1 /******************************************************************************
3 * Copyright (C) 1999-2012 Broadcom Corporation
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
17 ******************************************************************************/
19 /******************************************************************************
21 * this file contains the main Bluetooth Manager (BTM) internal
24 ******************************************************************************/
28 #include "bt_target.h"
32 #if RFCOMM_INCLUDED == TRUE
38 #if (BLE_INCLUDED == TRUE)
39 #include "btm_ble_int.h"
40 #if (SMP_INCLUDED == TRUE)
45 #if BTM_MAX_LOC_BD_NAME_LEN > 0
46 typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
49 #define BTM_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
51 /* Definitions for Server Channel Number (SCN) management
53 #define BTM_MAX_SCN PORT_MAX_RFC_PORTS
55 /* Define masks for supported and exception 2.0 ACL packet types
57 #define BTM_ACL_SUPPORTED_PKTS_MASK (HCI_PKT_TYPES_MASK_DM1 | \
58 HCI_PKT_TYPES_MASK_DH1 | \
59 HCI_PKT_TYPES_MASK_DM3 | \
60 HCI_PKT_TYPES_MASK_DH3 | \
61 HCI_PKT_TYPES_MASK_DM5 | \
62 HCI_PKT_TYPES_MASK_DH5)
64 #define BTM_ACL_EXCEPTION_PKTS_MASK (HCI_PKT_TYPES_MASK_NO_2_DH1 | \
65 HCI_PKT_TYPES_MASK_NO_3_DH1 | \
66 HCI_PKT_TYPES_MASK_NO_2_DH3 | \
67 HCI_PKT_TYPES_MASK_NO_3_DH3 | \
68 HCI_PKT_TYPES_MASK_NO_2_DH5 | \
69 HCI_PKT_TYPES_MASK_NO_3_DH5)
71 #define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
72 HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
75 #define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
77 /* Define the ACL Management control structure
82 UINT16 pkt_types_mask;
83 UINT16 restore_pkt_types; /* when coming in/out of SCO connection restore the packet types */
90 UINT16 lmp_subversion;
91 UINT16 link_super_tout;
92 BD_FEATURES peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Peer LMP Extended features mask table for the device */
98 BOOLEAN link_up_issued; /* True if busy_level link up has been issued */
100 #define BTM_ACL_SWKEY_STATE_IDLE 0
101 #define BTM_ACL_SWKEY_STATE_MODE_CHANGE 1
102 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF 2
103 #define BTM_ACL_SWKEY_STATE_SWITCHING 3
104 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON 4
105 #define BTM_ACL_SWKEY_STATE_IN_PROGRESS 5
106 UINT8 switch_role_state;
107 UINT8 change_key_state;
109 #define BTM_ACL_ENCRYPT_STATE_IDLE 0
110 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF 1 /* encryption turning off */
111 #define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC 2 /* temporarily off for change link key or role switch */
112 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON 3 /* encryption turning on */
113 UINT8 encrypt_state; /* overall BTM encryption state */
115 #if BTM_PWR_MGR_INCLUDED == FALSE
117 #endif /* BTM_PWR_MGR_INCLUDED */
119 #if BLE_INCLUDED == TRUE
120 tBT_TRANSPORT transport;
121 BD_ADDR conn_addr; /* local device address used for this connection */
122 UINT8 conn_addr_type; /* local device address type for this connection */
123 BD_ADDR active_remote_addr; /* remote address used on this connection */
124 UINT8 active_remote_addr_type; /* local device address type for this connection */
125 BD_FEATURES peer_le_features; /* Peer LE Used features mask for the device */
131 /*****************************************************
133 ******************************************************/
134 #define TT_DEV_RESET 1
136 #define TT_DEV_RLNKP 4 /* Read Link Policy Settings */
138 /* Define the Device Management control structure
142 tBTM_DEV_STATUS_CB *p_dev_status_cb; /* Device status change callback */
143 tBTM_VS_EVT_CB *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS]; /* Register for vendor specific events */
145 tBTM_CMPL_CB *p_stored_link_key_cmpl_cb; /* Read/Write/Delete stored link key */
147 TIMER_LIST_ENT reset_timer;
149 TIMER_LIST_ENT rln_timer;
150 tBTM_CMPL_CB *p_rln_cmpl_cb; /* Callback function to be called when */
151 /* read local name function complete */
152 TIMER_LIST_ENT rlinkp_timer;
153 tBTM_CMPL_CB *p_rlinkp_cmpl_cb; /* Callback function to be called when */
154 /* read link policy function completes */
155 TIMER_LIST_ENT rssi_timer;
156 tBTM_CMPL_CB *p_rssi_cmpl_cb; /* Callback function to be called when */
157 /* read rssi function completes */
158 TIMER_LIST_ENT lnk_quality_timer;
159 tBTM_CMPL_CB *p_lnk_qual_cmpl_cb;/* Callback function to be called when */
160 /* read link quality function completes */
161 TIMER_LIST_ENT txpwer_timer;
162 tBTM_CMPL_CB *p_txpwer_cmpl_cb; /* Callback function to be called when */
163 /* read inq tx power function completes */
165 TIMER_LIST_ENT qossu_timer;
