btif_hh.c revision b46d9b899f5e28929c8530cb99d023c93e5d5cb8
1/****************************************************************************** 2 * 3 * Copyright (C) 2009-2012 Broadcom Corporation 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at: 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 ******************************************************************************/ 18 19/************************************************************************************ 20 * 21 * Filename: btif_hh.c 22 * 23 * Description: HID Host Profile Bluetooth Interface 24 * 25 * 26 ***********************************************************************************/ 27#include <hardware/bluetooth.h> 28#include <hardware/bt_hh.h> 29#include <stdio.h> 30#include <stdlib.h> 31#include <errno.h> 32#include <string.h> 33 34#define LOG_TAG "BTIF_HH" 35 36#include "bta_api.h" 37#include "bta_hh_api.h" 38#include "bd.h" 39#include "btif_storage.h" 40 41#include "btif_common.h" 42#include "btif_util.h" 43#include "btif_hh.h" 44#include "gki.h" 45#include "l2c_api.h" 46 47 48#define BTIF_HH_APP_ID_MI 0x01 49#define BTIF_HH_APP_ID_KB 0x02 50 51#define COD_HID_KEYBOARD 0x0540 52#define COD_HID_POINTING 0x0580 53#define COD_HID_COMBO 0x05C0 54#define COD_HID_MAJOR 0x0500 55 56#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni 57 58#define HID_REPORT_CAPSLOCK 0x39 59#define HID_REPORT_NUMLOCK 0x53 60#define HID_REPORT_SCROLLLOCK 0x47 61 62//For Apple Magic Mouse 63#define MAGICMOUSE_VENDOR_ID 0x05ac 64#define MAGICMOUSE_PRODUCT_ID 0x030d 65 66#define LOGITECH_KB_MX5500_VENDOR_ID 0x046D 67#define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B 68 69extern const int BT_UID; 70extern const int BT_GID; 71static int btif_hh_prev_keyevents=0; //The previous key events 72static int btif_hh_keylockstates=0; //The current key state of each key 73 74#define BTIF_HH_ID_1 0 75#define BTIF_HH_DEV_DISCONNECTED 3 76 77#define BTIF_TIMEOUT_VUP_SECS 3 78 79 80#ifndef BTUI_HH_SECURITY 81#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT) 82#endif 83 84#ifndef BTUI_HH_MOUSE_SECURITY 85#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE) 86#endif 87 88/* HH request events */ 89typedef enum 90{ 91 BTIF_HH_CONNECT_REQ_EVT = 0, 92 BTIF_HH_DISCONNECT_REQ_EVT, 93 BTIF_HH_VUP_REQ_EVT 94} btif_hh_req_evt_t; 95 96 97/************************************************************************************ 98** Constants & Macros 99************************************************************************************/ 100#define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK) 101 102 103 104/************************************************************************************ 105** Local type definitions 106************************************************************************************/ 107 108typedef struct hid_kb_list 109{ 110 UINT16 product_id; 111 UINT16 version_id; 112 char* kb_name; 113} tHID_KB_LIST; 114 115/************************************************************************************ 116** Static variables 117************************************************************************************/ 118btif_hh_cb_t btif_hh_cb; 119 120static bthh_callbacks_t *bt_hh_callbacks = NULL; 121 122/* List of HID keyboards for which the NUMLOCK state needs to be 123 * turned ON by default. Add devices to this list to apply the 124 * NUMLOCK state toggle on fpr first connect.*/ 125static tHID_KB_LIST hid_kb_numlock_on_list[] = 126{ 127 {LOGITECH_KB_MX5500_PRODUCT_ID, 128 LOGITECH_KB_MX5500_VENDOR_ID, 129 "Logitech MX5500 Keyboard"} 130}; 131 132 133#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\ 134 {\ 135 BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\ 136 return BT_STATUS_NOT_READY;\ 137 }\ 138 else\ 139 {\ 140 BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\ 141 } 142 143 144 145/************************************************************************************ 146** Static functions 147************************************************************************************/ 148 149/************************************************************************************ 150** Externs 151************************************************************************************/ 152extern void bta_hh_co_destroy(int fd); 153extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len); 154extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr); 155extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id, 156 UINT16 product_id, UINT16 version, UINT8 ctry_code, 157 int dscp_len, UINT8 *p_dscp); 158extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 159extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr); 160extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod); 161extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex); 162extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr); 163 164/***************************************************************************** 165** Local Function prototypes 166*****************************************************************************/ 167static void set_keylockstate(int keymask, BOOLEAN isSet); 168static void toggle_os_keylockstates(int fd, int changedkeystates); 169static void sync_lockstate_on_connect(btif_hh_device_t *p_dev); 170//static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev); 171void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle); 172 173 174/************************************************************************************ 175** Functions 176************************************************************************************/ 177 178static int get_keylockstates() 179{ 180 return btif_hh_keylockstates; 181} 182 183static void set_keylockstate(int keymask, BOOLEAN isSet) 184{ 185 if(isSet) 186 btif_hh_keylockstates |= keymask; 187} 188 189/******************************************************************************* 190** 191** Function toggle_os_keylockstates 192** 193** Description Function to toggle the keyboard lock states managed by the linux. 194** This function is used in by two call paths 195** (1) if the lock state change occurred from an onscreen keyboard, 196** this function is called to update the lock state maintained 197 for the HID keyboard(s) 198** (2) if a HID keyboard is disconnected and reconnected, 199** this function is called to update the lock state maintained 200 for the HID keyboard(s) 201** Returns void 202*******************************************************************************/ 203 204static void toggle_os_keylockstates(int fd, int changedlockstates) 205{ 206 BTIF_TRACE_EVENT3("%s: fd = %d, changedlockstates = 0x%x", 207 __FUNCTION__, fd, changedlockstates); 208 UINT8 hidreport[9]; 209 int reportIndex; 210 memset(hidreport,0,9); 211 hidreport[0]=1; 212 reportIndex=4; 213 214 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) { 215 BTIF_TRACE_DEBUG1("%s Setting CAPSLOCK", __FUNCTION__); 216 hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK; 217 } 218 219 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK) { 220 BTIF_TRACE_DEBUG1("%s Setting NUMLOCK", __FUNCTION__); 221 hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK; 222 } 223 224 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) { 225 BTIF_TRACE_DEBUG1("%s Setting SCROLLLOCK", __FUNCTION__); 226 hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK; 227 } 228 229 BTIF_TRACE_DEBUG4("Writing hidreport #1 to os: "\ 230 "%s: %x %x %x", __FUNCTION__, 231 