btif_hh.c revision 104e3f238f500cacdb8afaccdc672dfc34eae7ee
1/****************************************************************************** 2 * 3 * Copyright (C) 2009-2012 Broadcom Corporation 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at: 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 ******************************************************************************/ 18 19/************************************************************************************ 20 * 21 * Filename: btif_hh.c 22 * 23 * Description: HID Host Profile Bluetooth Interface 24 * 25 * 26 ***********************************************************************************/ 27#include <hardware/bluetooth.h> 28#include <hardware/bt_hh.h> 29#include <stdio.h> 30#include <stdlib.h> 31#include <errno.h> 32#include <string.h> 33 34#define LOG_TAG "BTIF_HH" 35 36#include "bta_api.h" 37#include "bta_hh_api.h" 38#include "bd.h" 39#include "btif_storage.h" 40 41#include "btif_common.h" 42#include "btif_util.h" 43#include "btif_hh.h" 44#include "gki.h" 45#include "l2c_api.h" 46 47 48#define BTIF_HH_APP_ID_MI 0x01 49#define BTIF_HH_APP_ID_KB 0x02 50 51#define COD_HID_KEYBOARD 0x0540 52#define COD_HID_POINTING 0x0580 53#define COD_HID_COMBO 0x05C0 54#define COD_HID_MAJOR 0x0500 55 56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni 57 58#define HID_REPORT_CAPSLOCK 0x39 59#define HID_REPORT_NUMLOCK 0x53 60#define HID_REPORT_SCROLLLOCK 0x47 61 62//For Apple Magic Mouse 63#define MAGICMOUSE_VENDOR_ID 0x05ac 64#define MAGICMOUSE_PRODUCT_ID 0x030d 65 66#define LOGITECH_KB_MX5500_VENDOR_ID 0x046D 67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B 68 69extern const int BT_UID; 70extern const int BT_GID; 71static int btif_hh_keylockstates=0; //The current key state of each key 72 73#define BTIF_HH_ID_1 0 74#define BTIF_HH_DEV_DISCONNECTED 3 75 76#define BTIF_TIMEOUT_VUP_SECS 3 77 78 79#ifndef BTUI_HH_SECURITY 80#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT) 81#endif 82 83#ifndef BTUI_HH_MOUSE_SECURITY 84#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE) 85#endif 86 87/* HH request events */ 88typedef enum 89{ 90 BTIF_HH_CONNECT_REQ_EVT = 0, 91 BTIF_HH_DISCONNECT_REQ_EVT, 92 BTIF_HH_VUP_REQ_EVT 93} btif_hh_req_evt_t; 94 95 96/************************************************************************************ 97** Constants & Macros 98************************************************************************************/ 99#define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK) 100 101 102 103/************************************************************************************ 104** Local type definitions 105************************************************************************************/ 106 107typedef struct hid_kb_list 108{ 109 UINT16 product_id; 110 UINT16 version_id; 111 char* kb_name; 112} tHID_KB_LIST; 113 114/************************************************************************************ 115** Static variables 116************************************************************************************/ 117btif_hh_cb_t btif_hh_cb; 118 119static bthh_callbacks_t *bt_hh_callbacks = NULL; 120 121/* List of HID keyboards for which the NUMLOCK state needs to be 122 * turned ON by default. Add devices to this list to apply the 123 * NUMLOCK state toggle on fpr first connect.*/ 124static tHID_KB_LIST hid_kb_numlock_on_list[] = 125{ 126 {LOGITECH_KB_MX5500_PRODUCT_ID, 127 LOGITECH_KB_MX5500_VENDOR_ID, 128 "Logitech MX5500 Keyboard"} 129}; 130 131 132#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\ 133 {\ 134 BTIF_TRACE_WARNING("BTHH: %s: BTHH not initialized", __FUNCTION__);\ 135 return BT_STATUS_NOT_READY;\ 136 }\ 137 else\ 138 {\ 139 BTIF_TRACE_EVENT("BTHH: %s", __FUNCTION__);\ 140 } 141 142 143 144/************************************************************************************ 145** Static functions 146************************************************************************************/ 147 148/************************************************************************************ 149** Externs 150************************************************************************************/ 151extern void bta_hh_co_destroy(int fd); 152extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len); 153extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 154extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id, 155 UINT16 product_id, UINT16 version, UINT8 ctry_code, 156 int dscp_len, UINT8 *p_dscp); 157extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 158extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 159extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 160extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex); 161extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr); 162 163/***************************************************************************** 164** Local Function prototypes 165*****************************************************************************/ 166static void set_keylockstate(int keymask, BOOLEAN isSet); 167static void toggle_os_keylockstates(int fd, int changedkeystates); 168static void sync_lockstate_on_connect(btif_hh_device_t *p_dev); 169//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev); 170void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle); 171 172 173/************************************************************************************ 174** Functions 175************************************************************************************/ 176 177static int get_keylockstates() 178{ 179 return btif_hh_keylockstates; 180} 181 182static void set_keylockstate(int keymask, BOOLEAN isSet) 183{ 184 if(isSet) 185 btif_hh_keylockstates |= keymask; 186} 187 188/******************************************************************************* 189** 190** Function toggle_os_keylockstates 191** 192** Description Function to toggle the keyboard lock states managed by the linux. 193** This function is used in by two call paths 194** (1) if the lock state change occurred from an onscreen keyboard, 195** this function is called to update the lock state maintained 196 for the HID keyboard(s) 197** (2) if a HID keyboard is disconnected and reconnected, 198** this function is called to update the lock state maintained 199 for the HID keyboard(s) 200** Returns void 201*******************************************************************************/ 202 203static void toggle_os_keylockstates(int fd, int changedlockstates) 204{ 205 BTIF_TRACE_EVENT("%s: fd = %d, changedlockstates = 0x%x", 206 __FUNCTION__, fd, changedlockstates); 207 UINT8 hidreport[9]; 208 int reportIndex; 209 memset(hidreport,0,9); 210 hidreport[0]=1; 211 reportIndex=4; 212 213 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) { 214 BTIF_TRACE_DEBUG("%s Setting CAPSLOCK", __FUNCTION__); 215 hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK; 216 } 217 218 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK) { 219 BTIF_TRACE_DEBUG("%s Setting NUMLOCK", __FUNCTION__); 220 hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK; 221 } 222 223 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) { 224 BTIF_TRACE_DEBUG("%s Setting