_cb; 120 tNFA_CONN_EVT_DATA conn_evt; 121 122 NFA_TRACE_DEBUG1 ("nfa_ce_handle_t4t_evt: event 0x%x", event); 123 124 /* AID for NDEF selected. we had notified the app of activation. */ 125 p_cb->idx_cur_active = NFA_CE_LISTEN_INFO_IDX_NDEF; 126 if (p_cb->listen_info[p_cb->idx_cur_active].flags & NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND) 127 { 128 p_cb->p_active_conn_cback = p_cb->listen_info[p_cb->idx_cur_active].p_conn_cback; 129 } 130 131 switch (event) 132 { 133 case CE_T4T_NDEF_UPDATE_START_EVT: 134 conn_evt.status = NFA_STATUS_OK; 135 (*p_cb->p_active_conn_cback) (NFA_CE_NDEF_WRITE_START_EVT, &conn_evt); 136 break; 137 138 case CE_T4T_NDEF_UPDATE_CPLT_EVT: 139 conn_evt.ndef_write_cplt.len = p_ce_data->update_info.length; 140 conn_evt.ndef_write_cplt.p_data = p_ce_data->update_info.p_data; 141 142 if (NDEF_MsgValidate (p_ce_data->update_info.p_data, p_ce_data->update_info.length, TRUE) != NDEF_OK) 143 conn_evt.ndef_write_cplt.status = NFA_STATUS_FAILED; 144 else 145 conn_evt.ndef_write_cplt.status = NFA_STATUS_OK; 146 147 (*p_cb->p_active_conn_cback) (NFA_CE_NDEF_WRITE_CPLT_EVT, &conn_evt); 148 break; 149 150 case CE_T4T_NDEF_UPDATE_ABORT_EVT: 151 conn_evt.ndef_write_cplt.len = 0; 152 conn_evt.ndef_write_cplt.status = NFA_STATUS_FAILED; 153 conn_evt.ndef_write_cplt.p_data = NULL; 154 (*p_cb->p_active_conn_cback) (NFA_CE_NDEF_WRITE_CPLT_EVT, &conn_evt); 155 break; 156 157 default: 158 /* CE_T4T_RAW_FRAME_EVT is not used in NFA CE */ 159 NFA_TRACE_DEBUG1 ("nfa_ce_handle_t4t_evt unhandled event=0x%02x", event); 160 break; 161 } 162} 163 164 165/******************************************************************************* 166** 167** Function nfa_ce_handle_t4t_aid_evt 168** 169** Description Handler for Type-4 tag AID events (for AIDs registered using 170** NFA_CeRegisterT4tAidOnDH) 171** 172** Returns Nothing 173** 174*******************************************************************************/ 175void nfa_ce_handle_t4t_aid_evt (tCE_EVENT event, tCE_DATA *p_ce_data) 176{ 177 tNFA_CE_CB *p_cb = &nfa_ce_cb; 178 UINT8 listen_info_idx; 179 tNFA_CONN_EVT_DATA conn_evt; 180 181 NFA_TRACE_DEBUG1 ("nfa_ce_handle_t4t_aid_evt: event 0x%x", event); 182 183 /* Get listen_info for this aid callback */ 184 for (listen_info_idx=0; listen_info_idx<NFA_CE_LISTEN_INFO_IDX_INVALID; listen_info_idx++) 185 { 186 if ((p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE) && 187 (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_T4T_AID) && 188 (p_cb->listen_info[listen_info_idx].t4t_aid_handle == p_ce_data->raw_frame.aid_handle)) 189 { 190 p_cb->idx_cur_active = listen_info_idx; 191 p_cb->p_active_conn_cback = p_cb->listen_info[p_cb->idx_cur_active].p_conn_cback; 192 break; 193 } 194 } 195 196 if (event == CE_T4T_RAW_FRAME_EVT) 197 { 198 if (listen_info_idx != NFA_CE_LISTEN_INFO_IDX_INVALID) 199 { 200 /* Found listen_info entry */ 201 conn_evt.ce_activated.handle = NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE) p_cb->idx_cur_active); 202 203 /* If we have not notified the app of activation, do so now */ 204 if (p_cb->listen_info[p_cb->idx_cur_active].flags & NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND) 205 { 206 p_cb->listen_info[p_cb->idx_cur_active].flags &= ~NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND; 207 208 memcpy (&(conn_evt.ce_activated.activate_ntf), &p_cb->activation_params, sizeof (tNFC_ACTIVATE_DEVT)); 209 conn_evt.ce_activated.status = NFA_STATUS_OK; 210 (*p_cb->p_active_conn_cback) (NFA_CE_ACTIVATED_EVT, &conn_evt); 211 } 212 213 /* Notify app of AID data */ 214 conn_evt.ce_data.handle = NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE)p_cb->idx_cur_active); 215 conn_evt.ce_data.p_data = (UINT8 *) (p_ce_data->raw_frame.p_data + 1) + p_ce_data->raw_frame.p_data->offset; 216 conn_evt.ce_data.len = p_ce_data->raw_frame.p_data->len; 217 (*p_cb->p_active_conn_cback) (NFA_CE_DATA_EVT, &conn_evt); 218 } 219 else 220 { 221 NFA_TRACE_ERROR1 ("nfa_ce_handle_t4t_aid_evt: unable to find listen_info for aid hdl %i", p_ce_data->raw_frame.aid_handle) 222 } 223 224 GKI_freebuf (p_ce_data->raw_frame.p_data); 225 } 226} 227 228/***************************************************************************** 229* Discovery configuration and discovery event handlers 230*****************************************************************************/ 231 232/******************************************************************************* 233** 234** Function nfa_ce_discovery_cback 235** 236** Description Processing event from discovery callback 237** 238** Returns None 239** 240*******************************************************************************/ 241void nfa_ce_discovery_cback (tNFA_DM_RF_DISC_EVT event, tNFC_DISCOVER *p_data) 242{ 243 tNFA_CE_MSG ce_msg; 244 NFA_TRACE_DEBUG1 ("nfa_ce_discovery_cback(): event:0x%02X", event); 245 246 switch (event) 247 { 248 case NFA_DM_RF_DISC_START_EVT: 249 NFA_TRACE_DEBUG1 ("nfa_ce_handle_disc_start (status=0x%x)", p_data->start); 250 break; 251 252 case NFA_DM_RF_DISC_ACTIVATED_EVT: 253 ce_msg.activate_ntf.hdr.event = NFA_CE_ACTIVATE_NTF_EVT; 254 ce_msg.activate_ntf.p_activation_params = &p_data->activate; 255 nfa_ce_hdl_event ((BT_HDR *) &ce_msg); 256 break; 257 258 case NFA_DM_RF_DISC_DEACTIVATED_EVT: 259 ce_msg.hdr.event = NFA_CE_DEACTIVATE_NTF_EVT; 260 ce_msg.hdr.layer_specific = p_data->deactivate.type; 261 nfa_ce_hdl_event ((BT_HDR *) &ce_msg); 262 break; 263 264 case NFA_DM_RF_DISC_CMD_IDLE_CMPL_EVT: 265 /* DH initiated deactivation in NFA_DM_RFST_LISTEN_SLEEP */ 266 ce_msg.hdr.event = NFA_CE_DEACTIVATE_NTF_EVT; 267 ce_msg.hdr.layer_specific = NFA_DEACTIVATE_TYPE_IDLE; 268 nfa_ce_hdl_event ((BT_HDR *) &ce_msg); 269 break; 270 271 default: 272 NFA_TRACE_ERROR0 ("Unexpected event"); 273 break; 274 } 275} 276 