Home | History | Annotate | Download | only in hid
      1 /******************************************************************************
      2  *
      3  *  Copyright (C) 2002-2012 Broadcom Corporation
      4  *
      5  *  Licensed under the Apache License, Version 2.0 (the "License");
      6  *  you may not use this file except in compliance with the License.
      7  *  You may obtain a copy of the License at:
      8  *
      9  *  http://www.apache.org/licenses/LICENSE-2.0
     10  *
     11  *  Unless required by applicable law or agreed to in writing, software
     12  *  distributed under the License is distributed on an "AS IS" BASIS,
     13  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     14  *  See the License for the specific language governing permissions and
     15  *  limitations under the License.
     16  *
     17  ******************************************************************************/
     18 
     19 /******************************************************************************
     20  *
     21  *  This file contains the HID HOST API entry points
     22  *
     23  ******************************************************************************/
     24 
     25 #include <stdlib.h>
     26 #include <string.h>
     27 #include <stdio.h>
     28 
     29 #include "gki.h"
     30 #include "bt_types.h"
     31 #include "hiddefs.h"
     32 #include "hidh_api.h"
     33 #include "hidh_int.h"
     34 #include "btm_api.h"
     35 #include "btu.h"
     36 #include "btm_int.h"
     37 
     38 #if HID_DYNAMIC_MEMORY == FALSE
     39 tHID_HOST_CTB   hh_cb;
     40 #endif
     41 
     42 static void hidh_search_callback (UINT16 sdp_result);
     43 
     44 /*******************************************************************************
     45 **
     46 ** Function         HID_HostGetSDPRecord
     47 **
     48 ** Description      This function reads the device SDP record
     49 **
     50 ** Returns          tHID_STATUS
     51 **
     52 *******************************************************************************/
     53 tHID_STATUS HID_HostGetSDPRecord ( BD_ADDR addr, tSDP_DISCOVERY_DB *p_db, UINT32 db_len,
     54                                    tHID_HOST_SDP_CALLBACK *sdp_cback )
     55 {
     56     tSDP_UUID   uuid_list;
     57 
     58     if( hh_cb.sdp_busy )
     59         return HID_ERR_SDP_BUSY;
     60 
     61     uuid_list.len = 2;
     62     uuid_list.uu.uuid16 = UUID_SERVCLASS_HUMAN_INTERFACE;
     63 
     64     hh_cb.p_sdp_db = p_db;
     65     SDP_InitDiscoveryDb (p_db, db_len, 1, &uuid_list, 0, NULL);
     66 
     67     if (SDP_ServiceSearchRequest (addr, p_db, hidh_search_callback))
     68     {
     69         hh_cb.sdp_cback = sdp_cback ;
     70         hh_cb.sdp_busy = TRUE;
     71         return HID_SUCCESS;
     72     }
     73     else
     74         return HID_ERR_NO_RESOURCES;
     75 }
     76 
     77 void hidh_get_str_attr( tSDP_DISC_REC *p_rec, UINT16 attr_id, UINT16 max_len, char *str )
     78 {
     79     tSDP_DISC_ATTR          *p_attr;
     80     UINT16                  name_len;
     81 
     82     if ((p_attr = SDP_FindAttributeInRec(p_rec, attr_id)) != NULL)
     83     {
     84         if((name_len = SDP_DISC_ATTR_LEN(p_attr->attr_len_type)) < max_len )
     85         {
     86             memcpy( str, (char *) p_attr->attr_value.v.array, name_len );
     87             str[name_len] = '\0';
     88         }
     89         else
     90         {
     91             memcpy( str, (char *) p_attr->attr_value.v.array, max_len-1 );
     92             str[max_len-1] = '\0';
     93         }
     94     }
     95     else
     96         str[0] = '\0';
     97 }
     98 
     99 
    100 static void hidh_search_callback (UINT16 sdp_result)
    101 {
    102     tSDP_DISCOVERY_DB       *p_db = hh_cb.p_sdp_db;
    103     tSDP_DISC_REC           *p_rec;
