btif_hh.c revision 35f6b7f3f8b483065e9d97c18542286818e02544
1/******************************************************************************
2 *
3 *  Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/************************************************************************************
20 *
21 *  Filename:      btif_hh.c
22 *
23 *  Description:   HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27#include <hardware/bluetooth.h>
28#include <hardware/bt_hh.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <errno.h>
32#include <string.h>
33
34#define LOG_TAG "BTIF_HH"
35
36#include "bta_api.h"
37#include "bta_hh_api.h"
38#include "bd.h"
39#include "btif_storage.h"
40
41#include "btif_common.h"
42#include "btif_util.h"
43#include "btif_hh.h"
44#include "gki.h"
45#include "l2c_api.h"
46
47
48#define BTIF_HH_APP_ID_MI       0x01
49#define BTIF_HH_APP_ID_KB       0x02
50
51#define COD_HID_KEYBOARD        0x0540
52#define COD_HID_POINTING        0x0580
53#define COD_HID_COMBO           0x05C0
54#define COD_HID_MAJOR           0x0500
55
56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58#define HID_REPORT_CAPSLOCK   0x39
59#define HID_REPORT_NUMLOCK    0x53
60#define HID_REPORT_SCROLLLOCK 0x47
61
62//For Apple Magic Mouse
63#define MAGICMOUSE_VENDOR_ID 0x05ac
64#define MAGICMOUSE_PRODUCT_ID 0x030d
65
66#define LOGITECH_KB_MX5500_VENDOR_ID  0x046D
67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69extern const int BT_UID;
70extern const int BT_GID;
71static int btif_hh_prev_keyevents=0; //The previous key events
72static int btif_hh_keylockstates=0; //The current key state of each key
73
74#define BTIF_HH_ID_1        0
75#define BTIF_HH_DEV_DISCONNECTED 3
76
77#define BTIF_TIMEOUT_VUP_SECS   3
78
79
80#ifndef BTUI_HH_SECURITY
81#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
82#endif
83
84#ifndef BTUI_HH_MOUSE_SECURITY
85#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
86#endif
87
88/* HH request events */
89typedef enum
90{
91    BTIF_HH_CONNECT_REQ_EVT = 0,
92    BTIF_HH_DISCONNECT_REQ_EVT,
93    BTIF_HH_VUP_REQ_EVT
94} btif_hh_req_evt_t;
95
96
97/************************************************************************************
98**  Constants & Macros
99************************************************************************************/
100#define BTIF_HH_SERVICES    (BTA_HID_SERVICE_MASK)
101
102
103
104/************************************************************************************
105**  Local type definitions
106************************************************************************************/
107
108typedef struct hid_kb_list
109{
110    UINT16 product_id;
111    UINT16 version_id;
112    char*  kb_name;
113} tHID_KB_LIST;
114
115/************************************************************************************
116**  Static variables
117************************************************************************************/
118btif_hh_cb_t btif_hh_cb;
119
120static bthh_callbacks_t *bt_hh_callbacks = NULL;
121
122/* List of HID keyboards for which the NUMLOCK state needs to be
123 * turned ON by default. Add devices to this list to apply the
124 * NUMLOCK state toggle on fpr first connect.*/
125static tHID_KB_LIST hid_kb_numlock_on_list[] =
126{
127    {LOGITECH_KB_MX5500_PRODUCT_ID,
128    LOGITECH_KB_MX5500_VENDOR_ID,
129    "Logitech MX5500 Keyboard"}
130};
131
132
133#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
134    {\
135        BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\
136        return BT_STATUS_NOT_READY;\
137    }\
138    else\
139    {\
140        BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\
141    }
142
143
144
145/************************************************************************************
146**  Static functions
147************************************************************************************/
148
149/************************************************************************************
150**  Externs
151************************************************************************************/
152extern void bta_hh_co_destroy(int fd);
153extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
154extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
155extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
156                                    UINT16 product_id, UINT16 version, UINT8 ctry_code,
157                                    int dscp_len, UINT8 *p_dscp);
158extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
159extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
160extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
161extern int  scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
162
163/*****************************************************************************
164**  Local Function prototypes
165*****************************************************************************/
166static void set_keylockstate(int keymask, BOOLEAN isSet);
167static void toggle_os_keylockstates(int fd, int changedkeystates);
168static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
169//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
170void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
171
172
173/************************************************************************************
174**  Functions
175************************************************************************************/
176
177static int get_keylockstates()
178{
179    return btif_hh_keylockstates;
180}
181
182static void set_keylockstate(int keymask, BOOLEAN isSet)
183{
184    if(isSet)
185        btif_hh_keylockstates |= keymask;
186}
187
188/*******************************************************************************
189**
190** Function         toggle_os_keylockstates
191**
192** Description      Function to toggle the keyboard lock states managed by the linux.