277/******************************************************************************* 278** 279** Function nfc_ce_t3t_set_listen_params 280** 281** Description Set t3t listening parameters 282** 283** Returns Nothing 284** 285*******************************************************************************/ 286void nfc_ce_t3t_set_listen_params (void) 287{ 288 UINT8 i; 289 tNFA_CE_CB *p_cb = &nfa_ce_cb; 290 UINT8 tlv[32], *p_params; 291 UINT8 tlv_size; 292 UINT16 t3t_flags2_mask = 0xFFFF; /* Mask of which T3T_IDs are disabled */ 293 UINT8 t3t_idx = 0; 294 295 /* Point to start of tlv buffer */ 296 p_params = tlv; 297 298 /* Set system code and NFCID2 */ 299 for (i=0; i<NFA_CE_LISTEN_INFO_MAX; i++) 300 { 301 if ((p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE) && 302 (p_cb->listen_info[i].protocol_mask & NFA_PROTOCOL_MASK_T3T)) 303 { 304 /* Set tag's system code and NFCID2 */ 305 UINT8_TO_STREAM (p_params, NFC_PMID_LF_T3T_ID1+t3t_idx); /* type */ 306 UINT8_TO_STREAM (p_params, NCI_PARAM_LEN_LF_T3T_ID); /* length */ 307 UINT16_TO_BE_STREAM (p_params, p_cb->listen_info[i].t3t_system_code); /* System Code */ 308 ARRAY_TO_BE_STREAM (p_params, p_cb->listen_info[i].t3t_nfcid2, NCI_RF_F_UID_LEN); 309 310 /* Set mask for this ID */ 311 t3t_flags2_mask &= ~((UINT16) (1<<t3t_idx)); 312 t3t_idx++; 313 } 314 } 315 316 /* For NCI draft 22+, the polarity of NFC_PMID_LF_T3T_FLAGS2 is flipped */ 317 t3t_flags2_mask = ~t3t_flags2_mask; 318 319 UINT8_TO_STREAM (p_params, NFC_PMID_LF_T3T_FLAGS2); /* type */ 320 UINT8_TO_STREAM (p_params, NCI_PARAM_LEN_LF_T3T_FLAGS2); /* length */ 321 UINT16_TO_STREAM (p_params, t3t_flags2_mask); /* Mask of IDs to disable listening */ 322 323 tlv_size = (UINT8) (p_params-tlv); 324 nfa_dm_check_set_config (tlv_size, (UINT8 *)tlv, FALSE); 325} 326 327/******************************************************************************* 328** 329** Function nfa_ce_t3t_generate_rand_nfcid 330** 331** Description Generate a random NFCID2 for Type-3 tag 332** 333** Returns Nothing 334** 335*******************************************************************************/ 336void nfa_ce_t3t_generate_rand_nfcid (UINT8 nfcid2[NCI_RF_F_UID_LEN]) 337{ 338 UINT32 rand_seed = GKI_get_tick_count (); 339 340 /* For Type-3 tag, nfcid2 starts witn 02:fe */ 341 nfcid2[0] = 0x02; 342 nfcid2[1] = 0xFE; 343 344 /* The remaining 6 bytes are random */ 345 nfcid2[2] = (UINT8) (rand_seed & 0xFF); 346 nfcid2[3] = (UINT8) (rand_seed>>8 & 0xFF); 347 rand_seed>>=(rand_seed&3); 348 nfcid2[4] = (UINT8) (rand_seed & 0xFF); 349 nfcid2[5] = (UINT8) (rand_seed>>8 & 0xFF); 350 rand_seed>>=(rand_seed&3); 351 nfcid2[6] = (UINT8) (rand_seed & 0xFF); 352 nfcid2[7] = (UINT8) (rand_seed>>8 & 0xFF); 353} 354 355/******************************************************************************* 356** 357** Function nfa_ce_start_listening 358** 359** Description Start listening 360** 361** Returns NFA_STATUS_OK if successful 362** 363*******************************************************************************/ 364tNFA_STATUS nfa_ce_start_listening (void) 365{ 366 tNFA_DM_DISC_TECH_PROTO_MASK listen_mask; 367 tNFA_CE_CB *p_cb = &nfa_ce_cb; 368 tNFA_HANDLE disc_handle; 369 UINT8 listen_info_idx; 370 371 /*************************************************************************/ 372 /* Construct protocol preference list to listen for */ 373 374 /* First, get protocol preference for active NDEF (if any) */ 375 if ( (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFA_CE_LISTEN_INFO_IN_USE) 376 &&(p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle == NFA_HANDLE_INVALID)) 377 { 378 listen_mask = 0; 379 380 if (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask & NFA_PROTOCOL_MASK_T3T) 381 { 382 /* set T3T config params */ 383 nfc_ce_t3t_set_listen_params (); 384 385 listen_mask |= NFA_DM_DISC_MASK_LF_T3T; 386 } 387 388 if (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask & NFA_PROTOCOL_MASK_ISO_DEP) 389 { 390 listen_mask |= nfa_ce_cb.isodep_disc_mask; 391 } 392 393 disc_handle = nfa_dm_add_rf_discover (listen_mask, NFA_DM_DISC_HOST_ID_DH, nfa_ce_discovery_cback); 394 395 if (disc_handle == NFA_HANDLE_INVALID) 396 return (NFA_STATUS_FAILED); 397 else 398 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle = disc_handle; 399 } 400 401 /* Next, add protocols from non-NDEF, if any */ 402 for (listen_info_idx=0; listen_info_idx<NFA_CE_LISTEN_INFO_IDX_INVALID; listen_info_idx++) 403 { 404 /* add RF discovery to DM only if it is not added yet */ 405 if ( (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE) 406 &&(p_cb->listen_info[listen_info_idx].rf_disc_handle == NFA_HANDLE_INVALID)) 407 { 408 if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_FELICA) 409 { 410 /* set T3T config params */ 411 nfc_ce_t3t_set_listen_params (); 412 413 disc_handle = nfa_dm_add_rf_discover (NFA_DM_DISC_MASK_LF_T3T, 414 NFA_DM_DISC_HOST_ID_DH, 415 nfa_ce_discovery_cback); 416 417 if (disc_handle == NFA_HANDLE_INVALID) 418 return (NFA_STATUS_FAILED); 419 else 420 p_cb->listen_info[listen_info_idx].rf_disc_handle = disc_handle; 421 } 422 else if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_T4T_AID) 423 { 424 disc_handle = nfa_dm_add_rf_discover (nfa_ce_cb.isodep_disc_mask, 425 NFA_DM_DISC_HOST_ID_DH, 426 nfa_ce_discovery_cback); 427 428 if (disc_handle == NFA_HANDLE_INVALID) 429 return (NFA_STATUS_FAILED); 430 else 431 p_cb->listen_info[listen_info_idx].rf_disc_handle = disc_handle; 432 } 433#if (NFC_NFCEE_INCLUDED == TRUE) 434 else if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_UICC) 435 { 436 listen_mask = 0; 437 if (nfa_ee_is_active (p_cb->listen_info[listen_info_idx].ee_handle)) 438 { 439 if (p_cb->listen_info[listen_info_idx].tech_mask & NFA_TECHNOLOGY_MASK_A) 440 { 441 listen_mask |= NFA_DM_DISC_MASK_LA_ISO_DEP; 442 } 443 if (p_cb->listen_info[listen_info_idx].tech_mask & NFA_TECHNOLOGY_MASK_B) 444 { 445 listen_mask |= NFA_DM_DISC_MASK_LB_ISO_DEP; 446 } 447 if (p_cb->listen_info[listen_info_idx].tech_mask & NFA_TECHNOLOGY_MASK_F) 448 { 449 listen_mask |= NFA_DM_DISC_MASK_LF_T3T; 450 } 451 if (p_cb->listen_info[listen_info_idx].tech_mask & NFA_TECHNOLOGY_MASK_B_PRIME) 452 { 453 listen_mask |= NFA_DM_DISC_MASK_L_B_PRIME; 454 } 455 } 456 457 if (listen_mask) 458 { 459 /* Start listening for requested technologies */ 460 /* register discovery callback to NFA DM */ 461 disc_handle = nfa_dm_add_rf_discover (listen_mask, 462 (tNFA_DM_DISC_HOST_ID) (p_cb->listen_info[listen_info_idx].ee_handle &0x00FF), 463 nfa_ce_discovery_cback); 464 465 if (disc_handle == NFA_HANDLE_INVALID) 466 return (NFA_STATUS_FAILED); 467 else 468 { 469 p_cb->listen_info[listen_info_idx].rf_disc_handle = disc_handle; 470 p_cb->listen_info[listen_info_idx].tech_proto_mask = listen_mask; 471 } 472 } 473 else 474 { 475 NFA_TRACE_ERROR1 ("UICC[0x%x] is not activated", 476 p_cb->listen_info[listen_info_idx].ee_handle); 477 } 478 } 479#endif 480 } 481 } 482 483 return NFA_STATUS_OK; 484} 485 486/******************************************************************************* 487** 488** Function nfa_ce_restart_listen_check 489** 490** Description Called on deactivation. Check if any active listen_info entries to listen for 491** 492** Returns TRUE if listening is restarted. 493** FALSE if listening not restarted 494** 495*******************************************************************************/ 496BOOLEAN nfa_ce_restart_listen_check (void) 497{ 498 tNFA_CE_CB *p_cb = &nfa_ce_cb; 499 UINT8 listen_info_idx; 500 501 /* Check if any active entries in listen_info table */ 502 for (listen_info_idx=0; listen_info_idx<NFA_CE_LISTEN_INFO_MAX; listen_info_idx++) 503 { 504 if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE) 505 break; 506 } 507 508 /* Restart listening if there are any active listen_info entries */ 509 if (listen_info_idx != NFA_CE_LISTEN_INFO_IDX_INVALID) 510 { 511 /* restart listening */ 512 nfa_ce_start_listening (); 513 } 514 else 515 { 516 /* No active listen_info entries */ 517 return FALSE; 518 } 519 520 return TRUE; 521} 522 523/******************************************************************************* 524** 525** Function nfa_ce_remove_listen_info_entry 526** 527** Description Remove entry from listen_info table. (when API deregister is called or listen_start failed) 528** 529** 530** Returns Nothing 531** 532*******************************************************************************/ 533void nfa_ce_remove_listen_info_entry (UINT8 listen_info_idx, BOOLEAN notify_app) 534{ 535 tNFA_CE_CB *p_cb = &nfa_ce_cb; 536 tNFA_CONN_EVT_DATA conn_evt; 537 538 NFA_TRACE_DEBUG1 ("NFA_CE: removing listen_info entry %i", listen_info_idx); 539 540 /* Notify app that listening has stopped if requested (for API deregister) */ 541 /* For LISTEN_START failures, app has already notified of NFA_LISTEN_START_EVT failure */ 542 if (notify_app) 543 { 544 if (listen_info_idx == NFA_CE_LISTEN_INFO_IDX_NDEF) 545 { 546 conn_evt.status = NFA_STATUS_OK; 547 (*p_cb->listen_info[listen_info_idx].p_conn_cback) (NFA_CE_LOCAL_TAG_CONFIGURED_EVT, &conn_evt); 548 } 549#if (NFC_NFCEE_INCLUDED == TRUE) 550 else if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_UICC) 551 { 552 conn_evt.status = NFA_STATUS_OK; 553 (*p_cb->listen_info[listen_info_idx].p_conn_cback) (NFA_CE_UICC_LISTEN_CONFIGURED_EVT, &conn_evt); 554 } 555#endif 556 else 557 { 558 conn_evt.ce_deregistered.handle = NFA_HANDLE_GROUP_CE | listen_info_idx; 559 (*p_cb->listen_info[listen_info_idx].p_conn_cback) (NFA_CE_DEREGISTERED_EVT, &conn_evt); 560 } 561 } 562 563 564 /* Handle NDEF stopping */ 565 if (listen_info_idx == NFA_CE_LISTEN_INFO_IDX_NDEF) 566 { 567 /* clear NDEF contents */ 568 CE_T3tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 569 CE_T4tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 570 571 if (p_cb->listen_info[listen_info_idx].protocol_mask & NFA_PROTOCOL_MASK_T3T) 572 { 573 p_cb->listen_info[listen_info_idx].protocol_mask = 0; 574 575 /* clear T3T Flags for NDEF */ 576 nfc_ce_t3t_set_listen_params (); 577 } 578 579 /* Free scratch buffer for this NDEF, if one was allocated */ 580 nfa_ce_free_scratch_buf (); 581 } 582 /* If stopping listening Felica system code, then clear T3T Flags for this */ 583 else if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_FELICA) 584 { 585 p_cb->listen_info[listen_info_idx].protocol_mask = 0; 586 587 /* clear T3T Flags for registered Felica system code */ 588 nfc_ce_t3t_set_listen_params (); 589 } 590 /* If stopping listening T4T AID, then deregister this AID from CE_T4T */ 591 else if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_T4T_AID) 592 { 593 /* Free t4t_aid_cback used by this AID */ 594 CE_T4tDeregisterAID (p_cb->listen_info[listen_info_idx].t4t_aid_handle); 595 } 596 597 if (p_cb->listen_info[listen_info_idx].rf_disc_handle != NFA_HANDLE_INVALID ) 598 { 599 nfa_dm_delete_rf_discover (p_cb->listen_info[listen_info_idx].rf_disc_handle); 600 p_cb->listen_info[listen_info_idx].rf_disc_handle = NFA_HANDLE_INVALID; 601 } 602 603 /* Remove entry from listen_info table */ 604 p_cb->listen_info[listen_info_idx].flags = 0; 605} 606 607/******************************************************************************* 608** 609** Function nfa_ce_free_scratch_buf 610** 611** Description free scratch buffer (if one is allocated) 612** 613** Returns nothing 614** 615*******************************************************************************/ 616void nfa_ce_free_scratch_buf (void) 617{ 618 tNFA_CE_CB *p_cb = &nfa_ce_cb; 619 if (p_cb->p_scratch_buf) 620 { 621 nfa_mem_co_free (p_cb->p_scratch_buf); 622 p_cb->p_scratch_buf = NULL; 623 } 624} 625 626/******************************************************************************* 