btif_hh.c revision b46d9b899f5e28929c8530cb99d023c93e5d5cb8
1/******************************************************************************
2 *
3 *  Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/************************************************************************************
20 *
21 *  Filename:      btif_hh.c
22 *
23 *  Description:   HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27#include <hardware/bluetooth.h>
28#include <hardware/bt_hh.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <errno.h>
32#include <string.h>
33
34#define LOG_TAG "BTIF_HH"
35
36#include "bta_api.h"
37#include "bta_hh_api.h"
38#include "bd.h"
39#include "btif_storage.h"
40
41#include "btif_common.h"
42#include "btif_util.h"
43#include "btif_hh.h"
44#include "gki.h"
45#include "l2c_api.h"
46
47
48#define BTIF_HH_APP_ID_MI       0x01
49#define BTIF_HH_APP_ID_KB       0x02
50
51#define COD_HID_KEYBOARD        0x0540
52#define COD_HID_POINTING        0x0580
53#define COD_HID_COMBO           0x05C0
54#define COD_HID_MAJOR           0x0500
55
56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58#define HID_REPORT_CAPSLOCK   0x39
59#define HID_REPORT_NUMLOCK    0x53
60#define HID_REPORT_SCROLLLOCK 0x47
61
62//For Apple Magic Mouse
63#define MAGICMOUSE_VENDOR_ID 0x05ac
64#define MAGICMOUSE_PRODUCT_ID 0x030d
65
66#define LOGITECH_KB_MX5500_VENDOR_ID  0x046D
67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69extern const int BT_UID;
70extern const int BT_GID;
71static int btif_hh_prev_keyevents=0; //The previous key events
72static int btif_hh_keylockstates=0; //The current key state of each key
73
74#define BTIF_HH_ID_1        0
75#define BTIF_HH_DEV_DISCONNECTED 3
76
77#define BTIF_TIMEOUT_VUP_SECS   3
78
79
80#ifndef BTUI_HH_SECURITY
81#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
82#endif
83
84#ifndef BTUI_HH_MOUSE_SECURITY
85#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
86#endif
87
88/* HH request events */
89typedef enum
90{
91    BTIF_HH_CONNECT_REQ_EVT = 0,
92    BTIF_HH_DISCONNECT_REQ_EVT,
93    BTIF_HH_VUP_REQ_EVT
94} btif_hh_req_evt_t;
95
96
97/************************************************************************************
98**  Constants & Macros
99************************************************************************************/
100#define BTIF_HH_SERVICES    (BTA_HID_SERVICE_MASK)
101
102
103
104/************************************************************************************
105**  Local type definitions
106************************************************************************************/
107
108typedef struct hid_kb_list
109{
110    UINT16 product_id;
111    UINT16 version_id;
112    char*  kb_name;
113} tHID_KB_LIST;
114
115/************************************************************************************
116**  Static variables
117************************************************************************************/
118btif_hh_cb_t btif_hh_cb;
119
120static bthh_callbacks_t *bt_hh_callbacks = NULL;
121
122/* List of HID keyboards for which the NUMLOCK state needs to be
123 * turned ON by default. Add devices to this list to apply the
124 * NUMLOCK state toggle on fpr first connect.*/
125static tHID_KB_LIST hid_kb_numlock_on_list[] =
126{
127    {LOGITECH_KB_MX5500_PRODUCT_ID,
128    LOGITECH_KB_MX5500_VENDOR_ID,
129    "Logitech MX5500 Keyboard"}
130};
131
132
133#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
134    {\
135        BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\
136        return BT_STATUS_NOT_READY;\
137    }\
138    else\
139    {\
140        BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\
141    }
142
143
144
145/************************************************************************************
146**  Static functions
147************************************************************************************/
148
149/************************************************************************************
150**  Externs
151************************************************************************************/
152extern void bta_hh_co_destroy(int fd);
153extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
154extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
155extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
156                                    UINT16 product_id, UINT16 version, UINT8 ctry_code,
157                                    int dscp_len, UINT8 *p_dscp);
158extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
159extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
160extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
161extern int  scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
162extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr);
163
164/*****************************************************************************
165**  Local Function prototypes
166*****************************************************************************/
167static void set_keylockstate(int keymask, BOOLEAN isSet);
168static void toggle_os_keylockstates(int fd, int changedkeystates);
169static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
170//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
171void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
172
173
174/************************************************************************************
175**  Functions
176************************************************************************************/
177
178static int get_keylockstates()
179{
180    return btif_hh_keylockstates;
181}
182
183static void set_keylockstate(int keymask, BOOLEAN isSet)
184{
185    if(isSet)
186        btif_hh_keylockstates |= keymask;
187}
188
189/*******************************************************************************
190**
191** Function         toggle_os_keylockstates
192**
193** Description      Function to toggle the keyboard lock states managed by the linux.
