OSDN Git Service

808b4435554946fb2efdd16412a7fd8efd1b01ef
[android-x86/system-bt.git] / stack / btm / btm_int.h
1 /******************************************************************************
2  *
3  *  Copyright (C) 1999-2012 Broadcom Corporation
4  *
5  *  Licensed under the Apache License, Version 2.0 (the "License");
6  *  you may not use this file except in compliance with the License.
7  *  You may obtain a copy of the License at:
8  *
9  *  http://www.apache.org/licenses/LICENSE-2.0
10  *
11  *  Unless required by applicable law or agreed to in writing, software
12  *  distributed under the License is distributed on an "AS IS" BASIS,
13  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  *  See the License for the specific language governing permissions and
15  *  limitations under the License.
16  *
17  ******************************************************************************/
18
19 /******************************************************************************
20  *
21  *  this file contains the main Bluetooth Manager (BTM) internal
22  *  definitions.
23  *
24  ******************************************************************************/
25 #ifndef BTM_INT_H
26 #define BTM_INT_H
27
28 #include "bt_target.h"
29 #include "gki.h"
30 #include "hcidefs.h"
31
32 #if RFCOMM_INCLUDED == TRUE
33 #include "rfcdefs.h"
34 #endif
35
36 #include "btm_api.h"
37
38 #if (BLE_INCLUDED == TRUE)
39 #include "btm_ble_int.h"
40 #if (SMP_INCLUDED == TRUE)
41 #include "smp_api.h"
42 #endif
43 #endif
44
45 #if BTM_MAX_LOC_BD_NAME_LEN > 0
46 typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
47 #endif
48
49 #define  BTM_ACL_IS_CONNECTED(bda)   (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
50
51 /* Definitions for Server Channel Number (SCN) management
52 */
53 #define BTM_MAX_SCN      PORT_MAX_RFC_PORTS
54
55 /* Define masks for supported and exception 2.0 ACL packet types
56 */
57 #define BTM_ACL_SUPPORTED_PKTS_MASK      (HCI_PKT_TYPES_MASK_DM1        | \
58                                           HCI_PKT_TYPES_MASK_DH1        | \
59                                           HCI_PKT_TYPES_MASK_DM3        | \
60                                           HCI_PKT_TYPES_MASK_DH3        | \
61                                           HCI_PKT_TYPES_MASK_DM5        | \
62                                           HCI_PKT_TYPES_MASK_DH5)
63
64 #define BTM_ACL_EXCEPTION_PKTS_MASK      (HCI_PKT_TYPES_MASK_NO_2_DH1   | \
65                                           HCI_PKT_TYPES_MASK_NO_3_DH1   | \
66                                           HCI_PKT_TYPES_MASK_NO_2_DH3   | \
67                                           HCI_PKT_TYPES_MASK_NO_3_DH3   | \
68                                           HCI_PKT_TYPES_MASK_NO_2_DH5   | \
69                                           HCI_PKT_TYPES_MASK_NO_3_DH5)
70
71 #define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
72                                HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
73                                ? TRUE : FALSE)
74
75 #define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
76
77 /* Define the ACL Management control structure
78 */
79 typedef struct
80 {
81     UINT16          hci_handle;
82     UINT16          pkt_types_mask;
83     UINT16          restore_pkt_types;  /* when coming in/out of SCO connection restore the packet types */
84     UINT16          clock_offset;
85     BD_ADDR         remote_addr;
86     DEV_CLASS       remote_dc;
87     BD_NAME         remote_name;
88
89     UINT16          manufacturer;
90     UINT16          lmp_subversion;
91     UINT16          link_super_tout;
92     BD_FEATURES     peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1];    /* Peer LMP Extended features mask table for the device */
93     UINT8           num_read_pages;
94     UINT8           lmp_version;
95
96     BOOLEAN         in_use;
97     UINT8           link_role;
98     BOOLEAN         link_up_issued;     /* True if busy_level link up has been issued */
99
100 #define BTM_ACL_SWKEY_STATE_IDLE                0
101 #define BTM_ACL_SWKEY_STATE_MODE_CHANGE         1
102 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF      2
103 #define BTM_ACL_SWKEY_STATE_SWITCHING           3
104 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON       4
105 #define BTM_ACL_SWKEY_STATE_IN_PROGRESS         5
106     UINT8           switch_role_state;
107     UINT8           change_key_state;
108
109 #define BTM_ACL_ENCRYPT_STATE_IDLE              0
110 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF       1   /* encryption turning off */
111 #define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC         2   /* temporarily off for change link key or role switch */
112 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON        3   /* encryption turning on */
113     UINT8           encrypt_state;                  /* overall BTM encryption state */
114
115 #if BTM_PWR_MGR_INCLUDED == FALSE
116     UINT8           mode;
117 #endif /* BTM_PWR_MGR_INCLUDED */
118
119 #if BLE_INCLUDED == TRUE
120     tBT_TRANSPORT   transport;
121     BD_ADDR         conn_addr;              /* local device address used for this connection */
122     UINT8           conn_addr_type;         /* local device address type for this connection */
123     BD_ADDR         active_remote_addr;     /* remote address used on this connection */
124     UINT8           active_remote_addr_type;         /* local device address type for this connection */
125     BD_FEATURES     peer_le_features;       /* Peer LE Used features mask for the device */
126
127 #endif
128
129 } tACL_CONN;
130
131 /*****************************************************
132 ** TIMER Definitions
133 ******************************************************/
134 #define TT_DEV_RESET     1
135 #define TT_DEV_RLN       2
136 #define TT_DEV_RLNKP     4              /* Read Link Policy Settings */
137
138 /* Define the Device Management control structure
139 */
140 typedef struct
141 {
142     tBTM_DEV_STATUS_CB  *p_dev_status_cb;   /* Device status change callback        */
143     tBTM_VS_EVT_CB      *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS];     /* Register for vendor specific events  */
144
145     tBTM_CMPL_CB        *p_stored_link_key_cmpl_cb;   /* Read/Write/Delete stored link key    */
146
147     TIMER_LIST_ENT       reset_timer;
148
149     TIMER_LIST_ENT       rln_timer;
150     tBTM_CMPL_CB        *p_rln_cmpl_cb;     /* Callback function to be called when  */
151                                             /* read local name function complete    */
152     TIMER_LIST_ENT       rlinkp_timer;
153     tBTM_CMPL_CB        *p_rlinkp_cmpl_cb;  /* Callback function to be called when  */
154                                             /* read link policy function completes  */
155     TIMER_LIST_ENT       rssi_timer;
156     tBTM_CMPL_CB        *p_rssi_cmpl_cb;    /* Callback function to be called when  */