166 tBTM_CMPL_CB *p_qossu_cmpl_cb; /* Callback function to be called when */
167 /* qos setup function completes */
169 tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
170 tBTM_CMPL_CB *p_switch_role_cb; /* Callback function to be called when */
171 /* requested switch role is completed */
173 tBTM_CHANGE_KEY_CMPL chg_link_key_ref_data;
174 tBTM_CMPL_CB *p_chg_link_key_cb; /* Callback function to be called when */
175 /* change of link key is completed */
177 TIMER_LIST_ENT tx_power_timer;
178 tBTM_CMPL_CB *p_tx_power_cmpl_cb;/* Callback function to be called */
180 DEV_CLASS dev_class; /* Local device class */
182 #if BLE_INCLUDED == TRUE
184 tBTM_CMPL_CB *p_le_test_cmd_cmpl_cb; /* Callback function to be called when
185 LE test mode command has been sent successfully */
187 BD_ADDR read_tx_pwr_addr; /* read TX power target address */
189 tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
190 BT_OCTET16 er; /* BLE encryption key */
192 #define BTM_LE_SUPPORT_STATE_SIZE 8
193 UINT8 le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
197 #if BTM_BLE_CONFORMANCE_TESTING == TRUE
198 BOOLEAN no_disc_if_pair_fail;
199 BOOLEAN enable_test_mac_val;
201 BOOLEAN enable_test_local_sign_cntr;
202 UINT32 test_local_sign_cntr;
206 #endif /* BLE_INCLUDED */
208 tBTM_IO_CAP loc_io_caps; /* IO capability of the local device */
209 tBTM_AUTH_REQ loc_auth_req; /* the auth_req flag */
213 /* Define the structures and constants used for inquiry
216 /* Definitions of limits for inquiries */
217 #define BTM_PER_INQ_MIN_MAX_PERIOD HCI_PER_INQ_MIN_MAX_PERIOD
218 #define BTM_PER_INQ_MAX_MAX_PERIOD HCI_PER_INQ_MAX_MAX_PERIOD
219 #define BTM_PER_INQ_MIN_MIN_PERIOD HCI_PER_INQ_MIN_MIN_PERIOD
220 #define BTM_PER_INQ_MAX_MIN_PERIOD HCI_PER_INQ_MAX_MIN_PERIOD
221 #define BTM_MAX_INQUIRY_LENGTH HCI_MAX_INQUIRY_LENGTH
222 #define BTM_MIN_INQUIRY_LEN 0x01
224 #define BTM_MIN_INQ_TX_POWER -70
225 #define BTM_MAX_INQ_TX_POWER 20
227 #if BTM_USE_INQ_RESULTS_FILTER == TRUE
230 UINT32 inq_count; /* Used for determining if a response has already been */
231 /* received for the current inquiry operation. (We do not */
232 /* want to flood the caller with multiple responses from */
233 /* the same device. */
241 UINT32 inq_count; /* "timestamps" the entry with a particular inquiry count */
242 /* Used for determining if a response has already been */
243 /* received for the current inquiry operation. (We do not */
244 /* want to flood the caller with multiple responses from */
245 /* the same device. */
246 tBTM_INQ_INFO inq_info;
249 #if (BLE_INCLUDED == TRUE)
261 typedef UINT8 tBTM_INQ_TYPE;
265 tBTM_CMPL_CB *p_remname_cmpl_cb;
267 #define BTM_EXT_RMT_NAME_TIMEOUT 40
270 TIMER_LIST_ENT rmt_name_timer_ent;
272 UINT16 discoverable_mode;
273 UINT16 connectable_mode;
274 UINT16 page_scan_window;
275 UINT16 page_scan_period;
276 UINT16 inq_scan_window;
277 UINT16 inq_scan_period;
278 UINT16 inq_scan_type;
279 UINT16 page_scan_type; /* current page scan type */
280 tBTM_INQ_TYPE scan_type;
282 BD_ADDR remname_bda; /* Name of bd addr for active remote name request */
283 #define BTM_RMT_NAME_INACTIVE 0
284 #define BTM_RMT_NAME_EXT 0x1 /* Initiated through API */
285 #define BTM_RMT_NAME_SEC 0x2 /* Initiated internally by security manager */
286 #define BTM_RMT_NAME_INQ 0x4 /* Remote name initiated internally by inquiry */
287 BOOLEAN remname_active; /* State of a remote name request by external API */
289 tBTM_CMPL_CB *p_inq_cmpl_cb;
290 tBTM_INQ_RESULTS_CB *p_inq_results_cb;
291 tBTM_CMPL_CB *p_inq_ble_cmpl_cb; /*completion callback exclusively for LE Observe*/
292 tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
293 tBTM_CMPL_CB *p_inqfilter_cmpl_cb; /* Called (if not NULL) after inquiry filter completed */
294 UINT32 inq_counter; /* Counter incremented each time an inquiry completes */
295 /* Used for determining whether or not duplicate devices */
296 /* have responded to the same inquiry */
297 TIMER_LIST_ENT inq_timer_ent;
298 #if BTM_USE_INQ_RESULTS_FILTER == TRUE
299 tINQ_BDADDR *p_bd_db; /* Pointer to memory that holds bdaddrs */
300 UINT16 num_bd_entries; /* Number of entries in database */
301 UINT16 max_bd_entries; /* Maximum number of entries that can be stored */
303 tINQ_DB_ENT inq_db[BTM_INQ_DB_SIZE];
304 tBTM_INQ_PARMS inqparms; /* Contains the parameters for the current inquiry */
305 tBTM_INQUIRY_CMPL inq_cmpl_info; /* Status and number of responses from the last inquiry */
307 UINT16 per_min_delay; /* Current periodic minimum delay */
308 UINT16 per_max_delay; /* Current periodic maximum delay */
309 BOOLEAN inqfilt_active;
310 UINT8 pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
311 /* inquiry that has been cancelled*/
