#ifndef BTM_INT_H
#define BTM_INT_H
-#include "bt_target.h"
#include "bt_common.h"
+#include "bt_target.h"
#include "hcidefs.h"
-#include "rfcdefs.h"
#include "osi/include/alarm.h"
-#include "osi/include/list.h"
#include "osi/include/fixed_queue.h"
+#include "osi/include/list.h"
+#include "rfcdefs.h"
#include "btm_api.h"
+#include "device/include/esco_parameters.h"
-#if (BLE_INCLUDED == TRUE)
#include "btm_ble_int.h"
-#if (SMP_INCLUDED == TRUE)
+#include "btm_int_types.h"
#include "smp_api.h"
-#endif
-#endif
-
-#if BTM_MAX_LOC_BD_NAME_LEN > 0
-typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
-#endif
-
-#define BTM_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
-
-/* Definitions for Server Channel Number (SCN) management
-*/
-#define BTM_MAX_SCN PORT_MAX_RFC_PORTS
-
-/* Define masks for supported and exception 2.0 ACL packet types
-*/
-#define BTM_ACL_SUPPORTED_PKTS_MASK (HCI_PKT_TYPES_MASK_DM1 | \
- HCI_PKT_TYPES_MASK_DH1 | \
- HCI_PKT_TYPES_MASK_DM3 | \
- HCI_PKT_TYPES_MASK_DH3 | \
- HCI_PKT_TYPES_MASK_DM5 | \
- HCI_PKT_TYPES_MASK_DH5)
-
-#define BTM_ACL_EXCEPTION_PKTS_MASK (HCI_PKT_TYPES_MASK_NO_2_DH1 | \
- HCI_PKT_TYPES_MASK_NO_3_DH1 | \
- HCI_PKT_TYPES_MASK_NO_2_DH3 | \
- HCI_PKT_TYPES_MASK_NO_3_DH3 | \
- HCI_PKT_TYPES_MASK_NO_2_DH5 | \
- HCI_PKT_TYPES_MASK_NO_3_DH5)
-
-#define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
- HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
- ? TRUE : FALSE)
-
-#define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
-
-/* Define the ACL Management control structure
-*/
-typedef struct
-{
- UINT16 hci_handle;
- UINT16 pkt_types_mask;
- UINT16 clock_offset;
- BD_ADDR remote_addr;
- DEV_CLASS remote_dc;
- BD_NAME remote_name;
-
- UINT16 manufacturer;
- UINT16 lmp_subversion;
- UINT16 link_super_tout;
- BD_FEATURES peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Peer LMP Extended features mask table for the device */
- UINT8 num_read_pages;
- UINT8 lmp_version;
-
- BOOLEAN in_use;
- UINT8 link_role;
- BOOLEAN link_up_issued; /* True if busy_level link up has been issued */
-
-#define BTM_ACL_SWKEY_STATE_IDLE 0
-#define BTM_ACL_SWKEY_STATE_MODE_CHANGE 1
-#define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF 2
-#define BTM_ACL_SWKEY_STATE_SWITCHING 3
-#define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON 4
-#define BTM_ACL_SWKEY_STATE_IN_PROGRESS 5
- UINT8 switch_role_state;
-
-#define BTM_ACL_ENCRYPT_STATE_IDLE 0
-#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF 1 /* encryption turning off */
-#define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC 2 /* temporarily off for change link key or role switch */
-#define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON 3 /* encryption turning on */
- UINT8 encrypt_state; /* overall BTM encryption state */
-
-#if BLE_INCLUDED == TRUE
- tBT_TRANSPORT transport;
- BD_ADDR conn_addr; /* local device address used for this connection */
- UINT8 conn_addr_type; /* local device address type for this connection */
- BD_ADDR active_remote_addr; /* remote address used on this connection */
- UINT8 active_remote_addr_type; /* local device address type for this connection */
- BD_FEATURES peer_le_features; /* Peer LE Used features mask for the device */
-
-#endif
-
-} tACL_CONN;
-
-/* Define the Device Management control structure
-*/
-typedef struct
-{
- tBTM_DEV_STATUS_CB *p_dev_status_cb; /* Device status change callback */
- tBTM_VS_EVT_CB *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS]; /* Register for vendor specific events */
-
- tBTM_CMPL_CB *p_stored_link_key_cmpl_cb; /* Read/Write/Delete stored link key */
-
- alarm_t *read_local_name_timer; /* Read local name timer */
- tBTM_CMPL_CB *p_rln_cmpl_cb; /* Callback function to be called when */
- /* read local name function complete */
- alarm_t *read_rssi_timer; /* Read RSSI timer */
- tBTM_CMPL_CB *p_rssi_cmpl_cb; /* Callback function to be called when */
- /* read RSSI function completes */
- alarm_t *read_link_quality_timer;
- tBTM_CMPL_CB *p_link_qual_cmpl_cb; /* Callback function to be called when */
- /* read link quality function completes */
-
- alarm_t *read_inq_tx_power_timer;
- tBTM_CMPL_CB *p_inq_tx_power_cmpl_cb; /* Callback function to be called when */
- /* read inq tx power function completes */
-
- alarm_t *qos_setup_timer; /* QoS setup timer */
- tBTM_CMPL_CB *p_qos_setup_cmpl_cb; /* Callback function to be called when */
- /* qos setup function completes */
-
- tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
- tBTM_CMPL_CB *p_switch_role_cb; /* Callback function to be called when */
- /* requested switch role is completed */
-
- alarm_t *read_tx_power_timer; /* Read tx power timer */
- tBTM_CMPL_CB *p_tx_power_cmpl_cb;/* Callback function to be called */
-
- DEV_CLASS dev_class; /* Local device class */
-
-#if BLE_INCLUDED == TRUE
-
- tBTM_CMPL_CB *p_le_test_cmd_cmpl_cb; /* Callback function to be called when
- LE test mode command has been sent successfully */
-
- BD_ADDR read_tx_pwr_addr; /* read TX power target address */
-
-#define BTM_LE_SUPPORT_STATE_SIZE 8
-UINT8 le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
-
-tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
-BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */
-
-#if BTM_BLE_CONFORMANCE_TESTING == TRUE
- BOOLEAN no_disc_if_pair_fail;
- BOOLEAN enable_test_mac_val;
- BT_OCTET8 test_mac;
- BOOLEAN enable_test_local_sign_cntr;
- UINT32 test_local_sign_cntr;
-#endif
-
-#endif /* BLE_INCLUDED */
-
- tBTM_IO_CAP loc_io_caps; /* IO capability of the local device */
- tBTM_AUTH_REQ loc_auth_req; /* the auth_req flag */
- BOOLEAN secure_connections_only; /* Rejects service level 0 connections if */
- /* itself or peer device doesn't support */
- /* secure connections */
-} tBTM_DEVCB;
-
-
-/* Define the structures and constants used for inquiry
-*/
-
-/* Definitions of limits for inquiries */
-#define BTM_PER_INQ_MIN_MAX_PERIOD HCI_PER_INQ_MIN_MAX_PERIOD
-#define BTM_PER_INQ_MAX_MAX_PERIOD HCI_PER_INQ_MAX_MAX_PERIOD
-#define BTM_PER_INQ_MIN_MIN_PERIOD HCI_PER_INQ_MIN_MIN_PERIOD
-#define BTM_PER_INQ_MAX_MIN_PERIOD HCI_PER_INQ_MAX_MIN_PERIOD
-#define BTM_MAX_INQUIRY_LENGTH HCI_MAX_INQUIRY_LENGTH
-#define BTM_MIN_INQUIRY_LEN 0x01
-
-#define BTM_MIN_INQ_TX_POWER -70
-#define BTM_MAX_INQ_TX_POWER 20
-
-typedef struct
-{
- UINT32 inq_count; /* Used for determining if a response has already been */
- /* received for the current inquiry operation. (We do not */
- /* want to flood the caller with multiple responses from */
- /* the same device. */
- BD_ADDR bd_addr;
-} tINQ_BDADDR;
-
-typedef struct
-{
- UINT32 time_of_resp;
- UINT32 inq_count; /* "timestamps" the entry with a particular inquiry count */
- /* Used for determining if a response has already been */
- /* received for the current inquiry operation. (We do not */
- /* want to flood the caller with multiple responses from */
- /* the same device. */
- tBTM_INQ_INFO inq_info;
- BOOLEAN in_use;
-
-#if (BLE_INCLUDED == TRUE)