hidreport[0], hidreport[1], hidreport[2]); 232 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 233 hidreport[3], hidreport[4], hidreport[5]); 234 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 235 hidreport[6], hidreport[7], hidreport[8]); 236 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 237 usleep(200000); 238 memset(hidreport,0,9); 239 hidreport[0]=1; 240 BTIF_TRACE_DEBUG4("Writing hidreport #2 to os: "\ 241 "%s: %x %x %x", __FUNCTION__, 242 hidreport[0], hidreport[1], hidreport[2]); 243 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__, 244 hidreport[3], hidreport[4], hidreport[5]); 245 BTIF_TRACE_DEBUG4("%s: %x %x %x ", __FUNCTION__, 246 hidreport[6], hidreport[7], hidreport[8]); 247 bta_hh_co_write(fd , hidreport, sizeof(hidreport)); 248} 249 250/******************************************************************************* 251** 252** Function update_keyboard_lockstates 253** 254** Description Sends a report to the keyboard to set the lock states of keys 255** 256*******************************************************************************/ 257static void update_keyboard_lockstates(btif_hh_device_t *p_dev) 258{ 259 UINT8 len = 2; /* reportid + 1 byte report*/ 260 BD_ADDR* bda; 261 262 /* Set report for other keyboards */ 263 BTIF_TRACE_EVENT3("%s: setting report on dev_handle %d to 0x%x", 264 __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates); 265 266 if (p_dev->p_buf != NULL) { 267 GKI_freebuf(p_dev->p_buf); 268 } 269 /* Get SetReport buffer */ 270 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + 271 sizeof(BT_HDR))); 272 if (p_dev->p_buf != NULL) { 273 p_dev->p_buf->len = len; 274 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET; 275 p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 276 277 /* LED status updated by data event */ 278 UINT8 *pbuf_data = (UINT8 *)(p_dev->p_buf + 1) 279 + p_dev->p_buf->offset; 280 pbuf_data[0]=0x01; /*report id */ 281 pbuf_data[1]=btif_hh_keylockstates; /*keystate*/ 282 bda = (BD_ADDR*) (&p_dev->bd_addr); 283 BTA_HhSendData(p_dev->dev_handle, *bda, 284 p_dev->p_buf); 285 } 286} 287 288/******************************************************************************* 289** 290** Function sync_lockstate_on_connect 291** 292** Description Function to update the keyboard lock states managed by the OS 293** when a HID keyboard is connected or disconnected and reconnected 294** Returns void 295*******************************************************************************/ 296static void sync_lockstate_on_connect(btif_hh_device_t *p_dev) 297{ 298 int keylockstates; 299 300 BTIF_TRACE_EVENT1("%s: Syncing keyboard lock states after "\ 301 "reconnect...",__FUNCTION__); 302 /*If the device is connected, update keyboard state */ 303 update_keyboard_lockstates(p_dev); 304 305 /*Check if the lockstate of caps,scroll,num is set. 306 If so, send a report to the kernel 307 so the lockstate is in sync */ 308 keylockstates = get_keylockstates(); 309 if (keylockstates) 310 { 311 BTIF_TRACE_DEBUG2("%s: Sending hid report to kernel "\ 312 "indicating lock key state 0x%x",__FUNCTION__, 313 keylockstates); 314 usleep(200000); 315 toggle_os_keylockstates(p_dev->fd, keylockstates); 316 } 317 else 318 { 319 BTIF_TRACE_DEBUG2("%s: NOT sending hid report to kernel "\ 320 "indicating lock key state 0x%x",__FUNCTION__, 321 keylockstates); 322 } 323} 324 325/******************************************************************************* 326** 327** Function btif_hh_find_dev_by_handle 328** 329** Description Return the device pointer of the specified device handle 330** 331** Returns Device entry pointer in the device table 332*******************************************************************************/ 333static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle) 334{ 335 UINT32 i; 336 // LOGV("%s: handle = %d", __FUNCTION__, handle); 337 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 338 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 339 btif_hh_cb.devices[i].dev_handle == handle) 340 { 341 return &btif_hh_cb.devices[i]; 342 } 343 } 344 return NULL; 345} 346 347 348/******************************************************************************* 349** 350** Function btif_hh_find_connected_dev_by_handle 351** 352** Description Return the connected device pointer of the specified device handle 353** 354** Returns Device entry pointer in the device table 355*******************************************************************************/ 356btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle) 357{ 358 UINT32 i; 359 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 360 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 361 btif_hh_cb.devices[i].dev_handle == handle) 362 { 363 return &btif_hh_cb.devices[i]; 364 } 365 } 366 return NULL; 367} 368 369/******************************************************************************* 370** 371** Function btif_hh_find_dev_by_bda 372** 373** Description Return the device pointer of the specified bt_bdaddr_t. 374** 375** Returns Device entry pointer in the device table 376*******************************************************************************/ 377static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr) 378{ 379 UINT32 i; 380 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 381 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 382 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 383 { 384 return &btif_hh_cb.devices[i]; 385 } 386 } 387 return NULL; 388} 389 390/******************************************************************************* 391** 392** Function btif_hh_find_connected_dev_by_bda 393** 394** Description Return the connected device pointer of the specified bt_bdaddr_t. 395** 396** Returns Device entry pointer in the device table 397*******************************************************************************/ 398static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr) 399{ 400 UINT32 i; 401 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 402 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 403 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 404 { 405 return &btif_hh_cb.devices[i]; 406 } 407 } 408 return NULL; 409} 410 411/******************************************************************************* 412** 413** Function btif_hh_stop_vup_timer 414** 415** Description stop vitual unplug timer 416** 417** Returns void 418*******************************************************************************/ 419void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr) 420{ 421 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 422 if(p_dev != NULL) 423 { 424 if (p_dev->vup_timer_active) 425 { 426 BTIF_TRACE_DEBUG0("stop VUP timer "); 427 btu_stop_timer(&p_dev->vup_timer); 428 } 429 p_dev->vup_timer_active = FALSE; 430 } 431} 432/******************************************************************************* 433** 434** Function btif_hh_start_vup_timer 435** 436** Description start virtual unplug timer 437** 438** Returns void 439*******************************************************************************/ 440void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr) 441{ 442 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 443 444 if (p_dev->vup_timer_active == FALSE) 445 { 446 BTIF_TRACE_DEBUG0("Start VUP timer "); 447 memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT)); 448 p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr; 449 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 450 BTIF_TIMEOUT_VUP_SECS); 451 } 452 else 453 { 454 BTIF_TRACE_DEBUG0("Restart VUP timer "); 455 btu_stop_timer(&p_dev->vup_timer); 456 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC, 457 BTIF_TIMEOUT_VUP_SECS); 458 } 459 p_dev->vup_timer_active = TRUE; 460 461} 462 463/******************************************************************************* 464** 465** Function btif_hh_add_added_dev 466** 467** Description Add a new device to the added device list. 468** 469** Returns TRUE if add successfully, otherwise FALSE. 