193**                  This function is used in by two call paths
194**                  (1) if the lock state change occurred from an onscreen keyboard,
195**                  this function is called to update the lock state maintained
196                    for the HID keyboard(s)
197**                  (2) if a HID keyboard is disconnected and reconnected,
198**                  this function is called to update the lock state maintained
199                    for the HID keyboard(s)
200** Returns          void
201*******************************************************************************/
202
203static void toggle_os_keylockstates(int fd, int changedlockstates)
204{
205    BTIF_TRACE_EVENT3("%s: fd = %d, changedlockstates = 0x%x",
206        __FUNCTION__, fd, changedlockstates);
207    UINT8 hidreport[9];
208    int reportIndex;
209    memset(hidreport,0,9);
210    hidreport[0]=1;
211    reportIndex=4;
212
213    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
214        BTIF_TRACE_DEBUG1("%s Setting CAPSLOCK", __FUNCTION__);
215        hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
216    }
217
218    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK)  {
219        BTIF_TRACE_DEBUG1("%s Setting NUMLOCK", __FUNCTION__);
220        hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
221    }
222
223    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
224        BTIF_TRACE_DEBUG1("%s Setting SCROLLLOCK", __FUNCTION__);
225        hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
226    }
227
228     BTIF_TRACE_DEBUG4("Writing hidreport #1 to os: "\
229        "%s:  %x %x %x", __FUNCTION__,
230         hidreport[0], hidreport[1], hidreport[2]);
231    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
232         hidreport[3], hidreport[4], hidreport[5]);
233    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
234         hidreport[6], hidreport[7], hidreport[8]);
235    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
236    usleep(200000);
237    memset(hidreport,0,9);
238    hidreport[0]=1;
239    BTIF_TRACE_DEBUG4("Writing hidreport #2 to os: "\
240       "%s:  %x %x %x", __FUNCTION__,
241         hidreport[0], hidreport[1], hidreport[2]);
242    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
243         hidreport[3], hidreport[4], hidreport[5]);
244    BTIF_TRACE_DEBUG4("%s:  %x %x %x ", __FUNCTION__,
245         hidreport[6], hidreport[7], hidreport[8]);
246    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
247}
248
249/*******************************************************************************
250**
251** Function         update_keyboard_lockstates
252**
253** Description      Sends a report to the keyboard to set the lock states of keys
254**
255*******************************************************************************/
256static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
257{
258    UINT8 len = 2;  /* reportid + 1 byte report*/
259    BD_ADDR* bda;
260
261    /* Set report for other keyboards */
262    BTIF_TRACE_EVENT3("%s: setting report on dev_handle %d to 0x%x",
263         __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
264
265    if (p_dev->p_buf != NULL) {
266        GKI_freebuf(p_dev->p_buf);
267    }
268    /* Get SetReport buffer */
269    p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET +
270        sizeof(BT_HDR)));
271    if (p_dev->p_buf != NULL) {
272        p_dev->p_buf->len = len;
273        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
274        p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
275
276        /* LED status updated by data event */
277        UINT8 *pbuf_data  = (UINT8 *)(p_dev->p_buf + 1)
278            + p_dev->p_buf->offset;
279        pbuf_data[0]=0x01; /*report id */
280        pbuf_data[1]=btif_hh_keylockstates; /*keystate*/
281        bda = (BD_ADDR*) (&p_dev->bd_addr);
282        BTA_HhSendData(p_dev->dev_handle, *bda,
283            p_dev->p_buf);
284    }
285}
286
287/*******************************************************************************
288**
289** Function         sync_lockstate_on_connect
290**
291** Description      Function to update the keyboard lock states managed by the OS
292**                  when a HID keyboard is connected or disconnected and reconnected
293** Returns          void
294*******************************************************************************/
295static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
296{
297    int keylockstates;
298
299    BTIF_TRACE_EVENT1("%s: Syncing keyboard lock states after "\
300        "reconnect...",__FUNCTION__);
301    /*If the device is connected, update keyboard state */
302    update_keyboard_lockstates(p_dev);
303
304    /*Check if the lockstate of caps,scroll,num is set.
305     If so, send a report to the kernel
306    so the lockstate is in sync */
307    keylockstates = get_keylockstates();
308    if (keylockstates)
309    {
310        BTIF_TRACE_DEBUG2("%s: Sending hid report to kernel "\
311            "indicating lock key state 0x%x",__FUNCTION__,
312            keylockstates);
313        usleep(200000);
314        toggle_os_keylockstates(p_dev->fd, keylockstates);
315    }
316    else
317    {
318        BTIF_TRACE_DEBUG2("%s: NOT sending hid report to kernel "\
319            "indicating lock key state 0x%x",__FUNCTION__,
320            keylockstates);
321    }
322}
323
324/*******************************************************************************
325**
326** Function         btif_hh_find_dev_by_handle
327**
328** Description      Return the device pointer of the specified device handle
329**
330** Returns          Device entry pointer in the device table
331*******************************************************************************/
332static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle)
333{
334    UINT32 i;
335    // LOGV("%s: handle = %d", __FUNCTION__, handle);
336    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
337        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
338            btif_hh_cb.devices[i].dev_handle == handle)
339        {
340            return &btif_hh_cb.devices[i];
341        }
342    }
343    return NULL;
344}
345
346
347/*******************************************************************************
348**
349** Function         btif_hh_find_connected_dev_by_handle
350**
351** Description      Return the connected device pointer of the specified device handle
352**
353** Returns          Device entry pointer in the device table
354*******************************************************************************/
355btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
356{
357    UINT32 i;
358    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
359        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
360            btif_hh_cb.devices[i].dev_handle == handle)
361        {
362            return &btif_hh_cb.devices[i];
363        }
364    }
365    return NULL;
366}
367
368/*******************************************************************************
369**
370** Function         btif_hh_find_dev_by_bda
371**
372** Description      Return the device pointer of the specified bt_bdaddr_t.
373**
374** Returns          Device entry pointer in the device table
375*******************************************************************************/
376static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
377{
378    UINT32 i;
379    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
380        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
381            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
382        {
383            return &btif_hh_cb.devices[i];
384        }
385    }
386    return NULL;
387}
388
389/*******************************************************************************
390**
391** Function         btif_hh_find_connected_dev_by_bda
392**
393** Description      Return the connected device pointer of the specified bt_bdaddr_t.