- BOOLEAN scan_rsp;
-#endif
-} tINQ_DB_ENT;
-
-
-enum
-{
- INQ_NONE,
- INQ_LE_OBSERVE,
- INQ_GENERAL
-};
-typedef UINT8 tBTM_INQ_TYPE;
-
-typedef struct
-{
- tBTM_CMPL_CB *p_remname_cmpl_cb;
-
-#define BTM_EXT_RMT_NAME_TIMEOUT_MS (40 * 1000) /* 40 seconds */
-
-
- alarm_t *remote_name_timer;
-
- UINT16 discoverable_mode;
- UINT16 connectable_mode;
- UINT16 page_scan_window;
- UINT16 page_scan_period;
- UINT16 inq_scan_window;
- UINT16 inq_scan_period;
- UINT16 inq_scan_type;
- UINT16 page_scan_type; /* current page scan type */
- tBTM_INQ_TYPE scan_type;
-
- BD_ADDR remname_bda; /* Name of bd addr for active remote name request */
-#define BTM_RMT_NAME_INACTIVE 0
-#define BTM_RMT_NAME_EXT 0x1 /* Initiated through API */
-#define BTM_RMT_NAME_SEC 0x2 /* Initiated internally by security manager */
-#define BTM_RMT_NAME_INQ 0x4 /* Remote name initiated internally by inquiry */
- BOOLEAN remname_active; /* State of a remote name request by external API */
-
- tBTM_CMPL_CB *p_inq_cmpl_cb;
- tBTM_INQ_RESULTS_CB *p_inq_results_cb;
- tBTM_CMPL_CB *p_inq_ble_cmpl_cb; /*completion callback exclusively for LE Observe*/
- tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
- tBTM_CMPL_CB *p_inqfilter_cmpl_cb; /* Called (if not NULL) after inquiry filter completed */
- UINT32 inq_counter; /* Counter incremented each time an inquiry completes */
- /* Used for determining whether or not duplicate devices */
- /* have responded to the same inquiry */
- tINQ_BDADDR *p_bd_db; /* Pointer to memory that holds bdaddrs */
- UINT16 num_bd_entries; /* Number of entries in database */
- UINT16 max_bd_entries; /* Maximum number of entries that can be stored */
- tINQ_DB_ENT inq_db[BTM_INQ_DB_SIZE];
- tBTM_INQ_PARMS inqparms; /* Contains the parameters for the current inquiry */
- tBTM_INQUIRY_CMPL inq_cmpl_info; /* Status and number of responses from the last inquiry */
-
- UINT16 per_min_delay; /* Current periodic minimum delay */
- UINT16 per_max_delay; /* Current periodic maximum delay */
- BOOLEAN inqfilt_active;
- UINT8 pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
- /* inquiry that has been cancelled*/
- UINT8 inqfilt_type; /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
-
-#define BTM_INQ_INACTIVE_STATE 0
-#define BTM_INQ_CLR_FILT_STATE 1 /* Currently clearing the inquiry filter preceeding the inquiry request */
- /* (bypassed if filtering is not used) */
-#define BTM_INQ_SET_FILT_STATE 2 /* Sets the new filter (or turns off filtering) in this state */
-#define BTM_INQ_ACTIVE_STATE 3 /* Actual inquiry or periodic inquiry is in progress */
-#define BTM_INQ_REMNAME_STATE 4 /* Remote name requests are active */
-
- UINT8 state; /* Current state that the inquiry process is in */
- UINT8 inq_active; /* Bit Mask indicating type of inquiry is active */
- BOOLEAN no_inc_ssp; /* TRUE, to stop inquiry on incoming SSP */
-#if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
- btm_inq_state next_state; /*interleaving state to determine next mode to be inquired*/
-#endif
-} tBTM_INQUIRY_VAR_ST;
-
-/* The MSB of the clock offset field indicates that the offset is valid if TRUE */
-#define BTM_CLOCK_OFFSET_VALID 0x8000
-
-/* Define the structures needed by security management
-*/
-
-#define BTM_SEC_INVALID_HANDLE 0xFFFF
-
-typedef UINT8 *BTM_BD_NAME_PTR; /* Pointer to Device name */
-
-/* Security callback is called by this unit when security
-** procedures are completed. Parameters are
-** BD Address of remote
-** Result of the operation
-*/
-typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
-
-typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
-
-/* MACROs to convert from SCO packet types mask to ESCO and back */
-#define BTM_SCO_PKT_TYPE_MASK ( HCI_PKT_TYPES_MASK_HV1 \
- | HCI_PKT_TYPES_MASK_HV2 \
- | HCI_PKT_TYPES_MASK_HV3)
-
-/* Mask defining only the SCO types of an esco packet type */
-#define BTM_ESCO_PKT_TYPE_MASK ( HCI_ESCO_PKT_TYPES_MASK_HV1 \
- | HCI_ESCO_PKT_TYPES_MASK_HV2 \
- | HCI_ESCO_PKT_TYPES_MASK_HV3)
-
-#define BTM_SCO_2_ESCO(scotype) ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
-#define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
-
-/* Define masks for supported and exception 2.0 SCO packet types
-*/
-#define BTM_SCO_SUPPORTED_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_HV1 | \
- HCI_ESCO_PKT_TYPES_MASK_HV2 | \
- HCI_ESCO_PKT_TYPES_MASK_HV3 | \
- HCI_ESCO_PKT_TYPES_MASK_EV3 | \
- HCI_ESCO_PKT_TYPES_MASK_EV4 | \
- HCI_ESCO_PKT_TYPES_MASK_EV5)
-
-#define BTM_SCO_EXCEPTION_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3 | \
- HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3 | \
- HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5 | \
- HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
-
-
-#define BTM_SCO_ROUTE_UNKNOWN 0xff
-
-/* Define the structure that contains (e)SCO data */
-typedef struct
-{
- tBTM_ESCO_CBACK *p_esco_cback; /* Callback for eSCO events */
- tBTM_ESCO_PARAMS setup;
- tBTM_ESCO_DATA data; /* Connection complete information */
- UINT8 hci_status;
-} tBTM_ESCO_INFO;
-
-/* Define the structure used for SCO Management
-*/
-typedef struct
-{
- tBTM_ESCO_INFO esco; /* Current settings */
-#if BTM_SCO_HCI_INCLUDED == TRUE
- fixed_queue_t *xmit_data_q; /* SCO data transmitting queue */
-#endif
- tBTM_SCO_CB *p_conn_cb; /* Callback for when connected */
- tBTM_SCO_CB *p_disc_cb; /* Callback for when disconnect */
- UINT16 state; /* The state of the SCO link */
- UINT16 hci_handle; /* HCI Handle */
- BOOLEAN is_orig; /* TRUE if the originator */
- BOOLEAN rem_bd_known; /* TRUE if remote BD addr known */
-
-} tSCO_CONN;
-
-/* SCO Management control block */
-typedef struct
-{
- tBTM_SCO_IND_CBACK *app_sco_ind_cb;
-#if BTM_SCO_HCI_INCLUDED == TRUE
- tBTM_SCO_DATA_CB *p_data_cb; /* Callback for SCO data over HCI */
- UINT32 xmit_window_size; /* Total SCO window in bytes */
-#endif
- tSCO_CONN sco_db[BTM_MAX_SCO_LINKS];
- tBTM_ESCO_PARAMS def_esco_parms;
- BD_ADDR xfer_addr;
- UINT16 sco_disc_reason;
- BOOLEAN esco_supported; /* TRUE if 1.2 cntlr AND supports eSCO links */
- tBTM_SCO_TYPE desired_sco_mode;
- tBTM_SCO_TYPE xfer_sco_type;
- tBTM_SCO_PCM_PARAM sco_pcm_param;
- tBTM_SCO_CODEC_TYPE codec_in_use; /* None, CVSD, MSBC, etc. */
-#if BTM_SCO_HCI_INCLUDED == TRUE
- tBTM_SCO_ROUTE_TYPE sco_path;
-#endif
-
-} tSCO_CB;
-
-
-#if BTM_SCO_INCLUDED == TRUE
-extern void btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
-extern void btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
- tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
-extern void btm_reject_sco_link(UINT16 sco_inx );
-extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
-extern void btm_sco_disc_chk_pend_for_modechange (UINT16 hci_handle);
-
-#else
-#define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
-#define btm_reject_sco_link(sco_inx)
-#define btm_set_sco_ind_cback(sco_ind_cb)
-#define btm_sco_chk_pend_rolechange(hci_handle)
-#endif /* BTM_SCO_INCLUDED */
-
-/*
-** Define structure for Security Service Record.