SCROLLLOCK", __FUNCTION__); 225 hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK; 226 } 227 228 BTIF_TRACE_DEBUG("Writing hidreport #1 to os: "\ 229 "%s: %x %x %x", __FUNCTION__, 230 hidreport[0], hidreport[1], hidreport[2]); 231 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__, 232 hidreport[3], hidreport[4], hidreport[5]); 233 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__, 234 hidreport[6], hidreport[7], hidreport[8]); 235 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 236 usleep(200000); 237 memset(hidreport,0,9); 238 hidreport[0]=1; 239 BTIF_TRACE_DEBUG("Writing hidreport #2 to os: "\ 240 "%s: %x %x %x", __FUNCTION__, 241 hidreport[0], hidreport[1], hidreport[2]); 242 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__, 243 hidreport[3], hidreport[4], hidreport[5]); 244 BTIF_TRACE_DEBUG("%s: %x %x %x ", __FUNCTION__, 245 hidreport[6], hidreport[7], hidreport[8]); 246 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 247} 248 249/******************************************************************************* 250** 251** Function create_pbuf 252** 253** Description Helper function to create p_buf for send_data or set_report 254** 255*******************************************************************************/ 256static BT_HDR *create_pbuf(UINT16 len, UINT8 *data) 257{ 258 BT_HDR* p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR))); 259 260 if (p_buf) { 261 UINT8* pbuf_data; 262 263 p_buf->len = len; 264 p_buf->offset = BTA_HH_MIN_OFFSET; 265 266 pbuf_data = (UINT8*) (p_buf + 1) + p_buf->offset; 267 memcpy(pbuf_data, data, len); 268 } 269 return p_buf; 270} 271 272/******************************************************************************* 273** 274** Function update_keyboard_lockstates 275** 276** Description Sends a report to the keyboard to set the lock states of keys 277** 278*******************************************************************************/ 279static void update_keyboard_lockstates(btif_hh_device_t *p_dev) 280{ 281 UINT8 len = 2; /* reportid + 1 byte report*/ 282 BD_ADDR* bda; 283 BT_HDR* p_buf; 284 UINT8 data[] = {0x01, /* report id */ 285 btif_hh_keylockstates}; /* keystate */ 286 287 /* Set report for other keyboards */ 288 BTIF_TRACE_EVENT("%s: setting report on dev_handle %d to 0x%x", 289 __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates); 290 291 /* Get SetReport buffer */ 292 p_buf = create_pbuf(len, data); 293 if (p_buf != NULL) { 294 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 295 bda = (BD_ADDR*) (&p_dev->bd_addr); 296 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf); 297 } 298} 299 300/******************************************************************************* 301** 302** Function sync_lockstate_on_connect 303** 304** Description Function to update the keyboard lock states managed by the OS 305** when a HID keyboard is connected or disconnected and reconnected 306** Returns void 307*******************************************************************************/ 308static void sync_lockstate_on_connect(btif_hh_device_t *p_dev) 309{ 310 int keylockstates; 311 312 BTIF_TRACE_EVENT("%s: Syncing keyboard lock states after "\ 313 "reconnect...",__FUNCTION__); 314 /*If the device is connected, update keyboard state */ 315 update_keyboard_lockstates(p_dev); 316 317 /*Check if the lockstate of caps,scroll,num is set. 318 If so, send a report to the kernel 319 so the lockstate is in sync */ 320 keylockstates = get_keylockstates(); 321 if (keylockstates) 322 { 323 BTIF_TRACE_DEBUG("%s: Sending hid report to kernel "\ 324 "indicating lock key state 0x%x",__FUNCTION__, 325 keylockstates); 326 usleep(200000); 327 toggle_os_keylockstates(p_dev->fd, keylockstates); 328 } 329 else 330 { 331 BTIF_TRACE_DEBUG("%s: NOT sending hid report to kernel "\ 332 "indicating lock key state 0x%x",__FUNCTION__, 333 keylockstates); 334 } 335} 336 337/******************************************************************************* 338** 339** Function btif_hh_find_connected_dev_by_handle 340** 341** Description Return the connected device pointer of the specified device handle 342** 343** Returns Device entry pointer in the device table 344*******************************************************************************/ 345btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle) 346{ 347 UINT32 i; 348 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 349 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 350 btif_hh_cb.devices[i].dev_handle == handle) 351 { 352 return &btif_hh_cb.devices[i]; 353 } 354 } 355 return NULL; 356} 357 358/******************************************************************************* 359** 360** Function btif_hh_find_dev_by_bda 361** 362** Description Return the device pointer of the specified bt_bdaddr_t. 363** 364** Returns Device entry pointer in the device table 365*******************************************************************************/ 366static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) 367{ 368 UINT32 i; 369 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 370 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 371 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 372 { 373 return &btif_hh_cb.devices[i]; 374 } 375 } 376 return NULL; 377} 378 379/******************************************************************************* 380** 381** Function btif_hh_find_connected_dev_by_bda 382** 383** Description Return the connected device pointer of the specified bt_bdaddr_t. 384** 385** Returns Device entry pointer in the device table 386*******************************************************************************/ 387static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) 388{ 389 UINT32 i; 390 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 391 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 392 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 393 { 394 return &btif_hh_cb.devices[i]; 395 } 396 } 397 return NULL; 398} 399 400/******************************************************************************* 401** 402** Function btif_hh_stop_vup_timer 403** 404** Description stop vitual unplug timer 405** 406** Returns void 407*******************************************************************************/ 408void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) 409{ 410 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 411 if(p_dev != NULL) 412 { 413 if (p_dev->vup_timer_active) 414 { 415 BTIF_TRACE_DEBUG("stop VUP timer "); 416 btu_stop_timer(&p_dev->vup_timer); 417 } 418 p_dev->vup_timer_active = FALSE; 419 } 420} 421/******************************************************************************* 422** 423** Function btif_hh_start_vup_timer 424** 425** Description start virtual unplug timer 426** 427** Returns void 428*******************************************************************************/ 429void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) 430{ 431 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 432 433 if (p_dev->vup_timer_active == FALSE) 434 { 435 BTIF_TRACE_DEBUG("Start VUP timer "); 436 memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT)); 437 p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr; 438 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 439 BTIF_TIMEOUT_VUP_SECS); 440 } 441 else 442 { 443 BTIF_TRACE_DEBUG("Restart VUP timer "); 444 btu_stop_timer(&p_dev->vup_timer); 445 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 446 BTIF_TIMEOUT_VUP_SECS); 447 } 448 p_dev->vup_timer_active = TRUE; 449 450} 451 452/******************************************************************************* 453** 454** Function btif_hh_add_added_dev 455** 456** Description Add a new device to the added device list. 457** 458** Returns TRUE if add successfully, otherwise FALSE. 