157                                             /* read rssi function completes         */
158     TIMER_LIST_ENT       lnk_quality_timer;
159     tBTM_CMPL_CB        *p_lnk_qual_cmpl_cb;/* Callback function to be called when  */
160                                             /* read link quality function completes */
161     TIMER_LIST_ENT       txpwer_timer;
162     tBTM_CMPL_CB        *p_txpwer_cmpl_cb;    /* Callback function to be called when  */
163                                             /* read inq tx power function completes  */
164
165     TIMER_LIST_ENT       qossu_timer;
166     tBTM_CMPL_CB        *p_qossu_cmpl_cb;   /* Callback function to be called when  */
167                                             /* qos setup function completes         */
168
169     tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
170     tBTM_CMPL_CB        *p_switch_role_cb;  /* Callback function to be called when  */
171                                             /* requested switch role is completed   */
172
173     tBTM_CHANGE_KEY_CMPL chg_link_key_ref_data;
174     tBTM_CMPL_CB        *p_chg_link_key_cb; /* Callback function to be called when  */
175                                             /* change of link key is completed      */
176
177     TIMER_LIST_ENT       tx_power_timer;
178     tBTM_CMPL_CB        *p_tx_power_cmpl_cb;/* Callback function to be called       */
179
180     DEV_CLASS            dev_class;         /* Local device class                   */
181
182 #if BLE_INCLUDED == TRUE
183
184     tBTM_CMPL_CB        *p_le_test_cmd_cmpl_cb;   /* Callback function to be called when
185                                                   LE test mode command has been sent successfully */
186
187     BD_ADDR                 read_tx_pwr_addr;   /* read TX power target address     */
188
189     tBTM_BLE_LOCAL_ID_KEYS  id_keys;        /* local BLE ID keys                    */
190     BT_OCTET16              er;             /* BLE encryption key                   */
191
192 #define BTM_LE_SUPPORT_STATE_SIZE   8
193 UINT8                   le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
194
195
196
197 #if BTM_BLE_CONFORMANCE_TESTING == TRUE
198     BOOLEAN                 no_disc_if_pair_fail;
199     BOOLEAN                 enable_test_mac_val;
200     BT_OCTET8               test_mac;
201     BOOLEAN                 enable_test_local_sign_cntr;
202     UINT32                  test_local_sign_cntr;
203 #endif
204
205
206 #endif  /* BLE_INCLUDED */
207
208     tBTM_IO_CAP          loc_io_caps;       /* IO capability of the local device */
209     tBTM_AUTH_REQ        loc_auth_req;      /* the auth_req flag  */
210 } tBTM_DEVCB;
211
212
213 /* Define the structures and constants used for inquiry
214 */
215
216 /* Definitions of limits for inquiries */
217 #define BTM_PER_INQ_MIN_MAX_PERIOD      HCI_PER_INQ_MIN_MAX_PERIOD
218 #define BTM_PER_INQ_MAX_MAX_PERIOD      HCI_PER_INQ_MAX_MAX_PERIOD
219 #define BTM_PER_INQ_MIN_MIN_PERIOD      HCI_PER_INQ_MIN_MIN_PERIOD
220 #define BTM_PER_INQ_MAX_MIN_PERIOD      HCI_PER_INQ_MAX_MIN_PERIOD
221 #define BTM_MAX_INQUIRY_LENGTH          HCI_MAX_INQUIRY_LENGTH
222 #define BTM_MIN_INQUIRY_LEN             0x01
223
224 #define BTM_MIN_INQ_TX_POWER    -70
225 #define BTM_MAX_INQ_TX_POWER    20
226
227 #if BTM_USE_INQ_RESULTS_FILTER == TRUE
228 typedef struct
229 {
230     UINT32          inq_count;          /* Used for determining if a response has already been      */
231                                         /* received for the current inquiry operation. (We do not   */
232                                         /* want to flood the caller with multiple responses from    */
233                                         /* the same device.                                         */
234     BD_ADDR         bd_addr;
235 } tINQ_BDADDR;
236 #endif
237
238 typedef struct
239 {
240     UINT32          time_of_resp;
241     UINT32          inq_count;          /* "timestamps" the entry with a particular inquiry count   */
242                                         /* Used for determining if a response has already been      */
243                                         /* received for the current inquiry operation. (We do not   */
244                                         /* want to flood the caller with multiple responses from    */
245                                         /* the same device.                                         */
246     tBTM_INQ_INFO   inq_info;
247     BOOLEAN         in_use;
248
249 #if (BLE_INCLUDED == TRUE)
250     BOOLEAN         scan_rsp;
251 #endif
252 } tINQ_DB_ENT;
253
254
255 enum
256 {
257     INQ_NONE,
258     INQ_LE_OBSERVE,
259     INQ_GENERAL
260 };
261 typedef UINT8 tBTM_INQ_TYPE;
262
263 typedef struct
264 {
265     tBTM_CMPL_CB *p_remname_cmpl_cb;
266
267 #define BTM_EXT_RMT_NAME_TIMEOUT    40
268
269
270     TIMER_LIST_ENT  rmt_name_timer_ent;
271
272     UINT16           discoverable_mode;
273     UINT16           connectable_mode;
274     UINT16           page_scan_window;
275     UINT16           page_scan_period;
276     UINT16           inq_scan_window;
277     UINT16           inq_scan_period;
278     UINT16           inq_scan_type;
279     UINT16           page_scan_type;        /* current page scan type */
280     tBTM_INQ_TYPE    scan_type;
281
282     BD_ADDR          remname_bda;           /* Name of bd addr for active remote name request */
283 #define BTM_RMT_NAME_INACTIVE       0
284 #define BTM_RMT_NAME_EXT            0x1     /* Initiated through API */
285 #define BTM_RMT_NAME_SEC            0x2     /* Initiated internally by security manager */
286 #define BTM_RMT_NAME_INQ            0x4     /* Remote name initiated internally by inquiry */
287     BOOLEAN          remname_active;        /* State of a remote name request by external API */
288
289     tBTM_CMPL_CB    *p_inq_cmpl_cb;
290     tBTM_INQ_RESULTS_CB *p_inq_results_cb;
291     tBTM_CMPL_CB    *p_inq_ble_cmpl_cb;     /*completion callback exclusively for LE Observe*/
292     tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
293     tBTM_CMPL_CB    *p_inqfilter_cmpl_cb;   /* Called (if not NULL) after inquiry filter completed */
294     UINT32           inq_counter;           /* Counter incremented each time an inquiry completes */
295                                             /* Used for determining whether or not duplicate devices */
296                                             /* have responded to the same inquiry */
297     TIMER_LIST_ENT   inq_timer_ent;
298 #if BTM_USE_INQ_RESULTS_FILTER == TRUE
299     tINQ_BDADDR     *p_bd_db;               /* Pointer to memory that holds bdaddrs */
300     UINT16           num_bd_entries;        /* Number of entries in database */
301     UINT16           max_bd_entries;        /* Maximum number of entries that can be stored */
302 #endif
303     tINQ_DB_ENT      inq_db[BTM_INQ_DB_SIZE];
