btif_hh.c revision 104e3f238f500cacdb8afaccdc672dfc34eae7ee
1/******************************************************************************
2 *
3 *  Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/************************************************************************************
20 *
21 *  Filename:      btif_hh.c
22 *
23 *  Description:   HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27#include <hardware/bluetooth.h>
28#include <hardware/bt_hh.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <errno.h>
32#include <string.h>
33
34#define LOG_TAG "BTIF_HH"
35
36#include "bta_api.h"
37#include "bta_hh_api.h"
38#include "bd.h"
39#include "btif_storage.h"
40
41#include "btif_common.h"
42#include "btif_util.h"
43#include "btif_hh.h"
44#include "gki.h"
45#include "l2c_api.h"
46
47
48#define BTIF_HH_APP_ID_MI       0x01
49#define BTIF_HH_APP_ID_KB       0x02
50
51#define COD_HID_KEYBOARD        0x0540
52#define COD_HID_POINTING        0x0580
53#define COD_HID_COMBO           0x05C0
54#define COD_HID_MAJOR           0x0500
55
56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58#define HID_REPORT_CAPSLOCK   0x39
59#define HID_REPORT_NUMLOCK    0x53
60#define HID_REPORT_SCROLLLOCK 0x47
61
62//For Apple Magic Mouse
63#define MAGICMOUSE_VENDOR_ID 0x05ac
64#define MAGICMOUSE_PRODUCT_ID 0x030d
65
66#define LOGITECH_KB_MX5500_VENDOR_ID  0x046D
67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69extern const int BT_UID;
70extern const int BT_GID;
71static int btif_hh_keylockstates=0; //The current key state of each key
72
73#define BTIF_HH_ID_1        0
74#define BTIF_HH_DEV_DISCONNECTED 3
75
76#define BTIF_TIMEOUT_VUP_SECS   3
77
78
79#ifndef BTUI_HH_SECURITY
80#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
81#endif
82
83#ifndef BTUI_HH_MOUSE_SECURITY
84#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
85#endif
86
87/* HH request events */
88typedef enum
89{
90    BTIF_HH_CONNECT_REQ_EVT = 0,
91    BTIF_HH_DISCONNECT_REQ_EVT,
92    BTIF_HH_VUP_REQ_EVT
93} btif_hh_req_evt_t;
94
95
96/************************************************************************************
97**  Constants & Macros
98************************************************************************************/
99#define BTIF_HH_SERVICES    (BTA_HID_SERVICE_MASK)
100
101
102
103/************************************************************************************
104**  Local type definitions
105************************************************************************************/
106
107typedef struct hid_kb_list
108{
109    UINT16 product_id;
110    UINT16 version_id;
111    char*  kb_name;
112} tHID_KB_LIST;
113
114/************************************************************************************
115**  Static variables
116************************************************************************************/
117btif_hh_cb_t btif_hh_cb;
118
119static bthh_callbacks_t *bt_hh_callbacks = NULL;
120
121/* List of HID keyboards for which the NUMLOCK state needs to be
122 * turned ON by default. Add devices to this list to apply the
123 * NUMLOCK state toggle on fpr first connect.*/
124static tHID_KB_LIST hid_kb_numlock_on_list[] =
125{
126    {LOGITECH_KB_MX5500_PRODUCT_ID,
127    LOGITECH_KB_MX5500_VENDOR_ID,
128    "Logitech MX5500 Keyboard"}
129};
130
131
132#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
133    {\
134        BTIF_TRACE_WARNING("BTHH: %s: BTHH not initialized", __FUNCTION__);\
135        return BT_STATUS_NOT_READY;\
136    }\
137    else\
138    {\
139        BTIF_TRACE_EVENT("BTHH: %s", __FUNCTION__);\
140    }
141
142
143
144/************************************************************************************
145**  Static functions
146************************************************************************************/
147
148/************************************************************************************
149**  Externs
150************************************************************************************/
151extern void bta_hh_co_destroy(int fd);
152extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
153extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
154extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
155                                    UINT16 product_id, UINT16 version, UINT8 ctry_code,
156                                    int dscp_len, UINT8 *p_dscp);
157extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
158extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
159extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
160extern int  scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
161extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr);
162
163/*****************************************************************************
164**  Local Function prototypes
165*****************************************************************************/
166static void set_keylockstate(int keymask, BOOLEAN isSet);
167static void toggle_os_keylockstates(int fd, int changedkeystates);
168static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
169//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
170void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
171
172
173/************************************************************************************
174**  Functions
175************************************************************************************/
176
177static int get_keylockstates()
178{
179    return btif_hh_keylockstates;
180}
181
182static void set_keylockstate(int keymask, BOOLEAN isSet)
183{
184    if(isSet)
185        btif_hh_keylockstates |= keymask;
186}
187
188/*******************************************************************************
189**
190** Function         toggle_os_keylockstates
191**
192** Description      Function to toggle the keyboard lock states managed by the linux.