194**                  This function is used in by two call paths
195**                  (1) if the lock state change occurred from an onscreen keyboard,
196**                  this function is called to update the lock state maintained
197                    for the HID keyboard(s)
198**                  (2) if a HID keyboard is disconnected and reconnected,
199**                  this function is called to update the lock state maintained
200                    for the HID keyboard(s)
201** Returns          void
202*******************************************************************************/
203
204static void toggle_os_keylockstates(int fd, int changedlockstates)
205{
206    BTIF_TRACE_EVENT3("%s: fd = %d, changedlockstates = 0x%x",
207        __FUNCTION__, fd, changedlockstates);
208    UINT8 hidreport[9];
209    int reportIndex;
210    memset(hidreport,0,9);
211    hidreport[0]=1;
212    reportIndex=4;
213
214    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
215        BTIF_TRACE_DEBUG1("%s Setting CAPSLOCK", __FUNCTION__);
216        hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
217    }
218
219    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK)  {
220        BTIF_TRACE_DEBUG1("%s Setting NUMLOCK", __FUNCTION__);
221        hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
222    }
223
224    if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
225        BTIF_TRACE_DEBUG1("%s Setting SCROLLLOCK", __FUNCTION__);
226        hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
227    }
228
229     BTIF_TRACE_DEBUG4("Writing hidreport #1 to os: "\
230        "%s:  %x %x %x", __FUNCTION__,
231         hidreport[0], hidreport[1], hidreport[2]);
232    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
233         hidreport[3], hidreport[4], hidreport[5]);
234    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
235         hidreport[6], hidreport[7], hidreport[8]);
236    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
237    usleep(200000);
238    memset(hidreport,0,9);
239    hidreport[0]=1;
240    BTIF_TRACE_DEBUG4("Writing hidreport #2 to os: "\
241       "%s:  %x %x %x", __FUNCTION__,
242         hidreport[0], hidreport[1], hidreport[2]);
243    BTIF_TRACE_DEBUG4("%s:  %x %x %x", __FUNCTION__,
244         hidreport[3], hidreport[4], hidreport[5]);
245    BTIF_TRACE_DEBUG4("%s:  %x %x %x ", __FUNCTION__,
246         hidreport[6], hidreport[7], hidreport[8]);
247    bta_hh_co_write(fd , hidreport, sizeof(hidreport));
248}
249
250/*******************************************************************************
251**
252** Function         update_keyboard_lockstates
253**
254** Description      Sends a report to the keyboard to set the lock states of keys
255**
256*******************************************************************************/
257static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
258{
259    UINT8 len = 2;  /* reportid + 1 byte report*/
260    BD_ADDR* bda;
261
262    /* Set report for other keyboards */
263    BTIF_TRACE_EVENT3("%s: setting report on dev_handle %d to 0x%x",
264         __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
265
266    if (p_dev->p_buf != NULL) {
267        GKI_freebuf(p_dev->p_buf);
268    }
269    /* Get SetReport buffer */
270    p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET +
271        sizeof(BT_HDR)));
272    if (p_dev->p_buf != NULL) {
273        p_dev->p_buf->len = len;
274        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
275        p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
276
277        /* LED status updated by data event */
278        UINT8 *pbuf_data  = (UINT8 *)(p_dev->p_buf + 1)
279            + p_dev->p_buf->offset;
280        pbuf_data[0]=0x01; /*report id */
281        pbuf_data[1]=btif_hh_keylockstates; /*keystate*/
282        bda = (BD_ADDR*) (&p_dev->bd_addr);
283        BTA_HhSendData(p_dev->dev_handle, *bda,
284            p_dev->p_buf);
285    }
286}
287
288/*******************************************************************************
289**
290** Function         sync_lockstate_on_connect
291**
292** Description      Function to update the keyboard lock states managed by the OS
293**                  when a HID keyboard is connected or disconnected and reconnected
294** Returns          void
295*******************************************************************************/
296static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
297{
298    int keylockstates;
299
300    BTIF_TRACE_EVENT1("%s: Syncing keyboard lock states after "\
301        "reconnect...",__FUNCTION__);
302    /*If the device is connected, update keyboard state */
303    update_keyboard_lockstates(p_dev);
304
305    /*Check if the lockstate of caps,scroll,num is set.
306     If so, send a report to the kernel
307    so the lockstate is in sync */
308    keylockstates = get_keylockstates();
309    if (keylockstates)
310    {
311        BTIF_TRACE_DEBUG2("%s: Sending hid report to kernel "\
312            "indicating lock key state 0x%x",__FUNCTION__,
313            keylockstates);
314        usleep(200000);
315        toggle_os_keylockstates(p_dev->fd, keylockstates);
316    }
317    else
318    {
319        BTIF_TRACE_DEBUG2("%s: NOT sending hid report to kernel "\
320            "indicating lock key state 0x%x",__FUNCTION__,
321            keylockstates);
322    }
323}
324
325/*******************************************************************************
326**
327** Function         btif_hh_find_dev_by_handle
328**
329** Description      Return the device pointer of the specified device handle
330**
331** Returns          Device entry pointer in the device table
332*******************************************************************************/
333static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle)
334{
335    UINT32 i;
336    // LOGV("%s: handle = %d", __FUNCTION__, handle);
337    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
338        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
339            btif_hh_cb.devices[i].dev_handle == handle)
340        {
341            return &btif_hh_cb.devices[i];
342        }
343    }
344    return NULL;
345}
346
347
348/*******************************************************************************
349**
350** Function         btif_hh_find_connected_dev_by_handle
351**
352** Description      Return the connected device pointer of the specified device handle
353**
354** Returns          Device entry pointer in the device table
355*******************************************************************************/
356btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
357{
358    UINT32 i;
359    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
360        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
361            btif_hh_cb.devices[i].dev_handle == handle)
362        {
363            return &btif_hh_cb.devices[i];
364        }
365    }
366    return NULL;
367}
368
369/*******************************************************************************
370**
371** Function         btif_hh_find_dev_by_bda
372**
373** Description      Return the device pointer of the specified bt_bdaddr_t.
374**
375** Returns          Device entry pointer in the device table
376*******************************************************************************/
377static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
378{
379    UINT32 i;
380    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
381        if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
382            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
383        {
384            return &btif_hh_cb.devices[i];
385        }
386    }
387    return NULL;
388}
389
390/*******************************************************************************
391**
392** Function         btif_hh_find_connected_dev_by_bda
393**
394** Description      Return the connected device pointer of the specified bt_bdaddr_t.
395**
396** Returns          Device entry pointer in the device table
397*******************************************************************************/
398static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
399{
400    UINT32 i;
401    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
402        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
403            memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
404        {
405            return &btif_hh_cb.devices[i];
406        }
407    }
408    return NULL;
409}
410
411/*******************************************************************************
412**
413** Function      btif_hh_stop_vup_timer
414**
415** Description  stop vitual unplug timer
416**
417** Returns      void
418*******************************************************************************/
419void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
420{
421    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
422    if(p_dev != NULL)
423    {
424        if (p_dev->vup_timer_active)
425        {
426            BTIF_TRACE_DEBUG0("stop VUP timer ");
427            btu_stop_timer(&p_dev->vup_timer);
428        }
429        p_dev->vup_timer_active = FALSE;
430    }
431}
432/*******************************************************************************
433**
434** Function      btif_hh_start_vup_timer
435**
436** Description  start virtual unplug timer
437**
438** Returns      void
439*******************************************************************************/
440void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
441{
442    btif_hh_device_t *p_dev  = btif_hh_find_connected_dev_by_bda(bd_addr);
443
444    if (p_dev->vup_timer_active == FALSE)
445    {
446        BTIF_TRACE_DEBUG0("Start VUP timer ");
447        memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
448        p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
449        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
450                        BTIF_TIMEOUT_VUP_SECS);
451    }
452    else
453    {
454        BTIF_TRACE_DEBUG0("Restart VUP timer ");
455        btu_stop_timer(&p_dev->vup_timer);
456        btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
457                        BTIF_TIMEOUT_VUP_SECS);
458    }
459        p_dev->vup_timer_active = TRUE;
460
461}
462
463/*******************************************************************************
464**
465** Function         btif_hh_add_added_dev
466**
467** Description      Add a new device to the added device list.