304     tBTM_INQ_PARMS   inqparms;              /* Contains the parameters for the current inquiry */
305     tBTM_INQUIRY_CMPL inq_cmpl_info;        /* Status and number of responses from the last inquiry */
306
307     UINT16           per_min_delay;         /* Current periodic minimum delay */
308     UINT16           per_max_delay;         /* Current periodic maximum delay */
309     BOOLEAN          inqfilt_active;
310     UINT8            pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
311                                                   /* inquiry that has been cancelled*/
312     UINT8            inqfilt_type;          /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
313
314 #define BTM_INQ_INACTIVE_STATE      0
315 #define BTM_INQ_CLR_FILT_STATE      1   /* Currently clearing the inquiry filter preceeding the inquiry request */
316                                         /* (bypassed if filtering is not used)                                  */
317 #define BTM_INQ_SET_FILT_STATE      2   /* Sets the new filter (or turns off filtering) in this state */
318 #define BTM_INQ_ACTIVE_STATE        3   /* Actual inquiry or periodic inquiry is in progress */
319 #define BTM_INQ_REMNAME_STATE       4   /* Remote name requests are active  */
320
321     UINT8            state;             /* Current state that the inquiry process is in */
322     UINT8            inq_active;        /* Bit Mask indicating type of inquiry is active */
323     BOOLEAN          no_inc_ssp;        /* TRUE, to stop inquiry on incoming SSP */
324 #if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
325     btm_inq_state    next_state;        /*interleaving state to determine next mode to be inquired*/
326 #endif
327 } tBTM_INQUIRY_VAR_ST;
328
329 /* The MSB of the clock offset field indicates that the offset is valid if TRUE */
330 #define BTM_CLOCK_OFFSET_VALID      0x8000
331
332 /* Define the structures needed by security management
333 */
334
335 #define BTM_SEC_INVALID_HANDLE  0xFFFF
336
337 typedef UINT8 *BTM_BD_NAME_PTR;                        /* Pointer to Device name */
338
339 /* Security callback is called by this unit when security
340 **   procedures are completed.  Parameters are
341 **              BD Address of remote
342 **              Result of the operation
343 */
344 typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
345
346 typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
347
348 /* MACROs to convert from SCO packet types mask to ESCO and back */
349 #define BTM_SCO_PKT_TYPE_MASK   (   HCI_PKT_TYPES_MASK_HV1      \
350                                  |  HCI_PKT_TYPES_MASK_HV2      \
351                                  |  HCI_PKT_TYPES_MASK_HV3)
352
353 /* Mask defining only the SCO types of an esco packet type */
354 #define BTM_ESCO_PKT_TYPE_MASK  (   HCI_ESCO_PKT_TYPES_MASK_HV1 \
355                                  |  HCI_ESCO_PKT_TYPES_MASK_HV2 \
356                                  |  HCI_ESCO_PKT_TYPES_MASK_HV3)
357
358 #define BTM_SCO_2_ESCO(scotype)  ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
359 #define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
360
361 /* Define masks for supported and exception 2.0 SCO packet types
362 */
363 #define BTM_SCO_SUPPORTED_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_HV1       | \
364                                           HCI_ESCO_PKT_TYPES_MASK_HV2       | \
365                                           HCI_ESCO_PKT_TYPES_MASK_HV3       | \
366                                           HCI_ESCO_PKT_TYPES_MASK_EV3       | \
367                                           HCI_ESCO_PKT_TYPES_MASK_EV4       | \
368                                           HCI_ESCO_PKT_TYPES_MASK_EV5)
369
370 #define BTM_SCO_EXCEPTION_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3  | \
371                                           HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3  | \
372                                           HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5  | \
373                                           HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
374
375
376 #define BTM_SCO_ROUTE_UNKNOWN       0xff
377
378 /* Define the structure that contains (e)SCO data */
379 typedef struct
380 {
381     tBTM_ESCO_CBACK    *p_esco_cback;   /* Callback for eSCO events     */
382     tBTM_ESCO_PARAMS    setup;
383     tBTM_ESCO_DATA      data;           /* Connection complete information */
384     UINT8               hci_status;
385 } tBTM_ESCO_INFO;
386
387 /* Define the structure used for SCO Management
388 */
389 typedef struct
390 {
391     tBTM_ESCO_INFO   esco;              /* Current settings             */
392 #if BTM_SCO_HCI_INCLUDED == TRUE
393     BUFFER_Q         xmit_data_q;       /* SCO data transmitting queue  */
394 #endif
395     tBTM_SCO_CB     *p_conn_cb;         /* Callback for when connected  */
396     tBTM_SCO_CB     *p_disc_cb;         /* Callback for when disconnect */
397     UINT16           state;             /* The state of the SCO link    */
398     UINT16           hci_handle;        /* HCI Handle                   */
399     BOOLEAN          is_orig;           /* TRUE if the originator       */
400     BOOLEAN          rem_bd_known;      /* TRUE if remote BD addr known */
401
402 } tSCO_CONN;
403
404 /* SCO Management control block */
405 typedef struct
406 {
407     tBTM_SCO_IND_CBACK  *app_sco_ind_cb;
408 #if BTM_SCO_HCI_INCLUDED == TRUE
409     tBTM_SCO_DATA_CB     *p_data_cb;        /* Callback for SCO data over HCI */
410     UINT32               xmit_window_size; /* Total SCO window in bytes  */
411 #endif
412     tSCO_CONN            sco_db[BTM_MAX_SCO_LINKS];
413     tBTM_ESCO_PARAMS     def_esco_parms;
414     BD_ADDR              xfer_addr;
415     UINT16               sco_disc_reason;
416     BOOLEAN              esco_supported;    /* TRUE if 1.2 cntlr AND supports eSCO links */
417     tBTM_SCO_TYPE        desired_sco_mode;
418     tBTM_SCO_TYPE        xfer_sco_type;
419     tBTM_SCO_PCM_PARAM   sco_pcm_param;
420     tBTM_SCO_CODEC_TYPE  codec_in_use;      /* None, CVSD, MSBC, etc. */
421 #if BTM_SCO_HCI_INCLUDED == TRUE
422         tBTM_SCO_ROUTE_TYPE      sco_path;
423 #endif
424
425 } tSCO_CB;
426
427
428 #if BTM_SCO_INCLUDED == TRUE
429 extern void     btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
430 extern void     btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
431                                     tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
432 extern void     btm_reject_sco_link(UINT16 sco_inx );
433 extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
434 #else
435 #define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
436 #define btm_reject_sco_link(sco_inx)
437 #define btm_set_sco_ind_cback(sco_ind_cb)
438 #define btm_sco_chk_pend_rolechange(hci_handle)
439 #endif  /* BTM_SCO_INCLUDED */
440
441 /*
442 ** Define structure for Security Service Record.
