Home | History | Annotate | Download | only in btm
      1 /******************************************************************************
      2  *
      3  *  Copyright (C) 1999-2012 Broadcom Corporation
      4  *
      5  *  Licensed under the Apache License, Version 2.0 (the "License");
      6  *  you may not use this file except in compliance with the License.
      7  *  You may obtain a copy of the License at:
      8  *
      9  *  http://www.apache.org/licenses/LICENSE-2.0
     10  *
     11  *  Unless required by applicable law or agreed to in writing, software
     12  *  distributed under the License is distributed on an "AS IS" BASIS,
     13  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     14  *  See the License for the specific language governing permissions and
     15  *  limitations under the License.
     16  *
     17  ******************************************************************************/
     18 
     19 /******************************************************************************
     20  *
     21  *  this file contains the main Bluetooth Manager (BTM) internal
     22  *  definitions.
     23  *
     24  ******************************************************************************/
     25 #ifndef BTM_INT_H
     26 #define BTM_INT_H
     27 
     28 #include "bt_target.h"
     29 #include "bt_common.h"
     30 #include "hcidefs.h"
     31 
     32 #include "rfcdefs.h"
     33 #include "osi/include/alarm.h"
     34 #include "osi/include/list.h"
     35 #include "osi/include/fixed_queue.h"
     36 
     37 #include "btm_api.h"
     38 
     39 #if (BLE_INCLUDED == TRUE)
     40 #include "btm_ble_int.h"
     41 #if (SMP_INCLUDED == TRUE)
     42 #include "smp_api.h"
     43 #endif
     44 #endif
     45 
     46 #if BTM_MAX_LOC_BD_NAME_LEN > 0
     47 typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1];
     48 #endif
     49 
     50 #define  BTM_ACL_IS_CONNECTED(bda)   (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL)
     51 
     52 /* Definitions for Server Channel Number (SCN) management
     53 */
     54 #define BTM_MAX_SCN      PORT_MAX_RFC_PORTS
     55 
     56 /* Define masks for supported and exception 2.0 ACL packet types
     57 */
     58 #define BTM_ACL_SUPPORTED_PKTS_MASK      (HCI_PKT_TYPES_MASK_DM1        | \
     59                                           HCI_PKT_TYPES_MASK_DH1        | \
     60                                           HCI_PKT_TYPES_MASK_DM3        | \
     61                                           HCI_PKT_TYPES_MASK_DH3        | \
     62                                           HCI_PKT_TYPES_MASK_DM5        | \
     63                                           HCI_PKT_TYPES_MASK_DH5)
     64 
     65 #define BTM_ACL_EXCEPTION_PKTS_MASK      (HCI_PKT_TYPES_MASK_NO_2_DH1   | \
     66                                           HCI_PKT_TYPES_MASK_NO_3_DH1   | \
     67                                           HCI_PKT_TYPES_MASK_NO_2_DH3   | \
     68                                           HCI_PKT_TYPES_MASK_NO_3_DH3   | \
     69                                           HCI_PKT_TYPES_MASK_NO_2_DH5   | \
     70                                           HCI_PKT_TYPES_MASK_NO_3_DH5)
     71 
     72 #define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \
     73                                HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \
     74                                ? TRUE : FALSE)
     75 
     76 #define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)
     77 
     78 /* Define the ACL Management control structure
     79 */
     80 typedef struct
     81 {
     82     UINT16          hci_handle;
     83     UINT16          pkt_types_mask;
     84     UINT16          clock_offset;
     85     BD_ADDR         remote_addr;
     86     DEV_CLASS       remote_dc;
     87     BD_NAME         remote_name;
     88 
     89     UINT16          manufacturer;
     90     UINT16          lmp_subversion;
     91     UINT16          link_super_tout;
     92     BD_FEATURES     peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1];    /* Peer LMP Extended features mask table for the device */
     93     UINT8           num_read_pages;
     94     UINT8           lmp_version;
     95 
     96     BOOLEAN         in_use;
     97     UINT8           link_role;
     98     BOOLEAN         link_up_issued;     /* True if busy_level link up has been issued */
     99 
    100 #define BTM_ACL_SWKEY_STATE_IDLE                0
    101 #define BTM_ACL_SWKEY_STATE_MODE_CHANGE         1
    102 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF      2
    103 #define BTM_ACL_SWKEY_STATE_SWITCHING           3
    104 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON       4
    105 #define BTM_ACL_SWKEY_STATE_IN_PROGRESS         5
    106     UINT8           switch_role_state;
    107 
    108 #define BTM_ACL_ENCRYPT_STATE_IDLE              0
    109 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF       1   /* encryption turning off */
    110 #define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC         2   /* temporarily off for change link key or role switch */
    111 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON        3   /* encryption turning on */
    112     UINT8           encrypt_state;                  /* overall BTM encryption state */
    113 
    114 #if BLE_INCLUDED == TRUE
    115     tBT_TRANSPORT   transport;
    116     BD_ADDR         conn_addr;              /* local device address used for this connection */
    117     UINT8           conn_addr_type;         /* local device address type for this connection */
    118     BD_ADDR         active_remote_addr;     /* remote address used on this connection */
    119     UINT8           active_remote_addr_type;         /* local device address type for this connection */
    120     BD_FEATURES     peer_le_features;       /* Peer LE Used features mask for the device */
    121 
    122 #endif
    123 
    124 } tACL_CONN;
    125 
    126 /* Define the Device Management control structure
    127 */
    128 typedef struct
    129 {
    130     tBTM_DEV_STATUS_CB  *p_dev_status_cb;   /* Device status change callback        */
    131     tBTM_VS_EVT_CB      *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS];     /* Register for vendor specific events  */
    132 
    133     tBTM_CMPL_CB        *p_stored_link_key_cmpl_cb;   /* Read/Write/Delete stored link key    */
    134 
    135     alarm_t             *read_local_name_timer; /* Read local name timer */
    136     tBTM_CMPL_CB        *p_rln_cmpl_cb;     /* Callback function to be called when  */
    137                                             /* read local name function complete    */
    138     alarm_t             *read_rssi_timer;   /* Read RSSI timer */
    139     tBTM_CMPL_CB        *p_rssi_cmpl_cb;    /* Callback function to be called when  */
    140                                             /* read RSSI function completes */
    141     alarm_t             *read_link_quality_timer;
    142     tBTM_CMPL_CB        *p_link_qual_cmpl_cb; /* Callback function to be called when  */
    143                                             /* read link quality function completes */
    144 
    145     alarm_t             *read_inq_tx_power_timer;
