1/******************************************************************************
2 *
3 *  Copyright (C) 1999-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/******************************************************************************
20 *
21 *  this file contains the main Bluetooth Manager (BTM) internal
22 *  definitions.
23 *
24 ******************************************************************************/
25#ifndef BTM_INT_H
26#define BTM_INT_H
27
28#include "bt_target.h"
29#include "gki.h"
30#include "hcidefs.h"
31
32#if RFCOMM_INCLUDED == TRUE
33#include "rfcdefs.h"
34#endif
35
36#include "btm_api.h"
37
38#if (BLE_INCLUDED == TRUE)
39#include "btm_ble_int.h"
40#if (SMP_INCLUDED == TRUE)
41#include "smp_api.h"
42#endif
43#endif
44
45#if BTM_MAX_LOC_BD_NAME_LEN > 0
46typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
47#endif
48
49#define  BTM_ACL_IS_CONNECTED(bda)   (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
50
51/* Definitions for Server Channel Number (SCN) management
52*/
53#define BTM_MAX_SCN      PORT_MAX_RFC_PORTS
54
55/* Define masks for supported and exception 2.0 ACL packet types
56*/
57#define BTM_ACL_SUPPORTED_PKTS_MASK      (HCI_PKT_TYPES_MASK_DM1        | \
58                                          HCI_PKT_TYPES_MASK_DH1        | \
59                                          HCI_PKT_TYPES_MASK_DM3        | \
60                                          HCI_PKT_TYPES_MASK_DH3        | \
61                                          HCI_PKT_TYPES_MASK_DM5        | \
62                                          HCI_PKT_TYPES_MASK_DH5)
63
64#define BTM_ACL_EXCEPTION_PKTS_MASK      (HCI_PKT_TYPES_MASK_NO_2_DH1   | \
65                                          HCI_PKT_TYPES_MASK_NO_3_DH1   | \
66                                          HCI_PKT_TYPES_MASK_NO_2_DH3   | \
67                                          HCI_PKT_TYPES_MASK_NO_3_DH3   | \
68                                          HCI_PKT_TYPES_MASK_NO_2_DH5   | \
69                                          HCI_PKT_TYPES_MASK_NO_3_DH5)
70
71#define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
72                               HCI_ATOMIC_ENCRYPT_SUPPORTED(btm_cb.devcb.local_lmp_features[HCI_EXT_FEATURES_PAGE_0])) \
73                               ? TRUE : FALSE)
74
75#define BTM_IS_BRCM_CONTROLLER() (btm_cb.devcb.local_version.manufacturer == LMP_COMPID_BROADCOM)
76
77/* Define the ACL Management control structure
78*/
79typedef struct
80{
81    UINT16          hci_handle;
82    UINT16          pkt_types_mask;
83    UINT16          restore_pkt_types;  /* when coming in/out of SCO connection restore the packet types */
84    UINT16          clock_offset;
85    BD_ADDR         remote_addr;
86    DEV_CLASS       remote_dc;
87    BD_NAME         remote_name;
88
89    UINT16          manufacturer;
90    UINT16          lmp_subversion;
91    UINT16          link_super_tout;
92    BD_FEATURES     peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1];    /* Peer LMP Extended features mask table for the device */
93    UINT8           num_read_pages;
94    UINT8           lmp_version;
95
96    BOOLEAN         in_use;
97    UINT8           link_role;
98    BOOLEAN         link_up_issued;     /* True if busy_level link up has been issued */
99
100#define BTM_ACL_SWKEY_STATE_IDLE                0
101#define BTM_ACL_SWKEY_STATE_MODE_CHANGE         1
102#define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF      2
103#define BTM_ACL_SWKEY_STATE_SWITCHING           3
104#define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON       4
105#define BTM_ACL_SWKEY_STATE_IN_PROGRESS         5
106    UINT8           switch_role_state;
107    UINT8           change_key_state;
108
109#define BTM_ACL_ENCRYPT_STATE_IDLE              0
110#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF       1   /* encryption turning off */
111#define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC         2   /* temporarily off for change link key or role switch */
112#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON        3   /* encryption turning on */
113    UINT8           encrypt_state;                  /* overall BTM encryption state */
114
115#if BTM_PWR_MGR_INCLUDED == FALSE
116    UINT8           mode;
117#endif /* BTM_PWR_MGR_INCLUDED */
118
119#if BLE_INCLUDED == TRUE
120    tBT_TRANSPORT   transport;
121    BD_ADDR         conn_addr;              /* local device address used for this connection */
122    UINT8           conn_addr_type;         /* local device address type for this connection */
123    BD_ADDR         active_remote_addr;     /* remote address used on this connection */
124    UINT8           active_remote_addr_type;         /* local device address type for this connection */
125    BD_FEATURES     peer_le_features;       /* Peer LE Used features mask for the device */
126
127#endif
128
129} tACL_CONN;
130
131/*****************************************************
132** TIMER Definitions
133******************************************************/
134#define TT_DEV_RESET     1
135#define TT_DEV_RLN       2
136#define TT_DEV_RLNKP     4              /* Read Link Policy Settings */
137
138/* Define the Device Management control structure
139*/
140typedef struct
141{
142    tBTM_DEV_STATUS_CB  *p_dev_status_cb;   /* Device status change callback        */
143    tBTM_VS_EVT_CB      *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS];     /* Register for vendor specific events  */
144
145    tBTM_CMPL_CB        *p_stored_link_key_cmpl_cb;   /* Read/Write/Delete stored link key    */
146
147    TIMER_LIST_ENT       reset_timer;
148    tBTM_CMPL_CB        *p_reset_cmpl_cb;   /* Callback function to be called       */
149                                            /* when startup of the device is done   */
150    TIMER_LIST_ENT       rln_timer;
151    tBTM_CMPL_CB        *p_rln_cmpl_cb;     /* Callback function to be called when  */
152                                            /* read local name function complete    */
153    TIMER_LIST_ENT       rlinkp_timer;
154    tBTM_CMPL_CB        *p_rlinkp_cmpl_cb;  /* Callback function to be called when  */
155                                            /* read link policy function completes  */
156    TIMER_LIST_ENT       rssi_timer;
157    tBTM_CMPL_CB        *p_rssi_cmpl_cb;    /* Callback function to be called when  */
158                                            /* read rssi function completes         */
159    TIMER_LIST_ENT       lnk_quality_timer;
160    tBTM_CMPL_CB        *p_lnk_qual_cmpl_cb;/* Callback function to be called when  */
161                                            /* read link quality function completes */
162    TIMER_LIST_ENT       txpwer_timer;
163    tBTM_CMPL_CB        *p_txpwer_cmpl_cb;    /* Callback function to be called when  */
164                                            /* read inq tx power function completes  */
165
166    TIMER_LIST_ENT       qossu_timer;
167    tBTM_CMPL_CB        *p_qossu_cmpl_cb;   /* Callback function to be called when  */
168                                            /* qos setup function completes         */