443 ** A record exists for each service registered with the Security Manager
444 */
445 typedef struct
446 {
447     UINT32          mx_proto_id;        /* Service runs over this multiplexer protocol */
448     UINT32          orig_mx_chan_id;    /* Channel on the multiplexer protocol    */
449     UINT32          term_mx_chan_id;    /* Channel on the multiplexer protocol    */
450     UINT16          psm;                /* L2CAP PSM value */
451     UINT16          security_flags;     /* Bitmap of required security features */
452     UINT8           service_id;         /* Passed in authorization callback */
453 #if (L2CAP_UCD_INCLUDED == TRUE)
454     UINT16          ucd_security_flags; /* Bitmap of required security features for UCD */
455 #endif
456 #if BTM_SEC_SERVICE_NAME_LEN > 0
457     UINT8           orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
458     UINT8           term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
459 #endif
460 } tBTM_SEC_SERV_REC;
461
462 #if BLE_INCLUDED == TRUE
463 /* LE Security information of device in Slave Role */
464 typedef struct
465 {
466     BT_OCTET16          irk;            /* peer diverified identity root */
467     BT_OCTET16          ltk;            /* peer long term key */
468     BT_OCTET16          csrk;           /* peer SRK peer device used to secured sign local data  */
469
470     BT_OCTET8           rand;           /* random vector for LTK generation */
471     UINT16              ediv;           /* LTK diversifier of this slave device */
472     UINT16              div;            /* local DIV  to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1)  */
473     UINT8               sec_level;      /* local pairing security level */
474     UINT8               key_size;       /* key size of the LTK delivered to peer device */
475     UINT8               srk_sec_level;  /* security property of peer SRK for this device */
476     UINT8               local_csrk_sec_level;  /* security property of local CSRK for this device */
477
478     UINT32              counter;        /* peer sign counter for verifying rcv signed cmd */
479     UINT32              local_counter;  /* local sign counter for sending signed write cmd*/
480 }tBTM_SEC_BLE_KEYS;
481
482 typedef struct
483 {
484     tBLE_ADDR_TYPE      ble_addr_type;  /* LE device type: public or random address */
485     tBLE_ADDR_TYPE      static_addr_type;   /* static address type */
486     BD_ADDR             static_addr;    /* static address */
487 #if BLE_PRIVACY_SPT == TRUE
488     BD_ADDR             cur_rand_addr;  /* current random address */
489
490 #define BTM_BLE_ADDR_PSEUDO         0   /* address index device record */
491 #define BTM_BLE_ADDR_RRA            1   /* cur_rand_addr */
492 #define BTM_BLE_ADDR_RECONN         2   /* reconnection address */
493 #define BTM_BLE_ADDR_STATIC         3   /* static_addr  */
494     UINT8               active_addr_type;
495
496     BOOLEAN             privacy_enabled;   /* remote device privacy enabled or not */
497 #endif
498
499 #if SMP_INCLUDED == TRUE
500     tBTM_LE_KEY_TYPE    key_type;       /* bit mask of valid key types in record */
501     tBTM_SEC_BLE_KEYS   keys;           /* LE device security info in slave rode */
502 #endif
503 } tBTM_SEC_BLE;
504
505
506 #endif  /* BLE_INCLUDED */
507
508 /*
509 ** Define structure for Security Device Record.
510 ** A record exists for each device authenticated with this device
511 */
512 typedef struct
513 {
514     tBTM_SEC_SERV_REC   *p_cur_service;
515     tBTM_SEC_CALLBACK   *p_callback;
516     void                *p_ref_data;
517     UINT32               timestamp;         /* Timestamp of the last connection   */
518     UINT32               trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE];  /* Bitwise OR of trusted services     */
519     UINT16               hci_handle;        /* Handle to connection when exists   */
520     UINT16               clock_offset;      /* Latest known clock offset          */
521     BD_ADDR              bd_addr;           /* BD_ADDR of the device              */
522     DEV_CLASS            dev_class;         /* DEV_CLASS of the device            */
523     LINK_KEY             link_key;          /* Device link key                    */
524
525 #define BTM_SEC_AUTHORIZED      BTM_SEC_FLAG_AUTHORIZED     /* 0x01 */
526 #define BTM_SEC_AUTHENTICATED   BTM_SEC_FLAG_AUTHENTICATED  /* 0x02 */
527 #define BTM_SEC_ENCRYPTED       BTM_SEC_FLAG_ENCRYPTED      /* 0x04 */
528 #define BTM_SEC_NAME_KNOWN      0x08
529 #define BTM_SEC_LINK_KEY_KNOWN  BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
530 #define BTM_SEC_LINK_KEY_AUTHED 0x20
531 #define BTM_SEC_ROLE_SWITCHED   0x40
532 #define BTM_SEC_IN_USE          0x80
533     /* LE link security flag */
534 #define BTM_SEC_LE_AUTHENTICATED   0x0200       /* 0x0200 */
535 #define BTM_SEC_LE_ENCRYPTED       0x0400      /* 0x04 */
536 #define BTM_SEC_LE_NAME_KNOWN      0x0800
537 #define BTM_SEC_LE_LINK_KEY_KNOWN  0x1000       /* 0x10 */
538 #define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000
539
540     UINT16           sec_flags;          /* Current device security state      */
541
542     tBTM_BD_NAME    sec_bd_name;        /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
543     BD_FEATURES     features[HCI_EXT_FEATURES_PAGE_MAX + 1];           /* Features supported by the device */
544     UINT8           num_read_pages;
545
546 #define BTM_SEC_STATE_IDLE              0
547 #define BTM_SEC_STATE_AUTHENTICATING    1
548 #define BTM_SEC_STATE_ENCRYPTING        2
549 #define BTM_SEC_STATE_GETTING_NAME      3
550 #define BTM_SEC_STATE_AUTHORIZING       4
551 #define BTM_SEC_STATE_SWITCHING_ROLE    5
552 #define BTM_SEC_STATE_DISCONNECTING     6
553 #define BTM_SEC_STATE_DELAY_FOR_ENC     7   /* delay to check for encryption to work around controller problems */
554
555     UINT8       sec_state;              /* Operating state                    */
556     BOOLEAN     is_originator;          /* TRUE if device is originating connection */
557 #if (L2CAP_UCD_INCLUDED == TRUE)
558     BOOLEAN     is_ucd;                 /* TRUE if device is sending or receiving UCD */
559                                         /* if incoming security failed, received UCD will be discarded */
560 #endif
561     BOOLEAN     role_master;            /* TRUE if current mode is master     */
562     UINT16      security_required;      /* Security required for connection   */
563     BOOLEAN     link_key_not_sent;      /* link key notification has not been sent waiting for name */
564     UINT8       link_key_type;          /* Type of key used in pairing   */