470*******************************************************************************/ 471BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask) 472{ 473 int i; 474 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 475 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) { 476 BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added", 477 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 478 return FALSE; 479 } 480 } 481 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 482 if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 && 483 btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 && 484 btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 && 485 btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 && 486 btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 && 487 btif_hh_cb.added_devices[i].bd_addr.address[5] == 0) 488 { 489 BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X", 490 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]); 491 memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN); 492 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 493 btif_hh_cb.added_devices[i].attr_mask = attr_mask; 494 return TRUE; 495 } 496 } 497 498 BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__); 499 return FALSE; 500} 501 502/******************************************************************************* 503 ** 504 ** Function btif_hh_remove_device 505 ** 506 ** Description Remove an added device from the stack. 507 ** 508 ** Returns void 509 *******************************************************************************/ 510void btif_hh_remove_device(bt_bdaddr_t bd_addr) 511{ 512 int i; 513 btif_hh_device_t *p_dev; 514 btif_hh_added_device_t *p_added_dev; 515 516 ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__, 517 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 518 519 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 520 p_added_dev = &btif_hh_cb.added_devices[i]; 521 if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) { 522 BTA_HhRemoveDev(p_added_dev->dev_handle); 523 btif_storage_remove_hid_info(&(p_added_dev->bd_addr)); 524 memset(&(p_added_dev->bd_addr), 0, 6); 525 p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 526 break; 527 } 528 } 529 530 p_dev = btif_hh_find_dev_by_bda(&bd_addr); 531 if (p_dev == NULL) { 532 BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]", 533 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]); 534 return; 535 } 536 537 /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */ 538 HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED); 539 540 p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN; 541 p_dev->dev_handle = BTA_HH_INVALID_HANDLE; 542 if (btif_hh_cb.device_num > 0) { 543 btif_hh_cb.device_num--; 544 } 545 else { 546 BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__); 547 } 548 if (p_dev->p_buf != NULL) { 549 GKI_freebuf(p_dev->p_buf); 550 p_dev->p_buf = NULL; 551 } 552 553 p_dev->hh_keep_polling = 0; 554 p_dev->hh_poll_thread_id = -1; 555 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 556 if (p_dev->fd >= 0) { 557 bta_hh_co_destroy(p_dev->fd); 558 p_dev->fd = -1; 559 } 560} 561 562 563BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src) 564{ 565 dest->descriptor.dl_len = 0; 566 if (src->descriptor.dl_len >0) 567 { 568 dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len); 569 if (dest->descriptor.dsc_list == NULL) 570 { 571 BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__); 572 return FALSE; 573 } 574 } 575 memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len); 576 dest->descriptor.dl_len = src->descriptor.dl_len; 577 dest->vendor_id = src->vendor_id; 578 dest->product_id = src->product_id; 579 dest->version = src->version; 580 dest->ctry_code = src->ctry_code; 581 return TRUE; 582} 583 584 585/******************************************************************************* 586** 587** Function btif_hh_virtual_unplug 588** 589** Description Virtual unplug initiated from the BTIF thread context 590** Special handling for HID mouse- 591** 592** Returns void 593** 594*******************************************************************************/ 595 596bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr) 597{ 598 BTIF_TRACE_DEBUG1("%s", __FUNCTION__); 599 btif_hh_device_t *p_dev; 600 char bd_str[18]; 601 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 602 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 603 bd_addr->address[4], bd_addr->address[5]); 604 p_dev = btif_hh_find_dev_by_bda(bd_addr); 605 if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED) 606 && (p_dev->attr_mask & HID_VIRTUAL_CABLE)) 607 { 608 BTIF_TRACE_DEBUG1("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__); 609 /* start the timer */ 610 btif_hh_start_vup_timer(bd_addr); 611 p_dev->local_vup = TRUE; 612 BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG); 613 return BT_STATUS_SUCCESS; 614 } 615 else 616 { 617 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 618 return BT_STATUS_FAIL; 619 } 620} 621 622/******************************************************************************* 623** 624** Function btif_hh_connect 625** 626** Description connection initiated from the BTIF thread context 627** 628** Returns int status 629** 630*******************************************************************************/ 631 632bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr) 633{ 634 btif_hh_device_t *dev; 635 btif_hh_added_device_t *added_dev = NULL; 636 char bda_str[20]; 637 int i; 638 BD_ADDR *bda = (BD_ADDR*)bd_addr; 639 tBTA_HH_CONN conn; 640 CHECK_BTHH_INIT(); 641 dev = btif_hh_find_dev_by_bda(bd_addr); 642 BTIF_TRACE_DEBUG0("Connect _hh"); 643 sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X", 644 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 645 if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) { 646 // No space for more HID device now. 647 BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d", 648 __FUNCTION__, BTIF_HH_MAX_HID); 649 return BT_STATUS_FAIL; 650 } 651 652 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 653 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) { 654 added_dev = &btif_hh_cb.added_devices[i]; 655 BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x", 656 __FUNCTION__, bda_str, added_dev->attr_mask); 657 } 658 } 659 660 if (added_dev != NULL) { 661 if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) { 662 // No space for more HID device now. 663 BTIF_TRACE_ERROR2("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str); 664 memset(&(added_dev->bd_addr), 0, 6); 665 added_dev->dev_handle = BTA_HH_INVALID_HANDLE; 666 return BT_STATUS_FAIL; 667 } 668 } 669 670 if (added_dev == NULL || 671 (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 || 672 (added_dev->attr_mask & HID_RECONN_INIT) == 0) 673 { 674 tBTA_SEC sec_mask = BTUI_HH_SECURITY; 675 btif_hh_cb.status = BTIF_HH_DEV_CONNECTING; 676 BD_ADDR *bda = (BD_ADDR*)bd_addr; 677 BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask); 678 } 679 else 680 { 681 // This device shall be connected from the host side. 682 BTIF_TRACE_ERROR2("%s: Error, device %s can only be reconnected from device side", 683 __FUNCTION__, bda_str); 684 return BT_STATUS_FAIL; 685 } 686 687 HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING); 688 return BT_STATUS_SUCCESS; 689} 690 691/******************************************************************************* 692** 693** Function btif_hh_disconnect 694** 695** Description disconnection initiated from the BTIF thread context 696** 697** Returns void 698** 699*******************************************************************************/ 700 701void btif_hh_disconnect(bt_bdaddr_t *bd_addr) 702{ 703 BD_ADDR *bda = (BD_ADDR*)bd_addr; 704 btif_hh_device_t *p_dev; 705 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 706 if (p_dev != NULL) 707 { 708 BTA_HhClose(p_dev->dev_handle); 709 } 710 else 711 BTIF_TRACE_DEBUG1("%s-- Error: device not connected:",__FUNCTION__); 712} 713 714/******************************************************************************* 715** 716** Function btif_btif_hh_setreport 717** 718** Description setreport initiated from the BTIF thread context 719** 720** Returns void 721** 722*******************************************************************************/ 723 724void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size, 725 UINT8* report) 726{ 727 UINT8 hexbuf[20]; 728 UINT16 len = size; 729 int i = 0; 730 if (p_dev->p_buf != NULL) { 731 GKI_freebuf(p_dev->p_buf); 732 } 733 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR))); 734 if (p_dev->p_buf == NULL) { 735 APPL_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len); 736 return; 737 } 738 739 p_dev->p_buf->len = len; 740 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET; 741 742 //Build a SetReport data buffer 743 memset(hexbuf, 0, 20); 744 for(i=0; i<len; i++) 745 hexbuf[i] = report[i]; 746 747 UINT8* pbuf_data; 748 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset; 749 memcpy(pbuf_data, hexbuf, len); 750 BTA_HhSetReport(p_dev->dev_handle, r_type, p_dev->p_buf); 751 752} 753 754/***************************************************************************** 755** Section name (Group of functions) 756*****************************************************************************/ 757 758/***************************************************************************** 759** 760** btif hh api functions (no context switch) 761** 762*****************************************************************************/ 763 764 765/******************************************************************************* 766** 767** Function btif_hh_upstreams_evt 768** 769** Description Executes HH UPSTREAMS events in btif context 770** 771** Returns void 772** 773*******************************************************************************/ 774static void btif_hh_upstreams_evt(UINT16 event, char* p_param) 775{ 776 tBTA_HH *p_data = (tBTA_HH *)p_param; 777 bdstr_t bdstr; 778 btif_hh_device_t *p_dev = NULL; 779 int i; 780 int len, tmplen; 781 782 BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event)); 783 784 switch (event) 785 { 786 case BTA_HH_ENABLE_EVT: 787 BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status); 788 if (p_data->status == BTA_HH_OK) { 789 btif_hh_cb.status = BTIF_HH_ENABLED; 790 BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__); 791 /* Add hid descriptors for already bonded hid devices*/ 792 btif_storage_load_bonded_hid_info(); 793 } 794 else { 795 btif_hh_cb.status = BTIF_HH_DISABLED; 796 BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status); 797 } 798 break; 799 800 case BTA_HH_DISABLE_EVT: 801 btif_hh_cb.status = BTIF_HH_DISABLED; 802 if (p_data->status == BTA_HH_OK) { 803 int i; 804 //Clear the control block 805 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 806 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 807 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 808 } 809 } 810 else 811 BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status); 812 break; 813 814 case BTA_HH_OPEN_EVT: 815 BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status); 816 if (p_data->conn.status == BTA_HH_OK) { 817 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 818 if (p_dev == NULL) { 819 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle); 820 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 821 // The connect request must come from device side and exceeded the connected 822 // HID device number. 823 BTA_HhClose(p_data->conn.handle); 824 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 825 } 826 else if (p_dev->fd < 0) { 827 BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver..."); 828 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 829 //remove the connection and then try again to reconnect from the mouse side to recover 830 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 831 BTA_HhClose(p_data->conn.handle); 832 } 833 else { 834 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle); 835 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 836 btif_hh_cb.status = BTIF_HH_DEV_CONNECTED; 837 // Send set_idle if the peer_device is a keyboard 838 if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )|| 839 check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO)) 840 BTA_HhSetIdle(p_data->conn.handle, 0); 841 btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 842 BTA_HhGetDscpInfo(p_data->conn.handle); 843 p_dev->dev_status = BTHH_CONN_STATE_CONNECTED; 844 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 845 } 846 } 847 else { 848 bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda; 849 btif_dm_hh_open_failed(bdaddr); 850 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 851 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 852 } 853 break; 854 case BTA_HH_CLOSE_EVT: 855 BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d", 856 p_data->dev_status.status, p_data->dev_status.handle); 857 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 858 if (p_dev != NULL) { 859 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd); 860 if (p_dev->fd >= 0){ 861 UINT8 hidreport[9]; 862 memset(hidreport,0,9); 863 hidreport[0]=1; 864 bta_hh_co_write(p_dev->fd , hidreport, sizeof(hidreport)); 865 } 866 if(p_dev->vup_timer_active) 867 { 868 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 869 } 870 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 871 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 872 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 873 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 874 bta_hh_co_destroy(p_dev->fd); 875 p_dev->fd = -1; 876 } 877 else { 878 BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle); 879 } 880 break; 881 case BTA_HH_GET_RPT_EVT: { 882 BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data; 883 UINT8 *data = NULL; 884 UINT16 len = 0; 885 886 BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d", 887 p_data->hs_data.status, p_data->hs_data.handle); 888 /* p_rpt_data in HANDSHAKE response case */ 889 if (hdr) { 890 data = (UINT8 *)(hdr + 1) + hdr->offset; 891 len = hdr->len; 892 } 893 p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle); 894 if (p_dev) { 895 HAL_CBACK(bt_hh_callbacks, get_report_cb, 