btif_hh.c revision 76f645ea6f5cd22e464dcbdb1e73ecb50c5ea87c
1/******************************************************************************
2 *
3 *  Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/************************************************************************************
20 *
21 *  Filename:      btif_hh.c
22 *
23 *  Description:   HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27#include <hardware/bluetooth.h>
28#include <hardware/bt_hh.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <errno.h>
32#include <string.h>
33
34#define LOG_TAG "BTIF_HH"
35
36#include "bta_api.h"
37#include "bta_hh_api.h"
38#include "bd.h"
39#include "btif_storage.h"
40
41#include "btif_common.h"
42#include "btif_util.h"
43#include "btif_hh.h"
44#include "gki.h"
45#include "l2c_api.h"
46
47
48#define BTIF_HH_APP_ID_MI       0x01
49#define BTIF_HH_APP_ID_KB       0x02
50
51#define COD_HID_KEYBOARD        0x0540
52#define COD_HID_POINTING        0x0580
53#define COD_HID_COMBO           0x05C0
54#define COD_HID_MAJOR           0x0500
55
56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58#define HID_REPORT_CAPSLOCK   0x39
59#define HID_REPORT_NUMLOCK    0x53
60#define HID_REPORT_SCROLLLOCK 0x47
61
62//For Apple Magic Mouse
63#define MAGICMOUSE_VENDOR_ID 0x05ac
64#define MAGICMOUSE_PRODUCT_ID 0x030d
65
66#define LOGITECH_KB_MX5500_VENDOR_ID  0x046D
67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69extern const int BT_UID;
70extern const int BT_GID;
71static int btif_hh_prev_keyevents=0; //The previous key events
72static int btif_hh_keylockstates=0; //The current key state of each key
73
74#define BTIF_HH_ID_1        0
75#define BTIF_HH_DEV_DISCONNECTED 3
76
77#define BTIF_TIMEOUT_VUP_SECS   3
78
79
80#ifndef BTUI_HH_SECURITY
81#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
82#endif
83
84#ifndef BTUI_HH_MOUSE_SECURITY
85#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
86#endif
87
88/* HH request events */
89typedef enum
90{
91    BTIF_HH_CONNECT_REQ_EVT = 0,
92    BTIF_HH_DISCONNECT_REQ_EVT,
93    BTIF_HH_VUP_REQ_EVT
94} btif_hh_req_evt_t;
95
96
97/************************************************************************************
98**  Constants & Macros
99************************************************************************************/
100#define BTIF_HH_SERVICES    (BTA_HID_SERVICE_MASK)
101
102
103
104/************************************************************************************
105**  Local type definitions
106************************************************************************************/
107
108typedef struct hid_kb_list
109{
110    UINT16 product_id;
111    UINT16 version_id;
112    char*  kb_name;
113} tHID_KB_LIST;
114
115/************************************************************************************
116**  Static variables
117************************************************************************************/
118btif_hh_cb_t btif_hh_cb;
119
120static bthh_callbacks_t *bt_hh_callbacks = NULL;
121
122/* List of HID keyboards for which the NUMLOCK state needs to be
123 * turned ON by default. Add devices to this list to apply the
124 * NUMLOCK state toggle on fpr first connect.*/
125static tHID_KB_LIST hid_kb_numlock_on_list[] =
126{
127    {LOGITECH_KB_MX5500_PRODUCT_ID,
128    LOGITECH_KB_MX5500_VENDOR_ID,
129    "Logitech MX5500 Keyboard"}
130};
131
132
133#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
134    {\
135        BTIF_TRACE_WARNING("BTHH: %s: BTHH not initialized", __FUNCTION__);\
136        return BT_STATUS_NOT_READY;\
137    }\
138    else\
139    {\
140        BTIF_TRACE_EVENT("BTHH: %s", __FUNCTION__);\
141    }
142
143
144
145/************************************************************************************
146**  Static functions
147************************************************************************************/
148
149/************************************************************************************
150**  Externs
151************************************************************************************/
152extern void bta_hh_co_destroy(int fd);
153extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
154extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
155extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
156                                    UINT16 product_id, UINT16 version, UINT8 ctry_code,
157                                    int dscp_len, UINT8 *p_dscp);
158extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
159extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
160extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
161extern int  scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
162extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr);
163
164/*****************************************************************************
165**  Local Function prototypes
166*****************************************************************************/
167static void set_keylockstate(int keymask, BOOLEAN isSet);
168static void toggle_os_keylockstates(int fd, int changedkeystates);
169static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
170//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
171void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
172
173
174/************************************************************************************
175**  Functions
176************************************************************************************/
177
178static int get_keylockstates()
179{
180    return btif_hh_keylockstates;
181}
182
183static void set_keylockstate(int keymask, BOOLEAN isSet)
184{
185    if(isSet)
186        btif_hh_keylockstates |= keymask;
187}
188
189/*******************************************************************************
190**
191** Function         toggle_os_keylockstates
192**
193** Description      Function to toggle the keyboard lock states managed by the linux.