    104     tSDP_DISC_ATTR          *p_attr, *p_subattr1, *p_subattr2, *p_repdesc;
    105     tBT_UUID                hid_uuid;
    106     tHID_DEV_SDP_INFO       *p_nvi = &hh_cb.sdp_rec;
    107     UINT16                  attr_mask = 0;
    108 
    109     hid_uuid.len       = LEN_UUID_16;
    110     hid_uuid.uu.uuid16 = UUID_SERVCLASS_HUMAN_INTERFACE;
    111 
    112     hh_cb.sdp_busy = FALSE;
    113 
    114     if (sdp_result != SDP_SUCCESS)
    115     {
    116         hh_cb.sdp_cback(sdp_result, 0, NULL);
    117         return;
    118     }
    119 
    120     if ((p_rec = SDP_FindServiceUUIDInDb (p_db, &hid_uuid, NULL)) == NULL)
    121     {
    122         hh_cb.sdp_cback(HID_SDP_NO_SERV_UUID, 0, NULL);
    123         return;
    124     }
    125 
    126     memset (&hh_cb.sdp_rec, 0, sizeof( tHID_DEV_SDP_INFO ));
    127 
    128     /* First, verify the mandatory fields we care about */
    129     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_DESCRIPTOR_LIST)) == NULL)
    130      || (SDP_DISC_ATTR_TYPE(p_attr->attr_len_type) != DATA_ELE_SEQ_DESC_TYPE)
    131      || ((p_subattr1 = p_attr->attr_value.v.p_sub_attr) == NULL)
    132      || (SDP_DISC_ATTR_TYPE(p_subattr1->attr_len_type) != DATA_ELE_SEQ_DESC_TYPE)
    133      || ((p_subattr2 = p_subattr1->attr_value.v.p_sub_attr) == NULL)
    134      || ((p_repdesc = p_subattr2->p_next_attr) == NULL)
    135      || (SDP_DISC_ATTR_TYPE(p_repdesc->attr_len_type) != TEXT_STR_DESC_TYPE))
    136     {
    137         hh_cb.sdp_cback(HID_SDP_MANDATORY_MISSING, 0, NULL);
    138         return;
    139     }
    140 
    141     if ((p_nvi->dscp_info.dl_len = SDP_DISC_ATTR_LEN(p_repdesc->attr_len_type)) != 0)
    142         p_nvi->dscp_info.dsc_list = (UINT8 *) &p_repdesc->attr_value;
    143 
    144     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_VIRTUAL_CABLE)) != NULL) &&
    145         (p_attr->attr_value.v.u8) )
    146     {
    147         attr_mask |= HID_VIRTUAL_CABLE;
    148     }
    149 
    150     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_RECONNECT_INITIATE)) != NULL) &&
    151         (p_attr->attr_value.v.u8) )
    152     {
    153         attr_mask |= HID_RECONN_INIT;
    154     }
    155 
    156     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_NORMALLY_CONNECTABLE)) != NULL) &&
    157         (p_attr->attr_value.v.u8) )
    158     {
    159         attr_mask |= HID_NORMALLY_CONNECTABLE;
    160     }
    161 
    162     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_SDP_DISABLE)) != NULL)&&
    163         (p_attr->attr_value.v.u8) )
    164     {
    165         attr_mask |= HID_SDP_DISABLE;
    166     }
    167 
    168     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_BATTERY_POWER)) != NULL)&&
    169         (p_attr->attr_value.v.u8) )
    170     {
    171         attr_mask |= HID_BATTERY_POWER;
    172     }
    173 
    174     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_REMOTE_WAKE)) != NULL)&&
    175         (p_attr->attr_value.v.u8) )
    176     {
    177         attr_mask |= HID_REMOTE_WAKE;
    178     }
    179 
    180     hidh_get_str_attr( p_rec, ATTR_ID_SERVICE_NAME, HID_MAX_SVC_NAME_LEN, p_nvi->svc_name );
    181     hidh_get_str_attr( p_rec, ATTR_ID_SERVICE_DESCRIPTION, HID_MAX_SVC_DESCR_LEN, p_nvi->svc_descr );
    182     hidh_get_str_attr( p_rec, ATTR_ID_PROVIDER_NAME, HID_MAX_PROV_NAME_LEN, p_nvi->prov_name );
    183 
    184     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_DEVICE_RELNUM)) != NULL))
    185     {
    186         p_nvi->rel_num = p_attr->attr_value.v.u16;
    187     }
    188 
    189     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_COUNTRY_CODE)) != NULL))
    190     {
    191         p_nvi->ctry_code = p_attr->attr_value.v.u8;
    192     }
    193 
    194     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_DEVICE_SUBCLASS)) != NULL))
    195     {