896 (bt_bdaddr_t*) &(p_dev->bd_addr), 897 (bthh_status_t) p_data->hs_data.status, data, len); 898 } else { 899 BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->hs_data.handle); 900 } 901 break; 902 } 903 case BTA_HH_SET_RPT_EVT: 904 BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d", 905 p_data->dev_status.status, p_data->dev_status.handle); 906 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 907 if (p_dev != NULL && p_dev->p_buf != NULL) { 908 BTIF_TRACE_DEBUG0("Freeing buffer..." ); 909 GKI_freebuf(p_dev->p_buf); 910 p_dev->p_buf = NULL; 911 } 912 break; 913 914 case BTA_HH_GET_PROTO_EVT: 915 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 916 BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s", 917 p_data->hs_data.status, p_data->hs_data.handle, 918 p_data->hs_data.rsp_data.proto_mode, 919 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" : 920 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported"); 921 HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t)p_data->hs_data.status, 922 (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode); 923 break; 924 925 case BTA_HH_SET_PROTO_EVT: 926 BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d", 927 p_data->dev_status.status, p_data->dev_status.handle); 928 break; 929 930 case BTA_HH_GET_IDLE_EVT: 931 BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d", 932 p_data->hs_data.handle, p_data->hs_data.status, 933 p_data->hs_data.rsp_data.idle_rate); 934 break; 935 936 case BTA_HH_SET_IDLE_EVT: 937 BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d", 938 p_data->dev_status.status, p_data->dev_status.handle); 939 break; 940 941 case BTA_HH_GET_DSCP_EVT: 942 BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d", 943 p_data->dev_status.status, p_data->dev_status.handle); 944 len = p_data->dscp_info.descriptor.dl_len; 945 BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len); 946 p_dev = btif_hh_cb.p_curr_dev; 947 if (p_dev == NULL) { 948 BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected"); 949 return; 950 } 951 if (p_dev->fd < 0) { 952 ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver..."); 953 return; 954 } 955 { 956 char *cached_name = NULL; 957 bt_bdname_t bdname; 958 bt_property_t prop_name; 959 BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME, 960 sizeof(bt_bdname_t), &bdname); 961 if (btif_storage_get_remote_device_property( 962 &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS) 963 { 964 cached_name = (char *)bdname.name; 965 } 966 else 967 { 968 cached_name = "Bluetooth HID"; 969 } 970 971 BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name); 972 bta_hh_co_send_hid_info(p_dev, cached_name, 973 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 974 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 975 len, p_data->dscp_info.descriptor.dsc_list); 976 if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) { 977 BD_ADDR bda; 978 bdcpy(bda, p_dev->bd_addr.address); 979 tBTA_HH_DEV_DSCP_INFO dscp_info; 980 bt_status_t ret; 981 bdcpy(bda, p_dev->bd_addr.address); 982 btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info); 983 BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 984 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 985 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 986 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 987 BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info); 988 // write hid info to nvram 989 ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, 990 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id, 991 p_data->dscp_info.version, p_data->dscp_info.ctry_code, 992 len, p_data->dscp_info.descriptor.dsc_list); 993 994 ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret); 995 BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device"); 996 997 //Free buffer created for dscp_info; 998 if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL) 999 { 1000 GKI_freebuf(dscp_info.descriptor.dsc_list); 1001 dscp_info.descriptor.dsc_list = NULL; 1002 dscp_info.descriptor.dl_len=0; 1003 } 1004 } 1005 else { 1006 //Device already added. 1007 BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__); 1008 } 1009 /*Sync HID Keyboard lockstates */ 1010 tmplen = sizeof(hid_kb_numlock_on_list) 1011 / sizeof(tHID_KB_LIST); 1012 for(i = 0; i< tmplen; i++) 1013 { 1014 if(p_data->dscp_info.vendor_id 1015 == hid_kb_numlock_on_list[i].version_id && 1016 p_data->dscp_info.product_id 1017 == hid_kb_numlock_on_list[i].product_id) 1018 { 1019 BTIF_TRACE_DEBUG3("%s() idx[%d] Enabling "\ 1020 "NUMLOCK for device :: %s", __FUNCTION__, 1021 i, hid_kb_numlock_on_list[i].kb_name); 1022 /* Enable NUMLOCK by default so that numeric 1023 keys work from first keyboard connect */ 1024 set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK, 1025 TRUE); 1026 sync_lockstate_on_connect(p_dev); 1027 /* End Sync HID Keyboard lockstates */ 1028 break; 1029 } 1030 } 1031 } 1032 break; 1033 1034 case BTA_HH_ADD_DEV_EVT: 1035 BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle); 1036 int i; 1037 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { 1038 if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) { 1039 if (p_data->dev_info.status == BTA_HH_OK) { 1040 btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle; 1041 } 1042 else { 1043 memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6); 1044 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; 1045 } 1046 break; 1047 } 1048 } 1049 break; 1050 case BTA_HH_RMV_DEV_EVT: 1051 BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d", 1052 p_data->dev_info.status, p_data->dev_info.handle); 1053 BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1054 p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2], 1055 p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]); 1056 break; 1057 1058 1059 case BTA_HH_VC_UNPLUG_EVT: 1060 BTIF_TRACE_DEBUG2("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d", 1061 p_data->dev_status.status, p_data->dev_status.handle); 1062 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle); 1063 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED; 1064 if (p_dev != NULL) { 1065 BTIF_TRACE_DEBUG6("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x", 1066 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], 1067 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3], 1068 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]); 1069 /* Stop the VUP timer */ 1070 if(p_dev->vup_timer_active) 1071 { 1072 btif_hh_stop_vup_timer(&(p_dev->bd_addr)); 1073 } 1074 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED; 1075 BTIF_TRACE_DEBUG1("%s---Sending connection state change", __FUNCTION__); 1076 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status); 1077 BTIF_TRACE_DEBUG1("%s---Removing HID bond", __FUNCTION__); 1078 /* If it is locally initiated VUP or remote device has its major COD as 1079 Peripheral removed the bond.