-** A record exists for each service registered with the Security Manager
-*/
-#define BTM_SEC_OUT_FLAGS (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHORIZE)
-#define BTM_SEC_IN_FLAGS (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHORIZE)
-
-#define BTM_SEC_OUT_LEVEL4_FLAGS (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | \
- BTM_SEC_OUT_MITM | BTM_SEC_MODE4_LEVEL4)
-
-#define BTM_SEC_IN_LEVEL4_FLAGS (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | \
- BTM_SEC_IN_MITM | BTM_SEC_MODE4_LEVEL4)
-typedef struct
-{
- UINT32 mx_proto_id; /* Service runs over this multiplexer protocol */
- UINT32 orig_mx_chan_id; /* Channel on the multiplexer protocol */
- UINT32 term_mx_chan_id; /* Channel on the multiplexer protocol */
- UINT16 psm; /* L2CAP PSM value */
- UINT16 security_flags; /* Bitmap of required security features */
- UINT8 service_id; /* Passed in authorization callback */
-#if (L2CAP_UCD_INCLUDED == TRUE)
- UINT16 ucd_security_flags; /* Bitmap of required security features for UCD */
-#endif
-#if BTM_SEC_SERVICE_NAME_LEN > 0
- UINT8 orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
- UINT8 term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
-#endif
-} tBTM_SEC_SERV_REC;
-
-#if BLE_INCLUDED == TRUE
-/* LE Security information of device in Slave Role */
-typedef struct
-{
- BT_OCTET16 irk; /* peer diverified identity root */
- BT_OCTET16 pltk; /* peer long term key */
- BT_OCTET16 pcsrk; /* peer SRK peer device used to secured sign local data */
-
- BT_OCTET16 lltk; /* local long term key */
- BT_OCTET16 lcsrk; /* local SRK peer device used to secured sign local data */
-
- BT_OCTET8 rand; /* random vector for LTK generation */
- UINT16 ediv; /* LTK diversifier of this slave device */
- UINT16 div; /* local DIV to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1) */
- UINT8 sec_level; /* local pairing security level */
- UINT8 key_size; /* key size of the LTK delivered to peer device */
- UINT8 srk_sec_level; /* security property of peer SRK for this device */
- UINT8 local_csrk_sec_level; /* security property of local CSRK for this device */
- UINT32 counter; /* peer sign counter for verifying rcv signed cmd */
- UINT32 local_counter; /* local sign counter for sending signed write cmd*/
-}tBTM_SEC_BLE_KEYS;
+extern tBTM_CB btm_cb;
-typedef struct
-{
- BD_ADDR pseudo_addr; /* LE pseudo address of the device if different from device address */
- tBLE_ADDR_TYPE ble_addr_type; /* LE device type: public or random address */
- tBLE_ADDR_TYPE static_addr_type; /* static address type */
- BD_ADDR static_addr; /* static address */
-
-#define BTM_WHITE_LIST_BIT 0x01
-#define BTM_RESOLVING_LIST_BIT 0x02
- UINT8 in_controller_list; /* in controller resolving list or not */
- UINT8 resolving_list_index;
-#if BLE_PRIVACY_SPT == TRUE
- BD_ADDR cur_rand_addr; /* current random address */
-
-#define BTM_BLE_ADDR_PSEUDO 0 /* address index device record */
-#define BTM_BLE_ADDR_RRA 1 /* cur_rand_addr */
-#define BTM_BLE_ADDR_STATIC 2 /* static_addr */
- UINT8 active_addr_type;
-#endif
-
-#if SMP_INCLUDED == TRUE
- tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */
- tBTM_SEC_BLE_KEYS keys; /* LE device security info in slave rode */
-#endif
-} tBTM_SEC_BLE;
-
-
-#endif /* BLE_INCLUDED */
-
-/* Peering bond type */
-enum
-{
- BOND_TYPE_UNKNOWN,
- BOND_TYPE_PERSISTENT,
- BOND_TYPE_TEMPORARY
-};
-typedef UINT8 tBTM_BOND_TYPE;
-
-/*
-** Define structure for Security Device Record.
