btif_hh.c revision 79eb1a643a2e627e5fb2c9dae1cb6a56a15ff0cf
1/****************************************************************************** 2 * 3 * Copyright (C) 2009-2012 Broadcom Corporation 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at: 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 ******************************************************************************/ 18 19/************************************************************************************ 20 * 21 * Filename: btif_hh.c 22 * 23 * Description: HID Host Profile Bluetooth Interface 24 * 25 * 26 ***********************************************************************************/ 27#include <hardware/bluetooth.h> 28#include <hardware/bt_hh.h> 29#include <stdio.h> 30#include <stdlib.h> 31#include <errno.h> 32#include <string.h> 33 34#define LOG_TAG "BTIF_HH" 35 36#include "bta_api.h" 37#include "bta_hh_api.h" 38#include "bd.h" 39#include "btif_storage.h" 40 41#include "btif_common.h" 42#include "btif_util.h" 43#include "btif_hh.h" 44#include "gki.h" 45#include "l2c_api.h" 46 47 48#define BTIF_HH_APP_ID_MI 0x01 49#define BTIF_HH_APP_ID_KB 0x02 50 51#define COD_HID_KEYBOARD 0x0540 52#define COD_HID_POINTING 0x0580 53#define COD_HID_COMBO 0x05C0 54#define COD_HID_MAJOR 0x0500 55 56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni 57 58#define HID_REPORT_CAPSLOCK 0x39 59#define HID_REPORT_NUMLOCK 0x53 60#define HID_REPORT_SCROLLLOCK 0x47 61 62//For Apple Magic Mouse 63#define MAGICMOUSE_VENDOR_ID 0x05ac 64#define MAGICMOUSE_PRODUCT_ID 0x030d 65 66#define LOGITECH_KB_MX5500_VENDOR_ID 0x046D 67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B 68 69extern const int BT_UID; 70extern const int BT_GID; 71static int btif_hh_prev_keyevents=0; //The previous key events 72static int btif_hh_keylockstates=0; //The current key state of each key 73 74#define BTIF_HH_ID_1 0 75#define BTIF_HH_DEV_DISCONNECTED 3 76 77#define BTIF_TIMEOUT_VUP_SECS 3 78 79 80#ifndef BTUI_HH_SECURITY 81#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT) 82#endif 83 84#ifndef BTUI_HH_MOUSE_SECURITY 85#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE) 86#endif 87 88/* HH request events */ 89typedef enum 90{ 91 BTIF_HH_CONNECT_REQ_EVT = 0, 92 BTIF_HH_DISCONNECT_REQ_EVT, 93 BTIF_HH_VUP_REQ_EVT 94} btif_hh_req_evt_t; 95 96 97/************************************************************************************ 98** Constants & Macros 99************************************************************************************/ 100#define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK) 101 102 103 104/************************************************************************************ 105** Local type definitions 106************************************************************************************/ 107 108typedef struct hid_kb_list 109{ 110 UINT16 product_id; 111 UINT16 version_id; 112 char* kb_name; 113} tHID_KB_LIST; 114 115/************************************************************************************ 116** Static variables 117************************************************************************************/ 118btif_hh_cb_t btif_hh_cb; 119 120static bthh_callbacks_t *bt_hh_callbacks = NULL; 121 122/* List of HID keyboards for which the NUMLOCK state needs to be 123 * turned ON by default. Add devices to this list to apply the 124 * NUMLOCK state toggle on fpr first connect.*/ 125static tHID_KB_LIST hid_kb_numlock_on_list[] = 126{ 127 {LOGITECH_KB_MX5500_PRODUCT_ID, 128 LOGITECH_KB_MX5500_VENDOR_ID, 129 "Logitech MX5500 Keyboard"} 130}; 131 132 133#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\ 134 {\ 135 BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\ 136 return BT_STATUS_NOT_READY;\ 137 }\ 138 else\ 139 {\ 140 BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\ 141 } 142 143 144 145/************************************************************************************ 146** Static functions 147************************************************************************************/ 148 149/************************************************************************************ 150** Externs 151************************************************************************************/ 152extern void bta_hh_co_destroy(int fd); 153extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len); 154extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 155extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id, 156 UINT16 product_id, UINT16 version, UINT8 ctry_code, 157 int dscp_len, UINT8 *p_dscp); 158extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 159extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 160extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 161extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex); 162extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr); 163 164/***************************************************************************** 165** Local Function prototypes 166*****************************************************************************/ 167static void set_keylockstate(int keymask, BOOLEAN isSet); 168static void toggle_os_keylockstates(int fd, int changedkeystates); 169static void sync_lockstate_on_connect(btif_hh_device_t *p_dev); 170//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev); 171void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle); 172 173 174/************************************************************************************ 175** Functions 176************************************************************************************/ 177 178static int get_keylockstates() 179{ 180 return btif_hh_keylockstates; 181} 182 183static void set_keylockstate(int keymask, BOOLEAN isSet) 184{ 185 if(isSet) 186 btif_hh_keylockstates |= keymask; 187} 188 189/******************************************************************************* 190** 191** Function toggle_os_keylockstates 192** 193** Description Function to toggle the keyboard lock states managed by the linux. 194** This function is used in by two call paths 195** (1) if the lock state change occurred from an onscreen keyboard, 196** this function is called to update the lock state maintained 197 for the HID keyboard(s) 198** (2) if a HID keyboard is disconnected and reconnected, 199** this function is called to update the lock state maintained 200 for the HID keyboard(s) 201** Returns void 202*******************************************************************************/ 203 204static void toggle_os_keylockstates(int fd, int changedlockstates) 205{ 206 BTIF_TRACE_EVENT3("%s: fd = %d, changedlockstates = 0x%x", 207 __FUNCTION__, fd, changedlockstates); 208 UINT8 hidreport[9]; 209 int reportIndex; 210 memset(hidreport,0,9); 211 hidreport[0]=1; 212 reportIndex=4; 213 214 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) { 215 BTIF_TRACE_DEBUG1("%s Setting CAPSLOCK", __FUNCTION__); 216 hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK; 217 } 218 219 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK) { 220 BTIF_TRACE_DEBUG1("%s Setting NUMLOCK", __FUNCTION__); 221 hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK; 222 } 223 224 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) { 225 BTIF_TRACE_DEBUG1("%s Setting SCROLLLOCK", __FUNCTION__); 226 hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK; 227 } 228 229 BTIF_TRACE_DEBUG4("Writing hidreport #1 to os: "\ 230 "%s: %x %x %x", __FUNCTION__, 231 hidreport[0], hidreport[1], hidreport[2]); 232 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 233 hidreport[3], hidreport[4], hidreport[5]); 234 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 235 hidreport[6], hidreport[7], hidreport[8]); 236 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 237 usleep(200000); 238 memset(hidreport,0,9); 239 hidreport[0]=1; 240 BTIF_TRACE_DEBUG4("Writing hidreport #2 to os: "\ 241 "%s: %x %x %x", __FUNCTION__, 242 hidreport[0], hidreport[1], hidreport[2]); 243 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 244 hidreport[3], hidreport[4], hidreport[5]); 245 BTIF_TRACE_DEBUG4("%s: %x %x %x ", __FUNCTION__, 246 hidreport[6], hidreport[7], hidreport[8]); 247 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 248} 249 250/******************************************************************************* 251** 252** Function create_pbuf 253** 254** Description Helper function to create p_buf for send_data or set_report 255** 256*******************************************************************************/ 257static BT_HDR *create_pbuf(UINT16 len, UINT8 *data) 258{ 259 BT_HDR* p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR))); 260 261 if (p_buf) { 262 UINT8* pbuf_data; 263 264 p_buf->len = len; 265 p_buf->offset = BTA_HH_MIN_OFFSET; 266 267 pbuf_data = (UINT8*) (p_buf + 1) + p_buf->offset; 268 memcpy(pbuf_data, data, len); 269 } 270 return p_buf; 271} 272 273/******************************************************************************* 274** 275** Function update_keyboard_lockstates 276** 277** Description Sends a report to the keyboard to set the lock states of keys 278** 279*******************************************************************************/ 280static void update_keyboard_lockstates(btif_hh_device_t *p_dev) 281{ 282 UINT8 len = 2; /* reportid + 1 byte report*/ 283 BD_ADDR* bda; 284 BT_HDR* p_buf; 285 UINT8 data[] = {0x01, /* report id */ 286 btif_hh_keylockstates}; /* keystate */ 287 288 /* Set report for other keyboards */ 289 BTIF_TRACE_EVENT3("%s: setting report on dev_handle %d to 0x%x", 290 __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates); 291 292 /* Get SetReport buffer */ 293 p_buf = create_pbuf(len, data); 294 if (p_buf != NULL) { 295 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 296 bda = (BD_ADDR*) (&p_dev->bd_addr); 297 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf); 298 } 299} 300 301/******************************************************************************* 302** 303** Function sync_lockstate_on_connect 304** 305** Description Function to update the keyboard lock states managed by the OS 306** when a HID keyboard is connected or disconnected and reconnected 307** Returns void 308*******************************************************************************/ 309static void sync_lockstate_on_connect(btif_hh_device_t *p_dev) 310{ 311 int keylockstates; 312 313 BTIF_TRACE_EVENT1("%s: Syncing keyboard lock states after "\ 314 "reconnect...",__FUNCTION__); 315 /*If the device is connected, update keyboard state */ 316 update_keyboard_lockstates(p_dev); 317 318 /*Check if the lockstate of caps,scroll,num is set. 319 If so, send a report to the kernel 320 so the lockstate is in sync */ 321 keylockstates = get_keylockstates(); 322 if (keylockstates) 323 { 324 BTIF_TRACE_DEBUG2("%s: Sending hid report to kernel "\ 325 "indicating lock key state 0x%x",__FUNCTION__, 326 keylockstates); 327 usleep(200000); 328 toggle_os_keylockstates(p_dev->fd, keylockstates); 329 } 330 else 331 { 332 BTIF_TRACE_DEBUG2("%s: NOT sending hid report to kernel "\ 333 "indicating lock key state 0x%x",__FUNCTION__, 334 keylockstates); 335 } 336} 337 338/******************************************************************************* 339** 340** Function btif_hh_find_dev_by_handle 341** 342** Description Return the device pointer of the specified device handle 343** 344** Returns Device entry pointer in the device table 345*******************************************************************************/ 346static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle) 347{ 348 UINT32 i; 349 // LOGV("%s: handle = %d", __FUNCTION__, handle); 350 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 351 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 352 btif_hh_cb.devices[i].dev_handle == handle) 353 { 354 return &btif_hh_cb.devices[i]; 355 } 356 } 357 return NULL; 358} 359 360 361/******************************************************************************* 362** 363** Function btif_hh_find_connected_dev_by_handle 364** 365** Description Return the connected device pointer of the specified device handle 366** 367** Returns Device entry pointer in the device table 368*******************************************************************************/ 369btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle) 370{ 371 UINT32 i; 372 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 373 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 374 btif_hh_cb.devices[i].dev_handle == handle) 375 { 376 return &btif_hh_cb.devices[i]; 377 } 378 } 379 return NULL; 380} 381 382/******************************************************************************* 383** 384** Function btif_hh_find_dev_by_bda 385** 386** Description Return the device pointer of the specified bt_bdaddr_t. 387** 388** Returns Device entry pointer in the device table 389*******************************************************************************/ 390static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) 391{ 392 UINT32 i; 393 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 394 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 395 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 396 { 397 return &btif_hh_cb.devices[i]; 398 } 399 } 400 return NULL; 401} 402 403/******************************************************************************* 404** 405** Function btif_hh_find_connected_dev_by_bda 406** 407** Description Return the connected device pointer of the specified bt_bdaddr_t. 408** 409** Returns Device entry pointer in the device table 410*******************************************************************************/ 411static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) 412{ 413 UINT32 i; 414 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 415 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 416 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 417 { 418 return &btif_hh_cb.devices[i]; 419 } 420 } 421 return NULL; 422} 423 424/******************************************************************************* 425** 426** Function btif_hh_stop_vup_timer 427** 428** Description stop vitual unplug timer 429** 430** Returns void 431*******************************************************************************/ 432void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) 433{ 434 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 435 if(p_dev != NULL) 436 { 437 if (p_dev->vup_timer_active) 438 { 439 BTIF_TRACE_DEBUG0("stop VUP timer "); 440 btu_stop_timer(&p_dev->vup_timer); 441 } 442 p_dev->vup_timer_active = FALSE; 443 } 444} 445/******************************************************************************* 446** 447** Function btif_hh_start_vup_timer 448** 449** Description start virtual unplug timer 450** 451** Returns void 452*******************************************************************************/ 453void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) 454{ 455 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 456 457 if (p_dev->vup_timer_active == FALSE) 458 { 459 BTIF_TRACE_DEBUG0("Start VUP timer "); 460 memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT)); 461 p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr; 462 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 463 BTIF_TIMEOUT_VUP_SECS); 464 } 465 else 466 { 467 BTIF_TRACE_DEBUG0("Restart VUP timer "); 468 btu_stop_timer(&p_dev->vup_timer); 469 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 470 BTIF_TIMEOUT_VUP_SECS); 471 } 472 p_dev->vup_timer_active = TRUE; 473 474} 475 476/******************************************************************************* 477** 478** Function btif_hh_add_added_dev 479** 480** Description Add a new device to the added device list. 481** 482** Returns TRUE if add successfully, otherwise FALSE. 