1/******************************************************************************
2 *
3 *  Copyright (C) 1999-2012 Broadcom Corporation
4 *
5 *  Licensed under the Apache License, Version 2.0 (the "License");
6 *  you may not use this file except in compliance with the License.
7 *  You may obtain a copy of the License at:
8 *
9 *  http://www.apache.org/licenses/LICENSE-2.0
10 *
11 *  Unless required by applicable law or agreed to in writing, software
12 *  distributed under the License is distributed on an "AS IS" BASIS,
13 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 *  See the License for the specific language governing permissions and
15 *  limitations under the License.
16 *
17 ******************************************************************************/
18
19/******************************************************************************
20 *
21 *  this file contains the main Bluetooth Manager (BTM) internal
22 *  definitions.
23 *
24 ******************************************************************************/
25#ifndef BTM_INT_H
26#define BTM_INT_H
27
28#include "bt_target.h"
29#include "bt_common.h"
30#include "hcidefs.h"
31
32#include "rfcdefs.h"
33#include "osi/include/alarm.h"
34#include "osi/include/list.h"
35#include "osi/include/fixed_queue.h"
36
37#include "btm_api.h"
38
39#if (BLE_INCLUDED == TRUE)
40#include "btm_ble_int.h"
41#if (SMP_INCLUDED == TRUE)
42#include "smp_api.h"
43#endif
44#endif
45
46#if BTM_MAX_LOC_BD_NAME_LEN > 0
47typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
48#endif
49
50#define  BTM_ACL_IS_CONNECTED(bda)   (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
51
52/* Definitions for Server Channel Number (SCN) management
53*/
54#define BTM_MAX_SCN      PORT_MAX_RFC_PORTS
55
56/* Define masks for supported and exception 2.0 ACL packet types
57*/
58#define BTM_ACL_SUPPORTED_PKTS_MASK      (HCI_PKT_TYPES_MASK_DM1        | \
59                                          HCI_PKT_TYPES_MASK_DH1        | \
60                                          HCI_PKT_TYPES_MASK_DM3        | \
61                                          HCI_PKT_TYPES_MASK_DH3        | \
62                                          HCI_PKT_TYPES_MASK_DM5        | \
63                                          HCI_PKT_TYPES_MASK_DH5)
64
65#define BTM_ACL_EXCEPTION_PKTS_MASK      (HCI_PKT_TYPES_MASK_NO_2_DH1   | \
66                                          HCI_PKT_TYPES_MASK_NO_3_DH1   | \
67                                          HCI_PKT_TYPES_MASK_NO_2_DH3   | \
68                                          HCI_PKT_TYPES_MASK_NO_3_DH3   | \
69                                          HCI_PKT_TYPES_MASK_NO_2_DH5   | \
70                                          HCI_PKT_TYPES_MASK_NO_3_DH5)
71
72#define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
73                               HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
74                               ? TRUE : FALSE)
75
76#define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
77
78/* Define the ACL Management control structure
79*/
80typedef struct
81{
82    UINT16          hci_handle;
83    UINT16          pkt_types_mask;
84    UINT16          clock_offset;
85    BD_ADDR         remote_addr;
86    DEV_CLASS       remote_dc;
87    BD_NAME         remote_name;
88
89    UINT16          manufacturer;
90    UINT16          lmp_subversion;
91    UINT16          link_super_tout;
92    BD_FEATURES     peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1];    /* Peer LMP Extended features mask table for the device */
93    UINT8           num_read_pages;
94    UINT8           lmp_version;
95
96    BOOLEAN         in_use;
97    UINT8           link_role;
98    BOOLEAN         link_up_issued;     /* True if busy_level link up has been issued */
99
100#define BTM_ACL_SWKEY_STATE_IDLE                0
101#define BTM_ACL_SWKEY_STATE_MODE_CHANGE         1
102#define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF      2
103#define BTM_ACL_SWKEY_STATE_SWITCHING           3
104#define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON       4
105#define BTM_ACL_SWKEY_STATE_IN_PROGRESS         5
106    UINT8           switch_role_state;
107
108#define BTM_ACL_ENCRYPT_STATE_IDLE              0
109#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF       1   /* encryption turning off */
110#define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC         2   /* temporarily off for change link key or role switch */
111#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON        3   /* encryption turning on */
112    UINT8           encrypt_state;                  /* overall BTM encryption state */
113
114#if BLE_INCLUDED == TRUE
115    tBT_TRANSPORT   transport;
116    BD_ADDR         conn_addr;              /* local device address used for this connection */
117    UINT8           conn_addr_type;         /* local device address type for this connection */
118    BD_ADDR         active_remote_addr;     /* remote address used on this connection */
119    UINT8           active_remote_addr_type;         /* local device address type for this connection */
120    BD_FEATURES     peer_le_features;       /* Peer LE Used features mask for the device */
121
122#endif
123
124} tACL_CONN;
125
126/* Define the Device Management control structure
127*/
128typedef struct
129{
130    tBTM_DEV_STATUS_CB  *p_dev_status_cb;   /* Device status change callback        */
131    tBTM_VS_EVT_CB      *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS];     /* Register for vendor specific events  */
132
133    tBTM_CMPL_CB        *p_stored_link_key_cmpl_cb;   /* Read/Write/Delete stored link key    */
134
135    alarm_t             *read_local_name_timer; /* Read local name timer */
136    tBTM_CMPL_CB        *p_rln_cmpl_cb;     /* Callback function to be called when  */
137                                            /* read local name function complete    */
138    alarm_t             *read_rssi_timer;   /* Read RSSI timer */
139    tBTM_CMPL_CB        *p_rssi_cmpl_cb;    /* Callback function to be called when  */
140                                            /* read RSSI function completes */
141    alarm_t             *read_link_quality_timer;
142    tBTM_CMPL_CB        *p_link_qual_cmpl_cb; /* Callback function to be called when  */
143                                            /* read link quality function completes */
144
145    alarm_t             *read_inq_tx_power_timer;
146    tBTM_CMPL_CB        *p_inq_tx_power_cmpl_cb; /* Callback function to be called when  */