169
170    tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
171    tBTM_CMPL_CB        *p_switch_role_cb;  /* Callback function to be called when  */
172                                            /* requested switch role is completed   */
173
174    tBTM_CHANGE_KEY_CMPL chg_link_key_ref_data;
175    tBTM_CMPL_CB        *p_chg_link_key_cb; /* Callback function to be called when  */
176                                            /* change of link key is completed      */
177
178    TIMER_LIST_ENT       tx_power_timer;
179    tBTM_CMPL_CB        *p_tx_power_cmpl_cb;/* Callback function to be called       */
180
181    BD_ADDR              local_addr;        /* BD_ADDR of the local device          */
182    tBTM_VERSION_INFO    local_version;     /* Local Version Information            */
183    DEV_CLASS            dev_class;         /* Local device class                   */
184
185    /* Local LMP Extended features mask table for the device */
186    BD_FEATURES          local_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1];
187
188#if BLE_INCLUDED == TRUE
189
190    tBTM_CMPL_CB        *p_le_test_cmd_cmpl_cb;   /* Callback function to be called when
191                                                  LE test mode command has been sent successfully */
192
193    BD_ADDR                 read_tx_pwr_addr;   /* read TX power target address     */
194    BD_FEATURES             local_le_features;  /* Local LE Supported features mask for the device */
195
196    tBTM_BLE_LOCAL_ID_KEYS  id_keys;        /* local BLE ID keys                    */
197    BT_OCTET16              er;             /* BLE encryption key                   */
198
199#define BTM_LE_SUPPORT_STATE_SIZE   8
200UINT8                   le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
201
202
203
204#if BTM_BLE_CONFORMANCE_TESTING == TRUE
205    BOOLEAN                 no_disc_if_pair_fail;
206    BOOLEAN                 enable_test_mac_val;
207    BT_OCTET8               test_mac;
208    BOOLEAN                 enable_test_local_sign_cntr;
209    UINT32                  test_local_sign_cntr;
210#endif
211
212
213#endif  /* BLE_INCLUDED */
214
215#define BTM_DEV_STATE_WAIT_RESET_CMPLT  0
216#define BTM_DEV_STATE_WAIT_AFTER_RESET  1
217#define BTM_DEV_STATE_READY             2
218
219    UINT8                state;
220    tBTM_IO_CAP          loc_io_caps;       /* IO capability of the local device */
221    tBTM_AUTH_REQ        loc_auth_req;      /* the auth_req flag  */
222    BD_FEATURES          brcm_features;     /* Broadcom specific features bit mask  */
223#define BTM_RELOAD_LE_HOST_FEATURE      0x10
224
225#define BTM_RE_READ_1ST_PAGE            0x01            /* Set it if you set at least one of "..._HOST_MAY_SUPP_..." bits */
226#define BTM_HOST_MAY_SUPP_SSP           0x02
227#define BTM_HOST_MAY_SUPP_LE            0x04
228#define BTM_HOST_MAY_SUPP_SIMULT_BR_LE  0x08
229    UINT8               lmp_features_host_may_support;  /* The flags of LMP features host may support via BR/EDR ctrlr + BTM_RE_READ_1ST_PAGE */
230    UINT8               supported_cmds[HCI_NUM_SUPP_COMMANDS_BYTES]; /* Supported Commands bit field */
231
232} tBTM_DEVCB;
233
234
235/* Define the structures and constants used for inquiry
236*/
237
238/* Definitions of limits for inquiries */
239#define BTM_PER_INQ_MIN_MAX_PERIOD      HCI_PER_INQ_MIN_MAX_PERIOD
240#define BTM_PER_INQ_MAX_MAX_PERIOD      HCI_PER_INQ_MAX_MAX_PERIOD
241#define BTM_PER_INQ_MIN_MIN_PERIOD      HCI_PER_INQ_MIN_MIN_PERIOD
242#define BTM_PER_INQ_MAX_MIN_PERIOD      HCI_PER_INQ_MAX_MIN_PERIOD
243#define BTM_MAX_INQUIRY_LENGTH          HCI_MAX_INQUIRY_LENGTH
244#define BTM_MIN_INQUIRY_LEN             0x01
245
246#define BTM_MIN_INQ_TX_POWER    -70
247#define BTM_MAX_INQ_TX_POWER    20
248
249#if BTM_USE_INQ_RESULTS_FILTER == TRUE
250typedef struct
251{
252    UINT32          inq_count;          /* Used for determining if a response has already been      */
253                                        /* received for the current inquiry operation. (We do not   */
254                                        /* want to flood the caller with multiple responses from    */
255                                        /* the same device.                                         */
256    BD_ADDR         bd_addr;
257} tINQ_BDADDR;
258#endif
259
260typedef struct
261{
262    UINT32          time_of_resp;
263    UINT32          inq_count;          /* "timestamps" the entry with a particular inquiry count   */
264                                        /* Used for determining if a response has already been      */
265                                        /* received for the current inquiry operation. (We do not   */
266                                        /* want to flood the caller with multiple responses from    */
267                                        /* the same device.                                         */
268    tBTM_INQ_INFO   inq_info;
269    BOOLEAN         in_use;
270
271#if (BLE_INCLUDED == TRUE)
272    BOOLEAN         scan_rsp;
273#endif
274} tINQ_DB_ENT;
275
276
277enum
278{
279    INQ_NONE,
280    INQ_LE_OBSERVE,
281    INQ_GENERAL
282};
283typedef UINT8 tBTM_INQ_TYPE;
284
285typedef struct
286{
287    tBTM_CMPL_CB *p_remname_cmpl_cb;
288
289#define BTM_EXT_RMT_NAME_TIMEOUT    40
290
291
292    TIMER_LIST_ENT  rmt_name_timer_ent;
293
294    UINT16           discoverable_mode;
295    UINT16           connectable_mode;
296    UINT16           page_scan_window;
297    UINT16           page_scan_period;
298    UINT16           inq_scan_window;
299    UINT16           inq_scan_period;
300    UINT16           inq_scan_type;
301    UINT16           page_scan_type;        /* current page scan type */
302    tBTM_INQ_TYPE    scan_type;
303
304    BD_ADDR          remname_bda;           /* Name of bd addr for active remote name request */
305#define BTM_RMT_NAME_INACTIVE       0
306#define BTM_RMT_NAME_EXT            0x1     /* Initiated through API */
307#define BTM_RMT_NAME_SEC            0x2     /* Initiated internally by security manager */
308#define BTM_RMT_NAME_INQ            0x4     /* Remote name initiated internally by inquiry */
309    BOOLEAN          remname_active;        /* State of a remote name request by external API */
310
311    tBTM_CMPL_CB    *p_inq_cmpl_cb;
312    tBTM_INQ_RESULTS_CB *p_inq_results_cb;
313    tBTM_CMPL_CB    *p_inq_ble_cmpl_cb;     /*completion callback exclusively for LE Observe*/
314    tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
315    tBTM_CMPL_CB    *p_inqfilter_cmpl_cb;   /* Called (if not NULL) after inquiry filter completed */
316    tBTM_INQ_DB_CHANGE_CB *p_inq_change_cb; /* Inquiry database changed callback    */
317    UINT32           inq_counter;           /* Counter incremented each time an inquiry completes */
318                                            /* Used for determining whether or not duplicate devices */
319                                            /* have responded to the same inquiry */
320    TIMER_LIST_ENT   inq_timer_ent;
321#if BTM_USE_INQ_RESULTS_FILTER == TRUE