468**
469** Returns          TRUE if add successfully, otherwise FALSE.
470*******************************************************************************/
471BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
472{
473    int i;
474    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
475        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
476            BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
477                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
478            return FALSE;
479        }
480    }
481    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
482        if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
483            btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
484            btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
485            btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
486            btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
487            btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
488        {
489            BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
490                  bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
491            memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
492            btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
493            btif_hh_cb.added_devices[i].attr_mask  = attr_mask;
494            return TRUE;
495        }
496    }
497
498    BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__);
499    return FALSE;
500}
501
502/*******************************************************************************
503 **
504 ** Function         btif_hh_remove_device
505 **
506 ** Description      Remove an added device from the stack.
507 **
508 ** Returns          void
509 *******************************************************************************/
510void btif_hh_remove_device(bt_bdaddr_t bd_addr)
511{
512    int                    i;
513    btif_hh_device_t       *p_dev;
514    btif_hh_added_device_t *p_added_dev;
515
516    ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
517         bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
518
519    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
520        p_added_dev = &btif_hh_cb.added_devices[i];
521        if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
522            BTA_HhRemoveDev(p_added_dev->dev_handle);
523            btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
524            memset(&(p_added_dev->bd_addr), 0, 6);
525            p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
526            break;
527        }
528    }
529
530    p_dev = btif_hh_find_dev_by_bda(&bd_addr);
531    if (p_dev == NULL) {
532        BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
533             bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
534        return;
535    }
536
537    /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
538    HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
539
540    p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
541    p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
542    if (btif_hh_cb.device_num > 0) {
543        btif_hh_cb.device_num--;
544    }
545    else {
546        BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__);
547    }
548    if (p_dev->p_buf != NULL) {
549        GKI_freebuf(p_dev->p_buf);
550        p_dev->p_buf = NULL;
551    }
552
553    p_dev->hh_keep_polling = 0;
554    p_dev->hh_poll_thread_id = -1;
555    BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
556    if (p_dev->fd >= 0) {
557        bta_hh_co_destroy(p_dev->fd);
558        p_dev->fd = -1;
559    }
560}
561
562
563BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
564{
565    dest->descriptor.dl_len = 0;
566    if (src->descriptor.dl_len >0)
567    {
568        dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
569        if (dest->descriptor.dsc_list == NULL)
570        {
571            BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__);
572            return FALSE;
573        }
574    }
575    memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
576    dest->descriptor.dl_len = src->descriptor.dl_len;
577    dest->vendor_id  = src->vendor_id;
578    dest->product_id = src->product_id;
579    dest->version    = src->version;
580    dest->ctry_code  = src->ctry_code;
581    return TRUE;
582}
583
584
585/*******************************************************************************
586**
587** Function         btif_hh_virtual_unplug
588**
589** Description      Virtual unplug initiated from the BTIF thread context
590**                  Special handling for HID mouse-
591**
592** Returns          void
593**
594*******************************************************************************/
595
596bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
597{
598    BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
599    btif_hh_device_t *p_dev;
600    char bd_str[18];
601    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
602            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
603            bd_addr->address[4], bd_addr->address[5]);
604    p_dev = btif_hh_find_dev_by_bda(bd_addr);
605    if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
606        && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
607    {
608        BTIF_TRACE_DEBUG1("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
609        /* start the timer */
610        btif_hh_start_vup_timer(bd_addr);
611        p_dev->local_vup = TRUE;
612        BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
613        return BT_STATUS_SUCCESS;
614    }
615    else
616    {
617        BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
618        return BT_STATUS_FAIL;
619    }
620}
621
622/*******************************************************************************
623**
624** Function         btif_hh_connect
625**
626** Description      connection initiated from the BTIF thread context
627**
628** Returns          int status
629**
630*******************************************************************************/
631
632bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
633{
634    btif_hh_device_t *dev;
635    btif_hh_added_device_t *added_dev = NULL;
636    char bda_str[20];
637    int i;
638    BD_ADDR *bda = (BD_ADDR*)bd_addr;
639    tBTA_HH_CONN conn;
640    CHECK_BTHH_INIT();
641    dev = btif_hh_find_dev_by_bda(bd_addr);
642    BTIF_TRACE_DEBUG0("Connect _hh");
643    sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
644            (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
645    if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
646        // No space for more HID device now.
647         BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d",
648             __FUNCTION__, BTIF_HH_MAX_HID);
649        return BT_STATUS_FAIL;
650    }
651
652    for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
653        if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
654            added_dev = &btif_hh_cb.added_devices[i];
655             BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x",
656                 __FUNCTION__, bda_str, added_dev->attr_mask);
657        }
658    }
659
660    if (added_dev != NULL) {
661        if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
662            // No space for more HID device now.
663            BTIF_TRACE_ERROR2("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
664            memset(&(added_dev->bd_addr), 0, 6);
665            added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
666            return BT_STATUS_FAIL;
667        }
668    }
669
670    if (added_dev == NULL ||
671        (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
672        (added_dev->attr_mask & HID_RECONN_INIT) == 0)
673    {
674        tBTA_SEC sec_mask = BTUI_HH_SECURITY;
675        btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
676        BD_ADDR *bda = (BD_ADDR*)bd_addr;
677        BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
678    }
679    else
680    {
681        // This device shall be connected from the host side.