194**                  This function is used in by two call paths
195**                  (1) if the lock state change occurred from an onscreen keyboard,
196**                  this function is called to update the lock state maintained
197                    for the HID keyboard(s)
198**                  (2) if a HID keyboard is disconnected and reconnected,
199**                  this function is called to update the lock state maintained
200                    for the HID keyboard(s)
201** Returns          void
202*******************************************************************************/
203
204static void toggle_os_keylockstates(int fd, int changedlockstates)
205{
206    BTIF_TRACE_EVENT("%s: fd = %d, changedlockstates = 0x%x",
207        __FUNCTION__, fd, changedlockstates);
208    UINT8 hidreport[9];
209    int reportIndex;
210    memset(hidreport,0,9);
211    hidreport[0]=1;
212    reportIndex=4;
213
214    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
215        BTIF_TRACE_DEBUG("%s Setting CAPSLOCK", __FUNCTION__);
216        hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
217    }
218
219    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK)  {
220        BTIF_TRACE_DEBUG("%s Setting NUMLOCK", __FUNCTION__);
221        hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
222    }
223
224    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
225        BTIF_TRACE_DEBUG("%s Setting SCROLLLOCK", __FUNCTION__);
226        hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
227    }
228
229     BTIF_TRACE_DEBUG("Writing hidreport #1 to os: "\
230        "%s:  %x %x %x", __FUNCTION__,
231         hidreport[0], hidreport[1], hidreport[2]);
232    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
233         hidreport[3], hidreport[4], hidreport[5]);
234    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
235         hidreport[6], hidreport[7], hidreport[8]);
236    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
237    usleep(200000);
238    memset(hidreport,0,9);
239    hidreport[0]=1;
240    BTIF_TRACE_DEBUG("Writing hidreport #2 to os: "\
241       "%s:  %x %x %x", __FUNCTION__,
242         hidreport[0], hidreport[1], hidreport[2]);
243    BTIF_TRACE_DEBUG("%s:  %x %x %x", __FUNCTION__,
244         hidreport[3], hidreport[4], hidreport[5]);
245    BTIF_TRACE_DEBUG("%s:  %x %x %x ", __FUNCTION__,
246         hidreport[6], hidreport[7], hidreport[8]);
247    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
248}
249
250/*******************************************************************************
251**
252** Function         create_pbuf
253**
254** Description      Helper function to create p_buf for send_data or set_report
255**
256*******************************************************************************/
257static BT_HDR *create_pbuf(UINT16 len, UINT8 *data)
258{
259    BT_HDR* p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
260
261    if (p_buf) {
262        UINT8* pbuf_data;
263
264        p_buf->len = len;
265        p_buf->offset = BTA_HH_MIN_OFFSET;
266
267        pbuf_data = (UINT8*) (p_buf + 1) + p_buf->offset;
268        memcpy(pbuf_data, data, len);
269    }
270    return p_buf;
271}
272
273/*******************************************************************************
274**
275** Function         update_keyboard_lockstates
276**
277** Description      Sends a report to the keyboard to set the lock states of keys
278**
279*******************************************************************************/
280static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
281{
282    UINT8 len = 2;  /* reportid + 1 byte report*/
283    BD_ADDR* bda;
284    BT_HDR* p_buf;
285    UINT8 data[] = {0x01, /* report id */
286                    btif_hh_keylockstates}; /* keystate */
287
288    /* Set report for other keyboards */
289    BTIF_TRACE_EVENT("%s: setting report on dev_handle %d to 0x%x",
290         __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
291
292    /* Get SetReport buffer */
293    p_buf = create_pbuf(len, data);
294    if (p_buf != NULL) {
295        p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
296        bda = (BD_ADDR*) (&p_dev->bd_addr);
297        BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
298    }
299}
300
301/*******************************************************************************
302**
303** Function         sync_lockstate_on_connect
304**
305** Description      Function to update the keyboard lock states managed by the OS
306**                  when a HID keyboard is connected or disconnected and reconnected
307** Returns          void
308*******************************************************************************/
309static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
310{
311    int keylockstates;
312
313    BTIF_TRACE_EVENT("%s: Syncing keyboard lock states after "\
314        "reconnect...",__FUNCTION__);
315    /*If the device is connected, update keyboard state */
316    update_keyboard_lockstates(p_dev);
317
318    /*Check if the lockstate of caps,scroll,num is set.
319     If so, send a report to the kernel
320    so the lockstate is in sync */
321    keylockstates = get_keylockstates();
322    if (keylockstates)
323    {
324        BTIF_TRACE_DEBUG("%s: Sending hid report to kernel "\
325            "indicating lock key state 0x%x",__FUNCTION__,
326            keylockstates);
327        usleep(200000);
328        toggle_os_keylockstates(p_dev->fd, keylockstates);
329    }
330    else
331    {
332        BTIF_TRACE_DEBUG("%s: NOT sending hid report to kernel "\
333            "indicating lock key state 0x%x",__FUNCTION__,
334            keylockstates);
335    }
336}
337
338/*******************************************************************************
339**
340** Function         btif_hh_find_connected_dev_by_handle
341**
342** Description      Return the connected device pointer of the specified device handle
343**
344** Returns          Device entry pointer in the device table
345*******************************************************************************/
346btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
347{
348    UINT32 i;
349    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
350        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
351            btif_hh_cb.devices[i].dev_handle == handle)
352        {
353            return &btif_hh_cb.devices[i];
354        }
355    }
356    return NULL;
357}
358
359/*******************************************************************************
360**
361** Function         btif_hh_find_dev_by_bda
362**
363** Description      Return the device pointer of the specified bt_bdaddr_t.
364**
365** Returns          Device entry pointer in the device table
366*******************************************************************************/
367static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
368{
369    UINT32 i;
370    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
371        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
372            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
373        {
374            return &btif_hh_cb.devices[i];
375        }
376    }
377    return NULL;
378}
379
380/*******************************************************************************
381**
382** Function         btif_hh_find_connected_dev_by_bda
383**
384** Description      Return the connected device pointer of the specified bt_bdaddr_t.
385**
386** Returns          Device entry pointer in the device table
387*******************************************************************************/
388static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
389{
390    UINT32 i;
391    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
392        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
393            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
394        {
395            return &btif_hh_cb.devices[i];
396        }
397    }
398    return NULL;
399}
400
401/*******************************************************************************
402**
403** Function      btif_hh_stop_vup_timer
404**
405** Description  stop vitual unplug timer
406**
407** Returns      void
408*******************************************************************************/
409void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
410{
411    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
412    if(p_dev != NULL)
413    {
414        if (p_dev->vup_timer_active)
415        {
416            BTIF_TRACE_DEBUG("stop VUP timer ");
417            btu_stop_timer(&p_dev->vup_timer);
418        }
419        p_dev->vup_timer_active = FALSE;
420    }
421}
422/*******************************************************************************
423**
424** Function      btif_hh_start_vup_timer
425**
426** Description  start virtual unplug timer
427**
428** Returns      void
429*******************************************************************************/
430void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
431{
432    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
433
434    if (p_dev->vup_timer_active == FALSE)
435    {
436        BTIF_TRACE_DEBUG("Start VUP timer ");
437        memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
438        p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
439        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
440                        BTIF_TIMEOUT_VUP_SECS);
441    }
442    else
443    {
444        BTIF_TRACE_DEBUG("Restart VUP timer ");
445        btu_stop_timer(&p_dev->vup_timer);
446        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
447                        BTIF_TIMEOUT_VUP_SECS);
448    }
449        p_dev->vup_timer_active = TRUE;
450
451}
452
453/*******************************************************************************
454**
455** Function         btif_hh_add_added_dev
456**
457** Description      Add a new device to the added device list.