    196         p_nvi->sub_class = p_attr->attr_value.v.u8;
    197     }
    198 
    199     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_PARSER_VERSION)) != NULL))
    200     {
    201         p_nvi->hpars_ver = p_attr->attr_value.v.u16;
    202     }
    203 
    204     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_LINK_SUPERVISION_TO)) != NULL))
    205     {
    206         attr_mask |= HID_SUP_TOUT_AVLBL;
    207         p_nvi->sup_timeout = p_attr->attr_value.v.u16;
    208     }
    209 
    210     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_SSR_HOST_MAX_LAT)) != NULL))
    211     {
    212         attr_mask |= HID_SSR_MAX_LATENCY;
    213         p_nvi->ssr_max_latency = p_attr->attr_value.v.u16;
    214     }
    215     else
    216         p_nvi->ssr_max_latency = HID_SSR_PARAM_INVALID;
    217 
    218     if (((p_attr = SDP_FindAttributeInRec (p_rec, ATTR_ID_HID_SSR_HOST_MIN_TOUT)) != NULL))
    219     {
    220         attr_mask |= HID_SSR_MIN_TOUT;
    221         p_nvi->ssr_min_tout = p_attr->attr_value.v.u16;
    222     }
    223     else
    224         p_nvi->ssr_min_tout = HID_SSR_PARAM_INVALID;
    225 
    226     hh_cb.sdp_rec.p_sdp_layer_rec = p_rec;
    227     hh_cb.sdp_cback(SDP_SUCCESS, attr_mask, &hh_cb.sdp_rec);
    228 }
    229 
    230 
    231 /*******************************************************************************
    232 **
    233 ** Function         HID_HostInit
    234 **
    235 ** Description      This function initializes the control block and trace variable
    236 **
    237 ** Returns          void
    238 **
    239 *******************************************************************************/
    240 void HID_HostInit (void)
    241 {
    242     memset(&hh_cb, 0, sizeof(tHID_HOST_CTB));
    243 
    244 #if defined(HID_INITIAL_TRACE_LEVEL)
    245     hh_cb.trace_level = HID_INITIAL_TRACE_LEVEL;
    246 #else
    247     hh_cb.trace_level = BT_TRACE_LEVEL_NONE;
    248 #endif
    249 }
    250 
    251 /*******************************************************************************
    252 **
    253 ** Function         HID_HostSetTraceLevel
    254 **
    255 ** Description      This function sets the trace level for HID Host. If called with
    256 **                  a value of 0xFF, it simply reads the current trace level.
    257 **
    258 ** Returns          the new (current) trace level
    259 **
    260 *******************************************************************************/
    261 UINT8 HID_HostSetTraceLevel (UINT8 new_level)
    262 {
    263     if (new_level != 0xFF)
    264         hh_cb.trace_level = new_level;
    265 
    266     return (hh_cb.trace_level);
    267 }
    268 
    269 /*******************************************************************************
    270 **
    271 ** Function         HID_HostRegister
    272 **
    273 ** Description      This function registers HID-Host with lower layers
    274 **
    275 ** Returns          tHID_STATUS
    276 **
    277 *******************************************************************************/
    278 tHID_STATUS HID_HostRegister (tHID_HOST_DEV_CALLBACK *dev_cback)
    279 {
    280     tHID_STATUS st;
    281 
    282     if( hh_cb.reg_flag )
    283         return HID_ERR_ALREADY_REGISTERED;
    284 
    285     if( dev_cback == NULL )
    286         return HID_ERR_INVALID_PARAM;
    287 
    288     /* Register with L2CAP */
    289     if( (st = hidh_conn_reg()) != HID_SUCCESS )
    290     {
    291         return st;
    292     }
    293 
    294     hh_cb.callback = dev_cback ;
    295     hh_cb.reg_flag = TRUE;
    296 
    297     return (HID_SUCCESS);
    298 }
    299 
    300 /*******************************************************************************
    301 **
    302 ** Function         HID_HostDeregister
    303 **
    304 ** Description      This function is called when the host is about power down.