322    tINQ_BDADDR     *p_bd_db;               /* Pointer to memory that holds bdaddrs */
323    UINT16           num_bd_entries;        /* Number of entries in database */
324    UINT16           max_bd_entries;        /* Maximum number of entries that can be stored */
325#endif
326    tINQ_DB_ENT      inq_db[BTM_INQ_DB_SIZE];
327    tBTM_INQ_PARMS   inqparms;              /* Contains the parameters for the current inquiry */
328    tBTM_INQUIRY_CMPL inq_cmpl_info;        /* Status and number of responses from the last inquiry */
329
330    UINT16           per_min_delay;         /* Current periodic minimum delay */
331    UINT16           per_max_delay;         /* Current periodic maximum delay */
332    BOOLEAN          inqfilt_active;
333    UINT8            pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
334                                                  /* inquiry that has been cancelled*/
335    UINT8            inqfilt_type;          /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
336
337#define BTM_INQ_INACTIVE_STATE      0
338#define BTM_INQ_CLR_FILT_STATE      1   /* Currently clearing the inquiry filter preceeding the inquiry request */
339                                        /* (bypassed if filtering is not used)                                  */
340#define BTM_INQ_SET_FILT_STATE      2   /* Sets the new filter (or turns off filtering) in this state */
341#define BTM_INQ_ACTIVE_STATE        3   /* Actual inquiry or periodic inquiry is in progress */
342#define BTM_INQ_REMNAME_STATE       4   /* Remote name requests are active  */
343
344    UINT8            state;             /* Current state that the inquiry process is in */
345    UINT8            inq_active;        /* Bit Mask indicating type of inquiry is active */
346    BOOLEAN          no_inc_ssp;        /* TRUE, to stop inquiry on incoming SSP */
347#if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
348    btm_inq_state    next_state;        /*interleaving state to determine next mode to be inquired*/
349#endif
350} tBTM_INQUIRY_VAR_ST;
351
352/* The MSB of the clock offset field indicates that the offset is valid if TRUE */
353#define BTM_CLOCK_OFFSET_VALID      0x8000
354
355/* Define the structures needed by security management
356*/
357
358#define BTM_SEC_INVALID_HANDLE  0xFFFF
359
360typedef UINT8 *BTM_BD_NAME_PTR;                        /* Pointer to Device name */
361
362/* Security callback is called by this unit when security
363**   procedures are completed.  Parameters are
364**              BD Address of remote
365**              Result of the operation
366*/
367typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
368
369typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
370
371/* MACROs to convert from SCO packet types mask to ESCO and back */
372#define BTM_SCO_PKT_TYPE_MASK   (   HCI_PKT_TYPES_MASK_HV1      \
373                                 |  HCI_PKT_TYPES_MASK_HV2      \
374                                 |  HCI_PKT_TYPES_MASK_HV3)
375
376/* Mask defining only the SCO types of an esco packet type */
377#define BTM_ESCO_PKT_TYPE_MASK  (   HCI_ESCO_PKT_TYPES_MASK_HV1 \
378                                 |  HCI_ESCO_PKT_TYPES_MASK_HV2 \
379                                 |  HCI_ESCO_PKT_TYPES_MASK_HV3)
380
381#define BTM_SCO_2_ESCO(scotype)  ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
382#define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
383
384/* Define masks for supported and exception 2.0 SCO packet types
385*/
386#define BTM_SCO_SUPPORTED_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_HV1       | \
387                                          HCI_ESCO_PKT_TYPES_MASK_HV2       | \
388                                          HCI_ESCO_PKT_TYPES_MASK_HV3       | \
389                                          HCI_ESCO_PKT_TYPES_MASK_EV3       | \
390                                          HCI_ESCO_PKT_TYPES_MASK_EV4       | \
391                                          HCI_ESCO_PKT_TYPES_MASK_EV5)
392
393#define BTM_SCO_EXCEPTION_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3  | \
394                                          HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3  | \
395                                          HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5  | \
396                                          HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
397
398
399#define BTM_SCO_ROUTE_UNKNOWN       0xff
400
401/* Define the structure that contains (e)SCO data */
402typedef struct
403{
404    tBTM_ESCO_CBACK    *p_esco_cback;   /* Callback for eSCO events     */
405    tBTM_ESCO_PARAMS    setup;
406    tBTM_ESCO_DATA      data;           /* Connection complete information */
407    UINT8               hci_status;
408} tBTM_ESCO_INFO;
409
410/* Define the structure used for SCO Management
411*/
412typedef struct
413{
414    tBTM_ESCO_INFO   esco;              /* Current settings             */
415#if BTM_SCO_HCI_INCLUDED == TRUE
416    BUFFER_Q         xmit_data_q;       /* SCO data transmitting queue  */
417#endif
418    tBTM_SCO_CB     *p_conn_cb;         /* Callback for when connected  */
419    tBTM_SCO_CB     *p_disc_cb;         /* Callback for when disconnect */
420    UINT16           state;             /* The state of the SCO link    */
421    UINT16           hci_handle;        /* HCI Handle                   */
422    BOOLEAN          is_orig;           /* TRUE if the originator       */
423    BOOLEAN          rem_bd_known;      /* TRUE if remote BD addr known */
424
425} tSCO_CONN;
426
427/* SCO Management control block */
428typedef struct
429{
430    tBTM_SCO_IND_CBACK  *app_sco_ind_cb;
431#if BTM_SCO_HCI_INCLUDED == TRUE
432    tBTM_SCO_DATA_CB     *p_data_cb;        /* Callback for SCO data over HCI */
433    UINT32               xmit_window_size; /* Total SCO window in bytes  */
434#endif
435    tSCO_CONN            sco_db[BTM_MAX_SCO_LINKS];
436    tBTM_ESCO_PARAMS     def_esco_parms;
437    BD_ADDR              xfer_addr;
438    UINT16               sco_disc_reason;
439    BOOLEAN              esco_supported;    /* TRUE if 1.2 cntlr AND supports eSCO links */
440    tBTM_SCO_TYPE        desired_sco_mode;
441    tBTM_SCO_TYPE        xfer_sco_type;
442    tBTM_SCO_PCM_PARAM   sco_pcm_param;
443    tBTM_SCO_CODEC_TYPE  codec_in_use;      /* None, CVSD, MSBC, etc. */
444#if BTM_SCO_HCI_INCLUDED == TRUE
445	tBTM_SCO_ROUTE_TYPE	 sco_path;
446#endif
447
448} tSCO_CB;
449
450
451#if BTM_SCO_INCLUDED == TRUE
452extern void     btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
453extern void     btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
454                                    tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
455extern void     btm_reject_sco_link(UINT16 sco_inx );
456extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
457#else
458#define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
459#define btm_reject_sco_link(sco_inx)
460#define btm_set_sco_ind_cback(sco_ind_cb)
461#define btm_sco_chk_pend_rolechange(hci_handle)
462#endif  /* BTM_SCO_INCLUDED */
463
464/*
465** Define structure for Security Service Record.