147                                            /* read inq tx power function completes  */
148
149    alarm_t             *qos_setup_timer;   /* QoS setup timer */
150    tBTM_CMPL_CB        *p_qos_setup_cmpl_cb; /* Callback function to be called when  */
151                                            /* qos setup function completes         */
152
153    tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
154    tBTM_CMPL_CB        *p_switch_role_cb;  /* Callback function to be called when  */
155                                            /* requested switch role is completed   */
156
157    alarm_t             *read_tx_power_timer; /* Read tx power timer */
158    tBTM_CMPL_CB        *p_tx_power_cmpl_cb;/* Callback function to be called       */
159
160    DEV_CLASS            dev_class;         /* Local device class                   */
161
162#if BLE_INCLUDED == TRUE
163
164    tBTM_CMPL_CB        *p_le_test_cmd_cmpl_cb;   /* Callback function to be called when
165                                                  LE test mode command has been sent successfully */
166
167    BD_ADDR                 read_tx_pwr_addr;   /* read TX power target address     */
168
169#define BTM_LE_SUPPORT_STATE_SIZE   8
170UINT8                   le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
171
172tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
173BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */
174
175#if BTM_BLE_CONFORMANCE_TESTING == TRUE
176    BOOLEAN                 no_disc_if_pair_fail;
177    BOOLEAN                 enable_test_mac_val;
178    BT_OCTET8               test_mac;
179    BOOLEAN                 enable_test_local_sign_cntr;
180    UINT32                  test_local_sign_cntr;
181#endif
182
183#endif  /* BLE_INCLUDED */
184
185    tBTM_IO_CAP          loc_io_caps;       /* IO capability of the local device */
186    tBTM_AUTH_REQ        loc_auth_req;      /* the auth_req flag  */
187    BOOLEAN              secure_connections_only;    /* Rejects service level 0 connections if */
188                                                     /* itself or peer device doesn't support */
189                                                     /* secure connections */
190} tBTM_DEVCB;
191
192
193/* Define the structures and constants used for inquiry
194*/
195
196/* Definitions of limits for inquiries */
197#define BTM_PER_INQ_MIN_MAX_PERIOD      HCI_PER_INQ_MIN_MAX_PERIOD
198#define BTM_PER_INQ_MAX_MAX_PERIOD      HCI_PER_INQ_MAX_MAX_PERIOD
199#define BTM_PER_INQ_MIN_MIN_PERIOD      HCI_PER_INQ_MIN_MIN_PERIOD
200#define BTM_PER_INQ_MAX_MIN_PERIOD      HCI_PER_INQ_MAX_MIN_PERIOD
201#define BTM_MAX_INQUIRY_LENGTH          HCI_MAX_INQUIRY_LENGTH
202#define BTM_MIN_INQUIRY_LEN             0x01
203
204#define BTM_MIN_INQ_TX_POWER    -70
205#define BTM_MAX_INQ_TX_POWER    20
206
207typedef struct
208{
209    UINT32          inq_count;          /* Used for determining if a response has already been      */
210                                        /* received for the current inquiry operation. (We do not   */
211                                        /* want to flood the caller with multiple responses from    */
212                                        /* the same device.                                         */
213    BD_ADDR         bd_addr;
214} tINQ_BDADDR;
215
216typedef struct
217{
218    UINT32          time_of_resp;
219    UINT32          inq_count;          /* "timestamps" the entry with a particular inquiry count   */
220                                        /* Used for determining if a response has already been      */
221                                        /* received for the current inquiry operation. (We do not   */
222                                        /* want to flood the caller with multiple responses from    */
223                                        /* the same device.                                         */
224    tBTM_INQ_INFO   inq_info;
225    BOOLEAN         in_use;
226
227#if (BLE_INCLUDED == TRUE)
228    BOOLEAN         scan_rsp;
229#endif
230} tINQ_DB_ENT;
231
232
233enum
234{
235    INQ_NONE,
236    INQ_LE_OBSERVE,
237    INQ_GENERAL
238};
239typedef UINT8 tBTM_INQ_TYPE;
240
241typedef struct
242{
243    tBTM_CMPL_CB *p_remname_cmpl_cb;
244
245#define BTM_EXT_RMT_NAME_TIMEOUT_MS (40 * 1000) /* 40 seconds */
246
247
248    alarm_t         *remote_name_timer;
249
250    UINT16           discoverable_mode;
251    UINT16           connectable_mode;
252    UINT16           page_scan_window;
253    UINT16           page_scan_period;
254    UINT16           inq_scan_window;
255    UINT16           inq_scan_period;
256    UINT16           inq_scan_type;
257    UINT16           page_scan_type;        /* current page scan type */
258    tBTM_INQ_TYPE    scan_type;
259
260    BD_ADDR          remname_bda;           /* Name of bd addr for active remote name request */
261#define BTM_RMT_NAME_INACTIVE       0
262#define BTM_RMT_NAME_EXT            0x1     /* Initiated through API */
263#define BTM_RMT_NAME_SEC            0x2     /* Initiated internally by security manager */
264#define BTM_RMT_NAME_INQ            0x4     /* Remote name initiated internally by inquiry */
265    BOOLEAN          remname_active;        /* State of a remote name request by external API */
266
267    tBTM_CMPL_CB    *p_inq_cmpl_cb;
268    tBTM_INQ_RESULTS_CB *p_inq_results_cb;
269    tBTM_CMPL_CB    *p_inq_ble_cmpl_cb;     /*completion callback exclusively for LE Observe*/
270    tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
271    tBTM_CMPL_CB    *p_inqfilter_cmpl_cb;   /* Called (if not NULL) after inquiry filter completed */
272    UINT32           inq_counter;           /* Counter incremented each time an inquiry completes */
273                                            /* Used for determining whether or not duplicate devices */
274                                            /* have responded to the same inquiry */
275    tINQ_BDADDR     *p_bd_db;               /* Pointer to memory that holds bdaddrs */
276    UINT16           num_bd_entries;        /* Number of entries in database */
277    UINT16           max_bd_entries;        /* Maximum number of entries that can be stored */
278    tINQ_DB_ENT      inq_db[BTM_INQ_DB_SIZE];
279    tBTM_INQ_PARMS   inqparms;              /* Contains the parameters for the current inquiry */
280    tBTM_INQUIRY_CMPL inq_cmpl_info;        /* Status and number of responses from the last inquiry */
281
282    UINT16           per_min_delay;         /* Current periodic minimum delay */
283    UINT16           per_max_delay;         /* Current periodic maximum delay */