682        BTIF_TRACE_ERROR2("%s: Error, device %s can only be reconnected from device side",
683             __FUNCTION__, bda_str);
684        return BT_STATUS_FAIL;
685    }
686
687    HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
688    return BT_STATUS_SUCCESS;
689}
690
691/*******************************************************************************
692**
693** Function         btif_hh_disconnect
694**
695** Description      disconnection initiated from the BTIF thread context
696**
697** Returns          void
698**
699*******************************************************************************/
700
701void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
702{
703    BD_ADDR *bda = (BD_ADDR*)bd_addr;
704    btif_hh_device_t *p_dev;
705    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
706    if (p_dev != NULL)
707    {
708        BTA_HhClose(p_dev->dev_handle);
709    }
710    else
711        BTIF_TRACE_DEBUG1("%s-- Error: device not connected:",__FUNCTION__);
712}
713
714/*******************************************************************************
715**
716** Function         btif_btif_hh_setreport
717**
718** Description      setreport initiated from the BTIF thread context
719**
720** Returns          void
721**
722*******************************************************************************/
723
724void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
725                            UINT8* report)
726{
727    UINT8  hexbuf[20];
728    UINT16 len = size;
729    int i = 0;
730    if (p_dev->p_buf != NULL) {
731        GKI_freebuf(p_dev->p_buf);
732    }
733    p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
734    if (p_dev->p_buf == NULL) {
735        APPL_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
736        return;
737    }
738
739    p_dev->p_buf->len = len;
740    p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
741
742    //Build a SetReport data buffer
743    memset(hexbuf, 0, 20);
744    for(i=0; i<len; i++)
745        hexbuf[i] = report[i];
746
747    UINT8* pbuf_data;
748    pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
749    memcpy(pbuf_data, hexbuf, len);
750    BTA_HhSetReport(p_dev->dev_handle, r_type, p_dev->p_buf);
751
752}
753
754/*****************************************************************************
755**   Section name (Group of functions)
756*****************************************************************************/
757
758/*****************************************************************************
759**
760**   btif hh api functions (no context switch)
761**
762*****************************************************************************/
763
764
765/*******************************************************************************
766**
767** Function         btif_hh_upstreams_evt
768**
769** Description      Executes HH UPSTREAMS events in btif context
770**
771** Returns          void
772**
773*******************************************************************************/
774static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
775{
776    tBTA_HH *p_data = (tBTA_HH *)p_param;
777    bdstr_t bdstr;
778    btif_hh_device_t *p_dev = NULL;
779    int i;
780    int len, tmplen;
781
782    BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event));
783
784    switch (event)
785    {
786        case BTA_HH_ENABLE_EVT:
787            BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
788            if (p_data->status == BTA_HH_OK) {
789                btif_hh_cb.status = BTIF_HH_ENABLED;
790                BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__);
791                /* Add hid descriptors for already bonded hid devices*/
792                btif_storage_load_bonded_hid_info();
793            }
794            else {
795                btif_hh_cb.status = BTIF_HH_DISABLED;
796                BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
797            }
798            break;
799
800        case BTA_HH_DISABLE_EVT:
801            btif_hh_cb.status = BTIF_HH_DISABLED;
802            if (p_data->status == BTA_HH_OK) {
803                int i;
804                //Clear the control block
805                memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
806                for (i = 0; i < BTIF_HH_MAX_HID; i++){
807                    btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
808                }
809            }
810            else
811                BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
812            break;
813
814        case BTA_HH_OPEN_EVT:
815            BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
816            if (p_data->conn.status == BTA_HH_OK) {
817                p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
818                if (p_dev == NULL) {
819                    BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
820                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
821                    // The connect request must come from device side and exceeded the connected
822                                   // HID device number.
823                    BTA_HhClose(p_data->conn.handle);
824                    HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
825                }
826                else if (p_dev->fd < 0) {
827                    BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
828                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
829                    //remove the connection  and then try again to reconnect from the mouse side to recover
830                    btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
831                    BTA_HhClose(p_data->conn.handle);
832                }
833                else {
834                    BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
835                    memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
836                    btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
837                    // Send set_idle if the peer_device is a keyboard
838                    if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
839                                check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
840                        BTA_HhSetIdle(p_data->conn.handle, 0);
841                    btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
842                    BTA_HhGetDscpInfo(p_data->conn.handle);
843                    p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
844                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
845                }
846            }
847            else {
848                bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
849                btif_dm_hh_open_failed(bdaddr);
850                HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
851                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
852            }
853            break;
854        case BTA_HH_CLOSE_EVT:
855            BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
856            p_data->dev_status.status, p_data->dev_status.handle);
857            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
858            if (p_dev != NULL) {
859                BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
860                if (p_dev->fd >= 0){
861                    UINT8 hidreport[9];
862                    memset(hidreport,0,9);
863                    hidreport[0]=1;
864                    bta_hh_co_write(p_dev->fd , hidreport, sizeof(hidreport));
865                }
866                if(p_dev->vup_timer_active)
867                {
868                    btif_hh_stop_vup_timer(&(p_dev->bd_addr));
869                }
870                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
871                p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
872                HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
873                BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
874                bta_hh_co_destroy(p_dev->fd);
875                p_dev->fd = -1;
876            }
877            else {
878                BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle);
879            }
880            break;
881        case BTA_HH_GET_RPT_EVT: {
882            BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data;
883            UINT8 *data = NULL;
884            UINT16 len = 0;
885
886            BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
887                 p_data->hs_data.status, p_data->hs_data.handle);
888            /* p_rpt_data in HANDSHAKE response case */
889            if (hdr) {
890                data = (UINT8 *)(hdr + 1) + hdr->offset;
891                len = hdr->len;
892            }
893            p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle);
894            if (p_dev) {
895                HAL_CBACK(bt_hh_callbacks, get_report_cb,
896                          (bt_bdaddr_t*) &(p_dev->bd_addr),