459*******************************************************************************/ 460BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask) 461{ 462 int i; 463 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 464 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) { 465 BTIF_TRACE_WARNING(" Device %02X:%02X:%02X:%02X:%02X:%02X already added", 466 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 467 return FALSE; 468 } 469 } 470 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 471 if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 && 472 btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 && 473 btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 && 474 btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 && 475 btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 && 476 btif_hh_cb.added_devices[i].bd_addr.address[5] == 0) 477 { 478 BTIF_TRACE_WARNING(" Added device %02X:%02X:%02X:%02X:%02X:%02X", 479 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 480 memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN); 481 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 482 btif_hh_cb.added_devices[i].attr_mask = attr_mask; 483 return TRUE; 484 } 485 } 486 487 BTIF_TRACE_WARNING("%s: Error, out of space to add device",__FUNCTION__); 488 return FALSE; 489} 490 491/******************************************************************************* 492 ** 493 ** Function btif_hh_remove_device 494 ** 495 ** Description Remove an added device from the stack. 496 ** 497 ** Returns void 498 *******************************************************************************/ 499void btif_hh_remove_device(bt_bdaddr_t bd_addr) 500{ 501 int i; 502 btif_hh_device_t *p_dev; 503 btif_hh_added_device_t *p_added_dev; 504 505 ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__, 506 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 507 508 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 509 p_added_dev = &btif_hh_cb.added_devices[i]; 510 if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) { 511 BTA_HhRemoveDev(p_added_dev->dev_handle); 512 btif_storage_remove_hid_info(&(p_added_dev->bd_addr)); 513 memset(&(p_added_dev->bd_addr), 0, 6); 514 p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 515 break; 516 } 517 } 518 519 p_dev = btif_hh_find_dev_by_bda(&bd_addr); 520 if (p_dev == NULL) { 521 BTIF_TRACE_WARNING(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]", 522 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 523 return; 524 } 525 526 /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */ 527 HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED); 528 529 p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN; 530 p_dev->dev_handle = BTA_HH_INVALID_HANDLE; 531 if (btif_hh_cb.device_num > 0) { 532 btif_hh_cb.device_num--; 533 } 534 else { 535 BTIF_TRACE_WARNING("%s: device_num = 0", __FUNCTION__); 536 } 537 538 p_dev->hh_keep_polling = 0; 539 p_dev->hh_poll_thread_id = -1; 540 BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 541 if (p_dev->fd >= 0) { 542 bta_hh_co_destroy(p_dev->fd); 543 p_dev->fd = -1; 544 } 545} 546 547 548BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src) 549{ 550 dest->descriptor.dl_len = 0; 551 if (src->descriptor.dl_len >0) 552 { 553 dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len); 554 if (dest->descriptor.dsc_list == NULL) 555 { 556 BTIF_TRACE_WARNING("%s: Failed to allocate DSCP for CB", __FUNCTION__); 557 return FALSE; 558 } 559 } 560 memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len); 561 dest->descriptor.dl_len = src->descriptor.dl_len; 562 dest->vendor_id = src->vendor_id; 563 dest->product_id = src->product_id; 564 dest->version = src->version; 565 dest->ctry_code = src->ctry_code; 566 dest->ssr_max_latency = src->ssr_max_latency; 567 dest->ssr_min_tout = src->ssr_min_tout; 568 return TRUE; 569} 570 571 572/******************************************************************************* 573** 574** Function btif_hh_virtual_unplug 575** 576** Description Virtual unplug initiated from the BTIF thread context 577** Special handling for HID mouse- 578** 579** Returns void 580** 581*******************************************************************************/ 582 583bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) 584{ 585 BTIF_TRACE_DEBUG("%s", __FUNCTION__); 586 btif_hh_device_t *p_dev; 587 char bd_str[18]; 588 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 589 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 590 bd_addr->address[4], bd_addr->address[5]); 591 p_dev = btif_hh_find_dev_by_bda(bd_addr); 592 if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED) 593 && (p_dev->attr_mask & HID_VIRTUAL_CABLE)) 594 { 595 BTIF_TRACE_DEBUG("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__); 596 /* start the timer */ 597 btif_hh_start_vup_timer(bd_addr); 598 p_dev->local_vup = TRUE; 599 BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG); 600 return BT_STATUS_SUCCESS; 601 } 602 else 603 { 604 BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 605 return BT_STATUS_FAIL; 606 } 607} 608 609/******************************************************************************* 610** 611** Function btif_hh_connect 612** 613** Description connection initiated from the BTIF thread context 614** 615** Returns int status 616** 617*******************************************************************************/ 618 619bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr) 620{ 621 btif_hh_device_t *dev; 622 btif_hh_added_device_t *added_dev = NULL; 623 char bda_str[20]; 624 int i; 625 BD_ADDR *bda = (BD_ADDR*)bd_addr; 626 CHECK_BTHH_INIT(); 627 dev = btif_hh_find_dev_by_bda(bd_addr); 628 BTIF_TRACE_DEBUG("Connect _hh"); 629 sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X", 630 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 631 if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) { 632 // No space for more HID device now. 633 BTIF_TRACE_WARNING("%s: Error, exceeded the maximum supported HID device number %d", 634 __FUNCTION__, BTIF_HH_MAX_HID); 635 return BT_STATUS_FAIL; 636 } 637 638 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 639 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) { 640 added_dev = &btif_hh_cb.added_devices[i]; 641 BTIF_TRACE_WARNING("%s: Device %s already added, attr_mask = 0x%x", 642 __FUNCTION__, bda_str, added_dev->attr_mask); 643 } 644 } 645 646 if (added_dev != NULL) { 647 if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) { 648 // No space