1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /** 39 * @title Host Controler Interface (HCI) 40 * 41 */ 42 43 #ifndef HCI_H 44 #define HCI_H 45 46 #include "btstack_config.h" 47 48 #include "btstack_chipset.h" 49 #include "btstack_control.h" 50 #include "btstack_linked_list.h" 51 #include "btstack_util.h" 52 #include "hci_cmd.h" 53 #include "gap.h" 54 #include "hci_transport.h" 55 #include "btstack_run_loop.h" 56 57 #ifdef ENABLE_CLASSIC 58 #include "classic/btstack_link_key_db.h" 59 #endif 60 61 #ifdef ENABLE_BLE 62 #include "ble/att_db.h" 63 #endif 64 65 #ifdef HAVE_SCO_TRANSPORT 66 #include "btstack_sco_transport.h" 67 #endif 68 69 #include <stdint.h> 70 #include <stdlib.h> 71 #include <stdarg.h> 72 73 #if defined __cplusplus 74 extern "C" { 75 #endif 76 77 // packet buffer sizes 78 #define HCI_CMD_HEADER_SIZE 3 79 #define HCI_ACL_HEADER_SIZE 4 80 #define HCI_SCO_HEADER_SIZE 3 81 #define HCI_EVENT_HEADER_SIZE 2 82 83 #define HCI_EVENT_PAYLOAD_SIZE 255 84 #define HCI_CMD_PAYLOAD_SIZE 255 85 86 // Max HCI Command LE payload size: 87 // 64 from LE Generate DHKey command 88 // 32 from LE Encrypt command 89 #if defined(ENABLE_LE_SECURE_CONNECTIONS) && !defined(ENABLE_MICRO_ECC_FOR_LE_SECURE_CONNECTIONS) 90 #define HCI_CMD_PAYLOAD_SIZE_LE 64 91 #else 92 #define HCI_CMD_PAYLOAD_SIZE_LE 32 93 #endif 94 95 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 96 // addition byte in even to terminate remote name request with '\0' 97 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE + 1) 98 99 #ifdef ENABLE_CLASSIC 100 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 101 #else 102 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE_LE) 103 #endif 104 105 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 106 107 // size of hci incoming buffer, big enough for event or acl packet without H4 packet type 108 #ifdef HCI_INCOMING_PACKET_BUFFER_SIZE 109 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 110 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 111 #endif 112 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_EVENT_BUFFER_SIZE 113 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_EVENT_BUFFER_SIZE 114 #endif 115 #else 116 #if HCI_ACL_BUFFER_SIZE > HCI_EVENT_BUFFER_SIZE 117 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 118 #else 119 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_EVENT_BUFFER_SIZE 120 #endif 121 #endif 122 123 // size of hci outgoing buffer, big enough for command or acl packet without H4 packet type 124 #ifdef HCI_OUTGOING_PACKET_BUFFER_SIZE 125 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 126 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 127 #endif 128 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 129 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 130 #endif 131 #else 132 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 133 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 134 #else 135 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 136 #endif 137 #endif 138 139 // additional