897                          (bthh_status_t) p_data->hs_data.status, data, len);
898            } else {
899                BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->hs_data.handle);
900            }
901            break;
902        }
903        case BTA_HH_SET_RPT_EVT:
904            BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
905            p_data->dev_status.status, p_data->dev_status.handle);
906            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
907            if (p_dev != NULL && p_dev->p_buf != NULL) {
908                BTIF_TRACE_DEBUG0("Freeing buffer..." );
909                GKI_freebuf(p_dev->p_buf);
910                p_dev->p_buf = NULL;
911            }
912            break;
913
914        case BTA_HH_GET_PROTO_EVT:
915            p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
916            BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
917                 p_data->hs_data.status, p_data->hs_data.handle,
918                 p_data->hs_data.rsp_data.proto_mode,
919                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
920                 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
921            HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t)p_data->hs_data.status,
922                             (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
923            break;
924
925        case BTA_HH_SET_PROTO_EVT:
926            BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
927                 p_data->dev_status.status, p_data->dev_status.handle);
928            break;
929
930        case BTA_HH_GET_IDLE_EVT:
931            BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
932                 p_data->hs_data.handle, p_data->hs_data.status,
933                 p_data->hs_data.rsp_data.idle_rate);
934            break;
935
936        case BTA_HH_SET_IDLE_EVT:
937            BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
938            p_data->dev_status.status, p_data->dev_status.handle);
939            break;
940
941        case BTA_HH_GET_DSCP_EVT:
942            BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
943                p_data->dev_status.status, p_data->dev_status.handle);
944                len = p_data->dscp_info.descriptor.dl_len;
945                BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len);
946            p_dev = btif_hh_cb.p_curr_dev;
947            if (p_dev == NULL) {
948                BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
949                return;
950            }
951            if (p_dev->fd < 0) {
952                ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
953                return;
954            }
955            {
956                char *cached_name = NULL;
957                bt_bdname_t bdname;
958                bt_property_t prop_name;
959                BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME,
960                                           sizeof(bt_bdname_t), &bdname);
961                if (btif_storage_get_remote_device_property(
962                    &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS)
963                {
964                    cached_name = (char *)bdname.name;
965                }
966                else
967                {
968                    cached_name = "Bluetooth HID";
969                }
970
971                BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name);
972                bta_hh_co_send_hid_info(p_dev, cached_name,
973                    p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
974                    p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
975                    len, p_data->dscp_info.descriptor.dsc_list);
976                if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
977                    BD_ADDR bda;
978                    bdcpy(bda, p_dev->bd_addr.address);
979                    tBTA_HH_DEV_DSCP_INFO dscp_info;
980                    bt_status_t ret;
981                    bdcpy(bda, p_dev->bd_addr.address);
982                    btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
983                    BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
984                              p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
985                              p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
986                              p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
987                    BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
988                    // write hid info to nvram
989                    ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
990                                                        p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
991                                                        p_data->dscp_info.version,   p_data->dscp_info.ctry_code,
992                                                        len, p_data->dscp_info.descriptor.dsc_list);
993
994                    ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
995                    BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device");
996
997                    //Free buffer created for dscp_info;
998                    if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
999                    {
1000                      GKI_freebuf(dscp_info.descriptor.dsc_list);
1001                      dscp_info.descriptor.dsc_list = NULL;
1002                      dscp_info.descriptor.dl_len=0;
1003                    }
1004                }
1005                else {
1006                    //Device already added.
1007                    BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__);
1008                }
1009                /*Sync HID Keyboard lockstates */
1010                tmplen = sizeof(hid_kb_numlock_on_list)
1011                            / sizeof(tHID_KB_LIST);
1012                for(i = 0; i< tmplen; i++)
1013                {
1014                    if(p_data->dscp_info.vendor_id
1015                        == hid_kb_numlock_on_list[i].version_id &&
1016                        p_data->dscp_info.product_id
1017                        == hid_kb_numlock_on_list[i].product_id)
1018                    {
1019                        BTIF_TRACE_DEBUG3("%s() idx[%d] Enabling "\
1020                            "NUMLOCK for device :: %s", __FUNCTION__,
1021                            i, hid_kb_numlock_on_list[i].kb_name);
1022                        /* Enable NUMLOCK by default so that numeric
1023                            keys work from first keyboard connect */
1024                        set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1025                                        TRUE);
1026                        sync_lockstate_on_connect(p_dev);
1027                        /* End Sync HID Keyboard lockstates */
1028                        break;
1029                    }
1030                }
1031            }
1032            break;
1033
1034        case BTA_HH_ADD_DEV_EVT:
1035            BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1036            int i;
1037            for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1038                if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1039                    if (p_data->dev_info.status == BTA_HH_OK) {
1040                        btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1041                    }
1042                    else {
1043                        memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1044                        btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1045                    }
1046                    break;
1047                }
1048            }
1049            break;
1050        case BTA_HH_RMV_DEV_EVT:
1051                BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1052                     p_data->dev_info.status, p_data->dev_info.handle);
1053                BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1054                     p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1055                     p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1056                break;
1057
1058
1059        case BTA_HH_VC_UNPLUG_EVT:
1060                BTIF_TRACE_DEBUG2("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1061                     p_data->dev_status.status, p_data->dev_status.handle);
1062                p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1063                btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1064                if (p_dev != NULL) {
1065                    BTIF_TRACE_DEBUG6("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1066                         p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1067                         p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1068                         p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1069                    /* Stop the VUP timer */