483*******************************************************************************/ 484BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask) 485{ 486 int i; 487 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 488 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) { 489 BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added", 490 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 491 return FALSE; 492 } 493 } 494 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 495 if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 && 496 btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 && 497 btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 && 498 btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 && 499 btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 && 500 btif_hh_cb.added_devices[i].bd_addr.address[5] == 0) 501 { 502 BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X", 503 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 504 memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN); 505 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 506 btif_hh_cb.added_devices[i].attr_mask = attr_mask; 507 return TRUE; 508 } 509 } 510 511 BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__); 512 return FALSE; 513} 514 515/******************************************************************************* 516 ** 517 ** Function btif_hh_remove_device 518 ** 519 ** Description Remove an added device from the stack. 520 ** 521 ** Returns void 522 *******************************************************************************/ 523void btif_hh_remove_device(bt_bdaddr_t bd_addr) 524{ 525 int i; 526 btif_hh_device_t *p_dev; 527 btif_hh_added_device_t *p_added_dev; 528 529 ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__, 530 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 531 532 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 533 p_added_dev = &btif_hh_cb.added_devices[i]; 534 if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) { 535 BTA_HhRemoveDev(p_added_dev->dev_handle); 536 btif_storage_remove_hid_info(&(p_added_dev->bd_addr)); 537 memset(&(p_added_dev->bd_addr), 0, 6); 538 p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 539 break; 540 } 541 } 542 543 p_dev = btif_hh_find_dev_by_bda(&bd_addr); 544 if (p_dev == NULL) { 545 BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]", 546 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 547 return; 548 } 549 550 /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */ 551 HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED); 552 553 p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN; 554 p_dev->dev_handle = BTA_HH_INVALID_HANDLE; 555 if (btif_hh_cb.device_num > 0) { 556 btif_hh_cb.device_num--; 557 } 558 else { 559 BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__); 560 } 561 562 p_dev->hh_keep_polling = 0; 563 p_dev->hh_poll_thread_id = -1; 564 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 565 if (p_dev->fd >= 0) { 566 bta_hh_co_destroy(p_dev->fd); 567 p_dev->fd = -1; 568 } 569} 570 571 572BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src) 573{ 574 dest->descriptor.dl_len = 0; 575 if (src->descriptor.dl_len >0) 576 { 577 dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len); 578 if (dest->descriptor.dsc_list == NULL) 579 { 580 BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__); 581 return FALSE; 582 } 583 } 584 memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len); 585 dest->descriptor.dl_len = src->descriptor.dl_len; 586 dest->vendor_id = src->vendor_id; 587 dest->product_id = src->product_id; 588 dest->version = src->version; 589 dest->ctry_code = src->ctry_code; 590 dest->ssr_max_latency = src->ssr_max_latency; 591 dest->ssr_min_tout = src->ssr_min_tout; 592 return TRUE; 593} 594 595 596/******************************************************************************* 597** 598** Function btif_hh_virtual_unplug 599** 600** Description Virtual unplug initiated from the BTIF thread context 601** Special handling for HID mouse- 602** 603** Returns void 604** 605*******************************************************************************/ 606 607bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) 608{ 609 BTIF_TRACE_DEBUG1("%s", __FUNCTION__); 610 btif_hh_device_t *p_dev; 611 char bd_str[18]; 612 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 613 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 614 bd_addr->address[4], bd_addr->address[5]); 615 p_dev = btif_hh_find_dev_by_bda(bd_addr); 616 if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED) 617 && (p_dev->attr_mask & HID_VIRTUAL_CABLE)) 618 { 619 BTIF_TRACE_DEBUG1("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__); 620 /* start the timer */ 621 btif_hh_start_vup_timer(bd_addr); 622 p_dev->local_vup = TRUE; 623 BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG); 624 return BT_STATUS_SUCCESS; 625 } 626 else 627 { 628 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 629 return BT_STATUS_FAIL; 630 } 631} 632 633/******************************************************************************* 634** 635** Function btif_hh_connect 636** 637** Description connection initiated from the BTIF thread context 638** 639** Returns int status 640** 641*******************************************************************************/ 642 643bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr) 644{ 645 btif_hh_device_t *dev; 646 btif_hh_added_device_t *added_dev = NULL; 647 char bda_str[20]; 648 int i; 649 BD_ADDR *bda = (BD_ADDR*)bd_addr; 650 tBTA_HH_CONN conn; 651 CHECK_BTHH_INIT(); 652 dev = btif_hh_find_dev_by_bda(bd_addr); 653 BTIF_TRACE_DEBUG0("Connect _hh"); 654 sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X", 655 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 656 if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) { 657 // No space for more HID device now. 658 BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d", 659 __FUNCTION__, BTIF_HH_MAX_HID); 660 return BT_STATUS_FAIL; 661 } 662 663 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 664 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) { 665 added_dev = &btif_hh_cb.added_devices[i]; 666 BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x", 667 __FUNCTION__, bda_str, added_dev->attr_mask); 668 } 669 } 670 671 if (added_dev != NULL) { 