284    BOOLEAN          inqfilt_active;
285    UINT8            pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
286                                                  /* inquiry that has been cancelled*/
287    UINT8            inqfilt_type;          /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
288
289#define BTM_INQ_INACTIVE_STATE      0
290#define BTM_INQ_CLR_FILT_STATE      1   /* Currently clearing the inquiry filter preceeding the inquiry request */
291                                        /* (bypassed if filtering is not used)                                  */
292#define BTM_INQ_SET_FILT_STATE      2   /* Sets the new filter (or turns off filtering) in this state */
293#define BTM_INQ_ACTIVE_STATE        3   /* Actual inquiry or periodic inquiry is in progress */
294#define BTM_INQ_REMNAME_STATE       4   /* Remote name requests are active  */
295
296    UINT8            state;             /* Current state that the inquiry process is in */
297    UINT8            inq_active;        /* Bit Mask indicating type of inquiry is active */
298    BOOLEAN          no_inc_ssp;        /* TRUE, to stop inquiry on incoming SSP */
299#if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
300    btm_inq_state    next_state;        /*interleaving state to determine next mode to be inquired*/
301#endif
302} tBTM_INQUIRY_VAR_ST;
303
304/* The MSB of the clock offset field indicates that the offset is valid if TRUE */
305#define BTM_CLOCK_OFFSET_VALID      0x8000
306
307/* Define the structures needed by security management
308*/
309
310#define BTM_SEC_INVALID_HANDLE  0xFFFF
311
312typedef UINT8 *BTM_BD_NAME_PTR;                        /* Pointer to Device name */
313
314/* Security callback is called by this unit when security
315**   procedures are completed.  Parameters are
316**              BD Address of remote
317**              Result of the operation
318*/
319typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
320
321typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
322
323/* MACROs to convert from SCO packet types mask to ESCO and back */
324#define BTM_SCO_PKT_TYPE_MASK   (   HCI_PKT_TYPES_MASK_HV1      \
325                                 |  HCI_PKT_TYPES_MASK_HV2      \
326                                 |  HCI_PKT_TYPES_MASK_HV3)
327
328/* Mask defining only the SCO types of an esco packet type */
329#define BTM_ESCO_PKT_TYPE_MASK  (   HCI_ESCO_PKT_TYPES_MASK_HV1 \
330                                 |  HCI_ESCO_PKT_TYPES_MASK_HV2 \
331                                 |  HCI_ESCO_PKT_TYPES_MASK_HV3)
332
333#define BTM_SCO_2_ESCO(scotype)  ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
334#define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
335
336/* Define masks for supported and exception 2.0 SCO packet types
337*/
338#define BTM_SCO_SUPPORTED_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_HV1       | \
339                                          HCI_ESCO_PKT_TYPES_MASK_HV2       | \
340                                          HCI_ESCO_PKT_TYPES_MASK_HV3       | \
341                                          HCI_ESCO_PKT_TYPES_MASK_EV3       | \
342                                          HCI_ESCO_PKT_TYPES_MASK_EV4       | \
343                                          HCI_ESCO_PKT_TYPES_MASK_EV5)
344
345#define BTM_SCO_EXCEPTION_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3  | \
346                                          HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3  | \
347                                          HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5  | \
348                                          HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
349
350
351#define BTM_SCO_ROUTE_UNKNOWN       0xff
352
353/* Define the structure that contains (e)SCO data */
354typedef struct
355{
356    tBTM_ESCO_CBACK    *p_esco_cback;   /* Callback for eSCO events     */
357    tBTM_ESCO_PARAMS    setup;
358    tBTM_ESCO_DATA      data;           /* Connection complete information */
359    UINT8               hci_status;
360} tBTM_ESCO_INFO;
361
362/* Define the structure used for SCO Management
363*/
364typedef struct
365{
366    tBTM_ESCO_INFO   esco;              /* Current settings             */
367#if BTM_SCO_HCI_INCLUDED == TRUE
368    fixed_queue_t   *xmit_data_q;       /* SCO data transmitting queue  */
369#endif
370    tBTM_SCO_CB     *p_conn_cb;         /* Callback for when connected  */
371    tBTM_SCO_CB     *p_disc_cb;         /* Callback for when disconnect */
372    UINT16           state;             /* The state of the SCO link    */
373    UINT16           hci_handle;        /* HCI Handle                   */
374    BOOLEAN          is_orig;           /* TRUE if the originator       */
375    BOOLEAN          rem_bd_known;      /* TRUE if remote BD addr known */
376
377} tSCO_CONN;
378
379/* SCO Management control block */
380typedef struct
381{
382    tBTM_SCO_IND_CBACK  *app_sco_ind_cb;
383#if BTM_SCO_HCI_INCLUDED == TRUE
384    tBTM_SCO_DATA_CB     *p_data_cb;        /* Callback for SCO data over HCI */
385    UINT32               xmit_window_size; /* Total SCO window in bytes  */
386#endif
387    tSCO_CONN            sco_db[BTM_MAX_SCO_LINKS];
388    tBTM_ESCO_PARAMS     def_esco_parms;
389    BD_ADDR              xfer_addr;
390    UINT16               sco_disc_reason;
391    BOOLEAN              esco_supported;    /* TRUE if 1.2 cntlr AND supports eSCO links */
392    tBTM_SCO_TYPE        desired_sco_mode;
393    tBTM_SCO_TYPE        xfer_sco_type;
394    tBTM_SCO_PCM_PARAM   sco_pcm_param;
395    tBTM_SCO_CODEC_TYPE  codec_in_use;      /* None, CVSD, MSBC, etc. */
396#if BTM_SCO_HCI_INCLUDED == TRUE
397    tBTM_SCO_ROUTE_TYPE  sco_path;
398#endif
399
400} tSCO_CB;
401
402
403#if BTM_SCO_INCLUDED == TRUE
404extern void     btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
405extern void     btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
406                                    tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
407extern void     btm_reject_sco_link(UINT16 sco_inx );
408extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
409extern void btm_sco_disc_chk_pend_for_modechange (UINT16 hci_handle);
410
411#else
412#define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
413#define btm_reject_sco_link(sco_inx)
414#define btm_set_sco_ind_cback(sco_ind_cb)
415#define btm_sco_chk_pend_rolechange(hci_handle)
416#endif  /* BTM_SCO_INCLUDED */
417
418/*
419** Define structure for Security Service Record.