1070                    if(p_dev->vup_timer_active)
1071                    {
1072                        btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1073                    }
1074                    p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1075                    BTIF_TRACE_DEBUG1("%s---Sending connection state change", __FUNCTION__);
1076                    HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1077                    BTIF_TRACE_DEBUG1("%s---Removing HID bond", __FUNCTION__);
1078                    /* If it is locally initiated VUP or remote device has its major COD as
1079                    Peripheral removed the bond.*/
1080                    if (p_dev->local_vup  || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1081                    {
1082                        p_dev->local_vup = FALSE;
1083                        BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1084                    }
1085                    else
1086                        btif_hh_remove_device(p_dev->bd_addr);
1087                    HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1088                                    p_data->dev_status.status);
1089                }
1090                break;
1091
1092        case BTA_HH_API_ERR_EVT  :
1093                ALOGI("BTA_HH API_ERR");
1094                break;
1095
1096
1097
1098            default:
1099                BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event);
1100                break;
1101        }
1102}
1103
1104/*******************************************************************************
1105**
1106** Function         bte_hh_evt
1107**
1108** Description      Switches context from BTE to BTIF for all HH events
1109**
1110** Returns          void
1111**
1112*******************************************************************************/
1113
1114static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1115{
1116    bt_status_t status;
1117    int param_len = 0;
1118
1119    if (BTA_HH_ENABLE_EVT == event)
1120        param_len = sizeof(tBTA_HH_STATUS);
1121    else if (BTA_HH_OPEN_EVT == event)
1122        param_len = sizeof(tBTA_HH_CONN);
1123    else if (BTA_HH_DISABLE_EVT == event)
1124        param_len = sizeof(tBTA_HH_STATUS);
1125    else if (BTA_HH_CLOSE_EVT == event)
1126        param_len = sizeof(tBTA_HH_CBDATA);
1127    else if (BTA_HH_GET_DSCP_EVT == event)
1128        param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1129    else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1130        param_len = sizeof(tBTA_HH_HSDATA);
1131    else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1132        param_len = sizeof(tBTA_HH_CBDATA);
1133    else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1134        param_len = sizeof(tBTA_HH_DEV_INFO);
1135    else if (BTA_HH_API_ERR_EVT == event)
1136        param_len = 0;
1137    /* switch context to btif task context (copy full union size for convenience) */
1138    status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1139
1140    /* catch any failed context transfers */
1141    ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1142}
1143
1144/*******************************************************************************
1145**
1146** Function         btif_hh_handle_evt
1147**
1148** Description      Switches context for immediate callback
1149**
1150** Returns          void
1151**
1152*******************************************************************************/
1153
1154static void btif_hh_handle_evt(UINT16 event, char *p_param)
1155{
1156    bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1157    BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1158    int ret;
1159    switch(event)
1160    {
1161        case BTIF_HH_CONNECT_REQ_EVT:
1162        {
1163            ret = btif_hh_connect(bd_addr);
1164            if(ret == BT_STATUS_SUCCESS)
1165            {
1166                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1167            }
1168            else
1169                HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1170        }
1171        break;
1172
1173        case BTIF_HH_DISCONNECT_REQ_EVT:
1174        {
1175            BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1176            btif_hh_disconnect(bd_addr);
1177            HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1178        }
1179        break;
1180
1181        case BTIF_HH_VUP_REQ_EVT:
1182        {
1183            BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1184            ret = btif_hh_virtual_unplug(bd_addr);
1185        }
1186        break;
1187
1188        default:
1189        {
1190            BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event);
1191        }
1192        break;
1193    }
1194}
1195
1196/*******************************************************************************
1197**
1198** Function      btif_hh_tmr_hdlr
1199**
1200** Description   Process timer timeout
1201**
1202** Returns      void
1203*******************************************************************************/
1204void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1205{
1206    btif_hh_device_t *p_dev;
1207    UINT8               i,j;
1208    tBTA_HH_EVT event;
1209    tBTA_HH p_data;
1210    int param_len = 0;
1211    memset(&p_data, 0, sizeof(tBTA_HH));
1212
1213    BTIF_TRACE_DEBUG2("%s timer_in_use=%d",  __FUNCTION__, tle->in_use );
1214
1215    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1216        if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1217        {
1218
1219            p_dev = &btif_hh_cb.devices[i];
1220
1221            if (p_dev->vup_timer_active)
1222            {
1223                p_dev->vup_timer_active = FALSE;
1224                event = BTA_HH_VC_UNPLUG_EVT;
1225                p_data.dev_status.status = BTHH_ERR;
1226                p_data.dev_status.handle = p_dev->dev_handle;
1227                param_len = sizeof(tBTA_HH_CBDATA);
1228
1229                /* switch context to btif task context */
1230                btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1231                            param_len, NULL);
1232            }
1233        }
1234    }
1235}
1236
1237/*******************************************************************************
1238**
1239** Function         btif_hh_init
1240**
1241** Description     initializes the hh interface
1242**
1243** Returns         bt_status_t
1244**
1245*******************************************************************************/
1246static bt_status_t init( bthh_callbacks_t* callbacks )
1247{
1248    UINT32 i;
1249    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1250
1251    bt_hh_callbacks = callbacks;
1252    memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1253    for (i = 0; i < BTIF_HH_MAX_HID; i++){
1254        btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1255    }
1256    /* Invoke the enable service API to the core to set the appropriate service_id */
1257    btif_enable_service(BTA_HID_SERVICE_ID);
1258    return BT_STATUS_SUCCESS;
1259}
1260
1261/*******************************************************************************
1262**
1263** Function        connect
1264**
1265** Description     connect to hid device
1266**
1267** Returns         bt_status_t
1268**
1269*******************************************************************************/
1270static bt_status_t connect( bt_bdaddr_t *bd_addr)
1271{
1272    if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1273    {
1274        btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1275                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1276        return BT_STATUS_SUCCESS;
1277    }
1278    else
1279        return BT_STATUS_BUSY;
1280}
1281
1282/*******************************************************************************
1283**
1284** Function         disconnect
1285**
1286** Description      disconnect from hid device
1287**
1288** Returns         bt_status_t
1289**
1290*******************************************************************************/
1291static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1292{
1293    CHECK_BTHH_INIT();
1294    btif_hh_device_t *p_dev;
1295
1296    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1297    {
1298        BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1299        return BT_STATUS_FAIL;
1300    }
1301    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1302    if (p_dev != NULL)
1303    {
1304        return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1305                     (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1306    }
1307    else
1308    {
1309        BTIF_TRACE_WARNING1("%s: Error, device  not opened.", __FUNCTION__);
1310        return BT_STATUS_FAIL;
1311    }
1312}
1313
1314/*******************************************************************************
1315**
1316** Function         virtual_unplug
1317**
1318** Description      Virtual UnPlug (VUP) the specified HID device.