193**                  This function is used in by two call paths
194**                  (1) if the lock state change occurred from an onscreen keyboard,
195**                  this function is called to update the lock state maintained
196                    for the HID keyboard(s)
197**                  (2) if a HID keyboard is disconnected and reconnected,
198**                  this function is called to update the lock state maintained
199                    for the HID keyboard(s)
200** Returns          void
201*******************************************************************************/
202
203static void toggle_os_keylockstates(int fd, int changedlockstates)
204{
205    BTIF_TRACE_EVENT("%s: fd = %d, changedlockstates = 0x%x",
206        __FUNCTION__, fd, changedlockstates);
207    UINT8 hidreport[9];
208    int reportIndex;
209    memset(hidreport,0,9);
210    hidreport[0]=1;
211    reportIndex=4;
212
213    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
214        BTIF_TRACE_DEBUG("%s Setting CAPSLOCK", __FUNCTION__);
215        hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
216    }
217
218    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK)  {
219        BTIF_TRACE_DEBUG("%s Setting NUMLOCK", __FUNCTION__);
220        hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
221    }
222
223    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
224        BTIF_TRACE_DEBUG("%s Setting SCROLLLOCK", __FUNCTION__);
225        hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
226    }
227
228     BTIF_TRACE_DEBUG("Writing hidreport #1 to os: "\
229        "%s:  %x %x %x", __FUNCTION__,
230         hidreport[0], hidreport[1], hidreport[2]);
231    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
232         hidreport[3], hidreport[4], hidreport[5]);
233    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
234         hidreport[6], hidreport[7], hidreport[8]);
235    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
236    usleep(200000);
237    memset(hidreport,0,9);
238    hidreport[0]=1;
239    BTIF_TRACE_DEBUG("Writing hidreport #2 to os: "\
240       "%s:  %x %x %x", __FUNCTION__,
241         hidreport[0], hidreport[1], hidreport[2]);
242    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
243         hidreport[3], hidreport[4], hidreport[5]);
244    BTIF_TRACE_DEBUG("%s:  %x %x %x ", __FUNCTION__,
245         hidreport[6], hidreport[7], hidreport[8]);
246    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
247}
248
249/*******************************************************************************
250**
251** Function         create_pbuf
252**
253** Description      Helper function to create p_buf for send_data or set_report
254**
255*******************************************************************************/
256static BT_HDR *create_pbuf(UINT16 len, UINT8 *data)
257{
258    BT_HDR* p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
259
260    if (p_buf) {
261        UINT8* pbuf_data;
262
263        p_buf->len = len;
264        p_buf->offset = BTA_HH_MIN_OFFSET;
265
266        pbuf_data = (UINT8*) (p_buf + 1) + p_buf->offset;
267        memcpy(pbuf_data, data, len);
268    }
269    return p_buf;
270}
271
272/*******************************************************************************
273**
274** Function         update_keyboard_lockstates
275**
276** Description      Sends a report to the keyboard to set the lock states of keys
277**
278*******************************************************************************/
279static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
280{
281    UINT8 len = 2;  /* reportid + 1 byte report*/
282    BD_ADDR* bda;
283    BT_HDR* p_buf;
284    UINT8 data[] = {0x01, /* report id */
285                    btif_hh_keylockstates}; /* keystate */
286
287    /* Set report for other keyboards */
288    BTIF_TRACE_EVENT("%s: setting report on dev_handle %d to 0x%x",
289         __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
290
291    /* Get SetReport buffer */
292    p_buf = create_pbuf(len, data);
293    if (p_buf != NULL) {
294        p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
295        bda = (BD_ADDR*) (&p_dev->bd_addr);
296        BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
297    }
298}
299
300/*******************************************************************************
301**
302** Function         sync_lockstate_on_connect
303**
304** Description      Function to update the keyboard lock states managed by the OS
305**                  when a HID keyboard is connected or disconnected and reconnected
306** Returns          void
307*******************************************************************************/
308static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
309{
310    int keylockstates;
311
312    BTIF_TRACE_EVENT("%s: Syncing keyboard lock states after "\
313        "reconnect...",__FUNCTION__);
314    /*If the device is connected, update keyboard state */
315    update_keyboard_lockstates(p_dev);
316
317    /*Check if the lockstate of caps,scroll,num is set.
318     If so, send a report to the kernel
319    so the lockstate is in sync */
320    keylockstates = get_keylockstates();
321    if (keylockstates)
322    {
323        BTIF_TRACE_DEBUG("%s: Sending hid report to kernel "\
324            "indicating lock key state 0x%x",__FUNCTION__,
325            keylockstates);
326        usleep(200000);
327        toggle_os_keylockstates(p_dev->fd, keylockstates);
328    }
329    else
330    {
331        BTIF_TRACE_DEBUG("%s: NOT sending hid report to kernel "\
332            "indicating lock key state 0x%x",__FUNCTION__,
333            keylockstates);
334    }
335}
336
337/*******************************************************************************
338**
339** Function         btif_hh_find_connected_dev_by_handle
340**
341** Description      Return the connected device pointer of the specified device handle
342**
343** Returns          Device entry pointer in the device table
344*******************************************************************************/
345btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
346{
347    UINT32 i;
348    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
349        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
350            btif_hh_cb.devices[i].dev_handle == handle)
351        {
352            return &btif_hh_cb.devices[i];
353        }
354    }
355    return NULL;
356}
357
358/*******************************************************************************
359**
360** Function         btif_hh_find_dev_by_bda
361**
362** Description      Return the device pointer of the specified bt_bdaddr_t.
363**
364** Returns          Device entry pointer in the device table
365*******************************************************************************/
366static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
367{
368    UINT32 i;
369    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
370        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
371            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
372        {
373            return &btif_hh_cb.devices[i];
374        }
375    }
376    return NULL;
377}
378
379/*******************************************************************************
380**
381** Function         btif_hh_find_connected_dev_by_bda
382**
383** Description      Return the connected device pointer of the specified bt_bdaddr_t.
384**
385** Returns          Device entry pointer in the device table
386*******************************************************************************/
387static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
388{
389    UINT32 i;
390    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
391        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
392            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
393        {
394            return &btif_hh_cb.devices[i];
395        }
396    }
397    return NULL;
398}
399
400/*******************************************************************************
401**
402** Function      btif_hh_stop_vup_timer
403**
404** Description  stop vitual unplug timer
405**
406** Returns      void
407*******************************************************************************/
408void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
409{
410    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
411    if(p_dev != NULL)
412    {
413        if (p_dev->vup_timer_active)
414        {
415            BTIF_TRACE_DEBUG("stop VUP timer ");
416            btu_stop_timer(&p_dev->vup_timer);
417        }
418        p_dev->vup_timer_active = FALSE;
419    }
420}
421/*******************************************************************************
422**
423** Function      btif_hh_start_vup_timer
424**
425** Description  start virtual unplug timer
426**
427** Returns      void
428*******************************************************************************/
429void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
430{
431    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
432
433    if (p_dev->vup_timer_active == FALSE)
434    {
435        BTIF_TRACE_DEBUG("Start VUP timer ");
436        memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
437        p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
438        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
439                        BTIF_TIMEOUT_VUP_SECS);
440    }
441    else
442    {
443        BTIF_TRACE_DEBUG("Restart VUP timer ");
444        btu_stop_timer(&p_dev->vup_timer);
445        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
446                        BTIF_TIMEOUT_VUP_SECS);
447    }
448        p_dev->vup_timer_active = TRUE;
449
450}
451
452/*******************************************************************************
453**
454** Function         btif_hh_add_added_dev
455**
456** Description      Add a new device to the added device list.