pre-buffer space for packets to Bluetooth module 140 // - H4 requires 1 byte for the packet type 141 // - h5 requires 4 bytes for H5 header 142 #ifndef HCI_OUTGOING_PRE_BUFFER_SIZE 143 #ifdef HAVE_HOST_CONTROLLER_API 144 #define HCI_OUTGOING_PRE_BUFFER_SIZE 0 145 #else 146 #ifdef ENABLE_H5 147 #define HCI_OUTGOING_PRE_BUFFER_SIZE 4 148 #else 149 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 150 #endif 151 #endif 152 #endif 153 154 // BNEP may uncompress the IP Header by 16 bytes, GATT Client requires two additional bytes for long characteristic reads 155 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 156 #ifdef ENABLE_CLASSIC 157 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 158 #else 159 #define HCI_INCOMING_PRE_BUFFER_SIZE 2 160 #endif 161 #endif 162 163 // 164 #define IS_COMMAND(packet, command) ( little_endian_read_16(packet,0) == command.opcode ) 165 166 // check if command complete event for given command 167 #define HCI_EVENT_IS_COMMAND_COMPLETE(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_COMPLETE) && (little_endian_read_16(event,3) == cmd.opcode) ) 168 #define HCI_EVENT_IS_COMMAND_STATUS(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_STATUS) && (little_endian_read_16(event,4) == cmd.opcode) ) 169 170 // Code+Len=2, Pkts+Opcode=3; total=5 171 #define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5 172 173 // ACL Packet 174 #define READ_ACL_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 175 #define READ_SCO_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 176 #define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 ) 177 #define READ_ACL_LENGTH( buffer ) (little_endian_read_16(buffer, 2)) 178 179 // Sneak peak into L2CAP Packet 180 #define READ_L2CAP_LENGTH(buffer) ( little_endian_read_16(buffer, 4)) 181 #define READ_L2CAP_CHANNEL_ID(buffer) ( little_endian_read_16(buffer, 6)) 182 183 /** 184 * LE connection parameter update state 185 */ 186 187 typedef enum { 188 CON_PARAMETER_UPDATE_NONE, 189 // L2CAP 190 CON_PARAMETER_UPDATE_SEND_REQUEST, 191 CON_PARAMETER_UPDATE_SEND_RESPONSE, 192 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 193 CON_PARAMETER_UPDATE_DENY, 194 // HCI - in respnose to HCI_SUBEVENT_LE_REMOTE_CONNECTION_PARAMETER_REQUEST 195 CON_PARAMETER_UPDATE_REPLY, 196 CON_PARAMETER_UPDATE_NEGATIVE_REPLY, 197 } le_con_parameter_update_state_t; 198 199 // Authentication flags 200 typedef enum { 201 AUTH_FLAG_NONE = 0x0000, 202 AUTH_FLAG_HANDLE_LINK_KEY_REQUEST = 0x0001, 203 AUTH_FLAG_DENY_PIN_CODE_REQUEST = 0x0002, 204 AUTH_FLAG_RECV_IO_CAPABILITIES_REQUEST = 0x0004, 205 AUTH_FLAG_RECV_IO_CAPABILITIES_RESPONSE = 0x0008, 206 AUTH_FLAG_SEND_IO_CAPABILITIES_REPLY = 0x0010, 207 AUTH_FLAG_SEND_IO_CAPABILITIES_NEGATIVE_REPLY = 0x0020, 208 AUTH_FLAG_SEND_USER_CONFIRM_REPLY = 0x0040, 209 AUTH_FLAG_SEND_USER_CONFIRM_NEGATIVE_REPLY = 0x0080, 210 AUTH_FLAG_SEND_USER_PASSKEY_REPLY = 0x0100, 211 212 // Classic OOB 213 AUTH_FLAG_SEND_REMOTE_OOB_DATA_REPLY = 0x0200, 214 215 // pairing status 216 AUTH_FLAG_LEGACY_PAIRING_ACTIVE = 0x0400, 217 AUTH_FLAG_SSP_PAIRING_ACTIVE = 0x0800, 218 AUTH_FLAG_PAIRING_ACTIVE_MASK = (AUTH_FLAG_LEGACY_PAIRING_ACTIVE | AUTH_FLAG_SSP_PAIRING_ACTIVE), 219 220 // connection status 221 AUTH_FLAG_CONNECTION_AUTHENTICATED = 0x1000, 222 AUTH_FLAG_CONNECTION_ENCRYPTED = 0x2000, 223 224 // errands 225 AUTH_FLAG_READ_RSSI = 0x4000, 226 AUTH_FLAG_WRITE_SUPERVISION_TIMEOUT = 0x8000, 227 228 } hci_authentication_flags_t; 229 230 /** 231 * Connection State 232 */ 233 typedef enum { 234 SEND_CREATE_CONNECTION = 0, 235 SENT_CREATE_CONNECTION, 236 SEND_CANCEL_CONNECTION, 237 SENT_CANCEL_CONNECTION, 238 RECEIVED_CONNECTION_REQUEST, 239 ACCEPTED_CONNECTION_REQUEST, 240 REJECTED_CONNECTION_REQUEST, 241 OPEN, 242 SEND_DISCONNECT, 243 SENT_DISCONNECT, 244 RECEIVED_DISCONNECTION_COMPLETE 245 } CONNECTION_STATE; 246 247 // bonding flags 248 enum { 249 BONDING_REQUEST_REMOTE_FEATURES_PAGE_0 = 0x0001, 250 BONDING_REQUEST_REMOTE_FEATURES_PAGE_1 = 0x0002, 251 BONDING_REQUEST_REMOTE_FEATURES_PAGE_2 = 0x0004, 252 BONDING_RECEIVED_REMOTE_FEATURES = 0x0008, 253 BONDING_REMOTE_SUPPORTS_SSP_CONTROLLER = 0x0010, 254 BONDING_REMOTE_SUPPORTS_SSP_HOST = 0x0020, 255 BONDING_REMOTE_SUPPORTS_SC_CONTROLLER = 0x0040, 256 BONDING_REMOTE_SUPPORTS_SC_HOST = 0x0080, 257 BONDING_DISCONNECT_SECURITY_BLOCK = 0x0100, 258 BONDING_DISCONNECT_DEDICATED_DONE = 0x0200, 259 BONDING_SEND_AUTHENTICATE_REQUEST = 0x0400, 260 BONDING_SEND_ENCRYPTION_REQUEST = 0x0800, 261 BONDING_SEND_READ_ENCRYPTION_KEY_SIZE = 0x1000, 262 BONDING_DEDICATED = 0x2000, 263 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x4000, 264 BONDING_SENT_AUTHENTICATE_REQUEST = 0x8000 265 }; 266 267 typedef enum { 268 BLUETOOTH_OFF = 1, 269 BLUETOOTH_ON, 270 BLUETOOTH_ACTIVE 271 } BLUETOOTH_STATE; 272 273 typedef enum { 274 LE_CONNECTING_IDLE, 275 LE_CONNECTING_CANCEL, 276 LE_CONNECTING_DIRECT, 277 LE_CONNECTING_WHITELIST, 278 } le_connecting_state_t; 279 280 #ifdef ENABLE_BLE 281 282 // 283 // SM internal types and globals 284 // 285 286 typedef enum { 287 288 // general states 289 SM_GENERAL_IDLE, 290 SM_GENERAL_SEND_PAIRING_FAILED, 291 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 292 SM_GENERAL_REENCRYPTION_FAILED, 293 294 // Phase 1: Pairing Feature Exchange 295 SM_PH1_W4_USER_RESPONSE, 296 297 // Phase 2: Authenticating and Encrypting 298 299 // get random number for use as TK Passkey if we show it 300 SM_PH2_GET_RANDOM_TK, 301 SM_PH2_W4_RANDOM_TK, 302 303 // get local random number for confirm c1 304 SM_PH2_C1_GET_RANDOM_A, 305 SM_PH2_C1_W4_RANDOM_A, 306 SM_PH2_C1_GET_RANDOM_B, 307 SM_PH2_C1_W4_RANDOM_B, 308 309 // calculate confirm value for local side 310 SM_PH2_C1_GET_ENC_A, 311 SM_PH2_C1_W4_ENC_A, 312 313 // calculate confirm value for remote side 314 SM_PH2_C1_GET_ENC_C, 315 SM_PH2_C1_W4_ENC_C, 316 317 SM_PH2_C1_SEND_PAIRING_CONFIRM, 318 SM_PH2_SEND_PAIRING_RANDOM, 319 320 // calc STK 321 SM_PH2_CALC_STK, 322 SM_PH2_W4_STK, 323 324 SM_PH2_W4_CONNECTION_ENCRYPTED, 325 326 // Phase 3: Transport Specific Key Distribution 327 // calculate