394**
395** Returns          Device entry pointer in the device table
396*******************************************************************************/
397static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
398{
399    UINT32 i;
400    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
401        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
402            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
403        {
404            return &btif_hh_cb.devices[i];
405        }
406    }
407    return NULL;
408}
409
410/*******************************************************************************
411**
412** Function      btif_hh_stop_vup_timer
413**
414** Description  stop vitual unplug timer
415**
416** Returns      void
417*******************************************************************************/
418void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
419{
420    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
421    if(p_dev != NULL)
422    {
423        if (p_dev->vup_timer_active)
424        {
425            BTIF_TRACE_DEBUG0("stop VUP timer ");
426            btu_stop_timer(&p_dev->vup_timer);
427        }
428        p_dev->vup_timer_active = FALSE;
429    }
430}
431/*******************************************************************************
432**
433** Function      btif_hh_start_vup_timer
434**
435** Description  start virtual unplug timer
436**
437** Returns      void
438*******************************************************************************/
439void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
440{
441    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
442
443    if (p_dev->vup_timer_active == FALSE)
444    {
445        BTIF_TRACE_DEBUG0("Start VUP timer ");
446        memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
447        p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
448        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
449                        BTIF_TIMEOUT_VUP_SECS);
450    }
451    else
452    {
453        BTIF_TRACE_DEBUG0("Restart VUP timer ");
454        btu_stop_timer(&p_dev->vup_timer);
455        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
456                        BTIF_TIMEOUT_VUP_SECS);
457    }
458        p_dev->vup_timer_active = TRUE;
459
460}
461
462/*******************************************************************************
463**
464** Function         btif_hh_add_added_dev
465**
466** Description      Add a new device to the added device list.
467**
468** Returns          TRUE if add successfully, otherwise FALSE.
469*******************************************************************************/
470BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
471{
472    int i;
473    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
474        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
475            BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
476                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
477            return FALSE;
478        }
479    }
480    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
481        if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
482            btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
483            btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
484            btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
485            btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
486            btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
487        {
488            BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
489                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
490            memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
491            btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
492            btif_hh_cb.added_devices[i].attr_mask  = attr_mask;
493            return TRUE;
494        }
495    }
496
497    BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__);
498    return FALSE;
499}
500
501/*******************************************************************************
502 **
503 ** Function         btif_hh_remove_device
504 **
505 ** Description      Remove an added device from the stack.
506 **
507 ** Returns          void
508 *******************************************************************************/
509void btif_hh_remove_device(bt_bdaddr_t bd_addr)
510{
511    int                    i;
512    btif_hh_device_t       *p_dev;
513    btif_hh_added_device_t *p_added_dev;
514
515    ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
516         bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
517
518    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
519        p_added_dev = &btif_hh_cb.added_devices[i];
520        if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
521            BTA_HhRemoveDev(p_added_dev->dev_handle);
522            btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
523            memset(&(p_added_dev->bd_addr), 0, 6);
524            p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
525            break;
526        }
527    }
528
529    p_dev = btif_hh_find_dev_by_bda(&bd_addr);
530    if (p_dev == NULL) {
531        BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
532             bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
533        return;
534    }
535
536    /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
537    HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
538
539    p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
540    p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
541    if (btif_hh_cb.device_num > 0) {
542        btif_hh_cb.device_num--;
543    }
544    else {
545        BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__);
546    }
547    if (p_dev->p_buf != NULL) {
548        GKI_freebuf(p_dev->p_buf);
549        p_dev->p_buf = NULL;
550    }
551
552    p_dev->hh_keep_polling = 0;
553    p_dev->hh_poll_thread_id = -1;
554    BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
555    if (p_dev->fd >= 0) {
556        bta_hh_co_destroy(p_dev->fd);
557        p_dev->fd = -1;
558    }
559}
560
561
562BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
563{
564    dest->descriptor.dl_len = 0;
565    if (src->descriptor.dl_len >0)
566    {
567        dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
568        if (dest->descriptor.dsc_list == NULL)
569        {
570            BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__);
571            return FALSE;
572        }
573    }
574    memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
575    dest->descriptor.dl_len = src->descriptor.dl_len;
576    dest->vendor_id  = src->vendor_id;
577    dest->product_id = src->product_id;
578    dest->version    = src->version;
579    dest->ctry_code  = src->ctry_code;
580    return TRUE;
581}
582
583
584/*******************************************************************************
585**
586** Function         btif_hh_virtual_unplug
587**
588** Description      Virtual unplug initiated from the BTIF thread context
589**                  Special handling for HID mouse-
590**
591** Returns          void
592**
593*******************************************************************************/
594
595bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
596{
597    BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
598    btif_hh_device_t *p_dev;
599    char bd_str[18];
600    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
601            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
602            bd_addr->address[4], bd_addr->address[5]);
603    p_dev = btif_hh_find_dev_by_bda(bd_addr);
604    if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
605        && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
606    {
607        BTIF_TRACE_DEBUG1("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
608        /* start the timer */
609        btif_hh_start_vup_timer(bd_addr);
610        p_dev->local_vup = TRUE;
611        BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
612        return BT_STATUS_SUCCESS;
613    }
614    else
615    {
616        BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
617        return BT_STATUS_FAIL;
618    }
619}
620
621/*******************************************************************************
622**
623** Function         btif_hh_connect
624**
625** Description      connection initiated from the BTIF thread context
626**
627** Returns          int status
628**
629*******************************************************************************/
630
631bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
632{
633    btif_hh_device_t *dev;
634    btif_hh_added_device_t *added_dev = NULL;
635    char bda_str[20];
636    int i;
637    BD_ADDR *bda = (BD_ADDR*)bd_addr;
638    tBTA_HH_CONN conn;
639    CHECK_BTHH_INIT();
640    dev = btif_hh_find_dev_by_bda(bd_addr);
641    BTIF_TRACE_DEBUG0("Connect _hh");
642    sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
643            (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
644    if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
645        // No space for more HID device now.
646         BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d",
647             __FUNCTION__, BTIF_HH_MAX_HID);
648        return BT_STATUS_FAIL;
649    }
650
651    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
652        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
653            added_dev = &btif_hh_cb.added_devices[i];
654             BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x",
655                 __FUNCTION__, bda_str, added_dev->attr_mask);
656        }
657    }
658
659    if (added_dev != NULL) {
660        if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
661            // No space for more HID device now.