466** A record exists for each service registered with the Security Manager
467*/
468typedef struct
469{
470    UINT32          mx_proto_id;        /* Service runs over this multiplexer protocol */
471    UINT32          orig_mx_chan_id;    /* Channel on the multiplexer protocol    */
472    UINT32          term_mx_chan_id;    /* Channel on the multiplexer protocol    */
473    UINT16          psm;                /* L2CAP PSM value */
474    UINT16          security_flags;     /* Bitmap of required security features */
475    UINT8           service_id;         /* Passed in authorization callback */
476#if (L2CAP_UCD_INCLUDED == TRUE)
477    UINT16          ucd_security_flags; /* Bitmap of required security features for UCD */
478#endif
479#if BTM_SEC_SERVICE_NAME_LEN > 0
480    UINT8           orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
481    UINT8           term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
482#endif
483} tBTM_SEC_SERV_REC;
484
485#if BLE_INCLUDED == TRUE
486/* LE Security information of device in Slave Role */
487typedef struct
488{
489    BT_OCTET16          irk;            /* peer diverified identity root */
490    BT_OCTET16          ltk;            /* peer long term key */
491    BT_OCTET16          csrk;           /* peer SRK peer device used to secured sign local data  */
492
493    BT_OCTET8           rand;           /* random vector for LTK generation */
494    UINT16              ediv;           /* LTK diversifier of this slave device */
495    UINT16              div;            /* local DIV  to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1)  */
496    UINT8               sec_level;      /* local pairing security level */
497    UINT8               key_size;       /* key size of the LTK delivered to peer device */
498    UINT8               srk_sec_level;  /* security property of peer SRK for this device */
499    UINT8               local_csrk_sec_level;  /* security property of local CSRK for this device */
500
501    UINT32              counter;        /* peer sign counter for verifying rcv signed cmd */
502    UINT32              local_counter;  /* local sign counter for sending signed write cmd*/
503}tBTM_SEC_BLE_KEYS;
504
505typedef struct
506{
507    tBLE_ADDR_TYPE      ble_addr_type;  /* LE device type: public or random address */
508    tBLE_ADDR_TYPE      static_addr_type;   /* static address type */
509    BD_ADDR             static_addr;    /* static address */
510#if BLE_PRIVACY_SPT == TRUE
511    BD_ADDR             cur_rand_addr;  /* current random address */
512
513#define BTM_BLE_ADDR_PSEUDO         0   /* address index device record */
514#define BTM_BLE_ADDR_RRA            1   /* cur_rand_addr */
515#define BTM_BLE_ADDR_RECONN         2   /* reconnection address */
516#define BTM_BLE_ADDR_STATIC         3   /* static_addr  */
517    UINT8               active_addr_type;
518
519    BOOLEAN             privacy_enabled;   /* remote device privacy enabled or not */
520#endif
521
522#if SMP_INCLUDED == TRUE
523    tBTM_LE_KEY_TYPE    key_type;       /* bit mask of valid key types in record */
524    tBTM_SEC_BLE_KEYS   keys;           /* LE device security info in slave rode */
525#endif
526} tBTM_SEC_BLE;
527
528
529#endif  /* BLE_INCLUDED */
530
531/*
532** Define structure for Security Device Record.
533** A record exists for each device authenticated with this device
534*/
535typedef struct
536{
537    tBTM_SEC_SERV_REC   *p_cur_service;
538    tBTM_SEC_CALLBACK   *p_callback;
539    void                *p_ref_data;
540    UINT32               timestamp;         /* Timestamp of the last connection   */
541    UINT32               trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE];  /* Bitwise OR of trusted services     */
542    UINT16               hci_handle;        /* Handle to connection when exists   */
543    UINT16               clock_offset;      /* Latest known clock offset          */
544    BD_ADDR              bd_addr;           /* BD_ADDR of the device              */
545    DEV_CLASS            dev_class;         /* DEV_CLASS of the device            */
546    LINK_KEY             link_key;          /* Device link key                    */
547
548#define BTM_SEC_AUTHORIZED      BTM_SEC_FLAG_AUTHORIZED     /* 0x01 */
549#define BTM_SEC_AUTHENTICATED   BTM_SEC_FLAG_AUTHENTICATED  /* 0x02 */
550#define BTM_SEC_ENCRYPTED       BTM_SEC_FLAG_ENCRYPTED      /* 0x04 */
551#define BTM_SEC_NAME_KNOWN      0x08
552#define BTM_SEC_LINK_KEY_KNOWN  BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
553#define BTM_SEC_LINK_KEY_AUTHED 0x20
554#define BTM_SEC_ROLE_SWITCHED   0x40
555#define BTM_SEC_IN_USE          0x80
556    /* LE link security flag */
557#define BTM_SEC_LE_AUTHENTICATED   0x0200       /* 0x0200 */
558#define BTM_SEC_LE_ENCRYPTED       0x0400      /* 0x04 */
559#define BTM_SEC_LE_NAME_KNOWN      0x0800
560#define BTM_SEC_LE_LINK_KEY_KNOWN  0x1000       /* 0x10 */
561#define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000
562
563    UINT16           sec_flags;          /* Current device security state      */
564
565    tBTM_BD_NAME    sec_bd_name;        /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
566    BD_FEATURES     features[HCI_EXT_FEATURES_PAGE_MAX + 1];           /* Features supported by the device */
567    UINT8           num_read_pages;
568
569#define BTM_SEC_STATE_IDLE              0
570#define BTM_SEC_STATE_AUTHENTICATING    1
571#define BTM_SEC_STATE_ENCRYPTING        2
572#define BTM_SEC_STATE_GETTING_NAME      3
573#define BTM_SEC_STATE_AUTHORIZING       4
574#define BTM_SEC_STATE_SWITCHING_ROLE    5
575#define BTM_SEC_STATE_DISCONNECTING     6
576#define BTM_SEC_STATE_DELAY_FOR_ENC     7   /* delay to check for encryption to work around controller problems */
577
578    UINT8       sec_state;              /* Operating state                    */
579    BOOLEAN     is_originator;          /* TRUE if device is originating connection */
580#if (L2CAP_UCD_INCLUDED == TRUE)
581    BOOLEAN     is_ucd;                 /* TRUE if device is sending or receiving UCD */
582                                        /* if incoming security failed, received UCD will be discarded */
583#endif
584    BOOLEAN     role_master;            /* TRUE if current mode is master     */
585    UINT16      security_required;      /* Security required for connection   */
586    BOOLEAN     link_key_not_sent;      /* link key notification has not been sent waiting for name */
587    UINT8       link_key_type;          /* Type of key used in pairing   */
588    BOOLEAN     link_key_changed;       /* Changed link key during current connection */
589
590#define BTM_MAX_PRE_SM4_LKEY_TYPE   BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
591
592#define BTM_SM4_UNKNOWN     0x00
593#define BTM_SM4_KNOWN       0x10
594#define BTM_SM4_TRUE        0x11
