NSMBW-Decomp
A decompilation of New Super Mario Bros. Wii
Loading...
Searching...
No Matches
btm_int.h
1/******************************************************************************
2 *
3 * Copyright (C) 1999-2012 Broadcom Corporation
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 ******************************************************************************/
18
19/******************************************************************************
20 *
21 * this file contains the main Bluetooth Manager (BTM) internal
22 * definitions.
23 *
24 ******************************************************************************/
25#ifndef BTM_INT_H
26#define BTM_INT_H
27
28#include "bt_target.h"
29#include "gki.h"
30#include "hcidefs.h"
31
32#if RFCOMM_INCLUDED == TRUE
33#include "rfcdefs.h"
34#endif
35
36#include "btm_api.h"
37
38#if (BLE_INCLUDED == TRUE)
39#include "btm_ble_int.h"
40#if (SMP_INCLUDED == TRUE)
41#include "smp_api.h"
42#endif
43#endif
44
45#if BTM_MAX_LOC_BD_NAME_LEN > 0
46typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
47#endif
48
49#define BTM_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda) != NULL)
50
51/* Definitions for Server Channel Number (SCN) management
52*/
53#define BTM_MAX_SCN PORT_MAX_RFC_PORTS
54
55/* Define masks for supported and exception 2.0 ACL packet types
56*/
57#define BTM_ACL_SUPPORTED_PKTS_MASK (HCI_PKT_TYPES_MASK_DM1 | \
58 HCI_PKT_TYPES_MASK_DH1 | \
59 HCI_PKT_TYPES_MASK_DM3 | \
60 HCI_PKT_TYPES_MASK_DH3 | \
61 HCI_PKT_TYPES_MASK_DM5 | \
62 HCI_PKT_TYPES_MASK_DH5)
63
64#define BTM_ACL_EXCEPTION_PKTS_MASK (HCI_PKT_TYPES_MASK_NO_2_DH1 | \
65 HCI_PKT_TYPES_MASK_NO_3_DH1 | \
66 HCI_PKT_TYPES_MASK_NO_2_DH3 | \
67 HCI_PKT_TYPES_MASK_NO_3_DH3 | \
68 HCI_PKT_TYPES_MASK_NO_2_DH5 | \
69 HCI_PKT_TYPES_MASK_NO_3_DH5)
70
71#define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->features) && \
72 HCI_ATOMIC_ENCRYPT_SUPPORTED(btm_cb.devcb.local_features)) \
73 ? TRUE : FALSE)
74
75#define BTM_IS_BRCM_CONTROLLER() (btm_cb.devcb.local_version.manufacturer == LMP_COMPID_BROADCOM)
76
77
78/* Define the ACL Management control structure
79*/
80typedef struct
81{
82 UINT16 hci_handle;
83 UINT16 pkt_types_mask;
84 UINT16 restore_pkt_types; /* when coming in/out of SCO connection restore the packet types */
85 UINT16 clock_offset;
86 BD_ADDR remote_addr;
87 DEV_CLASS remote_dc;
88 BD_NAME remote_name;
89
90 UINT16 manufacturer;
91 UINT16 lmp_subversion;
92 UINT16 link_super_tout;
93 BD_FEATURES features; /* Features suported by the device */
94 UINT8 lmp_version;
95
96 BOOLEAN in_use;
97 UINT8 link_role;
98 BOOLEAN link_up_issued; /* True if busy_level link up has been issued */
99
100#define BTM_ACL_SWKEY_STATE_IDLE 0
101#define BTM_ACL_SWKEY_STATE_MODE_CHANGE 1
102#define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF 2
103#define BTM_ACL_SWKEY_STATE_SWITCHING 3
104#define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON 4
105#define BTM_ACL_SWKEY_STATE_IN_PROGRESS 5
106 UINT8 switch_role_state;
107 UINT8 change_key_state;
108
109#define BTM_ACL_ENCRYPT_STATE_IDLE 0
110#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF 1 /* encryption turning off */
111#define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC 2 /* temporarily off for change link key or role switch */
112#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON 3 /* encryption turning on */
113 UINT8 encrypt_state; /* overall BTM encryption state */
114
115#if BTM_PWR_MGR_INCLUDED == FALSE
116 UINT8 mode;
117#endif /* BTM_PWR_MGR_INCLUDED */
118#if BLE_INCLUDED == TRUE
119 UINT8 is_le_link;
120#endif
121
122} tACL_CONN;
123
124/*****************************************************
125** TIMER Definitions
126******************************************************/
127#define TT_DEV_RESET 1
128#define TT_DEV_RLN 2
129#define TT_DEV_RLNKP 4 /* Read Link Policy Settings */
130
131/* Define the Device Management control structure
132*/
133typedef struct
134{
135 tBTM_DEV_STATUS_CB *p_dev_status_cb; /* Device status change callback */
136 tBTM_VS_EVT_CB *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS]; /* Register for vendor specific events */
137
138 tBTM_CMPL_CB *p_stored_link_key_cmpl_cb; /* Read/Write/Delete stored link key */
139
140 TIMER_LIST_ENT reset_timer;
141 tBTM_CMPL_CB *p_reset_cmpl_cb; /* Callback function to be called */
142 /* when startup of the device is done */
143 TIMER_LIST_ENT rln_timer;
144 tBTM_CMPL_CB *p_rln_cmpl_cb; /* Callback function to be called when */
145 /* read local name function complete */
146 TIMER_LIST_ENT rlinkp_timer;
147 tBTM_CMPL_CB *p_rlinkp_cmpl_cb; /* Callback function to be called when */
148 /* read link policy function completes */
149 TIMER_LIST_ENT rssi_timer;
150 tBTM_CMPL_CB *p_rssi_cmpl_cb; /* Callback function to be called when */
151 /* read rssi function completes */
152 TIMER_LIST_ENT lnk_quality_timer;
153 tBTM_CMPL_CB *p_lnk_qual_cmpl_cb;/* Callback function to be called when */
154 /* read link quality function completes */
155 TIMER_LIST_ENT txpwer_timer;