662            BTIF_TRACE_ERROR2("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
663            memset(&(added_dev->bd_addr), 0, 6);
664            added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
665            return BT_STATUS_FAIL;
666        }
667    }
668
669    if (added_dev == NULL ||
670        (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
671        (added_dev->attr_mask & HID_RECONN_INIT) == 0)
672    {
673        tBTA_SEC sec_mask = BTUI_HH_SECURITY;
674        btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
675        BD_ADDR *bda = (BD_ADDR*)bd_addr;
676        BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
677    }
678    else
679    {
680        // This device shall be connected from the host side.
681        BTIF_TRACE_ERROR2("%s: Error, device %s can only be reconnected from device side",
682             __FUNCTION__, bda_str);
683        return BT_STATUS_FAIL;
684    }
685
686    HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
687    return BT_STATUS_SUCCESS;
688}
689
690/*******************************************************************************
691**
692** Function         btif_hh_disconnect
693**
694** Description      disconnection initiated from the BTIF thread context
695**
696** Returns          void
697**
698*******************************************************************************/
699
700void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
701{
702    BD_ADDR *bda = (BD_ADDR*)bd_addr;
703    btif_hh_device_t *p_dev;
704    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
705    if (p_dev != NULL)
706    {
707        BTA_HhClose(p_dev->dev_handle);
708    }
709    else
710        BTIF_TRACE_DEBUG1("%s-- Error: device not connected:",__FUNCTION__);
711}
712
713/*******************************************************************************
714**
715** Function         btif_btif_hh_setreport
716**
717** Description      setreport initiated from the BTIF thread context
718**
719** Returns          void
720**
721*******************************************************************************/
722
723void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
724                            UINT8* report)
725{
726    UINT8  hexbuf[20];
727    UINT16 len = size;
728    int i = 0;
729    if (p_dev->p_buf != NULL) {
730        GKI_freebuf(p_dev->p_buf);
731    }
732    p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
733    if (p_dev->p_buf == NULL) {
734        APPL_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
735        return;
736    }
737
738    p_dev->p_buf->len = len;
739    p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
740
741    //Build a SetReport data buffer
742    memset(hexbuf, 0, 20);
743    for(i=0; i<len; i++)
744        hexbuf[i] = report[i];
745
746    UINT8* pbuf_data;
747    pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
748    memcpy(pbuf_data, hexbuf, len);
749    BTA_HhSetReport(p_dev->dev_handle, r_type, p_dev->p_buf);
750
751}
752
753/*****************************************************************************
754**   Section name (Group of functions)
755*****************************************************************************/
756
757/*****************************************************************************
758**
759**   btif hh api functions (no context switch)
760**
761*****************************************************************************/
762
763
764/*******************************************************************************
765**
766** Function         btif_hh_upstreams_evt
767**
768** Description      Executes HH UPSTREAMS events in btif context
769**
770** Returns          void
771**
772*******************************************************************************/
773static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
774{
775    tBTA_HH *p_data = (tBTA_HH *)p_param;
776    bdstr_t bdstr;
777    btif_hh_device_t *p_dev = NULL;
778    int i;
779    int len, tmplen;
780
781    BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event));
782
783    switch (event)
784    {
785        case BTA_HH_ENABLE_EVT:
786            BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
787            if (p_data->status == BTA_HH_OK) {
788                btif_hh_cb.status = BTIF_HH_ENABLED;
789                BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__);
790                /* Add hid descriptors for already bonded hid devices*/
791                btif_storage_load_bonded_hid_info();
792            }
793            else {
794                btif_hh_cb.status = BTIF_HH_DISABLED;
795                BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
796            }
797            break;
798
799        case BTA_HH_DISABLE_EVT:
800            btif_hh_cb.status = BTIF_HH_DISABLED;
801            if (p_data->status == BTA_HH_OK) {
802                int i;
803                //Clear the control block
804                memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
805                for (i = 0; i < BTIF_HH_MAX_HID; i++){
806                    btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
807                }
808            }
809            else
810                BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
811            break;
812
813        case BTA_HH_OPEN_EVT:
814            BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
815            if (p_data->conn.status == BTA_HH_OK) {
816                p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
817                if (p_dev == NULL) {
818                    BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
819                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
820                    // The connect request must come from device side and exceeded the connected
821                                   // HID device number.
822                    BTA_HhClose(p_data->conn.handle);
823                    HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
824                }
825                else if (p_dev->fd < 0) {
826                    BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
827                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
828                    //remove the connection  and then try again to reconnect from the mouse side to recover
829                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
830                    BTA_HhClose(p_data->conn.handle);
831                }
832                else {
833                    BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
834                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
835                    btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
836                    // Send set_idle if the peer_device is a keyboard
837                    if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
838                                check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
839                        BTA_HhSetIdle(p_data->conn.handle, 0);
840                    btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
841                    BTA_HhGetDscpInfo(p_data->conn.handle);
842                    p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
843                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
844                }
845            }
846            else {
847                bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
848                HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
849                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
850            }
851            break;
852        case BTA_HH_CLOSE_EVT:
853            BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
854            p_data->dev_status.status, p_data->dev_status.handle);
855            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
856            if (p_dev != NULL) {
857                BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
858                if (p_dev->fd >= 0){
859                    UINT8 hidreport[9];
860                    memset(hidreport,0,9);
861                    hidreport[0]=1;
862                    bta_hh_co_write(p_dev->fd , hidreport, sizeof(hidreport));
863                }
864                if(p_dev->vup_timer_active)
865                {
866                    btif_hh_stop_vup_timer(&(p_dev->bd_addr));
867                }
868                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
869                p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
870                HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
871                BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
872                bta_hh_co_destroy(p_dev->fd);
873                p_dev->fd = -1;
874            }
875            else {
876                BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle);
877            }