672 if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) { 673 // No space for more HID device now. 674 BTIF_TRACE_ERROR2("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str); 675 memset(&(added_dev->bd_addr), 0, 6); 676 added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 677 return BT_STATUS_FAIL; 678 } 679 } 680 681 if (added_dev == NULL || 682 (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 || 683 (added_dev->attr_mask & HID_RECONN_INIT) == 0) 684 { 685 tBTA_SEC sec_mask = BTUI_HH_SECURITY; 686 btif_hh_cb.status = BTIF_HH_DEV_CONNECTING; 687 BD_ADDR *bda = (BD_ADDR*)bd_addr; 688 BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask); 689 } 690 else 691 { 692 // This device shall be connected from the host side. 693 BTIF_TRACE_ERROR2("%s: Error, device %s can only be reconnected from device side", 694 __FUNCTION__, bda_str); 695 return BT_STATUS_FAIL; 696 } 697 698 HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING); 699 return BT_STATUS_SUCCESS; 700} 701 702/******************************************************************************* 703** 704** Function btif_hh_disconnect 705** 706** Description disconnection initiated from the BTIF thread context 707** 708** Returns void 709** 710*******************************************************************************/ 711 712void btif_hh_disconnect(bt_bdaddr_t *bd_addr) 713{ 714 BD_ADDR *bda = (BD_ADDR*)bd_addr; 715 btif_hh_device_t *p_dev; 716 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 717 if (p_dev != NULL) 718 { 719 BTA_HhClose(p_dev->dev_handle); 720 } 721 else 722 BTIF_TRACE_DEBUG1("%s-- Error: device not connected:",__FUNCTION__); 723} 724 725/******************************************************************************* 726** 727** Function btif_btif_hh_setreport 728** 729** Description setreport initiated from the BTIF thread context 730** 731** Returns void 732** 733*******************************************************************************/ 734void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size, 735 UINT8* report) 736{ 737 BT_HDR* p_buf = create_pbuf(size, report); 738 if (p_buf == NULL) { 739 APPL_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, size = %d", __FUNCTION__, size); 740 return; 741 } 742 BTA_HhSetReport(p_dev->dev_handle, r_type, p_buf); 743} 744 745/***************************************************************************** 746** Section name (Group of functions) 747*****************************************************************************/ 748 749/***************************************************************************** 750** 751** btif hh api functions (no context switch) 752** 753*****************************************************************************/ 754 755 756/******************************************************************************* 757** 758** Function btif_hh_upstreams_evt 759** 760** Description Executes HH UPSTREAMS events in btif context 761** 762** Returns void 763** 764*******************************************************************************/ 765static void btif_hh_upstreams_evt(UINT16 event, char* p_param) 766{ 767 tBTA_HH *p_data = (tBTA_HH *)p_param; 768 bdstr_t bdstr; 769 btif_hh_device_t *p_dev = NULL; 770 int i; 771 int len, tmplen; 772 773 BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event)); 774 775 switch (event) 776 { 777 case BTA_HH_ENABLE_EVT: 778 BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status); 779 if (p_data->status == BTA_HH_OK) { 780 btif_hh_cb.status = BTIF_HH_ENABLED; 781 BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__); 782 /* Add hid descriptors for already bonded hid devices*/ 783 btif_storage_load_bonded_hid_info(); 784 } 785 else { 786 btif_hh_cb.status = BTIF_HH_DISABLED; 787 BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status); 788 } 789 break; 790 791 case BTA_HH_DISABLE_EVT: 792 btif_hh_cb.status = BTIF_HH_DISABLED; 793 if (p_data->status == BTA_HH_OK) { 794 int i; 795 //Clear the control block 796 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 797 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 798 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 799 } 800 } 801 else 802 BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status); 803 break; 804 805 case BTA_HH_OPEN_EVT: 806 BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status); 807 if (p_data->conn.status == BTA_HH_OK) { 808 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 809 if (p_dev == NULL) { 810 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle); 811 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 812 // The connect request must come from device side and exceeded the connected 813 // HID device number. 814 BTA_HhClose(p_data->conn.handle); 815 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 816 } 817 else if (p_dev->fd < 0) { 818 BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver..."); 819 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 820 //remove the connection and then try again to reconnect from the mouse side to recover 821 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 822 BTA_HhClose(p_data->conn.handle); 823 } 824 else { 825 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle); 826 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 827 btif_hh_cb.status = BTIF_HH_DEV_CONNECTED; 828 // Send set_idle if the peer_device is a keyboard 829 if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )|| 830 check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO)) 831 BTA_HhSetIdle(p_data->conn.handle, 0); 832 btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 833 BTA_HhGetDscpInfo(p_data->conn.handle); 834 p_dev->dev_status = BTHH_CONN_STATE_CONNECTED; 835 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 836 } 837 } 838 else { 839 bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda; 840 btif_dm_hh_open_failed(bdaddr); 841 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 842 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 843 } 844 break; 845 case BTA_HH_CLOSE_EVT: 846 BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d", 847 p_data->dev_status.status, p_data->dev_status.handle); 848 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 849 if (p_dev != NULL) { 850 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 851 if(p_dev->vup_timer_active) 852 { 853 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 854 } 855 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 856 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 857 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 858 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 859 bta_hh_co_destroy(p_dev->fd); 860 p_dev->fd = -1; 861 } 862 else { 863 BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle); 864 } 865 break; 866 case BTA_HH_GET_RPT_EVT: { 867 BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data; 868 UINT8 *data = NULL; 869 UINT16 len = 0; 870 871 BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d", 872 p_data->hs_data.status, p_data->hs_data.handle); 873 /* p_rpt_data in HANDSHAKE response case */ 874 if (hdr) { 875 data = (UINT8 *)(hdr + 1) + hdr->offset; 876 len = hdr->len; 877 } 878 p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle); 879 if (p_dev) { 880 HAL_CBACK(bt_hh_callbacks, get_report_cb, 881 (bt_bdaddr_t*) &(p_dev->bd_addr), 882 (bthh_status_t) p_data->hs_data.status, data, len); 