    146     tBTM_CMPL_CB        *p_inq_tx_power_cmpl_cb; /* Callback function to be called when  */
    147                                             /* read inq tx power function completes  */
    148 
    149     alarm_t             *qos_setup_timer;   /* QoS setup timer */
    150     tBTM_CMPL_CB        *p_qos_setup_cmpl_cb; /* Callback function to be called when  */
    151                                             /* qos setup function completes         */
    152 
    153     tBTM_ROLE_SWITCH_CMPL switch_role_ref_data;
    154     tBTM_CMPL_CB        *p_switch_role_cb;  /* Callback function to be called when  */
    155                                             /* requested switch role is completed   */
    156 
    157     alarm_t             *read_tx_power_timer; /* Read tx power timer */
    158     tBTM_CMPL_CB        *p_tx_power_cmpl_cb;/* Callback function to be called       */
    159 
    160     DEV_CLASS            dev_class;         /* Local device class                   */
    161 
    162 #if BLE_INCLUDED == TRUE
    163 
    164     tBTM_CMPL_CB        *p_le_test_cmd_cmpl_cb;   /* Callback function to be called when
    165                                                   LE test mode command has been sent successfully */
    166 
    167     BD_ADDR                 read_tx_pwr_addr;   /* read TX power target address     */
    168 
    169 #define BTM_LE_SUPPORT_STATE_SIZE   8
    170 UINT8                   le_supported_states[BTM_LE_SUPPORT_STATE_SIZE];
    171 
    172 tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */
    173 BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */
    174 
    175 #if BTM_BLE_CONFORMANCE_TESTING == TRUE
    176     BOOLEAN                 no_disc_if_pair_fail;
    177     BOOLEAN                 enable_test_mac_val;
    178     BT_OCTET8               test_mac;
    179     BOOLEAN                 enable_test_local_sign_cntr;
    180     UINT32                  test_local_sign_cntr;
    181 #endif
    182 
    183 #endif  /* BLE_INCLUDED */
    184 
    185     tBTM_IO_CAP          loc_io_caps;       /* IO capability of the local device */
    186     tBTM_AUTH_REQ        loc_auth_req;      /* the auth_req flag  */
    187     BOOLEAN              secure_connections_only;    /* Rejects service level 0 connections if */
    188                                                      /* itself or peer device doesn't support */
    189                                                      /* secure connections */
    190 } tBTM_DEVCB;
    191 
    192 
    193 /* Define the structures and constants used for inquiry
    194 */
    195 
    196 /* Definitions of limits for inquiries */
    197 #define BTM_PER_INQ_MIN_MAX_PERIOD      HCI_PER_INQ_MIN_MAX_PERIOD
    198 #define BTM_PER_INQ_MAX_MAX_PERIOD      HCI_PER_INQ_MAX_MAX_PERIOD
    199 #define BTM_PER_INQ_MIN_MIN_PERIOD      HCI_PER_INQ_MIN_MIN_PERIOD
    200 #define BTM_PER_INQ_MAX_MIN_PERIOD      HCI_PER_INQ_MAX_MIN_PERIOD
    201 #define BTM_MAX_INQUIRY_LENGTH          HCI_MAX_INQUIRY_LENGTH
    202 #define BTM_MIN_INQUIRY_LEN             0x01
    203 
    204 #define BTM_MIN_INQ_TX_POWER    -70
    205 #define BTM_MAX_INQ_TX_POWER    20
    206 
    207 typedef struct
    208 {
    209     UINT32          inq_count;          /* Used for determining if a response has already been      */
    210                                         /* received for the current inquiry operation. (We do not   */
    211                                         /* want to flood the caller with multiple responses from    */
    212                                         /* the same device.                                         */
    213     BD_ADDR         bd_addr;
    214 } tINQ_BDADDR;
    215 
    216 typedef struct
    217 {
    218     UINT32          time_of_resp;
    219     UINT32          inq_count;          /* "timestamps" the entry with a particular inquiry count   */
    220                                         /* Used for determining if a response has already been      */
    221                                         /* received for the current inquiry operation. (We do not   */
    222                                         /* want to flood the caller with multiple responses from    */
    223                                         /* the same device.                                         */
    224     tBTM_INQ_INFO   inq_info;
    225     BOOLEAN         in_use;
    226 
    227 #if (BLE_INCLUDED == TRUE)
    228     BOOLEAN         scan_rsp;
    229 #endif
    230 } tINQ_DB_ENT;
    231 
    232 
    233 enum
    234 {
    235     INQ_NONE,
    236     INQ_LE_OBSERVE,
    237     INQ_GENERAL
    238 };
    239 typedef UINT8 tBTM_INQ_TYPE;
    240 
    241 typedef struct
    242 {
    243     tBTM_CMPL_CB *p_remname_cmpl_cb;
    244 
    245 #define BTM_EXT_RMT_NAME_TIMEOUT_MS (40 * 1000) /* 40 seconds */
    246 
    247 
    248     alarm_t         *remote_name_timer;
    249 
    250     UINT16           discoverable_mode;
    251     UINT16           connectable_mode;
    252     UINT16           page_scan_window;
    253     UINT16           page_scan_period;
    254     UINT16           inq_scan_window;
    255     UINT16           inq_scan_period;
    256     UINT16           inq_scan_type;
    257     UINT16           page_scan_type;        /* current page scan type */
    258     tBTM_INQ_TYPE    scan_type;
    259 
    260     BD_ADDR          remname_bda;           /* Name of bd addr for active remote name request */
    261 #define BTM_RMT_NAME_INACTIVE       0
    262 #define BTM_RMT_NAME_EXT            0x1     /* Initiated through API */
    263 #define BTM_RMT_NAME_SEC            0x2     /* Initiated internally by security manager */
    264 #define BTM_RMT_NAME_INQ            0x4     /* Remote name initiated internally by inquiry */
    265     BOOLEAN          remname_active;        /* State of a remote name request by external API */
    266 
    267     tBTM_CMPL_CB    *p_inq_cmpl_cb;
    268     tBTM_INQ_RESULTS_CB *p_inq_results_cb;
    269     tBTM_CMPL_CB    *p_inq_ble_cmpl_cb;     /*completion callback exclusively for LE Observe*/
    270     tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/
    271     tBTM_CMPL_CB    *p_inqfilter_cmpl_cb;   /* Called (if not NULL) after inquiry filter completed */
    272     UINT32           inq_counter;           /* Counter incremented each time an inquiry completes */
    273                                             /* Used for determining whether or not duplicate devices */
    274                                             /* have responded to the same inquiry */
    275     tINQ_BDADDR     *p_bd_db;               /* Pointer to memory that holds bdaddrs */
    276     UINT16           num_bd_entries;        /* Number of entries in database */
    277     UINT16           max_bd_entries;        /* Maximum number of entries that can be stored */
    278     tINQ_DB_ENT      inq_db[BTM_INQ_DB_SIZE];
    279     tBTM_INQ_PARMS   inqparms;              /* Contains the parameters for the current inquiry */
    280     tBTM_INQUIRY_CMPL inq_cmpl_info;        /* Status and number of responses from the last inquiry */
    281 
    282     UINT16           per_min_delay;         /* Current periodic minimum delay */