878            break;
879        case BTA_HH_GET_RPT_EVT:
880            BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
881                 p_data->hs_data.status, p_data->hs_data.handle);
882            p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
883            HAL_CBACK(bt_hh_callbacks, get_report_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t) p_data->hs_data.status,
884                (uint8_t*) p_data->hs_data.rsp_data.p_rpt_data, BT_HDR_SIZE);
885            break;
886
887        case BTA_HH_SET_RPT_EVT:
888            BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
889            p_data->dev_status.status, p_data->dev_status.handle);
890            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
891            if (p_dev != NULL && p_dev->p_buf != NULL) {
892                BTIF_TRACE_DEBUG0("Freeing buffer..." );
893                GKI_freebuf(p_dev->p_buf);
894                p_dev->p_buf = NULL;
895            }
896            break;
897
898        case BTA_HH_GET_PROTO_EVT:
899            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
900            BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
901                 p_data->hs_data.status, p_data->hs_data.handle,
902                 p_data->hs_data.rsp_data.proto_mode,
903                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
904                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
905            HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t)p_data->hs_data.status,
906                             (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
907            break;
908
909        case BTA_HH_SET_PROTO_EVT:
910            BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
911                 p_data->dev_status.status, p_data->dev_status.handle);
912            break;
913
914        case BTA_HH_GET_IDLE_EVT:
915            BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
916                 p_data->hs_data.handle, p_data->hs_data.status,
917                 p_data->hs_data.rsp_data.idle_rate);
918            break;
919
920        case BTA_HH_SET_IDLE_EVT:
921            BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
922            p_data->dev_status.status, p_data->dev_status.handle);
923            break;
924
925        case BTA_HH_GET_DSCP_EVT:
926            BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
927                p_data->dev_status.status, p_data->dev_status.handle);
928                len = p_data->dscp_info.descriptor.dl_len;
929                BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len);
930            p_dev = btif_hh_cb.p_curr_dev;
931            if (p_dev == NULL) {
932                BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
933                return;
934            }
935            if (p_dev->fd < 0) {
936                ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
937                return;
938            }
939            {
940                char *cached_name = NULL;
941                char name[] = "Broadcom Bluetooth HID";
942                if (cached_name == NULL) {
943                    cached_name = name;
944                }
945
946                BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name);
947                bta_hh_co_send_hid_info(p_dev, cached_name,
948                    p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
949                    p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
950                    len, p_data->dscp_info.descriptor.dsc_list);
951                if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
952                    BD_ADDR bda;
953                    bdcpy(bda, p_dev->bd_addr.address);
954                    tBTA_HH_DEV_DSCP_INFO dscp_info;
955                    bt_status_t ret;
956                    bdcpy(bda, p_dev->bd_addr.address);
957                    btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
958                    BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
959                              p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
960                              p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
961                              p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
962                    BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
963                    // write hid info to nvram
964                    ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
965                                                        p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
966                                                        p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
967                                                        len, p_data->dscp_info.descriptor.dsc_list);
968
969                    ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
970                    BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device");
971
972                    //Free buffer created for dscp_info;
973                    if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
974                    {
975                      GKI_freebuf(dscp_info.descriptor.dsc_list);
976                      dscp_info.descriptor.dsc_list = NULL;
977                      dscp_info.descriptor.dl_len=0;
978                    }
979                }
980                else {
981                    //Device already added.
982                    BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__);
983                }
984                /*Sync HID Keyboard lockstates */
985                tmplen = sizeof(hid_kb_numlock_on_list)
986                            / sizeof(tHID_KB_LIST);
987                for(i = 0; i< tmplen; i++)
988                {
989                    if(p_data->dscp_info.vendor_id
990                        == hid_kb_numlock_on_list[i].version_id &&
991                        p_data->dscp_info.product_id
992                        == hid_kb_numlock_on_list[i].product_id)
993                    {
994                        BTIF_TRACE_DEBUG3("%s() idx[%d] Enabling "\
995                            "NUMLOCK for device :: %s", __FUNCTION__,
996                            i, hid_kb_numlock_on_list[i].kb_name);
997                        /* Enable NUMLOCK by default so that numeric
998                            keys work from first keyboard connect */
999                        set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1000                                        TRUE);
1001                        sync_lockstate_on_connect(p_dev);
1002                        /* End Sync HID Keyboard lockstates */
1003                        break;
1004                    }
1005                }
1006            }
1007            break;
1008
1009        case BTA_HH_ADD_DEV_EVT:
1010            BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1011            int i;
1012            for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1013                if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1014                    if (p_data->dev_info.status == BTA_HH_OK) {
1015                        btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1016                    }
1017                    else {
1018                        memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1019                        btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1020                    }
1021                    break;
1022                }
1023            }
1024            break;
1025        case BTA_HH_RMV_DEV_EVT:
1026                BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1027                     p_data->dev_info.status, p_data->dev_info.handle);
1028                BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1029                     p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1030                     p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1031                break;
1032
1033
1034        case BTA_HH_VC_UNPLUG_EVT:
1035                BTIF_TRACE_DEBUG2("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1036                     p_data->dev_status.status, p_data->dev_status.handle);
1037                p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1038                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1039                if (p_dev != NULL) {
1040                    BTIF_TRACE_DEBUG6("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1041                         p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1042                         p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1043                         p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1044                    /* Stop the VUP timer */
1045                    if(p_dev->vup_timer_active)
1046                    {