    305 **
    306 ** Returns          tHID_STATUS
    307 **
    308 *******************************************************************************/
    309 tHID_STATUS HID_HostDeregister(void)
    310 {
    311     UINT8 i;
    312 
    313     if( !hh_cb.reg_flag )
    314         return (HID_ERR_NOT_REGISTERED);
    315 
    316     for( i=0; i<HID_HOST_MAX_DEVICES; i++ )
    317     {
    318         HID_HostRemoveDev( i ) ;
    319     }
    320 
    321     hidh_conn_dereg();
    322     hh_cb.reg_flag = FALSE;
    323 
    324     return (HID_SUCCESS) ;
    325 }
    326 
    327 /*******************************************************************************
    328 **
    329 ** Function         HID_HostAddDev
    330 **
    331 ** Description      This is called so HID-host may manage this device.
    332 **
    333 ** Returns          tHID_STATUS
    334 **
    335 *******************************************************************************/
    336 tHID_STATUS HID_HostAddDev ( BD_ADDR addr, UINT16 attr_mask, UINT8 *handle )
    337 {
    338     int i;
    339     /* Find an entry for this device in hh_cb.devices array */
    340     if( !hh_cb.reg_flag )
    341         return (HID_ERR_NOT_REGISTERED);
    342 
    343     for( i=0; i<HID_HOST_MAX_DEVICES; i++)
    344     {
    345         if((hh_cb.devices[i].in_use) &&
    346            (!memcmp(addr, hh_cb.devices[i].addr, BD_ADDR_LEN)))
    347             break;
    348     }
    349 
    350     if (i== HID_HOST_MAX_DEVICES )
    351     {
    352         for( i=0; i<HID_HOST_MAX_DEVICES; i++)
    353         {
    354             if( !hh_cb.devices[i].in_use)
    355                 break;
    356         }
    357     }
    358 
    359     if( i==HID_HOST_MAX_DEVICES )
    360         return HID_ERR_NO_RESOURCES;
    361 
    362     if (!hh_cb.devices[i].in_use)
    363     {
    364         hh_cb.devices[i].in_use = TRUE;
    365         memcpy( hh_cb.devices[i].addr, addr, sizeof( BD_ADDR ) ) ;
    366         hh_cb.devices[i].state = HID_DEV_NO_CONN;
    367         hh_cb.devices[i].conn_tries = 0 ;
    368     }
    369 
    370     if (attr_mask != HID_ATTR_MASK_IGNORE)
    371         hh_cb.devices[i].attr_mask = attr_mask;
    372 
    373     *handle = i;
    374 
    375     return (HID_SUCCESS);
    376 }
    377 
    378 
    379 /*******************************************************************************
    380 **
    381 ** Function         HID_HostRemoveDev
    382 **
    383 ** Description      This removes the device from list devices that host has to manage.
    384 **
    385 ** Returns          tHID_STATUS
    386 **
    387 *******************************************************************************/
    388 tHID_STATUS HID_HostRemoveDev ( UINT8 dev_handle )
    389 {
    390     if( !hh_cb.reg_flag )
    391         return (HID_ERR_NOT_REGISTERED);
    392 
    393     if( (dev_handle >= HID_HOST_MAX_DEVICES) || (!hh_cb.devices[dev_handle].in_use) )
    394         return HID_ERR_INVALID_PARAM;
    395 
    396     HID_HostCloseDev( dev_handle ) ;
    397     hh_cb.devices[dev_handle].in_use = FALSE;
    398     hh_cb.devices[dev_handle].conn.conn_state = HID_CONN_STATE_UNUSED;
    399     hh_cb.devices[dev_handle].conn.ctrl_cid = hh_cb.devices[dev_handle].conn.intr_cid = 0;
    400 
    401     return HID_SUCCESS;
    402 }
    403 
    404 /*******************************************************************************
    405 **
    406 ** Function         HID_HostOpenDev
    407 **
    408 ** Description      This function is called when the user wants to initiate a
    409 **                  connection attempt to a device.
    410 **
    411 ** Returns          void
    412 **
    413 *******************************************************************************/
    414 tHID_STATUS HID_HostOpenDev ( UINT8 dev_handle )
    415 {
    416     if( !hh_cb.reg_flag )
    417         return (HID_ERR_NOT_REGISTERED);
    418 
    419     if( (dev_handle >= HID_HOST_MAX_DEVICES) || (!hh_cb.devices[dev_handle].in_use) )
    420         return HID_ERR_INVALID_PARAM;
    421 
    422     if( hh_cb.devices[dev_handle].state != HID_DEV_NO_CONN )
    423         return HID_ERR_ALREADY_CONN;
    424 
    425     hh_cb.devices[dev_handle].conn_tries = 1;
    426     return hidh_conn_initiate( dev_handle );
    427 }
    428 
    429 /*******************************************************************************
    430 **
    431 ** Function         HID_HostWriteDev
    432 **
    433 ** Description      This function is called when the host has a report to send.