156 tBTM_CMPL_CB *p_txpwer_cmpl_cb; /* Callback function to be called when */
157 /* read inq tx power function completes */
158
159 TIMER_LIST_ENT qossu_timer;
160 tBTM_CMPL_CB *p_qossu_cmpl_cb; /* Callback function to be called when */
161 /* qos setup function completes */
162
163 tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
164 tBTM_CMPL_CB *p_switch_role_cb; /* Callback function to be called when */
165 /* requested switch role is completed */
166
167 tBTM_CHANGE_KEY_CMPL chg_link_key_ref_data;
168 tBTM_CMPL_CB *p_chg_link_key_cb; /* Callback function to be called when */
169 /* change of link key is completed */
170
171 TIMER_LIST_ENT tx_power_timer;
172 tBTM_CMPL_CB *p_tx_power_cmpl_cb; /* Callback function to be called */
173
174 BD_ADDR local_addr; /* BD_ADDR of the local device */
175 tBTM_VERSION_INFO local_version; /* Local Version Information */
176 BD_FEATURES local_features; /* Local features bit mask */
177 DEV_CLASS dev_class; /* Local device class */
178#if BLE_INCLUDED == TRUE
179 BD_ADDR read_tx_pwr_addr; /* read TX power target address */
180
181 tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
182 BT_OCTET16 er; /* BLE encryption key */
183
184#if BTM_BLE_CONFORMANCE_TESTING == TRUE
185 BOOLEAN no_disc_if_pair_fail;
186 BOOLEAN enable_test_mac_val;
187 BT_OCTET8 test_mac;
188 BOOLEAN enable_test_local_sign_cntr;
189 UINT32 test_local_sign_cntr;
190#endif
191
192
193#endif /* BLE_INCLUDED */
194
195#define BTM_DEV_STATE_WAIT_RESET_CMPLT 0
196#define BTM_DEV_STATE_WAIT_AFTER_RESET 1
197#define BTM_DEV_STATE_READY 2
198
199 UINT8 state;
200 tBTM_IO_CAP loc_io_caps; /* IO capability of the local device */
201 BOOLEAN loc_auth_req; /* the auth_req flag */
202 BD_FEATURES brcm_features; /* Broadcom specific features bit mask */
203} tBTM_DEVCB;
204
205
206/* Define the structures and constants used for inquiry
207*/
208
209/* Definitions of limits for inquiries */
210#define BTM_PER_INQ_MIN_MAX_PERIOD HCI_PER_INQ_MIN_MAX_PERIOD
211#define BTM_PER_INQ_MAX_MAX_PERIOD HCI_PER_INQ_MAX_MAX_PERIOD
212#define BTM_PER_INQ_MIN_MIN_PERIOD HCI_PER_INQ_MIN_MIN_PERIOD
213#define BTM_PER_INQ_MAX_MIN_PERIOD HCI_PER_INQ_MAX_MIN_PERIOD
214#define BTM_MAX_INQUIRY_LENGTH HCI_MAX_INQUIRY_LENGTH
215#define BTM_MIN_INQUIRY_LEN 0x01
216
217#define BTM_MIN_INQ_TX_POWER -70
218#define BTM_MAX_INQ_TX_POWER 20
219
220#if BTM_USE_INQ_RESULTS_FILTER == TRUE
221typedef struct
222{
223 UINT32 inq_count; /* Used for determining if a response has already been */
224 /* received for the current inquiry operation. (We do not */
225 /* want to flood the caller with multiple responses from */
226 /* the same device. */
227 BD_ADDR bd_addr;
229#endif
230
231typedef struct
232{
233 UINT32 time_of_resp;
234 UINT32 inq_count; /* "timestamps" the entry with a particular inquiry count */
235 /* Used for determining if a response has already been */
236 /* received for the current inquiry operation. (We do not */
237 /* want to flood the caller with multiple responses from */
238 /* the same device. */
239 tBTM_INQ_INFO inq_info;
240 BOOLEAN in_use;
241
242#if (BLE_INCLUDED == TRUE)
243 BOOLEAN scan_rsp;
244#endif
246
247
248typedef struct
249{
250 tBTM_CMPL_CB *p_remname_cmpl_cb;
251
252#define BTM_EXT_RMT_NAME_TIMEOUT 40
253
254
255 TIMER_LIST_ENT rmt_name_timer_ent;
256
257 UINT16 discoverable_mode;
258 UINT16 connectable_mode;
259 UINT16 page_scan_window;
260 UINT16 page_scan_period;
261 UINT16 inq_scan_window;
262 UINT16 inq_scan_period;
263 UINT16 inq_scan_type;
264 UINT16 page_scan_type; /* current page scan type */
265
266 BD_ADDR remname_bda; /* Name of bd addr for active remote name request */
267#define BTM_RMT_NAME_INACTIVE 0
268#define BTM_RMT_NAME_EXT 0x1 /* Initiated through API */
269#define BTM_RMT_NAME_SEC 0x2 /* Initiated internally by security manager */
270#define BTM_RMT_NAME_INQ 0x4 /* Remote name initiated internally by inquiry */
271 BOOLEAN remname_active; /* State of a remote name request by external API */
272
273 tBTM_CMPL_CB *p_inq_cmpl_cb;
274 tBTM_INQ_RESULTS_CB *p_inq_results_cb;
275 tBTM_CMPL_CB *p_inqfilter_cmpl_cb; /* Called (if not NULL) after inquiry filter completed */
276 tBTM_INQ_DB_CHANGE_CB *p_inq_change_cb; /* Inquiry database changed callback */
277 UINT32 inq_counter; /* Counter incremented each time an inquiry completes */
278 /* Used for determining whether or not duplicate devices */
279 /* have responded to the same inquiry */
280 TIMER_LIST_ENT inq_timer_ent;
281#if BTM_USE_INQ_RESULTS_FILTER == TRUE
282 tINQ_BDADDR *p_bd_db; /* Pointer to memory that holds bdaddrs */
283 UINT16 num_bd_entries; /* Number of entries in database */
284 UINT16 max_bd_entries; /* Maximum number of entries that can be stored */
285#endif
286 tINQ_DB_ENT inq_db[BTM_INQ_DB_SIZE];
287 tBTM_INQ_PARMS inqparms; /* Contains the parameters for the current inquiry */
288 tBTM_INQUIRY_CMPL inq_cmpl_info; /* Status and number of responses from the last inquiry */
289
290 UINT16 per_min_delay; /* Current periodic minimum delay */