1047                        btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1048                    }
1049                    p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1050                    BTIF_TRACE_DEBUG1("%s---Sending connection state change", __FUNCTION__);
1051                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1052                    BTIF_TRACE_DEBUG1("%s---Removing HID bond", __FUNCTION__);
1053                    /* If it is locally initiated VUP or remote device has its major COD as
1054                    Peripheral removed the bond.*/
1055                    if (p_dev->local_vup  || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1056                    {
1057                        p_dev->local_vup = FALSE;
1058                        BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1059                    }
1060                    else
1061                        btif_hh_remove_device(p_dev->bd_addr);
1062                    HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1063                                    p_data->dev_status.status);
1064                }
1065                break;
1066
1067        case BTA_HH_API_ERR_EVT  :
1068                ALOGI("BTA_HH API_ERR");
1069                break;
1070
1071
1072
1073            default:
1074                BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event);
1075                break;
1076        }
1077}
1078
1079/*******************************************************************************
1080**
1081** Function         bte_hh_evt
1082**
1083** Description      Switches context from BTE to BTIF for all HH events
1084**
1085** Returns          void
1086**
1087*******************************************************************************/
1088
1089static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1090{
1091    bt_status_t status;
1092    int param_len = 0;
1093
1094    if (BTA_HH_ENABLE_EVT == event)
1095        param_len = sizeof(tBTA_HH_STATUS);
1096    else if (BTA_HH_OPEN_EVT == event)
1097        param_len = sizeof(tBTA_HH_CONN);
1098    else if (BTA_HH_DISABLE_EVT == event)
1099        param_len = sizeof(tBTA_HH_STATUS);
1100    else if (BTA_HH_CLOSE_EVT == event)
1101        param_len = sizeof(tBTA_HH_CBDATA);
1102    else if (BTA_HH_GET_DSCP_EVT == event)
1103        param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1104    else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1105        param_len = sizeof(tBTA_HH_HSDATA);
1106    else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1107        param_len = sizeof(tBTA_HH_CBDATA);
1108    else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1109        param_len = sizeof(tBTA_HH_DEV_INFO);
1110    else if (BTA_HH_API_ERR_EVT == event)
1111        param_len = 0;
1112    /* switch context to btif task context (copy full union size for convenience) */
1113    status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1114
1115    /* catch any failed context transfers */
1116    ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1117}
1118
1119/*******************************************************************************
1120**
1121** Function         btif_hh_handle_evt
1122**
1123** Description      Switches context for immediate callback
1124**
1125** Returns          void
1126**
1127*******************************************************************************/
1128
1129static void btif_hh_handle_evt(UINT16 event, char *p_param)
1130{
1131    bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1132    BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1133    int ret;
1134    switch(event)
1135    {
1136        case BTIF_HH_CONNECT_REQ_EVT:
1137        {
1138            ret = btif_hh_connect(bd_addr);
1139            if(ret == BT_STATUS_SUCCESS)
1140            {
1141                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1142            }
1143            else
1144                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1145        }
1146        break;
1147
1148        case BTIF_HH_DISCONNECT_REQ_EVT:
1149        {
1150            BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1151            btif_hh_disconnect(bd_addr);
1152            HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1153        }
1154        break;
1155
1156        case BTIF_HH_VUP_REQ_EVT:
1157        {
1158            BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1159            ret = btif_hh_virtual_unplug(bd_addr);
1160        }
1161        break;
1162
1163        default:
1164        {
1165            BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event);
1166        }
1167        break;
1168    }
1169}
1170
1171/*******************************************************************************
1172**
1173** Function      btif_hh_tmr_hdlr
1174**
1175** Description   Process timer timeout
1176**
1177** Returns      void
1178*******************************************************************************/
1179void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1180{
1181    btif_hh_device_t *p_dev;
1182    UINT8               i,j;
1183    tBTA_HH_EVT event;
1184    tBTA_HH p_data;
1185    int param_len = 0;
1186    memset(&p_data, 0, sizeof(tBTA_HH));
1187
1188    BTIF_TRACE_DEBUG2("%s timer_in_use=%d",  __FUNCTION__, tle->in_use );
1189
1190    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1191        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1192        {
1193
1194            p_dev = &btif_hh_cb.devices[i];
1195
1196            if (p_dev->vup_timer_active)
1197            {
1198                p_dev->vup_timer_active = FALSE;
1199                event = BTA_HH_VC_UNPLUG_EVT;
1200                p_data.dev_status.status = BTHH_ERR;
1201                p_data.dev_status.handle = p_dev->dev_handle;
1202                param_len = sizeof(tBTA_HH_CBDATA);
1203
1204                /* switch context to btif task context */
1205                btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1206                            param_len, NULL);
1207            }
1208        }
1209    }
1210}
1211
1212/*******************************************************************************
1213**
1214** Function         btif_hh_init
1215**
1216** Description     initializes the hh interface
1217**
1218** Returns         bt_status_t
1219**
1220*******************************************************************************/
1221static bt_status_t init( bthh_callbacks_t* callbacks )
1222{
1223    UINT32 i;
1224    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1225
1226    bt_hh_callbacks = callbacks;
1227    memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1228    for (i = 0; i < BTIF_HH_MAX_HID; i++){
1229        btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1230    }
1231    /* Invoke the enable service API to the core to set the appropriate service_id */
1232    btif_enable_service(BTA_HID_SERVICE_ID);
1233    return BT_STATUS_SUCCESS;
1234}
1235
1236/*******************************************************************************
1237**
1238** Function        connect
1239**
1240** Description     connect to hid device
1241**
1242** Returns         bt_status_t
1243**
1244*******************************************************************************/
1245static bt_status_t connect( bt_bdaddr_t *bd_addr)
1246{
1247    if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1248    {
1249        btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1250                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1251        return BT_STATUS_SUCCESS;
1252    }
1253    else
1254        return BT_STATUS_BUSY;
1255}
1256
1257/*******************************************************************************
1258**
1259** Function         disconnect
1260**
1261** Description      disconnect from hid device
1262**
1263** Returns         bt_status_t
1264**
1265*******************************************************************************/
1266static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1267{
1268    CHECK_BTHH_INIT();
1269    btif_hh_device_t *p_dev;
1270
1271    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1272    {
1273        BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1274        return BT_STATUS_FAIL;
1275    }
1276    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1277    if (p_dev != NULL)
1278    {
1279        return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1280                     (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1281    }
1282    else
1283    {
1284        BTIF_TRACE_WARNING1("%s: Error, device  not opened.", __FUNCTION__);
1285        return BT_STATUS_FAIL;
1286    }
1287}
1288
1289/*******************************************************************************
1290**
1291** Function         virtual_unplug
1292**
1293** Description      Virtual UnPlug (VUP) the specified HID device.