DHK, Y, EDIV, and LTK 328 SM_PH3_Y_GET_ENC, 329 SM_PH3_Y_W4_ENC, 330 SM_PH3_LTK_GET_ENC, 331 332 // exchange keys 333 SM_PH3_DISTRIBUTE_KEYS, 334 SM_PH3_RECEIVE_KEYS, 335 336 // Phase 4: re-establish previously distributed LTK 337 SM_PH4_W4_CONNECTION_ENCRYPTED, 338 339 // RESPONDER ROLE 340 SM_RESPONDER_IDLE, 341 SM_RESPONDER_SEND_SECURITY_REQUEST, 342 SM_RESPONDER_PH0_RECEIVED_LTK_REQUEST, 343 SM_RESPONDER_PH0_RECEIVED_LTK_W4_IRK, 344 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 345 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 346 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 347 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED_W4_IRK, 348 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 349 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 350 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 351 SM_RESPONDER_PH2_W4_LTK_REQUEST, 352 SM_RESPONDER_PH2_SEND_LTK_REPLY, 353 SM_RESPONDER_PH4_Y_W4_ENC, 354 SM_RESPONDER_PH4_SEND_LTK_REPLY, 355 356 // INITIATOR ROLE 357 SM_INITIATOR_CONNECTED, 358 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 359 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 360 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 361 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 362 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 363 SM_INITIATOR_PH4_HAS_LTK, 364 365 // LE Secure Connections 366 SM_SC_RECEIVED_LTK_REQUEST, 367 SM_SC_SEND_PUBLIC_KEY_COMMAND, 368 SM_SC_W4_PUBLIC_KEY_COMMAND, 369 SM_SC_W4_LOCAL_NONCE, 370 SM_SC_W2_CMAC_FOR_CONFIRMATION, 371 SM_SC_W4_CMAC_FOR_CONFIRMATION, 372 SM_SC_SEND_CONFIRMATION, 373 SM_SC_W2_CMAC_FOR_CHECK_CONFIRMATION, 374 SM_SC_W4_CMAC_FOR_CHECK_CONFIRMATION, 375 SM_SC_W4_CONFIRMATION, 376 SM_SC_SEND_PAIRING_RANDOM, 377 SM_SC_W4_PAIRING_RANDOM, 378 SM_SC_W2_CALCULATE_G2, 379 SM_SC_W4_CALCULATE_G2, 380 SM_SC_W4_CALCULATE_DHKEY, 381 SM_SC_W2_CALCULATE_F5_SALT, 382 SM_SC_W4_CALCULATE_F5_SALT, 383 SM_SC_W2_CALCULATE_F5_MACKEY, 384 SM_SC_W4_CALCULATE_F5_MACKEY, 385 SM_SC_W2_CALCULATE_F5_LTK, 386 SM_SC_W4_CALCULATE_F5_LTK, 387 SM_SC_W2_CALCULATE_F6_FOR_DHKEY_CHECK, 388 SM_SC_W4_CALCULATE_F6_FOR_DHKEY_CHECK, 389 SM_SC_W2_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 390 SM_SC_W4_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 391 SM_SC_W4_USER_RESPONSE, 392 SM_SC_SEND_DHKEY_CHECK_COMMAND, 393 SM_SC_W4_DHKEY_CHECK_COMMAND, 394 SM_SC_W4_LTK_REQUEST_SC, 395 SM_SC_W2_CALCULATE_ILK_USING_H6, 396 SM_SC_W2_CALCULATE_ILK_USING_H7, 397 SM_SC_W4_CALCULATE_ILK, 398 SM_SC_W2_CALCULATE_BR_EDR_LINK_KEY, 399 SM_SC_W4_CALCULATE_BR_EDR_LINK_KEY, 400 401 // Classic 402 SM_BR_EDR_W4_ENCRYPTION_COMPLETE, 403 SM_BR_EDR_INITIATOR_SEND_PAIRING_REQUEST, 404 SM_BR_EDR_INITIATOR_W4_PAIRING_RESPONSE, 405 SM_BR_EDR_RESPONDER_W4_PAIRING_REQUEST, 406 SM_BR_EDR_RESPONDER_PAIRING_REQUEST_RECEIVED, 407 SM_BR_EDR_DISTRIBUTE_KEYS, 408 SM_BR_EDR_RECEIVE_KEYS, 409 SM_BR_EDR_W2_CALCULATE_ILK_USING_H6, 410 SM_BR_EDR_W2_CALCULATE_ILK_USING_H7, 411 SM_BR_EDR_W4_CALCULATE_ILK, 412 