    283     UINT16           per_max_delay;         /* Current periodic maximum delay */
    284     BOOLEAN          inqfilt_active;
    285     UINT8            pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */
    286                                                   /* inquiry that has been cancelled*/
    287     UINT8            inqfilt_type;          /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */
    288 
    289 #define BTM_INQ_INACTIVE_STATE      0
    290 #define BTM_INQ_CLR_FILT_STATE      1   /* Currently clearing the inquiry filter preceeding the inquiry request */
    291                                         /* (bypassed if filtering is not used)                                  */
    292 #define BTM_INQ_SET_FILT_STATE      2   /* Sets the new filter (or turns off filtering) in this state */
    293 #define BTM_INQ_ACTIVE_STATE        3   /* Actual inquiry or periodic inquiry is in progress */
    294 #define BTM_INQ_REMNAME_STATE       4   /* Remote name requests are active  */
    295 
    296     UINT8            state;             /* Current state that the inquiry process is in */
    297     UINT8            inq_active;        /* Bit Mask indicating type of inquiry is active */
    298     BOOLEAN          no_inc_ssp;        /* TRUE, to stop inquiry on incoming SSP */
    299 #if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE)
    300     btm_inq_state    next_state;        /*interleaving state to determine next mode to be inquired*/
    301 #endif
    302 } tBTM_INQUIRY_VAR_ST;
    303 
    304 /* The MSB of the clock offset field indicates that the offset is valid if TRUE */
    305 #define BTM_CLOCK_OFFSET_VALID      0x8000
    306 
    307 /* Define the structures needed by security management
    308 */
    309 
    310 #define BTM_SEC_INVALID_HANDLE  0xFFFF
    311 
    312 typedef UINT8 *BTM_BD_NAME_PTR;                        /* Pointer to Device name */
    313 
    314 /* Security callback is called by this unit when security
    315 **   procedures are completed.  Parameters are
    316 **              BD Address of remote
    317 **              Result of the operation
    318 */
    319 typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK;
    320 
    321 typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ;
    322 
    323 /* MACROs to convert from SCO packet types mask to ESCO and back */
    324 #define BTM_SCO_PKT_TYPE_MASK   (   HCI_PKT_TYPES_MASK_HV1      \
    325                                  |  HCI_PKT_TYPES_MASK_HV2      \
    326                                  |  HCI_PKT_TYPES_MASK_HV3)
    327 
    328 /* Mask defining only the SCO types of an esco packet type */
    329 #define BTM_ESCO_PKT_TYPE_MASK  (   HCI_ESCO_PKT_TYPES_MASK_HV1 \
    330                                  |  HCI_ESCO_PKT_TYPES_MASK_HV2 \
    331                                  |  HCI_ESCO_PKT_TYPES_MASK_HV3)
    332 
    333 #define BTM_SCO_2_ESCO(scotype)  ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5))
    334 #define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5))
    335 
    336 /* Define masks for supported and exception 2.0 SCO packet types
    337 */
    338 #define BTM_SCO_SUPPORTED_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_HV1       | \
    339                                           HCI_ESCO_PKT_TYPES_MASK_HV2       | \
    340                                           HCI_ESCO_PKT_TYPES_MASK_HV3       | \
    341                                           HCI_ESCO_PKT_TYPES_MASK_EV3       | \
    342                                           HCI_ESCO_PKT_TYPES_MASK_EV4       | \
    343                                           HCI_ESCO_PKT_TYPES_MASK_EV5)
    344 
    345 #define BTM_SCO_EXCEPTION_PKTS_MASK      (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3  | \
    346                                           HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3  | \
    347                                           HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5  | \
    348                                           HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)
    349 
    350 
    351 #define BTM_SCO_ROUTE_UNKNOWN       0xff
    352 
    353 /* Define the structure that contains (e)SCO data */
    354 typedef struct
    355 {
    356     tBTM_ESCO_CBACK    *p_esco_cback;   /* Callback for eSCO events     */
    357     tBTM_ESCO_PARAMS    setup;
    358     tBTM_ESCO_DATA      data;           /* Connection complete information */
    359     UINT8               hci_status;
    360 } tBTM_ESCO_INFO;
    361 
    362 /* Define the structure used for SCO Management
    363 */
    364 typedef struct
    365 {
    366     tBTM_ESCO_INFO   esco;              /* Current settings             */
    367 #if BTM_SCO_HCI_INCLUDED == TRUE
    368     fixed_queue_t   *xmit_data_q;       /* SCO data transmitting queue  */
    369 #endif
    370     tBTM_SCO_CB     *p_conn_cb;         /* Callback for when connected  */
    371     tBTM_SCO_CB     *p_disc_cb;         /* Callback for when disconnect */
    372     UINT16           state;             /* The state of the SCO link    */
    373     UINT16           hci_handle;        /* HCI Handle                   */
    374     BOOLEAN          is_orig;           /* TRUE if the originator       */
    375     BOOLEAN          rem_bd_known;      /* TRUE if remote BD addr known */
    376 
    377 } tSCO_CONN;
    378 
    379 /* SCO Management control block */
    380 typedef struct
    381 {
    382     tBTM_SCO_IND_CBACK  *app_sco_ind_cb;
    383 #if BTM_SCO_HCI_INCLUDED == TRUE
    384     tBTM_SCO_DATA_CB     *p_data_cb;        /* Callback for SCO data over HCI */
    385     UINT32               xmit_window_size; /* Total SCO window in bytes  */
    386 #endif
    387     tSCO_CONN            sco_db[BTM_MAX_SCO_LINKS];
    388     tBTM_ESCO_PARAMS     def_esco_parms;
    389     BD_ADDR              xfer_addr;
    390     UINT16               sco_disc_reason;
    391     BOOLEAN              esco_supported;    /* TRUE if 1.2 cntlr AND supports eSCO links */
    392     tBTM_SCO_TYPE        desired_sco_mode;
    393     tBTM_SCO_TYPE        xfer_sco_type;
    394     tBTM_SCO_PCM_PARAM   sco_pcm_param;
    395     tBTM_SCO_CODEC_TYPE  codec_in_use;      /* None, CVSD, MSBC, etc. */
    396 #if BTM_SCO_HCI_INCLUDED == TRUE
    397     tBTM_SCO_ROUTE_TYPE  sco_path;
    398 #endif
    399 
    400 } tSCO_CB;
    401 
    402 
    403 #if BTM_SCO_INCLUDED == TRUE
    404 extern void     btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb );
    405 extern void     btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup,
    406                                     tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb);
    407 extern void     btm_reject_sco_link(UINT16 sco_inx );
    408 extern void btm_sco_chk_pend_rolechange (UINT16 hci_handle);
    409 extern void btm_sco_disc_chk_pend_for_modechange (UINT16 hci_handle);
    410 
    411 #else
    412 #define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb)
    413 #define btm_reject_sco_link(sco_inx)
    414 #define btm_set_sco_ind_cback(sco_ind_cb)
    415 #define btm_sco_chk_pend_rolechange(hci_handle)
    416 #endif  /* BTM_SCO_INCLUDED */
    417 
    418 /*
    419 ** Define structure for Security Service Record.