291 UINT16 per_max_delay; /* Current periodic maximum delay */
292 BOOLEAN inqfilt_active;
293 UINT8 pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
294 /* inquiry that has been cancelled*/
295 UINT8 inqfilt_type; /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
296
297#define BTM_INQ_INACTIVE_STATE 0
298#define BTM_INQ_CLR_FILT_STATE 1 /* Currently clearing the inquiry filter preceeding the inquiry request */
299 /* (bypassed if filtering is not used) */
300#define BTM_INQ_SET_FILT_STATE 2 /* Sets the new filter (or turns off filtering) in this state */
301#define BTM_INQ_ACTIVE_STATE 3 /* Actual inquiry or periodic inquiry is in progress */
302#define BTM_INQ_REMNAME_STATE 4 /* Remote name requests are active */
303
304 UINT8 state; /* Current state that the inquiry process is in */
305 UINT8 inq_active; /* Bit Mask indicating type of inquiry is active */
306 BOOLEAN no_inc_ssp; /* TRUE, to stop inquiry on incoming SSP */
308
309/* The MSB of the clock offset field indicates that the offset is valid if TRUE */
310#define BTM_CLOCK_OFFSET_VALID 0x8000
311
312/* Define the structures needed by security management
313*/
314
315#define BTM_SEC_INVALID_HANDLE 0xFFFF
316
317typedef UINT8 *BTM_BD_NAME_PTR; /* Pointer to Device name */
318
319/* Security callback is called by this unit when security
320** procedures are completed. Parameters are
321** BD Address of remote
322** Result of the operation
323*/
324typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
325
326typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
327
328/* MACROs to convert from SCO packet types mask to ESCO and back */
329#define BTM_SCO_PKT_TYPE_MASK ( HCI_PKT_TYPES_MASK_HV1 \
330 | HCI_PKT_TYPES_MASK_HV2 \
331 | HCI_PKT_TYPES_MASK_HV3)
332
333/* Mask defining only the SCO types of an esco packet type */
334#define BTM_ESCO_PKT_TYPE_MASK ( HCI_ESCO_PKT_TYPES_MASK_HV1 \
335 | HCI_ESCO_PKT_TYPES_MASK_HV2 \
336 | HCI_ESCO_PKT_TYPES_MASK_HV3)
337
338#define BTM_SCO_2_ESCO(scotype) ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
339#define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
340
341/* Define masks for supported and exception 2.0 SCO packet types
342*/
343#define BTM_SCO_SUPPORTED_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_HV1 | \
344 HCI_ESCO_PKT_TYPES_MASK_HV2 | \
345 HCI_ESCO_PKT_TYPES_MASK_HV3 | \
346 HCI_ESCO_PKT_TYPES_MASK_EV3 | \
347 HCI_ESCO_PKT_TYPES_MASK_EV4 | \
348 HCI_ESCO_PKT_TYPES_MASK_EV5)
349
350#define BTM_SCO_EXCEPTION_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3 | \
351 HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3 | \
352 HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5 | \
353 HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
354
355
356#define BTM_SCO_ROUTE_UNKNOWN 0xff
357
358/* Define the structure that contains (e)SCO data */
359typedef struct
360{
361 tBTM_ESCO_CBACK *p_esco_cback; /* Callback for eSCO events */
362 tBTM_ESCO_PARAMS setup;
363 tBTM_ESCO_DATA data; /* Connection complete information */
364 UINT8 hci_status;
366
367/* Define the structure used for SCO Management
368*/
369typedef struct
370{
371 tBTM_ESCO_INFO esco; /* Current settings */
372#if BTM_SCO_HCI_INCLUDED == TRUE
373 BUFFER_Q xmit_data_q; /* SCO data transmitting queue */
374#endif
375 tBTM_SCO_CB *p_conn_cb; /* Callback for when connected */
376 tBTM_SCO_CB *p_disc_cb; /* Callback for when disconnect */
377 UINT16 state; /* The state of the SCO link */
378 UINT16 hci_handle; /* HCI Handle */
379 BOOLEAN is_orig; /* TRUE if the originator */
380 BOOLEAN rem_bd_known; /* TRUE if remote BD addr known */
381
382} tSCO_CONN;
383
384/* SCO Management control block */
385typedef struct
386{
387 tBTM_SCO_IND_CBACK *app_sco_ind_cb;
388#if BTM_SCO_HCI_INCLUDED == TRUE
389 tBTM_SCO_DATA_CB *p_data_cb; /* Callback for SCO data over HCI */
390 UINT32 xmit_window_size; /* Total SCO window in bytes */
391#endif
392 tSCO_CONN sco_db[BTM_MAX_SCO_LINKS];
393 tBTM_ESCO_PARAMS def_esco_parms;
394 BD_ADDR xfer_addr;
395 UINT16 sco_disc_reason;
396 BOOLEAN esco_supported; /* TRUE if 1.2 cntlr AND supports eSCO links */
397 tBTM_SCO_TYPE desired_sco_mode;
398 tBTM_SCO_TYPE xfer_sco_type;
399 tBTM_SCO_PCM_PARAM sco_pcm_param;
400 tBTM_SCO_CODEC_TYPE codec_in_use; /* None, CVSD, MSBC, etc. */
401#if BTM_SCO_HCI_INCLUDED == TRUE
402 tBTM_SCO_ROUTE_TYPE sco_path;
403#endif
404
405} tSCO_CB;
406
407
408#if BTM_SCO_INCLUDED == TRUE
409extern void btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
410extern void btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
411 tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
412extern void btm_reject_sco_link(UINT16 sco_inx );
413extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
414#else
415#define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
416#define btm_reject_sco_link(sco_inx)
417#define btm_set_sco_ind_cback(sco_ind_cb)
418#define btm_sco_chk_pend_rolechange(hci_handle)
419#endif /* BTM_SCO_INCLUDED */
420
421/*
422** Define structure for Security Service Record.