*/ 1080 if (p_dev->local_vup || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR)) 1081 { 1082 p_dev->local_vup = FALSE; 1083 BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address); 1084 } 1085 else 1086 btif_hh_remove_device(p_dev->bd_addr); 1087 HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr), 1088 p_data->dev_status.status); 1089 } 1090 break; 1091 1092 case BTA_HH_API_ERR_EVT : 1093 ALOGI("BTA_HH API_ERR"); 1094 break; 1095 1096 1097 1098 default: 1099 BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event); 1100 break; 1101 } 1102} 1103 1104/******************************************************************************* 1105** 1106** Function bte_hh_evt 1107** 1108** Description Switches context from BTE to BTIF for all HH events 1109** 1110** Returns void 1111** 1112*******************************************************************************/ 1113 1114static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data) 1115{ 1116 bt_status_t status; 1117 int param_len = 0; 1118 1119 if (BTA_HH_ENABLE_EVT == event) 1120 param_len = sizeof(tBTA_HH_STATUS); 1121 else if (BTA_HH_OPEN_EVT == event) 1122 param_len = sizeof(tBTA_HH_CONN); 1123 else if (BTA_HH_DISABLE_EVT == event) 1124 param_len = sizeof(tBTA_HH_STATUS); 1125 else if (BTA_HH_CLOSE_EVT == event) 1126 param_len = sizeof(tBTA_HH_CBDATA); 1127 else if (BTA_HH_GET_DSCP_EVT == event) 1128 param_len = sizeof(tBTA_HH_DEV_DSCP_INFO); 1129 else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event)) 1130 param_len = sizeof(tBTA_HH_HSDATA); 1131 else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event)) 1132 param_len = sizeof(tBTA_HH_CBDATA); 1133 else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) ) 1134 param_len = sizeof(tBTA_HH_DEV_INFO); 1135 else if (BTA_HH_API_ERR_EVT == event) 1136 param_len = 0; 1137 /* switch context to btif task context (copy full union size for convenience) */ 1138 status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL); 1139 1140 /* catch any failed context transfers */ 1141 ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status); 1142} 1143 1144/******************************************************************************* 1145** 1146** Function btif_hh_handle_evt 1147** 1148** Description Switches context for immediate callback 1149** 1150** Returns void 1151** 1152*******************************************************************************/ 1153 1154static void btif_hh_handle_evt(UINT16 event, char *p_param) 1155{ 1156 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param; 1157 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1158 int ret; 1159 switch(event) 1160 { 1161 case BTIF_HH_CONNECT_REQ_EVT: 1162 { 1163 ret = btif_hh_connect(bd_addr); 1164 if(ret == BT_STATUS_SUCCESS) 1165 { 1166 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING); 1167 } 1168 else 1169 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED); 1170 } 1171 break; 1172 1173 case BTIF_HH_DISCONNECT_REQ_EVT: 1174 { 1175 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1176 btif_hh_disconnect(bd_addr); 1177 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING); 1178 } 1179 break; 1180 1181 case BTIF_HH_VUP_REQ_EVT: 1182 { 1183 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event); 1184 ret = btif_hh_virtual_unplug(bd_addr); 1185 } 1186 break; 1187 1188 default: 1189 { 1190 BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event); 1191 } 1192 break; 1193 } 1194} 1195 1196/******************************************************************************* 1197** 1198** Function btif_hh_tmr_hdlr 1199** 1200** Description Process timer timeout 1201** 1202** Returns void 1203*******************************************************************************/ 1204void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle) 1205{ 1206 btif_hh_device_t *p_dev; 1207 UINT8 i,j; 1208 tBTA_HH_EVT event; 1209 tBTA_HH p_data; 1210 int param_len = 0; 1211 memset(&p_data, 0, sizeof(tBTA_HH)); 1212 1213 BTIF_TRACE_DEBUG2("%s timer_in_use=%d", __FUNCTION__, tle->in_use ); 1214 1215 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1216 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED) 1217 { 1218 1219 p_dev = &btif_hh_cb.devices[i]; 1220 1221 if (p_dev->vup_timer_active) 1222 { 1223 p_dev->vup_timer_active = FALSE; 1224 event = BTA_HH_VC_UNPLUG_EVT; 1225 p_data.dev_status.status = BTHH_ERR; 1226 p_data.dev_status.handle = p_dev->dev_handle; 1227 param_len = sizeof(tBTA_HH_CBDATA); 1228 1229 /* switch context to btif task context */ 1230 btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data, 1231 param_len, NULL); 1232 } 1233 } 1234 } 1235} 1236 1237/******************************************************************************* 1238** 1239** Function btif_hh_init 1240** 1241** Description initializes the hh interface 1242** 1243** Returns bt_status_t 1244** 1245*******************************************************************************/ 1246static bt_status_t init( bthh_callbacks_t* callbacks ) 1247{ 1248 UINT32 i; 1249 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1250 1251 bt_hh_callbacks = callbacks; 1252 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb)); 1253 for (i = 0; i < BTIF_HH_MAX_HID; i++){ 1254 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN; 1255 } 1256 /* Invoke the enable service API to the core to set the appropriate service_id */ 1257 btif_enable_service(BTA_HID_SERVICE_ID); 1258 return BT_STATUS_SUCCESS; 1259} 1260 1261/******************************************************************************* 1262** 1263** Function connect 1264** 1265** Description connect to hid device 1266** 1267** Returns bt_status_t 1268** 1269*******************************************************************************/ 1270static bt_status_t connect( bt_bdaddr_t *bd_addr) 1271{ 1272 if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) 1273 { 1274 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT, 1275 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1276 return BT_STATUS_SUCCESS; 1277 } 1278 else 1279 return BT_STATUS_BUSY; 1280} 1281 1282/******************************************************************************* 1283** 1284** Function disconnect 1285** 1286** Description disconnect from hid device 1287** 1288** Returns bt_status_t 1289** 1290*******************************************************************************/ 1291static bt_status_t disconnect( bt_bdaddr_t *bd_addr ) 1292{ 1293 CHECK_BTHH_INIT(); 1294 btif_hh_device_t *p_dev; 1295 1296 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1297 { 1298 BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1299 return BT_STATUS_FAIL; 1300 } 1301 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1302 if (p_dev != NULL) 1303 { 1304 return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT, 1305 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1306 } 1307 else 1308 { 1309 BTIF_TRACE_WARNING1("%s: Error, device not opened.", __FUNCTION__); 1310 return BT_STATUS_FAIL; 1311 } 1312} 1313 1314/******************************************************************************* 1315** 1316** Function virtual_unplug 1317** 1318** Description Virtual UnPlug (VUP) the specified HID device. 1319** 1320** Returns bt_status_t 1321** 1322*******************************************************************************/ 1323static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr) 1324{ 1325 CHECK_BTHH_INIT(); 1326 btif_hh_device_t *p_dev; 1327 char bd_str[18]; 1328 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X", 1329 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3], 1330 bd_addr->address[4], bd_addr->address[5]); 1331 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1332 { 1333 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1334 return BT_STATUS_FAIL; 1335 } 1336 p_dev = btif_hh_find_dev_by_bda(bd_addr); 1337 if (!p_dev) 1338 { 1339 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str); 1340 return BT_STATUS_FAIL; 1341 } 1342 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT, 1343 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL); 1344 return BT_STATUS_SUCCESS; 1345} 1346 1347 1348/******************************************************************************* 1349** 1350** Function set_info 1351** 1352** Description Set the HID device descriptor for the specified HID device. 