457**
458** Returns          TRUE if add successfully, otherwise FALSE.
459*******************************************************************************/
460BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
461{
462    int i;
463    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
464        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
465            BTIF_TRACE_WARNING(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
466                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
467            return FALSE;
468        }
469    }
470    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
471        if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
472            btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
473            btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
474            btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
475            btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
476            btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
477        {
478            BTIF_TRACE_WARNING(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
479                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
480            memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
481            btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
482            btif_hh_cb.added_devices[i].attr_mask  = attr_mask;
483            return TRUE;
484        }
485    }
486
487    BTIF_TRACE_WARNING("%s: Error, out of space to add device",__FUNCTION__);
488    return FALSE;
489}
490
491/*******************************************************************************
492 **
493 ** Function         btif_hh_remove_device
494 **
495 ** Description      Remove an added device from the stack.
496 **
497 ** Returns          void
498 *******************************************************************************/
499void btif_hh_remove_device(bt_bdaddr_t bd_addr)
500{
501    int                    i;
502    btif_hh_device_t       *p_dev;
503    btif_hh_added_device_t *p_added_dev;
504
505    ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
506         bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
507
508    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
509        p_added_dev = &btif_hh_cb.added_devices[i];
510        if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
511            BTA_HhRemoveDev(p_added_dev->dev_handle);
512            btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
513            memset(&(p_added_dev->bd_addr), 0, 6);
514            p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
515            break;
516        }
517    }
518
519    p_dev = btif_hh_find_dev_by_bda(&bd_addr);
520    if (p_dev == NULL) {
521        BTIF_TRACE_WARNING(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
522             bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
523        return;
524    }
525
526    /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
527    HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
528
529    p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
530    p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
531    if (btif_hh_cb.device_num > 0) {
532        btif_hh_cb.device_num--;
533    }
534    else {
535        BTIF_TRACE_WARNING("%s: device_num = 0", __FUNCTION__);
536    }
537
538    p_dev->hh_keep_polling = 0;
539    p_dev->hh_poll_thread_id = -1;
540    BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
541    if (p_dev->fd >= 0) {
542        bta_hh_co_destroy(p_dev->fd);
543        p_dev->fd = -1;
544    }
545}
546
547
548BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
549{
550    dest->descriptor.dl_len = 0;
551    if (src->descriptor.dl_len >0)
552    {
553        dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
554        if (dest->descriptor.dsc_list == NULL)
555        {
556            BTIF_TRACE_WARNING("%s: Failed to allocate DSCP for CB", __FUNCTION__);
557            return FALSE;
558        }
559    }
560    memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
561    dest->descriptor.dl_len = src->descriptor.dl_len;
562    dest->vendor_id  = src->vendor_id;
563    dest->product_id = src->product_id;
564    dest->version    = src->version;
565    dest->ctry_code  = src->ctry_code;
566    dest->ssr_max_latency = src->ssr_max_latency;
567    dest->ssr_min_tout = src->ssr_min_tout;
568    return TRUE;
569}
570
571
572/*******************************************************************************
573**
574** Function         btif_hh_virtual_unplug
575**
576** Description      Virtual unplug initiated from the BTIF thread context
577**                  Special handling for HID mouse-
578**
579** Returns          void
580**
581*******************************************************************************/
582
583bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
584{
585    BTIF_TRACE_DEBUG("%s", __FUNCTION__);
586    btif_hh_device_t *p_dev;
587    char bd_str[18];
588    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
589            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
590            bd_addr->address[4], bd_addr->address[5]);
591    p_dev = btif_hh_find_dev_by_bda(bd_addr);
592    if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
593        && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
594    {
595        BTIF_TRACE_DEBUG("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
596        /* start the timer */
597        btif_hh_start_vup_timer(bd_addr);
598        p_dev->local_vup = TRUE;
599        BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
600        return BT_STATUS_SUCCESS;
601    }
602    else
603    {
604        BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
605        return BT_STATUS_FAIL;
606    }
607}
608
609/*******************************************************************************
610**
611** Function         btif_hh_connect
612**
613** Description      connection initiated from the BTIF thread context
614**
615** Returns          int status
616**
617*******************************************************************************/
618
619bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
620{
621    btif_hh_device_t *dev;
622    btif_hh_added_device_t *added_dev = NULL;
623    char bda_str[20];
624    int i;
625    BD_ADDR *bda = (BD_ADDR*)bd_addr;
626    CHECK_BTHH_INIT();
627    dev = btif_hh_find_dev_by_bda(bd_addr);
628    BTIF_TRACE_DEBUG("Connect _hh");
629    sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
630            (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
631    if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
632        // No space for more HID device now.
633         BTIF_TRACE_WARNING("%s: Error, exceeded the maximum supported HID device number %d",
634             __FUNCTION__, BTIF_HH_MAX_HID);
635        return BT_STATUS_FAIL;
636    }
637
638    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
639        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
640            added_dev = &btif_hh_cb.added_devices[i];
641             BTIF_TRACE_WARNING("%s: Device %s already added, attr_mask = 0x%x",
642                 __FUNCTION__, bda_str, added_dev->attr_mask);
643        }
644    }
645
646    if (added_dev != NULL) {
647        if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
648            // No space for more HID device now.
649            BTIF_TRACE_ERROR("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
650            memset(&(added_dev->bd_addr), 0, 6);
651            added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
652            return BT_STATUS_FAIL;
653        }
654    }
655
656    if (added_dev == NULL ||
657        (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
658        (added_dev->attr_mask & HID_RECONN_INIT) == 0)
659    {
660        tBTA_SEC sec_mask = BTUI_HH_SECURITY;
661        btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
662        BD_ADDR *bda = (BD_ADDR*)bd_addr;
663        BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
664    }
665    else
666    {
667        // This device shall be connected from the host side.