565     BOOLEAN     link_key_changed;       /* Changed link key during current connection */
566
567 #define BTM_MAX_PRE_SM4_LKEY_TYPE   BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
568
569 #define BTM_SM4_UNKNOWN     0x00
570 #define BTM_SM4_KNOWN       0x10
571 #define BTM_SM4_TRUE        0x11
572 #define BTM_SM4_REQ_PEND    0x08        /* set this bit when getting remote features */
573 #define BTM_SM4_UPGRADE     0x04        /* set this bit when upgrading link key */
574 #define BTM_SM4_RETRY       0x02        /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
575 #define BTM_SM4_DD_ACP      0x20        /* set this bit to indicate peer initiated dedicated bonding */
576 #define BTM_SM4_CONN_PEND   0x40        /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
577     UINT8       sm4;                    /* BTM_SM4_TRUE, if the peer supports SM4 */
578     tBTM_IO_CAP rmt_io_caps;            /* IO capability of the peer device */
579     tBTM_AUTH_REQ rmt_auth_req;         /* the auth_req flag as in the IO caps rsp evt */
580
581 #if (BLE_INCLUDED == TRUE)
582     UINT16              ble_hci_handle;         /* use in DUMO connection */
583     UINT8               enc_key_size;           /* current link encryption key size */
584     tBTM_SEC_BLE        ble;
585     tBT_DEVICE_TYPE     device_type;
586     tBTM_LE_CONN_PRAMS  conn_params;
587 #endif
588
589 // btla-specific ++
590 #if BTM_DISC_DURING_RS == TRUE
591 #define BTM_SEC_RS_NOT_PENDING          0           /* Role Switch not in progress */
592 #define BTM_SEC_RS_PENDING              1           /* Role Switch in progress */
593 #define BTM_SEC_DISC_PENDING            2           /* Disconnect is pending */
594     UINT8           rs_disc_pending;
595 #endif
596 // btla-specific --
597 #define BTM_SEC_NO_LAST_SERVICE_ID      0
598     UINT8           last_author_service_id;         /* ID of last serviced authorized: Reset after each l2cap connection */
599
600 } tBTM_SEC_DEV_REC;
601
602 #define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
603 #define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
604 #define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
605
606 #define BTM_SEC_LE_MASK    (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
607
608 /*
609 ** Define device configuration structure
610 */
611 typedef struct
612 {
613 #if BTM_MAX_LOC_BD_NAME_LEN > 0
614     tBTM_LOC_BD_NAME bd_name;                    /* local Bluetooth device name */
615 #endif
616     BOOLEAN          pin_type;                   /* TRUE if PIN type is fixed */
617     UINT8            pin_code_len;               /* Bonding information */
618     PIN_CODE         pin_code;                   /* PIN CODE if pin type is fixed */
619     BOOLEAN          connectable;                /* If TRUE page scan should be enabled */
620     UINT8            def_inq_scan_mode;          /* ??? limited/general/none */
621 } tBTM_CFG;
622
623 #if BTM_PWR_MGR_INCLUDED == TRUE
624 enum
625 {
626     BTM_PM_ST_ACTIVE  = BTM_PM_STS_ACTIVE,
627     BTM_PM_ST_HOLD    = BTM_PM_STS_HOLD,
628     BTM_PM_ST_SNIFF   = BTM_PM_STS_SNIFF,
629     BTM_PM_ST_PARK    = BTM_PM_STS_PARK,
630     BTM_PM_ST_PENDING = BTM_PM_STS_PENDING
631 };
632 typedef UINT8 tBTM_PM_STATE;
633
634 enum
635 {
636     BTM_PM_SET_MODE_EVT,    /* Set power mode API is called. */
637     BTM_PM_UPDATE_EVT,
638     BTM_PM_RD_MODE_EVT     /* Read power mode API is called. */
639 };
640 typedef UINT8 tBTM_PM_EVENT;
641
642 typedef struct
643 {
644     UINT16          event;
645     UINT16          len;
646     UINT8           link_ind;
647 } tBTM_PM_MSG_DATA;
648
649 typedef struct
650 {
651     UINT8 hci_status;
652     UINT8 mode;
653     UINT16 interval;
654 } tBTM_PM_MD_CHG_DATA;
655
656 typedef struct
657 {
658     UINT8          pm_id;      /* the entity that calls SetPowerMode API */
659     tBTM_PM_PWR_MD *p_pmd;
660 } tBTM_PM_SET_MD_DATA;
661
662 typedef struct
663 {
664     void        *p_data;
665     UINT8        link_ind;
666 } tBTM_PM_SM_DATA;
667
668 typedef struct
669 {
670     tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
671     tBTM_PM_PWR_MD set_mode;  /* the mode and parameters sent down to the host controller. */
672     UINT16         interval;  /* the interval from last mode change event. */
673 #if (BTM_SSR_INCLUDED == TRUE)
674     UINT16         max_lat;   /* stored SSR maximum latency */
675     UINT16         min_rmt_to;/* stored SSR minimum remote timeout */
676     UINT16         min_loc_to;/* stored SSR minimum local timeout */
677 #endif
678     tBTM_PM_STATE  state;     /* contains the current mode of the connection */
679     BOOLEAN        chg_ind;   /* a request change indication */
680 } tBTM_PM_MCB;
681
682 #define BTM_PM_REC_NOT_USED 0
683 typedef struct
684 {
685     tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
686     UINT8                 mask; /* registered request mask. 0, if this entry is not used */
687 } tBTM_PM_RCB;
688 #endif  /* BTM_PWR_MGR_INCLUDED */
689
690 enum
691 {
692     BTM_BLI_ACL_UP_EVT,
693     BTM_BLI_ACL_DOWN_EVT,
694     BTM_BLI_PAGE_EVT,
695     BTM_BLI_PAGE_DONE_EVT,
696     BTM_BLI_INQ_EVT,
697     BTM_BLI_INQ_CANCEL_EVT,
698     BTM_BLI_INQ_DONE_EVT
699 };
700 typedef UINT8 tBTM_BLI_EVENT;
701
702 /* Pairing State */
703 enum
704 {
705     BTM_PAIR_STATE_IDLE,                        /* Idle                                         */
706     BTM_PAIR_STATE_GET_REM_NAME,                /* Getting the remote name (to check for SM4)   */
707     BTM_PAIR_STATE_WAIT_PIN_REQ,                /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
708     BTM_PAIR_STATE_WAIT_LOCAL_PIN,              /* Waiting for local PIN code                   */
709     BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM,        /* Waiting user 'yes' to numeric confirmation   */
710     BTM_PAIR_STATE_KEY_ENTRY,                   /* Key entry state (we are a keyboard)          */
711     BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP,          /* Waiting for local response to peer OOB data  */
712     BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS,           /* Waiting for local IO capabilities and OOB data */
713     BTM_PAIR_STATE_INCOMING_SSP,                /* Incoming SSP (got peer IO caps when idle)    */
714     BTM_PAIR_STATE_WAIT_AUTH_COMPLETE,          /* All done, waiting authentication cpmplete    */
715     BTM_PAIR_STATE_WAIT_DISCONNECT              /* Waiting to disconnect the ACL                */
716 };
717 typedef UINT8 tBTM_PAIRING_STATE;
718
719 #define BTM_PAIR_FLAGS_WE_STARTED_DD    0x01    /* We want to do dedicated bonding              */