    420 ** A record exists for each service registered with the Security Manager
    421 */
    422 #define BTM_SEC_OUT_FLAGS   (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHORIZE)
    423 #define BTM_SEC_IN_FLAGS    (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHORIZE)
    424 
    425 #define BTM_SEC_OUT_LEVEL4_FLAGS   (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | \
    426                                     BTM_SEC_OUT_MITM | BTM_SEC_MODE4_LEVEL4)
    427 
    428 #define BTM_SEC_IN_LEVEL4_FLAGS    (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | \
    429                                     BTM_SEC_IN_MITM | BTM_SEC_MODE4_LEVEL4)
    430 typedef struct
    431 {
    432     UINT32          mx_proto_id;        /* Service runs over this multiplexer protocol */
    433     UINT32          orig_mx_chan_id;    /* Channel on the multiplexer protocol    */
    434     UINT32          term_mx_chan_id;    /* Channel on the multiplexer protocol    */
    435     UINT16          psm;                /* L2CAP PSM value */
    436     UINT16          security_flags;     /* Bitmap of required security features */
    437     UINT8           service_id;         /* Passed in authorization callback */
    438 #if (L2CAP_UCD_INCLUDED == TRUE)
    439     UINT16          ucd_security_flags; /* Bitmap of required security features for UCD */
    440 #endif
    441 #if BTM_SEC_SERVICE_NAME_LEN > 0
    442     UINT8           orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
    443     UINT8           term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];
    444 #endif
    445 } tBTM_SEC_SERV_REC;
    446 
    447 #if BLE_INCLUDED == TRUE
    448 /* LE Security information of device in Slave Role */
    449 typedef struct
    450 {
    451     BT_OCTET16          irk;            /* peer diverified identity root */
    452     BT_OCTET16          pltk;           /* peer long term key */
    453     BT_OCTET16          pcsrk;          /* peer SRK peer device used to secured sign local data  */
    454 
    455     BT_OCTET16          lltk;           /* local long term key */
    456     BT_OCTET16          lcsrk;          /* local SRK peer device used to secured sign local data  */
    457 
    458     BT_OCTET8           rand;           /* random vector for LTK generation */
    459     UINT16              ediv;           /* LTK diversifier of this slave device */
    460     UINT16              div;            /* local DIV  to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1)  */
    461     UINT8               sec_level;      /* local pairing security level */
    462     UINT8               key_size;       /* key size of the LTK delivered to peer device */
    463     UINT8               srk_sec_level;  /* security property of peer SRK for this device */
    464     UINT8               local_csrk_sec_level;  /* security property of local CSRK for this device */
    465 
    466     UINT32              counter;        /* peer sign counter for verifying rcv signed cmd */
    467     UINT32              local_counter;  /* local sign counter for sending signed write cmd*/
    468 }tBTM_SEC_BLE_KEYS;
    469 
    470 typedef struct
    471 {
    472     BD_ADDR pseudo_addr; /* LE pseudo address of the device if different from device address  */
    473     tBLE_ADDR_TYPE      ble_addr_type;  /* LE device type: public or random address */
    474     tBLE_ADDR_TYPE      static_addr_type;   /* static address type */
    475     BD_ADDR             static_addr;    /* static address */
    476 
    477 #define BTM_WHITE_LIST_BIT          0x01
    478 #define BTM_RESOLVING_LIST_BIT      0x02
    479     UINT8               in_controller_list;   /* in controller resolving list or not */
    480     UINT8               resolving_list_index;
    481 #if BLE_PRIVACY_SPT == TRUE
    482     BD_ADDR             cur_rand_addr;  /* current random address */
    483 
    484 #define BTM_BLE_ADDR_PSEUDO         0   /* address index device record */
    485 #define BTM_BLE_ADDR_RRA            1   /* cur_rand_addr */
    486 #define BTM_BLE_ADDR_STATIC         2   /* static_addr  */
    487     UINT8               active_addr_type;
    488 #endif
    489 
    490 #if SMP_INCLUDED == TRUE
    491     tBTM_LE_KEY_TYPE    key_type;       /* bit mask of valid key types in record */
    492     tBTM_SEC_BLE_KEYS   keys;           /* LE device security info in slave rode */
    493 #endif
    494 } tBTM_SEC_BLE;
    495 
    496 
    497 #endif  /* BLE_INCLUDED */
    498 
    499 /* Peering bond type */
    500 enum
    501 {
    502     BOND_TYPE_UNKNOWN,
    503     BOND_TYPE_PERSISTENT,
    504     BOND_TYPE_TEMPORARY
    505 };
    506 typedef UINT8 tBTM_BOND_TYPE;
    507 
    508 /*
    509 ** Define structure for Security Device Record.
    510 ** A record exists for each device authenticated with this device
    511 */
    512 typedef struct
    513 {
    514     tBTM_SEC_SERV_REC   *p_cur_service;
    515     tBTM_SEC_CALLBACK   *p_callback;
    516     void                *p_ref_data;
    517     UINT32               timestamp;         /* Timestamp of the last connection   */
    518     UINT32               trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE];  /* Bitwise OR of trusted services     */
    519     UINT16               hci_handle;        /* Handle to connection when exists   */
    520     UINT16               clock_offset;      /* Latest known clock offset          */
    521     BD_ADDR              bd_addr;           /* BD_ADDR of the device              */
    522     DEV_CLASS            dev_class;         /* DEV_CLASS of the device            */
    523     LINK_KEY             link_key;          /* Device link key                    */
    524     UINT8                pin_code_length;   /* Length of the pin_code used for paring */
    525 
    526 #define BTM_SEC_AUTHORIZED      BTM_SEC_FLAG_AUTHORIZED     /* 0x01 */
    527 #define BTM_SEC_AUTHENTICATED   BTM_SEC_FLAG_AUTHENTICATED  /* 0x02 */
    528 #define BTM_SEC_ENCRYPTED       BTM_SEC_FLAG_ENCRYPTED      /* 0x04 */
    529 #define BTM_SEC_NAME_KNOWN      0x08
    530 #define BTM_SEC_LINK_KEY_KNOWN  BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */
    531 #define BTM_SEC_LINK_KEY_AUTHED BTM_SEC_FLAG_LKEY_AUTHED    /* 0x20 */
    532 #define BTM_SEC_ROLE_SWITCHED   0x40
    533 #define BTM_SEC_IN_USE          0x80
    534     /* LE link security flag */
    535 #define BTM_SEC_LE_AUTHENTICATED   0x0200   /* LE link is encrypted after pairing with MITM */
    536 #define BTM_SEC_LE_ENCRYPTED       0x0400   /* LE link is encrypted */
    537 #define BTM_SEC_LE_NAME_KNOWN      0x0800   /* not used */
    538 #define BTM_SEC_LE_LINK_KEY_KNOWN  0x1000   /* bonded with peer (peer LTK and/or SRK is saved) */
    539 #define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000   /* pairing is done with MITM */
    540 #define BTM_SEC_16_DIGIT_PIN_AUTHED 0x4000   /* pairing is done with 16 digit pin */
    541 
    542     UINT16           sec_flags;          /* Current device security state      */
    543 
    544     tBTM_BD_NAME    sec_bd_name;        /* User friendly name of the device. (may be truncated to save space in dev_rec table) */
    545     BD_FEATURES     features[HCI_EXT_FEATURES_PAGE_MAX + 1];           /* Features supported by the device */
    546     UINT8           num_read_pages;
    547 
    548 #define BTM_SEC_STATE_IDLE               0
    549 #define BTM_SEC_STATE_AUTHENTICATING     1
    550 #define BTM_SEC_STATE_ENCRYPTING         2
    551 #define BTM_SEC_STATE_GETTING_NAME       3
    552 #define BTM_SEC_STATE_AUTHORIZING        4
    553 #define BTM_SEC_STATE_SWITCHING_ROLE     5
    554 #define BTM_SEC_STATE_DISCONNECTING      6 /* disconnecting BR/EDR */