627** 628** Function nfa_ce_realloc_scratch_buffer 629** 630** Description Set scratch buffer if necessary (for writable NDEF messages) 631** 632** Returns NFA_STATUS_OK if successful 633** 634*******************************************************************************/ 635tNFA_STATUS nfa_ce_realloc_scratch_buffer (void) 636{ 637 tNFA_STATUS result = NFA_STATUS_OK; 638 639 /* If current NDEF message is read-only, then we do not need a scratch buffer */ 640 if (nfa_ce_cb.listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFC_CE_LISTEN_INFO_READONLY_NDEF) 641 { 642 /* Free existing scratch buffer, if one was allocated */ 643 nfa_ce_free_scratch_buf (); 644 } 645 else 646 { 647 /* If no scratch buffer allocated yet, or if current scratch buffer size is different from current ndef size, */ 648 /* then allocate a new scratch buffer. */ 649 if ((nfa_ce_cb.p_scratch_buf == NULL) || 650 (nfa_ce_cb.scratch_buf_size != nfa_ce_cb.ndef_max_size)) 651 { 652 /* Free existing scratch buffer, if one was allocated */ 653 nfa_ce_free_scratch_buf (); 654 655 if ((nfa_ce_cb.p_scratch_buf = (UINT8 *) nfa_mem_co_alloc (nfa_ce_cb.ndef_max_size)) != NULL) 656 { 657 nfa_ce_cb.scratch_buf_size = nfa_ce_cb.ndef_max_size; 658 } 659 else 660 { 661 NFA_TRACE_ERROR1 ("Unable to allocate scratch buffer for writable NDEF message (%i bytes)", nfa_ce_cb.ndef_max_size); 662 result=NFA_STATUS_FAILED; 663 } 664 } 665 } 666 667 return (result); 668} 669 670/******************************************************************************* 671** 672** Function nfa_ce_set_content 673** 674** Description Set NDEF contents 675** 676** Returns void 677** 678*******************************************************************************/ 679tNFC_STATUS nfa_ce_set_content (void) 680{ 681 tNFC_STATUS status; 682 tNFA_CE_CB *p_cb = &nfa_ce_cb; 683 tNFA_PROTOCOL_MASK ndef_protocol_mask; 684 BOOLEAN readonly; 685 686 /* Check if listening for NDEF */ 687 if (!(p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFA_CE_LISTEN_INFO_IN_USE)) 688 { 689 /* Not listening for NDEF */ 690 return (NFA_STATUS_OK); 691 } 692 693 NFA_TRACE_DEBUG0 ("Setting NDEF contents"); 694 695 readonly = (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFC_CE_LISTEN_INFO_READONLY_NDEF) ? TRUE : FALSE; 696 ndef_protocol_mask = p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask; 697 698 /* Allocate a scratch buffer if needed (for handling write-requests) */ 699 if ((status = nfa_ce_realloc_scratch_buffer ()) == NFA_STATUS_OK) 700 { 701 if ((ndef_protocol_mask & NFA_PROTOCOL_MASK_T3T) && (status == NFA_STATUS_OK)) 702 { 703 /* Type3Tag - NFC-F */ 704 status = CE_T3tSetLocalNDEFMsg (readonly, 705 p_cb->ndef_max_size, 706 p_cb->ndef_cur_size, 707 p_cb->p_ndef_data, 708 p_cb->p_scratch_buf); 709 } 710 711 if ((ndef_protocol_mask & NFA_PROTOCOL_MASK_ISO_DEP) && (status == NFA_STATUS_OK)) 712 { 713 /* ISODEP/4A,4B- NFC-A or NFC-B */ 714 status = CE_T4tSetLocalNDEFMsg (readonly, 715 p_cb->ndef_max_size, 716 p_cb->ndef_cur_size, 717 p_cb->p_ndef_data, 718 p_cb->p_scratch_buf); 719 } 720 } 721 722 if (status != NFA_STATUS_OK) 723 { 724 /* clear NDEF contents */ 725 CE_T3tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 726 CE_T4tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 727 728 NFA_TRACE_ERROR1 ("Unable to set contents (error %02x)", status); 729 } 730 731 return (status); 732} 733 734 735/******************************************************************************* 736** 737** Function nfa_ce_activate_ntf 738** 739** Description Action when activation has occured (NFA_CE_ACTIVATE_NTF_EVT) 740** 741** - Find the listen_info entry assocated with this activation 742** - get the app callback that registered for this listen 743** - call CE_SetActivatedTagType with activation parameters 744** 745** Returns TRUE (message buffer to be freed by caller) 746** 747*******************************************************************************/ 748BOOLEAN nfa_ce_activate_ntf (tNFA_CE_MSG *p_ce_msg) 749{ 750 tNFC_ACTIVATE_DEVT *p_activation_params = p_ce_msg->activate_ntf.p_activation_params; 751 tNFA_CE_CB *p_cb = &nfa_ce_cb; 752 tNFA_CONN_EVT_DATA conn_evt; 753 tCE_CBACK *p_ce_cback = NULL; 754 UINT16 t3t_system_code = 0xFFFF; 755 UINT8 listen_info_idx = NFA_CE_LISTEN_INFO_IDX_INVALID; 756 UINT8 *p_nfcid2 = NULL; 757 UINT8 i; 758 BOOLEAN t4t_activate_pending = FALSE; 759 760 NFA_TRACE_DEBUG1 ("nfa_ce_activate_ntf () protocol=%d", p_ce_msg->activate_ntf.p_activation_params->protocol); 761 762 /* Tag is in listen active state */ 763 p_cb->flags |= NFA_CE_FLAGS_LISTEN_ACTIVE_SLEEP; 764 765 /* Store activation parameters */ 766 memcpy (&p_cb->activation_params, p_activation_params, sizeof (tNFC_ACTIVATE_DEVT)); 767 768 /* Find the listen_info entry corresponding to this activation */ 769 if (p_cb->activation_params.protocol == NFA_PROTOCOL_T3T) 770 { 771 /* Look for T3T entries in listen_info table that match activated system code and NFCID2 */ 772 for (listen_info_idx=0; listen_info_idx<NFA_CE_LISTEN_INFO_IDX_INVALID; listen_info_idx++) 773 { 774 /* Look for entries with NFA_PROTOCOL_MASK_T3T */ 775 if (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE) 776 { 777 if (p_cb->listen_info[listen_info_idx].protocol_mask & NFA_PROTOCOL_MASK_T3T) 778 { 779 /* Check if system_code and nfcid2 that matches activation params */ 780 p_nfcid2 = p_cb->listen_info[listen_info_idx].t3t_nfcid2; 781 t3t_system_code = p_cb->listen_info[listen_info_idx].t3t_system_code; 782 783 /* Compare NFCID2 (note: NFCC currently does not return system code in activation parameters) */ 784 if ((memcmp (p_nfcid2, p_cb->activation_params.rf_tech_param.param.lf.nfcid2, NCI_RF_F_UID_LEN)==0) 785 /* && (t3t_system_code == p_ce_msg->activation.p_activate_info->rf_tech_param.param.lf.system_code) */) 