595#define BTM_SM4_REQ_PEND    0x08        /* set this bit when getting remote features */
596#define BTM_SM4_UPGRADE     0x04        /* set this bit when upgrading link key */
597#define BTM_SM4_RETRY       0x02        /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
598#define BTM_SM4_DD_ACP      0x20        /* set this bit to indicate peer initiated dedicated bonding */
599#define BTM_SM4_CONN_PEND   0x40        /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
600    UINT8       sm4;                    /* BTM_SM4_TRUE, if the peer supports SM4 */
601    tBTM_IO_CAP rmt_io_caps;            /* IO capability of the peer device */
602    tBTM_AUTH_REQ rmt_auth_req;         /* the auth_req flag as in the IO caps rsp evt */
603
604#if (BLE_INCLUDED == TRUE)
605    UINT16              ble_hci_handle;         /* use in DUMO connection */
606    UINT8               enc_key_size;           /* current link encryption key size */
607    tBTM_SEC_BLE        ble;
608    tBT_DEVICE_TYPE     device_type;
609    tBTM_LE_CONN_PRAMS  conn_params;
610#endif
611
612// btla-specific ++
613#if BTM_DISC_DURING_RS == TRUE
614#define BTM_SEC_RS_NOT_PENDING          0           /* Role Switch not in progress */
615#define BTM_SEC_RS_PENDING              1           /* Role Switch in progress */
616#define BTM_SEC_DISC_PENDING            2           /* Disconnect is pending */
617    UINT8           rs_disc_pending;
618#endif
619// btla-specific --
620#define BTM_SEC_NO_LAST_SERVICE_ID      0
621    UINT8           last_author_service_id;         /* ID of last serviced authorized: Reset after each l2cap connection */
622
623} tBTM_SEC_DEV_REC;
624
625#define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
626#define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
627#define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
628
629#define BTM_SEC_LE_MASK    (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
630
631/*
632** Define device configuration structure
633*/
634typedef struct
635{
636#if BTM_MAX_LOC_BD_NAME_LEN > 0
637    tBTM_LOC_BD_NAME bd_name;                    /* local Bluetooth device name */
638#endif
639    BOOLEAN          pin_type;                   /* TRUE if PIN type is fixed */
640    UINT8            pin_code_len;               /* Bonding information */
641    PIN_CODE         pin_code;                   /* PIN CODE if pin type is fixed */
642    BOOLEAN          connectable;                /* If TRUE page scan should be enabled */
643    UINT8            def_inq_scan_mode;          /* ??? limited/general/none */
644} tBTM_CFG;
645
646#if BTM_PWR_MGR_INCLUDED == TRUE
647enum
648{
649    BTM_PM_ST_ACTIVE  = BTM_PM_STS_ACTIVE,
650    BTM_PM_ST_HOLD    = BTM_PM_STS_HOLD,
651    BTM_PM_ST_SNIFF   = BTM_PM_STS_SNIFF,
652    BTM_PM_ST_PARK    = BTM_PM_STS_PARK,
653    BTM_PM_ST_PENDING = BTM_PM_STS_PENDING
654};
655typedef UINT8 tBTM_PM_STATE;
656
657enum
658{
659    BTM_PM_SET_MODE_EVT,    /* Set power mode API is called. */
660    BTM_PM_UPDATE_EVT,
661    BTM_PM_RD_MODE_EVT     /* Read power mode API is called. */
662};
663typedef UINT8 tBTM_PM_EVENT;
664
665typedef struct
666{
667    UINT16          event;
668    UINT16          len;
669    UINT8           link_ind;
670} tBTM_PM_MSG_DATA;
671
672typedef struct
673{
674    UINT8 hci_status;
675    UINT8 mode;
676    UINT16 interval;
677} tBTM_PM_MD_CHG_DATA;
678
679typedef struct
680{
681    UINT8          pm_id;      /* the entity that calls SetPowerMode API */
682    tBTM_PM_PWR_MD *p_pmd;
683} tBTM_PM_SET_MD_DATA;
684
685typedef struct
686{
687    void        *p_data;
688    UINT8        link_ind;
689} tBTM_PM_SM_DATA;
690
691typedef struct
692{
693    tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
694    tBTM_PM_PWR_MD set_mode;  /* the mode and parameters sent down to the host controller. */
695    UINT16         interval;  /* the interval from last mode change event. */
696#if (BTM_SSR_INCLUDED == TRUE)
697    UINT16         max_lat;   /* stored SSR maximum latency */
698    UINT16         min_rmt_to;/* stored SSR minimum remote timeout */
699    UINT16         min_loc_to;/* stored SSR minimum local timeout */
700#endif
701    tBTM_PM_STATE  state;     /* contains the current mode of the connection */
702    BOOLEAN        chg_ind;   /* a request change indication */
703} tBTM_PM_MCB;
704
705#define BTM_PM_REC_NOT_USED 0
706typedef struct
707{
708    tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
709    UINT8                 mask; /* registered request mask. 0, if this entry is not used */
710} tBTM_PM_RCB;
711#endif  /* BTM_PWR_MGR_INCLUDED */
712
713enum
714{
715    BTM_BLI_ACL_UP_EVT,
716    BTM_BLI_ACL_DOWN_EVT,
717    BTM_BLI_PAGE_EVT,
718    BTM_BLI_PAGE_DONE_EVT,
719    BTM_BLI_INQ_EVT,
720    BTM_BLI_INQ_CANCEL_EVT,
721    BTM_BLI_INQ_DONE_EVT
722};
723typedef UINT8 tBTM_BLI_EVENT;
724
725/* Pairing State */
726enum
727{
728    BTM_PAIR_STATE_IDLE,                        /* Idle                                         */
729    BTM_PAIR_STATE_GET_REM_NAME,                /* Getting the remote name (to check for SM4)   */
730    BTM_PAIR_STATE_WAIT_PIN_REQ,                /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
731    BTM_PAIR_STATE_WAIT_LOCAL_PIN,              /* Waiting for local PIN code                   */
732    BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM,        /* Waiting user 'yes' to numeric confirmation   */
733    BTM_PAIR_STATE_KEY_ENTRY,                   /* Key entry state (we are a keyboard)          */
734    BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP,          /* Waiting for local response to peer OOB data  */
735    BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS,           /* Waiting for local IO capabilities and OOB data */
736    BTM_PAIR_STATE_INCOMING_SSP,                /* Incoming SSP (got peer IO caps when idle)    */
737    BTM_PAIR_STATE_WAIT_AUTH_COMPLETE,          /* All done, waiting authentication cpmplete    */
738    BTM_PAIR_STATE_WAIT_DISCONNECT              /* Waiting to disconnect the ACL                */
739};
740typedef UINT8 tBTM_PAIRING_STATE;
741
742#define BTM_PAIR_FLAGS_WE_STARTED_DD    0x01    /* We want to do dedicated bonding              */
743#define BTM_PAIR_FLAGS_PEER_STARTED_DD  0x02    /* Peer initiated dedicated bonding             */
744#define BTM_PAIR_FLAGS_DISC_WHEN_DONE   0x04    /* Disconnect when done     */
745#define BTM_PAIR_FLAGS_PIN_REQD         0x08    /* set this bit when pin_callback is called     */
746#define BTM_PAIR_FLAGS_PRE_FETCH_PIN    0x10    /* set this bit when pre-fetch pin     */
747#define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20    /* set this bit when rejected incoming connection  */
748#define BTM_PAIR_FLAGS_WE_CANCEL_DD     0x40    /* set this bit when cancelling a bonding procedure */