668        BTIF_TRACE_ERROR("%s: Error, device %s can only be reconnected from device side",
669             __FUNCTION__, bda_str);
670        return BT_STATUS_FAIL;
671    }
672
673    HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
674    return BT_STATUS_SUCCESS;
675}
676
677/*******************************************************************************
678**
679** Function         btif_hh_disconnect
680**
681** Description      disconnection initiated from the BTIF thread context
682**
683** Returns          void
684**
685*******************************************************************************/
686
687void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
688{
689    btif_hh_device_t *p_dev;
690    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
691    if (p_dev != NULL)
692    {
693        BTA_HhClose(p_dev->dev_handle);
694    }
695    else
696        BTIF_TRACE_DEBUG("%s-- Error: device not connected:",__FUNCTION__);
697}
698
699/*******************************************************************************
700**
701** Function         btif_btif_hh_setreport
702**
703** Description      setreport initiated from the BTIF thread context
704**
705** Returns          void
706**
707*******************************************************************************/
708void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
709                            UINT8* report)
710{
711    BT_HDR* p_buf = create_pbuf(size, report);
712    if (p_buf == NULL) {
713        APPL_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, size = %d", __FUNCTION__, size);
714        return;
715    }
716    BTA_HhSetReport(p_dev->dev_handle, r_type, p_buf);
717}
718
719/*****************************************************************************
720**   Section name (Group of functions)
721*****************************************************************************/
722
723/*****************************************************************************
724**
725**   btif hh api functions (no context switch)
726**
727*****************************************************************************/
728
729
730/*******************************************************************************
731**
732** Function         btif_hh_upstreams_evt
733**
734** Description      Executes HH UPSTREAMS events in btif context
735**
736** Returns          void
737**
738*******************************************************************************/
739static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
740{
741    tBTA_HH *p_data = (tBTA_HH *)p_param;
742    btif_hh_device_t *p_dev = NULL;
743    int i;
744    int len, tmplen;
745
746    BTIF_TRACE_DEBUG("%s: event=%s", __FUNCTION__, dump_hh_event(event));
747
748    switch (event)
749    {
750        case BTA_HH_ENABLE_EVT:
751            BTIF_TRACE_DEBUG("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
752            if (p_data->status == BTA_HH_OK) {
753                btif_hh_cb.status = BTIF_HH_ENABLED;
754                BTIF_TRACE_DEBUG("%s--Loading added devices",__FUNCTION__);
755                /* Add hid descriptors for already bonded hid devices*/
756                btif_storage_load_bonded_hid_info();
757            }
758            else {
759                btif_hh_cb.status = BTIF_HH_DISABLED;
760                BTIF_TRACE_WARNING("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
761            }
762            break;
763
764        case BTA_HH_DISABLE_EVT:
765            btif_hh_cb.status = BTIF_HH_DISABLED;
766            if (p_data->status == BTA_HH_OK) {
767                int i;
768                //Clear the control block
769                memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
770                for (i = 0; i < BTIF_HH_MAX_HID; i++){
771                    btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
772                }
773            }
774            else
775                BTIF_TRACE_WARNING("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
776            break;
777
778        case BTA_HH_OPEN_EVT:
779            BTIF_TRACE_WARNING("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
780            if (p_data->conn.status == BTA_HH_OK) {
781                p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
782                if (p_dev == NULL) {
783                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
784                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
785                    // The connect request must come from device side and exceeded the connected
786                                   // HID device number.
787                    BTA_HhClose(p_data->conn.handle);
788                    HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
789                }
790                else if (p_dev->fd < 0) {
791                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
792                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
793                    //remove the connection  and then try again to reconnect from the mouse side to recover
794                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
795                    BTA_HhClose(p_data->conn.handle);
796                }
797                else {
798                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
799                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
800                    btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
801                    // Send set_idle if the peer_device is a keyboard
802                    if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
803                                check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
804                        BTA_HhSetIdle(p_data->conn.handle, 0);
805                    btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
806                    BTA_HhGetDscpInfo(p_data->conn.handle);
807                    p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
808                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
809                }
810            }
811            else {
812                bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
813                btif_dm_hh_open_failed(bdaddr);
814                HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
815                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
816            }
817            break;
818        case BTA_HH_CLOSE_EVT:
819            BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
820            p_data->dev_status.status, p_data->dev_status.handle);
821            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
822            if (p_dev != NULL) {
823                BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
824                if(p_dev->vup_timer_active)
825                {
826                    btif_hh_stop_vup_timer(&(p_dev->bd_addr));
827                }
828                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
829                p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
830                HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
831                BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
832                bta_hh_co_destroy(p_dev->fd);
833                p_dev->fd = -1;
834            }
835            else {
836                BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->dev_status.handle);
837            }
838            break;
839        case BTA_HH_GET_RPT_EVT: {
840            BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data;
841            UINT8 *data = NULL;
842            UINT16 len = 0;
843
844            BTIF_TRACE_DEBUG("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
845                 p_data->hs_data.status, p_data->hs_data.handle);
846            p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle);
847            if (p_dev) {
848                /* p_rpt_data is NULL in HANDSHAKE response case */
849                if (hdr) {
850                    data = (UINT8 *)(hdr + 1) + hdr->offset;
851                    len = hdr->len;
852                    HAL_CBACK(bt_hh_callbacks, get_report_cb,
853                              (bt_bdaddr_t*) &(p_dev->bd_addr),
854                              (bthh_status_t) p_data->hs_data.status, data, len);
855                } else {
856                    HAL_CBACK(bt_hh_callbacks, handshake_cb,
857                              (bt_bdaddr_t*) &(p_dev->bd_addr),
858                              (bthh_status_t) p_data->hs_data.status);
859                }
860            } else {
861                BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->hs_data.handle);
862            }
863            break;
864        }
865        case BTA_HH_SET_RPT_EVT:
866            BTIF_TRACE_DEBUG("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
867            p_data->dev_status.status, p_data->dev_status.handle);
868            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
869            if (p_dev != NULL) {
870                HAL_CBACK(bt_hh_callbacks, handshake_cb,
871                          (bt_bdaddr_t*) &(p_dev->bd_addr),