423** A record exists for each service registered with the Security Manager
424*/
425typedef struct
426{
427 UINT32 mx_proto_id; /* Service runs over this multiplexer protocol */
428 UINT32 orig_mx_chan_id; /* Channel on the multiplexer protocol */
429 UINT32 term_mx_chan_id; /* Channel on the multiplexer protocol */
430 UINT16 psm; /* L2CAP PSM value */
431 UINT16 security_flags; /* Bitmap of required security features */
432 UINT8 service_id; /* Passed in authorization callback */
433#if (L2CAP_UCD_INCLUDED == TRUE)
434 UINT16 ucd_security_flags; /* Bitmap of required security features for UCD */
435#endif
436#if BTM_SEC_SERVICE_NAME_LEN > 0
437 UINT8 orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
438 UINT8 term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
439#endif
441
442#if BLE_INCLUDED == TRUE
443/* LE Security information of device in Slave Role */
444typedef struct
445{
446 BT_OCTET16 irk; /* peer diverified identity root */
447 BT_OCTET16 ltk; /* peer long term key */
448 BT_OCTET16 csrk; /* peer SRK peer device used to secured sign local data */
449
450 BT_OCTET8 rand; /* random vector for LTK generation */
451 UINT16 ediv; /* LTK diversifier of this slave device */
452 UINT16 div; /* local DIV to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1) */
453 UINT8 sec_level; /* local pairing security level */
454 UINT8 key_size; /* key size of the LTK delivered to peer device */
455 UINT8 srk_sec_level; /* security property of peer SRK for this device */
456 UINT8 local_csrk_sec_level; /* security property of local CSRK for this device */
457
458 UINT32 counter; /* peer sign counter for verifying rcv signed cmd */
459 UINT32 local_counter; /* local sign counter for sending signed write cmd*/
461
462#endif /* BLE_INCLUDED */
463
464typedef struct
465{
466 tBLE_ADDR_TYPE ble_addr_type; /* LE device type: public or random address */
467 BD_ADDR reconn_addr; /* reconnect address */
468 BD_ADDR cur_rand_addr; /* current random address */
469 BD_ADDR static_addr; /* static address */
470
471#if SMP_INCLUDED == TRUE
472 tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */
473 tBTM_SEC_BLE_KEYS keys; /* LE device security info in slave rode */
474#endif
476
477/*
478** Define structure for Security Device Record.
479** A record exists for each device authenticated with this device
480*/
481typedef struct
482{
483 tBTM_SEC_SERV_REC *p_cur_service;
484 tBTM_SEC_CALLBACK *p_callback;
485 void *p_ref_data;
486 UINT32 timestamp; /* Timestamp of the last connection */
487 UINT32 trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE]; /* Bitwise OR of trusted services */
488 UINT16 hci_handle; /* Handle to connection when exists */
489 UINT16 clock_offset; /* Latest known clock offset */
490 BD_ADDR bd_addr; /* BD_ADDR of the device */
491 DEV_CLASS dev_class; /* DEV_CLASS of the device */
492 LINK_KEY link_key; /* Device link key */
493
494#define BTM_SEC_AUTHORIZED BTM_SEC_FLAG_AUTHORIZED
495#define BTM_SEC_AUTHENTICATED BTM_SEC_FLAG_AUTHENTICATED
496#define BTM_SEC_ENCRYPTED BTM_SEC_FLAG_ENCRYPTED
497#define BTM_SEC_NAME_KNOWN 0x08
498#define BTM_SEC_LINK_KEY_KNOWN BTM_SEC_FLAG_LKEY_KNOWN
499#define BTM_SEC_LINK_KEY_AUTHED 0x20
500#define BTM_SEC_ROLE_SWITCHED 0x40
501#define BTM_SEC_IN_USE 0x80
502
503 tBTM_BD_NAME sec_bd_name; /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
504 UINT8 sec_flags; /* Current device security state */
505 BD_FEATURES features; /* Features suported by the device */
506
507#define BTM_SEC_STATE_IDLE 0
508#define BTM_SEC_STATE_AUTHENTICATING 1
509#define BTM_SEC_STATE_ENCRYPTING 2
510#define BTM_SEC_STATE_GETTING_NAME 3
511#define BTM_SEC_STATE_AUTHORIZING 4
512#define BTM_SEC_STATE_SWITCHING_ROLE 5
513#define BTM_SEC_STATE_DISCONNECTING 6
514#define BTM_SEC_STATE_DELAY_FOR_ENC 7 /* delay to check for encryption to work around controller problems */
515
516 UINT8 sec_state; /* Operating state */
517 BOOLEAN is_originator; /* TRUE if device is originating connection */
518#if (L2CAP_UCD_INCLUDED == TRUE)
519 BOOLEAN is_ucd; /* TRUE if device is sending or receiving UCD */
520 /* if incoming security failed, received UCD will be discarded */
521#endif
522 BOOLEAN role_master; /* TRUE if current mode is master */
523 UINT16 security_required; /* Security required for connection */
524 BOOLEAN link_key_not_sent; /* link key notification has not been sent waiting for name */
525 UINT8 link_key_type; /* Type of key used in pairing */
526 BOOLEAN link_key_changed; /* Changed link key during current connection */
527
528#define BTM_SM4_UNKNOWN 0x00
529#define BTM_SM4_KNOWN 0x10
530#define BTM_SM4_TRUE 0x11
531#define BTM_SM4_REQ_PEND 0x08 /* set this bit when getting remote features */
532#define BTM_SM4_UPGRADE 0x04 /* set this bit when upgrading link key */
533#define BTM_SM4_RETRY 0x02 /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
534#define BTM_SM4_DD_ACP 0x20 /* set this bit to indicate peer initiated dedicated bonding */
535#define BTM_SM4_CONN_PEND 0x40 /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
536 UINT8 sm4; /* BTM_SM4_TRUE, if the peer supports SM4 */
537 tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */
538 BOOLEAN rmt_auth_req; /* the auth_req flag as in the IO caps rsp evt */
539
540#if (BLE_INCLUDED == TRUE)
541 UINT8 enc_key_size; /* current link encryption key size */
542 tBTM_SEC_BLE ble;
543 tBT_DEVICE_TYPE device_type;