883 } else { 884 BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->hs_data.handle); 885 } 886 break; 887 } 888 case BTA_HH_SET_RPT_EVT: 889 BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d", 890 p_data->dev_status.status, p_data->dev_status.handle); 891 break; 892 893 case BTA_HH_GET_PROTO_EVT: 894 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 895 BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s", 896 p_data->hs_data.status, p_data->hs_data.handle, 897 p_data->hs_data.rsp_data.proto_mode, 898 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" : 899 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported"); 900 HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t)p_data->hs_data.status, 901 (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode); 902 break; 903 904 case BTA_HH_SET_PROTO_EVT: 905 BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d", 906 p_data->dev_status.status, p_data->dev_status.handle); 907 break; 908 909 case BTA_HH_GET_IDLE_EVT: 910 BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d", 911 p_data->hs_data.handle, p_data->hs_data.status, 912 p_data->hs_data.rsp_data.idle_rate); 913 break; 914 915 case BTA_HH_SET_IDLE_EVT: 916 BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d", 917 p_data->dev_status.status, p_data->dev_status.handle); 918 break; 919 920 case BTA_HH_GET_DSCP_EVT: 921 BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d", 922 p_data->dev_status.status, p_data->dev_status.handle); 923 len = p_data->dscp_info.descriptor.dl_len; 924 BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len); 925 p_dev = btif_hh_cb.p_curr_dev; 926 if (p_dev == NULL) { 927 BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected"); 928 return; 929 } 930 if (p_dev->fd < 0) { 931 ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver..."); 932 return; 933 } 934 { 935 char *cached_name = NULL; 936 bt_bdname_t bdname; 937 bt_property_t prop_name; 938 BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME, 939 sizeof(bt_bdname_t), &bdname); 940 if (btif_storage_get_remote_device_property( 941 &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS) 942 { 943 cached_name = (char *)bdname.name; 944 } 945 else 946 { 947 cached_name = "Bluetooth HID"; 948 } 949 950 BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name); 951 bta_hh_co_send_hid_info(p_dev, cached_name, 952 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 953 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 954 len, p_data->dscp_info.descriptor.dsc_list); 955 if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) { 956 BD_ADDR bda; 957 bdcpy(bda, p_dev->bd_addr.address); 958 tBTA_HH_DEV_DSCP_INFO dscp_info; 959 bt_status_t ret; 960 bdcpy(bda, p_dev->bd_addr.address); 961 btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info); 962 BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 963 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 964 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 965 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 966 BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info); 967 // write hid info to nvram 968 ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, 969 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 970 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 971 p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout, 972 len, p_data->dscp_info.descriptor.dsc_list); 973 974 ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret); 975 BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device"); 976 977 //Free buffer created for dscp_info; 978 if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL) 979 { 980 GKI_freebuf(dscp_info.descriptor.dsc_list); 981 dscp_info.descriptor.dsc_list = NULL; 982 dscp_info.descriptor.dl_len=0; 983 } 984 } 985 else { 986 //Device already added. 987 BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__); 988 } 989 /*Sync HID Keyboard lockstates */ 990 tmplen = sizeof(hid_kb_numlock_on_list) 991 / sizeof(tHID_KB_LIST); 992 for(i = 0; i< tmplen; i++) 993 { 994 if(p_data->dscp_info.vendor_id 995 == hid_kb_numlock_on_list[i].version_id && 996 p_data->dscp_info.product_id 997 == hid_kb_numlock_on_list[i].product_id) 998 { 999 BTIF_TRACE_DEBUG3("%s() idx[%d] Enabling "\ 1000 "NUMLOCK for device :: %s", __FUNCTION__, 1001 i, hid_kb_numlock_on_list[i].kb_name); 1002 /* Enable NUMLOCK by default so that numeric 1003 keys work from first keyboard connect */ 1004 set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK, 1005 TRUE); 1006 sync_lockstate_on_connect(p_dev); 1007 /* End Sync HID Keyboard lockstates */ 1008 break; 1009 } 1010 } 1011 } 1012 break; 1013 1014 case BTA_HH_ADD_DEV_EVT: 1015 BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle); 1016 int i; 1017 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 1018 if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) { 1019 if (p_data->dev_info.status == BTA_HH_OK) { 1020 btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle; 1021 } 1022 else { 1023 memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6); 1024 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 1025 } 1026 break; 1027 } 1028 } 1029 break; 1030 case BTA_HH_RMV_DEV_EVT: 1031 BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d", 1032 p_data->dev_info.status, p_data->dev_info.handle); 1033 BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1034 p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2], 1035 p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]); 1036 break; 1037 1038 1039 case BTA_HH_VC_UNPLUG_EVT: 1040 BTIF_TRACE_DEBUG2("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d", 1041 p_data->dev_status.status, p_data->dev_status.handle); 1042 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 1043 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 1044 if (p_dev != NULL) { 1045 BTIF_TRACE_DEBUG6("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1046 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 1047 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 1048 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 1049 /* Stop the VUP timer */ 1050 if(p_dev->vup_timer_active) 1051 { 1052 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 1053 } 1054 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 1055 BTIF_TRACE_DEBUG1("%s---Sending connection state change", __FUNCTION__); 1056 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 1057 BTIF_TRACE_DEBUG1("%s---Removing HID bond", __FUNCTION__); 1058 /* If it is locally initiated VUP or remote device has its major COD as 1059 Peripheral removed the bond.