-** A record exists for each device authenticated with this device
-*/
-typedef struct
-{
- tBTM_SEC_SERV_REC *p_cur_service;
- tBTM_SEC_CALLBACK *p_callback;
- void *p_ref_data;
- UINT32 timestamp; /* Timestamp of the last connection */
- UINT32 trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE]; /* Bitwise OR of trusted services */
- UINT16 hci_handle; /* Handle to connection when exists */
- UINT16 clock_offset; /* Latest known clock offset */
- BD_ADDR bd_addr; /* BD_ADDR of the device */
- DEV_CLASS dev_class; /* DEV_CLASS of the device */
- LINK_KEY link_key; /* Device link key */
- UINT8 pin_code_length; /* Length of the pin_code used for paring */
-
-#define BTM_SEC_AUTHORIZED BTM_SEC_FLAG_AUTHORIZED /* 0x01 */
-#define BTM_SEC_AUTHENTICATED BTM_SEC_FLAG_AUTHENTICATED /* 0x02 */
-#define BTM_SEC_ENCRYPTED BTM_SEC_FLAG_ENCRYPTED /* 0x04 */
-#define BTM_SEC_NAME_KNOWN 0x08
-#define BTM_SEC_LINK_KEY_KNOWN BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
-#define BTM_SEC_LINK_KEY_AUTHED BTM_SEC_FLAG_LKEY_AUTHED /* 0x20 */
-#define BTM_SEC_ROLE_SWITCHED 0x40
-#define BTM_SEC_IN_USE 0x80
- /* LE link security flag */
-#define BTM_SEC_LE_AUTHENTICATED 0x0200 /* LE link is encrypted after pairing with MITM */
-#define BTM_SEC_LE_ENCRYPTED 0x0400 /* LE link is encrypted */
-#define BTM_SEC_LE_NAME_KNOWN 0x0800 /* not used */
-#define BTM_SEC_LE_LINK_KEY_KNOWN 0x1000 /* bonded with peer (peer LTK and/or SRK is saved) */
-#define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000 /* pairing is done with MITM */
-#define BTM_SEC_16_DIGIT_PIN_AUTHED 0x4000 /* pairing is done with 16 digit pin */
-
- UINT16 sec_flags; /* Current device security state */
-
- tBTM_BD_NAME sec_bd_name; /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
- BD_FEATURES features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Features supported by the device */
- UINT8 num_read_pages;
-
-#define BTM_SEC_STATE_IDLE 0
-#define BTM_SEC_STATE_AUTHENTICATING 1
-#define BTM_SEC_STATE_ENCRYPTING 2
-#define BTM_SEC_STATE_GETTING_NAME 3
-#define BTM_SEC_STATE_AUTHORIZING 4
-#define BTM_SEC_STATE_SWITCHING_ROLE 5
-#define BTM_SEC_STATE_DISCONNECTING 6 /* disconnecting BR/EDR */
-#define BTM_SEC_STATE_DELAY_FOR_ENC 7 /* delay to check for encryption to work around */
- /* controller problems */
-#define BTM_SEC_STATE_DISCONNECTING_BLE 8 /* disconnecting BLE */
-#define BTM_SEC_STATE_DISCONNECTING_BOTH 9 /* disconnecting BR/EDR and BLE */
-
- UINT8 sec_state; /* Operating state */
- BOOLEAN is_originator; /* TRUE if device is originating connection */
-#if (L2CAP_UCD_INCLUDED == TRUE)
- BOOLEAN is_ucd; /* TRUE if device is sending or receiving UCD */
- /* if incoming security failed, received UCD will be discarded */
-#endif
- BOOLEAN role_master; /* TRUE if current mode is master */
- UINT16 security_required; /* Security required for connection */
- BOOLEAN link_key_not_sent; /* link key notification has not been sent waiting for name */
- UINT8 link_key_type; /* Type of key used in pairing */
- BOOLEAN link_key_changed; /* Changed link key during current connection */
-
-#define BTM_MAX_PRE_SM4_LKEY_TYPE BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
-
-#define BTM_SM4_UNKNOWN 0x00
-#define BTM_SM4_KNOWN 0x10
-#define BTM_SM4_TRUE 0x11
-#define BTM_SM4_REQ_PEND 0x08 /* set this bit when getting remote features */
-#define BTM_SM4_UPGRADE 0x04 /* set this bit when upgrading link key */
-#define BTM_SM4_RETRY 0x02 /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
-#define BTM_SM4_DD_ACP 0x20 /* set this bit to indicate peer initiated dedicated bonding */
-#define BTM_SM4_CONN_PEND 0x40 /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
- UINT8 sm4; /* BTM_SM4_TRUE, if the peer supports SM4 */
- tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */
- tBTM_AUTH_REQ rmt_auth_req; /* the auth_req flag as in the IO caps rsp evt */
- BOOLEAN remote_supports_secure_connections;
- BOOLEAN remote_features_needed; /* set to true if the local device is in */
- /* "Secure Connections Only" mode and it receives */
- /* HCI_IO_CAPABILITY_REQUEST_EVT from the peer before */
- /* it knows peer's support for Secure Connections */
-
- UINT16 ble_hci_handle; /* use in DUMO connection */
- UINT8 enc_key_size; /* current link encryption key size */
- tBT_DEVICE_TYPE device_type;
- BOOLEAN new_encryption_key_is_p256; /* Set to TRUE when the newly generated LK
- ** is generated from P-256.
- ** Link encrypted with such LK can be used
- ** for SM over BR/EDR.
- */
- BOOLEAN no_smp_on_br; /* if set to TRUE then SMP on BR/EDR doesn't */
- /* work, i.e. link keys crosspairing */
- /* SC BR/EDR->SC LE doesn't happen */
- tBTM_BOND_TYPE bond_type; /* peering bond type */
-
-#if BLE_INCLUDED == TRUE
- tBTM_SEC_BLE ble;
- tBTM_LE_CONN_PRAMS conn_params;
-#endif
-
-#if BTM_DISC_DURING_RS == TRUE
-#define BTM_SEC_RS_NOT_PENDING 0 /* Role Switch not in progress */
-#define BTM_SEC_RS_PENDING 1 /* Role Switch in progress */
-#define BTM_SEC_DISC_PENDING 2 /* Disconnect is pending */
- UINT8 rs_disc_pending;
-#endif
-#define BTM_SEC_NO_LAST_SERVICE_ID 0
- UINT8 last_author_service_id; /* ID of last serviced authorized: Reset after each l2cap connection */
-
-} tBTM_SEC_DEV_REC;
-
-#define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
-#define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
-#define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
-
-#define BTM_SEC_LE_MASK (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
-
-/*
-** Define device configuration structure
-*/
-typedef struct
-{
-#if BTM_MAX_LOC_BD_NAME_LEN > 0
- tBTM_LOC_BD_NAME bd_name; /* local Bluetooth device name */
-#endif
- BOOLEAN pin_type; /* TRUE if PIN type is fixed */
- UINT8 pin_code_len; /* Bonding information */
- PIN_CODE pin_code; /* PIN CODE if pin type is fixed */
- BOOLEAN connectable; /* If TRUE page scan should be enabled */
- UINT8 def_inq_scan_mode; /* ??? limited/general/none */
-} tBTM_CFG;
-
-enum
-{
- BTM_PM_ST_ACTIVE = BTM_PM_STS_ACTIVE,
- BTM_PM_ST_HOLD = BTM_PM_STS_HOLD,
- BTM_PM_ST_SNIFF = BTM_PM_STS_SNIFF,
- BTM_PM_ST_PARK = BTM_PM_STS_PARK,
- BTM_PM_ST_PENDING = BTM_PM_STS_PENDING,
- BTM_PM_ST_INVALID = 0xFF
-};
-typedef UINT8 tBTM_PM_STATE;
-
-enum
-{
- BTM_PM_SET_MODE_EVT, /* Set power mode API is called. */
- BTM_PM_UPDATE_EVT,
- BTM_PM_RD_MODE_EVT /* Read power mode API is called. */
-};
-typedef UINT8 tBTM_PM_EVENT;
-
-typedef struct
-{
- UINT16 event;
- UINT16 len;
- UINT8 link_ind;
-} tBTM_PM_MSG_DATA;
-
-typedef struct
-{
- UINT8 hci_status;
- UINT8 mode;
- UINT16 interval;
-} tBTM_PM_MD_CHG_DATA;
-
-typedef struct
-{
- UINT8 pm_id; /* the entity that calls SetPowerMode API */
- tBTM_PM_PWR_MD *p_pmd;
-} tBTM_PM_SET_MD_DATA;
-
-typedef struct
-{
- void *p_data;
- UINT8 link_ind;
-} tBTM_PM_SM_DATA;
-
-typedef struct
-{
- tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
- tBTM_PM_PWR_MD set_mode; /* the mode and parameters sent down to the host controller. */
- UINT16 interval; /* the interval from last mode change event. */
-#if (BTM_SSR_INCLUDED == TRUE)