544 tBTM_LE_CONN_PRAMS conn_params;
545#endif
546
547// btla-specific ++
548#if BTM_DISC_DURING_RS == TRUE
549#define BTM_SEC_RS_NOT_PENDING 0 /* Role Switch not in progress */
550#define BTM_SEC_RS_PENDING 1 /* Role Switch in progress */
551#define BTM_SEC_DISC_PENDING 2 /* Disconnect is pending */
552 UINT8 rs_disc_pending;
553#endif
554// btla-specific --
556
557#define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
558#define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
559#define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
560
561
562/*
563** Define device configuration structure
564*/
565typedef struct
566{
567#if BTM_MAX_LOC_BD_NAME_LEN > 0
568 tBTM_LOC_BD_NAME bd_name; /* local Bluetooth device name */
569#endif
570 BOOLEAN pin_type; /* TRUE if PIN type is fixed */
571 UINT8 pin_code_len; /* Bonding information */
572 PIN_CODE pin_code; /* PIN CODE if pin type is fixed */
573 BOOLEAN connectable; /* If TRUE page scan should be enabled */
574 UINT8 def_inq_scan_mode; /* ??? limited/general/none */
575} tBTM_CFG;
576
577#if BTM_PWR_MGR_INCLUDED == TRUE
578enum
579{
580 BTM_PM_ST_ACTIVE = BTM_PM_STS_ACTIVE,
581 BTM_PM_ST_HOLD = BTM_PM_STS_HOLD,
582 BTM_PM_ST_SNIFF = BTM_PM_STS_SNIFF,
583 BTM_PM_ST_PARK = BTM_PM_STS_PARK,
584 BTM_PM_ST_PENDING = BTM_PM_STS_PENDING
585};
586typedef UINT8 tBTM_PM_STATE;
587
588enum
589{
590 BTM_PM_SET_MODE_EVT, /* Set power mode API is called. */
591 BTM_PM_UPDATE_EVT,
592 BTM_PM_RD_MODE_EVT /* Read power mode API is called. */
593};
594typedef UINT8 tBTM_PM_EVENT;
595
596typedef struct
597{
598 UINT16 event;
599 UINT16 len;
600 UINT8 link_ind;
602
603typedef struct
604{
605 UINT8 hci_status;
606 UINT8 mode;
607 UINT16 interval;
609
610typedef struct
611{
612 UINT8 pm_id; /* the entity that calls SetPowerMode API */
613 tBTM_PM_PWR_MD *p_pmd;
615
616typedef struct
617{
618 void *p_data;
619 UINT8 link_ind;
621
622typedef struct
623{
624 tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
625 tBTM_PM_PWR_MD set_mode; /* the mode and parameters sent down to the host controller. */
626 UINT16 interval; /* the interval from last mode change event. */
627#if (BTM_SSR_INCLUDED == TRUE)
628 UINT16 max_lat; /* stored SSR maximum latency */
629 UINT16 min_rmt_to;/* stored SSR minimum remote timeout */
630 UINT16 min_loc_to;/* stored SSR minimum local timeout */
631#endif
632 tBTM_PM_STATE state; /* contains the current mode of the connection */
633 BOOLEAN chg_ind; /* a request change indication */
635
636#define BTM_PM_REC_NOT_USED 0
637typedef struct
638{
639 tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
640 UINT8 mask; /* registered request mask. 0, if this entry is not used */
642#endif /* BTM_PWR_MGR_INCLUDED */
643
644enum
645{
646 BTM_BLI_ACL_UP_EVT,
647 BTM_BLI_ACL_DOWN_EVT,
648 BTM_BLI_PAGE_EVT,
649 BTM_BLI_PAGE_DONE_EVT,
650 BTM_BLI_INQ_EVT,
651 BTM_BLI_INQ_CANCEL_EVT,
652 BTM_BLI_INQ_DONE_EVT
653};
654typedef UINT8 tBTM_BLI_EVENT;
655
656/* Pairing State */
657enum
658{
659 BTM_PAIR_STATE_IDLE, /* Idle */
660 BTM_PAIR_STATE_GET_REM_NAME, /* Getting the remote name (to check for SM4) */
661 BTM_PAIR_STATE_WAIT_PIN_REQ, /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
662 BTM_PAIR_STATE_WAIT_LOCAL_PIN, /* Waiting for local PIN code */
663 BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM, /* Waiting user 'yes' to numeric confirmation */
664 BTM_PAIR_STATE_KEY_ENTRY, /* Key entry state (we are a keyboard) */
665 BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP, /* Waiting for local response to peer OOB data */
666 BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS, /* Waiting for local IO capabilities and OOB data */
667 BTM_PAIR_STATE_INCOMING_SSP, /* Incoming SSP (got peer IO caps when idle) */
668 BTM_PAIR_STATE_WAIT_AUTH_COMPLETE, /* All done, waiting authentication cpmplete */
669 BTM_PAIR_STATE_WAIT_DISCONNECT /* Waiting to disconnect the ACL */
670};
671typedef UINT8 tBTM_PAIRING_STATE;
672
673#define BTM_PAIR_FLAGS_WE_STARTED_DD 0x01 /* We want to do dedicated bonding */
674#define BTM_PAIR_FLAGS_PEER_STARTED_DD 0x02 /* Peer initiated dedicated bonding */
675#define BTM_PAIR_FLAGS_DISC_WHEN_DONE 0x04
676#define BTM_PAIR_FLAGS_PIN_REQD 0x08 /* set this bit when pin_callback is called */
677#define BTM_PAIR_FLAGS_PRE_FETCH_PIN 0x10 /* set this bit when pre-fetch pin */
678#define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20 /* set this bit when rejected incoming connection */
679
680typedef struct
681{
682 BOOLEAN is_mux;
683 BD_ADDR bd_addr;
684 UINT16 psm;
685 BOOLEAN is_orig;
686 tBTM_SEC_CALLBACK *p_callback;
687 void *p_ref_data;
688 UINT32 mx_proto_id;
689 UINT32 mx_chan_id;
691
692#if (L2CAP_UCD_INCLUDED == TRUE)
693
694#define CONN_ORIENT_TERM 0x00 /* incoming connection oriented */
695#define CONN_ORIENT_ORIG 0x01 /* outgoing connection oriented */
696#define CONNLESS_TERM 0x02 /* incoming connectionless */
697#define CONNLESS_ORIG 0x03 /* outgoing connectionless */
698#define CONNECTION_TYPE_ORIG_MASK 0x01 /* mask for direction */
699#define CONNECTION_TYPE_CONNLESS_MASK 0x02 /* mask for connectionless or not */
700typedef UINT8 CONNECTION_TYPE;
701
702#else
703
704#define CONN_ORIENT_TERM FALSE
705#define CONN_ORIENT_ORIG TRUE
706typedef BOOLEAN CONNECTION_TYPE;
707
708#endif /* (L2CAP_UCD_INCLUDED == TRUE) */
709
710/* Define a structure to hold all the BTM data
711*/
712
713#define BTM_STATE_BUFFER_SIZE 5 /* size of state buffer */