    434 **
    435 **                  report_id: is only used on GET_REPORT transaction if is specified.
    436 **                              only valid when it's a non-zero value.
    437 **
    438 ** Returns          void
    439 **
    440 *******************************************************************************/
    441 tHID_STATUS HID_HostWriteDev( UINT8 dev_handle, UINT8 t_type,
    442                               UINT8 param, UINT16 data, UINT8 report_id, BT_HDR *pbuf  )
    443 {
    444     tHID_STATUS status = HID_SUCCESS;
    445 
    446     if( !hh_cb.reg_flag )
    447     {
    448         HIDH_TRACE_ERROR("HID_ERR_NOT_REGISTERED");
    449         status = HID_ERR_NOT_REGISTERED;
    450     }
    451 
    452     if( (dev_handle >= HID_HOST_MAX_DEVICES) || (!hh_cb.devices[dev_handle].in_use) )
    453     {
    454         HIDH_TRACE_ERROR("HID_ERR_INVALID_PARAM");
    455         status = HID_ERR_INVALID_PARAM;
    456     }
    457 
    458     else if( hh_cb.devices[dev_handle].state != HID_DEV_CONNECTED )
    459     {
    460         HIDH_TRACE_ERROR("HID_ERR_NO_CONNECTION dev_handle %d", dev_handle);
    461         status = HID_ERR_NO_CONNECTION;
    462     }
    463 
    464     if (status != HID_SUCCESS)
    465     {
    466         if (pbuf)
    467             GKI_freebuf ((void *)pbuf);
    468     }
    469     else
    470         status = hidh_conn_snd_data( dev_handle, t_type, param, data, report_id, pbuf ) ;
    471 
    472     return status;
    473 }
    474 
    475 /*******************************************************************************
    476 **
    477 ** Function         HID_HostCloseDev
    478 **
    479 ** Description      This function disconnects the device.
    480 **
    481 ** Returns          void
    482 **
    483 *******************************************************************************/
    484 tHID_STATUS HID_HostCloseDev( UINT8 dev_handle )
    485 {
    486     if( !hh_cb.reg_flag )
    487         return (HID_ERR_NOT_REGISTERED);
    488 
    489     if( (dev_handle >= HID_HOST_MAX_DEVICES) || (!hh_cb.devices[dev_handle].in_use) )
    490         return HID_ERR_INVALID_PARAM;
    491 
    492     hh_cb.devices[dev_handle].conn_tries = HID_HOST_MAX_CONN_RETRY+1;
    493     btu_stop_timer( &(hh_cb.devices[dev_handle].conn.timer_entry) ) ;
    494 
    495     if( hh_cb.devices[dev_handle].state != HID_DEV_CONNECTED )
    496         return HID_ERR_NO_CONNECTION;
    497 
    498     hh_cb.devices[dev_handle].conn_tries = HID_HOST_MAX_CONN_RETRY+1;
    499     return hidh_conn_disconnect( dev_handle );
    500 }
    501 
    502 tHID_STATUS HID_HostSetSecurityLevel( char serv_name[], UINT8 sec_lvl )
    503 {
    504     if (!BTM_SetSecurityLevel (FALSE, serv_name, BTM_SEC_SERVICE_HIDH_SEC_CTRL,
    505                                sec_lvl, HID_PSM_CONTROL, BTM_SEC_PROTO_HID, HID_SEC_CHN))
    506     {
    507         HIDH_TRACE_ERROR ("Security Registration 1 failed");
    508         return (HID_ERR_NO_RESOURCES);
    509     }
    510 
    511     if (!BTM_SetSecurityLevel (TRUE, serv_name, BTM_SEC_SERVICE_HIDH_SEC_CTRL,
    512                                sec_lvl, HID_PSM_CONTROL, BTM_SEC_PROTO_HID, HID_SEC_CHN))
    513     {
    514         HIDH_TRACE_ERROR ("Security Registration 2 failed");
    515         return (HID_ERR_NO_RESOURCES);
    516     }
    517 
    518     if (!BTM_SetSecurityLevel (FALSE, serv_name, BTM_SEC_SERVICE_HIDH_NOSEC_CTRL,