    555 #define BTM_SEC_STATE_DELAY_FOR_ENC      7 /* delay to check for encryption to work around */
    556                                            /* controller problems */
    557 #define BTM_SEC_STATE_DISCONNECTING_BLE  8 /* disconnecting BLE */
    558 #define BTM_SEC_STATE_DISCONNECTING_BOTH 9 /* disconnecting BR/EDR and BLE */
    559 
    560     UINT8       sec_state;              /* Operating state                    */
    561     BOOLEAN     is_originator;          /* TRUE if device is originating connection */
    562 #if (L2CAP_UCD_INCLUDED == TRUE)
    563     BOOLEAN     is_ucd;                 /* TRUE if device is sending or receiving UCD */
    564                                         /* if incoming security failed, received UCD will be discarded */
    565 #endif
    566     BOOLEAN     role_master;            /* TRUE if current mode is master     */
    567     UINT16      security_required;      /* Security required for connection   */
    568     BOOLEAN     link_key_not_sent;      /* link key notification has not been sent waiting for name */
    569     UINT8       link_key_type;          /* Type of key used in pairing   */
    570     BOOLEAN     link_key_changed;       /* Changed link key during current connection */
    571 
    572 #define BTM_MAX_PRE_SM4_LKEY_TYPE   BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */
    573 
    574 #define BTM_SM4_UNKNOWN     0x00
    575 #define BTM_SM4_KNOWN       0x10
    576 #define BTM_SM4_TRUE        0x11
    577 #define BTM_SM4_REQ_PEND    0x08        /* set this bit when getting remote features */
    578 #define BTM_SM4_UPGRADE     0x04        /* set this bit when upgrading link key */
    579 #define BTM_SM4_RETRY       0x02        /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */
    580 #define BTM_SM4_DD_ACP      0x20        /* set this bit to indicate peer initiated dedicated bonding */
    581 #define BTM_SM4_CONN_PEND   0x40        /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */
    582     UINT8       sm4;                    /* BTM_SM4_TRUE, if the peer supports SM4 */
    583     tBTM_IO_CAP rmt_io_caps;            /* IO capability of the peer device */
    584     tBTM_AUTH_REQ rmt_auth_req;         /* the auth_req flag as in the IO caps rsp evt */
    585     BOOLEAN     remote_supports_secure_connections;
    586     BOOLEAN     remote_features_needed; /* set to true if the local device is in */
    587                                         /* "Secure Connections Only" mode and it receives */
    588                                         /* HCI_IO_CAPABILITY_REQUEST_EVT from the peer before */
    589                                         /* it knows peer's support for Secure Connections */
    590 
    591     UINT16              ble_hci_handle;         /* use in DUMO connection */
    592     UINT8               enc_key_size;           /* current link encryption key size */
    593     tBT_DEVICE_TYPE     device_type;
    594     BOOLEAN             new_encryption_key_is_p256; /* Set to TRUE when the newly generated LK
    595                                                     ** is generated from P-256.
    596                                                     ** Link encrypted with such LK can be used
    597                                                     ** for SM over BR/EDR.
    598                                                     */
    599     BOOLEAN no_smp_on_br;       /* if set to TRUE then SMP on BR/EDR doesn't */
    600                                 /* work, i.e. link keys crosspairing */
    601                                 /* SC BR/EDR->SC LE doesn't happen */
    602     tBTM_BOND_TYPE bond_type;   /* peering bond type */
    603 
    604 #if BLE_INCLUDED == TRUE
    605     tBTM_SEC_BLE        ble;
    606     tBTM_LE_CONN_PRAMS  conn_params;
    607 #endif
    608 
    609 #if BTM_DISC_DURING_RS == TRUE
    610 #define BTM_SEC_RS_NOT_PENDING          0           /* Role Switch not in progress */
    611 #define BTM_SEC_RS_PENDING              1           /* Role Switch in progress */
    612 #define BTM_SEC_DISC_PENDING            2           /* Disconnect is pending */
    613     UINT8           rs_disc_pending;
    614 #endif
    615 #define BTM_SEC_NO_LAST_SERVICE_ID      0
    616     UINT8           last_author_service_id;         /* ID of last serviced authorized: Reset after each l2cap connection */
    617 
    618 } tBTM_SEC_DEV_REC;
    619 
    620 #define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE)))
    621 #define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE)))
    622 #define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE)))
    623 
    624 #define BTM_SEC_LE_MASK    (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED)
    625 
    626 /*
    627 ** Define device configuration structure
    628 */
    629 typedef struct
    630 {
    631 #if BTM_MAX_LOC_BD_NAME_LEN > 0
    632     tBTM_LOC_BD_NAME bd_name;                    /* local Bluetooth device name */
    633 #endif
    634     BOOLEAN          pin_type;                   /* TRUE if PIN type is fixed */
    635     UINT8            pin_code_len;               /* Bonding information */
    636     PIN_CODE         pin_code;                   /* PIN CODE if pin type is fixed */
    637     BOOLEAN          connectable;                /* If TRUE page scan should be enabled */
    638     UINT8            def_inq_scan_mode;          /* ??? limited/general/none */
    639 } tBTM_CFG;
    640 
    641 enum
    642 {
    643     BTM_PM_ST_ACTIVE  = BTM_PM_STS_ACTIVE,
    644     BTM_PM_ST_HOLD    = BTM_PM_STS_HOLD,
    645     BTM_PM_ST_SNIFF   = BTM_PM_STS_SNIFF,
    646     BTM_PM_ST_PARK    = BTM_PM_STS_PARK,
    647     BTM_PM_ST_PENDING = BTM_PM_STS_PENDING,
    648     BTM_PM_ST_INVALID = 0xFF
    649 };
    650 typedef UINT8 tBTM_PM_STATE;
    651 
    652 enum
    653 {
    654     BTM_PM_SET_MODE_EVT,    /* Set power mode API is called. */
    655     BTM_PM_UPDATE_EVT,
    656     BTM_PM_RD_MODE_EVT     /* Read power mode API is called. */
    657 };
    658 typedef UINT8 tBTM_PM_EVENT;
    659 
    660 typedef struct
    661 {
    662     UINT16          event;
    663     UINT16          len;
    664     UINT8           link_ind;
    665 } tBTM_PM_MSG_DATA;
    666 
    667 typedef struct
    668 {
    669     UINT8 hci_status;
    670     UINT8 mode;
    671     UINT16 interval;
    672 } tBTM_PM_MD_CHG_DATA;
    673 
    674 typedef struct
    675 {
    676     UINT8          pm_id;      /* the entity that calls SetPowerMode API */
    677     tBTM_PM_PWR_MD *p_pmd;
    678 } tBTM_PM_SET_MD_DATA;
    679 
    680 typedef struct
    681 {
    682     void        *p_data;
    683     UINT8        link_ind;
    684 } tBTM_PM_SM_DATA;
    685 
    686 typedef struct
    687 {
    688     tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS+1]; /* the desired mode and parameters of the connection*/
    689     tBTM_PM_PWR_MD set_mode;  /* the mode and parameters sent down to the host controller. */
    690     UINT16         interval;  /* the interval from last mode change event. */
    691 #if (BTM_SSR_INCLUDED == TRUE)
    692     UINT16         max_lat;   /* stored SSR maximum latency */
    693     UINT16         min_rmt_to;/* stored SSR minimum remote timeout */
    694     UINT16         min_loc_to;/* stored SSR minimum local timeout */
    695 #endif
    696     tBTM_PM_STATE  state;     /* contains the current mode of the connection */
    697     BOOLEAN        chg_ind;   /* a request change indication */
    698 } tBTM_PM_MCB;
    699 
    700 #define BTM_PM_REC_NOT_USED 0
    701 typedef struct
    702 {
    703     tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */
    704     UINT8                 mask; /* registered request mask. 0, if this entry is not used */
    705 } tBTM_PM_RCB;
    706 
    707 enum
    708 {
    709     BTM_BLI_ACL_UP_EVT,
    710     BTM_BLI_ACL_DOWN_EVT,
    711     BTM_BLI_PAGE_EVT,
    712     BTM_BLI_PAGE_DONE_EVT,
    713     BTM_BLI_INQ_EVT,
    714     BTM_BLI_INQ_CANCEL_EVT,
    715     BTM_BLI_INQ_DONE_EVT
    716 };
    717 typedef UINT8 tBTM_BLI_EVENT;
    718 
    719 /* Pairing State */
    720 enum
    721 {
    722     BTM_PAIR_STATE_IDLE,                        /* Idle                                         */
    723     BTM_PAIR_STATE_GET_REM_NAME,                /* Getting the remote name (to check for SM4)   */
    724     BTM_PAIR_STATE_WAIT_PIN_REQ,                /* Started authentication, waiting for PIN req (PIN is pre-fetched) */
    725     BTM_PAIR_STATE_WAIT_LOCAL_PIN,              /* Waiting for local PIN code                   */
    726     BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM,        /* Waiting user 'yes' to numeric confirmation   */
    727     BTM_PAIR_STATE_KEY_ENTRY,                   /* Key entry state (we are a keyboard)          */
    728     BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP,          /* Waiting for local response to peer OOB data  */
    729     BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS,           /* Waiting for local IO capabilities and OOB data */
    730     BTM_PAIR_STATE_INCOMING_SSP,                /* Incoming SSP (got peer IO caps when idle)    */
    731     BTM_PAIR_STATE_WAIT_AUTH_COMPLETE,          /* All done, waiting authentication cpmplete    */
    732     BTM_PAIR_STATE_WAIT_DISCONNECT              /* Waiting to disconnect the ACL                */
    733 };
    734 typedef UINT8 tBTM_PAIRING_STATE;
    735 
    736 #define BTM_PAIR_FLAGS_WE_STARTED_DD    0x01    /* We want to do dedicated bonding              */
    737 #define BTM_PAIR_FLAGS_PEER_STARTED_DD  0x02    /* Peer initiated dedicated bonding             */
    738 #define BTM_PAIR_FLAGS_DISC_WHEN_DONE   0x04    /* Disconnect when done     */
    739 #define BTM_PAIR_FLAGS_PIN_REQD         0x08    /* set this bit when pin_callback is called     */
    740 #define BTM_PAIR_FLAGS_PRE_FETCH_PIN    0x10    /* set this bit when pre-fetch pin     */
    741 #define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20    /* set this bit when rejected incoming connection  */
    742 #define BTM_PAIR_FLAGS_WE_CANCEL_DD     0x40    /* set this bit when cancelling a bonding procedure */
    743 #define BTM_PAIR_FLAGS_LE_ACTIVE        0x80    /* use this bit when SMP pairing is active */
    744 
    745 
    746 typedef struct
    747 {
    748     BOOLEAN             is_mux;
    749     BD_ADDR             bd_addr;
    750     UINT16              psm;
    751     BOOLEAN             is_orig;
    752     tBTM_SEC_CALLBACK   *p_callback;
    753     void                *p_ref_data;
    754     UINT32              mx_proto_id;
    755     UINT32              mx_chan_id;
    756     tBT_TRANSPORT       transport;
    757     tBTM_BLE_SEC_ACT    sec_act;
    758 } tBTM_SEC_QUEUE_ENTRY;
    759 
    760 #if (L2CAP_UCD_INCLUDED == TRUE)
    761 
    762 #define CONN_ORIENT_TERM                0x00    /* incoming connection oriented */
    763 #define CONN_ORIENT_ORIG                0x01    /* outgoing connection oriented */
    764 #define CONNLESS_TERM                   0x02    /* incoming connectionless      */
    765 #define CONNLESS_ORIG                   0x03    /* outgoing connectionless      */
    766 #define CONNECTION_TYPE_ORIG_MASK       0x01    /* mask for direction           */
    767 #define CONNECTION_TYPE_CONNLESS_MASK   0x02    /* mask for connectionless or not */
    768 typedef UINT8 CONNECTION_TYPE;
    769 
    770 #else
    771 
    772 #define CONN_ORIENT_TERM                FALSE
    773 #define CONN_ORIENT_ORIG                TRUE
    774 typedef BOOLEAN CONNECTION_TYPE;
    775 
    776 #endif /* (L2CAP_UCD_INCLUDED == TRUE) */
    777 
    778 /* Define a structure to hold all the BTM data
    779 */
    780 
    781 #define BTM_STATE_BUFFER_SIZE  5                  /* size of state buffer */
    782 
    783 typedef struct
    784 {
    785     tBTM_CFG    cfg;                        /* Device configuration */
    786 
    787     /****************************************************
    788     **      ACL Management
    789     ****************************************************/
    790     tACL_CONN   acl_db[MAX_L2CAP_LINKS];
    791     UINT8       btm_scn[BTM_MAX_SCN];        /* current SCNs: TRUE if SCN is in use */
    792     UINT16      btm_def_link_policy;
    793     UINT16      btm_def_link_super_tout;
    794 
    795     tBTM_BL_EVENT_MASK     bl_evt_mask;
    796     tBTM_BL_CHANGE_CB     *p_bl_changed_cb;    /* Callback for when Busy Level changed */
    797 
    798     /****************************************************
    799     **      Power Management
    800     ****************************************************/
    801     tBTM_PM_MCB pm_mode_db[MAX_L2CAP_LINKS];   /* per ACL link */
    802     tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS+1]; /* per application/module */
    803     UINT8       pm_pend_link;  /* the index of acl_db, which has a pending PM cmd */
    804     UINT8       pm_pend_id;    /* the id pf the module, which has a pending PM cmd */
    805 
    806     /*****************************************************
    807     **      Device control
    808     *****************************************************/
    809     tBTM_DEVCB  devcb;
    810 
    811     /*****************************************************
    812     **      BLE Device controllers
    813     *****************************************************/
    814 #if (BLE_INCLUDED == TRUE)
    815     tBTM_BLE_CB             ble_ctr_cb;
    816 
    817     UINT16                  enc_handle;
    818     BT_OCTET8               enc_rand;   /* received rand value from LTK request*/
    819     UINT16                  ediv;       /* received ediv value from LTK request */
    820     UINT8                   key_size;
    821     tBTM_BLE_VSC_CB         cmn_ble_vsc_cb;
    822 #endif
    823 
    824                                             /* Packet types supported by the local device */
    825     UINT16      btm_acl_pkt_types_supported;
    826     UINT16      btm_sco_pkt_types_supported;
    827 
    828 
    829     /*****************************************************
    830     **      Inquiry
    831     *****************************************************/
    832     tBTM_INQUIRY_VAR_ST     btm_inq_vars;
    833 
    834     /*****************************************************
    835     **      SCO Management
    836     *****************************************************/
    837 #if BTM_SCO_INCLUDED == TRUE
    838     tSCO_CB             sco_cb;
    839 #endif
    840 
    841     /*****************************************************
    842     **      Security Management
    843     *****************************************************/
    844     tBTM_APPL_INFO          api;
    845 
    846 #define BTM_SEC_MAX_RMT_NAME_CALLBACKS  2
    847     tBTM_RMT_NAME_CALLBACK  *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS];
    848 
    849     tBTM_SEC_DEV_REC        *p_collided_dev_rec;
    850     alarm_t                 *sec_collision_timer;
    851     UINT32                   collision_start_time;
    852     UINT32                   max_collision_delay;
    853     UINT32                   dev_rec_count;      /* Counter used for device record timestamp */
    854     UINT8                    security_mode;
    855     BOOLEAN                  pairing_disabled;
    856     BOOLEAN                  connect_only_paired;