714
715#if (BTM_PCM2_INCLUDED == TRUE)
716/* Define pcm2_action */
717enum
718{
719 BTM_PCM2_ACT_NONE,
720 BTM_PCM2_ACT_SENT_ARC,
721 BTM_PCM2_READ_PARAM,
722 BTM_PCM2_WRITE_PARAM,
723};
724typedef UINT8 tBTM_PCM2_ACTION;
725#endif
726
727typedef struct
728{
729 tBTM_CFG cfg; /* Device configuration */
730
731 /****************************************************
732 ** ACL Management
733 ****************************************************/
734 tACL_CONN acl_db[MAX_L2CAP_LINKS];
735#if( RFCOMM_INCLUDED==TRUE)
736 UINT8 btm_scn[BTM_MAX_SCN]; /* current SCNs: TRUE if SCN is in use */
737#endif
738 UINT16 btm_def_link_policy;
739 UINT16 btm_def_link_super_tout;
740
741#if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
742 tBTM_BL_EVENT_MASK bl_evt_mask;
743 tBTM_BL_CHANGE_CB *p_bl_changed_cb; /* Callback for when Busy Level changed */
744#else
745 tBTM_ACL_DB_CHANGE_CB *p_acl_changed_cb; /* Callback for when ACL DB changed */
746#endif
747
748 tBTM_LSTO_CBACK *p_lsto_cback; /* for link supervision timeout change event */
749
750 /****************************************************
751 ** Power Management
752 ****************************************************/
753#if BTM_PWR_MGR_INCLUDED == TRUE
754 tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS]; /* per ACL link */
755 tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
756 UINT8 pm_pend_link; /* the index of acl_db, which has a pending PM cmd */
757 UINT8 pm_pend_id; /* the id pf the module, which has a pending PM cmd */
758#endif /* BTM_PWR_MGR_INCLUDED == TRUE */
759
760 /*****************************************************
761 ** Device control
762 *****************************************************/
763 tBTM_DEVCB devcb;
764
765 /*****************************************************
766 ** BLE Device controllers
767 *****************************************************/
768#if (BLE_INCLUDED == TRUE)
769 tBTM_BLE_CB ble_ctr_cb;
770
771 UINT16 enc_handle;
772 BT_OCTET8 enc_rand; /* received rand value from LTK request*/
773 UINT16 ediv; /* received ediv value from LTK request */
774 UINT8 key_size;
775#endif
776
777 /* Packet types supported by the local device */
778 UINT16 btm_acl_pkt_types_supported;
779 UINT16 btm_sco_pkt_types_supported;
780
781
782 /*****************************************************
783 ** Inquiry
784 *****************************************************/
785 tBTM_INQUIRY_VAR_ST btm_inq_vars;
786 tBTM_FILTER_CB *p_inq_filter_cb; /* Callback that can be set if host */
787 /* wants to verify inquiry filters */
788
789 /*****************************************************
790 ** SCO Management
791 *****************************************************/
792#if BTM_SCO_INCLUDED == TRUE
793 tSCO_CB sco_cb;
794#endif
795
796 /*****************************************************
797 ** Security Management
798 *****************************************************/
799 tBTM_APPL_INFO api;
800
801#define BTM_SEC_MAX_RMT_NAME_CALLBACKS 2
802 tBTM_RMT_NAME_CALLBACK *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
803
804 tBTM_FILTER_CB *p_conn_filter_cb; /* Callback that can be set if host */
805 /* wants to verify connectability filters*/
806
807 tBTM_SEC_DEV_REC *p_collided_dev_rec;
808 TIMER_LIST_ENT sec_collision_tle;
809 UINT32 collision_start_time;
810 UINT32 max_collision_delay;
811 UINT32 dev_rec_count; /* Counter used for device record timestamp */
812 UINT8 security_mode;
813 BOOLEAN pairing_disabled;
814 BOOLEAN connect_only_paired;
815 BOOLEAN security_mode_changed; /* mode changed during bonding */
816 BOOLEAN pin_type_changed; /* pin type changed during bonding */
817 BOOLEAN sec_req_pending; /* TRUE if a request is pending */
818// btla-specific ++
819#ifdef PORCHE_PAIRING_CONFLICT
820 UINT8 pin_code_len_saved; /* for legacy devices */
821#endif
822// btla-specific --
823
824 UINT8 pin_code_len; /* for legacy devices */
825 PIN_CODE pin_code; /* for legacy devices */
826 tBTM_PAIRING_STATE pairing_state; /* The current pairing state */
827 UINT8 pairing_flags; /* The current pairing flags */
828 BD_ADDR pairing_bda; /* The device currently pairing */
829 TIMER_LIST_ENT pairing_tle; /* Timer for pairing process */
830 UINT16 disc_handle; /* for legacy devices */
831 UINT8 disc_reason; /* for legacy devices */
832 tBTM_SEC_SERV_REC sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
833 tBTM_SEC_DEV_REC sec_dev_rec[BTM_SEC_MAX_DEVICE_RECORDS];
834 tBTM_SEC_SERV_REC *p_out_serv;
835 tBTM_MKEY_CALLBACK *mkey_cback;
836
837 BD_ADDR connecting_bda;
838 DEV_CLASS connecting_dc;
839
840 UINT8 first_disabled_channel;
841 UINT8 last_disabled_channel;
842
843 UINT8 acl_disc_reason;
844 UINT8 trace_level;
845#if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
846 UINT8 num_acl; /* num of active ACL links */
847 UINT8 busy_level; /* the current busy level */
848 BOOLEAN is_paging; /* TRUE, if paging is in progess */
849 BOOLEAN is_inquiry; /* TRUE, if inquiry is in progess */
850#endif
851 BUFFER_Q page_queue;
852 BOOLEAN paging;
853 BOOLEAN discing;
854 BUFFER_Q sec_pending_q; /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
855
856#if (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
857 char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
858#endif
859
860#if (defined(BTM_PCM2_INCLUDED) && BTM_PCM2_INCLUDED == TRUE)
861 UINT16 sys_features;
862 UINT8 pcm2_params[BRCM_PCM2_SETUP_WRITE_SIZE];