for more HID device now. 649 BTIF_TRACE_ERROR("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str); 650 memset(&(added_dev->bd_addr), 0, 6); 651 added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 652 return BT_STATUS_FAIL; 653 } 654 } 655 656 if (added_dev == NULL || 657 (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 || 658 (added_dev->attr_mask & HID_RECONN_INIT) == 0) 659 { 660 tBTA_SEC sec_mask = BTUI_HH_SECURITY; 661 btif_hh_cb.status = BTIF_HH_DEV_CONNECTING; 662 BD_ADDR *bda = (BD_ADDR*)bd_addr; 663 BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask); 664 } 665 else 666 { 667 // This device shall be connected from the host side. 668 BTIF_TRACE_ERROR("%s: Error, device %s can only be reconnected from device side", 669 __FUNCTION__, bda_str); 670 return BT_STATUS_FAIL; 671 } 672 673 HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING); 674 return BT_STATUS_SUCCESS; 675} 676 677/******************************************************************************* 678** 679** Function btif_hh_disconnect 680** 681** Description disconnection initiated from the BTIF thread context 682** 683** Returns void 684** 685*******************************************************************************/ 686 687void btif_hh_disconnect(bt_bdaddr_t *bd_addr) 688{ 689 btif_hh_device_t *p_dev; 690 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 691 if (p_dev != NULL) 692 { 693 BTA_HhClose(p_dev->dev_handle); 694 } 695 else 696 BTIF_TRACE_DEBUG("%s-- Error: device not connected:",__FUNCTION__); 697} 698 699/******************************************************************************* 700** 701** Function btif_btif_hh_setreport 702** 703** Description setreport initiated from the BTIF thread context 704** 705** Returns void 706** 707*******************************************************************************/ 708void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size, 709 UINT8* report) 710{ 711 BT_HDR* p_buf = create_pbuf(size, report); 712 if (p_buf == NULL) { 713 APPL_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, size = %d", __FUNCTION__, size); 714 return; 715 } 716 BTA_HhSetReport(p_dev->dev_handle, r_type, p_buf); 717} 718 719/***************************************************************************** 720** Section name (Group of functions) 721*****************************************************************************/ 722 723/***************************************************************************** 724** 725** btif hh api functions (no context switch) 726** 727*****************************************************************************/ 728 729 730/******************************************************************************* 731** 732** Function btif_hh_upstreams_evt 733** 734** Description Executes HH UPSTREAMS events in btif context 735** 736** Returns void 737** 738*******************************************************************************/ 739static void btif_hh_upstreams_evt(UINT16 event, char* p_param) 740{ 741 tBTA_HH *p_data = (tBTA_HH *)p_param; 742 btif_hh_device_t *p_dev = NULL; 743 int i; 744 int len, tmplen; 745 746 BTIF_TRACE_DEBUG("%s: event=%s", __FUNCTION__, dump_hh_event(event)); 747 748 switch (event) 749 { 750 case BTA_HH_ENABLE_EVT: 751 BTIF_TRACE_DEBUG("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status); 752 if (p_data->status == BTA_HH_OK) { 753 btif_hh_cb.status = BTIF_HH_ENABLED; 754 BTIF_TRACE_DEBUG("%s--Loading added devices",__FUNCTION__); 755 /* Add hid descriptors for already bonded hid devices*/ 756 btif_storage_load_bonded_hid_info(); 757 } 758 else { 759 btif_hh_cb.status = BTIF_HH_DISABLED; 760 BTIF_TRACE_WARNING("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status); 761 } 762 break; 763 764 case BTA_HH_DISABLE_EVT: 765 btif_hh_cb.status = BTIF_HH_DISABLED; 766 if (p_data->status == BTA_HH_OK) { 767 int i; 768 //Clear the control block 769 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 770 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 771 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 772 } 773 } 774 else 775 BTIF_TRACE_WARNING("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status); 776 break; 777 778 case BTA_HH_OPEN_EVT: 779 BTIF_TRACE_WARNING("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status); 780 if (p_data->conn.status == BTA_HH_OK) { 781 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 782 if (p_dev == NULL) { 783 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle); 784 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 785 // The connect request must come from device side and exceeded the connected 786 // HID device number. 787 BTA_HhClose(p_data->conn.handle); 788 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 789 } 790 else if (p_dev->fd < 0) { 791 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver..."); 792 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 793 //remove the connection and then try again to reconnect from the mouse side to recover 794 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 795 BTA_HhClose(p_data->conn.handle); 796 } 797 else { 798 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle); 799 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 800 btif_hh_cb.status = BTIF_HH_DEV_CONNECTED; 801 // Send set_idle if the peer_device is a keyboard 802 if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )|| 803 check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO)) 804 BTA_HhSetIdle(p_data->conn.handle, 0); 805 btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 806 BTA_HhGetDscpInfo(p_data->conn.handle); 807 p_dev->dev_status = BTHH_CONN_STATE_CONNECTED; 808 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 809 } 810 } 811 else { 812 bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda; 813 btif_dm_hh_open_failed(bdaddr); 814 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 815 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 816 } 817 break; 818 case BTA_HH_CLOSE_EVT: 819 BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d", 820 p_data->dev_status.status, p_data->dev_status.handle); 821 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 822 if (p_dev != NULL) { 823 BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 824 if(p_dev->vup_timer_active) 825 { 826 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 827 } 828 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 829 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 830 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 831 BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 832 bta_hh_co_destroy(p_dev->fd); 833 p_dev->fd = -1; 834 } 835 else { 836 BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->dev_status.handle); 837 } 838 break; 839 case BTA_HH_GET_RPT_EVT: { 840 BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data; 841 UINT8 *data = NULL; 842 UINT16 len = 0; 843 844 BTIF_TRACE_DEBUG("BTA_HH_GET_RPT_EVT: status = %d, handle = %d", 845 p_data->hs_data.status, p_data->hs_data.handle); 846 p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle); 847 if (p_dev) { 848 /* p_rpt_data is NULL in HANDSHAKE response case */ 