420** A record exists for each service registered with the Security Manager
421*/
422#define BTM_SEC_OUT_FLAGS   (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHORIZE)
423#define BTM_SEC_IN_FLAGS    (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHORIZE)
424
425#define BTM_SEC_OUT_LEVEL4_FLAGS   (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | \
426                                    BTM_SEC_OUT_MITM | BTM_SEC_MODE4_LEVEL4)
427
428#define BTM_SEC_IN_LEVEL4_FLAGS    (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | \
429                                    BTM_SEC_IN_MITM | BTM_SEC_MODE4_LEVEL4)
430typedef struct
431{
432    UINT32          mx_proto_id;        /* Service runs over this multiplexer protocol */
433    UINT32          orig_mx_chan_id;    /* Channel on the multiplexer protocol    */
434    UINT32          term_mx_chan_id;    /* Channel on the multiplexer protocol    */
435    UINT16          psm;                /* L2CAP PSM value */
436    UINT16          security_flags;     /* Bitmap of required security features */
437    UINT8           service_id;         /* Passed in authorization callback */
438#if (L2CAP_UCD_INCLUDED == TRUE)
439    UINT16          ucd_security_flags; /* Bitmap of required security features for UCD */
440#endif
441#if BTM_SEC_SERVICE_NAME_LEN > 0
442    UINT8           orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
443    UINT8           term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
444#endif
445} tBTM_SEC_SERV_REC;
446
447#if BLE_INCLUDED == TRUE
448/* LE Security information of device in Slave Role */
449typedef struct
450{
451    BT_OCTET16          irk;            /* peer diverified identity root */
452    BT_OCTET16          pltk;           /* peer long term key */
453    BT_OCTET16          pcsrk;          /* peer SRK peer device used to secured sign local data  */
454
455    BT_OCTET16          lltk;           /* local long term key */
456    BT_OCTET16          lcsrk;          /* local SRK peer device used to secured sign local data  */
457
458    BT_OCTET8           rand;           /* random vector for LTK generation */
459    UINT16              ediv;           /* LTK diversifier of this slave device */
460    UINT16              div;            /* local DIV  to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1)  */
461    UINT8               sec_level;      /* local pairing security level */
462    UINT8               key_size;       /* key size of the LTK delivered to peer device */
463    UINT8               srk_sec_level;  /* security property of peer SRK for this device */
464    UINT8               local_csrk_sec_level;  /* security property of local CSRK for this device */
465
466    UINT32              counter;        /* peer sign counter for verifying rcv signed cmd */
467    UINT32              local_counter;  /* local sign counter for sending signed write cmd*/
468}tBTM_SEC_BLE_KEYS;
469
470typedef struct
471{
472    BD_ADDR pseudo_addr; /* LE pseudo address of the device if different from device address  */
473    tBLE_ADDR_TYPE      ble_addr_type;  /* LE device type: public or random address */
474    tBLE_ADDR_TYPE      static_addr_type;   /* static address type */
475    BD_ADDR             static_addr;    /* static address */
476
477#define BTM_WHITE_LIST_BIT          0x01
478#define BTM_RESOLVING_LIST_BIT      0x02
479    UINT8               in_controller_list;   /* in controller resolving list or not */
480    UINT8               resolving_list_index;
481#if BLE_PRIVACY_SPT == TRUE
482    BD_ADDR             cur_rand_addr;  /* current random address */
483
484#define BTM_BLE_ADDR_PSEUDO         0   /* address index device record */
485#define BTM_BLE_ADDR_RRA            1   /* cur_rand_addr */
486#define BTM_BLE_ADDR_STATIC         2   /* static_addr  */
487    UINT8               active_addr_type;
488#endif
489
490#if SMP_INCLUDED == TRUE
491    tBTM_LE_KEY_TYPE    key_type;       /* bit mask of valid key types in record */
492    tBTM_SEC_BLE_KEYS   keys;           /* LE device security info in slave rode */
493#endif
494} tBTM_SEC_BLE;
495
496
497#endif  /* BLE_INCLUDED */
498
499/* Peering bond type */
500enum
501{
502    BOND_TYPE_UNKNOWN,
503    BOND_TYPE_PERSISTENT,
504    BOND_TYPE_TEMPORARY
505};
506typedef UINT8 tBTM_BOND_TYPE;
507
508/*
509** Define structure for Security Device Record.
510** A record exists for each device authenticated with this device
511*/
512typedef struct
513{
514    tBTM_SEC_SERV_REC   *p_cur_service;
515    tBTM_SEC_CALLBACK   *p_callback;
516    void                *p_ref_data;
517    UINT32               timestamp;         /* Timestamp of the last connection   */
518    UINT32               trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE];  /* Bitwise OR of trusted services     */
519    UINT16               hci_handle;        /* Handle to connection when exists   */
520    UINT16               clock_offset;      /* Latest known clock offset          */
521    BD_ADDR              bd_addr;           /* BD_ADDR of the device              */
522    DEV_CLASS            dev_class;         /* DEV_CLASS of the device            */
523    LINK_KEY             link_key;          /* Device link key                    */
524    UINT8                pin_code_length;   /* Length of the pin_code used for paring */
525
526#define BTM_SEC_AUTHORIZED      BTM_SEC_FLAG_AUTHORIZED     /* 0x01 */
527#define BTM_SEC_AUTHENTICATED   BTM_SEC_FLAG_AUTHENTICATED  /* 0x02 */
528#define BTM_SEC_ENCRYPTED       BTM_SEC_FLAG_ENCRYPTED      /* 0x04 */
529#define BTM_SEC_NAME_KNOWN      0x08
530#define BTM_SEC_LINK_KEY_KNOWN  BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
531#define BTM_SEC_LINK_KEY_AUTHED BTM_SEC_FLAG_LKEY_AUTHED    /* 0x20 */
532#define BTM_SEC_ROLE_SWITCHED   0x40
533#define BTM_SEC_IN_USE          0x80
534    /* LE link security flag */
535#define BTM_SEC_LE_AUTHENTICATED   0x0200   /* LE link is encrypted after pairing with MITM */
536#define BTM_SEC_LE_ENCRYPTED       0x0400   /* LE link is encrypted */
537#define BTM_SEC_LE_NAME_KNOWN      0x0800   /* not used */
538#define BTM_SEC_LE_LINK_KEY_KNOWN  0x1000   /* bonded with peer (peer LTK and/or SRK is saved) */
539#define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000   /* pairing is done with MITM */
540#define BTM_SEC_16_DIGIT_PIN_AUTHED 0x4000   /* pairing is done with 16 digit pin */
541
542    UINT16           sec_flags;          /* Current device security state      */
543
544    tBTM_BD_NAME    sec_bd_name;        /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
545    BD_FEATURES     features[HCI_EXT_FEATURES_PAGE_MAX + 1];           /* Features supported by the device */
546    UINT8           num_read_pages;
547
548#define BTM_SEC_STATE_IDLE               0
549#define BTM_SEC_STATE_AUTHENTICATING     1
550#define BTM_SEC_STATE_ENCRYPTING         2
551#define BTM_SEC_STATE_GETTING_NAME       3
552#define BTM_SEC_STATE_AUTHORIZING        4
553#define BTM_SEC_STATE_SWITCHING_ROLE     5