312 UINT8 inqfilt_type; /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
314 #define BTM_INQ_INACTIVE_STATE 0
315 #define BTM_INQ_CLR_FILT_STATE 1 /* Currently clearing the inquiry filter preceeding the inquiry request */
316 /* (bypassed if filtering is not used) */
317 #define BTM_INQ_SET_FILT_STATE 2 /* Sets the new filter (or turns off filtering) in this state */
318 #define BTM_INQ_ACTIVE_STATE 3 /* Actual inquiry or periodic inquiry is in progress */
319 #define BTM_INQ_REMNAME_STATE 4 /* Remote name requests are active */
321 UINT8 state; /* Current state that the inquiry process is in */
322 UINT8 inq_active; /* Bit Mask indicating type of inquiry is active */
323 BOOLEAN no_inc_ssp; /* TRUE, to stop inquiry on incoming SSP */
324 #if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
325 btm_inq_state next_state; /*interleaving state to determine next mode to be inquired*/
327 } tBTM_INQUIRY_VAR_ST;
329 /* The MSB of the clock offset field indicates that the offset is valid if TRUE */
330 #define BTM_CLOCK_OFFSET_VALID 0x8000
332 /* Define the structures needed by security management
335 #define BTM_SEC_INVALID_HANDLE 0xFFFF
337 typedef UINT8 *BTM_BD_NAME_PTR; /* Pointer to Device name */
339 /* Security callback is called by this unit when security
340 ** procedures are completed. Parameters are
341 ** BD Address of remote
342 ** Result of the operation
344 typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
346 typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
348 /* MACROs to convert from SCO packet types mask to ESCO and back */
349 #define BTM_SCO_PKT_TYPE_MASK ( HCI_PKT_TYPES_MASK_HV1 \
350 | HCI_PKT_TYPES_MASK_HV2 \
351 | HCI_PKT_TYPES_MASK_HV3)
353 /* Mask defining only the SCO types of an esco packet type */
354 #define BTM_ESCO_PKT_TYPE_MASK ( HCI_ESCO_PKT_TYPES_MASK_HV1 \
355 | HCI_ESCO_PKT_TYPES_MASK_HV2 \
356 | HCI_ESCO_PKT_TYPES_MASK_HV3)
358 #define BTM_SCO_2_ESCO(scotype) ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
359 #define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
361 /* Define masks for supported and exception 2.0 SCO packet types
363 #define BTM_SCO_SUPPORTED_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_HV1 | \
364 HCI_ESCO_PKT_TYPES_MASK_HV2 | \
365 HCI_ESCO_PKT_TYPES_MASK_HV3 | \
366 HCI_ESCO_PKT_TYPES_MASK_EV3 | \
367 HCI_ESCO_PKT_TYPES_MASK_EV4 | \
368 HCI_ESCO_PKT_TYPES_MASK_EV5)
370 #define BTM_SCO_EXCEPTION_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3 | \
371 HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3 | \
372 HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5 | \
373 HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
376 #define BTM_SCO_ROUTE_UNKNOWN 0xff
378 /* Define the structure that contains (e)SCO data */
381 tBTM_ESCO_CBACK *p_esco_cback; /* Callback for eSCO events */
382 tBTM_ESCO_PARAMS setup;
383 tBTM_ESCO_DATA data; /* Connection complete information */
387 /* Define the structure used for SCO Management
391 tBTM_ESCO_INFO esco; /* Current settings */
392 #if BTM_SCO_HCI_INCLUDED == TRUE
393 BUFFER_Q xmit_data_q; /* SCO data transmitting queue */
395 tBTM_SCO_CB *p_conn_cb; /* Callback for when connected */
396 tBTM_SCO_CB *p_disc_cb; /* Callback for when disconnect */
397 UINT16 state; /* The state of the SCO link */
398 UINT16 hci_handle; /* HCI Handle */
399 BOOLEAN is_orig; /* TRUE if the originator */
400 BOOLEAN rem_bd_known; /* TRUE if remote BD addr known */
404 /* SCO Management control block */
407 tBTM_SCO_IND_CBACK *app_sco_ind_cb;
408 #if BTM_SCO_HCI_INCLUDED == TRUE
409 tBTM_SCO_DATA_CB *p_data_cb; /* Callback for SCO data over HCI */
410 UINT32 xmit_window_size; /* Total SCO window in bytes */
412 tSCO_CONN sco_db[BTM_MAX_SCO_LINKS];
413 tBTM_ESCO_PARAMS def_esco_parms;
415 UINT16 sco_disc_reason;
416 BOOLEAN esco_supported; /* TRUE if 1.2 cntlr AND supports eSCO links */
417 tBTM_SCO_TYPE desired_sco_mode;
418 tBTM_SCO_TYPE xfer_sco_type;
419 tBTM_SCO_PCM_PARAM sco_pcm_param;
420 tBTM_SCO_CODEC_TYPE codec_in_use; /* None, CVSD, MSBC, etc. */
421 #if BTM_SCO_HCI_INCLUDED == TRUE
422 tBTM_SCO_ROUTE_TYPE sco_path;
428 #if BTM_SCO_INCLUDED == TRUE
429 extern void btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
430 extern void btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
431 tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
432 extern void btm_reject_sco_link(UINT16 sco_inx );
433 extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
435 #define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
436 #define btm_reject_sco_link(sco_inx)
437 #define btm_set_sco_ind_cback(sco_ind_cb)
438 #define btm_sco_chk_pend_rolechange(hci_handle)
439 #endif /* BTM_SCO_INCLUDED */
442 ** Define structure for Security Service Record.