458**
459** Returns          TRUE if add successfully, otherwise FALSE.
460*******************************************************************************/
461BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
462{
463    int i;
464    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
465        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
466            BTIF_TRACE_WARNING(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
467                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
468            return FALSE;
469        }
470    }
471    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
472        if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
473            btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
474            btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
475            btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
476            btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
477            btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
478        {
479            BTIF_TRACE_WARNING(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
480                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
481            memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
482            btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
483            btif_hh_cb.added_devices[i].attr_mask  = attr_mask;
484            return TRUE;
485        }
486    }
487
488    BTIF_TRACE_WARNING("%s: Error, out of space to add device",__FUNCTION__);
489    return FALSE;
490}
491
492/*******************************************************************************
493 **
494 ** Function         btif_hh_remove_device
495 **
496 ** Description      Remove an added device from the stack.
497 **
498 ** Returns          void
499 *******************************************************************************/
500void btif_hh_remove_device(bt_bdaddr_t bd_addr)
501{
502    int                    i;
503    btif_hh_device_t       *p_dev;
504    btif_hh_added_device_t *p_added_dev;
505
506    ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
507         bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
508
509    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
510        p_added_dev = &btif_hh_cb.added_devices[i];
511        if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
512            BTA_HhRemoveDev(p_added_dev->dev_handle);
513            btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
514            memset(&(p_added_dev->bd_addr), 0, 6);
515            p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
516            break;
517        }
518    }
519
520    p_dev = btif_hh_find_dev_by_bda(&bd_addr);
521    if (p_dev == NULL) {
522        BTIF_TRACE_WARNING(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
523             bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
524        return;
525    }
526
527    /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
528    HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
529
530    p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
531    p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
532    if (btif_hh_cb.device_num > 0) {
533        btif_hh_cb.device_num--;
534    }
535    else {
536        BTIF_TRACE_WARNING("%s: device_num = 0", __FUNCTION__);
537    }
538
539    p_dev->hh_keep_polling = 0;
540    p_dev->hh_poll_thread_id = -1;
541    BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
542    if (p_dev->fd >= 0) {
543        bta_hh_co_destroy(p_dev->fd);
544        p_dev->fd = -1;
545    }
546}
547
548
549BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
550{
551    dest->descriptor.dl_len = 0;
552    if (src->descriptor.dl_len >0)
553    {
554        dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
555        if (dest->descriptor.dsc_list == NULL)
556        {
557            BTIF_TRACE_WARNING("%s: Failed to allocate DSCP for CB", __FUNCTION__);
558            return FALSE;
559        }
560    }
561    memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
562    dest->descriptor.dl_len = src->descriptor.dl_len;
563    dest->vendor_id  = src->vendor_id;
564    dest->product_id = src->product_id;
565    dest->version    = src->version;
566    dest->ctry_code  = src->ctry_code;
567    dest->ssr_max_latency = src->ssr_max_latency;
568    dest->ssr_min_tout = src->ssr_min_tout;
569    return TRUE;
570}
571
572
573/*******************************************************************************
574**
575** Function         btif_hh_virtual_unplug
576**
577** Description      Virtual unplug initiated from the BTIF thread context
578**                  Special handling for HID mouse-
579**
580** Returns          void
581**
582*******************************************************************************/
583
584bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
585{
586    BTIF_TRACE_DEBUG("%s", __FUNCTION__);
587    btif_hh_device_t *p_dev;
588    char bd_str[18];
589    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
590            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
591            bd_addr->address[4], bd_addr->address[5]);
592    p_dev = btif_hh_find_dev_by_bda(bd_addr);
593    if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
594        && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
595    {
596        BTIF_TRACE_DEBUG("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
597        /* start the timer */
598        btif_hh_start_vup_timer(bd_addr);
599        p_dev->local_vup = TRUE;
600        BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
601        return BT_STATUS_SUCCESS;
602    }
603    else
604    {
605        BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
606        return BT_STATUS_FAIL;
607    }
608}
609
610/*******************************************************************************
611**
612** Function         btif_hh_connect
613**
614** Description      connection initiated from the BTIF thread context
615**
616** Returns          int status
617**
618*******************************************************************************/
619
620bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
621{
622    btif_hh_device_t *dev;
623    btif_hh_added_device_t *added_dev = NULL;
624    char bda_str[20];
625    int i;
626    BD_ADDR *bda = (BD_ADDR*)bd_addr;
627    tBTA_HH_CONN conn;
628    CHECK_BTHH_INIT();
629    dev = btif_hh_find_dev_by_bda(bd_addr);
630    BTIF_TRACE_DEBUG("Connect _hh");
631    sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
632            (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
633    if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
634        // No space for more HID device now.
635         BTIF_TRACE_WARNING("%s: Error, exceeded the maximum supported HID device number %d",
636             __FUNCTION__, BTIF_HH_MAX_HID);
637        return BT_STATUS_FAIL;
638    }
639
640    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
641        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
642            added_dev = &btif_hh_cb.added_devices[i];
643             BTIF_TRACE_WARNING("%s: Device %s already added, attr_mask = 0x%x",
644                 __FUNCTION__, bda_str, added_dev->attr_mask);
645        }
646    }
647
648    if (added_dev != NULL) {
649        if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
650            // No space for more HID device now.
651            BTIF_TRACE_ERROR("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
652            memset(&(added_dev->bd_addr), 0, 6);
653            added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
654            return BT_STATUS_FAIL;
655        }
656    }
657
658    if (added_dev == NULL ||
659        (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
660        (added_dev->attr_mask & HID_RECONN_INIT) == 0)
661    {
662        tBTA_SEC sec_mask = BTUI_HH_SECURITY;
663        btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
664        BD_ADDR *bda = (BD_ADDR*)bd_addr;
665        BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
666    }
667    else
668    {
669        // This device shall be connected from the host side.