554#define BTM_SEC_STATE_DISCONNECTING      6 /* disconnecting BR/EDR */
555#define BTM_SEC_STATE_DELAY_FOR_ENC      7 /* delay to check for encryption to work around */
556                                           /* controller problems */
557#define BTM_SEC_STATE_DISCONNECTING_BLE  8 /* disconnecting BLE */
558#define BTM_SEC_STATE_DISCONNECTING_BOTH 9 /* disconnecting BR/EDR and BLE */
559
560    UINT8       sec_state;              /* Operating state                    */
561    BOOLEAN     is_originator;          /* TRUE if device is originating connection */
562#if (L2CAP_UCD_INCLUDED == TRUE)
563    BOOLEAN     is_ucd;                 /* TRUE if device is sending or receiving UCD */
564                                        /* if incoming security failed, received UCD will be discarded */
565#endif
566    BOOLEAN     role_master;            /* TRUE if current mode is master     */
567    UINT16      security_required;      /* Security required for connection   */
568    BOOLEAN     link_key_not_sent;      /* link key notification has not been sent waiting for name */
569    UINT8       link_key_type;          /* Type of key used in pairing   */
570    BOOLEAN     link_key_changed;       /* Changed link key during current connection */
571
572#define BTM_MAX_PRE_SM4_LKEY_TYPE   BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
573
574#define BTM_SM4_UNKNOWN     0x00
575#define BTM_SM4_KNOWN       0x10
576#define BTM_SM4_TRUE        0x11
577#define BTM_SM4_REQ_PEND    0x08        /* set this bit when getting remote features */
578#define BTM_SM4_UPGRADE     0x04        /* set this bit when upgrading link key */
579#define BTM_SM4_RETRY       0x02        /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
580#define BTM_SM4_DD_ACP      0x20        /* set this bit to indicate peer initiated dedicated bonding */
581#define BTM_SM4_CONN_PEND   0x40        /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
582    UINT8       sm4;                    /* BTM_SM4_TRUE, if the peer supports SM4 */
583    tBTM_IO_CAP rmt_io_caps;            /* IO capability of the peer device */
584    tBTM_AUTH_REQ rmt_auth_req;         /* the auth_req flag as in the IO caps rsp evt */
585    BOOLEAN     remote_supports_secure_connections;
586    BOOLEAN     remote_features_needed; /* set to true if the local device is in */
587                                        /* "Secure Connections Only" mode and it receives */
588                                        /* HCI_IO_CAPABILITY_REQUEST_EVT from the peer before */
589                                        /* it knows peer's support for Secure Connections */
590
591    UINT16              ble_hci_handle;         /* use in DUMO connection */
592    UINT8               enc_key_size;           /* current link encryption key size */
593    tBT_DEVICE_TYPE     device_type;
594    BOOLEAN             new_encryption_key_is_p256; /* Set to TRUE when the newly generated LK
595                                                    ** is generated from P-256.
596                                                    ** Link encrypted with such LK can be used
597                                                    ** for SM over BR/EDR.
598                                                    */
599    BOOLEAN no_smp_on_br;       /* if set to TRUE then SMP on BR/EDR doesn't */
600                                /* work, i.e. link keys crosspairing */
601                                /* SC BR/EDR->SC LE doesn't happen */
602    tBTM_BOND_TYPE bond_type;   /* peering bond type */
603
604#if BLE_INCLUDED == TRUE
605    tBTM_SEC_BLE        ble;
606    tBTM_LE_CONN_PRAMS  conn_params;
607#endif
608
609#if BTM_DISC_DURING_RS == TRUE
610#define BTM_SEC_RS_NOT_PENDING          0           /* Role Switch not in progress */
611#define BTM_SEC_RS_PENDING              1           /* Role Switch in progress */
612#define BTM_SEC_DISC_PENDING            2           /* Disconnect is pending */
613    UINT8           rs_disc_pending;
614#endif
615#define BTM_SEC_NO_LAST_SERVICE_ID      0
616    UINT8           last_author_service_id;         /* ID of last serviced authorized: Reset after each l2cap connection */
617
618} tBTM_SEC_DEV_REC;
619
620#define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
621#define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
622#define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
623
624#define BTM_SEC_LE_MASK    (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
625
626/*
627** Define device configuration structure
628*/
629typedef struct
630{
631#if BTM_MAX_LOC_BD_NAME_LEN > 0
632    tBTM_LOC_BD_NAME bd_name;                    /* local Bluetooth device name */
633#endif
634    BOOLEAN          pin_type;                   /* TRUE if PIN type is fixed */
635    UINT8            pin_code_len;               /* Bonding information */
636    PIN_CODE         pin_code;                   /* PIN CODE if pin type is fixed */
637    BOOLEAN          connectable;                /* If TRUE page scan should be enabled */
638    UINT8            def_inq_scan_mode;          /* ??? limited/general/none */
639} tBTM_CFG;
640
641enum
642{
643    BTM_PM_ST_ACTIVE  = BTM_PM_STS_ACTIVE,
644    BTM_PM_ST_HOLD    = BTM_PM_STS_HOLD,
645    BTM_PM_ST_SNIFF   = BTM_PM_STS_SNIFF,
646    BTM_PM_ST_PARK    = BTM_PM_STS_PARK,
647    BTM_PM_ST_PENDING = BTM_PM_STS_PENDING,
648    BTM_PM_ST_INVALID = 0xFF
649};
650typedef UINT8 tBTM_PM_STATE;
651
652enum
653{
654    BTM_PM_SET_MODE_EVT,    /* Set power mode API is called. */
655    BTM_PM_UPDATE_EVT,
656    BTM_PM_RD_MODE_EVT     /* Read power mode API is called. */
657};
658typedef UINT8 tBTM_PM_EVENT;
659
660typedef struct
661{
662    UINT16          event;
663    UINT16          len;
664    UINT8           link_ind;
665} tBTM_PM_MSG_DATA;
666
667typedef struct
668{
669    UINT8 hci_status;
670    UINT8 mode;
671    UINT16 interval;
672} tBTM_PM_MD_CHG_DATA;
673
674typedef struct
675{
676    UINT8          pm_id;      /* the entity that calls SetPowerMode API */
677    tBTM_PM_PWR_MD *p_pmd;
678} tBTM_PM_SET_MD_DATA;
679
680typedef struct
681{
682    void        *p_data;
683    UINT8        link_ind;
684} tBTM_PM_SM_DATA;
685
686typedef struct
687{
688    tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
689    tBTM_PM_PWR_MD set_mode;  /* the mode and parameters sent down to the host controller. */
690    UINT16         interval;  /* the interval from last mode change event. */
691#if (BTM_SSR_INCLUDED == TRUE)
692    UINT16         max_lat;   /* stored SSR maximum latency */
693    UINT16         min_rmt_to;/* stored SSR minimum remote timeout */
694    UINT16         min_loc_to;/* stored SSR minimum local timeout */
695#endif
696    tBTM_PM_STATE  state;     /* contains the current mode of the connection */
697    BOOLEAN        chg_ind;   /* a request change indication */
698} tBTM_PM_MCB;
699
700#define BTM_PM_REC_NOT_USED 0
701typedef struct
702{
703    tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