443 ** A record exists for each service registered with the Security Manager
447 UINT32 mx_proto_id; /* Service runs over this multiplexer protocol */
448 UINT32 orig_mx_chan_id; /* Channel on the multiplexer protocol */
449 UINT32 term_mx_chan_id; /* Channel on the multiplexer protocol */
450 UINT16 psm; /* L2CAP PSM value */
451 UINT16 security_flags; /* Bitmap of required security features */
452 UINT8 service_id; /* Passed in authorization callback */
453 #if (L2CAP_UCD_INCLUDED == TRUE)
454 UINT16 ucd_security_flags; /* Bitmap of required security features for UCD */
456 #if BTM_SEC_SERVICE_NAME_LEN > 0
457 UINT8 orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
458 UINT8 term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
462 #if BLE_INCLUDED == TRUE
463 /* LE Security information of device in Slave Role */
466 BT_OCTET16 irk; /* peer diverified identity root */
467 BT_OCTET16 ltk; /* peer long term key */
468 BT_OCTET16 csrk; /* peer SRK peer device used to secured sign local data */
470 BT_OCTET8 rand; /* random vector for LTK generation */
471 UINT16 ediv; /* LTK diversifier of this slave device */
472 UINT16 div; /* local DIV to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1) */
473 UINT8 sec_level; /* local pairing security level */
474 UINT8 key_size; /* key size of the LTK delivered to peer device */
475 UINT8 srk_sec_level; /* security property of peer SRK for this device */
476 UINT8 local_csrk_sec_level; /* security property of local CSRK for this device */
478 UINT32 counter; /* peer sign counter for verifying rcv signed cmd */
479 UINT32 local_counter; /* local sign counter for sending signed write cmd*/
484 tBLE_ADDR_TYPE ble_addr_type; /* LE device type: public or random address */
485 tBLE_ADDR_TYPE static_addr_type; /* static address type */
486 BD_ADDR static_addr; /* static address */
487 #if BLE_PRIVACY_SPT == TRUE
488 BD_ADDR cur_rand_addr; /* current random address */
490 #define BTM_BLE_ADDR_PSEUDO 0 /* address index device record */
491 #define BTM_BLE_ADDR_RRA 1 /* cur_rand_addr */
492 #define BTM_BLE_ADDR_RECONN 2 /* reconnection address */
493 #define BTM_BLE_ADDR_STATIC 3 /* static_addr */
494 UINT8 active_addr_type;
496 BOOLEAN privacy_enabled; /* remote device privacy enabled or not */
499 #if SMP_INCLUDED == TRUE
500 tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */
501 tBTM_SEC_BLE_KEYS keys; /* LE device security info in slave rode */
506 #endif /* BLE_INCLUDED */
509 ** Define structure for Security Device Record.
510 ** A record exists for each device authenticated with this device
514 tBTM_SEC_SERV_REC *p_cur_service;
515 tBTM_SEC_CALLBACK *p_callback;
517 UINT32 timestamp; /* Timestamp of the last connection */
518 UINT32 trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE]; /* Bitwise OR of trusted services */
519 UINT16 hci_handle; /* Handle to connection when exists */
520 UINT16 clock_offset; /* Latest known clock offset */
521 BD_ADDR bd_addr; /* BD_ADDR of the device */
522 DEV_CLASS dev_class; /* DEV_CLASS of the device */
523 LINK_KEY link_key; /* Device link key */
525 #define BTM_SEC_AUTHORIZED BTM_SEC_FLAG_AUTHORIZED /* 0x01 */
526 #define BTM_SEC_AUTHENTICATED BTM_SEC_FLAG_AUTHENTICATED /* 0x02 */
527 #define BTM_SEC_ENCRYPTED BTM_SEC_FLAG_ENCRYPTED /* 0x04 */
528 #define BTM_SEC_NAME_KNOWN 0x08
529 #define BTM_SEC_LINK_KEY_KNOWN BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
530 #define BTM_SEC_LINK_KEY_AUTHED 0x20
531 #define BTM_SEC_ROLE_SWITCHED 0x40
532 #define BTM_SEC_IN_USE 0x80
533 /* LE link security flag */
534 #define BTM_SEC_LE_AUTHENTICATED 0x0200 /* 0x0200 */
535 #define BTM_SEC_LE_ENCRYPTED 0x0400 /* 0x04 */
536 #define BTM_SEC_LE_NAME_KNOWN 0x0800
537 #define BTM_SEC_LE_LINK_KEY_KNOWN 0x1000 /* 0x10 */
538 #define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000
540 UINT16 sec_flags; /* Current device security state */
542 tBTM_BD_NAME sec_bd_name; /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
543 BD_FEATURES features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Features supported by the device */
544 UINT8 num_read_pages;
546 #define BTM_SEC_STATE_IDLE 0
547 #define BTM_SEC_STATE_AUTHENTICATING 1
548 #define BTM_SEC_STATE_ENCRYPTING 2
549 #define BTM_SEC_STATE_GETTING_NAME 3
550 #define BTM_SEC_STATE_AUTHORIZING 4
551 #define BTM_SEC_STATE_SWITCHING_ROLE 5
552 #define BTM_SEC_STATE_DISCONNECTING 6
553 #define BTM_SEC_STATE_DELAY_FOR_ENC 7 /* delay to check for encryption to work around controller problems */
555 UINT8 sec_state; /* Operating state */
556 BOOLEAN is_originator; /* TRUE if device is originating connection */
557 #if (L2CAP_UCD_INCLUDED == TRUE)
558 BOOLEAN is_ucd; /* TRUE if device is sending or receiving UCD */
559 /* if incoming security failed, received UCD will be discarded */
561 BOOLEAN role_master; /* TRUE if current mode is master */
562 UINT16 security_required; /* Security required for connection */
563 BOOLEAN link_key_not_sent; /* link key notification has not been sent waiting for name */
564 UINT8 link_key_type; /* Type of key used in pairing */