*/ 1060 if (p_dev->local_vup || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR)) 1061 { 1062 p_dev->local_vup = FALSE; 1063 BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address); 1064 } 1065 else 1066 btif_hh_remove_device(p_dev->bd_addr); 1067 HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr), 1068 p_data->dev_status.status); 1069 } 1070 break; 1071 1072 case BTA_HH_API_ERR_EVT : 1073 ALOGI("BTA_HH API_ERR"); 1074 break; 1075 1076 1077 1078 default: 1079 BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event); 1080 break; 1081 } 1082} 1083 1084/******************************************************************************* 1085** 1086** Function bte_hh_evt 1087** 1088** Description Switches context from BTE to BTIF for all HH events 1089** 1090** Returns void 1091** 1092*******************************************************************************/ 1093 1094static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data) 1095{ 1096 bt_status_t status; 1097 int param_len = 0; 1098 1099 if (BTA_HH_ENABLE_EVT == event) 1100 param_len = sizeof(tBTA_HH_STATUS); 1101 else if (BTA_HH_OPEN_EVT == event) 1102 param_len = sizeof(tBTA_HH_CONN); 1103 else if (BTA_HH_DISABLE_EVT == event) 1104 param_len = sizeof(tBTA_HH_STATUS); 1105 else if (BTA_HH_CLOSE_EVT == event) 1106 param_len = sizeof(tBTA_HH_CBDATA); 1107 else if (BTA_HH_GET_DSCP_EVT == event) 1108 param_len = sizeof(tBTA_HH_DEV_DSCP_INFO); 1109 else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event)) 1110 param_len = sizeof(tBTA_HH_HSDATA); 1111 else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event)) 1112 param_len = sizeof(tBTA_HH_CBDATA); 1113 else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) ) 1114 param_len = sizeof(tBTA_HH_DEV_INFO); 1115 else if (BTA_HH_API_ERR_EVT == event) 1116 param_len = 0; 1117 /* switch context to btif task context (copy full union size for convenience) */ 1118 status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL); 1119 1120 /* catch any failed context transfers */ 1121 ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status); 1122} 1123 1124/******************************************************************************* 1125** 1126** Function btif_hh_handle_evt 1127** 1128** Description Switches context for immediate callback 1129** 1130** Returns void 1131** 1132*******************************************************************************/ 1133 1134static void btif_hh_handle_evt(UINT16 event, char *p_param) 1135{ 1136 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; 1137 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1138 int ret; 1139 switch(event) 1140 { 1141 case BTIF_HH_CONNECT_REQ_EVT: 1142 { 1143 ret = btif_hh_connect(bd_addr); 1144 if(ret == BT_STATUS_SUCCESS) 1145 { 1146 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING); 1147 } 1148 else 1149 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED); 1150 } 1151 break; 1152 1153 case BTIF_HH_DISCONNECT_REQ_EVT: 1154 { 1155 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1156 btif_hh_disconnect(bd_addr); 1157 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING); 1158 } 1159 break; 1160 1161 case BTIF_HH_VUP_REQ_EVT: 1162 { 1163 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1164 ret = btif_hh_virtual_unplug(bd_addr); 1165 } 1166 break; 1167 1168 default: 1169 { 1170 BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event); 1171 } 1172 break; 1173 } 1174} 1175 1176/******************************************************************************* 1177** 1178** Function btif_hh_tmr_hdlr 1179** 1180** Description Process timer timeout 1181** 1182** Returns void 1183*******************************************************************************/ 1184void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle) 1185{ 1186 btif_hh_device_t *p_dev; 1187 UINT8 i,j; 1188 tBTA_HH_EVT event; 1189 tBTA_HH p_data; 1190 int param_len = 0; 1191 memset(&p_data, 0, sizeof(tBTA_HH)); 1192 1193 BTIF_TRACE_DEBUG2("%s timer_in_use=%d", __FUNCTION__, tle->in_use ); 1194 1195 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1196 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED) 1197 { 1198 1199 p_dev = &btif_hh_cb.devices[i]; 1200 1201 if (p_dev->vup_timer_active) 1202 { 1203 p_dev->vup_timer_active = FALSE; 1204 event = BTA_HH_VC_UNPLUG_EVT; 1205 p_data.dev_status.status = BTHH_ERR; 1206 p_data.dev_status.handle = p_dev->dev_handle; 1207 param_len = sizeof(tBTA_HH_CBDATA); 1208 1209 /* switch context to btif task context */ 1210 btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data, 1211 param_len, NULL); 1212 } 1213 } 1214 } 1215} 1216 1217/******************************************************************************* 1218** 1219** Function btif_hh_init 1220** 1221** Description initializes the hh interface 1222** 1223** Returns bt_status_t 1224** 1225*******************************************************************************/ 1226static bt_status_t init( bthh_callbacks_t* callbacks ) 1227{ 1228 UINT32 i; 1229 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1230 1231 bt_hh_callbacks = callbacks; 1232 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 1233 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 1234 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 1235 } 1236 /* Invoke the enable service API to the core to set the appropriate service_id */ 1237 btif_enable_service(BTA_HID_SERVICE_ID); 1238 return BT_STATUS_SUCCESS; 1239} 1240 1241/******************************************************************************* 1242** 1243** Function connect 1244** 1245** Description connect to hid device 1246** 1247** Returns bt_status_t 1248** 1249*******************************************************************************/ 1250static bt_status_t connect( bt_bdaddr_t *bd_addr) 1251{ 1252 if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) 1253 { 1254 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT, 1255 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1256 return BT_STATUS_SUCCESS; 1257 } 1258 else 1259 return BT_STATUS_BUSY; 1260} 1261 1262/******************************************************************************* 1263** 1264** Function disconnect 1265** 1266** Description disconnect from hid device 1267** 1268** Returns bt_status_t 1269** 1270*******************************************************************************/ 1271static bt_status_t disconnect( bt_bdaddr_t *bd_addr ) 1272{ 1273 CHECK_BTHH_INIT(); 1274 btif_hh_device_t *p_dev; 1275 1276 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1277 { 1278 BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1279 return BT_STATUS_FAIL; 1280 } 1281 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1282 if (p_dev != NULL) 1283 { 1284 return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT, 1285 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1286 } 1287 else 1288 { 1289 BTIF_TRACE_WARNING1("%s: Error, device not opened.", __FUNCTION__); 1290 return BT_STATUS_FAIL; 1291 } 1292} 1293 1294/******************************************************************************* 1295** 1296** Function virtual_unplug 1297** 1298** Description Virtual UnPlug (VUP) the specified HID device. 1299** 1300** Returns bt_status_t 1301** 1302*******************************************************************************/ 1303static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr) 1304{ 1305 CHECK_BTHH_INIT(); 1306 btif_hh_device_t *p_dev; 1307 char bd_str[18]; 1308 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 1309 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 1310 bd_addr->address[4], bd_addr->address[5]); 1311 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1312 { 1313 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1314 return BT_STATUS_FAIL; 1315 } 1316 p_dev = btif_hh_find_dev_by_bda(bd_addr); 1317 if (!p_dev) 1318 { 1319 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 1320 return BT_STATUS_FAIL; 1321 } 1322 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT, 1323 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1324 return BT_STATUS_SUCCESS; 1325} 1326 1327 1328/******************************************************************************* 1329** 1330** Function set_info 1331** 1332** Description Set the HID device descriptor for the specified HID device. 