1353** 1354** Returns bt_status_t 1355** 1356*******************************************************************************/ 1357static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info ) 1358{ 1359 CHECK_BTHH_INIT(); 1360 tBTA_HH_DEV_DSCP_INFO dscp_info; 1361 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1362 1363 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1364 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1365 BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, " 1366 "product_id = 0x%04x, version= 0x%04x", 1367 __FUNCTION__, hid_info.sub_class, 1368 hid_info.app_id, hid_info.vendor_id, hid_info.product_id, 1369 hid_info.version); 1370 1371 if (btif_hh_cb.status == BTIF_HH_DISABLED) 1372 { 1373 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1374 return BT_STATUS_FAIL; 1375 } 1376 1377 dscp_info.vendor_id = hid_info.vendor_id; 1378 dscp_info.product_id = hid_info.product_id; 1379 dscp_info.version = hid_info.version; 1380 dscp_info.ctry_code = hid_info.ctry_code; 1381 1382 dscp_info.descriptor.dl_len = hid_info.dl_len; 1383 dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len); 1384 if (dscp_info.descriptor.dsc_list == NULL) 1385 { 1386 ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__); 1387 return BT_STATUS_FAIL; 1388 } 1389 memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len); 1390 1391 if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask)) 1392 { 1393 BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class, 1394 hid_info.app_id, dscp_info); 1395 } 1396 1397 GKI_freebuf(dscp_info.descriptor.dsc_list); 1398 1399 return BT_STATUS_SUCCESS; 1400} 1401/******************************************************************************* 1402** 1403** Function get_idle_time 1404** 1405** Description Get the HID idle time 1406** 1407** Returns bt_status_t 1408** 1409*******************************************************************************/ 1410static bt_status_t get_idle_time(bt_bdaddr_t *bd_addr) 1411{ 1412 CHECK_BTHH_INIT(); 1413 btif_hh_device_t *p_dev; 1414 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1415 1416 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X", 1417 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1418 1419 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1420 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1421 return BT_STATUS_FAIL; 1422 } 1423 1424 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1425 if (p_dev != NULL) { 1426 //BTA_HhGetIdle(p_dev->dev_handle); 1427 } 1428 else { 1429 return BT_STATUS_FAIL; 1430 } 1431 return BT_STATUS_SUCCESS; 1432} 1433 1434/******************************************************************************* 1435** 1436** Function set_idle_time 1437** 1438** Description Set the HID idle time 1439** 1440** Returns bt_status_t 1441** 1442*******************************************************************************/ 1443static bt_status_t set_idle_time (bt_bdaddr_t *bd_addr, uint8_t idle_time) 1444{ 1445 CHECK_BTHH_INIT(); 1446 btif_hh_device_t *p_dev; 1447 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1448 1449 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1450 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1451 1452 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1453 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1454 return BT_STATUS_FAIL; 1455 } 1456 1457 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1458 if (p_dev == NULL) { 1459 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1460 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1461 return BT_STATUS_FAIL; 1462 } 1463 else { 1464 //BTA_HhSetIdle(p_dev->dev_handle, idle_time); 1465 } 1466 return BT_STATUS_SUCCESS; 1467} 1468 1469/******************************************************************************* 1470** 1471** Function get_protocol 1472** 1473** Description Get the HID proto mode. 1474** 1475** Returns bt_status_t 1476** 1477*******************************************************************************/ 1478static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1479{ 1480 CHECK_BTHH_INIT(); 1481 btif_hh_device_t *p_dev; 1482 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1483 1484 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X", 1485 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1486 1487 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1488 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1489 return BT_STATUS_FAIL; 1490 } 1491 1492 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1493 if (p_dev != NULL) { 1494 1495 BTA_HhGetProtoMode(p_dev->dev_handle); 1496 } 1497 else { 1498 return BT_STATUS_FAIL; 1499 } 1500 return BT_STATUS_SUCCESS; 1501} 1502 1503/******************************************************************************* 1504** 1505** Function set_protocol 1506** 1507** Description Set the HID proto mode. 1508** 1509** Returns bt_status_t 1510** 1511*******************************************************************************/ 1512static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode) 1513{ 1514 CHECK_BTHH_INIT(); 1515 btif_hh_device_t *p_dev; 1516 UINT8 proto_mode = protocolMode; 1517 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1518 1519 BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode); 1520 1521 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1522 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1523 1524 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1525 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1526 return BT_STATUS_FAIL; 1527 } 1528 1529 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1530 if (p_dev == NULL) { 1531 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1532 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1533 return BT_STATUS_FAIL; 1534 } 1535 else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) { 1536 BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode); 1537 return BT_STATUS_FAIL; 1538 } 1539 else { 1540 BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode); 1541 } 1542 1543 1544 return BT_STATUS_SUCCESS; 1545} 1546 1547/******************************************************************************* 1548** 1549** Function get_report 1550** 1551** Description Send a GET_REPORT to HID device. 1552** 1553** Returns bt_status_t 1554** 1555*******************************************************************************/ 1556static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize) 1557{ 1558 CHECK_BTHH_INIT(); 1559 btif_hh_device_t *p_dev; 1560 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1561 1562 BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__, 1563 reportType, reportId, bufferSize); 1564 1565 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1566 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1567 1568 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1569 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1570 return BT_STATUS_FAIL; 1571 } 1572 1573 1574 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1575 if (p_dev == NULL) { 1576 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1577 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1578 return BT_STATUS_FAIL; 1579 } 1580 else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) { 1581 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1582 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1583 return BT_STATUS_FAIL; 1584 } 1585 else { 1586 BTA_HhGetReport(p_dev->dev_handle, reportType, 1587 reportId, bufferSize); 1588 } 1589 1590 return BT_STATUS_SUCCESS; 1591} 1592 1593/******************************************************************************* 1594** 1595** Function set_report 1596** 1597** Description Send a SET_REPORT to HID device. 