749#define BTM_PAIR_FLAGS_LE_ACTIVE        0x80    /* use this bit when SMP pairing is active */
750
751
752typedef struct
753{
754    BOOLEAN             is_mux;
755    BD_ADDR             bd_addr;
756    UINT16              psm;
757    BOOLEAN             is_orig;
758    tBTM_SEC_CALLBACK   *p_callback;
759    void                *p_ref_data;
760    UINT32              mx_proto_id;
761    UINT32              mx_chan_id;
762} tBTM_SEC_QUEUE_ENTRY;
763
764#if (L2CAP_UCD_INCLUDED == TRUE)
765
766#define CONN_ORIENT_TERM                0x00    /* incoming connection oriented */
767#define CONN_ORIENT_ORIG                0x01    /* outgoing connection oriented */
768#define CONNLESS_TERM                   0x02    /* incoming connectionless      */
769#define CONNLESS_ORIG                   0x03    /* outgoing connectionless      */
770#define CONNECTION_TYPE_ORIG_MASK       0x01    /* mask for direction           */
771#define CONNECTION_TYPE_CONNLESS_MASK   0x02    /* mask for connectionless or not */
772typedef UINT8 CONNECTION_TYPE;
773
774#else
775
776#define CONN_ORIENT_TERM                FALSE
777#define CONN_ORIENT_ORIG                TRUE
778typedef BOOLEAN CONNECTION_TYPE;
779
780#endif /* (L2CAP_UCD_INCLUDED == TRUE) */
781
782/* Define a structure to hold all the BTM data
783*/
784
785#define BTM_STATE_BUFFER_SIZE  5                  /* size of state buffer */
786
787#if (BTM_PCM2_INCLUDED == TRUE)
788/* Define pcm2_action           */
789enum
790{
791    BTM_PCM2_ACT_NONE,
792    BTM_PCM2_ACT_SENT_ARC,
793    BTM_PCM2_READ_PARAM,
794    BTM_PCM2_WRITE_PARAM,
795};
796typedef UINT8 tBTM_PCM2_ACTION;
797#endif
798
799typedef struct
800{
801    tBTM_CFG    cfg;                        /* Device configuration */
802
803    /****************************************************
804    **      ACL Management
805    ****************************************************/
806    tACL_CONN   acl_db[MAX_L2CAP_LINKS];
807#if( RFCOMM_INCLUDED==TRUE)
808    UINT8       btm_scn[BTM_MAX_SCN];        /* current SCNs: TRUE if SCN is in use */
809#endif
810    UINT16      btm_def_link_policy;
811    UINT16      btm_def_link_super_tout;
812
813#if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
814    tBTM_BL_EVENT_MASK     bl_evt_mask;
815    tBTM_BL_CHANGE_CB     *p_bl_changed_cb;    /* Callback for when Busy Level changed */
816#else
817    tBTM_ACL_DB_CHANGE_CB *p_acl_changed_cb;    /* Callback for when ACL DB changed */
818#endif
819
820    tBTM_LSTO_CBACK       *p_lsto_cback;  /* for link supervision timeout change event */
821
822    /****************************************************
823    **      Power Management
824    ****************************************************/
825#if BTM_PWR_MGR_INCLUDED == TRUE
826    tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS];   /* per ACL link */
827    tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
828    UINT8       pm_pend_link;  /* the index of acl_db, which has a pending PM cmd */
829    UINT8       pm_pend_id;    /* the id pf the module, which has a pending PM cmd */
830#endif /* BTM_PWR_MGR_INCLUDED == TRUE */
831
832    /*****************************************************
833    **      Device control
834    *****************************************************/
835    tBTM_DEVCB  devcb;
836
837    /*****************************************************
838    **      BLE Device controllers
839    *****************************************************/
840#if (BLE_INCLUDED == TRUE)
841    tBTM_BLE_CB             ble_ctr_cb;
842
843    UINT16                  enc_handle;
844    BT_OCTET8               enc_rand;   /* received rand value from LTK request*/
845    UINT16                  ediv;       /* received ediv value from LTK request */
846    UINT8                   key_size;
847    tBTM_BLE_VSC_CB         cmn_ble_vsc_cb;
848#endif
849
850                                            /* Packet types supported by the local device */
851    UINT16      btm_acl_pkt_types_supported;
852    UINT16      btm_sco_pkt_types_supported;
853
854
855    /*****************************************************
856    **      Inquiry
857    *****************************************************/
858    tBTM_INQUIRY_VAR_ST     btm_inq_vars;
859    tBTM_FILTER_CB          *p_inq_filter_cb;   /* Callback that can be set if host */
860                                                /* wants to verify inquiry filters */
861
862    /*****************************************************
863    **      SCO Management
864    *****************************************************/
865#if BTM_SCO_INCLUDED == TRUE
866    tSCO_CB             sco_cb;
867#endif
868
869    /*****************************************************
870    **      Security Management
871    *****************************************************/
872    tBTM_APPL_INFO          api;
873
874#define BTM_SEC_MAX_RMT_NAME_CALLBACKS  2
875    tBTM_RMT_NAME_CALLBACK  *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
876
877    tBTM_FILTER_CB          *p_conn_filter_cb;  /* Callback that can be set if host */
878                                                /* wants to verify connectability filters*/
879
880    tBTM_SEC_DEV_REC        *p_collided_dev_rec;
881    TIMER_LIST_ENT           sec_collision_tle;
882    UINT32                   collision_start_time;
883    UINT32                   max_collision_delay;
884    UINT32                   dev_rec_count;      /* Counter used for device record timestamp */
885    UINT8                    security_mode;
886    BOOLEAN                  pairing_disabled;
887    BOOLEAN                  connect_only_paired;
888    BOOLEAN                  security_mode_changed;  /* mode changed during bonding */
889    BOOLEAN                  pin_type_changed;       /* pin type changed during bonding */
890    BOOLEAN                  sec_req_pending;       /*   TRUE if a request is pending */
891// btla-specific ++
892#ifdef PORCHE_PAIRING_CONFLICT
893    UINT8                    pin_code_len_saved;     /* for legacy devices */
894#endif
895// btla-specific --
896
897    UINT8                    pin_code_len;  /* for legacy devices */
898    PIN_CODE                 pin_code;      /* for legacy devices */
899    tBTM_PAIRING_STATE       pairing_state; /* The current pairing state    */
900    UINT8                    pairing_flags; /* The current pairing flags    */
901    BD_ADDR                  pairing_bda;   /* The device currently pairing */
902    TIMER_LIST_ENT           pairing_tle;   /* Timer for pairing process    */
903    UINT16                   disc_handle;   /* for legacy devices */
904    UINT8                    disc_reason;   /* for legacy devices */
905    tBTM_SEC_SERV_REC        sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
906    tBTM_SEC_DEV_REC         sec_dev_rec[BTM_SEC_MAX_DEVICE_RECORDS];