1333** 1334** Returns bt_status_t 1335** 1336*******************************************************************************/ 1337static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) 1338{ 1339 CHECK_BTHH_INIT(); 1340 tBTA_HH_DEV_DSCP_INFO dscp_info; 1341 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1342 1343 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1344 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1345 BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, " 1346 "product_id = 0x%04x, version= 0x%04x", 1347 __FUNCTION__, hid_info.sub_class, 1348 hid_info.app_id, hid_info.vendor_id, hid_info.product_id, 1349 hid_info.version); 1350 1351 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1352 { 1353 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1354 return BT_STATUS_FAIL; 1355 } 1356 1357 dscp_info.vendor_id = hid_info.vendor_id; 1358 dscp_info.product_id = hid_info.product_id; 1359 dscp_info.version = hid_info.version; 1360 dscp_info.ctry_code = hid_info.ctry_code; 1361 1362 dscp_info.descriptor.dl_len = hid_info.dl_len; 1363 dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len); 1364 if (dscp_info.descriptor.dsc_list == NULL) 1365 { 1366 ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__); 1367 return BT_STATUS_FAIL; 1368 } 1369 memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len); 1370 1371 if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask)) 1372 { 1373 BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class, 1374 hid_info.app_id, dscp_info); 1375 } 1376 1377 GKI_freebuf(dscp_info.descriptor.dsc_list); 1378 1379 return BT_STATUS_SUCCESS; 1380} 1381/******************************************************************************* 1382** 1383** Function get_idle_time 1384** 1385** Description Get the HID idle time 1386** 1387** Returns bt_status_t 1388** 1389*******************************************************************************/ 1390static bt_status_t get_idle_time(bt_bdaddr_t *bd_addr) 1391{ 1392 CHECK_BTHH_INIT(); 1393 btif_hh_device_t *p_dev; 1394 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1395 1396 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X", 1397 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1398 1399 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1400 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1401 return BT_STATUS_FAIL; 1402 } 1403 1404 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1405 if (p_dev != NULL) { 1406 //BTA_HhGetIdle(p_dev->dev_handle); 1407 } 1408 else { 1409 return BT_STATUS_FAIL; 1410 } 1411 return BT_STATUS_SUCCESS; 1412} 1413 1414/******************************************************************************* 1415** 1416** Function set_idle_time 1417** 1418** Description Set the HID idle time 1419** 1420** Returns bt_status_t 1421** 1422*******************************************************************************/ 1423static bt_status_t set_idle_time (bt_bdaddr_t *bd_addr, uint8_t idle_time) 1424{ 1425 UNUSED(idle_time); 1426 1427 CHECK_BTHH_INIT(); 1428 btif_hh_device_t *p_dev; 1429 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1430 1431 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1432 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1433 1434 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1435 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1436 return BT_STATUS_FAIL; 1437 } 1438 1439 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1440 if (p_dev == NULL) { 1441 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1442 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1443 return BT_STATUS_FAIL; 1444 } 1445 else { 1446 //BTA_HhSetIdle(p_dev->dev_handle, idle_time); 1447 } 1448 return BT_STATUS_SUCCESS; 1449} 1450 1451/******************************************************************************* 1452** 1453** Function get_protocol 1454** 1455** Description Get the HID proto mode. 1456** 1457** Returns bt_status_t 1458** 1459*******************************************************************************/ 1460static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1461{ 1462 CHECK_BTHH_INIT(); 1463 btif_hh_device_t *p_dev; 1464 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1465 UNUSED(protocolMode); 1466 1467 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X", 1468 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1469 1470 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1471 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1472 return BT_STATUS_FAIL; 1473 } 1474 1475 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1476 if (p_dev != NULL) { 1477 1478 BTA_HhGetProtoMode(p_dev->dev_handle); 1479 } 1480 else { 1481 return BT_STATUS_FAIL; 1482 } 1483 return BT_STATUS_SUCCESS; 1484} 1485 1486/******************************************************************************* 1487** 1488** Function set_protocol 1489** 1490** Description Set the HID proto mode. 1491** 1492** Returns bt_status_t 1493** 1494*******************************************************************************/ 1495static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1496{ 1497 CHECK_BTHH_INIT(); 1498 btif_hh_device_t *p_dev; 1499 UINT8 proto_mode = protocolMode; 1500 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1501 1502 BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode); 1503 1504 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1505 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1506 1507 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1508 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1509 return BT_STATUS_FAIL; 1510 } 1511 1512 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1513 if (p_dev == NULL) { 1514 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1515 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1516 return BT_STATUS_FAIL; 1517 } 1518 else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) { 1519 BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode); 1520 return BT_STATUS_FAIL; 1521 } 1522 else { 1523 BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode); 1524 } 1525 1526 1527 return BT_STATUS_SUCCESS; 1528} 1529 1530/******************************************************************************* 1531** 1532** Function get_report 1533** 1534** Description Send a GET_REPORT to HID device. 1535** 1536** Returns bt_status_t 1537** 1538*******************************************************************************/ 1539static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) 1540{ 1541 CHECK_BTHH_INIT(); 1542 btif_hh_device_t *p_dev; 1543 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1544 1545 BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__, 1546 reportType, reportId, bufferSize); 1547 1548 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1549 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1550 1551 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1552 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1553 return BT_STATUS_FAIL; 1554 } 1555 1556 1557 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1558 if (p_dev == NULL) { 1559 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1560 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1561 return BT_STATUS_FAIL; 1562 } 1563 else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) { 1564 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1565 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1566 return BT_STATUS_FAIL; 1567 } 1568 else { 1569 BTA_HhGetReport(p_dev->dev_handle, reportType, 1570 reportId, bufferSize); 1571 } 1572 1573 return BT_STATUS_SUCCESS; 1574} 1575 1576/******************************************************************************* 1577** 1578** Function set_report 1579** 1580** Description Send a SET_REPORT to HID device. 