670        BTIF_TRACE_ERROR("%s: Error, device %s can only be reconnected from device side",
671             __FUNCTION__, bda_str);
672        return BT_STATUS_FAIL;
673    }
674
675    HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
676    return BT_STATUS_SUCCESS;
677}
678
679/*******************************************************************************
680**
681** Function         btif_hh_disconnect
682**
683** Description      disconnection initiated from the BTIF thread context
684**
685** Returns          void
686**
687*******************************************************************************/
688
689void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
690{
691    BD_ADDR *bda = (BD_ADDR*)bd_addr;
692    btif_hh_device_t *p_dev;
693    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
694    if (p_dev != NULL)
695    {
696        BTA_HhClose(p_dev->dev_handle);
697    }
698    else
699        BTIF_TRACE_DEBUG("%s-- Error: device not connected:",__FUNCTION__);
700}
701
702/*******************************************************************************
703**
704** Function         btif_btif_hh_setreport
705**
706** Description      setreport initiated from the BTIF thread context
707**
708** Returns          void
709**
710*******************************************************************************/
711void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
712                            UINT8* report)
713{
714    BT_HDR* p_buf = create_pbuf(size, report);
715    if (p_buf == NULL) {
716        APPL_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, size = %d", __FUNCTION__, size);
717        return;
718    }
719    BTA_HhSetReport(p_dev->dev_handle, r_type, p_buf);
720}
721
722/*****************************************************************************
723**   Section name (Group of functions)
724*****************************************************************************/
725
726/*****************************************************************************
727**
728**   btif hh api functions (no context switch)
729**
730*****************************************************************************/
731
732
733/*******************************************************************************
734**
735** Function         btif_hh_upstreams_evt
736**
737** Description      Executes HH UPSTREAMS events in btif context
738**
739** Returns          void
740**
741*******************************************************************************/
742static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
743{
744    tBTA_HH *p_data = (tBTA_HH *)p_param;
745    bdstr_t bdstr;
746    btif_hh_device_t *p_dev = NULL;
747    int i;
748    int len, tmplen;
749
750    BTIF_TRACE_DEBUG("%s: event=%s", __FUNCTION__, dump_hh_event(event));
751
752    switch (event)
753    {
754        case BTA_HH_ENABLE_EVT:
755            BTIF_TRACE_DEBUG("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
756            if (p_data->status == BTA_HH_OK) {
757                btif_hh_cb.status = BTIF_HH_ENABLED;
758                BTIF_TRACE_DEBUG("%s--Loading added devices",__FUNCTION__);
759                /* Add hid descriptors for already bonded hid devices*/
760                btif_storage_load_bonded_hid_info();
761            }
762            else {
763                btif_hh_cb.status = BTIF_HH_DISABLED;
764                BTIF_TRACE_WARNING("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
765            }
766            break;
767
768        case BTA_HH_DISABLE_EVT:
769            btif_hh_cb.status = BTIF_HH_DISABLED;
770            if (p_data->status == BTA_HH_OK) {
771                int i;
772                //Clear the control block
773                memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
774                for (i = 0; i < BTIF_HH_MAX_HID; i++){
775                    btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
776                }
777            }
778            else
779                BTIF_TRACE_WARNING("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
780            break;
781
782        case BTA_HH_OPEN_EVT:
783            BTIF_TRACE_WARNING("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
784            if (p_data->conn.status == BTA_HH_OK) {
785                p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
786                if (p_dev == NULL) {
787                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
788                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
789                    // The connect request must come from device side and exceeded the connected
790                                   // HID device number.
791                    BTA_HhClose(p_data->conn.handle);
792                    HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
793                }
794                else if (p_dev->fd < 0) {
795                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
796                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
797                    //remove the connection  and then try again to reconnect from the mouse side to recover
798                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
799                    BTA_HhClose(p_data->conn.handle);
800                }
801                else {
802                    BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
803                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
804                    btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
805                    // Send set_idle if the peer_device is a keyboard
806                    if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
807                                check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
808                        BTA_HhSetIdle(p_data->conn.handle, 0);
809                    btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
810                    BTA_HhGetDscpInfo(p_data->conn.handle);
811                    p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
812                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
813                }
814            }
815            else {
816                bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
817                btif_dm_hh_open_failed(bdaddr);
818                HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
819                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
820            }
821            break;
822        case BTA_HH_CLOSE_EVT:
823            BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
824            p_data->dev_status.status, p_data->dev_status.handle);
825            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
826            if (p_dev != NULL) {
827                BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
828                if(p_dev->vup_timer_active)
829                {
830                    btif_hh_stop_vup_timer(&(p_dev->bd_addr));
831                }
832                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
833                p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
834                HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
835                BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
836                bta_hh_co_destroy(p_dev->fd);
837                p_dev->fd = -1;
838            }
839            else {
840                BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->dev_status.handle);
841            }
842            break;
843        case BTA_HH_GET_RPT_EVT: {
844            BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data;
845            UINT8 *data = NULL;
846            UINT16 len = 0;
847
848            BTIF_TRACE_DEBUG("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
849                 p_data->hs_data.status, p_data->hs_data.handle);
850            p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle);
851            if (p_dev) {
852                /* p_rpt_data is NULL in HANDSHAKE response case */
853                if (hdr) {
854                    data = (UINT8 *)(hdr + 1) + hdr->offset;
855                    len = hdr->len;
856                    HAL_CBACK(bt_hh_callbacks, get_report_cb,
857                              (bt_bdaddr_t*) &(p_dev->bd_addr),
858                              (bthh_status_t) p_data->hs_data.status, data, len);
859                } else {
860                    HAL_CBACK(bt_hh_callbacks, handshake_cb,
861                              (bt_bdaddr_t*) &(p_dev->bd_addr),
862                              (bthh_status_t) p_data->hs_data.status);
863                }
864            } else {
865                BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->hs_data.handle);
866            }
867            break;
868        }
869        case BTA_HH_SET_RPT_EVT:
870            BTIF_TRACE_DEBUG("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
871            p_data->dev_status.status, p_data->dev_status.handle);
872            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
873            if (p_dev != NULL) {
874                HAL_CBACK(bt_hh_callbacks, handshake_cb,