- UINT16 max_lat; /* stored SSR maximum latency */
- UINT16 min_rmt_to;/* stored SSR minimum remote timeout */
- UINT16 min_loc_to;/* stored SSR minimum local timeout */
-#endif
- tBTM_PM_STATE state; /* contains the current mode of the connection */
- BOOLEAN chg_ind; /* a request change indication */
-} tBTM_PM_MCB;
-
-#define BTM_PM_REC_NOT_USED 0
-typedef struct
-{
- tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
- UINT8 mask; /* registered request mask. 0, if this entry is not used */
-} tBTM_PM_RCB;
-
-enum
-{
- BTM_BLI_ACL_UP_EVT,
- BTM_BLI_ACL_DOWN_EVT,
- BTM_BLI_PAGE_EVT,
- BTM_BLI_PAGE_DONE_EVT,
- BTM_BLI_INQ_EVT,
- BTM_BLI_INQ_CANCEL_EVT,
- BTM_BLI_INQ_DONE_EVT
-};
-typedef UINT8 tBTM_BLI_EVENT;
-
-/* Pairing State */
-enum
-{
- BTM_PAIR_STATE_IDLE, /* Idle */
- BTM_PAIR_STATE_GET_REM_NAME, /* Getting the remote name (to check for SM4) */
- BTM_PAIR_STATE_WAIT_PIN_REQ, /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
- BTM_PAIR_STATE_WAIT_LOCAL_PIN, /* Waiting for local PIN code */
- BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM, /* Waiting user 'yes' to numeric confirmation */
- BTM_PAIR_STATE_KEY_ENTRY, /* Key entry state (we are a keyboard) */
- BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP, /* Waiting for local response to peer OOB data */
- BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS, /* Waiting for local IO capabilities and OOB data */
- BTM_PAIR_STATE_INCOMING_SSP, /* Incoming SSP (got peer IO caps when idle) */
- BTM_PAIR_STATE_WAIT_AUTH_COMPLETE, /* All done, waiting authentication cpmplete */
- BTM_PAIR_STATE_WAIT_DISCONNECT /* Waiting to disconnect the ACL */
-};
-typedef UINT8 tBTM_PAIRING_STATE;
-
-#define BTM_PAIR_FLAGS_WE_STARTED_DD 0x01 /* We want to do dedicated bonding */
-#define BTM_PAIR_FLAGS_PEER_STARTED_DD 0x02 /* Peer initiated dedicated bonding */
-#define BTM_PAIR_FLAGS_DISC_WHEN_DONE 0x04 /* Disconnect when done */
-#define BTM_PAIR_FLAGS_PIN_REQD 0x08 /* set this bit when pin_callback is called */
-#define BTM_PAIR_FLAGS_PRE_FETCH_PIN 0x10 /* set this bit when pre-fetch pin */
-#define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20 /* set this bit when rejected incoming connection */
-#define BTM_PAIR_FLAGS_WE_CANCEL_DD 0x40 /* set this bit when cancelling a bonding procedure */
-#define BTM_PAIR_FLAGS_LE_ACTIVE 0x80 /* use this bit when SMP pairing is active */
-
-
-typedef struct
-{
- BOOLEAN is_mux;
- BD_ADDR bd_addr;
- UINT16 psm;
- BOOLEAN is_orig;
- tBTM_SEC_CALLBACK *p_callback;
- void *p_ref_data;
- UINT32 mx_proto_id;
- UINT32 mx_chan_id;
- tBT_TRANSPORT transport;
- tBTM_BLE_SEC_ACT sec_act;
-} tBTM_SEC_QUEUE_ENTRY;
-
-#if (L2CAP_UCD_INCLUDED == TRUE)
-
-#define CONN_ORIENT_TERM 0x00 /* incoming connection oriented */
-#define CONN_ORIENT_ORIG 0x01 /* outgoing connection oriented */
-#define CONNLESS_TERM 0x02 /* incoming connectionless */
-#define CONNLESS_ORIG 0x03 /* outgoing connectionless */
-#define CONNECTION_TYPE_ORIG_MASK 0x01 /* mask for direction */
-#define CONNECTION_TYPE_CONNLESS_MASK 0x02 /* mask for connectionless or not */
-typedef UINT8 CONNECTION_TYPE;
-
-#else
-
-#define CONN_ORIENT_TERM FALSE
-#define CONN_ORIENT_ORIG TRUE
-typedef BOOLEAN CONNECTION_TYPE;
-
-#endif /* (L2CAP_UCD_INCLUDED == TRUE) */
-
-/* Define a structure to hold all the BTM data
-*/
-
-#define BTM_STATE_BUFFER_SIZE 5 /* size of state buffer */
-
-typedef struct
-{
- tBTM_CFG cfg; /* Device configuration */
-
- /****************************************************
- ** ACL Management
- ****************************************************/
- tACL_CONN acl_db[MAX_L2CAP_LINKS];
- UINT8 btm_scn[BTM_MAX_SCN]; /* current SCNs: TRUE if SCN is in use */
- UINT16 btm_def_link_policy;
- UINT16 btm_def_link_super_tout;
-
- tBTM_BL_EVENT_MASK bl_evt_mask;
- tBTM_BL_CHANGE_CB *p_bl_changed_cb; /* Callback for when Busy Level changed */
-
- /****************************************************
- ** Power Management
- ****************************************************/
- tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS]; /* per ACL link */
- tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
- UINT8 pm_pend_link; /* the index of acl_db, which has a pending PM cmd */
- UINT8 pm_pend_id; /* the id pf the module, which has a pending PM cmd */
-
- /*****************************************************
- ** Device control
- *****************************************************/
- tBTM_DEVCB devcb;
-
- /*****************************************************
- ** BLE Device controllers
- *****************************************************/
-#if (BLE_INCLUDED == TRUE)
- tBTM_BLE_CB ble_ctr_cb;
-
- UINT16 enc_handle;
- BT_OCTET8 enc_rand; /* received rand value from LTK request*/
- UINT16 ediv; /* received ediv value from LTK request */
- UINT8 key_size;
- tBTM_BLE_VSC_CB cmn_ble_vsc_cb;
-#endif
-
- /* Packet types supported by the local device */
- UINT16 btm_acl_pkt_types_supported;
- UINT16 btm_sco_pkt_types_supported;
-
-
- /*****************************************************
- ** Inquiry
- *****************************************************/
- tBTM_INQUIRY_VAR_ST btm_inq_vars;
-
- /*****************************************************
- ** SCO Management
- *****************************************************/
-#if BTM_SCO_INCLUDED == TRUE
- tSCO_CB sco_cb;
-#endif
-
- /*****************************************************
- ** Security Management
- *****************************************************/
- tBTM_APPL_INFO api;
-
-#define BTM_SEC_MAX_RMT_NAME_CALLBACKS 2
- tBTM_RMT_NAME_CALLBACK *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
-
- tBTM_SEC_DEV_REC *p_collided_dev_rec;
- alarm_t *sec_collision_timer;
- UINT32 collision_start_time;
- UINT32 max_collision_delay;
- UINT32 dev_rec_count; /* Counter used for device record timestamp */
- UINT8 security_mode;
- BOOLEAN pairing_disabled;
- BOOLEAN connect_only_paired;
- BOOLEAN security_mode_changed; /* mode changed during bonding */
- BOOLEAN pin_type_changed; /* pin type changed during bonding */
- BOOLEAN sec_req_pending; /* TRUE if a request is pending */
-
- UINT8 pin_code_len; /* for legacy devices */
- PIN_CODE pin_code; /* for legacy devices */
- tBTM_PAIRING_STATE pairing_state; /* The current pairing state */
- UINT8 pairing_flags; /* The current pairing flags */
- BD_ADDR pairing_bda; /* The device currently pairing */
- alarm_t *pairing_timer; /* Timer for pairing process */
- UINT16 disc_handle; /* for legacy devices */
- UINT8 disc_reason; /* for legacy devices */
- tBTM_SEC_SERV_REC sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
- list_t *sec_dev_rec; /* list of tBTM_SEC_DEV_REC */
- tBTM_SEC_SERV_REC *p_out_serv;
- tBTM_MKEY_CALLBACK *mkey_cback;
-
- BD_ADDR connecting_bda;
- DEV_CLASS connecting_dc;
-
- UINT8 acl_disc_reason;
- UINT8 trace_level;
- UINT8 busy_level; /* the current busy level */
- BOOLEAN is_paging; /* TRUE, if paging is in progess */
- BOOLEAN is_inquiry; /* TRUE, if inquiry is in progess */
- fixed_queue_t *page_queue;
- BOOLEAN paging;