786 { 787 /* Found listen_info corresponding to this activation */ 788 break; 789 } 790 } 791 792 /* Check if entry is for T3T UICC */ 793 if ((p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_UICC) && 794 (p_cb->listen_info[listen_info_idx].tech_mask & NFA_TECHNOLOGY_MASK_F)) 795 { 796 break; 797 } 798 } 799 } 800 801 p_ce_cback = nfa_ce_handle_t3t_evt; 802 } 803 else if (p_cb->activation_params.protocol == NFA_PROTOCOL_ISO_DEP) 804 { 805 p_ce_cback = nfa_ce_handle_t4t_evt; 806 807 /* For T4T, we do not know which AID will be selected yet */ 808 809 810 /* For all T4T entries in listen_info, set T4T_ACTIVATE_NOTIFY_PENDING flag */ 811 for (i=0; i<NFA_CE_LISTEN_INFO_IDX_INVALID; i++) 812 { 813 if (p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE) 814 { 815 if (p_cb->listen_info[i].protocol_mask & NFA_PROTOCOL_MASK_ISO_DEP) 816 { 817 /* Found listen_info table entry for T4T raw listen */ 818 p_cb->listen_info[i].flags |= NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND; 819 820 /* If entry if for NDEF, select it, so application gets nofitifed of ACTIVATE_EVT now */ 821 if (i == NFA_CE_LISTEN_INFO_IDX_NDEF) 822 { 823 listen_info_idx = NFA_CE_LISTEN_INFO_IDX_NDEF; 824 } 825 826 t4t_activate_pending = TRUE; 827 } 828 829#if (NFC_NFCEE_INCLUDED == TRUE) 830 /* Check if entry is for ISO_DEP UICC */ 831 if (p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_UICC) 832 { 833 if ( ( (p_cb->activation_params.rf_tech_param.mode == NFC_DISCOVERY_TYPE_LISTEN_A) 834 &&(p_cb->listen_info[i].tech_proto_mask & NFA_DM_DISC_MASK_LA_ISO_DEP) ) 835 || 836 ( (p_cb->activation_params.rf_tech_param.mode == NFC_DISCOVERY_TYPE_LISTEN_B) 837 &&(p_cb->listen_info[i].tech_proto_mask & NFA_DM_DISC_MASK_LB_ISO_DEP) ) ) 838 { 839 listen_info_idx = i; 840 } 841 } 842#endif 843 } 844 } 845 846 /* If listening for ISO_DEP, but not NDEF nor UICC, then notify CE module now and wait for reader/writer to SELECT an AID */ 847 if (t4t_activate_pending && (listen_info_idx == NFA_CE_LISTEN_INFO_IDX_INVALID)) 848 { 849 CE_SetActivatedTagType (&p_cb->activation_params, 0, p_ce_cback); 850 return TRUE; 851 } 852 } 853 else if (p_cb->activation_params.intf_param.type == NFC_INTERFACE_EE_DIRECT_RF) 854 { 855 /* search any entry listening UICC */ 856 for (i=0; i<NFA_CE_LISTEN_INFO_IDX_INVALID; i++) 857 { 858 if ( (p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE) 859 &&(p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_UICC)) 860 { 861 listen_info_idx = i; 862 break; 863 } 864 } 865 } 866 867 /* Check if valid listen_info entry was found */ 868 if ( (listen_info_idx == NFA_CE_LISTEN_INFO_IDX_INVALID) 869 ||((listen_info_idx == NFA_CE_LISTEN_INFO_IDX_NDEF) && !(p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFA_CE_LISTEN_INFO_IN_USE))) 870 { 871 NFA_TRACE_DEBUG1 ("No listen_info found for this activation. listen_info_idx=%d", listen_info_idx); 872 return (TRUE); 873 } 874 875 p_cb->listen_info[listen_info_idx].flags &= ~NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND; 876 877 /* Get CONN_CBACK for this activation */ 878 p_cb->p_active_conn_cback = p_cb->listen_info[listen_info_idx].p_conn_cback; 879 p_cb->idx_cur_active = listen_info_idx; 880 881 if ( (p_cb->idx_cur_active == NFA_CE_LISTEN_INFO_IDX_NDEF) 882 ||(p_cb->listen_info[p_cb->idx_cur_active].flags & NFA_CE_LISTEN_INFO_UICC)) 883 { 884 memcpy (&(conn_evt.activated.activate_ntf), &p_cb->activation_params, sizeof (tNFC_ACTIVATE_DEVT)); 885 886 (*p_cb->p_active_conn_cback) (NFA_ACTIVATED_EVT, &conn_evt); 887 } 888 else 889 { 890 conn_evt.ce_activated.handle = NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE)p_cb->idx_cur_active); 891 memcpy (&(conn_evt.ce_activated.activate_ntf), &p_cb->activation_params, sizeof (tNFC_ACTIVATE_DEVT)); 892 conn_evt.ce_activated.status = NFA_STATUS_OK; 893 894 (*p_cb->p_active_conn_cback) (NFA_CE_ACTIVATED_EVT, &conn_evt); 895 } 896 897 /* we don't need any CE subsystem in case of NFCEE direct RF interface */ 898 if (p_ce_cback) 899 { 900 /* Notify CE subsystem */ 901 CE_SetActivatedTagType (&p_cb->activation_params, t3t_system_code, p_ce_cback); 902 } 903 return TRUE; 904} 905 906/******************************************************************************* 907** 908** Function nfa_ce_deactivate_ntf 909** 910** Description Action when deactivate occurs. (NFA_CE_DEACTIVATE_NTF_EVT) 911** 912** - If deactivate due to API deregister, then remove its entry from 913** listen_info table 914** 915** - If NDEF was modified while activated, then restore 916** original NDEF contents 917** 918** - Restart listening (if any active entries in listen table) 919** 920** Returns TRUE (message buffer to be freed by caller) 921** 922*******************************************************************************/ 923BOOLEAN nfa_ce_deactivate_ntf (tNFA_CE_MSG *p_ce_msg) 924{ 925 tNFC_DEACT_TYPE deact_type = (tNFC_DEACT_TYPE) p_ce_msg->hdr.layer_specific; 926 tNFA_CE_CB *p_cb = &nfa_ce_cb; 927 tNFA_CONN_EVT_DATA conn_evt; 928 UINT8 i; 929 930 NFA_TRACE_DEBUG1 ("nfa_ce_deactivate_ntf () deact_type=%d", deact_type); 931 932 /* Check if deactivating to SLEEP mode */ 933 if ( (deact_type == NFC_DEACTIVATE_TYPE_SLEEP) 934 ||(deact_type == NFC_DEACTIVATE_TYPE_SLEEP_AF) ) 935 { 936 /* notify deactivated as sleep and wait for reactivation or deactivation to idle */ 937 conn_evt.deactivated.type = deact_type; 938 939 /* if T4T AID application has not been selected then p_active_conn_cback could be NULL */ 940 if (p_cb->p_active_conn_cback) 941 (*p_cb->p_active_conn_cback) (NFA_DEACTIVATED_EVT, &conn_evt); 942 943 return TRUE; 944 } 945 else 946 { 947 deact_type = NFC_DEACTIVATE_TYPE_IDLE; 948 } 949 950 /* Tag is in idle state */ 951 p_cb->flags &= ~NFA_CE_FLAGS_LISTEN_ACTIVE_SLEEP; 952 953 /* First, notify app of deactivation */ 954 for (i=0; i<NFA_CE_LISTEN_INFO_IDX_INVALID; i++) 955 { 956 if (p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE) 957 { 958 if ( (p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_UICC) 959 &&(i == p_cb->idx_cur_active) ) 960 { 961 conn_evt.deactivated.type = deact_type; 962 (*p_cb->p_active_conn_cback) (NFA_DEACTIVATED_EVT, &conn_evt); 963 } 964 else if ( (p_cb->activation_params.protocol == NFA_PROTOCOL_ISO_DEP) 965 &&(p_cb->listen_info[i].protocol_mask & NFA_PROTOCOL_MASK_ISO_DEP)) 966 { 967 /* Don't send NFA_DEACTIVATED_EVT if NFA_ACTIVATED_EVT wasn't sent */ 968 if (!