875                          (bt_bdaddr_t*) &(p_dev->bd_addr),
876                          (bthh_status_t) p_data->hs_data.status);
877            }
878            break;
879
880        case BTA_HH_GET_PROTO_EVT:
881            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
882            BTIF_TRACE_WARNING("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
883                 p_data->hs_data.status, p_data->hs_data.handle,
884                 p_data->hs_data.rsp_data.proto_mode,
885                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
886                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
887            if (p_data->hs_data.rsp_data.proto_mode != BTA_HH_PROTO_UNKNOWN) {
888                HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,
889                          (bt_bdaddr_t*) &(p_dev->bd_addr),
890                          (bthh_status_t)p_data->hs_data.status,
891                          (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
892            } else {
893                HAL_CBACK(bt_hh_callbacks, handshake_cb,
894                          (bt_bdaddr_t*) &(p_dev->bd_addr),
895                          (bthh_status_t)p_data->hs_data.status);
896            }
897            break;
898
899        case BTA_HH_SET_PROTO_EVT:
900            BTIF_TRACE_DEBUG("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
901                 p_data->dev_status.status, p_data->dev_status.handle);
902            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
903            if (p_dev) {
904                HAL_CBACK(bt_hh_callbacks, handshake_cb,
905                          (bt_bdaddr_t*)&(p_dev->bd_addr),
906                          (bthh_status_t)p_data->hs_data.status);
907            }
908            break;
909
910        case BTA_HH_GET_IDLE_EVT:
911            BTIF_TRACE_DEBUG("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
912                 p_data->hs_data.handle, p_data->hs_data.status,
913                 p_data->hs_data.rsp_data.idle_rate);
914            break;
915
916        case BTA_HH_SET_IDLE_EVT:
917            BTIF_TRACE_DEBUG("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
918            p_data->dev_status.status, p_data->dev_status.handle);
919            break;
920
921        case BTA_HH_GET_DSCP_EVT:
922            BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
923                p_data->dev_status.status, p_data->dev_status.handle);
924                len = p_data->dscp_info.descriptor.dl_len;
925                BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT: len = %d", len);
926            p_dev = btif_hh_cb.p_curr_dev;
927            if (p_dev == NULL) {
928                BTIF_TRACE_ERROR("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
929                return;
930            }
931            if (p_dev->fd < 0) {
932                ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
933                return;
934            }
935            {
936                char *cached_name = NULL;
937                bt_bdname_t bdname;
938                bt_property_t prop_name;
939                BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME,
940                                           sizeof(bt_bdname_t), &bdname);
941                if (btif_storage_get_remote_device_property(
942                    &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS)
943                {
944                    cached_name = (char *)bdname.name;
945                }
946                else
947                {
948                    cached_name = "Bluetooth HID";
949                }
950
951                BTIF_TRACE_WARNING("%s: name = %s", __FUNCTION__, cached_name);
952                bta_hh_co_send_hid_info(p_dev, cached_name,
953                    p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
954                    p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
955                    len, p_data->dscp_info.descriptor.dsc_list);
956                if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
957                    BD_ADDR bda;
958                    bdcpy(bda, p_dev->bd_addr.address);
959                    tBTA_HH_DEV_DSCP_INFO dscp_info;
960                    bt_status_t ret;
961                    bdcpy(bda, p_dev->bd_addr.address);
962                    btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
963                    BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
964                              p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
965                              p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
966                              p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
967                    BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
968                    // write hid info to nvram
969                    ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
970                                                        p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
971                                                        p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
972                                                        p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout,
973                                                        len, p_data->dscp_info.descriptor.dsc_list);
974
975                    ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
976                    BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device");
977
978                    //Free buffer created for dscp_info;
979                    if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
980                    {
981                      GKI_freebuf(dscp_info.descriptor.dsc_list);
982                      dscp_info.descriptor.dsc_list = NULL;
983                      dscp_info.descriptor.dl_len=0;
984                    }
985                }
986                else {
987                    //Device already added.
988                    BTIF_TRACE_WARNING("%s: Device already added ",__FUNCTION__);
989                }
990                /*Sync HID Keyboard lockstates */
991                tmplen = sizeof(hid_kb_numlock_on_list)
992                            / sizeof(tHID_KB_LIST);
993                for(i = 0; i< tmplen; i++)
994                {
995                    if(p_data->dscp_info.vendor_id
996                        == hid_kb_numlock_on_list[i].version_id &&
997                        p_data->dscp_info.product_id
998                        == hid_kb_numlock_on_list[i].product_id)
999                    {
1000                        BTIF_TRACE_DEBUG("%s() idx[%d] Enabling "\
1001                            "NUMLOCK for device :: %s", __FUNCTION__,
1002                            i, hid_kb_numlock_on_list[i].kb_name);
1003                        /* Enable NUMLOCK by default so that numeric
1004                            keys work from first keyboard connect */
1005                        set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1006                                        TRUE);
1007                        sync_lockstate_on_connect(p_dev);
1008                        /* End Sync HID Keyboard lockstates */
1009                        break;
1010                    }
1011                }
1012            }
1013            break;
1014
1015        case BTA_HH_ADD_DEV_EVT:
1016            BTIF_TRACE_WARNING("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1017            int i;
1018            for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1019                if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1020                    if (p_data->dev_info.status == BTA_HH_OK) {
1021                        btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1022                    }
1023                    else {
1024                        memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1025                        btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1026                    }
1027                    break;
1028                }
1029            }
1030            break;
1031        case BTA_HH_RMV_DEV_EVT:
1032                BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1033                     p_data->dev_info.status, p_data->dev_info.handle);
1034                BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1035                     p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1036                     p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1037                break;
1038
1039
1040        case BTA_HH_VC_UNPLUG_EVT:
1041                BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1042                     p_data->dev_status.status, p_data->dev_status.handle);
1043                p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1044                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1045                if (p_dev != NULL) {
1046                    BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1047                         p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1048                         p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1049                         p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1050                    /* Stop the VUP timer */