849 if (hdr) { 850 data = (UINT8 *)(hdr + 1) + hdr->offset; 851 len = hdr->len; 852 HAL_CBACK(bt_hh_callbacks, get_report_cb, 853 (bt_bdaddr_t*) &(p_dev->bd_addr), 854 (bthh_status_t) p_data->hs_data.status, data, len); 855 } else { 856 HAL_CBACK(bt_hh_callbacks, handshake_cb, 857 (bt_bdaddr_t*) &(p_dev->bd_addr), 858 (bthh_status_t) p_data->hs_data.status); 859 } 860 } else { 861 BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->hs_data.handle); 862 } 863 break; 864 } 865 case BTA_HH_SET_RPT_EVT: 866 BTIF_TRACE_DEBUG("BTA_HH_SET_RPT_EVT: status = %d, handle = %d", 867 p_data->dev_status.status, p_data->dev_status.handle); 868 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 869 if (p_dev != NULL) { 870 HAL_CBACK(bt_hh_callbacks, handshake_cb, 871 (bt_bdaddr_t*) &(p_dev->bd_addr), 872 (bthh_status_t) p_data->hs_data.status); 873 } 874 break; 875 876 case BTA_HH_GET_PROTO_EVT: 877 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 878 BTIF_TRACE_WARNING("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s", 879 p_data->hs_data.status, p_data->hs_data.handle, 880 p_data->hs_data.rsp_data.proto_mode, 881 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" : 882 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported"); 883 if (p_data->hs_data.rsp_data.proto_mode != BTA_HH_PROTO_UNKNOWN) { 884 HAL_CBACK(bt_hh_callbacks, protocol_mode_cb, 885 (bt_bdaddr_t*) &(p_dev->bd_addr), 886 (bthh_status_t)p_data->hs_data.status, 887 (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode); 888 } else { 889 HAL_CBACK(bt_hh_callbacks, handshake_cb, 890 (bt_bdaddr_t*) &(p_dev->bd_addr), 891 (bthh_status_t)p_data->hs_data.status); 892 } 893 break; 894 895 case BTA_HH_SET_PROTO_EVT: 896 BTIF_TRACE_DEBUG("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d", 897 p_data->dev_status.status, p_data->dev_status.handle); 898 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 899 if (p_dev) { 900 HAL_CBACK(bt_hh_callbacks, handshake_cb, 901 (bt_bdaddr_t*)&(p_dev->bd_addr), 902 (bthh_status_t)p_data->hs_data.status); 903 } 904 break; 905 906 case BTA_HH_GET_IDLE_EVT: 907 BTIF_TRACE_DEBUG("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d", 908 p_data->hs_data.handle, p_data->hs_data.status, 909 p_data->hs_data.rsp_data.idle_rate); 910 break; 911 912 case BTA_HH_SET_IDLE_EVT: 913 BTIF_TRACE_DEBUG("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d", 914 p_data->dev_status.status, p_data->dev_status.handle); 915 break; 916 917 case BTA_HH_GET_DSCP_EVT: 918 BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d", 919 p_data->dev_status.status, p_data->dev_status.handle); 920 len = p_data->dscp_info.descriptor.dl_len; 921 BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT: len = %d", len); 922 p_dev = btif_hh_cb.p_curr_dev; 923 if (p_dev == NULL) { 924 BTIF_TRACE_ERROR("BTA_HH_GET_DSCP_EVT: No HID device is currently connected"); 925 return; 926 } 927 if (p_dev->fd < 0) { 928 ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver..."); 929 return; 930 } 931 { 932 char *cached_name = NULL; 933 bt_bdname_t bdname; 934 bt_property_t prop_name; 935 BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME, 936 sizeof(bt_bdname_t), &bdname); 937 if (btif_storage_get_remote_device_property( 938 &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS) 939 { 940 cached_name = (char *)bdname.name; 941 } 942 else 943 { 944 cached_name = "Bluetooth HID"; 945 } 946 947 BTIF_TRACE_WARNING("%s: name = %s", __FUNCTION__, cached_name); 948 bta_hh_co_send_hid_info(p_dev, cached_name, 949 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 950 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 951 len, p_data->dscp_info.descriptor.dsc_list); 952 if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) { 953 BD_ADDR bda; 954 bdcpy(bda, p_dev->bd_addr.address); 955 tBTA_HH_DEV_DSCP_INFO dscp_info; 956 bt_status_t ret; 957 bdcpy(bda, p_dev->bd_addr.address); 958 btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info); 959 BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 960 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 961 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 962 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 963 BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info); 964 // write hid info to nvram 965 ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, 966 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 967 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 968 p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout, 969 len, p_data->dscp_info.descriptor.dsc_list); 970 971 ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret); 972 BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device"); 973 974 //Free buffer created for dscp_info; 975 if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL) 976 { 977 GKI_freebuf(dscp_info.descriptor.dsc_list); 978 dscp_info.descriptor.dsc_list = NULL; 979 dscp_info.descriptor.dl_len=0; 980 } 981 } 982 else { 983 //Device already added. 984 BTIF_TRACE_WARNING("%s: Device already added ",__FUNCTION__); 985 } 986 /*Sync HID Keyboard lockstates */ 987 tmplen = sizeof(hid_kb_numlock_on_list) 988 / sizeof(tHID_KB_LIST); 989 for(i = 0; i< tmplen; i++) 990 { 991 if(p_data->dscp_info.vendor_id 992 == hid_kb_numlock_on_list[i].version_id && 993 p_data->dscp_info.product_id 994 == hid_kb_numlock_on_list[i].product_id) 995 { 996 BTIF_TRACE_DEBUG("%s() idx[%d] Enabling "\ 997 "NUMLOCK for device :: %s", __FUNCTION__, 998 i, hid_kb_numlock_on_list[i].kb_name); 999 /* Enable NUMLOCK by default so that numeric 1000 keys work from first keyboard connect */ 1001 set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK, 1002 TRUE); 1003 sync_lockstate_on_connect(p_dev); 1004 /* End Sync HID Keyboard lockstates */ 1005 break; 1006 } 1007 } 1008 } 1009 break; 1010 1011 case BTA_HH_ADD_DEV_EVT: 1012 BTIF_TRACE_WARNING("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle); 1013 int i; 1014 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 1015 if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) { 1016 if (p_data->dev_info.status == BTA_HH_OK) { 1017 btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle; 1018 } 1019 else { 1020 memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6); 1021 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 1022 } 1023 break; 1024 } 1025 } 1026 break; 1027 case BTA_HH_RMV_DEV_EVT: 1028 BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d", 1029 p_data->dev_info.status, p_data->dev_info.handle); 1030 BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1031 p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2], 1032 p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]); 1033 break; 1034 1035 1036 case BTA_HH_VC_UNPLUG_EVT: 1037 BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d", 1038 p_data->dev_status.status, p_data->dev_status.handle); 1039 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 1040 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 1041 if (p_dev != NULL) { 1042 BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1043 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 1044 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 1045 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 1046 /* Stop the VUP timer */ 1047 if(p_dev->vup_timer_active) 1048 { 1049 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 1050 } 1051 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 1052 BTIF_TRACE_DEBUG("%s---Sending connection state change", __FUNCTION__); 1053 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 1054 BTIF_TRACE_DEBUG("%s---Removing HID bond", __FUNCTION__); 1055 /* If it is locally initiated VUP or remote device has its major COD as 1056 Peripheral removed the bond.