1581** 1582** Returns bt_status_t 1583** 1584*******************************************************************************/ 1585static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) 1586{ 1587 CHECK_BTHH_INIT(); 1588 btif_hh_device_t *p_dev; 1589 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1590 1591 BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType); 1592 1593 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1594 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1595 1596 1597 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1598 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1599 return BT_STATUS_FAIL; 1600 } 1601 1602 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1603 if (p_dev == NULL) { 1604 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1605 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1606 return BT_STATUS_FAIL; 1607 } 1608 else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) { 1609 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1610 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1611 return BT_STATUS_FAIL; 1612 } 1613 else { 1614 int hex_bytes_filled; 1615 UINT8 *hexbuf; 1616 UINT16 len = (strlen(report) + 1) / 2; 1617 1618 hexbuf = GKI_getbuf(len); 1619 if (hexbuf == NULL) { 1620 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", 1621 __FUNCTION__, len); 1622 return BT_STATUS_FAIL; 1623 } 1624 1625 /* Build a SetReport data buffer */ 1626 memset(hexbuf, 0, len); 1627 //TODO 1628 hex_bytes_filled = ascii_2_hex(report, len, hexbuf); 1629 ALOGI("Hex bytes filled, hex value: %d", hex_bytes_filled); 1630 if (hex_bytes_filled) { 1631 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf); 1632 if (p_buf == NULL) { 1633 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", 1634 __FUNCTION__, hex_bytes_filled); 1635 GKI_freebuf(hexbuf); 1636 return BT_STATUS_FAIL; 1637 } 1638 BTA_HhSetReport(p_dev->dev_handle, reportType, p_buf); 1639 GKI_freebuf(hexbuf); 1640 return BT_STATUS_SUCCESS; 1641 } 1642 GKI_freebuf(hexbuf); 1643 return BT_STATUS_FAIL; 1644 } 1645} 1646 1647/******************************************************************************* 1648** 1649** Function send_data 1650** 1651** Description Send a SEND_DATA to HID device. 1652** 1653** Returns bt_status_t 1654** 1655*******************************************************************************/ 1656static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data) 1657{ 1658 CHECK_BTHH_INIT(); 1659 btif_hh_device_t *p_dev; 1660 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1661 1662 BTIF_TRACE_DEBUG1("%s", __FUNCTION__); 1663 1664 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1665 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1666 1667 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1668 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1669 return BT_STATUS_FAIL; 1670 } 1671 1672 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1673 if (p_dev == NULL) { 1674 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1675 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1676 return BT_STATUS_FAIL; 1677 } 1678 1679 else { 1680 int hex_bytes_filled; 1681 UINT8 *hexbuf; 1682 UINT16 len = (strlen(data) + 1) / 2; 1683 1684 hexbuf = GKI_getbuf(len); 1685 if (hexbuf == NULL) { 1686 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", 1687 __FUNCTION__, len); 1688 return BT_STATUS_FAIL; 1689 } 1690 1691 /* Build a SendData data buffer */ 1692 memset(hexbuf, 0, len); 1693 hex_bytes_filled = ascii_2_hex(data, len, hexbuf); 1694 BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len); 1695 1696 if (hex_bytes_filled) { 1697 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf); 1698 if (p_buf == NULL) { 1699 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", 1700 __FUNCTION__, hex_bytes_filled); 1701 GKI_freebuf(hexbuf); 1702 return BT_STATUS_FAIL; 1703 } 1704 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 1705 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf); 1706 GKI_freebuf(hexbuf); 1707 return BT_STATUS_SUCCESS; 1708 } 1709 GKI_freebuf(hexbuf); 1710 return BT_STATUS_FAIL; 1711 } 1712} 1713 1714 1715/******************************************************************************* 1716** 1717** Function cleanup 1718** 1719** Description Closes the HH interface 1720** 1721** Returns bt_status_t 1722** 1723*******************************************************************************/ 1724static void cleanup( void ) 1725{ 1726 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1727 btif_hh_device_t *p_dev; 1728 int i; 1729 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1730 BTIF_TRACE_WARNING2("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status); 1731 return; 1732 } 1733 btif_hh_cb.status = BTIF_HH_DISABLING; 1734 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1735 p_dev = &btif_hh_cb.devices[i]; 1736 if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) { 1737 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 1738 bta_hh_co_destroy(p_dev->fd); 1739 p_dev->fd = -1; 1740 p_dev->hh_keep_polling = 0; 1741 p_dev->hh_poll_thread_id = -1; 1742 } 1743 } 1744 1745 if (bt_hh_callbacks) 1746 { 1747 btif_disable_service(BTA_HID_SERVICE_ID); 1748 bt_hh_callbacks = NULL; 1749 } 1750 1751} 1752 1753static const bthh_interface_t bthhInterface = { 1754 sizeof(bthhInterface), 1755 init, 1756 connect, 1757 disconnect, 1758 virtual_unplug, 1759 set_info, 1760 get_protocol, 1761 set_protocol, 1762// get_idle_time, 1763// set_idle_time, 1764 get_report, 1765 set_report, 1766 send_data, 1767 cleanup, 1768}; 1769 1770/******************************************************************************* 1771** 1772** Function btif_hh_execute_service 1773** 1774** Description Initializes/Shuts down the service 1775** 1776** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise 1777** 1778*******************************************************************************/ 1779bt_status_t btif_hh_execute_service(BOOLEAN b_enable) 1780{ 1781 if (b_enable) 1782 { 1783 /* Enable and register with BTA-HH */ 1784 BTA_HhEnable(BTA_SEC_NONE, bte_hh_evt); 1785 } 1786 else { 1787 /* Disable HH */ 1788 BTA_HhDisable(); 1789 } 1790 return BT_STATUS_SUCCESS; 1791} 1792 1793/******************************************************************************* 1794** 1795** Function btif_hh_get_interface 1796** 1797** Description Get the hh callback interface 1798** 1799** Returns bthh_interface_t 1800** 1801*******************************************************************************/ 1802const bthh_interface_t *btif_hh_get_interface() 1803{ 1804 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1805 return &bthhInterface; 1806} 1807