720 #define BTM_PAIR_FLAGS_PEER_STARTED_DD  0x02    /* Peer initiated dedicated bonding             */
721 #define BTM_PAIR_FLAGS_DISC_WHEN_DONE   0x04    /* Disconnect when done     */
722 #define BTM_PAIR_FLAGS_PIN_REQD         0x08    /* set this bit when pin_callback is called     */
723 #define BTM_PAIR_FLAGS_PRE_FETCH_PIN    0x10    /* set this bit when pre-fetch pin     */
724 #define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20    /* set this bit when rejected incoming connection  */
725 #define BTM_PAIR_FLAGS_WE_CANCEL_DD     0x40    /* set this bit when cancelling a bonding procedure */
726 #define BTM_PAIR_FLAGS_LE_ACTIVE        0x80    /* use this bit when SMP pairing is active */
727
728
729 typedef struct
730 {
731     BOOLEAN             is_mux;
732     BD_ADDR             bd_addr;
733     UINT16              psm;
734     BOOLEAN             is_orig;
735     tBTM_SEC_CALLBACK   *p_callback;
736     void                *p_ref_data;
737     UINT32              mx_proto_id;
738     UINT32              mx_chan_id;
739 } tBTM_SEC_QUEUE_ENTRY;
740
741 #if (L2CAP_UCD_INCLUDED == TRUE)
742
743 #define CONN_ORIENT_TERM                0x00    /* incoming connection oriented */
744 #define CONN_ORIENT_ORIG                0x01    /* outgoing connection oriented */
745 #define CONNLESS_TERM                   0x02    /* incoming connectionless      */
746 #define CONNLESS_ORIG                   0x03    /* outgoing connectionless      */
747 #define CONNECTION_TYPE_ORIG_MASK       0x01    /* mask for direction           */
748 #define CONNECTION_TYPE_CONNLESS_MASK   0x02    /* mask for connectionless or not */
749 typedef UINT8 CONNECTION_TYPE;
750
751 #else
752
753 #define CONN_ORIENT_TERM                FALSE
754 #define CONN_ORIENT_ORIG                TRUE
755 typedef BOOLEAN CONNECTION_TYPE;
756
757 #endif /* (L2CAP_UCD_INCLUDED == TRUE) */
758
759 /* Define a structure to hold all the BTM data
760 */
761
762 #define BTM_STATE_BUFFER_SIZE  5                  /* size of state buffer */
763
764 #if (BTM_PCM2_INCLUDED == TRUE)
765 /* Define pcm2_action           */
766 enum
767 {
768     BTM_PCM2_ACT_NONE,
769     BTM_PCM2_ACT_SENT_ARC,
770     BTM_PCM2_READ_PARAM,
771     BTM_PCM2_WRITE_PARAM,
772 };
773 typedef UINT8 tBTM_PCM2_ACTION;
774 #endif
775
776 typedef struct
777 {
778     tBTM_CFG    cfg;                        /* Device configuration */
779
780     /****************************************************
781     **      ACL Management
782     ****************************************************/
783     tACL_CONN   acl_db[MAX_L2CAP_LINKS];
784 #if( RFCOMM_INCLUDED==TRUE)
785     UINT8       btm_scn[BTM_MAX_SCN];        /* current SCNs: TRUE if SCN is in use */
786 #endif
787     UINT16      btm_def_link_policy;
788     UINT16      btm_def_link_super_tout;
789
790 #if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
791     tBTM_BL_EVENT_MASK     bl_evt_mask;
792     tBTM_BL_CHANGE_CB     *p_bl_changed_cb;    /* Callback for when Busy Level changed */
793 #else
794     tBTM_ACL_DB_CHANGE_CB *p_acl_changed_cb;    /* Callback for when ACL DB changed */
795 #endif
796
797     tBTM_LSTO_CBACK       *p_lsto_cback;  /* for link supervision timeout change event */
798
799     /****************************************************
800     **      Power Management
801     ****************************************************/
802 #if BTM_PWR_MGR_INCLUDED == TRUE
803     tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS];   /* per ACL link */
804     tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
805     UINT8       pm_pend_link;  /* the index of acl_db, which has a pending PM cmd */
806     UINT8       pm_pend_id;    /* the id pf the module, which has a pending PM cmd */
807 #endif /* BTM_PWR_MGR_INCLUDED == TRUE */
808
809     /*****************************************************
810     **      Device control
811     *****************************************************/
812     tBTM_DEVCB  devcb;
813
814     /*****************************************************
815     **      BLE Device controllers
816     *****************************************************/
817 #if (BLE_INCLUDED == TRUE)
818     tBTM_BLE_CB             ble_ctr_cb;
819
820     UINT16                  enc_handle;
821     BT_OCTET8               enc_rand;   /* received rand value from LTK request*/
822     UINT16                  ediv;       /* received ediv value from LTK request */
823     UINT8                   key_size;
824     tBTM_BLE_VSC_CB         cmn_ble_vsc_cb;
825 #endif
826
827                                             /* Packet types supported by the local device */
828     UINT16      btm_acl_pkt_types_supported;
829     UINT16      btm_sco_pkt_types_supported;
830
831
832     /*****************************************************
833     **      Inquiry
834     *****************************************************/
835     tBTM_INQUIRY_VAR_ST     btm_inq_vars;
836
837     /*****************************************************
838     **      SCO Management
839     *****************************************************/
840 #if BTM_SCO_INCLUDED == TRUE
841     tSCO_CB             sco_cb;
842 #endif
843
844     /*****************************************************
845     **      Security Management
846     *****************************************************/
847     tBTM_APPL_INFO          api;
848
849 #define BTM_SEC_MAX_RMT_NAME_CALLBACKS  2
850     tBTM_RMT_NAME_CALLBACK  *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
851
852     tBTM_SEC_DEV_REC        *p_collided_dev_rec;
853     TIMER_LIST_ENT           sec_collision_tle;
854     UINT32                   collision_start_time;
855     UINT32                   max_collision_delay;
856     UINT32                   dev_rec_count;      /* Counter used for device record timestamp */
857     UINT8                    security_mode;
858     BOOLEAN                  pairing_disabled;
859     BOOLEAN                  connect_only_paired;
860     BOOLEAN                  security_mode_changed;  /* mode changed during bonding */
861     BOOLEAN                  pin_type_changed;       /* pin type changed during bonding */
862     BOOLEAN                  sec_req_pending;       /*   TRUE if a request is pending */
863 // btla-specific ++
864 #ifdef PORCHE_PAIRING_CONFLICT
865     UINT8                    pin_code_len_saved;     /* for legacy devices */
866 #endif
867 // btla-specific --
868
869     UINT8                    pin_code_len;  /* for legacy devices */
870     PIN_CODE                 pin_code;      /* for legacy devices */
871     tBTM_PAIRING_STATE       pairing_state; /* The current pairing state    */