SM_BR_EDR_W2_CALCULATE_LE_LTK, 413 SM_BR_EDR_W4_CALCULATE_LE_LTK, 414 } security_manager_state_t; 415 416 typedef enum { 417 IRK_LOOKUP_IDLE, 418 IRK_LOOKUP_W4_READY, 419 IRK_LOOKUP_STARTED, 420 IRK_LOOKUP_SUCCEEDED, 421 IRK_LOOKUP_FAILED 422 } irk_lookup_state_t; 423 424 typedef uint8_t sm_pairing_packet_t[7]; 425 426 // connection info available as long as connection exists 427 typedef struct sm_connection { 428 hci_con_handle_t sm_handle; 429 uint16_t sm_cid; 430 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 431 uint8_t sm_security_request_received; 432 uint8_t sm_pairing_requested; 433 uint8_t sm_peer_addr_type; 434 bd_addr_t sm_peer_address; 435 uint8_t sm_own_addr_type; 436 bd_addr_t sm_own_address; 437 security_manager_state_t sm_engine_state; 438 irk_lookup_state_t sm_irk_lookup_state; 439 uint8_t sm_pairing_failed_reason; 440 uint8_t sm_connection_encrypted; 441 uint8_t sm_connection_authenticated; // [0..1] 442 uint8_t sm_connection_sc; 443 uint8_t sm_actual_encryption_key_size; 444 sm_pairing_packet_t sm_m_preq; // only used during c1 445 authorization_state_t sm_connection_authorization_state; 446 uint16_t sm_local_ediv; 447 uint8_t sm_local_rand[8]; 448 int sm_le_db_index; 449 bool sm_pairing_active; 450 bool sm_reencryption_active; 451 } sm_connection_t; 452 453 // 454 // ATT Server 455 // 456 457 // max ATT request matches L2CAP PDU -- allow to use smaller buffer 458 #ifndef ATT_REQUEST_BUFFER_SIZE 459 #define ATT_REQUEST_BUFFER_SIZE HCI_ACL_PAYLOAD_SIZE 460 #endif 461 462 typedef enum { 463 ATT_SERVER_IDLE, 464 ATT_SERVER_REQUEST_RECEIVED, 465 ATT_SERVER_W4_SIGNED_WRITE_VALIDATION, 466 ATT_SERVER_REQUEST_RECEIVED_AND_VALIDATED, 467 ATT_SERVER_RESPONSE_PENDING, 468 } att_server_state_t; 469 470 typedef struct { 471 att_server_state_t state; 472 473 uint8_t peer_addr_type; 474 bd_addr_t peer_address; 475 476 int ir_le_device_db_index; 477 uint8_t ir_lookup_active; 478 uint8_t pairing_active; 479 480 int value_indication_handle; 481 btstack_timer_source_t value_indication_timer; 482 483 btstack_linked_list_t notification_requests; 484 btstack_linked_list_t indication_requests; 485 486 #ifdef ENABLE_GATT_OVER_CLASSIC 487 uint16_t l2cap_cid; 488 #endif 489 490 uint16_t request_size; 491 uint8_t request_buffer[ATT_REQUEST_BUFFER_SIZE]; 492 493 } att_server_t; 494 495 #endif 496 497 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 498 typedef enum { 499 L2CAP_INFORMATION_STATE_IDLE = 0, 500 L2CAP_INFORMATION_STATE_W2_SEND_EXTENDED_FEATURE_REQUEST, 501 L2CAP_INFORMATION_STATE_W4_EXTENDED_FEATURE_RESPONSE, 502 L2CAP_INFORMATION_STATE_DONE 503 } l2cap_information_state_t; 504 505 typedef struct { 506 l2cap_information_state_t information_state; 507 uint16_t extended_feature_mask; 508 } l2cap_state_t; 509 #endif 510 511 // 512 typedef struct { 513 // linked list - assert: first field 514 btstack_linked_item_t item; 515 516 // remote side 517 bd_addr_t address; 518 519 // module handle 520 hci_con_handle_t con_handle; 521 522 // le public, le random, classic 523 bd_addr_type_t