(p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_T4T_ACTIVATE_PND)) 969 { 970 if (i == NFA_CE_LISTEN_INFO_IDX_NDEF) 971 { 972 conn_evt.deactivated.type = deact_type; 973 (*p_cb->p_active_conn_cback) (NFA_DEACTIVATED_EVT, &conn_evt); 974 } 975 else 976 { 977 conn_evt.ce_deactivated.handle = NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE)i); 978 conn_evt.ce_deactivated.type = deact_type; 979 (*p_cb->p_active_conn_cback) (NFA_CE_DEACTIVATED_EVT, &conn_evt); 980 } 981 } 982 } 983 else if ( (p_cb->activation_params.protocol == NFA_PROTOCOL_T3T) 984 &&(p_cb->listen_info[i].protocol_mask & NFA_PROTOCOL_MASK_T3T)) 985 { 986 if (i == NFA_CE_LISTEN_INFO_IDX_NDEF) 987 { 988 conn_evt.deactivated.type = deact_type; 989 (*p_cb->p_active_conn_cback) (NFA_DEACTIVATED_EVT, &conn_evt); 990 } 991 else 992 { 993 conn_evt.ce_deactivated.handle = NFA_HANDLE_GROUP_CE | ((tNFA_HANDLE)i); 994 conn_evt.ce_deactivated.type = deact_type; 995 (*p_cb->p_active_conn_cback) (NFA_CE_DEACTIVATED_EVT, &conn_evt); 996 } 997 } 998 } 999 } 1000 1001 /* Check if app initiated the deactivation (due to API deregister). If so, remove entry from listen_info table. */ 1002 if (p_cb->flags & NFA_CE_FLAGS_APP_INIT_DEACTIVATION) 1003 { 1004 p_cb->flags &= ~NFA_CE_FLAGS_APP_INIT_DEACTIVATION; 1005 nfa_ce_remove_listen_info_entry (p_cb->idx_cur_active, TRUE); 1006 } 1007 1008 p_cb->p_active_conn_cback = NULL; 1009 p_cb->idx_cur_active = NFA_CE_LISTEN_INFO_IDX_INVALID; 1010 1011 /* Restart listening (if any listen_info entries are still active) */ 1012 nfa_ce_restart_listen_check (); 1013 1014 return TRUE; 1015} 1016 1017/******************************************************************************* 1018** 1019** Function nfa_ce_disable_local_tag 1020** 1021** Description Disable local NDEF tag 1022** - clean up control block 1023** - remove NDEF discovery configuration 1024** 1025** Returns Nothing 1026** 1027*******************************************************************************/ 1028void nfa_ce_disable_local_tag (void) 1029{ 1030 tNFA_CE_CB *p_cb = &nfa_ce_cb; 1031 tNFA_CONN_EVT_DATA evt_data; 1032 1033 NFA_TRACE_DEBUG0 ("Disabling local NDEF tag"); 1034 1035 /* If local NDEF tag is in use, then disable it */ 1036 if (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFA_CE_LISTEN_INFO_IN_USE) 1037 { 1038 /* NDEF Tag is in not idle state */ 1039 if ( (p_cb->flags & NFA_CE_FLAGS_LISTEN_ACTIVE_SLEEP) 1040 &&(p_cb->idx_cur_active == NFA_CE_LISTEN_INFO_IDX_NDEF) ) 1041 { 1042 /* wait for deactivation */ 1043 p_cb->flags |= NFA_CE_FLAGS_APP_INIT_DEACTIVATION; 1044 nfa_dm_rf_deactivate (NFA_DEACTIVATE_TYPE_IDLE); 1045 } 1046 else 1047 { 1048 /* Notify DM to stop listening for ndef */ 1049 if (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle != NFA_HANDLE_INVALID) 1050 { 1051 nfa_dm_delete_rf_discover (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle); 1052 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle = NFA_HANDLE_INVALID; 1053 } 1054 nfa_ce_remove_listen_info_entry (NFA_CE_LISTEN_INFO_IDX_NDEF, TRUE); 1055 } 1056 } 1057 else 1058 { 1059 /* Notify application */ 1060 evt_data.status = NFA_STATUS_OK; 1061 nfa_dm_conn_cback_event_notify (NFA_CE_LOCAL_TAG_CONFIGURED_EVT, &evt_data); 1062 } 1063} 1064 1065/******************************************************************************* 1066** 1067** Function nfa_ce_api_cfg_local_tag 1068** 1069** Description Configure local NDEF tag 1070** - store ndef attributes in to control block 1071** - update discovery configuration 1072** 1073** Returns TRUE (message buffer to be freed by caller) 1074** 1075*******************************************************************************/ 1076BOOLEAN nfa_ce_api_cfg_local_tag (tNFA_CE_MSG *p_ce_msg) 1077{ 1078 tNFA_CE_CB *p_cb = &nfa_ce_cb; 1079 tNFA_CONN_EVT_DATA conn_evt; 1080 1081 /* Check if disabling local tag */ 1082 if (p_ce_msg->local_tag.protocol_mask == 0) 1083 { 1084 nfa_ce_disable_local_tag (); 1085 return TRUE; 1086 } 1087 1088 NFA_TRACE_DEBUG5 ("Configuring local NDEF tag: protocol_mask=%01x cur_size=%i, max_size=%i, readonly=%i", 1089 p_ce_msg->local_tag.protocol_mask, 1090 p_ce_msg->local_tag.ndef_cur_size, 1091 p_ce_msg->local_tag.ndef_max_size, 1092 p_ce_msg->local_tag.read_only, 1093 p_ce_msg->local_tag.uid_len); 1094 1095 /* If local tag was already set, then check if NFA_CeConfigureLocalTag called to change protocol mask */ 1096 if ( (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags & NFA_CE_LISTEN_INFO_IN_USE) 1097 &&(p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle != NFA_HANDLE_INVALID) 1098 &&((p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask & (NFA_PROTOCOL_MASK_T3T | NFA_PROTOCOL_MASK_ISO_DEP)) 1099 != (p_ce_msg->local_tag.protocol_mask & (NFA_PROTOCOL_MASK_T3T | NFA_PROTOCOL_MASK_ISO_DEP))) ) 1100 { 1101 /* Listening for different tag protocols. Stop discovery */ 1102 nfa_dm_delete_rf_discover (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle); 1103 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].rf_disc_handle = NFA_HANDLE_INVALID; 1104 1105 /* clear NDEF contents */ 1106 CE_T3tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 1107 CE_T4tSetLocalNDEFMsg (TRUE, 0, 0, NULL, NULL); 1108 } 1109 1110 /* Store NDEF info to control block */ 1111 p_cb->p_ndef_data = p_ce_msg->local_tag.p_ndef_data; 1112 p_cb->ndef_cur_size = p_ce_msg->local_tag.ndef_cur_size; 1113 p_cb->ndef_max_size = p_ce_msg->local_tag.ndef_max_size; 1114 1115 /* Fill in LISTEN_INFO entry for NDEF */ 1116 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags = NFA_CE_LISTEN_INFO_IN_USE; 1117 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask = p_ce_msg->local_tag.protocol_mask; 1118 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].p_conn_cback = nfa_dm_conn_cback_event_notify; 1119 if (p_ce_msg->local_tag.read_only) 1120 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].flags |= NFC_CE_LISTEN_INFO_READONLY_NDEF; 1121 p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].t3t_system_code = T3T_SYSTEM_CODE_NDEF; 1122 1123 /* Set NDEF contents */ 1124 conn_evt.status = NFA_STATUS_FAILED; 1125 1126 if (p_cb->listen_info[NFA_CE_LISTEN_INFO_IDX_NDEF].protocol_mask & (NFA_PROTOCOL_MASK_T3T | NFA_PROTOCOL_MASK_ISO_DEP)) 1127 { 1128 /* Ok to set contents now */ 1129 if (nfa_ce_set_content () != NFA_STATUS_OK) 1130 { 1131 NFA_TRACE_ERROR0 ("nfa_ce_api_cfg_local_tag: could not set contents"); 1132 nfa_dm_conn_cback_event_notify (NFA_CE_LOCAL_TAG_CONFIGURED_EVT, &conn_evt); 1133 return TRUE; 1134 } 1135 1136 /* Start listening and notify app of status */ 1137 conn_evt.status = nfa_ce_start_listening (); 1138 nfa_dm_conn_cback_event_notify (NFA_CE_LOCAL_TAG_CONFIGURED_EVT, &conn_evt); 1139 } 1140 1141 return TRUE; 1142} 1143 1144/******************************************************************************* 1145** 1146** Function nfa_ce_api_reg_listen 1147** 1148** Description Register listen params for Felica system code, T4T AID, 1149** or UICC 1150** 1151** Returns TRUE (message buffer to be freed by caller) 1152** 1153*******************************************************************************/ 1154BOOLEAN nfa_ce_api_reg_listen (tNFA_CE_MSG *p_ce_msg) 1155{ 1156 tNFA_CE_CB *p_cb = &nfa_ce_cb; 1157 tNFA_CONN_EVT_DATA conn_evt; 1158 UINT8 i; 1159 UINT8 listen_info_idx = NFA_CE_LISTEN_INFO_IDX_INVALID; 1160 1161 NFA_TRACE_DEBUG1 ("Registering UICC/Felica/Type-4 tag listener. Type=%i", p_ce_msg->reg_listen.listen_type); 1162 1163 /* Look for available entry in listen_info table */ 1164 /* - If registering UICC listen, make sure there isn't another entry for the ee_handle */ 1165 /* - Skip over entry 0 (reserved for local NDEF tag) */ 1166 for (i=1; i<NFA_CE_LISTEN_INFO_MAX; i++) 1167 { 1168 if ( (p_ce_msg->reg_listen.listen_type == NFA_CE_REG_TYPE_UICC) 1169 &&(p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE) 1170 &&(p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_UICC) 1171 &&(p_cb->listen_info[i].ee_handle == p_ce_msg->reg_listen.ee_handle) ) 1172 { 1173 1174 NFA_TRACE_ERROR1 ("UICC (0x%x) listening already specified", p_ce_msg->reg_listen.ee_handle); 1175 conn_evt.status = NFA_STATUS_FAILED; 1176 nfa_dm_conn_cback_event_notify (NFA_CE_UICC_LISTEN_CONFIGURED_EVT, &conn_evt); 1177 return TRUE; 1178 } 1179 /* If this is a free entry, and we haven't found one yet, remember it */ 1180 else if ( (!(p_cb->listen_info[i].flags & NFA_CE_LISTEN_INFO_IN_USE)) 1181 &&(listen_info_idx == NFA_CE_LISTEN_INFO_IDX_INVALID) ) 1182 { 1183 listen_info_idx = i; 1184 } 1185 } 1186 1187 /* Add new entry to listen_info table */ 1188 if (listen_info_idx == NFA_CE_LISTEN_INFO_IDX_INVALID) 1189 { 1190 NFA_TRACE_ERROR1 ("Maximum listen callbacks exceeded (%i)", NFA_CE_LISTEN_INFO_MAX); 1191 1192 if (p_ce_msg->reg_listen.listen_type == NFA_CE_REG_TYPE_UICC) 1193 { 1194 conn_evt.status = NFA_STATUS_FAILED; 1195 nfa_dm_conn_cback_event_notify (NFA_CE_UICC_LISTEN_CONFIGURED_EVT, &conn_evt); 1196 } 1197 else 1198 { 1199 /* Notify application */ 1200 conn_evt.ce_registered.handle = NFA_HANDLE_INVALID; 1201 conn_evt.ce_registered.status = NFA_STATUS_FAILED; 1202 (*p_ce_msg->reg_listen.p_conn_cback) (NFA_CE_REGISTERED_EVT, &conn_evt); 1203 } 1204 return TRUE; 1205 } 1206 else 1207 { 1208 NFA_TRACE_DEBUG1 ("NFA_CE: adding listen_info entry %i", listen_info_idx); 1209 1210 /* Store common parameters */ 1211 /* Mark entry as 'in-use', and NFA_CE_LISTEN_INFO_START_NTF_PND */ 1212 /* (LISTEN_START_EVT will be notified when discovery successfully starts */ 1213 p_cb->listen_info[listen_info_idx].flags = NFA_CE_LISTEN_INFO_IN_USE | NFA_CE_LISTEN_INFO_START_NTF_PND; 1214 p_cb->listen_info[listen_info_idx].rf_disc_handle = NFA_HANDLE_INVALID; 1215 p_cb->listen_info[listen_info_idx].protocol_mask = 0; 1216 1217 /* Store type-specific parameters */ 1218 switch (p_ce_msg->reg_listen.listen_type) 1219 { 1220 case NFA_CE_REG_TYPE_ISO_DEP: 1221 p_cb->listen_info[listen_info_idx].protocol_mask = NFA_PROTOCOL_MASK_ISO_DEP; 1222 p_cb->listen_info[listen_info_idx].flags |= NFA_CE_LISTEN_INFO_T4T_AID; 1223 p_cb->listen_info[listen_info_idx].p_conn_cback =p_ce_msg->reg_listen.p_conn_cback; 1224 1225 /* Register this AID with CE_T4T */ 1226 if ((p_cb->listen_info[listen_info_idx].t4t_aid_handle = CE_T4tRegisterAID (p_ce_msg->reg_listen.aid_len, 1227 p_ce_msg->reg_listen.aid, 1228 nfa_ce_handle_t4t_aid_evt)) == 0xFF) 1229 { 1230 NFA_TRACE_ERROR0 ("Unable to register AID"); 1231 p_cb->listen_info[listen_info_idx].flags = 0; 1232 1233 /* Notify application */ 1234 conn_evt.ce_registered.handle = NFA_HANDLE_INVALID; 1235 conn_evt.ce_registered.status = NFA_STATUS_FAILED; 1236 (*p_ce_msg->reg_listen.p_conn_cback) (NFA_CE_REGISTERED_EVT, &conn_evt); 1237 1238 return TRUE; 1239 } 1240 break; 1241 1242 case NFA_CE_REG_TYPE_FELICA: 1243 p_cb->listen_info[listen_info_idx].protocol_mask = NFA_PROTOCOL_MASK_T3T; 1244 p_cb->listen_info[listen_info_idx].flags |= NFA_CE_LISTEN_INFO_FELICA; 1245 p_cb->listen_info[listen_info_idx].p_conn_cback = p_ce_msg->reg_listen.p_conn_cback; 1246 1247 /* Store