565 BOOLEAN link_key_changed; /* Changed link key during current connection */
567 #define BTM_MAX_PRE_SM4_LKEY_TYPE BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
569 #define BTM_SM4_UNKNOWN 0x00
570 #define BTM_SM4_KNOWN 0x10
571 #define BTM_SM4_TRUE 0x11
572 #define BTM_SM4_REQ_PEND 0x08 /* set this bit when getting remote features */
573 #define BTM_SM4_UPGRADE 0x04 /* set this bit when upgrading link key */
574 #define BTM_SM4_RETRY 0x02 /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
575 #define BTM_SM4_DD_ACP 0x20 /* set this bit to indicate peer initiated dedicated bonding */
576 #define BTM_SM4_CONN_PEND 0x40 /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
577 UINT8 sm4; /* BTM_SM4_TRUE, if the peer supports SM4 */
578 tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */
579 tBTM_AUTH_REQ rmt_auth_req; /* the auth_req flag as in the IO caps rsp evt */
581 #if (BLE_INCLUDED == TRUE)
582 UINT16 ble_hci_handle; /* use in DUMO connection */
583 UINT8 enc_key_size; /* current link encryption key size */
585 tBT_DEVICE_TYPE device_type;
586 tBTM_LE_CONN_PRAMS conn_params;
590 #if BTM_DISC_DURING_RS == TRUE
591 #define BTM_SEC_RS_NOT_PENDING 0 /* Role Switch not in progress */
592 #define BTM_SEC_RS_PENDING 1 /* Role Switch in progress */
593 #define BTM_SEC_DISC_PENDING 2 /* Disconnect is pending */
594 UINT8 rs_disc_pending;
597 #define BTM_SEC_NO_LAST_SERVICE_ID 0
598 UINT8 last_author_service_id; /* ID of last serviced authorized: Reset after each l2cap connection */
602 #define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
603 #define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
604 #define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
606 #define BTM_SEC_LE_MASK (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
609 ** Define device configuration structure
613 #if BTM_MAX_LOC_BD_NAME_LEN > 0
614 tBTM_LOC_BD_NAME bd_name; /* local Bluetooth device name */
616 BOOLEAN pin_type; /* TRUE if PIN type is fixed */
617 UINT8 pin_code_len; /* Bonding information */
618 PIN_CODE pin_code; /* PIN CODE if pin type is fixed */
619 BOOLEAN connectable; /* If TRUE page scan should be enabled */
620 UINT8 def_inq_scan_mode; /* ??? limited/general/none */
623 #if BTM_PWR_MGR_INCLUDED == TRUE
626 BTM_PM_ST_ACTIVE = BTM_PM_STS_ACTIVE,
627 BTM_PM_ST_HOLD = BTM_PM_STS_HOLD,
628 BTM_PM_ST_SNIFF = BTM_PM_STS_SNIFF,
629 BTM_PM_ST_PARK = BTM_PM_STS_PARK,
630 BTM_PM_ST_PENDING = BTM_PM_STS_PENDING
632 typedef UINT8 tBTM_PM_STATE;
636 BTM_PM_SET_MODE_EVT, /* Set power mode API is called. */
638 BTM_PM_RD_MODE_EVT /* Read power mode API is called. */
640 typedef UINT8 tBTM_PM_EVENT;
654 } tBTM_PM_MD_CHG_DATA;
658 UINT8 pm_id; /* the entity that calls SetPowerMode API */
659 tBTM_PM_PWR_MD *p_pmd;
660 } tBTM_PM_SET_MD_DATA;
670 tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
671 tBTM_PM_PWR_MD set_mode; /* the mode and parameters sent down to the host controller. */
672 UINT16 interval; /* the interval from last mode change event. */
673 #if (BTM_SSR_INCLUDED == TRUE)
674 UINT16 max_lat; /* stored SSR maximum latency */
675 UINT16 min_rmt_to;/* stored SSR minimum remote timeout */
676 UINT16 min_loc_to;/* stored SSR minimum local timeout */
678 tBTM_PM_STATE state; /* contains the current mode of the connection */
679 BOOLEAN chg_ind; /* a request change indication */
682 #define BTM_PM_REC_NOT_USED 0
685 tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
686 UINT8 mask; /* registered request mask. 0, if this entry is not used */
688 #endif /* BTM_PWR_MGR_INCLUDED */
693 BTM_BLI_ACL_DOWN_EVT,
695 BTM_BLI_PAGE_DONE_EVT,
697 BTM_BLI_INQ_CANCEL_EVT,
700 typedef UINT8 tBTM_BLI_EVENT;
705 BTM_PAIR_STATE_IDLE, /* Idle */
706 BTM_PAIR_STATE_GET_REM_NAME, /* Getting the remote name (to check for SM4) */
707 BTM_PAIR_STATE_WAIT_PIN_REQ, /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
708 BTM_PAIR_STATE_WAIT_LOCAL_PIN, /* Waiting for local PIN code */
709 BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM, /* Waiting user 'yes' to numeric confirmation */
710 BTM_PAIR_STATE_KEY_ENTRY, /* Key entry state (we are a keyboard) */
711 BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP, /* Waiting for local response to peer OOB data */
712 BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS, /* Waiting for local IO capabilities and OOB data */
713 BTM_PAIR_STATE_INCOMING_SSP, /* Incoming SSP (got peer IO caps when idle) */
714 BTM_PAIR_STATE_WAIT_AUTH_COMPLETE, /* All done, waiting authentication cpmplete */
715 BTM_PAIR_STATE_WAIT_DISCONNECT /* Waiting to disconnect the ACL */
717 typedef UINT8 tBTM_PAIRING_STATE;
719 #define BTM_PAIR_FLAGS_WE_STARTED_DD 0x01 /* We want to do dedicated bonding */
720 #define BTM_PAIR_FLAGS_PEER_STARTED_DD 0x02 /* Peer initiated dedicated bonding */
721 #define BTM_PAIR_FLAGS_DISC_WHEN_DONE 0x04 /* Disconnect when done */
722 #define BTM_PAIR_FLAGS_PIN_REQD 0x08 /* set this bit when pin_callback is called */
723 #define BTM_PAIR_FLAGS_PRE_FETCH_PIN 0x10 /* set this bit when pre-fetch pin */
724 #define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20 /* set this bit when rejected incoming connection */