872                          (bthh_status_t) p_data->hs_data.status);
873            }
874            break;
875
876        case BTA_HH_GET_PROTO_EVT:
877            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
878            BTIF_TRACE_WARNING("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
879                 p_data->hs_data.status, p_data->hs_data.handle,
880                 p_data->hs_data.rsp_data.proto_mode,
881                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
882                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
883            if (p_data->hs_data.rsp_data.proto_mode != BTA_HH_PROTO_UNKNOWN) {
884                HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,
885                          (bt_bdaddr_t*) &(p_dev->bd_addr),
886                          (bthh_status_t)p_data->hs_data.status,
887                          (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
888            } else {
889                HAL_CBACK(bt_hh_callbacks, handshake_cb,
890                          (bt_bdaddr_t*) &(p_dev->bd_addr),
891                          (bthh_status_t)p_data->hs_data.status);
892            }
893            break;
894
895        case BTA_HH_SET_PROTO_EVT:
896            BTIF_TRACE_DEBUG("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
897                 p_data->dev_status.status, p_data->dev_status.handle);
898            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
899            if (p_dev) {
900                HAL_CBACK(bt_hh_callbacks, handshake_cb,
901                          (bt_bdaddr_t*)&(p_dev->bd_addr),
902                          (bthh_status_t)p_data->hs_data.status);
903            }
904            break;
905
906        case BTA_HH_GET_IDLE_EVT:
907            BTIF_TRACE_DEBUG("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
908                 p_data->hs_data.handle, p_data->hs_data.status,
909                 p_data->hs_data.rsp_data.idle_rate);
910            break;
911
912        case BTA_HH_SET_IDLE_EVT:
913            BTIF_TRACE_DEBUG("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
914            p_data->dev_status.status, p_data->dev_status.handle);
915            break;
916
917        case BTA_HH_GET_DSCP_EVT:
918            BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
919                p_data->dev_status.status, p_data->dev_status.handle);
920                len = p_data->dscp_info.descriptor.dl_len;
921                BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT: len = %d", len);
922            p_dev = btif_hh_cb.p_curr_dev;
923            if (p_dev == NULL) {
924                BTIF_TRACE_ERROR("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
925                return;
926            }
927            if (p_dev->fd < 0) {
928                ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
929                return;
930            }
931            {
932                char *cached_name = NULL;
933                bt_bdname_t bdname;
934                bt_property_t prop_name;
935                BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME,
936                                           sizeof(bt_bdname_t), &bdname);
937                if (btif_storage_get_remote_device_property(
938                    &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS)
939                {
940                    cached_name = (char *)bdname.name;
941                }
942                else
943                {
944                    cached_name = "Bluetooth HID";
945                }
946
947                BTIF_TRACE_WARNING("%s: name = %s", __FUNCTION__, cached_name);
948                bta_hh_co_send_hid_info(p_dev, cached_name,
949                    p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
950                    p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
951                    len, p_data->dscp_info.descriptor.dsc_list);
952                if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
953                    BD_ADDR bda;
954                    bdcpy(bda, p_dev->bd_addr.address);
955                    tBTA_HH_DEV_DSCP_INFO dscp_info;
956                    bt_status_t ret;
957                    bdcpy(bda, p_dev->bd_addr.address);
958                    btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
959                    BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
960                              p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
961                              p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
962                              p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
963                    BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
964                    // write hid info to nvram
965                    ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
966                                                        p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
967                                                        p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
968                                                        p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout,
969                                                        len, p_data->dscp_info.descriptor.dsc_list);
970
971                    ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
972                    BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device");
973
974                    //Free buffer created for dscp_info;
975                    if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
976                    {
977                      GKI_freebuf(dscp_info.descriptor.dsc_list);
978                      dscp_info.descriptor.dsc_list = NULL;
979                      dscp_info.descriptor.dl_len=0;
980                    }
981                }
982                else {
983                    //Device already added.
984                    BTIF_TRACE_WARNING("%s: Device already added ",__FUNCTION__);
985                }
986                /*Sync HID Keyboard lockstates */
987                tmplen = sizeof(hid_kb_numlock_on_list)
988                            / sizeof(tHID_KB_LIST);
989                for(i = 0; i< tmplen; i++)
990                {
991                    if(p_data->dscp_info.vendor_id
992                        == hid_kb_numlock_on_list[i].version_id &&
993                        p_data->dscp_info.product_id
994                        == hid_kb_numlock_on_list[i].product_id)
995                    {
996                        BTIF_TRACE_DEBUG("%s() idx[%d] Enabling "\
997                            "NUMLOCK for device :: %s", __FUNCTION__,
998                            i, hid_kb_numlock_on_list[i].kb_name);
999                        /* Enable NUMLOCK by default so that numeric
1000                            keys work from first keyboard connect */
1001                        set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1002                                        TRUE);
1003                        sync_lockstate_on_connect(p_dev);
1004                        /* End Sync HID Keyboard lockstates */
1005                        break;
1006                    }
1007                }
1008            }
1009            break;
1010
1011        case BTA_HH_ADD_DEV_EVT:
1012            BTIF_TRACE_WARNING("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1013            int i;
1014            for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1015                if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1016                    if (p_data->dev_info.status == BTA_HH_OK) {
1017                        btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1018                    }
1019                    else {
1020                        memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1021                        btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1022                    }
1023                    break;
1024                }
1025            }
1026            break;
1027        case BTA_HH_RMV_DEV_EVT:
1028                BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1029                     p_data->dev_info.status, p_data->dev_info.handle);
1030                BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1031                     p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1032                     p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1033                break;
1034
1035
1036        case BTA_HH_VC_UNPLUG_EVT:
1037                BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1038                     p_data->dev_status.status, p_data->dev_status.handle);
1039                p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1040                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1041                if (p_dev != NULL) {
1042                    BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1043                         p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1044                         p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1045                         p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1046                    /* Stop the VUP timer */