1598** 1599** Returns bt_status_t 1600** 1601*******************************************************************************/ 1602static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report) 1603{ 1604 CHECK_BTHH_INIT(); 1605 btif_hh_device_t *p_dev; 1606 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1607 1608 BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType); 1609 1610 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1611 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1612 1613 1614 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1615 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1616 return BT_STATUS_FAIL; 1617 } 1618 1619 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1620 if (p_dev == NULL) { 1621 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1622 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1623 return BT_STATUS_FAIL; 1624 } 1625 else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) { 1626 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1627 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1628 return BT_STATUS_FAIL; 1629 } 1630 else { 1631 int hex_bytes_filled; 1632 UINT8 hexbuf[200]; 1633 UINT16 len = (strlen(report) + 1) / 2; 1634 1635 if (p_dev->p_buf != NULL) { 1636 GKI_freebuf(p_dev->p_buf); 1637 } 1638 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR))); 1639 if (p_dev->p_buf == NULL) { 1640 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len); 1641 return BT_STATUS_FAIL; 1642 } 1643 1644 p_dev->p_buf->len = len; 1645 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET; 1646 1647 /* Build a SetReport data buffer */ 1648 memset(hexbuf, 0, 200); 1649 //TODO 1650 hex_bytes_filled = ascii_2_hex(report, len, hexbuf); 1651 ALOGI("Hex bytes filled, hex value: %d", hex_bytes_filled); 1652 1653 if (hex_bytes_filled) { 1654 UINT8* pbuf_data; 1655 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset; 1656 memcpy(pbuf_data, hexbuf, hex_bytes_filled); 1657 BTA_HhSetReport(p_dev->dev_handle, reportType, p_dev->p_buf); 1658 } 1659 return BT_STATUS_SUCCESS; 1660 } 1661 1662 1663} 1664 1665/******************************************************************************* 1666** 1667** Function send_data 1668** 1669** Description Send a SEND_DATA to HID device. 1670** 1671** Returns bt_status_t 1672** 1673*******************************************************************************/ 1674static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data) 1675{ 1676 CHECK_BTHH_INIT(); 1677 btif_hh_device_t *p_dev; 1678 BD_ADDR* bda = (BD_ADDR*) bd_addr; 1679 1680 BTIF_TRACE_DEBUG1("%s", __FUNCTION__); 1681 1682 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X", 1683 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1684 1685 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1686 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status); 1687 return BT_STATUS_FAIL; 1688 } 1689 1690 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr); 1691 if (p_dev == NULL) { 1692 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.", 1693 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]); 1694 return BT_STATUS_FAIL; 1695 } 1696 1697 else { 1698 int hex_bytes_filled; 1699 UINT8 hexbuf[200]; 1700 UINT16 len = (strlen(data) + 1) / 2; 1701 1702 if (p_dev->p_buf != NULL) { 1703 GKI_freebuf(p_dev->p_buf); 1704 } 1705 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR))); 1706 if (p_dev->p_buf == NULL) { 1707 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len); 1708 return BT_STATUS_FAIL; 1709 } 1710 1711 p_dev->p_buf->len = len; 1712 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET; 1713 1714 /* Build a SetReport data buffer */ 1715 memset(hexbuf, 0, 200); 1716 hex_bytes_filled = ascii_2_hex(data, len, hexbuf); 1717 BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len); 1718 1719 if (hex_bytes_filled) { 1720 UINT8* pbuf_data; 1721 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset; 1722 memcpy(pbuf_data, hexbuf, hex_bytes_filled); 1723 p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT; 1724 BTA_HhSendData(p_dev->dev_handle, *bda, p_dev->p_buf); 1725 return BT_STATUS_SUCCESS; 1726 } 1727 1728 } 1729 return BT_STATUS_FAIL; 1730} 1731 1732 1733/******************************************************************************* 1734** 1735** Function cleanup 1736** 1737** Description Closes the HH interface 1738** 1739** Returns bt_status_t 1740** 1741*******************************************************************************/ 1742static void cleanup( void ) 1743{ 1744 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1745 btif_hh_device_t *p_dev; 1746 int i; 1747 if (btif_hh_cb.status == BTIF_HH_DISABLED) { 1748 BTIF_TRACE_WARNING2("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status); 1749 return; 1750 } 1751 btif_hh_cb.status = BTIF_HH_DISABLING; 1752 for (i = 0; i < BTIF_HH_MAX_HID; i++) { 1753 p_dev = &btif_hh_cb.devices[i]; 1754 if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) { 1755 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd); 1756 bta_hh_co_destroy(p_dev->fd); 1757 p_dev->fd = -1; 1758 p_dev->hh_keep_polling = 0; 1759 p_dev->hh_poll_thread_id = -1; 1760 } 1761 } 1762 1763 if (bt_hh_callbacks) 1764 { 1765 btif_disable_service(BTA_HID_SERVICE_ID); 1766 bt_hh_callbacks = NULL; 1767 } 1768 1769} 1770 1771static const bthh_interface_t bthhInterface = { 1772 sizeof(bthhInterface), 1773 init, 1774 connect, 1775 disconnect, 1776 virtual_unplug, 1777 set_info, 1778 get_protocol, 1779 set_protocol, 1780// get_idle_time, 1781// set_idle_time, 1782 get_report, 1783 set_report, 1784 send_data, 1785 cleanup, 1786}; 1787 1788/******************************************************************************* 1789** 1790** Function btif_hh_execute_service 1791** 1792** Description Initializes/Shuts down the service 1793** 1794** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise 1795** 1796*******************************************************************************/ 1797bt_status_t btif_hh_execute_service(BOOLEAN b_enable) 1798{ 1799 if (b_enable) 1800 { 1801 /* Enable and register with BTA-HH */ 1802 BTA_HhEnable(BTA_SEC_NONE, bte_hh_evt); 1803 } 1804 else { 1805 /* Disable HH */ 1806 BTA_HhDisable(); 1807 } 1808 return BT_STATUS_SUCCESS; 1809} 1810 1811/******************************************************************************* 1812** 1813** Function btif_hh_get_interface 1814** 1815** Description Get the hh callback interface 1816** 1817** Returns bthh_interface_t 1818** 1819*******************************************************************************/ 1820const bthh_interface_t *btif_hh_get_interface() 1821{ 1822 BTIF_TRACE_EVENT1("%s", __FUNCTION__); 1823 return &bthhInterface; 1824} 1825