725 #define BTM_PAIR_FLAGS_WE_CANCEL_DD 0x40 /* set this bit when cancelling a bonding procedure */
726 #define BTM_PAIR_FLAGS_LE_ACTIVE 0x80 /* use this bit when SMP pairing is active */
735 tBTM_SEC_CALLBACK *p_callback;
739 } tBTM_SEC_QUEUE_ENTRY;
741 #if (L2CAP_UCD_INCLUDED == TRUE)
743 #define CONN_ORIENT_TERM 0x00 /* incoming connection oriented */
744 #define CONN_ORIENT_ORIG 0x01 /* outgoing connection oriented */
745 #define CONNLESS_TERM 0x02 /* incoming connectionless */
746 #define CONNLESS_ORIG 0x03 /* outgoing connectionless */
747 #define CONNECTION_TYPE_ORIG_MASK 0x01 /* mask for direction */
748 #define CONNECTION_TYPE_CONNLESS_MASK 0x02 /* mask for connectionless or not */
749 typedef UINT8 CONNECTION_TYPE;
753 #define CONN_ORIENT_TERM FALSE
754 #define CONN_ORIENT_ORIG TRUE
755 typedef BOOLEAN CONNECTION_TYPE;
757 #endif /* (L2CAP_UCD_INCLUDED == TRUE) */
759 /* Define a structure to hold all the BTM data
762 #define BTM_STATE_BUFFER_SIZE 5 /* size of state buffer */
764 #if (BTM_PCM2_INCLUDED == TRUE)
765 /* Define pcm2_action */
769 BTM_PCM2_ACT_SENT_ARC,
771 BTM_PCM2_WRITE_PARAM,
773 typedef UINT8 tBTM_PCM2_ACTION;
778 tBTM_CFG cfg; /* Device configuration */
780 /****************************************************
782 ****************************************************/
783 tACL_CONN acl_db[MAX_L2CAP_LINKS];
784 #if( RFCOMM_INCLUDED==TRUE)
785 UINT8 btm_scn[BTM_MAX_SCN]; /* current SCNs: TRUE if SCN is in use */
787 UINT16 btm_def_link_policy;
788 UINT16 btm_def_link_super_tout;
790 #if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
791 tBTM_BL_EVENT_MASK bl_evt_mask;
792 tBTM_BL_CHANGE_CB *p_bl_changed_cb; /* Callback for when Busy Level changed */
794 tBTM_ACL_DB_CHANGE_CB *p_acl_changed_cb; /* Callback for when ACL DB changed */
797 tBTM_LSTO_CBACK *p_lsto_cback; /* for link supervision timeout change event */
799 /****************************************************
801 ****************************************************/
802 #if BTM_PWR_MGR_INCLUDED == TRUE
803 tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS]; /* per ACL link */
804 tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
805 UINT8 pm_pend_link; /* the index of acl_db, which has a pending PM cmd */
806 UINT8 pm_pend_id; /* the id pf the module, which has a pending PM cmd */
807 #endif /* BTM_PWR_MGR_INCLUDED == TRUE */
809 /*****************************************************
811 *****************************************************/
814 /*****************************************************
815 ** BLE Device controllers
816 *****************************************************/
817 #if (BLE_INCLUDED == TRUE)
818 tBTM_BLE_CB ble_ctr_cb;
821 BT_OCTET8 enc_rand; /* received rand value from LTK request*/
822 UINT16 ediv; /* received ediv value from LTK request */
824 tBTM_BLE_VSC_CB cmn_ble_vsc_cb;
827 /* Packet types supported by the local device */
828 UINT16 btm_acl_pkt_types_supported;
829 UINT16 btm_sco_pkt_types_supported;
832 /*****************************************************
834 *****************************************************/
835 tBTM_INQUIRY_VAR_ST btm_inq_vars;
837 /*****************************************************
839 *****************************************************/
840 #if BTM_SCO_INCLUDED == TRUE
844 /*****************************************************
845 ** Security Management
846 *****************************************************/
849 #define BTM_SEC_MAX_RMT_NAME_CALLBACKS 2
850 tBTM_RMT_NAME_CALLBACK *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
852 tBTM_SEC_DEV_REC *p_collided_dev_rec;
853 TIMER_LIST_ENT sec_collision_tle;
854 UINT32 collision_start_time;
855 UINT32 max_collision_delay;
856 UINT32 dev_rec_count; /* Counter used for device record timestamp */
858 BOOLEAN pairing_disabled;
859 BOOLEAN connect_only_paired;
860 BOOLEAN security_mode_changed; /* mode changed during bonding */
861 BOOLEAN pin_type_changed; /* pin type changed during bonding */
862 BOOLEAN sec_req_pending; /* TRUE if a request is pending */
864 #ifdef PORCHE_PAIRING_CONFLICT
865 UINT8 pin_code_len_saved; /* for legacy devices */
869 UINT8 pin_code_len; /* for legacy devices */
870 PIN_CODE pin_code; /* for legacy devices */
871 tBTM_PAIRING_STATE pairing_state; /* The current pairing state */
872 UINT8 pairing_flags; /* The current pairing flags */
873 BD_ADDR pairing_bda; /* The device currently pairing */
874 TIMER_LIST_ENT pairing_tle; /* Timer for pairing process */
875 UINT16 disc_handle; /* for legacy devices */
876 UINT8 disc_reason; /* for legacy devices */
877 tBTM_SEC_SERV_REC sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
878 tBTM_SEC_DEV_REC sec_dev_rec[BTM_SEC_MAX_DEVICE_RECORDS];
879 tBTM_SEC_SERV_REC *p_out_serv;
880 tBTM_MKEY_CALLBACK *mkey_cback;
882 BD_ADDR connecting_bda;
883 DEV_CLASS connecting_dc;
885 UINT8 first_disabled_channel;
886 UINT8 last_disabled_channel;
888 UINT8 acl_disc_reason;
890 #if (defined(BTM_BUSY_LEVEL_CHANGE_INCLUDED) && BTM_BUSY_LEVEL_CHANGE_INCLUDED == TRUE)
891 UINT8 num_acl; /* num of active ACL links */
892 UINT8 busy_level; /* the current busy level */