1051                    if(p_dev->vup_timer_active)
1052                    {
1053                        btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1054                    }
1055                    p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1056                    BTIF_TRACE_DEBUG("%s---Sending connection state change", __FUNCTION__);
1057                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1058                    BTIF_TRACE_DEBUG("%s---Removing HID bond", __FUNCTION__);
1059                    /* If it is locally initiated VUP or remote device has its major COD as
1060                    Peripheral removed the bond.*/
1061                    if (p_dev->local_vup  || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1062                    {
1063                        p_dev->local_vup = FALSE;
1064                        BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1065                    }
1066                    else
1067                        btif_hh_remove_device(p_dev->bd_addr);
1068                    HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1069                                    p_data->dev_status.status);
1070                }
1071                break;
1072
1073        case BTA_HH_API_ERR_EVT  :
1074                ALOGI("BTA_HH API_ERR");
1075                break;
1076
1077
1078
1079            default:
1080                BTIF_TRACE_WARNING("%s: Unhandled event: %d", __FUNCTION__, event);
1081                break;
1082        }
1083}
1084
1085/*******************************************************************************
1086**
1087** Function         bte_hh_evt
1088**
1089** Description      Switches context from BTE to BTIF for all HH events
1090**
1091** Returns          void
1092**
1093*******************************************************************************/
1094
1095static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1096{
1097    bt_status_t status;
1098    int param_len = 0;
1099
1100    if (BTA_HH_ENABLE_EVT == event)
1101        param_len = sizeof(tBTA_HH_STATUS);
1102    else if (BTA_HH_OPEN_EVT == event)
1103        param_len = sizeof(tBTA_HH_CONN);
1104    else if (BTA_HH_DISABLE_EVT == event)
1105        param_len = sizeof(tBTA_HH_STATUS);
1106    else if (BTA_HH_CLOSE_EVT == event)
1107        param_len = sizeof(tBTA_HH_CBDATA);
1108    else if (BTA_HH_GET_DSCP_EVT == event)
1109        param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1110    else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1111        param_len = sizeof(tBTA_HH_HSDATA);
1112    else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1113        param_len = sizeof(tBTA_HH_CBDATA);
1114    else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1115        param_len = sizeof(tBTA_HH_DEV_INFO);
1116    else if (BTA_HH_API_ERR_EVT == event)
1117        param_len = 0;
1118    /* switch context to btif task context (copy full union size for convenience) */
1119    status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1120
1121    /* catch any failed context transfers */
1122    ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1123}
1124
1125/*******************************************************************************
1126**
1127** Function         btif_hh_handle_evt
1128**
1129** Description      Switches context for immediate callback
1130**
1131** Returns          void
1132**
1133*******************************************************************************/
1134
1135static void btif_hh_handle_evt(UINT16 event, char *p_param)
1136{
1137    bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1138    BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1139    int ret;
1140    switch(event)
1141    {
1142        case BTIF_HH_CONNECT_REQ_EVT:
1143        {
1144            ret = btif_hh_connect(bd_addr);
1145            if(ret == BT_STATUS_SUCCESS)
1146            {
1147                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1148            }
1149            else
1150                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1151        }
1152        break;
1153
1154        case BTIF_HH_DISCONNECT_REQ_EVT:
1155        {
1156            BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1157            btif_hh_disconnect(bd_addr);
1158            HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1159        }
1160        break;
1161
1162        case BTIF_HH_VUP_REQ_EVT:
1163        {
1164            BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1165            ret = btif_hh_virtual_unplug(bd_addr);
1166        }
1167        break;
1168
1169        default:
1170        {
1171            BTIF_TRACE_WARNING("%s : Unknown event 0x%x", __FUNCTION__, event);
1172        }
1173        break;
1174    }
1175}
1176
1177/*******************************************************************************
1178**
1179** Function      btif_hh_tmr_hdlr
1180**
1181** Description   Process timer timeout
1182**
1183** Returns      void
1184*******************************************************************************/
1185void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1186{
1187    btif_hh_device_t *p_dev;
1188    UINT8               i,j;
1189    tBTA_HH_EVT event;
1190    tBTA_HH p_data;
1191    int param_len = 0;
1192    memset(&p_data, 0, sizeof(tBTA_HH));
1193
1194    BTIF_TRACE_DEBUG("%s timer_in_use=%d",  __FUNCTION__, tle->in_use );
1195
1196    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1197        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1198        {
1199
1200            p_dev = &btif_hh_cb.devices[i];
1201
1202            if (p_dev->vup_timer_active)
1203            {
1204                p_dev->vup_timer_active = FALSE;
1205                event = BTA_HH_VC_UNPLUG_EVT;
1206                p_data.dev_status.status = BTHH_ERR;
1207                p_data.dev_status.handle = p_dev->dev_handle;
1208                param_len = sizeof(tBTA_HH_CBDATA);
1209
1210                /* switch context to btif task context */
1211                btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1212                            param_len, NULL);
1213            }
1214        }
1215    }
1216}
1217
1218/*******************************************************************************
1219**
1220** Function         btif_hh_init
1221**
1222** Description     initializes the hh interface
1223**
1224** Returns         bt_status_t
1225**
1226*******************************************************************************/
1227static bt_status_t init( bthh_callbacks_t* callbacks )
1228{
1229    UINT32 i;
1230    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1231
1232    bt_hh_callbacks = callbacks;
1233    memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1234    for (i = 0; i < BTIF_HH_MAX_HID; i++){
1235        btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1236    }
1237    /* Invoke the enable service API to the core to set the appropriate service_id */
1238    btif_enable_service(BTA_HID_SERVICE_ID);
1239    return BT_STATUS_SUCCESS;
1240}
1241
1242/*******************************************************************************
1243**
1244** Function        connect
1245**
1246** Description     connect to hid device
1247**
1248** Returns         bt_status_t
1249**
1250*******************************************************************************/
1251static bt_status_t connect( bt_bdaddr_t *bd_addr)
1252{
1253    if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1254    {
1255        btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1256                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1257        return BT_STATUS_SUCCESS;
1258    }
1259    else
1260        return BT_STATUS_BUSY;
1261}
1262
1263/*******************************************************************************
1264**
1265** Function         disconnect
1266**
1267** Description      disconnect from hid device
1268**
1269** Returns         bt_status_t
1270**
1271*******************************************************************************/
1272static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1273{
1274    CHECK_BTHH_INIT();
1275    btif_hh_device_t *p_dev;
1276
1277    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1278    {
1279        BTIF_TRACE_WARNING("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1280        return BT_STATUS_FAIL;
1281    }
1282    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1283    if (p_dev != NULL)
1284    {
1285        return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1286                     (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1287    }
1288    else
1289    {
1290        BTIF_TRACE_WARNING("%s: Error, device  not opened.", __FUNCTION__);
1291        return BT_STATUS_FAIL;
1292    }
1293}
1294
1295/*******************************************************************************
1296**
1297** Function         virtual_unplug
1298**
1299** Description      Virtual UnPlug (VUP) the specified HID device.