863 tBTM_PCM2_ACTION pcm2_action;
864#endif
865
866} tBTM_CB;
867
868
869#ifdef __cplusplus
870extern "C"
871{
872#endif
873
874#if BTM_DYNAMIC_MEMORY == FALSE
875BTM_API extern tBTM_CB btm_cb;
876#else
877BTM_API extern tBTM_CB *btm_cb_ptr;
878#define btm_cb (*btm_cb_ptr)
879#endif
880
881/* Internal functions provided by btm_main.c
882********************************************
883*/
884extern void btm_init (void);
885
886/* Internal functions provided by btm_inq.c
887*******************************************
888*/
889extern tBTM_STATUS btm_initiate_rem_name (BD_ADDR remote_bda,
890 tBTM_INQ_INFO *p_cur,
891 UINT8 origin, UINT32 timeout,
892 tBTM_CMPL_CB *p_cb);
893
894extern void btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
895 UINT8 hci_status);
896extern void btm_inq_rmt_name_failed(void);
897
898/* Inquiry related functions */
899extern void btm_clr_inq_db (BD_ADDR p_bda);
900extern void btm_inq_db_init (void);
901extern void btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
902extern void btm_process_inq_complete (UINT8 status, UINT8 mode);
903extern void btm_event_filter_complete (UINT8 *p);
904extern void btm_inq_stop_on_ssp(void);
905extern void btm_inq_clear_ssp(void);
906extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
907extern BOOLEAN btm_inq_find_bdaddr (BD_ADDR p_bda);
908
909#if (BTM_EIR_CLIENT_INCLUDED == TRUE)
910extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
911#endif
912
913/* Internal functions provided by btm_acl.c
914********************************************
915*/
916extern void btm_acl_init (void);
917extern void btm_acl_timeout (TIMER_LIST_ENT *p_tle);
918extern void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
919 UINT16 hci_handle, UINT8 link_role, UINT8 is_le_link);
920extern void btm_acl_removed (BD_ADDR bda);
921extern void btm_acl_device_down (void);
922extern void btm_acl_update_busy_level (tBTM_BLI_EVENT event);
923extern void btm_acl_link_key_change (UINT16 handle, UINT8 status);
924
925extern void btm_cont_rswitch_or_chglinkkey (tACL_CONN *p,
926 tBTM_SEC_DEV_REC *p_dev_rec,
927 UINT8 hci_status);
928
929extern UINT8 btm_handle_to_acl_index (UINT16 hci_handle);
930extern void btm_read_link_policy_complete (UINT8 *p);
931extern void btm_read_rssi_complete (UINT8 *p);
932extern void btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble);
933extern void btm_read_link_quality_complete (UINT8 *p);
934extern tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
935extern void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
936extern void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
937extern void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
938BTM_API extern UINT16 btm_get_acl_disc_reason_code (void);
939BTM_API extern tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr);
940extern void btm_read_remote_features_complete (UINT8 *p);
941extern void btm_read_remote_ext_features_complete (UINT8 *p);
942extern void btm_read_remote_ext_features_failed (UINT8 status);
943extern void btm_read_remote_version_complete (UINT8 *p);
944// btla-specific ++
945extern void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
946// btla-specific --
947/* Read maximum data packet that can be sent over current connection */
948extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
949extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda);
950extern BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda);
951
952#if BTM_PWR_MGR_INCLUDED == FALSE
953extern void btm_process_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
954 UINT16 interval);
955
956/* Internal functions provided by btm_pm.c
957********************************************
958*/
959#else
960extern void btm_pm_reset(void);
961extern void btm_pm_sm_alloc(UINT8 ind);
962extern void btm_pm_proc_cmd_status(UINT8 status);
963extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
964 UINT16 interval);
965extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
966#if BTM_SCO_INCLUDED == TRUE
967extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
968#else
969#define btm_sco_chk_pend_unpark(hci_status, hci_handle)
970#endif /* BTM_SCO_INCLUDED */
971#endif /* BTM_PWR_MGR_INCLUDED == FALSE */
972extern void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow);
973
974
975/* Internal functions provided by btm_sco.c
976********************************************
977*/
978extern void btm_sco_init (void);
979extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
980 tBTM_ESCO_DATA *p_esco_data);
981extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
982 UINT8 retrans_window, UINT16 rx_pkt_len,
983 UINT16 tx_pkt_len);
984extern void btm_sco_conn_req (BD_ADDR bda, DEV_CLASS dev_class, UINT8 link_type);
985extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
986extern void btm_sco_acl_removed (BD_ADDR bda);
987extern void btm_route_sco_data (BT_HDR *p_msg);
988extern BOOLEAN btm_is_sco_active (UINT16 handle);
989extern void btm_remove_sco_links (BD_ADDR bda);
990extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
991
992extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
993extern UINT16 btm_find_scb_by_handle (UINT16 handle);
994extern void btm_sco_flush_sco_data(UINT16 sco_inx);
995
996/* Internal functions provided by btm_devctl.c
997**********************************************
998*/
999extern void btm_dev_init (void);