    857     BOOLEAN                  security_mode_changed;  /* mode changed during bonding */
    858     BOOLEAN                  pin_type_changed;       /* pin type changed during bonding */
    859     BOOLEAN                  sec_req_pending;       /*   TRUE if a request is pending */
    860 
    861     UINT8                    pin_code_len;  /* for legacy devices */
    862     PIN_CODE                 pin_code;      /* for legacy devices */
    863     tBTM_PAIRING_STATE       pairing_state; /* The current pairing state    */
    864     UINT8                    pairing_flags; /* The current pairing flags    */
    865     BD_ADDR                  pairing_bda;   /* The device currently pairing */
    866     alarm_t                 *pairing_timer; /* Timer for pairing process    */
    867     UINT16                   disc_handle;   /* for legacy devices */
    868     UINT8                    disc_reason;   /* for legacy devices */
    869     tBTM_SEC_SERV_REC        sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS];
    870     list_t                  *sec_dev_rec;   /* list of tBTM_SEC_DEV_REC */
    871     tBTM_SEC_SERV_REC       *p_out_serv;
    872     tBTM_MKEY_CALLBACK      *mkey_cback;
    873 
    874     BD_ADDR                  connecting_bda;
    875     DEV_CLASS                connecting_dc;
    876 
    877     UINT8                   acl_disc_reason;
    878     UINT8                   trace_level;
    879     UINT8                   busy_level; /* the current busy level */
    880     BOOLEAN                 is_paging;  /* TRUE, if paging is in progess */
    881     BOOLEAN                 is_inquiry; /* TRUE, if inquiry is in progess */
    882     fixed_queue_t          *page_queue;
    883     BOOLEAN                 paging;
    884     BOOLEAN                 discing;
    885     fixed_queue_t          *sec_pending_q;  /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */
    886 
    887 #if  (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE))
    888     char state_temp_buffer[BTM_STATE_BUFFER_SIZE];
    889 #endif
    890 } tBTM_CB;
    891 
    892 /* security action for L2CAP COC channels */
    893 #define BTM_SEC_OK                1
    894 #define BTM_SEC_ENCRYPT           2    /* encrypt the link with current key */
    895 #define BTM_SEC_ENCRYPT_NO_MITM   3    /* unauthenticated encryption or better */
    896 #define BTM_SEC_ENCRYPT_MITM      4    /* authenticated encryption */
    897 #define BTM_SEC_ENC_PENDING       5    /* wait for link encryption pending */
    898 
    899 typedef UINT8 tBTM_SEC_ACTION;
    900 
    901 #ifdef __cplusplus
    902 extern "C"
    903 {
    904 #endif
    905 
    906 #if BTM_DYNAMIC_MEMORY == FALSE
    907 extern tBTM_CB  btm_cb;
    908 #else
    909 extern tBTM_CB *btm_cb_ptr;
    910 #define btm_cb (*btm_cb_ptr)
    911 #endif
    912 
    913 /* Internal functions provided by btm_main.c
    914 ********************************************
    915 */
    916 extern void         btm_init (void);
    917 
    918 /* Internal functions provided by btm_inq.c
    919 *******************************************
    920 */
    921 extern tBTM_STATUS  btm_initiate_rem_name(BD_ADDR remote_bda,
    922                                           tBTM_INQ_INFO *p_cur,
    923                                           UINT8 origin, period_ms_t timeout_ms,
    924                                           tBTM_CMPL_CB *p_cb);
    925 
    926 extern void         btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len,
    927                                              UINT8 hci_status);
    928 extern void         btm_inq_rmt_name_failed(void);
    929 extern void         btm_inq_remote_name_timer_timeout(void *data);
    930 
    931 /* Inquiry related functions */
    932 extern void         btm_clr_inq_db (BD_ADDR p_bda);
    933 extern void         btm_inq_db_init (void);
    934 extern void         btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode);
    935 extern void         btm_process_inq_complete (UINT8 status, UINT8 mode);
    936 extern void         btm_process_cancel_complete(UINT8 status, UINT8 mode);
    937 extern void         btm_event_filter_complete (UINT8 *p);
    938 extern void         btm_inq_stop_on_ssp(void);
    939 extern void         btm_inq_clear_ssp(void);
    940 extern tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda);
    941 extern BOOLEAN      btm_inq_find_bdaddr (BD_ADDR p_bda);
    942 
    943 extern BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr);
    944 
    945 /* Internal functions provided by btm_acl.c
    946 ********************************************
    947 */
    948 extern void         btm_acl_init (void);
    949 extern void         btm_acl_created (BD_ADDR bda, DEV_CLASS dc, BD_NAME bdn,
    950                                      UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport);
    951 extern void         btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport);
    952 extern void         btm_acl_device_down (void);
    953 extern void         btm_acl_update_busy_level (tBTM_BLI_EVENT event);
    954 
    955 extern void         btm_cont_rswitch (tACL_CONN *p,
    956                                       tBTM_SEC_DEV_REC *p_dev_rec,
    957                                       UINT8 hci_status);
    958 
    959 extern UINT8        btm_handle_to_acl_index (UINT16 hci_handle);
    960 extern void         btm_read_link_policy_complete (UINT8 *p);
    961 
    962 extern void         btm_read_rssi_timeout(void *data);
    963 extern void         btm_read_rssi_complete(UINT8 *p);
    964 
    965 extern void         btm_read_tx_power_timeout(void *data);
    966 extern void         btm_read_tx_power_complete(UINT8 *p, BOOLEAN is_ble);
    967 
    968 extern void         btm_read_link_quality_timeout(void *data);
    969 extern void         btm_read_link_quality_complete(UINT8 *p);
    970 
    971 extern tBTM_STATUS  btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types);
    972 extern void         btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset);
    973 extern void         btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role);
    974 extern void         btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
    975 extern UINT16       btm_get_acl_disc_reason_code (void);
    976 extern tBTM_STATUS  btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport);
    977 extern void         btm_read_remote_features_complete (UINT8 *p);
    978 extern void         btm_read_remote_ext_features_complete (UINT8 *p);
    979 extern void         btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle);
    980 extern void         btm_read_remote_version_complete (UINT8 *p);
    981 extern void         btm_establish_continue (tACL_CONN *p_acl_cb);
    982 
    983 extern void         btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type);
    984 /* Read maximum data packet that can be sent over current connection */
    985 extern UINT16 btm_get_max_packet_size (BD_ADDR addr);
    986 extern tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport);
    987 extern BOOLEAN    btm_acl_notif_conn_collision (BD_ADDR bda);
    988 
    989 extern void btm_pm_reset(void);
    990 extern void btm_pm_sm_alloc(UINT8 ind);
    991 extern void btm_pm_proc_cmd_status(UINT8 status);
    992 extern void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode,
    993                                      UINT16 interval);
    994 extern void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len);
    995 extern tBTM_STATUS btm_read_power_mode_state (BD_ADDR remote_bda,
    996                                                       tBTM_PM_STATE *pmState);