872     UINT8                    pairing_flags; /* The current pairing flags    */
873     BD_ADDR                  pairing_bda;   /* The device currently pairing */
874     TIMER_LIST_ENT           pairing_tle;   /* Timer for pairing process    */
875     UINT16                   disc_handle;   /* for legacy devices */
876     UINT8                    disc_reason;   /* for legacy devices */
877     tBTM_SEC_SERV_REC        sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
878     tBTM_SEC_DEV_REC         sec_dev_rec[BTM_SEC_MAX_DEVICE_RECORDS];
879     tBTM_SEC_SERV_REC       *p_out_serv;
880     tBTM_MKEY_CALLBACK      *mkey_cback;
881
882     BD_ADDR                  connecting_bda;
883     DEV_CLASS                connecting_dc;
884
885     UINT8                   first_disabled_channel;
886     UINT8                   last_disabled_channel;
887
888     UINT8                   acl_disc_reason;
889     UINT8                   trace_level;
890 #if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
891     UINT8                   num_acl;    /* num of active ACL links */
892     UINT8                   busy_level; /* the current busy level */
893     BOOLEAN                 is_paging;  /* TRUE, if paging is in progess */
894     BOOLEAN                 is_inquiry; /* TRUE, if inquiry is in progess */
895 #endif
896     BUFFER_Q                page_queue;
897     BOOLEAN                 paging;
898     BOOLEAN                 discing;
899     BUFFER_Q                sec_pending_q;  /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
900
901 #if  (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
902     char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
903 #endif
904
905 #if (defined(BTM_PCM2_INCLUDED) && BTM_PCM2_INCLUDED == TRUE)
906     UINT16                  sys_features;
907     UINT8                   pcm2_params[BRCM_PCM2_SETUP_WRITE_SIZE];
908     tBTM_PCM2_ACTION        pcm2_action;
909 #endif
910
911 } tBTM_CB;
912
913
914 #ifdef __cplusplus
915 extern "C"
916 {
917 #endif
918
919 #if BTM_DYNAMIC_MEMORY == FALSE
920 extern tBTM_CB  btm_cb;
921 #else
922 extern tBTM_CB *btm_cb_ptr;
923 #define btm_cb (*btm_cb_ptr)
924 #endif
925
926 /* Internal functions provided by btm_main.c
927 ********************************************
928 */
929 extern void         btm_init (void);
930
931 /* Internal functions provided by btm_inq.c
932 *******************************************
933 */
934 extern tBTM_STATUS  btm_initiate_rem_name (BD_ADDR remote_bda,
935                                            tBTM_INQ_INFO *p_cur,
936                                            UINT8 origin, UINT32 timeout,
937                                            tBTM_CMPL_CB *p_cb);
938
939 extern void         btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
940                                              UINT8 hci_status);
941 extern void         btm_inq_rmt_name_failed(void);
942
943 /* Inquiry related functions */
944 extern void         btm_clr_inq_db (BD_ADDR p_bda);
945 extern void         btm_inq_db_init (void);
946 extern void         btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
947 extern void         btm_process_inq_complete (UINT8 status, UINT8 mode);
948 extern void         btm_process_cancel_complete(UINT8 status, UINT8 mode);
949 extern void         btm_event_filter_complete (UINT8 *p);
950 extern void         btm_inq_stop_on_ssp(void);
951 extern void         btm_inq_clear_ssp(void);
952 extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
953 extern BOOLEAN      btm_inq_find_bdaddr (BD_ADDR p_bda);
954
955 #if (BTM_EIR_CLIENT_INCLUDED == TRUE)
956 extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
957 #endif
958
959 /* Internal functions provided by btm_acl.c
960 ********************************************
961 */
962 extern void         btm_acl_init (void);
963 extern void         btm_acl_timeout (TIMER_LIST_ENT  *p_tle);
964 extern void         btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
965                                      UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
966 extern void         btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
967 extern void         btm_acl_device_down (void);
968 extern void         btm_acl_update_busy_level (tBTM_BLI_EVENT event);
969 extern void         btm_acl_link_key_change (UINT16 handle, UINT8 status);
970
971 extern void         btm_cont_rswitch_or_chglinkkey (tACL_CONN *p,
972                                                     tBTM_SEC_DEV_REC *p_dev_rec,
973                                                     UINT8 hci_status);
974
975 extern UINT8        btm_handle_to_acl_index (UINT16 hci_handle);
976 extern void         btm_read_link_policy_complete (UINT8 *p);
977 extern void         btm_read_rssi_complete (UINT8 *p);
978 extern void         btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble);
979 extern void         btm_read_link_quality_complete (UINT8 *p);
980 extern tBTM_STATUS  btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
981 extern void         btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
982 extern void         btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
983 extern void         btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
984 extern UINT16       btm_get_acl_disc_reason_code (void);
985 extern tBTM_STATUS  btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
986 extern void         btm_read_remote_features_complete (UINT8 *p);
987 extern void         btm_read_remote_ext_features_complete (UINT8 *p);
988 extern void         btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
989 extern void         btm_read_remote_version_complete (UINT8 *p);
990 extern void         btm_establish_continue (tACL_CONN *p_acl_cb);
991
992 // btla-specific ++
993 extern void         btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
994 // btla-specific --
995 /* Read maximum data packet that can be sent over current connection */
996 extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
997 extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
998 extern BOOLEAN    btm_acl_notif_conn_collision (BD_ADDR bda);
999
1000 #if BTM_PWR_MGR_INCLUDED == FALSE
1001 extern void         btm_process_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1002                                              UINT16 interval);
1003
1004 /* Internal functions provided by btm_pm.c
1005 ********************************************
1006 */
1007 #else
1008 extern void btm_pm_reset(void);
1009 extern void btm_pm_sm_alloc(UINT8 ind);
1010 extern void btm_pm_proc_cmd_status(UINT8 status);