907    tBTM_SEC_SERV_REC       *p_out_serv;
908    tBTM_MKEY_CALLBACK      *mkey_cback;
909
910    BD_ADDR                  connecting_bda;
911    DEV_CLASS                connecting_dc;
912
913    UINT8                   first_disabled_channel;
914    UINT8                   last_disabled_channel;
915
916    UINT8                   acl_disc_reason;
917    UINT8                   trace_level;
918#if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
919    UINT8                   num_acl;    /* num of active ACL links */
920    UINT8                   busy_level; /* the current busy level */
921    BOOLEAN                 is_paging;  /* TRUE, if paging is in progess */
922    BOOLEAN                 is_inquiry; /* TRUE, if inquiry is in progess */
923#endif
924    BUFFER_Q                page_queue;
925    BOOLEAN                 paging;
926    BOOLEAN                 discing;
927    BUFFER_Q                sec_pending_q;  /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
928
929#if  (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
930    char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
931#endif
932
933#if (defined(BTM_PCM2_INCLUDED) && BTM_PCM2_INCLUDED == TRUE)
934    UINT16                  sys_features;
935    UINT8                   pcm2_params[BRCM_PCM2_SETUP_WRITE_SIZE];
936    tBTM_PCM2_ACTION        pcm2_action;
937#endif
938
939} tBTM_CB;
940
941
942#ifdef __cplusplus
943extern "C"
944{
945#endif
946
947#if BTM_DYNAMIC_MEMORY == FALSE
948BTM_API extern tBTM_CB  btm_cb;
949#else
950BTM_API extern tBTM_CB *btm_cb_ptr;
951#define btm_cb (*btm_cb_ptr)
952#endif
953
954/* Internal functions provided by btm_main.c
955********************************************
956*/
957extern void         btm_init (void);
958
959/* Internal functions provided by btm_inq.c
960*******************************************
961*/
962extern tBTM_STATUS  btm_initiate_rem_name (BD_ADDR remote_bda,
963                                           tBTM_INQ_INFO *p_cur,
964                                           UINT8 origin, UINT32 timeout,
965                                           tBTM_CMPL_CB *p_cb);
966
967extern void         btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
968                                             UINT8 hci_status);
969extern void         btm_inq_rmt_name_failed(void);
970
971/* Inquiry related functions */
972extern void         btm_clr_inq_db (BD_ADDR p_bda);
973extern void         btm_inq_db_init (void);
974extern void         btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
975extern void         btm_process_inq_complete (UINT8 status, UINT8 mode);
976extern void         btm_process_cancel_complete(UINT8 status, UINT8 mode);
977extern void         btm_event_filter_complete (UINT8 *p);
978extern void         btm_inq_stop_on_ssp(void);
979extern void         btm_inq_clear_ssp(void);
980extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
981extern BOOLEAN      btm_inq_find_bdaddr (BD_ADDR p_bda);
982
983#if (BTM_EIR_CLIENT_INCLUDED == TRUE)
984extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
985#endif
986
987/* Internal functions provided by btm_acl.c
988********************************************
989*/
990extern void         btm_acl_init (void);
991extern void         btm_acl_timeout (TIMER_LIST_ENT  *p_tle);
992extern void         btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
993                                     UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
994extern void         btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
995extern void         btm_acl_device_down (void);
996extern void         btm_acl_update_busy_level (tBTM_BLI_EVENT event);
997extern void         btm_acl_link_key_change (UINT16 handle, UINT8 status);
998
999extern void         btm_cont_rswitch_or_chglinkkey (tACL_CONN *p,
1000                                                    tBTM_SEC_DEV_REC *p_dev_rec,
1001                                                    UINT8 hci_status);
1002
1003extern UINT8        btm_handle_to_acl_index (UINT16 hci_handle);
1004extern void         btm_read_link_policy_complete (UINT8 *p);
1005extern void         btm_read_rssi_complete (UINT8 *p);
1006extern void         btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble);
1007extern void         btm_read_link_quality_complete (UINT8 *p);
1008extern tBTM_STATUS  btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
1009extern void         btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
1010extern void         btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
1011extern void         btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1012BTM_API extern UINT16       btm_get_acl_disc_reason_code (void);
1013BTM_API extern tBTM_STATUS  btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
1014extern void         btm_read_remote_features_complete (UINT8 *p);
1015extern void         btm_read_remote_ext_features_complete (UINT8 *p);
1016extern void         btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
1017extern void         btm_read_remote_version_complete (UINT8 *p);
1018extern void         btm_establish_continue (tACL_CONN *p_acl_cb);
1019
1020// btla-specific ++
1021extern void         btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
1022// btla-specific --
1023/* Read maximum data packet that can be sent over current connection */
1024extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
1025extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
1026extern BOOLEAN    btm_acl_notif_conn_collision (BD_ADDR bda);
1027
1028#if BTM_PWR_MGR_INCLUDED == FALSE
1029extern void         btm_process_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1030                                             UINT16 interval);
1031
1032/* Internal functions provided by btm_pm.c
1033********************************************
1034*/
1035#else
1036extern void btm_pm_reset(void);
1037extern void btm_pm_sm_alloc(UINT8 ind);
1038extern void btm_pm_proc_cmd_status(UINT8 status);
1039extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1040                                     UINT16 interval);
1041extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
1042#if BTM_SCO_INCLUDED == TRUE
1043extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
1044#else
1045#define btm_sco_chk_pend_unpark(hci_status, hci_handle)
1046#endif /* BTM_SCO_INCLUDED */
1047#endif /* BTM_PWR_MGR_INCLUDED == FALSE */
1048extern void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow);
1049
1050
1051/* Internal functions provided by btm_sco.c
1052********************************************
1053*/
1054extern void btm_sco_init (void);
1055extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
1056                               tBTM_ESCO_DATA *p_esco_data);
1057extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