893 BOOLEAN is_paging; /* TRUE, if paging is in progess */
894 BOOLEAN is_inquiry; /* TRUE, if inquiry is in progess */
899 BUFFER_Q sec_pending_q; /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
901 #if (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
902 char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
905 #if (defined(BTM_PCM2_INCLUDED) && BTM_PCM2_INCLUDED == TRUE)
907 UINT8 pcm2_params[BRCM_PCM2_SETUP_WRITE_SIZE];
908 tBTM_PCM2_ACTION pcm2_action;
919 #if BTM_DYNAMIC_MEMORY == FALSE
920 extern tBTM_CB btm_cb;
922 extern tBTM_CB *btm_cb_ptr;
923 #define btm_cb (*btm_cb_ptr)
926 /* Internal functions provided by btm_main.c
927 ********************************************
929 extern void btm_init (void);
931 /* Internal functions provided by btm_inq.c
932 *******************************************
934 extern tBTM_STATUS btm_initiate_rem_name (BD_ADDR remote_bda,
935 tBTM_INQ_INFO *p_cur,
936 UINT8 origin, UINT32 timeout,
939 extern void btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
941 extern void btm_inq_rmt_name_failed(void);
943 /* Inquiry related functions */
944 extern void btm_clr_inq_db (BD_ADDR p_bda);
945 extern void btm_inq_db_init (void);
946 extern void btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
947 extern void btm_process_inq_complete (UINT8 status, UINT8 mode);
948 extern void btm_process_cancel_complete(UINT8 status, UINT8 mode);
949 extern void btm_event_filter_complete (UINT8 *p);
950 extern void btm_inq_stop_on_ssp(void);
951 extern void btm_inq_clear_ssp(void);
952 extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
953 extern BOOLEAN btm_inq_find_bdaddr (BD_ADDR p_bda);
955 #if (BTM_EIR_CLIENT_INCLUDED == TRUE)
956 extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
959 /* Internal functions provided by btm_acl.c
960 ********************************************
962 extern void btm_acl_init (void);
963 extern void btm_acl_timeout (TIMER_LIST_ENT *p_tle);
964 extern void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
965 UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
966 extern void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
967 extern void btm_acl_device_down (void);
968 extern void btm_acl_update_busy_level (tBTM_BLI_EVENT event);
969 extern void btm_acl_link_key_change (UINT16 handle, UINT8 status);
971 extern void btm_cont_rswitch_or_chglinkkey (tACL_CONN *p,
972 tBTM_SEC_DEV_REC *p_dev_rec,
975 extern UINT8 btm_handle_to_acl_index (UINT16 hci_handle);
976 extern void btm_read_link_policy_complete (UINT8 *p);
977 extern void btm_read_rssi_complete (UINT8 *p);
978 extern void btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble);
979 extern void btm_read_link_quality_complete (UINT8 *p);
980 extern tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
981 extern void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
982 extern void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
983 extern void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
984 extern UINT16 btm_get_acl_disc_reason_code (void);
985 extern tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
986 extern void btm_read_remote_features_complete (UINT8 *p);
987 extern void btm_read_remote_ext_features_complete (UINT8 *p);
988 extern void btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
989 extern void btm_read_remote_version_complete (UINT8 *p);
990 extern void btm_establish_continue (tACL_CONN *p_acl_cb);
993 extern void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
995 /* Read maximum data packet that can be sent over current connection */
996 extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
997 extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
998 extern BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda);
1000 #if BTM_PWR_MGR_INCLUDED == FALSE
1001 extern void btm_process_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1004 /* Internal functions provided by btm_pm.c
1005 ********************************************
1008 extern void btm_pm_reset(void);
1009 extern void btm_pm_sm_alloc(UINT8 ind);
1010 extern void btm_pm_proc_cmd_status(UINT8 status);
1011 extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
1013 extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
1014 #if BTM_SCO_INCLUDED == TRUE
1015 extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
1017 #define btm_sco_chk_pend_unpark(hci_status, hci_handle)
1018 #endif /* BTM_SCO_INCLUDED */
1019 #endif /* BTM_PWR_MGR_INCLUDED == FALSE */
1020 extern void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow);
1023 /* Internal functions provided by btm_sco.c
1024 ********************************************
1026 extern void btm_sco_init (void);
1027 extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
1028 tBTM_ESCO_DATA *p_esco_data);
1029 extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
1030 UINT8 retrans_window, UINT16 rx_pkt_len,
1032 extern void btm_sco_conn_req (BD_ADDR bda, DEV_CLASS dev_class, UINT8 link_type);
1033 extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
1034 extern void btm_sco_acl_removed (BD_ADDR bda);