system code and nfcid2 */ 1248 p_cb->listen_info[listen_info_idx].t3t_system_code = p_ce_msg->reg_listen.system_code; 1249 memcpy (p_cb->listen_info[listen_info_idx].t3t_nfcid2, p_ce_msg->reg_listen.nfcid2, NCI_RF_F_UID_LEN); 1250 break; 1251 1252#if (NFC_NFCEE_INCLUDED == TRUE) 1253 case NFA_CE_REG_TYPE_UICC: 1254 p_cb->listen_info[listen_info_idx].flags |= NFA_CE_LISTEN_INFO_UICC; 1255 p_cb->listen_info[listen_info_idx].p_conn_cback = &nfa_dm_conn_cback_event_notify; 1256 1257 /* Store EE handle and Tech */ 1258 p_cb->listen_info[listen_info_idx].ee_handle = p_ce_msg->reg_listen.ee_handle; 1259 p_cb->listen_info[listen_info_idx].tech_mask = p_ce_msg->reg_listen.tech_mask; 1260 break; 1261#endif 1262 } 1263 } 1264 1265 /* Start listening */ 1266 if ((conn_evt.status = nfa_ce_start_listening ()) != NFA_STATUS_OK) 1267 { 1268 NFA_TRACE_ERROR0 ("nfa_ce_api_reg_listen: unable to register new listen params with DM"); 1269 p_cb->listen_info[listen_info_idx].flags = 0; 1270 } 1271 1272 /* Nofitify app of status */ 1273 if (p_ce_msg->reg_listen.listen_type == NFA_CE_REG_TYPE_UICC) 1274 { 1275 (*p_cb->listen_info[listen_info_idx].p_conn_cback) (NFA_CE_UICC_LISTEN_CONFIGURED_EVT, &conn_evt); 1276 } 1277 else 1278 { 1279 conn_evt.ce_registered.handle = NFA_HANDLE_GROUP_CE | listen_info_idx; 1280 NFA_TRACE_DEBUG1 ("nfa_ce_api_reg_listen: registered handle 0x%04X", conn_evt.ce_registered.handle); 1281 (*p_cb->listen_info[listen_info_idx].p_conn_cback) (NFA_CE_REGISTERED_EVT, &conn_evt); 1282 } 1283 1284 return TRUE; 1285} 1286 1287/******************************************************************************* 1288** 1289** Function nfa_ce_api_dereg_listen 1290** 1291** Description Deregister listen params 1292** 1293** Returns TRUE (message buffer to be freed by caller) 1294** 1295*******************************************************************************/ 1296BOOLEAN nfa_ce_api_dereg_listen (tNFA_CE_MSG *p_ce_msg) 1297{ 1298 tNFA_CE_CB *p_cb = &nfa_ce_cb; 1299 UINT8 listen_info_idx; 1300 tNFA_CONN_EVT_DATA conn_evt; 1301 1302#if (NFC_NFCEE_INCLUDED == TRUE) 1303 /* Check if deregistering UICC , or virtual secure element listen */ 1304 if (p_ce_msg->dereg_listen.listen_info == NFA_CE_LISTEN_INFO_UICC) 1305 { 1306 /* Deregistering UICC listen. Look for listen_info for this UICC ee handle */ 1307 for (listen_info_idx = 0; listen_info_idx < NFA_CE_LISTEN_INFO_MAX; listen_info_idx++) 1308 { 1309 if ( (p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE) 1310 &&(p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_UICC) 1311 &&(p_cb->listen_info[listen_info_idx].ee_handle == p_ce_msg->dereg_listen.handle) ) 1312 { 1313 /* UICC is in not idle state */ 1314 if ( (p_cb->flags & NFA_CE_FLAGS_LISTEN_ACTIVE_SLEEP) 1315 &&(p_cb->idx_cur_active == listen_info_idx) ) 1316 { 1317 /* wait for deactivation */ 1318 p_cb->flags |= NFA_CE_FLAGS_APP_INIT_DEACTIVATION; 1319 nfa_dm_rf_deactivate (NFA_DEACTIVATE_TYPE_IDLE); 1320 } 1321 else 1322 { 1323 /* Stop listening */ 1324 if (p_cb->listen_info[listen_info_idx].rf_disc_handle != NFA_HANDLE_INVALID) 1325 { 1326 nfa_dm_delete_rf_discover (p_cb->listen_info[listen_info_idx].rf_disc_handle); 1327 p_cb->listen_info[listen_info_idx].rf_disc_handle = NFA_HANDLE_INVALID; 1328 } 1329 1330 /* Remove entry and notify application */ 1331 nfa_ce_remove_listen_info_entry (listen_info_idx, TRUE); 1332 } 1333 break; 1334 } 1335 } 1336 1337 if (listen_info_idx == NFA_CE_LISTEN_INFO_MAX) 1338 { 1339 NFA_TRACE_ERROR0 ("nfa_ce_api_dereg_listen (): cannot find listen_info for UICC"); 1340 conn_evt.status = NFA_STATUS_INVALID_PARAM; 1341 nfa_dm_conn_cback_event_notify (NFA_CE_UICC_LISTEN_CONFIGURED_EVT, &conn_evt); 1342 } 1343 } 1344 else 1345#endif 1346 { 1347 /* Deregistering virtual secure element listen */ 1348 listen_info_idx = p_ce_msg->dereg_listen.handle & NFA_HANDLE_MASK; 1349 1350 if ( (listen_info_idx < NFA_CE_LISTEN_INFO_MAX) 1351 &&(p_cb->listen_info[listen_info_idx].flags & NFA_CE_LISTEN_INFO_IN_USE)) 1352 { 1353 /* virtual secure element is in not idle state */ 1354 if ( (p_cb->flags & NFA_CE_FLAGS_LISTEN_ACTIVE_SLEEP) 1355 &&(p_cb->idx_cur_active == listen_info_idx) ) 1356 { 1357 /* wait for deactivation */ 1358 p_cb->flags |= NFA_CE_FLAGS_APP_INIT_DEACTIVATION; 1359 nfa_dm_rf_deactivate (NFA_DEACTIVATE_TYPE_IDLE); 1360 } 1361 else 1362 { 1363 /* Stop listening */ 1364 if (p_cb->listen_info[listen_info_idx].rf_disc_handle != NFA_HANDLE_INVALID) 1365 { 1366 nfa_dm_delete_rf_discover (p_cb->listen_info[listen_info_idx].rf_disc_handle); 1367 p_cb->listen_info[listen_info_idx].rf_disc_handle = NFA_HANDLE_INVALID; 1368 } 1369 1370 /* Remove entry and notify application */ 1371 nfa_ce_remove_listen_info_entry (listen_info_idx, TRUE); 1372 } 1373 } 1374 else 1375 { 1376 NFA_TRACE_ERROR0 ("nfa_ce_api_dereg_listen (): cannot find listen_info for Felica/T4tAID"); 1377 conn_evt.status = NFA_STATUS_INVALID_PARAM; 1378 nfa_dm_conn_cback_event_notify (NFA_CE_DEREGISTERED_EVT, &conn_evt); 1379 } 1380 } 1381 1382 return TRUE; 1383} 1384 1385/******************************************************************************* 1386** 1387** Function nfa_ce_api_cfg_isodep_tech 1388** 1389** Description Configure the technologies (NFC-A and/or NFC-B) to listen for 1390** ISO-DEP 1391** 1392** Returns TRUE (message buffer to be freed by caller) 1393** 1394*******************************************************************************/ 1395BOOLEAN nfa_ce_api_cfg_isodep_tech (tNFA_CE_MSG *p_ce_msg) 1396{ 1397 nfa_ce_cb.isodep_disc_mask = 0; 1398 if (p_ce_msg->hdr.layer_specific & NFA_TECHNOLOGY_MASK_A) 1399 nfa_ce_cb.isodep_disc_mask = NFA_DM_DISC_MASK_LA_ISO_DEP; 1400 1401 if (p_ce_msg->hdr.layer_specific & NFA_TECHNOLOGY_MASK_B) 1402 nfa_ce_cb.isodep_disc_mask |= NFA_DM_DISC_MASK_LB_ISO_DEP; 1403 return TRUE; 1404} 1405 1406