1294**
1295** Returns         bt_status_t
1296**
1297*******************************************************************************/
1298static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1299{
1300    CHECK_BTHH_INIT();
1301    btif_hh_device_t *p_dev;
1302    char bd_str[18];
1303    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1304            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
1305            bd_addr->address[4], bd_addr->address[5]);
1306    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1307    {
1308        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1309        return BT_STATUS_FAIL;
1310    }
1311    p_dev = btif_hh_find_dev_by_bda(bd_addr);
1312    if (!p_dev)
1313    {
1314        BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1315        return BT_STATUS_FAIL;
1316    }
1317    btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1318                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1319    return BT_STATUS_SUCCESS;
1320}
1321
1322
1323/*******************************************************************************
1324**
1325** Function         set_info
1326**
1327** Description      Set the HID device descriptor for the specified HID device.
1328**
1329** Returns         bt_status_t
1330**
1331*******************************************************************************/
1332static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1333{
1334    CHECK_BTHH_INIT();
1335    tBTA_HH_DEV_DSCP_INFO dscp_info;
1336    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1337
1338    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1339         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1340    BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1341         "product_id = 0x%04x, version= 0x%04x",
1342         __FUNCTION__, hid_info.sub_class,
1343         hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1344         hid_info.version);
1345
1346    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1347    {
1348        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1349        return BT_STATUS_FAIL;
1350    }
1351
1352    dscp_info.vendor_id  = hid_info.vendor_id;
1353    dscp_info.product_id = hid_info.product_id;
1354    dscp_info.version    = hid_info.version;
1355    dscp_info.ctry_code  = hid_info.ctry_code;
1356
1357    dscp_info.descriptor.dl_len = hid_info.dl_len;
1358    dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1359    if (dscp_info.descriptor.dsc_list == NULL)
1360    {
1361        ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1362        return BT_STATUS_FAIL;
1363    }
1364    memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1365
1366    if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1367    {
1368        BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1369                     hid_info.app_id, dscp_info);
1370    }
1371
1372    GKI_freebuf(dscp_info.descriptor.dsc_list);
1373
1374    return BT_STATUS_SUCCESS;
1375}
1376/*******************************************************************************
1377**
1378** Function         get_idle_time
1379**
1380** Description      Get the HID idle time
1381**
1382** Returns         bt_status_t
1383**
1384*******************************************************************************/
1385static bt_status_t get_idle_time(bt_bdaddr_t *bd_addr)
1386{
1387    CHECK_BTHH_INIT();
1388    btif_hh_device_t *p_dev;
1389    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1390
1391    BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1392         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1393
1394    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1395        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1396        return BT_STATUS_FAIL;
1397    }
1398
1399    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1400    if (p_dev != NULL) {
1401        //BTA_HhGetIdle(p_dev->dev_handle);
1402    }
1403    else {
1404        return BT_STATUS_FAIL;
1405    }
1406    return BT_STATUS_SUCCESS;
1407}
1408
1409/*******************************************************************************
1410**
1411** Function         set_idle_time
1412**
1413** Description      Set the HID idle time
1414**
1415** Returns         bt_status_t
1416**
1417*******************************************************************************/
1418static bt_status_t set_idle_time (bt_bdaddr_t *bd_addr, uint8_t idle_time)
1419{
1420    CHECK_BTHH_INIT();
1421    btif_hh_device_t *p_dev;
1422    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1423
1424    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1425         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1426
1427    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1428        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1429        return BT_STATUS_FAIL;
1430    }
1431
1432    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1433    if (p_dev == NULL) {
1434        BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1435             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1436        return BT_STATUS_FAIL;
1437    }
1438    else {
1439        //BTA_HhSetIdle(p_dev->dev_handle, idle_time);
1440    }
1441    return BT_STATUS_SUCCESS;
1442}
1443
1444/*******************************************************************************
1445**
1446** Function         get_protocol
1447**
1448** Description      Get the HID proto mode.
1449**
1450** Returns         bt_status_t
1451**
1452*******************************************************************************/
1453static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1454{
1455    CHECK_BTHH_INIT();
1456    btif_hh_device_t *p_dev;
1457    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1458
1459    BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1460         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1461
1462    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1463        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1464        return BT_STATUS_FAIL;
1465    }
1466
1467    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1468    if (p_dev != NULL) {
1469        BTA_HhGetProtoMode(p_dev->dev_handle);
1470    }
1471    else {
1472        return BT_STATUS_FAIL;
1473    }
1474    return BT_STATUS_SUCCESS;
1475}
1476
1477/*******************************************************************************
1478**
1479** Function         set_protocol
1480**
1481** Description      Set the HID proto mode.
1482**
1483** Returns         bt_status_t
1484**
1485*******************************************************************************/
1486static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1487{
1488    CHECK_BTHH_INIT();
1489    btif_hh_device_t *p_dev;
1490    UINT8 proto_mode = protocolMode;
1491    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1492
1493    BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1494
1495    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1496         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1497
1498    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1499        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1500        return BT_STATUS_FAIL;
1501    }
1502
1503    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1504    if (p_dev == NULL) {
1505        BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1506             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1507        return BT_STATUS_FAIL;
1508    }
1509    else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1510        BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1511        return BT_STATUS_FAIL;
1512    }
1513    else {
1514        BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1515    }
1516
1517
1518    return BT_STATUS_SUCCESS;
1519}
1520
1521/*******************************************************************************
1522**
1523** Function         get_report
1524**
1525** Description      Send a GET_REPORT to HID device.
1526**
1527** Returns         bt_status_t
1528**
1529*******************************************************************************/
1530static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1531{
1532    CHECK_BTHH_INIT();
1533    btif_hh_device_t *p_dev;
1534    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1535
1536    BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1537          reportType, reportId, bufferSize);
1538
1539    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1540         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1541
1542    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1543        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1544        return BT_STATUS_FAIL;
1545    }
1546
1547
1548    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1549    if (p_dev == NULL) {
1550        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1551             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1552        return BT_STATUS_FAIL;
1553    }
1554    else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1555        BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1556             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1557        return BT_STATUS_FAIL;
1558    }
1559    else {
1560        BTA_HhGetReport(p_dev->dev_handle, reportType,
1561                        reportId, bufferSize);
1562    }
1563
1564    return BT_STATUS_SUCCESS;
1565}
1566
1567/*******************************************************************************
1568**
1569** Function         set_report
1570**
1571** Description      Send a SET_REPORT to HID device.