1035 extern void btm_route_sco_data (BT_HDR *p_msg);
1036 extern BOOLEAN btm_is_sco_active (UINT16 handle);
1037 extern void btm_remove_sco_links (BD_ADDR bda);
1038 extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
1040 extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
1041 extern UINT16 btm_find_scb_by_handle (UINT16 handle);
1042 extern void btm_sco_flush_sco_data(UINT16 sco_inx);
1044 /* Internal functions provided by btm_devctl.c
1045 **********************************************
1047 extern void btm_dev_init (void);
1048 extern void btm_dev_timeout (TIMER_LIST_ENT *p_tle);
1049 extern void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len);
1051 #if (BLE_INCLUDED == TRUE)
1052 extern void btm_ble_add_2_white_list_complete(UINT8 status);
1053 extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
1054 extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
1055 #endif /* BLE_INCLUDED */
1057 /* Vendor Specific Command complete evt handler */
1058 extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
1059 tBTM_CMPL_CB *p_vsc_cplt_cback);
1060 extern void btm_inq_db_reset (void);
1061 extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
1062 extern void btm_read_stored_link_key_complete (UINT8 *p);
1063 extern void btm_write_stored_link_key_complete (UINT8 *p);
1064 extern void btm_delete_stored_link_key_complete (UINT8 *p);
1065 extern void btm_return_link_keys_evt (tBTM_RETURN_LINK_KEYS_EVT *result);
1066 extern void btm_report_device_status (tBTM_DEV_STATUS status);
1069 /* Internal functions provided by btm_dev.c
1070 **********************************************
1072 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1074 extern tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr);
1075 extern void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
1076 extern tBTM_SEC_DEV_REC *btm_find_dev (BD_ADDR bd_addr);
1077 extern tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr);
1078 extern tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle);
1080 /* Internal functions provided by btm_sec.c
1081 **********************************************
1083 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
1084 extern tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
1085 UINT16 handle, CONNECTION_TYPE conn_type,
1086 tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1087 extern tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
1088 UINT32 mx_proto_id, UINT32 mx_chan_id,
1089 tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
1090 extern void btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
1091 extern void btm_create_conn_cancel_complete (UINT8 *p);
1092 extern void btm_proc_lsto_evt(UINT16 handle, UINT16 timeout);
1093 extern void btm_read_linq_tx_power_complete (UINT8 *p);
1095 extern void btm_sec_init (UINT8 sec_mode);
1096 extern void btm_sec_dev_reset (void);
1097 extern void btm_sec_abort_access_req (BD_ADDR bd_addr);
1098 extern void btm_sec_auth_complete (UINT16 handle, UINT8 status);
1099 extern void btm_sec_mkey_comp_event (UINT16 handle, UINT8 status, UINT8 key_flg);
1100 extern void btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
1101 extern void btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
1102 extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
1103 extern void btm_sec_disconnected (UINT16 handle, UINT8 reason);
1104 extern void btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
1105 extern void btm_sec_rmt_host_support_feat_evt (UINT8 *p);
1106 extern void btm_io_capabilities_req (UINT8 *p);
1107 extern void btm_io_capabilities_rsp (UINT8 *p);
1108 extern void btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
1109 extern void btm_keypress_notif_evt (UINT8 *p);
1110 extern void btm_simple_pair_complete (UINT8 *p);
1111 extern void btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
1112 extern void btm_sec_link_key_request (UINT8 *p_bda);
1113 extern void btm_sec_pin_code_request (UINT8 *p_bda);
1114 extern void btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
1115 extern void btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
1117 #if BLE_INCLUDED == TRUE
1118 extern void btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC *p_dev_rec);
1119 extern BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT8 *p_found_idx, tBTM_SEC_DEV_REC **p_rec);
1120 extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
1121 extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
1122 #endif /* BLE_INCLUDED */
1124 extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
1126 #if BTM_OOB_INCLUDED == TRUE
1127 extern void btm_rem_oob_req (UINT8 *p);
1128 extern void btm_read_local_oob_complete (UINT8 *p);
1130 #define btm_rem_oob_req(p)
1131 #define btm_read_local_oob_complete(p)
1134 extern void btm_acl_resubmit_page (void);
1135 extern void btm_acl_reset_paging (void);
1136 extern void btm_acl_paging (BT_HDR *p, BD_ADDR dest);
1137 extern void btm_acl_set_discing (BOOLEAN discing);
1138 extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
1139 extern void btm_sec_clr_temp_auth_service (BD_ADDR bda);