- BOOLEAN discing;
- fixed_queue_t *sec_pending_q; /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
-
-#if (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
- char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
-#endif
-} tBTM_CB;
-
-/* security action for L2CAP COC channels */
-#define BTM_SEC_OK 1
-#define BTM_SEC_ENCRYPT 2 /* encrypt the link with current key */
-#define BTM_SEC_ENCRYPT_NO_MITM 3 /* unauthenticated encryption or better */
-#define BTM_SEC_ENCRYPT_MITM 4 /* authenticated encryption */
-#define BTM_SEC_ENC_PENDING 5 /* wait for link encryption pending */
-
-typedef UINT8 tBTM_SEC_ACTION;
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-#if BTM_DYNAMIC_MEMORY == FALSE
-extern tBTM_CB btm_cb;
-#else
-extern tBTM_CB *btm_cb_ptr;
-#define btm_cb (*btm_cb_ptr)
-#endif
-
-/* Internal functions provided by btm_main.c
-********************************************
+/* Internal functions provided by btm_main.cc
+ *******************************************
*/
-extern void btm_init (void);
+extern void btm_init(void);
-/* Internal functions provided by btm_inq.c
-*******************************************
+/* Internal functions provided by btm_inq.cc
+ ******************************************
*/
-extern tBTM_STATUS btm_initiate_rem_name(BD_ADDR remote_bda,
- tBTM_INQ_INFO *p_cur,
- UINT8 origin, period_ms_t timeout_ms,
- tBTM_CMPL_CB *p_cb);
+extern tBTM_STATUS btm_initiate_rem_name(const RawAddress& remote_bda,
+ uint8_t origin, period_ms_t timeout_ms,
+ tBTM_CMPL_CB* p_cb);
-extern void btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
- UINT8 hci_status);
-extern void btm_inq_rmt_name_failed(void);
-extern void btm_inq_remote_name_timer_timeout(void *data);
+extern void btm_process_remote_name(const RawAddress* bda, BD_NAME name,
+ uint16_t evt_len, uint8_t hci_status);
+extern void btm_inq_rmt_name_failed(void);
+extern void btm_inq_remote_name_timer_timeout(void* data);
/* Inquiry related functions */
-extern void btm_clr_inq_db (BD_ADDR p_bda);
-extern void btm_inq_db_init (void);
-extern void btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
-extern void btm_process_inq_complete (UINT8 status, UINT8 mode);
-extern void btm_process_cancel_complete(UINT8 status, UINT8 mode);
-extern void btm_event_filter_complete (UINT8 *p);
-extern void btm_inq_stop_on_ssp(void);
-extern void btm_inq_clear_ssp(void);
-extern tINQ_DB_ENT *btm_inq_db_find (const BD_ADDR p_bda);
-extern BOOLEAN btm_inq_find_bdaddr (BD_ADDR p_bda);
-
-extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
-
-/* Internal functions provided by btm_acl.c
-********************************************
+extern void btm_clr_inq_db(const RawAddress* p_bda);
+extern void btm_inq_db_init(void);
+extern void btm_process_inq_results(uint8_t* p, uint8_t inq_res_mode);
+extern void btm_process_inq_complete(uint8_t status, uint8_t mode);
+extern void btm_process_cancel_complete(uint8_t status, uint8_t mode);
+extern void btm_event_filter_complete(uint8_t* p);
+extern void btm_inq_stop_on_ssp(void);
+extern void btm_inq_clear_ssp(void);
+extern tINQ_DB_ENT* btm_inq_db_find(const RawAddress& p_bda);
+extern bool btm_inq_find_bdaddr(const RawAddress& p_bda);
+
+/* Internal functions provided by btm_acl.cc
+ *******************************************
*/
-extern void btm_acl_init (void);
-extern void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
- UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
-extern void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
-extern void btm_acl_device_down (void);
-extern void btm_acl_update_busy_level (tBTM_BLI_EVENT event);
-
-extern void btm_cont_rswitch (tACL_CONN *p,
- tBTM_SEC_DEV_REC *p_dev_rec,
- UINT8 hci_status);
-
-extern UINT8 btm_handle_to_acl_index (UINT16 hci_handle);
-extern void btm_read_link_policy_complete (UINT8 *p);
-
-extern void btm_read_rssi_timeout(void *data);
-extern void btm_read_rssi_complete(UINT8 *p);
-
-extern void btm_read_tx_power_timeout(void *data);
-extern void btm_read_tx_power_complete(UINT8 *p, BOOLEAN is_ble);
-
-extern void btm_read_link_quality_timeout(void *data);
-extern void btm_read_link_quality_complete(UINT8 *p);
-
-extern tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
-extern void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
-extern void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
-extern void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
-extern UINT16 btm_get_acl_disc_reason_code (void);
-extern tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
-extern void btm_read_remote_features_complete (UINT8 *p);
-extern void btm_read_remote_ext_features_complete (UINT8 *p);
-extern void btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
-extern void btm_read_remote_version_complete (UINT8 *p);
-extern void btm_establish_continue (tACL_CONN *p_acl_cb);
-
-extern void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
+extern void btm_acl_init(void);
+extern void btm_acl_created(const RawAddress& bda, DEV_CLASS dc, BD_NAME bdn,
+ uint16_t hci_handle, uint8_t link_role,
+ tBT_TRANSPORT transport);
+extern void btm_acl_removed(const RawAddress& bda, tBT_TRANSPORT transport);
+extern void btm_acl_device_down(void);
+extern void btm_acl_update_busy_level(tBTM_BLI_EVENT event);
+
+extern void btm_cont_rswitch(tACL_CONN* p, tBTM_SEC_DEV_REC* p_dev_rec,
+ uint8_t hci_status);
+
+extern uint8_t btm_handle_to_acl_index(uint16_t hci_handle);
+extern void btm_read_link_policy_complete(uint8_t* p);
+
+extern void btm_read_rssi_timeout(void* data);
+extern void btm_read_rssi_complete(uint8_t* p);
+
+extern void btm_read_failed_contact_counter_timeout(void* data);
+extern void btm_read_failed_contact_counter_complete(uint8_t* p);
+
+extern void btm_read_automatic_flush_timeout_timeout(void* data);
+extern void btm_read_automatic_flush_timeout_complete(uint8_t* p);
+
+extern void btm_read_tx_power_timeout(void* data);
+extern void btm_read_tx_power_complete(uint8_t* p, bool is_ble);
+
+extern void btm_read_link_quality_timeout(void* data);
+extern void btm_read_link_quality_complete(uint8_t* p);
+
+extern tBTM_STATUS btm_set_packet_types(tACL_CONN* p, uint16_t pkt_types);
+extern void btm_process_clk_off_comp_evt(uint16_t hci_handle,
+ uint16_t clock_offset);
+extern void btm_acl_role_changed(uint8_t hci_status, const RawAddress* bd_addr,
+ uint8_t new_role);
+extern void btm_blacklist_role_change_device(const RawAddress& bd_addr,
+ uint8_t hci_status);
+extern void btm_acl_encrypt_change(uint16_t handle, uint8_t status,
+ uint8_t encr_enable);
+extern uint16_t btm_get_acl_disc_reason_code(void);
+extern tBTM_STATUS btm_remove_acl(const RawAddress& bd_addr,
+ tBT_TRANSPORT transport);
+extern void btm_read_remote_features_complete(uint8_t* p);
+extern void btm_read_remote_ext_features_complete(uint8_t* p);
+extern void btm_read_remote_ext_features_failed(uint8_t status,
+ uint16_t handle);
+extern void btm_read_remote_version_complete(uint8_t* p);
+extern void btm_establish_continue(tACL_CONN* p_acl_cb);
+