704    UINT8                 mask; /* registered request mask. 0, if this entry is not used */
705} tBTM_PM_RCB;
706
707enum
708{
709    BTM_BLI_ACL_UP_EVT,
710    BTM_BLI_ACL_DOWN_EVT,
711    BTM_BLI_PAGE_EVT,
712    BTM_BLI_PAGE_DONE_EVT,
713    BTM_BLI_INQ_EVT,
714    BTM_BLI_INQ_CANCEL_EVT,
715    BTM_BLI_INQ_DONE_EVT
716};
717typedef UINT8 tBTM_BLI_EVENT;
718
719/* Pairing State */
720enum
721{
722    BTM_PAIR_STATE_IDLE,                        /* Idle                                         */
723    BTM_PAIR_STATE_GET_REM_NAME,                /* Getting the remote name (to check for SM4)   */
724    BTM_PAIR_STATE_WAIT_PIN_REQ,                /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
725    BTM_PAIR_STATE_WAIT_LOCAL_PIN,              /* Waiting for local PIN code                   */
726    BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM,        /* Waiting user 'yes' to numeric confirmation   */
727    BTM_PAIR_STATE_KEY_ENTRY,                   /* Key entry state (we are a keyboard)          */
728    BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP,          /* Waiting for local response to peer OOB data  */
729    BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS,           /* Waiting for local IO capabilities and OOB data */
730    BTM_PAIR_STATE_INCOMING_SSP,                /* Incoming SSP (got peer IO caps when idle)    */
731    BTM_PAIR_STATE_WAIT_AUTH_COMPLETE,          /* All done, waiting authentication cpmplete    */
732    BTM_PAIR_STATE_WAIT_DISCONNECT              /* Waiting to disconnect the ACL                */
733};
734typedef UINT8 tBTM_PAIRING_STATE;
735
736#define BTM_PAIR_FLAGS_WE_STARTED_DD    0x01    /* We want to do dedicated bonding              */
737#define BTM_PAIR_FLAGS_PEER_STARTED_DD  0x02    /* Peer initiated dedicated bonding             */
738#define BTM_PAIR_FLAGS_DISC_WHEN_DONE   0x04    /* Disconnect when done     */
739#define BTM_PAIR_FLAGS_PIN_REQD         0x08    /* set this bit when pin_callback is called     */
740#define BTM_PAIR_FLAGS_PRE_FETCH_PIN    0x10    /* set this bit when pre-fetch pin     */
741#define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20    /* set this bit when rejected incoming connection  */
742#define BTM_PAIR_FLAGS_WE_CANCEL_DD     0x40    /* set this bit when cancelling a bonding procedure */
743#define BTM_PAIR_FLAGS_LE_ACTIVE        0x80    /* use this bit when SMP pairing is active */
744
745
746typedef struct
747{
748    BOOLEAN             is_mux;
749    BD_ADDR             bd_addr;
750    UINT16              psm;
751    BOOLEAN             is_orig;
752    tBTM_SEC_CALLBACK   *p_callback;
753    void                *p_ref_data;
754    UINT32              mx_proto_id;
755    UINT32              mx_chan_id;
756    tBT_TRANSPORT       transport;
757    tBTM_BLE_SEC_ACT    sec_act;
758} tBTM_SEC_QUEUE_ENTRY;
759
760#if (L2CAP_UCD_INCLUDED == TRUE)
761
762#define CONN_ORIENT_TERM                0x00    /* incoming connection oriented */
763#define CONN_ORIENT_ORIG                0x01    /* outgoing connection oriented */
764#define CONNLESS_TERM                   0x02    /* incoming connectionless      */
765#define CONNLESS_ORIG                   0x03    /* outgoing connectionless      */
766#define CONNECTION_TYPE_ORIG_MASK       0x01    /* mask for direction           */
767#define CONNECTION_TYPE_CONNLESS_MASK   0x02    /* mask for connectionless or not */
768typedef UINT8 CONNECTION_TYPE;
769
770#else
771
772#define CONN_ORIENT_TERM                FALSE
773#define CONN_ORIENT_ORIG                TRUE
774typedef BOOLEAN CONNECTION_TYPE;
775
776#endif /* (L2CAP_UCD_INCLUDED == TRUE) */
777
778/* Define a structure to hold all the BTM data
779*/
780
781#define BTM_STATE_BUFFER_SIZE  5                  /* size of state buffer */
782
783typedef struct
784{
785    tBTM_CFG    cfg;                        /* Device configuration */
786
787    /****************************************************
788    **      ACL Management
789    ****************************************************/
790    tACL_CONN   acl_db[MAX_L2CAP_LINKS];
791    UINT8       btm_scn[BTM_MAX_SCN];        /* current SCNs: TRUE if SCN is in use */
792    UINT16      btm_def_link_policy;
793    UINT16      btm_def_link_super_tout;
794
795    tBTM_BL_EVENT_MASK     bl_evt_mask;
796    tBTM_BL_CHANGE_CB     *p_bl_changed_cb;    /* Callback for when Busy Level changed */
797
798    /****************************************************
799    **      Power Management
800    ****************************************************/
801    tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS];   /* per ACL link */
802    tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
803    UINT8       pm_pend_link;  /* the index of acl_db, which has a pending PM cmd */
804    UINT8       pm_pend_id;    /* the id pf the module, which has a pending PM cmd */
805
806    /*****************************************************
807    **      Device control
808    *****************************************************/
809    tBTM_DEVCB  devcb;
810
811    /*****************************************************
812    **      BLE Device controllers
813    *****************************************************/
814#if (BLE_INCLUDED == TRUE)
815    tBTM_BLE_CB             ble_ctr_cb;
816
817    UINT16                  enc_handle;
818    BT_OCTET8               enc_rand;   /* received rand value from LTK request*/
819    UINT16                  ediv;       /* received ediv value from LTK request */
820    UINT8                   key_size;
821    tBTM_BLE_VSC_CB         cmn_ble_vsc_cb;
822#endif
823
824                                            /* Packet types supported by the local device */
825    UINT16      btm_acl_pkt_types_supported;
826    UINT16      btm_sco_pkt_types_supported;
827
828
829    /*****************************************************
830    **      Inquiry
831    *****************************************************/
832    tBTM_INQUIRY_VAR_ST     btm_inq_vars;
833
834    /*****************************************************
835    **      SCO Management
836    *****************************************************/
837#if BTM_SCO_INCLUDED == TRUE
838    tSCO_CB             sco_cb;
839#endif
840
841    /*****************************************************
842    **      Security Management
843    *****************************************************/
844    tBTM_APPL_INFO          api;
845
846#define BTM_SEC_MAX_RMT_NAME_CALLBACKS  2
847    tBTM_RMT_NAME_CALLBACK  *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
848
849    tBTM_SEC_DEV_REC        *p_collided_dev_rec;
850    alarm_t                 *sec_collision_timer;
851    UINT32                   collision_start_time;
852    UINT32                   max_collision_delay;
853    UINT32                   dev_rec_count;      /* Counter used for device record timestamp */
854    UINT8                    security_mode;
855    BOOLEAN                  pairing_disabled;
856    BOOLEAN                  connect_only_paired;