*/ 1057 if (p_dev->local_vup || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR)) 1058 { 1059 p_dev->local_vup = FALSE; 1060 BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address); 1061 } 1062 else 1063 btif_hh_remove_device(p_dev->bd_addr); 1064 HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr), 1065 p_data->dev_status.status); 1066 } 1067 break; 1068 1069 case BTA_HH_API_ERR_EVT : 1070 ALOGI("BTA_HH API_ERR"); 1071 break; 1072 1073 1074 1075 default: 1076 BTIF_TRACE_WARNING("%s: Unhandled event: %d", __FUNCTION__, event); 1077 break; 1078 } 1079} 1080 1081/******************************************************************************* 1082** 1083** Function bte_hh_evt 1084** 1085** Description Switches context from BTE to BTIF for all HH events 1086** 1087** Returns void 1088** 1089*******************************************************************************/ 1090 1091static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data) 1092{ 1093 bt_status_t status; 1094 int param_len = 0; 1095 1096 if (BTA_HH_ENABLE_EVT == event) 1097 param_len = sizeof(tBTA_HH_STATUS); 1098 else if (BTA_HH_OPEN_EVT == event) 1099 param_len = sizeof(tBTA_HH_CONN); 1100 else if (BTA_HH_DISABLE_EVT == event) 1101 param_len = sizeof(tBTA_HH_STATUS); 1102 else if (BTA_HH_CLOSE_EVT == event) 1103 param_len = sizeof(tBTA_HH_CBDATA); 1104 else if (BTA_HH_GET_DSCP_EVT == event) 1105 param_len = sizeof(tBTA_HH_DEV_DSCP_INFO); 1106 else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event)) 1107 param_len = sizeof(tBTA_HH_HSDATA); 1108 else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event)) 1109 param_len = sizeof(tBTA_HH_CBDATA); 1110 else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) ) 1111 param_len = sizeof(tBTA_HH_DEV_INFO); 1112 else if (BTA_HH_API_ERR_EVT == event) 1113 param_len = 0; 1114 /* switch context to btif task context (copy full union size for convenience) */ 1115 status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL); 1116 1117 /* catch any failed context transfers */ 1118 ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status); 1119} 1120 1121/******************************************************************************* 1122** 1123** Function btif_hh_handle_evt 1124** 1125** Description Switches context for immediate callback 1126** 1127** Returns void 1128** 1129*******************************************************************************/ 1130 1131static void btif_hh_handle_evt(UINT16 event, char *p_param) 1132{ 1133 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; 1134 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event); 1135 int ret; 1136 switch(event) 1137 { 1138 case BTIF_HH_CONNECT_REQ_EVT: 1139 { 1140 ret = btif_hh_connect(bd_addr); 1141 if(ret == BT_STATUS_SUCCESS) 1142 { 1143 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING); 1144 } 1145 else 1146 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED); 1147 } 1148 break; 1149 1150 case BTIF_HH_DISCONNECT_REQ_EVT: 1151 { 1152 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event); 1153 btif_hh_disconnect(bd_addr); 1154 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING); 1155 } 1156 break; 1157 1158 case BTIF_HH_VUP_REQ_EVT: 1159 { 1160 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event); 1161 ret = btif_hh_virtual_unplug(bd_addr); 1162 } 1163 break; 1164 1165 default: 1166 { 1167 BTIF_TRACE_WARNING("%s : Unknown event 0x%x", __FUNCTION__, event); 1168 } 1169 break; 1170 } 1171} 1172 1173/******************************************************************************* 1174** 1175** Function btif_hh_tmr_hdlr 1176** 1177** Description Process timer timeout 1178** 1179** Returns void 1180*******************************************************************************/ 1181void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle) 1182{ 1183 btif_hh_device_t *p_dev; 1184 UINT8 i; 1185 tBTA_HH_EVT event; 1186 tBTA_HH p_data; 1187 int param_len = 0; 1188 memset(&p_data, 0, sizeof(tBTA_HH)); 1189 1190 BTIF_TRACE_DEBUG("%s timer_in_use=%d", __FUNCTION__, tle->in_use ); 1191 1192 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1193 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED) 1194 { 1195 1196 p_dev = &btif_hh_cb.devices[i]; 1197 1198 if (p_dev->vup_timer_active) 1199 { 1200 p_dev->vup_timer_active = FALSE; 1201 event = BTA_HH_VC_UNPLUG_EVT; 1202 p_data.dev_status.status = BTHH_ERR; 1203 p_data.dev_status.handle = p_dev->dev_handle; 1204 param_len = sizeof(tBTA_HH_CBDATA); 1205 1206 /* switch context to btif task context */ 1207 btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data, 1208 param_len, NULL); 1209 } 1210 } 1211 } 1212} 1213 1214/******************************************************************************* 1215** 1216** Function btif_hh_init 1217** 1218** Description initializes the hh interface 1219** 1220** Returns bt_status_t 1221** 1222*******************************************************************************/ 1223static bt_status_t init( bthh_callbacks_t* callbacks ) 1224{ 1225 UINT32 i; 1226 BTIF_TRACE_EVENT("%s", __FUNCTION__); 1227 1228 bt_hh_callbacks = callbacks; 1229 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 1230 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 1231 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 1232 } 1233 /* Invoke the enable service API to the core to set the appropriate service_id */ 1234 btif_enable_service(BTA_HID_SERVICE_ID); 1235 return BT_STATUS_SUCCESS; 1236} 1237 1238/******************************************************************************* 1239** 1240** Function connect 1241** 1242** Description connect to hid device 1243** 1244** Returns bt_status_t 1245** 1246*******************************************************************************/ 1247static bt_status_t connect( bt_bdaddr_t *bd_addr) 1248{ 1249 if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) 1250 { 1251 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT, 1252 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1253 return BT_STATUS_SUCCESS; 1254 } 1255 else 1256 return BT_STATUS_BUSY; 1257} 1258 1259/******************************************************************************* 1260** 1261** Function disconnect 1262** 1263** Description disconnect from hid device 1264** 1265** Returns bt_status_t 1266** 1267*******************************************************************************/ 1268static bt_status_t disconnect( bt_bdaddr_t *bd_addr ) 1269{ 1270 CHECK_BTHH_INIT(); 1271 btif_hh_device_t *p_dev; 1272 1273 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1274 { 1275 BTIF_TRACE_WARNING("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1276 return BT_STATUS_FAIL; 1277 } 1278 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1279 if (p_dev != NULL) 1280 { 1281 return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT, 1282 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1283 } 1284 else 1285 { 1286 BTIF_TRACE_WARNING("%s: Error, device not opened.", __FUNCTION__); 1287 return BT_STATUS_FAIL; 1288 } 1289} 1290 1291/******************************************************************************* 1292** 1293** Function virtual_unplug 1294** 1295** Description Virtual UnPlug (VUP) the specified HID device. 