+extern void btm_acl_chk_peer_pkt_type_support(tACL_CONN* p,
+ uint16_t* p_pkt_type);
/* Read maximum data packet that can be sent over current connection */
-extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
-extern tACL_CONN *btm_bda_to_acl (const BD_ADDR bda, tBT_TRANSPORT transport);
-extern BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda);
+extern uint16_t btm_get_max_packet_size(const RawAddress& addr);
+extern tACL_CONN* btm_bda_to_acl(const RawAddress& bda,
+ tBT_TRANSPORT transport);
+extern bool btm_acl_notif_conn_collision(const RawAddress& bda);
+extern void btm_acl_update_conn_addr(uint16_t conn_handle,
+ const RawAddress& address);
extern void btm_pm_reset(void);
-extern void btm_pm_sm_alloc(UINT8 ind);
-extern void btm_pm_proc_cmd_status(UINT8 status);
-extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
- UINT16 interval);
-extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
-extern tBTM_STATUS btm_read_power_mode_state (BD_ADDR remote_bda,
- tBTM_PM_STATE *pmState);
-#if BTM_SCO_INCLUDED == TRUE
-extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
+extern void btm_pm_sm_alloc(uint8_t ind);
+extern void btm_pm_proc_cmd_status(uint8_t status);
+extern void btm_pm_proc_mode_change(uint8_t hci_status, uint16_t hci_handle,
+ uint8_t mode, uint16_t interval);
+extern void btm_pm_proc_ssr_evt(uint8_t* p, uint16_t evt_len);
+extern tBTM_STATUS btm_read_power_mode_state(const RawAddress& remote_bda,
+ tBTM_PM_STATE* pmState);
+#if (BTM_SCO_INCLUDED == TRUE)
+extern void btm_sco_chk_pend_unpark(uint8_t hci_status, uint16_t hci_handle);
#else
#define btm_sco_chk_pend_unpark(hci_status, hci_handle)
#endif /* BTM_SCO_INCLUDED */
-extern void btm_qos_setup_timeout(void *data);
-extern void btm_qos_setup_complete(UINT8 status, UINT16 handle,
- FLOW_SPEC *p_flow);
+extern void btm_qos_setup_timeout(void* data);
+extern void btm_qos_setup_complete(uint8_t status, uint16_t handle,
+ FLOW_SPEC* p_flow);
-
-/* Internal functions provided by btm_sco.c
-********************************************
+/* Internal functions provided by btm_sco.cc
+ *******************************************
*/
-extern void btm_sco_init (void);
-extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
- tBTM_ESCO_DATA *p_esco_data);
-extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
- UINT8 retrans_window, UINT16 rx_pkt_len,
- UINT16 tx_pkt_len);
-extern void btm_sco_conn_req (BD_ADDR bda, DEV_CLASS dev_class, UINT8 link_type);
-extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
-extern void btm_sco_acl_removed (BD_ADDR bda);
-extern void btm_route_sco_data (BT_HDR *p_msg);
-extern BOOLEAN btm_is_sco_active (UINT16 handle);
-extern void btm_remove_sco_links (BD_ADDR bda);
-extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
-
-extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
-extern UINT16 btm_find_scb_by_handle (UINT16 handle);
-extern void btm_sco_flush_sco_data(UINT16 sco_inx);
-
-/* Internal functions provided by btm_devctl.c
-**********************************************
+extern void btm_sco_init(void);
+extern void btm_sco_connected(uint8_t hci_status, const RawAddress* bda,
+ uint16_t hci_handle, tBTM_ESCO_DATA* p_esco_data);
+extern void btm_esco_proc_conn_chg(uint8_t status, uint16_t handle,
+ uint8_t tx_interval, uint8_t retrans_window,
+ uint16_t rx_pkt_len, uint16_t tx_pkt_len);
+extern void btm_sco_conn_req(const RawAddress& bda, DEV_CLASS dev_class,
+ uint8_t link_type);
+extern void btm_sco_removed(uint16_t hci_handle, uint8_t reason);
+extern void btm_sco_acl_removed(const RawAddress* bda);
+extern void btm_route_sco_data(BT_HDR* p_msg);
+extern bool btm_is_sco_active(uint16_t handle);
+extern void btm_remove_sco_links(const RawAddress& bda);
+extern bool btm_is_sco_active_by_bdaddr(const RawAddress& remote_bda);
+
+extern void btm_read_def_esco_mode(enh_esco_params_t* p_parms);
+extern uint16_t btm_find_scb_by_handle(uint16_t handle);
+extern void btm_sco_flush_sco_data(uint16_t sco_inx);
+
+/* Internal functions provided by btm_devctl.cc
+ *********************************************
*/
extern void btm_dev_init(void);
-extern void btm_read_local_name_timeout(void *data);
-extern void btm_read_local_name_complete(UINT8 *p, UINT16 evt_len);
-
-#if (BLE_INCLUDED == TRUE)
-extern void btm_ble_add_2_white_list_complete(UINT8 status);
-extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
-extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
-extern BOOLEAN btm_ble_addr_resolvable(BD_ADDR rpa, tBTM_SEC_DEV_REC *p_dev_rec);
-extern tBTM_STATUS btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *p_dev_rec);
-extern BOOLEAN btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *p_dev_rec);
-extern void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *p_dev_rec);
-#endif /* BLE_INCLUDED */
+extern void btm_read_local_name_timeout(void* data);
+extern void btm_read_local_name_complete(uint8_t* p, uint16_t evt_len);
+
+extern void btm_ble_add_2_white_list_complete(uint8_t status);
+extern void btm_ble_remove_from_white_list_complete(uint8_t* p,
+ uint16_t evt_len);
+extern void btm_ble_clear_white_list_complete(uint8_t* p, uint16_t evt_len);
+extern bool btm_ble_addr_resolvable(const RawAddress& rpa,
+ tBTM_SEC_DEV_REC* p_dev_rec);
+extern tBTM_STATUS btm_ble_read_resolving_list_entry(
+ tBTM_SEC_DEV_REC* p_dev_rec);
+extern bool btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC* p_dev_rec);
+extern void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC* p_dev_rec);
/* Vendor Specific Command complete evt handler */
-extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
- tBTM_CMPL_CB *p_vsc_cplt_cback);
-extern void btm_inq_db_reset (void);
-extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
-extern void btm_delete_stored_link_key_complete (UINT8 *p);
-extern void btm_report_device_status (tBTM_DEV_STATUS status);
-
-
-/* Internal functions provided by btm_dev.c
-**********************************************
+extern void btm_vsc_complete(uint8_t* p, uint16_t cc_opcode, uint16_t evt_len,
+ tBTM_CMPL_CB* p_vsc_cplt_cback);
+extern void btm_inq_db_reset(void);
+extern void btm_vendor_specific_evt(uint8_t* p, uint8_t evt_len);
+extern void btm_delete_stored_link_key_complete(uint8_t* p);
+extern void btm_report_device_status(tBTM_DEV_STATUS status);
+
+/* Internal functions provided by btm_dev.cc
+ *********************************************
*/
-extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
-
-extern tBTM_SEC_DEV_REC *btm_sec_allocate_dev_rec(void);
-extern tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr);
-extern void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
-extern tBTM_SEC_DEV_REC *btm_find_dev (const BD_ADDR bd_addr);
-extern tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr);
-extern tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle);
-extern tBTM_BOND_TYPE btm_get_bond_type_dev(BD_ADDR bd_addr);
-extern BOOLEAN btm_set_bond_type_dev(BD_ADDR bd_addr,
- tBTM_BOND_TYPE bond_type);
-
-/* Internal functions provided by btm_sec.c