1000extern void btm_dev_absent (void);
1001extern void btm_dev_timeout (TIMER_LIST_ENT *p_tle);
1002extern void btm_reset_complete (void);
1003extern void btm_read_local_version_complete (UINT8 *p, UINT16 evt_len);
1004extern void btm_read_hci_buf_size_complete (UINT8 *p, UINT16 evt_len);
1005extern void btm_read_local_features_complete (UINT8 *p, UINT16 evt_len);
1006extern void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len);
1007extern void btm_read_local_addr_complete (UINT8 *p, UINT16 evt_len);
1008extern void btm_get_local_features (void);
1009
1010#if (BLE_INCLUDED == TRUE)
1011extern void btm_read_ble_buf_size_complete (UINT8 *p, UINT16 evt_len);
1012extern void btm_read_white_list_size_complete(UINT8 *p, UINT16 evt_len);
1013extern void btm_ble_add_2_white_list_complete(UINT8 *p, UINT16 evt_len);
1014extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
1015extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
1016#endif /* BLE_INCLUDED */
1017
1018/* Vendor Specific Command complete evt handler */
1019extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
1020 tBTM_CMPL_CB *p_vsc_cplt_cback);
1021extern void btm_inq_db_reset (void);
1022extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
1023extern UINT8 btm_get_hci_version (void);
1024extern void btm_read_stored_link_key_complete (UINT8 *p);
1025extern void btm_write_stored_link_key_complete (UINT8 *p);
1026extern void btm_delete_stored_link_key_complete (UINT8 *p);
1027extern void btm_return_link_keys_evt (tBTM_RETURN_LINK_KEYS_EVT *result);
1028extern void btm_report_device_status (tBTM_DEV_STATUS status);
1029
1030
1031/* Internal functions provided by btm_dev.c
1032**********************************************
1033*/
1034extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1035extern UINT8 btm_get_voice_coding_support (void);
1036
1037extern tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr);
1038extern void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
1039extern tBTM_SEC_DEV_REC *btm_find_dev (BD_ADDR bd_addr);
1040extern tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr);
1041extern tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle);
1042
1043/* Internal functions provided by btm_sec.c
1044**********************************************
1045*/
1046extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1047extern tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
1048 UINT16 handle, CONNECTION_TYPE conn_type,
1049 tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1050extern tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1051 UINT32 mx_proto_id, UINT32 mx_chan_id,
1052 tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1053extern void btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
1054extern void btm_create_conn_cancel_complete (UINT8 *p);
1055extern void btm_proc_lsto_evt(UINT16 handle, UINT16 timeout);
1056extern void btm_read_linq_tx_power_complete (UINT8 *p);
1057
1058extern void btm_sec_init (UINT8 sec_mode);
1059extern void btm_sec_dev_reset (void);
1060extern void btm_sec_abort_access_req (BD_ADDR bd_addr);
1061extern void btm_sec_auth_complete (UINT16 handle, UINT8 status);
1062extern void btm_sec_mkey_comp_event (UINT16 handle, UINT8 status, UINT8 key_flg);
1063extern void btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1064extern void btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
1065extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
1066extern void btm_sec_disconnected (UINT16 handle, UINT8 reason);
1067extern void btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
1068extern void btm_sec_rmt_host_support_feat_evt (UINT8 *p);
1069extern void btm_io_capabilities_req (UINT8 *p);
1070extern void btm_io_capabilities_rsp (UINT8 *p);
1071extern void btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
1072extern void btm_keypress_notif_evt (UINT8 *p);
1073extern void btm_simple_pair_complete (UINT8 *p);
1074extern void btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
1075extern void btm_sec_link_key_request (UINT8 *p_bda);
1076extern void btm_sec_pin_code_request (UINT8 *p_bda);
1077extern void btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
1078extern void btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res);
1079
1080#if BLE_INCLUDED == TRUE
1081extern void btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC *p_dev_rec);
1082extern BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT8 *p_found_idx, tBTM_SEC_DEV_REC *p_rec);
1083extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
1084#endif /* BLE_INCLUDED */
1085
1086extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
1087
1088#if BTM_OOB_INCLUDED == TRUE
1089extern void btm_rem_oob_req (UINT8 *p);
1090extern void btm_read_local_oob_complete (UINT8 *p);
1091#else
1092#define btm_rem_oob_req(p)
1093#define btm_read_local_oob_complete(p)
1094#endif
1095
1096extern void btm_acl_resubmit_page (void);
1097extern void btm_acl_reset_paging (void);
1098extern void btm_acl_paging (BT_HDR *p, BD_ADDR dest);
1099extern void btm_acl_set_discing (BOOLEAN discing);
1100extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
1101
1102#ifdef BRCM_VS
1103extern void btm_brcm_feat_init(void);
1104extern void btm_vs_reset_complete (void);
1105extern void btm_brcm_arc_init (void);
1106
1107#endif
1108
1109#ifdef __cplusplus
1110}
1111#endif
1112
1113#endif
1114
Definition btm_int.h:681