857    BOOLEAN                  security_mode_changed;  /* mode changed during bonding */
858    BOOLEAN                  pin_type_changed;       /* pin type changed during bonding */
859    BOOLEAN                  sec_req_pending;       /*   TRUE if a request is pending */
860
861    UINT8                    pin_code_len;  /* for legacy devices */
862    PIN_CODE                 pin_code;      /* for legacy devices */
863    tBTM_PAIRING_STATE       pairing_state; /* The current pairing state    */
864    UINT8                    pairing_flags; /* The current pairing flags    */
865    BD_ADDR                  pairing_bda;   /* The device currently pairing */
866    alarm_t                 *pairing_timer; /* Timer for pairing process    */
867    UINT16                   disc_handle;   /* for legacy devices */
868    UINT8                    disc_reason;   /* for legacy devices */
869    tBTM_SEC_SERV_REC        sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
870    list_t                  *sec_dev_rec;   /* list of tBTM_SEC_DEV_REC */
871    tBTM_SEC_SERV_REC       *p_out_serv;
872    tBTM_MKEY_CALLBACK      *mkey_cback;
873
874    BD_ADDR                  connecting_bda;
875    DEV_CLASS                connecting_dc;
876
877    UINT8                   acl_disc_reason;
878    UINT8                   trace_level;
879    UINT8                   busy_level; /* the current busy level */
880    BOOLEAN                 is_paging;  /* TRUE, if paging is in progess */
881    BOOLEAN                 is_inquiry; /* TRUE, if inquiry is in progess */
882    fixed_queue_t          *page_queue;
883    BOOLEAN                 paging;
884    BOOLEAN                 discing;
885    fixed_queue_t          *sec_pending_q;  /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
886
887#if  (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
888    char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
889#endif
890} tBTM_CB;
891
892/* security action for L2CAP COC channels */
893#define BTM_SEC_OK                1
894#define BTM_SEC_ENCRYPT           2    /* encrypt the link with current key */
895#define BTM_SEC_ENCRYPT_NO_MITM   3    /* unauthenticated encryption or better */
896#define BTM_SEC_ENCRYPT_MITM      4    /* authenticated encryption */
897#define BTM_SEC_ENC_PENDING       5    /* wait for link encryption pending */
898
899typedef UINT8 tBTM_SEC_ACTION;
900
901#ifdef __cplusplus
902extern "C"
903{
904#endif
905
906#if BTM_DYNAMIC_MEMORY == FALSE
907extern tBTM_CB  btm_cb;
908#else
909extern tBTM_CB *btm_cb_ptr;
910#define btm_cb (*btm_cb_ptr)
911#endif
912
913/* Internal functions provided by btm_main.c
914********************************************
915*/
916extern void         btm_init (void);
917
918/* Internal functions provided by btm_inq.c
919*******************************************
920*/
921extern tBTM_STATUS  btm_initiate_rem_name(BD_ADDR remote_bda,
922                                          tBTM_INQ_INFO *p_cur,
923                                          UINT8 origin, period_ms_t timeout_ms,
924                                          tBTM_CMPL_CB *p_cb);
925
926extern void         btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
927                                             UINT8 hci_status);
928extern void         btm_inq_rmt_name_failed(void);
929extern void         btm_inq_remote_name_timer_timeout(void *data);
930
931/* Inquiry related functions */
932extern void         btm_clr_inq_db (BD_ADDR p_bda);
933extern void         btm_inq_db_init (void);
934extern void         btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
935extern void         btm_process_inq_complete (UINT8 status, UINT8 mode);
936extern void         btm_process_cancel_complete(UINT8 status, UINT8 mode);
937extern void         btm_event_filter_complete (UINT8 *p);
938extern void         btm_inq_stop_on_ssp(void);
939extern void         btm_inq_clear_ssp(void);
940extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
941extern BOOLEAN      btm_inq_find_bdaddr (BD_ADDR p_bda);
942
943extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
944
945/* Internal functions provided by btm_acl.c
946********************************************
947*/
948extern void         btm_acl_init (void);
949extern void         btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
950                                     UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
951extern void         btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
952extern void         btm_acl_device_down (void);
953extern void         btm_acl_update_busy_level (tBTM_BLI_EVENT event);
954
955extern void         btm_cont_rswitch (tACL_CONN *p,
956                                      tBTM_SEC_DEV_REC *p_dev_rec,
957                                      UINT8 hci_status);
958
959extern UINT8        btm_handle_to_acl_index (UINT16 hci_handle);
960extern void         btm_read_link_policy_complete (UINT8 *p);
961
962extern void         btm_read_rssi_timeout(void *data);
963extern void         btm_read_rssi_complete(UINT8 *p);
964
965extern void         btm_read_tx_power_timeout(void *data);
966extern void         btm_read_tx_power_complete(UINT8 *p, BOOLEAN is_ble);
967
968extern void         btm_read_link_quality_timeout(void *data);
969extern void         btm_read_link_quality_complete(UINT8 *p);
970
971extern tBTM_STATUS  btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
972extern void         btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
973extern void         btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
974extern void         btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
975extern UINT16       btm_get_acl_disc_reason_code (void);
976extern tBTM_STATUS  btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
977extern void         btm_read_remote_features_complete (UINT8 *p);
978extern void         btm_read_remote_ext_features_complete (UINT8 *p);
979extern void         btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
980extern void         btm_read_remote_version_complete (UINT8 *p);
981extern void         btm_establish_continue (tACL_CONN *p_acl_cb);
982
983extern void         btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
984/* Read maximum data packet that can be sent over current connection */
985extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
986extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
987extern BOOLEAN    btm_acl_notif_conn_collision (BD_ADDR bda);
988
989extern void btm_pm_reset(void);
990extern void btm_pm_sm_alloc(UINT8 ind);
991extern void btm_pm_proc_cmd_status(UINT8 status);
992extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
993                                     UINT16 interval);
994extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
995extern tBTM_STATUS btm_read_power_mode_state (BD_ADDR remote_bda,
996                                                      tBTM_PM_STATE *pmState);
997#if BTM_SCO_INCLUDED == TRUE
998extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
999#else
1000#define btm_sco_chk_pend_unpark(hci_status, hci_handle)
1001#endif /* BTM_SCO_INCLUDED */
1002
1003extern void btm_qos_setup_timeout(void *data);
1004extern void btm_qos_setup_complete(UINT8 status, UINT16 handle,
1005                                   FLOW_SPEC *p_flow);
1006
1007
1008/* Internal functions provided by btm_sco.c
1009********************************************
1010*/
1011extern void btm_sco_init (void);
1012extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
1013                               tBTM_ESCO_DATA *p_esco_data);
1014extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
1015                                    UINT8 retrans_window, UINT16 rx_pkt_len,
1016                                    UINT16 tx_pkt_len);
1017extern void btm_sco_conn_req (BD_ADDR bda,  DEV_CLASS dev_class, UINT8 link_type);
1018extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
1019extern void btm_sco_acl_removed (BD_ADDR bda);
1020extern void btm_route_sco_data (BT_HDR *p_msg);
1021extern BOOLEAN btm_is_sco_active (UINT16 handle);
1022extern void btm_remove_sco_links (BD_ADDR bda);
1023extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
1024
1025extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
1026extern UINT16  btm_find_scb_by_handle (UINT16 handle);
1027extern void btm_sco_flush_sco_data(UINT16 sco_inx);
1028
1029/* Internal functions provided by btm_devctl.c
1030**********************************************
1031*/
1032extern void btm_dev_init(void);
1033extern void btm_read_local_name_timeout(void *data);
1034extern void btm_read_local_name_complete(UINT8 *p, UINT16 evt_len);
1035
1036#if (BLE_INCLUDED == TRUE)
1037extern void btm_ble_add_2_white_list_complete(UINT8 status);
1038extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
1039extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
1040extern BOOLEAN btm_ble_addr_resolvable(BD_ADDR rpa, tBTM_SEC_DEV_REC *p_dev_rec);
1041extern tBTM_STATUS btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *p_dev_rec);
1042extern BOOLEAN btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *p_dev_rec);
1043extern void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *p_dev_rec);
1044#endif  /* BLE_INCLUDED */
1045
1046/* Vendor Specific Command complete evt handler */
1047extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
1048                              tBTM_CMPL_CB *p_vsc_cplt_cback);
1049extern void btm_inq_db_reset (void);
1050extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
1051extern void btm_delete_stored_link_key_complete (UINT8 *p);
1052extern void btm_report_device_status (tBTM_DEV_STATUS status);
1053
1054
1055/* Internal functions provided by btm_dev.c
1056**********************************************
1057*/
1058extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1059
1060extern tBTM_SEC_DEV_REC  *btm_sec_alloc_dev (BD_ADDR bd_addr);
1061extern void               btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
1062extern tBTM_SEC_DEV_REC  *btm_find_dev (BD_ADDR bd_addr);
1063extern tBTM_SEC_DEV_REC  *btm_find_or_alloc_dev (BD_ADDR bd_addr);
1064extern tBTM_SEC_DEV_REC  *btm_find_dev_by_handle (UINT16 handle);
1065extern tBTM_BOND_TYPE     btm_get_bond_type_dev(BD_ADDR bd_addr);
1066extern BOOLEAN            btm_set_bond_type_dev(BD_ADDR bd_addr,
1067                                                tBTM_BOND_TYPE bond_type);
1068
1069/* Internal functions provided by btm_sec.c
1070**********************************************
1071*/
1072extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1073extern tBTM_STATUS  btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
1074                                       UINT16 handle, CONNECTION_TYPE conn_type,
1075                                       tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1076extern tBTM_STATUS  btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1077                                        UINT32 mx_proto_id, UINT32 mx_chan_id,
1078                                        tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1079extern void  btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
1080extern void btm_create_conn_cancel_complete (UINT8 *p);
1081
1082extern void  btm_read_inq_tx_power_timeout(void *data);
1083extern void  btm_read_inq_tx_power_complete(UINT8 *p);
1084
1085extern void  btm_sec_init (UINT8 sec_mode);
1086extern void  btm_sec_dev_reset (void);
1087extern void  btm_sec_abort_access_req (BD_ADDR bd_addr);
1088extern void  btm_sec_auth_complete (UINT16 handle, UINT8 status);
1089extern void  btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1090extern void  btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
1091extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
1092extern void  btm_sec_disconnected (UINT16 handle, UINT8 reason);
1093extern void  btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
1094extern void  btm_sec_rmt_host_support_feat_evt (UINT8 *p);
1095extern void  btm_io_capabilities_req (UINT8 *p);
1096extern void  btm_io_capabilities_rsp (UINT8 *p);
1097extern void  btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
1098extern void  btm_keypress_notif_evt (UINT8 *p);
1099extern void  btm_simple_pair_complete (UINT8 *p);
1100extern void  btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
1101extern void  btm_sec_link_key_request (UINT8 *p_bda);
1102extern void  btm_sec_pin_code_request (UINT8 *p_bda);
1103extern void  btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
1104extern void  btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
1105extern void btm_sec_set_peer_sec_caps (tACL_CONN *p_acl_cb, tBTM_SEC_DEV_REC *p_dev_rec);
1106
1107#if BLE_INCLUDED == TRUE
1108extern void  btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC  *p_dev_rec);
1109extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
1110extern void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec);
1111extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
1112extern BOOLEAN btm_ble_init_pseudo_addr (tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR new_pseudo_addr);
1113extern tBTM_SEC_SERV_REC *btm_sec_find_first_serv (CONNECTION_TYPE conn_type, UINT16 psm);
1114extern BOOLEAN btm_ble_start_sec_check(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1115                            tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1116#endif /* BLE_INCLUDED */
1117
1118extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
1119
1120extern void  btm_rem_oob_req (UINT8 *p);
1121extern void  btm_read_local_oob_complete (UINT8 *p);
1122
1123extern void  btm_acl_resubmit_page (void);
1124extern void  btm_acl_reset_paging (void);
1125extern void  btm_acl_paging (BT_HDR *p, BD_ADDR dest);
1126extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
1127extern void  btm_sec_clr_temp_auth_service (BD_ADDR bda);
1128
1129#ifdef __cplusplus
1130}
1131#endif
1132
1133#endif
1134