-**********************************************
+extern bool btm_dev_support_switch(const RawAddress& bd_addr);
+
+extern tBTM_SEC_DEV_REC* btm_sec_allocate_dev_rec(void);
+extern tBTM_SEC_DEV_REC* btm_sec_alloc_dev(const RawAddress& bd_addr);
+extern void btm_sec_free_dev(tBTM_SEC_DEV_REC* p_dev_rec);
+extern tBTM_SEC_DEV_REC* btm_find_dev(const RawAddress& bd_addr);
+extern tBTM_SEC_DEV_REC* btm_find_or_alloc_dev(const RawAddress& bd_addr);
+extern tBTM_SEC_DEV_REC* btm_find_dev_by_handle(uint16_t handle);
+extern tBTM_BOND_TYPE btm_get_bond_type_dev(const RawAddress& bd_addr);
+extern bool btm_set_bond_type_dev(const RawAddress& bd_addr,
+ tBTM_BOND_TYPE bond_type);
+
+/* Internal functions provided by btm_sec.cc
+ *********************************************
*/
-extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
-extern tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
- UINT16 handle, CONNECTION_TYPE conn_type,
- tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
-extern tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
- UINT32 mx_proto_id, UINT32 mx_chan_id,
- tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
-extern void btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
-extern void btm_create_conn_cancel_complete (UINT8 *p);
-
-extern void btm_read_inq_tx_power_timeout(void *data);
-extern void btm_read_inq_tx_power_complete(UINT8 *p);
-
-extern void btm_sec_init (UINT8 sec_mode);
-extern void btm_sec_dev_reset (void);
-extern void btm_sec_abort_access_req (BD_ADDR bd_addr);
-extern void btm_sec_auth_complete (UINT16 handle, UINT8 status);
-extern void btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
-extern void btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
-extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
-extern void btm_sec_disconnected (UINT16 handle, UINT8 reason);
-extern void btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
-extern void btm_sec_rmt_host_support_feat_evt (UINT8 *p);
-extern void btm_io_capabilities_req (UINT8 *p);
-extern void btm_io_capabilities_rsp (UINT8 *p);
-extern void btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
-extern void btm_keypress_notif_evt (UINT8 *p);
-extern void btm_simple_pair_complete (UINT8 *p);
-extern void btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
-extern void btm_sec_link_key_request (UINT8 *p_bda);
-extern void btm_sec_pin_code_request (UINT8 *p_bda);
-extern void btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
-extern void btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
-extern void btm_sec_set_peer_sec_caps (tACL_CONN *p_acl_cb, tBTM_SEC_DEV_REC *p_dev_rec);
-
-#if BLE_INCLUDED == TRUE
-extern void btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC *p_dev_rec);
-extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
-extern void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec);
-extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
-extern BOOLEAN btm_ble_init_pseudo_addr (tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR new_pseudo_addr);
-extern tBTM_SEC_SERV_REC *btm_sec_find_first_serv (CONNECTION_TYPE conn_type, UINT16 psm);
-extern BOOLEAN btm_ble_start_sec_check(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
- tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
-#endif /* BLE_INCLUDED */
-
-extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
-
-extern void btm_rem_oob_req (UINT8 *p);
-extern void btm_read_local_oob_complete (UINT8 *p);
-
-extern void btm_acl_resubmit_page (void);
-extern void btm_acl_reset_paging (void);
-extern void btm_acl_paging (BT_HDR *p, BD_ADDR dest);
-extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
-extern void btm_sec_clr_temp_auth_service (BD_ADDR bda);
-
-#ifdef __cplusplus
-}
-#endif
+extern bool btm_dev_support_switch(const RawAddress& bd_addr);
+extern tBTM_STATUS btm_sec_l2cap_access_req(const RawAddress& bd_addr,
+ uint16_t psm, uint16_t handle,
+ CONNECTION_TYPE conn_type,
+ tBTM_SEC_CALLBACK* p_callback,
+ void* p_ref_data);
+extern tBTM_STATUS btm_sec_mx_access_request(const RawAddress& bd_addr,
+ uint16_t psm, bool is_originator,
+ uint32_t mx_proto_id,
+ uint32_t mx_chan_id,
+ tBTM_SEC_CALLBACK* p_callback,
+ void* p_ref_data);
+extern void btm_sec_conn_req(const RawAddress& bda, uint8_t* dc);
+extern void btm_create_conn_cancel_complete(uint8_t* p);
+
+extern void btm_read_inq_tx_power_timeout(void* data);
+extern void btm_read_inq_tx_power_complete(uint8_t* p);
+
+extern void btm_sec_init(uint8_t sec_mode);
+extern void btm_sec_dev_reset(void);
+extern void btm_sec_abort_access_req(const RawAddress& bd_addr);
+extern void btm_sec_auth_complete(uint16_t handle, uint8_t status);
+extern void btm_sec_encrypt_change(uint16_t handle, uint8_t status,
+ uint8_t encr_enable);
+extern void btm_sec_connected(const RawAddress& bda, uint16_t handle,
+ uint8_t status, uint8_t enc_mode);
+extern tBTM_STATUS btm_sec_disconnect(uint16_t handle, uint8_t reason);
+extern void btm_sec_disconnected(uint16_t handle, uint8_t reason);
+extern void btm_sec_rmt_name_request_complete(const RawAddress* bd_addr,
+ uint8_t* bd_name, uint8_t status);
+extern void btm_sec_rmt_host_support_feat_evt(uint8_t* p);
+extern void btm_io_capabilities_req(const RawAddress& p);
+extern void btm_io_capabilities_rsp(uint8_t* p);
+extern void btm_proc_sp_req_evt(tBTM_SP_EVT event, uint8_t* p);
+extern void btm_keypress_notif_evt(uint8_t* p);
+extern void btm_simple_pair_complete(uint8_t* p);
+extern void btm_sec_link_key_notification(const RawAddress& p_bda,
+ uint8_t* p_link_key,
+ uint8_t key_type);
+extern void btm_sec_link_key_request(const RawAddress& p_bda);
+extern void btm_sec_pin_code_request(const RawAddress& p_bda);
+extern void btm_sec_update_clock_offset(uint16_t handle, uint16_t clock_offset);
+extern void btm_sec_dev_rec_cback_event(tBTM_SEC_DEV_REC* p_dev_rec,
+ uint8_t res, bool is_le_trasnport);
+extern void btm_sec_set_peer_sec_caps(tACL_CONN* p_acl_cb,
+ tBTM_SEC_DEV_REC* p_dev_rec);
+
+extern void btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC* p_dev_rec);
+extern bool btm_sec_is_a_bonded_dev(const RawAddress& bda);
+extern void btm_consolidate_dev(tBTM_SEC_DEV_REC* p_target_rec);
+extern bool btm_sec_is_le_capable_dev(const RawAddress& bda);
+extern bool btm_ble_init_pseudo_addr(tBTM_SEC_DEV_REC* p_dev_rec,
+ const RawAddress& new_pseudo_addr);
+extern tBTM_SEC_SERV_REC* btm_sec_find_first_serv(CONNECTION_TYPE conn_type,
+ uint16_t psm);
+extern bool btm_ble_start_sec_check(const RawAddress& bd_addr, uint16_t psm,
+ bool is_originator,
+ tBTM_SEC_CALLBACK* p_callback,
+ void* p_ref_data);
+
+extern tINQ_DB_ENT* btm_inq_db_new(const RawAddress& p_bda);
+
+extern void btm_rem_oob_req(uint8_t* p);
+extern void btm_read_local_oob_complete(uint8_t* p);
+
+extern void btm_acl_resubmit_page(void);
+extern void btm_acl_reset_paging(void);
+extern void btm_acl_paging(BT_HDR* p, const RawAddress& dest);
+extern uint8_t btm_sec_clr_service_by_psm(uint16_t psm);
+extern void btm_sec_clr_temp_auth_service(const RawAddress& bda);
#endif