    997 #if BTM_SCO_INCLUDED == TRUE
    998 extern void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle);
    999 #else
   1000 #define btm_sco_chk_pend_unpark(hci_status, hci_handle)
   1001 #endif /* BTM_SCO_INCLUDED */
   1002 
   1003 extern void btm_qos_setup_timeout(void *data);
   1004 extern void btm_qos_setup_complete(UINT8 status, UINT16 handle,
   1005                                    FLOW_SPEC *p_flow);
   1006 
   1007 
   1008 /* Internal functions provided by btm_sco.c
   1009 ********************************************
   1010 */
   1011 extern void btm_sco_init (void);
   1012 extern void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle,
   1013                                tBTM_ESCO_DATA *p_esco_data);
   1014 extern void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval,
   1015                                     UINT8 retrans_window, UINT16 rx_pkt_len,
   1016                                     UINT16 tx_pkt_len);
   1017 extern void btm_sco_conn_req (BD_ADDR bda,  DEV_CLASS dev_class, UINT8 link_type);
   1018 extern void btm_sco_removed (UINT16 hci_handle, UINT8 reason);
   1019 extern void btm_sco_acl_removed (BD_ADDR bda);
   1020 extern void btm_route_sco_data (BT_HDR *p_msg);
   1021 extern BOOLEAN btm_is_sco_active (UINT16 handle);
   1022 extern void btm_remove_sco_links (BD_ADDR bda);
   1023 extern BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda);
   1024 
   1025 extern tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms);
   1026 extern UINT16  btm_find_scb_by_handle (UINT16 handle);
   1027 extern void btm_sco_flush_sco_data(UINT16 sco_inx);
   1028 
   1029 /* Internal functions provided by btm_devctl.c
   1030 **********************************************
   1031 */
   1032 extern void btm_dev_init(void);
   1033 extern void btm_read_local_name_timeout(void *data);
   1034 extern void btm_read_local_name_complete(UINT8 *p, UINT16 evt_len);
   1035 
   1036 #if (BLE_INCLUDED == TRUE)
   1037 extern void btm_ble_add_2_white_list_complete(UINT8 status);
   1038 extern void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len);
   1039 extern void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len);
   1040 extern BOOLEAN btm_ble_addr_resolvable(BD_ADDR rpa, tBTM_SEC_DEV_REC *p_dev_rec);
   1041 extern tBTM_STATUS btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *p_dev_rec);
   1042 extern BOOLEAN btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *p_dev_rec);
   1043 extern void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *p_dev_rec);
   1044 #endif  /* BLE_INCLUDED */
   1045 
   1046 /* Vendor Specific Command complete evt handler */
   1047 extern void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len,
   1048                               tBTM_CMPL_CB *p_vsc_cplt_cback);
   1049 extern void btm_inq_db_reset (void);
   1050 extern void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len);
   1051 extern void btm_delete_stored_link_key_complete (UINT8 *p);
   1052 extern void btm_report_device_status (tBTM_DEV_STATUS status);
   1053 
   1054 
   1055 /* Internal functions provided by btm_dev.c
   1056 **********************************************
   1057 */
   1058 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
   1059 
   1060 extern tBTM_SEC_DEV_REC  *btm_sec_alloc_dev (BD_ADDR bd_addr);
   1061 extern void               btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec);
   1062 extern tBTM_SEC_DEV_REC  *btm_find_dev (BD_ADDR bd_addr);
   1063 extern tBTM_SEC_DEV_REC  *btm_find_or_alloc_dev (BD_ADDR bd_addr);
   1064 extern tBTM_SEC_DEV_REC  *btm_find_dev_by_handle (UINT16 handle);
   1065 extern tBTM_BOND_TYPE     btm_get_bond_type_dev(BD_ADDR bd_addr);
   1066 extern BOOLEAN            btm_set_bond_type_dev(BD_ADDR bd_addr,
   1067                                                 tBTM_BOND_TYPE bond_type);
   1068 
   1069 /* Internal functions provided by btm_sec.c
   1070 **********************************************
   1071 */
   1072 extern BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr);
   1073 extern tBTM_STATUS  btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm,
   1074                                        UINT16 handle, CONNECTION_TYPE conn_type,
   1075                                        tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
   1076 extern tBTM_STATUS  btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
   1077                                         UINT32 mx_proto_id, UINT32 mx_chan_id,
   1078                                         tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
   1079 extern void  btm_sec_conn_req (UINT8 *bda, UINT8 *dc);
   1080 extern void btm_create_conn_cancel_complete (UINT8 *p);
   1081 
   1082 extern void  btm_read_inq_tx_power_timeout(void *data);
   1083 extern void  btm_read_inq_tx_power_complete(UINT8 *p);
   1084 
   1085 extern void  btm_sec_init (UINT8 sec_mode);
   1086 extern void  btm_sec_dev_reset (void);
   1087 extern void  btm_sec_abort_access_req (BD_ADDR bd_addr);
   1088 extern void  btm_sec_auth_complete (UINT16 handle, UINT8 status);
   1089 extern void  btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable);
   1090 extern void  btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode);
   1091 extern tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason);
   1092 extern void  btm_sec_disconnected (UINT16 handle, UINT8 reason);
   1093 extern void  btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status);
   1094 extern void  btm_sec_rmt_host_support_feat_evt (UINT8 *p);
   1095 extern void  btm_io_capabilities_req (UINT8 *p);
   1096 extern void  btm_io_capabilities_rsp (UINT8 *p);
   1097 extern void  btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p);
   1098 extern void  btm_keypress_notif_evt (UINT8 *p);
   1099 extern void  btm_simple_pair_complete (UINT8 *p);
   1100 extern void  btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type);
   1101 extern void  btm_sec_link_key_request (UINT8 *p_bda);
   1102 extern void  btm_sec_pin_code_request (UINT8 *p_bda);
   1103 extern void  btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset);
   1104 extern void  btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_trasnport);
   1105 extern void btm_sec_set_peer_sec_caps (tACL_CONN *p_acl_cb, tBTM_SEC_DEV_REC *p_dev_rec);
   1106 
   1107 #if BLE_INCLUDED == TRUE
   1108 extern void  btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC  *p_dev_rec);
   1109 extern BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda);
   1110 extern void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec);
   1111 extern BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda);
   1112 extern BOOLEAN btm_ble_init_pseudo_addr (tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR new_pseudo_addr);
   1113 extern tBTM_SEC_SERV_REC *btm_sec_find_first_serv (CONNECTION_TYPE conn_type, UINT16 psm);
   1114 extern BOOLEAN btm_ble_start_sec_check(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator,
   1115                             tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);
   1116 #endif /* BLE_INCLUDED */
   1117 
   1118 extern tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda);
   1119 
   1120 extern void  btm_rem_oob_req (UINT8 *p);
   1121 extern void  btm_read_local_oob_complete (UINT8 *p);
   1122 
   1123 extern void  btm_acl_resubmit_page (void);
   1124 extern void  btm_acl_reset_paging (void);
   1125 extern void  btm_acl_paging (BT_HDR *p, BD_ADDR dest);
   1126 extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
   1127 extern void  btm_sec_clr_temp_auth_service (BD_ADDR bda);
   1128 
   1129 #ifdef __cplusplus
   1130 }
   1131 #endif
   1132 
   1133 #endif
   1134