1058                                    UINT8 retrans_window, UINT16 rx_pkt_len,
1059                                    UINT16 tx_pkt_len);
1060extern void btm_sco_conn_req (BD_ADDR bda,  DEV_CLASS dev_class, UINT8 link_type);
1061extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
1062extern void btm_sco_acl_removed (BD_ADDR bda);
1063extern void btm_route_sco_data (BT_HDR *p_msg);
1064extern BOOLEAN btm_is_sco_active (UINT16 handle);
1065extern void btm_remove_sco_links (BD_ADDR bda);
1066extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
1067
1068extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
1069extern UINT16  btm_find_scb_by_handle (UINT16 handle);
1070extern void btm_sco_flush_sco_data(UINT16 sco_inx);
1071
1072/* Internal functions provided by btm_devctl.c
1073**********************************************
1074*/
1075extern void btm_dev_init (void);
1076extern void btm_dev_absent (void);
1077extern void btm_dev_timeout (TIMER_LIST_ENT *p_tle);
1078extern void btm_reset_complete (void);
1079extern void btm_read_local_version_complete (UINT8 *p, UINT16 evt_len);
1080extern void btm_read_hci_buf_size_complete (UINT8 *p, UINT16 evt_len);
1081extern void btm_read_local_supported_cmds_complete (UINT8 *p);
1082extern void btm_read_local_features_complete (UINT8 *p, UINT16 evt_len);
1083extern void btm_read_local_ext_features_complete (UINT8 *p, UINT16 evt_len);
1084extern void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len);
1085extern void btm_read_local_addr_complete (UINT8 *p, UINT16 evt_len);
1086extern  void btm_reset_ctrlr_complete (void);
1087extern void btm_write_simple_paring_mode_complete (UINT8 *p);
1088extern void btm_write_le_host_supported_complete (UINT8 *p);
1089
1090#if (BLE_INCLUDED == TRUE)
1091extern void btm_read_ble_buf_size_complete (UINT8 *p, UINT16 evt_len);
1092extern void btm_read_ble_local_supported_features_complete (UINT8 *p, UINT16 evt_len);
1093extern void btm_read_white_list_size_complete(UINT8 *p, UINT16 evt_len);
1094extern void btm_ble_add_2_white_list_complete(UINT8 status);
1095extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
1096extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
1097#endif  /* BLE_INCLUDED */
1098
1099/* Vendor Specific Command complete evt handler */
1100extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
1101                              tBTM_CMPL_CB *p_vsc_cplt_cback);
1102extern void btm_inq_db_reset (void);
1103extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
1104extern UINT8 btm_get_hci_version (void);
1105extern void btm_read_stored_link_key_complete (UINT8 *p);
1106extern void btm_write_stored_link_key_complete (UINT8 *p);
1107extern void btm_delete_stored_link_key_complete (UINT8 *p);
1108extern void btm_return_link_keys_evt (tBTM_RETURN_LINK_KEYS_EVT *result);
1109extern void btm_report_device_status (tBTM_DEV_STATUS status);
1110
1111
1112/* Internal functions provided by btm_dev.c
1113**********************************************
1114*/
1115extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1116extern UINT8 btm_get_voice_coding_support (void);
1117
1118extern tBTM_SEC_DEV_REC  *btm_sec_alloc_dev (BD_ADDR bd_addr);
1119extern void               btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
1120extern tBTM_SEC_DEV_REC  *btm_find_dev (BD_ADDR bd_addr);
1121extern tBTM_SEC_DEV_REC  *btm_find_or_alloc_dev (BD_ADDR bd_addr);
1122extern tBTM_SEC_DEV_REC  *btm_find_dev_by_handle (UINT16 handle);
1123
1124/* Internal functions provided by btm_sec.c
1125**********************************************
1126*/
1127extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1128extern tBTM_STATUS  btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
1129                                       UINT16 handle, CONNECTION_TYPE conn_type,
1130                                       tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1131extern tBTM_STATUS  btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1132                                        UINT32 mx_proto_id, UINT32 mx_chan_id,
1133                                        tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1134extern void  btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
1135extern void btm_create_conn_cancel_complete (UINT8 *p);
1136extern void btm_proc_lsto_evt(UINT16 handle, UINT16 timeout);
1137extern void btm_read_linq_tx_power_complete (UINT8 *p);
1138
1139extern void  btm_sec_init (UINT8 sec_mode);
1140extern void  btm_sec_dev_reset (void);
1141extern void  btm_sec_abort_access_req (BD_ADDR bd_addr);
1142extern void  btm_sec_auth_complete (UINT16 handle, UINT8 status);
1143extern void  btm_sec_mkey_comp_event (UINT16 handle, UINT8 status, UINT8 key_flg);
1144extern void  btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1145extern void  btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
1146extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
1147extern void  btm_sec_disconnected (UINT16 handle, UINT8 reason);
1148extern void  btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
1149extern void  btm_sec_rmt_host_support_feat_evt (UINT8 *p);
1150extern void  btm_io_capabilities_req (UINT8 *p);
1151extern void  btm_io_capabilities_rsp (UINT8 *p);
1152extern void  btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
1153extern void  btm_keypress_notif_evt (UINT8 *p);
1154extern void  btm_simple_pair_complete (UINT8 *p);
1155extern void  btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
1156extern void  btm_sec_link_key_request (UINT8 *p_bda);
1157extern void  btm_sec_pin_code_request (UINT8 *p_bda);
1158extern void  btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
1159extern void  btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
1160
1161#if BLE_INCLUDED == TRUE
1162extern void  btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC  *p_dev_rec);
1163extern  BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT8 *p_found_idx, tBTM_SEC_DEV_REC **p_rec);
1164extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
1165extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
1166#endif /* BLE_INCLUDED */
1167
1168extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
1169
1170#if BTM_OOB_INCLUDED == TRUE
1171extern void  btm_rem_oob_req (UINT8 *p);
1172extern void  btm_read_local_oob_complete (UINT8 *p);
1173#else
1174#define btm_rem_oob_req(p)
1175#define btm_read_local_oob_complete(p)
1176#endif
1177
1178extern void  btm_acl_resubmit_page (void);
1179extern void  btm_acl_reset_paging (void);
1180extern void  btm_acl_paging (BT_HDR *p, BD_ADDR dest);
1181extern void  btm_acl_set_discing (BOOLEAN discing);
1182extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
1183extern void  btm_sec_clr_temp_auth_service (BD_ADDR bda);
1184
1185#ifdef __cplusplus
1186}
1187#endif
1188
1189#endif
1190
1191