1319**
1320** Returns         bt_status_t
1321**
1322*******************************************************************************/
1323static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1324{
1325    CHECK_BTHH_INIT();
1326    btif_hh_device_t *p_dev;
1327    char bd_str[18];
1328    sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1329            bd_addr->address[0],  bd_addr->address[1],  bd_addr->address[2],  bd_addr->address[3],
1330            bd_addr->address[4], bd_addr->address[5]);
1331    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1332    {
1333        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1334        return BT_STATUS_FAIL;
1335    }
1336    p_dev = btif_hh_find_dev_by_bda(bd_addr);
1337    if (!p_dev)
1338    {
1339        BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1340        return BT_STATUS_FAIL;
1341    }
1342    btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1343                                 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1344    return BT_STATUS_SUCCESS;
1345}
1346
1347
1348/*******************************************************************************
1349**
1350** Function         set_info
1351**
1352** Description      Set the HID device descriptor for the specified HID device.
1353**
1354** Returns         bt_status_t
1355**
1356*******************************************************************************/
1357static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1358{
1359    CHECK_BTHH_INIT();
1360    tBTA_HH_DEV_DSCP_INFO dscp_info;
1361    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1362
1363    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1364         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1365    BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1366         "product_id = 0x%04x, version= 0x%04x",
1367         __FUNCTION__, hid_info.sub_class,
1368         hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1369         hid_info.version);
1370
1371    if (btif_hh_cb.status == BTIF_HH_DISABLED)
1372    {
1373        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1374        return BT_STATUS_FAIL;
1375    }
1376
1377    dscp_info.vendor_id  = hid_info.vendor_id;
1378    dscp_info.product_id = hid_info.product_id;
1379    dscp_info.version    = hid_info.version;
1380    dscp_info.ctry_code  = hid_info.ctry_code;
1381
1382    dscp_info.descriptor.dl_len = hid_info.dl_len;
1383    dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1384    if (dscp_info.descriptor.dsc_list == NULL)
1385    {
1386        ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1387        return BT_STATUS_FAIL;
1388    }
1389    memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1390
1391    if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1392    {
1393        BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1394                     hid_info.app_id, dscp_info);
1395    }
1396
1397    GKI_freebuf(dscp_info.descriptor.dsc_list);
1398
1399    return BT_STATUS_SUCCESS;
1400}
1401/*******************************************************************************
1402**
1403** Function         get_idle_time
1404**
1405** Description      Get the HID idle time
1406**
1407** Returns         bt_status_t
1408**
1409*******************************************************************************/
1410static bt_status_t get_idle_time(bt_bdaddr_t *bd_addr)
1411{
1412    CHECK_BTHH_INIT();
1413    btif_hh_device_t *p_dev;
1414    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1415
1416    BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1417         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1418
1419    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1420        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1421        return BT_STATUS_FAIL;
1422    }
1423
1424    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1425    if (p_dev != NULL) {
1426        //BTA_HhGetIdle(p_dev->dev_handle);
1427    }
1428    else {
1429        return BT_STATUS_FAIL;
1430    }
1431    return BT_STATUS_SUCCESS;
1432}
1433
1434/*******************************************************************************
1435**
1436** Function         set_idle_time
1437**
1438** Description      Set the HID idle time
1439**
1440** Returns         bt_status_t
1441**
1442*******************************************************************************/
1443static bt_status_t set_idle_time (bt_bdaddr_t *bd_addr, uint8_t idle_time)
1444{
1445    CHECK_BTHH_INIT();
1446    btif_hh_device_t *p_dev;
1447    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1448
1449    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1450         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1451
1452    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1453        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1454        return BT_STATUS_FAIL;
1455    }
1456
1457    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1458    if (p_dev == NULL) {
1459        BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1460             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1461        return BT_STATUS_FAIL;
1462    }
1463    else {
1464        //BTA_HhSetIdle(p_dev->dev_handle, idle_time);
1465    }
1466    return BT_STATUS_SUCCESS;
1467}
1468
1469/*******************************************************************************
1470**
1471** Function         get_protocol
1472**
1473** Description      Get the HID proto mode.
1474**
1475** Returns         bt_status_t
1476**
1477*******************************************************************************/
1478static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1479{
1480    CHECK_BTHH_INIT();
1481    btif_hh_device_t *p_dev;
1482    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1483
1484    BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1485         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1486
1487    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1488        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1489        return BT_STATUS_FAIL;
1490    }
1491
1492    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1493    if (p_dev != NULL) {
1494
1495        BTA_HhGetProtoMode(p_dev->dev_handle);
1496    }
1497    else {
1498        return BT_STATUS_FAIL;
1499    }
1500    return BT_STATUS_SUCCESS;
1501}
1502
1503/*******************************************************************************
1504**
1505** Function         set_protocol
1506**
1507** Description      Set the HID proto mode.
1508**
1509** Returns         bt_status_t
1510**
1511*******************************************************************************/
1512static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1513{
1514    CHECK_BTHH_INIT();
1515    btif_hh_device_t *p_dev;
1516    UINT8 proto_mode = protocolMode;
1517    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1518
1519    BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1520
1521    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1522         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1523
1524    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1525        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1526        return BT_STATUS_FAIL;
1527    }
1528
1529    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1530    if (p_dev == NULL) {
1531        BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1532             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1533        return BT_STATUS_FAIL;
1534    }
1535    else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1536        BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1537        return BT_STATUS_FAIL;
1538    }
1539    else {
1540        BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1541    }
1542
1543
1544    return BT_STATUS_SUCCESS;
1545}
1546
1547/*******************************************************************************
1548**
1549** Function         get_report
1550**
1551** Description      Send a GET_REPORT to HID device.
1552**
1553** Returns         bt_status_t
1554**
1555*******************************************************************************/
1556static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1557{
1558    CHECK_BTHH_INIT();
1559    btif_hh_device_t *p_dev;
1560    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1561
1562    BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1563          reportType, reportId, bufferSize);
1564
1565    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1566         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1567
1568    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1569        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1570        return BT_STATUS_FAIL;
1571    }
1572
1573
1574    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1575    if (p_dev == NULL) {
1576        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1577             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1578        return BT_STATUS_FAIL;
1579    }
1580    else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1581        BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1582             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1583        return BT_STATUS_FAIL;
1584    }
1585    else {
1586        BTA_HhGetReport(p_dev->dev_handle, reportType,
1587                        reportId, bufferSize);
1588    }
1589
1590    return BT_STATUS_SUCCESS;
1591}
1592
1593/*******************************************************************************
1594**
1595** Function         set_report
1596**
1597** Description      Send a SET_REPORT to HID device.