1047                    if(p_dev->vup_timer_active)
1048                    {
1049                        btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1050                    }
1051                    p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1052                    BTIF_TRACE_DEBUG("%s---Sending connection state change", __FUNCTION__);
1053                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1054                    BTIF_TRACE_DEBUG("%s---Removing HID bond", __FUNCTION__);
1055                    /* If it is locally initiated VUP or remote device has its major COD as
1056                    Peripheral removed the bond.*/
1057                    if (p_dev->local_vup  || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1058                    {
1059                        p_dev->local_vup = FALSE;
1060                        BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1061                    }
1062                    else
1063                        btif_hh_remove_device(p_dev->bd_addr);
1064                    HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1065                                    p_data->dev_status.status);
1066                }
1067                break;
1068
1069        case BTA_HH_API_ERR_EVT  :
1070                ALOGI("BTA_HH API_ERR");
1071                break;
1072
1073
1074
1075            default:
1076                BTIF_TRACE_WARNING("%s: Unhandled event: %d", __FUNCTION__, event);
1077                break;
1078        }
1079}
1080
1081/*******************************************************************************
1082**
1083** Function         bte_hh_evt
1084**
1085** Description      Switches context from BTE to BTIF for all HH events
1086**
1087** Returns          void
1088**
1089*******************************************************************************/
1090
1091static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1092{
1093    bt_status_t status;
1094    int param_len = 0;
1095
1096    if (BTA_HH_ENABLE_EVT == event)
1097        param_len = sizeof(tBTA_HH_STATUS);
1098    else if (BTA_HH_OPEN_EVT == event)
1099        param_len = sizeof(tBTA_HH_CONN);
1100    else if (BTA_HH_DISABLE_EVT == event)
1101        param_len = sizeof(tBTA_HH_STATUS);
1102    else if (BTA_HH_CLOSE_EVT == event)
1103        param_len = sizeof(tBTA_HH_CBDATA);
1104    else if (BTA_HH_GET_DSCP_EVT == event)
1105        param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1106    else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1107        param_len = sizeof(tBTA_HH_HSDATA);
1108    else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1109        param_len = sizeof(tBTA_HH_CBDATA);
1110    else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1111        param_len = sizeof(tBTA_HH_DEV_INFO);
1112    else if (BTA_HH_API_ERR_EVT == event)
1113        param_len = 0;
1114    /* switch context to btif task context (copy full union size for convenience) */
1115    status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1116
1117    /* catch any failed context transfers */
1118    ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1119}
1120
1121/*******************************************************************************
1122**
1123** Function         btif_hh_handle_evt
1124**
1125** Description      Switches context for immediate callback
1126**
1127** Returns          void
1128**
1129*******************************************************************************/
1130
1131static void btif_hh_handle_evt(UINT16 event, char *p_param)
1132{
1133    bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1134    BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1135    int ret;
1136    switch(event)
1137    {
1138        case BTIF_HH_CONNECT_REQ_EVT:
1139        {
1140            ret = btif_hh_connect(bd_addr);
1141            if(ret == BT_STATUS_SUCCESS)
1142            {
1143                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1144            }
1145            else
1146                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1147        }
1148        break;
1149
1150        case BTIF_HH_DISCONNECT_REQ_EVT:
1151        {
1152            BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1153            btif_hh_disconnect(bd_addr);
1154            HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1155        }
1156        break;
1157
1158        case BTIF_HH_VUP_REQ_EVT:
1159        {
1160            BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1161            ret = btif_hh_virtual_unplug(bd_addr);
1162        }
1163        break;
1164
1165        default:
1166        {
1167            BTIF_TRACE_WARNING("%s : Unknown event 0x%x", __FUNCTION__, event);
1168        }
1169        break;
1170    }
1171}
1172
1173/*******************************************************************************
1174**
1175** Function      btif_hh_tmr_hdlr
1176**
1177** Description   Process timer timeout
1178**
1179** Returns      void
1180*******************************************************************************/
1181void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1182{
1183    btif_hh_device_t *p_dev;
1184    UINT8               i;
1185    tBTA_HH_EVT event;
1186    tBTA_HH p_data;
1187    int param_len = 0;
1188    memset(&p_data, 0, sizeof(tBTA_HH));
1189
1190    BTIF_TRACE_DEBUG("%s timer_in_use=%d",  __FUNCTION__, tle->in_use );
1191
1192    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1193        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1194        {
1195
1196            p_dev = &btif_hh_cb.devices[i];
1197
1198            if (p_dev->vup_timer_active)
1199            {
1200                p_dev->vup_timer_active = FALSE;
1201                event = BTA_HH_VC_UNPLUG_EVT;
1202                p_data.dev_status.status = BTHH_ERR;
1203                p_data.dev_status.handle = p_dev->dev_handle;
1204                param_len = sizeof(tBTA_HH_CBDATA);
1205
1206                /* switch context to btif task context */
1207                btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1208                            param_len, NULL);
1209            }
1210        }
1211    }
1212}
1213
1214/*******************************************************************************
1215**
1216** Function         btif_hh_init
1217**
1218** Description     initializes the hh interface
1219**
1220** Returns         bt_status_t
1221**
1222*******************************************************************************/
1223static bt_status_t init( bthh_callbacks_t* callbacks )
1224{
1225    UINT32 i;
1226    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1227
1228    bt_hh_callbacks = callbacks;
1229    memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1230    for (i = 0; i < BTIF_HH_MAX_HID; i++){
1231        btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1232    }
1233    /* Invoke the enable service API to the core to set the appropriate service_id */
1234    btif_enable_service(BTA_HID_SERVICE_ID);
1235    return BT_STATUS_SUCCESS;
1236}
1237
1238/*******************************************************************************
1239**
1240** Function        connect
1241**
1242** Description     connect to hid device
1243**
1244** Returns         bt_status_t
1245**
1246*******************************************************************************/
1247static bt_status_t connect( bt_bdaddr_t *bd_addr)
1248{
1249    if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1250    {
1251        btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1252                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1253        return BT_STATUS_SUCCESS;
1254    }
1255    else
1256        return BT_STATUS_BUSY;
1257}
1258
1259/*******************************************************************************
1260**
1261** Function         disconnect
1262**
1263** Description      disconnect from hid device
1264**
1265** Returns         bt_status_t
1266**
1267*******************************************************************************/
1268static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1269{
1270    CHECK_BTHH_INIT();
1271    btif_hh_device_t *p_dev;
1272
1273    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1274    {
1275        BTIF_TRACE_WARNING("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1276        return BT_STATUS_FAIL;
1277    }
1278    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1279    if (p_dev != NULL)
1280    {
1281        return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1282                     (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1283    }
1284    else
1285    {
1286        BTIF_TRACE_WARNING("%s: Error, device  not opened.", __FUNCTION__);
1287        return BT_STATUS_FAIL;
1288    }
1289}
1290
1291/*******************************************************************************
1292**
1293** Function         virtual_unplug
1294**
1295** Description      Virtual UnPlug (VUP) the specified HID device.