1300**
1301** Returns         bt_status_t
1302**
1303*******************************************************************************/
1304static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1305{
1306    CHECK_BTHH_INIT();
1307    btif_hh_device_t *p_dev;
1308    char bd_str[18];
1309    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1310            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
1311            bd_addr->address[4], bd_addr->address[5]);
1312    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1313    {
1314        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1315        return BT_STATUS_FAIL;
1316    }
1317    p_dev = btif_hh_find_dev_by_bda(bd_addr);
1318    if (!p_dev)
1319    {
1320        BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1321        return BT_STATUS_FAIL;
1322    }
1323    btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1324                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1325    return BT_STATUS_SUCCESS;
1326}
1327
1328
1329/*******************************************************************************
1330**
1331** Function         set_info
1332**
1333** Description      Set the HID device descriptor for the specified HID device.
1334**
1335** Returns         bt_status_t
1336**
1337*******************************************************************************/
1338static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1339{
1340    CHECK_BTHH_INIT();
1341    tBTA_HH_DEV_DSCP_INFO dscp_info;
1342    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1343
1344    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1345         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1346    BTIF_TRACE_DEBUG("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1347         "product_id = 0x%04x, version= 0x%04x",
1348         __FUNCTION__, hid_info.sub_class,
1349         hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1350         hid_info.version);
1351
1352    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1353    {
1354        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1355        return BT_STATUS_FAIL;
1356    }
1357
1358    dscp_info.vendor_id  = hid_info.vendor_id;
1359    dscp_info.product_id = hid_info.product_id;
1360    dscp_info.version    = hid_info.version;
1361    dscp_info.ctry_code  = hid_info.ctry_code;
1362
1363    dscp_info.descriptor.dl_len = hid_info.dl_len;
1364    dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1365    if (dscp_info.descriptor.dsc_list == NULL)
1366    {
1367        ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1368        return BT_STATUS_FAIL;
1369    }
1370    memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1371
1372    if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1373    {
1374        BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1375                     hid_info.app_id, dscp_info);
1376    }
1377
1378    GKI_freebuf(dscp_info.descriptor.dsc_list);
1379
1380    return BT_STATUS_SUCCESS;
1381}
1382
1383/*******************************************************************************
1384**
1385** Function         get_protocol
1386**
1387** Description      Get the HID proto mode.
1388**
1389** Returns         bt_status_t
1390**
1391*******************************************************************************/
1392static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1393{
1394    CHECK_BTHH_INIT();
1395    btif_hh_device_t *p_dev;
1396    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1397    UNUSED(protocolMode);
1398
1399    BTIF_TRACE_DEBUG(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1400         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1401
1402    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1403        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1404        return BT_STATUS_FAIL;
1405    }
1406
1407    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1408    if (p_dev != NULL) {
1409
1410        BTA_HhGetProtoMode(p_dev->dev_handle);
1411    }
1412    else {
1413        return BT_STATUS_FAIL;
1414    }
1415    return BT_STATUS_SUCCESS;
1416}
1417
1418/*******************************************************************************
1419**
1420** Function         set_protocol
1421**
1422** Description      Set the HID proto mode.
1423**
1424** Returns         bt_status_t
1425**
1426*******************************************************************************/
1427static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1428{
1429    CHECK_BTHH_INIT();
1430    btif_hh_device_t *p_dev;
1431    UINT8 proto_mode = protocolMode;
1432    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1433
1434    BTIF_TRACE_DEBUG("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1435
1436    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1437         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1438
1439    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1440        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1441        return BT_STATUS_FAIL;
1442    }
1443
1444    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1445    if (p_dev == NULL) {
1446        BTIF_TRACE_WARNING(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1447             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1448        return BT_STATUS_FAIL;
1449    }
1450    else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1451        BTIF_TRACE_WARNING("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1452        return BT_STATUS_FAIL;
1453    }
1454    else {
1455        BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1456    }
1457
1458
1459    return BT_STATUS_SUCCESS;
1460}
1461
1462/*******************************************************************************
1463**
1464** Function         get_report
1465**
1466** Description      Send a GET_REPORT to HID device.
1467**
1468** Returns         bt_status_t
1469**
1470*******************************************************************************/
1471static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1472{
1473    CHECK_BTHH_INIT();
1474    btif_hh_device_t *p_dev;
1475    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1476
1477    BTIF_TRACE_DEBUG("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1478          reportType, reportId, bufferSize);
1479
1480    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1481         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1482
1483    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1484        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1485        return BT_STATUS_FAIL;
1486    }
1487
1488
1489    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1490    if (p_dev == NULL) {
1491        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1492             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1493        return BT_STATUS_FAIL;
1494    }
1495    else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1496        BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1497             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1498        return BT_STATUS_FAIL;
1499    }
1500    else {
1501        BTA_HhGetReport(p_dev->dev_handle, reportType,
1502                        reportId, bufferSize);
1503    }
1504
1505    return BT_STATUS_SUCCESS;
1506}
1507
1508/*******************************************************************************
1509**
1510** Function         set_report
1511**
1512** Description      Send a SET_REPORT to HID device.