    519                                BTM_SEC_NONE, HID_PSM_CONTROL, BTM_SEC_PROTO_HID, HID_NOSEC_CHN))
    520     {
    521         HIDH_TRACE_ERROR ("Security Registration 3 failed");
    522         return (HID_ERR_NO_RESOURCES);
    523     }
    524 
    525     if (!BTM_SetSecurityLevel (TRUE, serv_name, BTM_SEC_SERVICE_HIDH_NOSEC_CTRL,
    526                                BTM_SEC_NONE, HID_PSM_CONTROL, BTM_SEC_PROTO_HID, HID_NOSEC_CHN))
    527     {
    528         HIDH_TRACE_ERROR ("Security Registration 4 failed");
    529         return (HID_ERR_NO_RESOURCES);
    530     }
    531 
    532     if (!BTM_SetSecurityLevel (TRUE, serv_name, BTM_SEC_SERVICE_HIDH_INTR,
    533                                BTM_SEC_NONE, HID_PSM_INTERRUPT, BTM_SEC_PROTO_HID, 0))
    534     {
    535         HIDH_TRACE_ERROR ("Security Registration 5 failed");
    536         return (HID_ERR_NO_RESOURCES);
    537     }
    538 
    539     if (!BTM_SetSecurityLevel (FALSE, serv_name, BTM_SEC_SERVICE_HIDH_INTR,
    540                                BTM_SEC_NONE, HID_PSM_INTERRUPT, BTM_SEC_PROTO_HID, 0))
    541     {
    542         HIDH_TRACE_ERROR ("Security Registration 6 failed");
    543         return (HID_ERR_NO_RESOURCES);
    544     }
    545 
    546     return( HID_SUCCESS );
    547 }
    548 
    549 /******************************************************************************
    550 **
    551 ** Function         hid_known_hid_device
    552 **
    553 ** Description      check if this device is  of type HID Device
    554 **
    555 ** Returns          TRUE if device is HID Device else FALSE
    556 **
    557 *******************************************************************************/
    558 BOOLEAN hid_known_hid_device (BD_ADDR bd_addr)
    559 {
    560     UINT8 i;
    561     tBTM_INQ_INFO *p_inq_info = BTM_InqDbRead(bd_addr);
    562 
    563      if ( !hh_cb.reg_flag )
    564         return FALSE;
    565 
    566     /* First  check for class of device , if Inq DB has information about this device*/
    567     if (p_inq_info != NULL)
    568     {
    569         /* Check if remote major device class is of type BTM_COD_MAJOR_PERIPHERAL */
    570         if ((p_inq_info->results.dev_class[1] & BTM_COD_MAJOR_CLASS_MASK)
    571             == BTM_COD_MAJOR_PERIPHERAL )
    572         {
    573             HIDH_TRACE_DEBUG("hid_known_hid_device:dev found in InqDB & COD matches HID dev");
    574             return TRUE;
    575         }
    576     }
    577     else
    578     {
    579         /* Look for this device in security device DB */
    580         tBTM_SEC_DEV_REC  *p_dev_rec = btm_find_dev (bd_addr);
    581         if ((p_dev_rec != NULL) &&
    582             ((p_dev_rec->dev_class[1] & BTM_COD_MAJOR_CLASS_MASK) == BTM_COD_MAJOR_PERIPHERAL ))
    583         {
    584             HIDH_TRACE_DEBUG("hid_known_hid_device:dev found in SecDevDB & COD matches HID dev");
    585             return TRUE;
    586         }
    587     }
    588 
    589     /* Find an entry for this device in hh_cb.devices array */
    590      for ( i=0; i<HID_HOST_MAX_DEVICES; i++)
    591      {
    592          if ((hh_cb.devices[i].in_use) &&
    593             (memcmp(bd_addr, hh_cb.devices[i].addr, BD_ADDR_LEN) == 0))
    594              return TRUE;
    595      }
    596     /* Check if this device is marked as HID Device in IOP Dev */
    597     HIDH_TRACE_DEBUG("hid_known_hid_device:remote is not HID device");
    598     return FALSE;
    599 }
    600