1296**
1297** Returns         bt_status_t
1298**
1299*******************************************************************************/
1300static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1301{
1302    CHECK_BTHH_INIT();
1303    btif_hh_device_t *p_dev;
1304    char bd_str[18];
1305    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1306            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
1307            bd_addr->address[4], bd_addr->address[5]);
1308    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1309    {
1310        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1311        return BT_STATUS_FAIL;
1312    }
1313    p_dev = btif_hh_find_dev_by_bda(bd_addr);
1314    if (!p_dev)
1315    {
1316        BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1317        return BT_STATUS_FAIL;
1318    }
1319    btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1320                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1321    return BT_STATUS_SUCCESS;
1322}
1323
1324
1325/*******************************************************************************
1326**
1327** Function         set_info
1328**
1329** Description      Set the HID device descriptor for the specified HID device.
1330**
1331** Returns         bt_status_t
1332**
1333*******************************************************************************/
1334static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1335{
1336    CHECK_BTHH_INIT();
1337    tBTA_HH_DEV_DSCP_INFO dscp_info;
1338    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1339
1340    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1341         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1342    BTIF_TRACE_DEBUG("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1343         "product_id = 0x%04x, version= 0x%04x",
1344         __FUNCTION__, hid_info.sub_class,
1345         hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1346         hid_info.version);
1347
1348    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1349    {
1350        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1351        return BT_STATUS_FAIL;
1352    }
1353
1354    dscp_info.vendor_id  = hid_info.vendor_id;
1355    dscp_info.product_id = hid_info.product_id;
1356    dscp_info.version    = hid_info.version;
1357    dscp_info.ctry_code  = hid_info.ctry_code;
1358
1359    dscp_info.descriptor.dl_len = hid_info.dl_len;
1360    dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1361    if (dscp_info.descriptor.dsc_list == NULL)
1362    {
1363        ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1364        return BT_STATUS_FAIL;
1365    }
1366    memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1367
1368    if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1369    {
1370        BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1371                     hid_info.app_id, dscp_info);
1372    }
1373
1374    GKI_freebuf(dscp_info.descriptor.dsc_list);
1375
1376    return BT_STATUS_SUCCESS;
1377}
1378
1379/*******************************************************************************
1380**
1381** Function         get_protocol
1382**
1383** Description      Get the HID proto mode.
1384**
1385** Returns         bt_status_t
1386**
1387*******************************************************************************/
1388static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1389{
1390    CHECK_BTHH_INIT();
1391    btif_hh_device_t *p_dev;
1392    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1393    UNUSED(protocolMode);
1394
1395    BTIF_TRACE_DEBUG(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1396         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1397
1398    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1399        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1400        return BT_STATUS_FAIL;
1401    }
1402
1403    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1404    if (p_dev != NULL) {
1405
1406        BTA_HhGetProtoMode(p_dev->dev_handle);
1407    }
1408    else {
1409        return BT_STATUS_FAIL;
1410    }
1411    return BT_STATUS_SUCCESS;
1412}
1413
1414/*******************************************************************************
1415**
1416** Function         set_protocol
1417**
1418** Description      Set the HID proto mode.
1419**
1420** Returns         bt_status_t
1421**
1422*******************************************************************************/
1423static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1424{
1425    CHECK_BTHH_INIT();
1426    btif_hh_device_t *p_dev;
1427    UINT8 proto_mode = protocolMode;
1428    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1429
1430    BTIF_TRACE_DEBUG("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1431
1432    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1433         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1434
1435    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1436        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1437        return BT_STATUS_FAIL;
1438    }
1439
1440    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1441    if (p_dev == NULL) {
1442        BTIF_TRACE_WARNING(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1443             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1444        return BT_STATUS_FAIL;
1445    }
1446    else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1447        BTIF_TRACE_WARNING("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1448        return BT_STATUS_FAIL;
1449    }
1450    else {
1451        BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1452    }
1453
1454
1455    return BT_STATUS_SUCCESS;
1456}
1457
1458/*******************************************************************************
1459**
1460** Function         get_report
1461**
1462** Description      Send a GET_REPORT to HID device.
1463**
1464** Returns         bt_status_t
1465**
1466*******************************************************************************/
1467static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1468{
1469    CHECK_BTHH_INIT();
1470    btif_hh_device_t *p_dev;
1471    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1472
1473    BTIF_TRACE_DEBUG("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1474          reportType, reportId, bufferSize);
1475
1476    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1477         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1478
1479    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1480        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1481        return BT_STATUS_FAIL;
1482    }
1483
1484
1485    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1486    if (p_dev == NULL) {
1487        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1488             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1489        return BT_STATUS_FAIL;
1490    }
1491    else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1492        BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1493             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1494        return BT_STATUS_FAIL;
1495    }
1496    else {
1497        BTA_HhGetReport(p_dev->dev_handle, reportType,
1498                        reportId, bufferSize);
1499    }
1500
1501    return BT_STATUS_SUCCESS;
1502}
1503
1504/*******************************************************************************
1505**
1506** Function         set_report
1507**
1508** Description      Send a SET_REPORT to HID device.