1011 extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1012                                      UINT16 interval);
1013 extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
1014 #if BTM_SCO_INCLUDED == TRUE
1015 extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
1016 #else
1017 #define btm_sco_chk_pend_unpark(hci_status, hci_handle)
1018 #endif /* BTM_SCO_INCLUDED */
1019 #endif /* BTM_PWR_MGR_INCLUDED == FALSE */
1020 extern void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow);
1021
1022
1023 /* Internal functions provided by btm_sco.c
1024 ********************************************
1025 */
1026 extern void btm_sco_init (void);
1027 extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
1028                                tBTM_ESCO_DATA *p_esco_data);
1029 extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
1030                                     UINT8 retrans_window, UINT16 rx_pkt_len,
1031                                     UINT16 tx_pkt_len);
1032 extern void btm_sco_conn_req (BD_ADDR bda,  DEV_CLASS dev_class, UINT8 link_type);
1033 extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
1034 extern void btm_sco_acl_removed (BD_ADDR bda);
1035 extern void btm_route_sco_data (BT_HDR *p_msg);
1036 extern BOOLEAN btm_is_sco_active (UINT16 handle);
1037 extern void btm_remove_sco_links (BD_ADDR bda);
1038 extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
1039
1040 extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
1041 extern UINT16  btm_find_scb_by_handle (UINT16 handle);
1042 extern void btm_sco_flush_sco_data(UINT16 sco_inx);
1043
1044 /* Internal functions provided by btm_devctl.c
1045 **********************************************
1046 */
1047 extern void btm_dev_init (void);
1048 extern void btm_dev_timeout (TIMER_LIST_ENT *p_tle);
1049 extern void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len);
1050
1051 #if (BLE_INCLUDED == TRUE)
1052 extern void btm_ble_add_2_white_list_complete(UINT8 status);
1053 extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
1054 extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
1055 #endif  /* BLE_INCLUDED */
1056
1057 /* Vendor Specific Command complete evt handler */
1058 extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
1059                               tBTM_CMPL_CB *p_vsc_cplt_cback);
1060 extern void btm_inq_db_reset (void);
1061 extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
1062 extern void btm_read_stored_link_key_complete (UINT8 *p);
1063 extern void btm_write_stored_link_key_complete (UINT8 *p);
1064 extern void btm_delete_stored_link_key_complete (UINT8 *p);
1065 extern void btm_return_link_keys_evt (tBTM_RETURN_LINK_KEYS_EVT *result);
1066 extern void btm_report_device_status (tBTM_DEV_STATUS status);
1067
1068
1069 /* Internal functions provided by btm_dev.c
1070 **********************************************
1071 */
1072 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1073
1074 extern tBTM_SEC_DEV_REC  *btm_sec_alloc_dev (BD_ADDR bd_addr);
1075 extern void               btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
1076 extern tBTM_SEC_DEV_REC  *btm_find_dev (BD_ADDR bd_addr);
1077 extern tBTM_SEC_DEV_REC  *btm_find_or_alloc_dev (BD_ADDR bd_addr);
1078 extern tBTM_SEC_DEV_REC  *btm_find_dev_by_handle (UINT16 handle);
1079
1080 /* Internal functions provided by btm_sec.c
1081 **********************************************
1082 */
1083 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1084 extern tBTM_STATUS  btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
1085                                        UINT16 handle, CONNECTION_TYPE conn_type,
1086                                        tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1087 extern tBTM_STATUS  btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1088                                         UINT32 mx_proto_id, UINT32 mx_chan_id,
1089                                         tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1090 extern void  btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
1091 extern void btm_create_conn_cancel_complete (UINT8 *p);
1092 extern void btm_proc_lsto_evt(UINT16 handle, UINT16 timeout);
1093 extern void btm_read_linq_tx_power_complete (UINT8 *p);
1094
1095 extern void  btm_sec_init (UINT8 sec_mode);
1096 extern void  btm_sec_dev_reset (void);
1097 extern void  btm_sec_abort_access_req (BD_ADDR bd_addr);
1098 extern void  btm_sec_auth_complete (UINT16 handle, UINT8 status);
1099 extern void  btm_sec_mkey_comp_event (UINT16 handle, UINT8 status, UINT8 key_flg);
1100 extern void  btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1101 extern void  btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
1102 extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
1103 extern void  btm_sec_disconnected (UINT16 handle, UINT8 reason);
1104 extern void  btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
1105 extern void  btm_sec_rmt_host_support_feat_evt (UINT8 *p);
1106 extern void  btm_io_capabilities_req (UINT8 *p);
1107 extern void  btm_io_capabilities_rsp (UINT8 *p);
1108 extern void  btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
1109 extern void  btm_keypress_notif_evt (UINT8 *p);
1110 extern void  btm_simple_pair_complete (UINT8 *p);
1111 extern void  btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
1112 extern void  btm_sec_link_key_request (UINT8 *p_bda);
1113 extern void  btm_sec_pin_code_request (UINT8 *p_bda);
1114 extern void  btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
1115 extern void  btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
1116
1117 #if BLE_INCLUDED == TRUE
1118 extern void  btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC  *p_dev_rec);
1119 extern  BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT8 *p_found_idx, tBTM_SEC_DEV_REC **p_rec);
1120 extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
1121 extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
1122 #endif /* BLE_INCLUDED */
1123
1124 extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
1125
1126 #if BTM_OOB_INCLUDED == TRUE
1127 extern void  btm_rem_oob_req (UINT8 *p);
1128 extern void  btm_read_local_oob_complete (UINT8 *p);
1129 #else
1130 #define btm_rem_oob_req(p)
1131 #define btm_read_local_oob_complete(p)
1132 #endif
1133
1134 extern void  btm_acl_resubmit_page (void);
1135 extern void  btm_acl_reset_paging (void);
1136 extern void  btm_acl_paging (BT_HDR *p, BD_ADDR dest);
1137 extern void  btm_acl_set_discing (BOOLEAN discing);
1138 extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
1139 extern void  btm_sec_clr_temp_auth_service (BD_ADDR bda);
1140
1141 #ifdef __cplusplus
1142 }
1143 #endif
1144
1145 #endif