1572**
1573** Returns         bt_status_t
1574**
1575*******************************************************************************/
1576static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1577{
1578    CHECK_BTHH_INIT();
1579    btif_hh_device_t *p_dev;
1580    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1581
1582    BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType);
1583
1584    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1585         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1586
1587
1588    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1589        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1590        return BT_STATUS_FAIL;
1591    }
1592
1593    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1594    if (p_dev == NULL) {
1595        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1596             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1597        return BT_STATUS_FAIL;
1598    }
1599    else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1600        BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1601             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1602        return BT_STATUS_FAIL;
1603    }
1604    else {
1605        int    hex_bytes_filled;
1606        UINT8  hexbuf[200];
1607        UINT16 len = (strlen(report) + 1) / 2;
1608
1609        if (p_dev->p_buf != NULL) {
1610            GKI_freebuf(p_dev->p_buf);
1611        }
1612        p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1613        if (p_dev->p_buf == NULL) {
1614            BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1615            return BT_STATUS_FAIL;
1616        }
1617
1618        p_dev->p_buf->len = len;
1619        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1620
1621        /* Build a SetReport data buffer */
1622        memset(hexbuf, 0, 200);
1623        //TODO
1624        hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1625        ALOGI("Hex bytes filled, hex value: %d", hex_bytes_filled);
1626
1627        if (hex_bytes_filled) {
1628            UINT8* pbuf_data;
1629            pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1630            memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1631            BTA_HhSetReport(p_dev->dev_handle, reportType, p_dev->p_buf);
1632        }
1633        return BT_STATUS_SUCCESS;
1634    }
1635
1636
1637}
1638
1639/*******************************************************************************
1640**
1641** Function         send_data
1642**
1643** Description      Send a SEND_DATA to HID device.
1644**
1645** Returns         bt_status_t
1646**
1647*******************************************************************************/
1648static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1649{
1650    CHECK_BTHH_INIT();
1651    btif_hh_device_t *p_dev;
1652    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1653
1654    BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
1655
1656    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1657         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1658
1659    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1660        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1661        return BT_STATUS_FAIL;
1662    }
1663
1664    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1665    if (p_dev == NULL) {
1666        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1667             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1668        return BT_STATUS_FAIL;
1669    }
1670
1671    else {
1672        int    hex_bytes_filled;
1673        UINT8  hexbuf[200];
1674        UINT16 len = (strlen(data) + 1) / 2;
1675
1676        if (p_dev->p_buf != NULL) {
1677            GKI_freebuf(p_dev->p_buf);
1678        }
1679        p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1680        if (p_dev->p_buf == NULL) {
1681            BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1682            return BT_STATUS_FAIL;
1683        }
1684
1685        p_dev->p_buf->len = len;
1686        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1687
1688        /* Build a SetReport data buffer */
1689        memset(hexbuf, 0, 200);
1690        hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1691        BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1692
1693        if (hex_bytes_filled) {
1694            UINT8* pbuf_data;
1695            pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1696            memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1697            p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1698            BTA_HhSendData(p_dev->dev_handle, *bda, p_dev->p_buf);
1699            return BT_STATUS_SUCCESS;
1700        }
1701
1702    }
1703    return BT_STATUS_FAIL;
1704}
1705
1706
1707/*******************************************************************************
1708**
1709** Function         cleanup
1710**
1711** Description      Closes the HH interface
1712**
1713** Returns          bt_status_t
1714**
1715*******************************************************************************/
1716static void  cleanup( void )
1717{
1718    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1719    btif_hh_device_t *p_dev;
1720    int i;
1721    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1722        BTIF_TRACE_WARNING2("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1723        return;
1724    }
1725    btif_hh_cb.status = BTIF_HH_DISABLING;
1726    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1727         p_dev = &btif_hh_cb.devices[i];
1728         if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1729             BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1730             bta_hh_co_destroy(p_dev->fd);
1731             p_dev->fd = -1;
1732             p_dev->hh_keep_polling = 0;
1733             p_dev->hh_poll_thread_id = -1;
1734         }
1735     }
1736
1737    if (bt_hh_callbacks)
1738    {
1739        btif_disable_service(BTA_HID_SERVICE_ID);
1740        bt_hh_callbacks = NULL;
1741    }
1742
1743}
1744
1745static const bthh_interface_t bthhInterface = {
1746    sizeof(bthhInterface),
1747    init,
1748    connect,
1749    disconnect,
1750    virtual_unplug,
1751    set_info,
1752    get_protocol,
1753    set_protocol,
1754//    get_idle_time,
1755//    set_idle_time,
1756    get_report,
1757    set_report,
1758    send_data,
1759    cleanup,
1760};
1761
1762/*******************************************************************************
1763**
1764** Function         btif_hh_execute_service
1765**
1766** Description      Initializes/Shuts down the service
1767**
1768** Returns          BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1769**
1770*******************************************************************************/
1771bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1772{
1773     if (b_enable)
1774     {
1775          /* Enable and register with BTA-HH */
1776          BTA_HhEnable(BTA_SEC_NONE, bte_hh_evt);
1777     }
1778     else {
1779         /* Disable HH */
1780         BTA_HhDisable();
1781     }
1782     return BT_STATUS_SUCCESS;
1783}
1784
1785/*******************************************************************************
1786**
1787** Function         btif_hh_get_interface
1788**
1789** Description      Get the hh callback interface
1790**
1791** Returns          bthh_interface_t
1792**
1793*******************************************************************************/
1794const bthh_interface_t *btif_hh_get_interface()
1795{
1796    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1797    return &bthhInterface;
1798}
1799