1598**
1599** Returns         bt_status_t
1600**
1601*******************************************************************************/
1602static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1603{
1604    CHECK_BTHH_INIT();
1605    btif_hh_device_t *p_dev;
1606    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1607
1608    BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType);
1609
1610    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1611         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1612
1613
1614    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1615        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1616        return BT_STATUS_FAIL;
1617    }
1618
1619    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1620    if (p_dev == NULL) {
1621        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1622             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1623        return BT_STATUS_FAIL;
1624    }
1625    else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1626        BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1627             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1628        return BT_STATUS_FAIL;
1629    }
1630    else {
1631        int    hex_bytes_filled;
1632        UINT8  hexbuf[200];
1633        UINT16 len = (strlen(report) + 1) / 2;
1634
1635        if (p_dev->p_buf != NULL) {
1636            GKI_freebuf(p_dev->p_buf);
1637        }
1638        p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1639        if (p_dev->p_buf == NULL) {
1640            BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1641            return BT_STATUS_FAIL;
1642        }
1643
1644        p_dev->p_buf->len = len;
1645        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1646
1647        /* Build a SetReport data buffer */
1648        memset(hexbuf, 0, 200);
1649        //TODO
1650        hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1651        ALOGI("Hex bytes filled, hex value: %d", hex_bytes_filled);
1652
1653        if (hex_bytes_filled) {
1654            UINT8* pbuf_data;
1655            pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1656            memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1657            BTA_HhSetReport(p_dev->dev_handle, reportType, p_dev->p_buf);
1658        }
1659        return BT_STATUS_SUCCESS;
1660    }
1661
1662
1663}
1664
1665/*******************************************************************************
1666**
1667** Function         send_data
1668**
1669** Description      Send a SEND_DATA to HID device.
1670**
1671** Returns         bt_status_t
1672**
1673*******************************************************************************/
1674static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1675{
1676    CHECK_BTHH_INIT();
1677    btif_hh_device_t *p_dev;
1678    BD_ADDR* bda = (BD_ADDR*) bd_addr;
1679
1680    BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
1681
1682    BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1683         (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1684
1685    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1686        BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1687        return BT_STATUS_FAIL;
1688    }
1689
1690    p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1691    if (p_dev == NULL) {
1692        BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1693             (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1694        return BT_STATUS_FAIL;
1695    }
1696
1697    else {
1698        int    hex_bytes_filled;
1699        UINT8  hexbuf[200];
1700        UINT16 len = (strlen(data) + 1) / 2;
1701
1702        if (p_dev->p_buf != NULL) {
1703            GKI_freebuf(p_dev->p_buf);
1704        }
1705        p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1706        if (p_dev->p_buf == NULL) {
1707            BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1708            return BT_STATUS_FAIL;
1709        }
1710
1711        p_dev->p_buf->len = len;
1712        p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1713
1714        /* Build a SetReport data buffer */
1715        memset(hexbuf, 0, 200);
1716        hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1717        BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1718
1719        if (hex_bytes_filled) {
1720            UINT8* pbuf_data;
1721            pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1722            memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1723            p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1724            BTA_HhSendData(p_dev->dev_handle, *bda, p_dev->p_buf);
1725            return BT_STATUS_SUCCESS;
1726        }
1727
1728    }
1729    return BT_STATUS_FAIL;
1730}
1731
1732
1733/*******************************************************************************
1734**
1735** Function         cleanup
1736**
1737** Description      Closes the HH interface
1738**
1739** Returns          bt_status_t
1740**
1741*******************************************************************************/
1742static void  cleanup( void )
1743{
1744    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1745    btif_hh_device_t *p_dev;
1746    int i;
1747    if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1748        BTIF_TRACE_WARNING2("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1749        return;
1750    }
1751    btif_hh_cb.status = BTIF_HH_DISABLING;
1752    for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1753         p_dev = &btif_hh_cb.devices[i];
1754         if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1755             BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1756             bta_hh_co_destroy(p_dev->fd);
1757             p_dev->fd = -1;
1758             p_dev->hh_keep_polling = 0;
1759             p_dev->hh_poll_thread_id = -1;
1760         }
1761     }
1762
1763    if (bt_hh_callbacks)
1764    {
1765        btif_disable_service(BTA_HID_SERVICE_ID);
1766        bt_hh_callbacks = NULL;
1767    }
1768
1769}
1770
1771static const bthh_interface_t bthhInterface = {
1772    sizeof(bthhInterface),
1773    init,
1774    connect,
1775    disconnect,
1776    virtual_unplug,
1777    set_info,
1778    get_protocol,
1779    set_protocol,
1780//    get_idle_time,
1781//    set_idle_time,
1782    get_report,
1783    set_report,
1784    send_data,
1785    cleanup,
1786};
1787
1788/*******************************************************************************
1789**
1790** Function         btif_hh_execute_service
1791**
1792** Description      Initializes/Shuts down the service
1793**
1794** Returns          BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1795**
1796*******************************************************************************/
1797bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1798{
1799     if (b_enable)
1800     {
1801          /* Enable and register with BTA-HH */
1802          BTA_HhEnable(BTA_SEC_NONE, bte_hh_evt);
1803     }
1804     else {
1805         /* Disable HH */
1806         BTA_HhDisable();
1807     }
1808     return BT_STATUS_SUCCESS;
1809}
1810
1811/*******************************************************************************
1812**
1813** Function         btif_hh_get_interface
1814**
1815** Description      Get the hh callback interface
1816**
1817** Returns          bthh_interface_t
1818**
1819*******************************************************************************/
1820const bthh_interface_t *btif_hh_get_interface()
1821{
1822    BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1823    return &bthhInterface;
1824}
1825