1296** 1297** Returns bt_status_t 1298** 1299*******************************************************************************/ 1300static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr) 1301{ 1302 CHECK_BTHH_INIT(); 1303 btif_hh_device_t *p_dev; 1304 char bd_str[18]; 1305 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 1306 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 1307 bd_addr->address[4], bd_addr->address[5]); 1308 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1309 { 1310 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1311 return BT_STATUS_FAIL; 1312 } 1313 p_dev = btif_hh_find_dev_by_bda(bd_addr); 1314 if (!p_dev) 1315 { 1316 BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 1317 return BT_STATUS_FAIL; 1318 } 1319 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT, 1320 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1321 return BT_STATUS_SUCCESS; 1322} 1323 1324 1325/******************************************************************************* 1326** 1327** Function set_info 1328** 1329** Description Set the HID device descriptor for the specified HID device. 1330** 1331** Returns bt_status_t 1332** 1333*******************************************************************************/ 1334static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) 1335{ 1336 CHECK_BTHH_INIT(); 1337 tBTA_HH_DEV_DSCP_INFO dscp_info; 1338 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1339 1340 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1341 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1342 BTIF_TRACE_DEBUG("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, " 1343 "product_id = 0x%04x, version= 0x%04x", 1344 __FUNCTION__, hid_info.sub_class, 1345 hid_info.app_id, hid_info.vendor_id, hid_info.product_id, 1346 hid_info.version); 1347 1348 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1349 { 1350 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1351 return BT_STATUS_FAIL; 1352 } 1353 1354 dscp_info.vendor_id = hid_info.vendor_id; 1355 dscp_info.product_id = hid_info.product_id; 1356 dscp_info.version = hid_info.version; 1357 dscp_info.ctry_code = hid_info.ctry_code; 1358 1359 dscp_info.descriptor.dl_len = hid_info.dl_len; 1360 dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len); 1361 if (dscp_info.descriptor.dsc_list == NULL) 1362 { 1363 ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__); 1364 return BT_STATUS_FAIL; 1365 } 1366 memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len); 1367 1368 if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask)) 1369 { 1370 BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class, 1371 hid_info.app_id, dscp_info); 1372 } 1373 1374 GKI_freebuf(dscp_info.descriptor.dsc_list); 1375 1376 return BT_STATUS_SUCCESS; 1377} 1378 1379/******************************************************************************* 1380** 1381** Function get_protocol 1382** 1383** Description Get the HID proto mode. 1384** 1385** Returns bt_status_t 1386** 1387*******************************************************************************/ 1388static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1389{ 1390 CHECK_BTHH_INIT(); 1391 btif_hh_device_t *p_dev; 1392 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1393 UNUSED(protocolMode); 1394 1395 BTIF_TRACE_DEBUG(" addr = %02X:%02X:%02X:%02X:%02X:%02X", 1396 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1397 1398 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1399 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1400 return BT_STATUS_FAIL; 1401 } 1402 1403 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1404 if (p_dev != NULL) { 1405 1406 BTA_HhGetProtoMode(p_dev->dev_handle); 1407 } 1408 else { 1409 return BT_STATUS_FAIL; 1410 } 1411 return BT_STATUS_SUCCESS; 1412} 1413 1414/******************************************************************************* 1415** 1416** Function set_protocol 1417** 1418** Description Set the HID proto mode. 1419** 1420** Returns bt_status_t 1421** 1422*******************************************************************************/ 1423static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1424{ 1425 CHECK_BTHH_INIT(); 1426 btif_hh_device_t *p_dev; 1427 UINT8 proto_mode = protocolMode; 1428 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1429 1430 BTIF_TRACE_DEBUG("%s:proto_mode = %d", __FUNCTION__,protocolMode); 1431 1432 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1433 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1434 1435 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1436 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1437 return BT_STATUS_FAIL; 1438 } 1439 1440 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1441 if (p_dev == NULL) { 1442 BTIF_TRACE_WARNING(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1443 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1444 return BT_STATUS_FAIL; 1445 } 1446 else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) { 1447 BTIF_TRACE_WARNING("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode); 1448 return BT_STATUS_FAIL; 1449 } 1450 else { 1451 BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode); 1452 } 1453 1454 1455 return BT_STATUS_SUCCESS; 1456} 1457 1458/******************************************************************************* 1459** 1460** Function get_report 1461** 1462** Description Send a GET_REPORT to HID device. 1463** 1464** Returns bt_status_t 1465** 1466*******************************************************************************/ 1467static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) 1468{ 1469 CHECK_BTHH_INIT(); 1470 btif_hh_device_t *p_dev; 1471 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1472 1473 BTIF_TRACE_DEBUG("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__, 1474 reportType, reportId, bufferSize); 1475 1476 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1477 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1478 1479 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1480 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1481 return BT_STATUS_FAIL; 1482 } 1483 1484 1485 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1486 if (p_dev == NULL) { 1487 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1488 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1489 return BT_STATUS_FAIL; 1490 } 1491 else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) { 1492 BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1493 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1494 return BT_STATUS_FAIL; 1495 } 1496 else { 1497 BTA_HhGetReport(p_dev->dev_handle, reportType, 1498 reportId, bufferSize); 1499 } 1500 1501 return BT_STATUS_SUCCESS; 1502} 1503 1504/******************************************************************************* 1505** 1506** Function set_report 1507** 1508** Description Send a SET_REPORT to HID device. 