1513**
1514** Returns         bt_status_t
1515**
1516*******************************************************************************/
1517static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1518{
1519    CHECK_BTHH_INIT();
1520    btif_hh_device_t *p_dev;
1521    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1522
1523    BTIF_TRACE_DEBUG("%s:reportType = %d", __FUNCTION__,reportType);
1524
1525    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1526         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1527
1528
1529    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1530        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1531        return BT_STATUS_FAIL;
1532    }
1533
1534    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1535    if (p_dev == NULL) {
1536        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1537             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1538        return BT_STATUS_FAIL;
1539    }
1540    else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1541        BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1542             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1543        return BT_STATUS_FAIL;
1544    }
1545    else {
1546        int    hex_bytes_filled;
1547        UINT8  *hexbuf;
1548        UINT16 len = (strlen(report) + 1) / 2;
1549
1550        hexbuf = GKI_getbuf(len);
1551        if (hexbuf == NULL) {
1552            BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1553                __FUNCTION__, len);
1554            return BT_STATUS_FAIL;
1555        }
1556
1557        /* Build a SetReport data buffer */
1558        memset(hexbuf, 0, len);
1559        //TODO
1560        hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1561        BTIF_TRACE_DEBUG("Hex bytes filled, hex value: %d", hex_bytes_filled);
1562        if (hex_bytes_filled) {
1563            BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1564            if (p_buf == NULL) {
1565                BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1566                                  __FUNCTION__, hex_bytes_filled);
1567                GKI_freebuf(hexbuf);
1568                return BT_STATUS_FAIL;
1569            }
1570            BTA_HhSetReport(p_dev->dev_handle, reportType, p_buf);
1571            GKI_freebuf(hexbuf);
1572            return BT_STATUS_SUCCESS;
1573        }
1574        GKI_freebuf(hexbuf);
1575        return BT_STATUS_FAIL;
1576    }
1577}
1578
1579/*******************************************************************************
1580**
1581** Function         send_data
1582**
1583** Description      Send a SEND_DATA to HID device.
1584**
1585** Returns         bt_status_t
1586**
1587*******************************************************************************/
1588static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1589{
1590    CHECK_BTHH_INIT();
1591    btif_hh_device_t *p_dev;
1592    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1593
1594    BTIF_TRACE_DEBUG("%s", __FUNCTION__);
1595
1596    BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1597         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1598
1599    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1600        BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1601        return BT_STATUS_FAIL;
1602    }
1603
1604    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1605    if (p_dev == NULL) {
1606        BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1607             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1608        return BT_STATUS_FAIL;
1609    }
1610
1611    else {
1612        int    hex_bytes_filled;
1613        UINT8  *hexbuf;
1614        UINT16 len = (strlen(data) + 1) / 2;
1615
1616        hexbuf = GKI_getbuf(len);
1617        if (hexbuf == NULL) {
1618            BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1619                __FUNCTION__, len);
1620            return BT_STATUS_FAIL;
1621        }
1622
1623        /* Build a SendData data buffer */
1624        memset(hexbuf, 0, len);
1625        hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1626        BTIF_TRACE_ERROR("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1627
1628        if (hex_bytes_filled) {
1629            BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1630            if (p_buf == NULL) {
1631                BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1632                                  __FUNCTION__, hex_bytes_filled);
1633                GKI_freebuf(hexbuf);
1634                return BT_STATUS_FAIL;
1635            }
1636            p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1637            BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
1638            GKI_freebuf(hexbuf);
1639            return BT_STATUS_SUCCESS;
1640        }
1641        GKI_freebuf(hexbuf);
1642        return BT_STATUS_FAIL;
1643    }
1644}
1645
1646
1647/*******************************************************************************
1648**
1649** Function         cleanup
1650**
1651** Description      Closes the HH interface
1652**
1653** Returns          bt_status_t
1654**
1655*******************************************************************************/
1656static void  cleanup( void )
1657{
1658    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1659    btif_hh_device_t *p_dev;
1660    int i;
1661    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1662        BTIF_TRACE_WARNING("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1663        return;
1664    }
1665    btif_hh_cb.status = BTIF_HH_DISABLING;
1666    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1667         p_dev = &btif_hh_cb.devices[i];
1668         if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1669             BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1670             bta_hh_co_destroy(p_dev->fd);
1671             p_dev->fd = -1;
1672             p_dev->hh_keep_polling = 0;
1673             p_dev->hh_poll_thread_id = -1;
1674         }
1675     }
1676
1677    if (bt_hh_callbacks)
1678    {
1679        btif_disable_service(BTA_HID_SERVICE_ID);
1680        bt_hh_callbacks = NULL;
1681    }
1682
1683}
1684
1685static const bthh_interface_t bthhInterface = {
1686    sizeof(bthhInterface),
1687    init,
1688    connect,
1689    disconnect,
1690    virtual_unplug,
1691    set_info,
1692    get_protocol,
1693    set_protocol,
1694//    get_idle_time,
1695//    set_idle_time,
1696    get_report,
1697    set_report,
1698    send_data,
1699    cleanup,
1700};
1701
1702/*******************************************************************************
1703**
1704** Function         btif_hh_execute_service
1705**
1706** Description      Initializes/Shuts down the service
1707**
1708** Returns          BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1709**
1710*******************************************************************************/
1711bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1712{
1713     if (b_enable)
1714     {
1715          /* Enable and register with BTA-HH */
1716          BTA_HhEnable(BTA_SEC_ENCRYPT, bte_hh_evt);
1717     }
1718     else {
1719         /* Disable HH */
1720         BTA_HhDisable();
1721     }
1722     return BT_STATUS_SUCCESS;
1723}
1724
1725/*******************************************************************************
1726**
1727** Function         btif_hh_get_interface
1728**
1729** Description      Get the hh callback interface
1730**
1731** Returns          bthh_interface_t
1732**
1733*******************************************************************************/
1734const bthh_interface_t *btif_hh_get_interface()
1735{
1736    BTIF_TRACE_EVENT("%s", __FUNCTION__);
1737    return &bthhInterface;
1738}
1739