1509**
1510** Returns         bt_status_t
1511**
1512*******************************************************************************/
1513static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1514{
1515    CHECK_BTHH_INIT();
1516    btif_hh_device_t *p_dev;
1517    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1518
1519    BTIF_TRACE_DEBUG("%s:reportType = %d", __FUNCTION__,reportType);
1520
1521    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1522         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1523
1524
1525    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1526        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1527        return BT_STATUS_FAIL;
1528    }
1529
1530    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1531    if (p_dev == NULL) {
1532        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1533             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1534        return BT_STATUS_FAIL;
1535    }
1536    else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1537        BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1538             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1539        return BT_STATUS_FAIL;
1540    }
1541    else {
1542        int    hex_bytes_filled;
1543        UINT8  *hexbuf;
1544        UINT16 len = (strlen(report) + 1) / 2;
1545
1546        hexbuf = GKI_getbuf(len);
1547        if (hexbuf == NULL) {
1548            BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1549                __FUNCTION__, len);
1550            return BT_STATUS_FAIL;
1551        }
1552
1553        /* Build a SetReport data buffer */
1554        memset(hexbuf, 0, len);
1555        //TODO
1556        hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1557        BTIF_TRACE_DEBUG("Hex bytes filled, hex value: %d", hex_bytes_filled);
1558        if (hex_bytes_filled) {
1559            BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1560            if (p_buf == NULL) {
1561                BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1562                                  __FUNCTION__, hex_bytes_filled);
1563                GKI_freebuf(hexbuf);
1564                return BT_STATUS_FAIL;
1565            }
1566            BTA_HhSetReport(p_dev->dev_handle, reportType, p_buf);
1567            GKI_freebuf(hexbuf);
1568            return BT_STATUS_SUCCESS;
1569        }
1570        GKI_freebuf(hexbuf);
1571        return BT_STATUS_FAIL;
1572    }
1573}
1574
1575/*******************************************************************************
1576**
1577** Function         send_data
1578**
1579** Description      Send a SEND_DATA to HID device.
1580**
1581** Returns         bt_status_t
1582**
1583*******************************************************************************/
1584static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1585{
1586    CHECK_BTHH_INIT();
1587    btif_hh_device_t *p_dev;
1588    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1589
1590    BTIF_TRACE_DEBUG("%s", __FUNCTION__);
1591
1592    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1593         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1594
1595    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1596        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1597        return BT_STATUS_FAIL;
1598    }
1599
1600    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1601    if (p_dev == NULL) {
1602        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1603             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1604        return BT_STATUS_FAIL;
1605    }
1606
1607    else {
1608        int    hex_bytes_filled;
1609        UINT8  *hexbuf;
1610        UINT16 len = (strlen(data) + 1) / 2;
1611
1612        hexbuf = GKI_getbuf(len);
1613        if (hexbuf == NULL) {
1614            BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1615                __FUNCTION__, len);
1616            return BT_STATUS_FAIL;
1617        }
1618
1619        /* Build a SendData data buffer */
1620        memset(hexbuf, 0, len);
1621        hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1622        BTIF_TRACE_ERROR("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1623
1624        if (hex_bytes_filled) {
1625            BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1626            if (p_buf == NULL) {
1627                BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1628                                  __FUNCTION__, hex_bytes_filled);
1629                GKI_freebuf(hexbuf);
1630                return BT_STATUS_FAIL;
1631            }
1632            p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1633            BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
1634            GKI_freebuf(hexbuf);
1635            return BT_STATUS_SUCCESS;
1636        }
1637        GKI_freebuf(hexbuf);
1638        return BT_STATUS_FAIL;
1639    }
1640}
1641
1642
1643/*******************************************************************************
1644**
1645** Function         cleanup
1646**
1647** Description      Closes the HH interface
1648**
1649** Returns          bt_status_t
1650**
1651*******************************************************************************/
1652static void  cleanup( void )
1653{
1654    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1655    btif_hh_device_t *p_dev;
1656    int i;
1657    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1658        BTIF_TRACE_WARNING("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1659        return;
1660    }
1661    btif_hh_cb.status = BTIF_HH_DISABLING;
1662    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1663         p_dev = &btif_hh_cb.devices[i];
1664         if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1665             BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1666             bta_hh_co_destroy(p_dev->fd);
1667             p_dev->fd = -1;
1668             p_dev->hh_keep_polling = 0;
1669             p_dev->hh_poll_thread_id = -1;
1670         }
1671     }
1672
1673    if (bt_hh_callbacks)
1674    {
1675        btif_disable_service(BTA_HID_SERVICE_ID);
1676        bt_hh_callbacks = NULL;
1677    }
1678
1679}
1680
1681static const bthh_interface_t bthhInterface = {
1682    sizeof(bthhInterface),
1683    init,
1684    connect,
1685    disconnect,
1686    virtual_unplug,
1687    set_info,
1688    get_protocol,
1689    set_protocol,
1690//    get_idle_time,
1691//    set_idle_time,
1692    get_report,
1693    set_report,
1694    send_data,
1695    cleanup,
1696};
1697
1698/*******************************************************************************
1699**
1700** Function         btif_hh_execute_service
1701**
1702** Description      Initializes/Shuts down the service
1703**
1704** Returns          BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1705**
1706*******************************************************************************/
1707bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1708{
1709     if (b_enable)
1710     {
1711          /* Enable and register with BTA-HH */
1712          BTA_HhEnable(BTA_SEC_ENCRYPT, bte_hh_evt);
1713     }
1714     else {
1715         /* Disable HH */
1716         BTA_HhDisable();
1717     }
1718     return BT_STATUS_SUCCESS;
1719}
1720
1721/*******************************************************************************
1722**
1723** Function         btif_hh_get_interface
1724**
1725** Description      Get the hh callback interface
1726**
1727** Returns          bthh_interface_t
1728**
1729*******************************************************************************/
1730const bthh_interface_t *btif_hh_get_interface()
1731{
1732    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1733    return &bthhInterface;
1734}
1735