1509** 1510** Returns bt_status_t 1511** 1512*******************************************************************************/ 1513static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) 1514{ 1515 CHECK_BTHH_INIT(); 1516 btif_hh_device_t *p_dev; 1517 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1518 1519 BTIF_TRACE_DEBUG("%s:reportType = %d", __FUNCTION__,reportType); 1520 1521 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1522 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1523 1524 1525 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1526 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1527 return BT_STATUS_FAIL; 1528 } 1529 1530 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1531 if (p_dev == NULL) { 1532 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1533 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1534 return BT_STATUS_FAIL; 1535 } 1536 else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) { 1537 BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1538 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1539 return BT_STATUS_FAIL; 1540 } 1541 else { 1542 int hex_bytes_filled; 1543 UINT8 *hexbuf; 1544 UINT16 len = (strlen(report) + 1) / 2; 1545 1546 hexbuf = GKI_getbuf(len); 1547 if (hexbuf == NULL) { 1548 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d", 1549 __FUNCTION__, len); 1550 return BT_STATUS_FAIL; 1551 } 1552 1553 /* Build a SetReport data buffer */ 1554 memset(hexbuf, 0, len); 1555 //TODO 1556 hex_bytes_filled = ascii_2_hex(report, len, hexbuf); 1557 BTIF_TRACE_DEBUG("Hex bytes filled, hex value: %d", hex_bytes_filled); 1558 if (hex_bytes_filled) { 1559 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf); 1560 if (p_buf == NULL) { 1561 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d", 1562 __FUNCTION__, hex_bytes_filled); 1563 GKI_freebuf(hexbuf); 1564 return BT_STATUS_FAIL; 1565 } 1566 BTA_HhSetReport(p_dev->dev_handle, reportType, p_buf); 1567 GKI_freebuf(hexbuf); 1568 return BT_STATUS_SUCCESS; 1569 } 1570 GKI_freebuf(hexbuf); 1571 return BT_STATUS_FAIL; 1572 } 1573} 1574 1575/******************************************************************************* 1576** 1577** Function send_data 1578** 1579** Description Send a SEND_DATA to HID device. 1580** 1581** Returns bt_status_t 1582** 1583*******************************************************************************/ 1584static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data) 1585{ 1586 CHECK_BTHH_INIT(); 1587 btif_hh_device_t *p_dev; 1588 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1589 1590 BTIF_TRACE_DEBUG("%s", __FUNCTION__); 1591 1592 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1593 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1594 1595 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1596 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1597 return BT_STATUS_FAIL; 1598 } 1599 1600 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1601 if (p_dev == NULL) { 1602 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1603 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1604 return BT_STATUS_FAIL; 1605 } 1606 1607 else { 1608 int hex_bytes_filled; 1609 UINT8 *hexbuf; 1610 UINT16 len = (strlen(data) + 1) / 2; 1611 1612 hexbuf = GKI_getbuf(len); 1613 if (hexbuf == NULL) { 1614 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d", 1615 __FUNCTION__, len); 1616 return BT_STATUS_FAIL; 1617 } 1618 1619 /* Build a SendData data buffer */ 1620 memset(hexbuf, 0, len); 1621 hex_bytes_filled = ascii_2_hex(data, len, hexbuf); 1622 BTIF_TRACE_ERROR("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len); 1623 1624 if (hex_bytes_filled) { 1625 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf); 1626 if (p_buf == NULL) { 1627 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d", 1628 __FUNCTION__, hex_bytes_filled); 1629 GKI_freebuf(hexbuf); 1630 return BT_STATUS_FAIL; 1631 } 1632 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 1633 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf); 1634 GKI_freebuf(hexbuf); 1635 return BT_STATUS_SUCCESS; 1636 } 1637 GKI_freebuf(hexbuf); 1638 return BT_STATUS_FAIL; 1639 } 1640} 1641 1642 1643/******************************************************************************* 1644** 1645** Function cleanup 1646** 1647** Description Closes the HH interface 1648** 1649** Returns bt_status_t 1650** 1651*******************************************************************************/ 1652static void cleanup( void ) 1653{ 1654 BTIF_TRACE_EVENT("%s", __FUNCTION__); 1655 btif_hh_device_t *p_dev; 1656 int i; 1657 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1658 BTIF_TRACE_WARNING("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status); 1659 return; 1660 } 1661 btif_hh_cb.status = BTIF_HH_DISABLING; 1662 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1663 p_dev = &btif_hh_cb.devices[i]; 1664 if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) { 1665 BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 1666 bta_hh_co_destroy(p_dev->fd); 1667 p_dev->fd = -1; 1668 p_dev->hh_keep_polling = 0; 1669 p_dev->hh_poll_thread_id = -1; 1670 } 1671 } 1672 1673 if (bt_hh_callbacks) 1674 { 1675 btif_disable_service(BTA_HID_SERVICE_ID); 1676 bt_hh_callbacks = NULL; 1677 } 1678 1679} 1680 1681static const bthh_interface_t bthhInterface = { 1682 sizeof(bthhInterface), 1683 init, 1684 connect, 1685 disconnect, 1686 virtual_unplug, 1687 set_info, 1688 get_protocol, 1689 set_protocol, 1690// get_idle_time, 1691// set_idle_time, 1692 get_report, 1693 set_report, 1694 send_data, 1695 cleanup, 1696}; 1697 1698/******************************************************************************* 1699** 1700** Function btif_hh_execute_service 1701** 1702** Description Initializes/Shuts down the service 1703** 1704** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise 1705** 1706*******************************************************************************/ 1707bt_status_t btif_hh_execute_service(BOOLEAN b_enable) 1708{ 1709 if (b_enable) 1710 { 1711 /* Enable and register with BTA-HH */ 1712 BTA_HhEnable(BTA_SEC_ENCRYPT, bte_hh_evt); 1713 } 1714 else { 1715 /* Disable HH */ 1716 BTA_HhDisable(); 1717 } 1718 return BT_STATUS_SUCCESS; 1719} 1720 1721/******************************************************************************* 1722** 1723** Function btif_hh_get_interface 1724** 1725** Description Get the hh callback interface 1726** 1727** Returns bthh_interface_t 1728** 1729*******************************************************************************/ 1730const bthh_interface_t *btif_hh_get_interface() 1731{ 1732 BTIF_TRACE_EVENT("%s", __FUNCTION__); 1733 return &bthhInterface; 1734} 1735