address_type; 524 525 // role: 0 - master, 1 - slave 526 uint8_t role; 527 528 // connection state 529 CONNECTION_STATE state; 530 531 // bonding 532 uint16_t bonding_flags; 533 uint8_t bonding_status; 534 535 // encryption key size (in octets) 536 uint8_t encryption_key_size; 537 538 // requested security level 539 gap_security_level_t requested_security_level; 540 541 // link key and its type 542 link_key_t link_key; 543 link_key_type_t link_key_type; 544 545 // remote supported features 546 /* bit 0 - eSCO */ 547 /* bit 1 - extended features */ 548 uint8_t remote_supported_features[1]; 549 550 #ifdef ENABLE_CLASSIC 551 // IO Capabilities Response 552 uint8_t io_cap_response_auth_req; 553 uint8_t io_cap_response_io; 554 #ifdef ENABLE_CLASSIC_PAIRING_OOB 555 uint8_t io_cap_response_oob_data; 556 #endif 557 558 // connection mode, default ACL_CONNECTION_MODE_ACTIVE 559 uint8_t connection_mode; 560 561 // enter/exit sniff mode requests 562 uint16_t sniff_min_interval; // 0: idle, 0xffff exit sniff, else enter sniff 563 uint16_t sniff_max_interval; 564 uint16_t sniff_attempt; 565 uint16_t sniff_timeout; 566 567 // sniff subrating 568 uint16_t sniff_subrating_max_latency; // 0xffff = not set 569 uint16_t sniff_subrating_min_remote_timeout; 570 uint16_t sniff_subrating_min_local_timeout; 571 572 // QoS 573 hci_service_type_t qos_service_type; 574 uint32_t qos_token_rate; 575 uint32_t qos_peak_bandwidth; 576 uint32_t qos_latency; 577 uint32_t qos_delay_variation; 578 579 #ifdef ENABLE_SCO_OVER_HCI 580 // track SCO rx event 581 uint32_t sco_rx_ms; 582 uint8_t sco_rx_count; 583 uint8_t sco_rx_valid; 584 #endif 585 // generate sco can send now based on received packets, using timeout below 586 uint8_t sco_tx_ready; 587 588 // request role switch 589 hci_role_t request_role; 590 591 btstack_timer_source_t timeout_sco; 592 #endif /* ENABLE_CLASSIC */ 593 594 // authentication and other errands 595 uint32_t authentication_flags; 596 597 btstack_timer_source_t timeout; 598 599 // timeout in system ticks (HAVE_EMBEDDED_TICK) or milliseconds (HAVE_EMBEDDED_TIME_MS) 600 uint32_t timestamp; 601 602 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 603 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 604 uint16_t acl_recombination_pos; 605 uint16_t acl_recombination_length; 606 607 608 // number packets sent to controller 609 uint8_t num_packets_sent; 610 611 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 612 uint8_t num_packets_completed; 613 #endif 614 615 // LE Connection parameter update 616 le_con_parameter_update_state_t le_con_parameter_update_state; 617 uint8_t le_con_param_update_identifier; 618 uint16_t le_conn_interval_min; 619 uint16_t le_conn_interval_max; 620 uint16_t le_conn_latency; 621 uint16_t le_supervision_timeout; 622 623 #ifdef ENABLE_BLE 624 uint16_t le_connection_interval; 625 626 // LE PHY Update via set phy command 627 uint8_t le_phy_update_all_phys; // 0xff for idle 628 uint8_t le_phy_update_tx_phys; 629 uint8_t le_phy_update_rx_phys; 630 int8_t le_phy_update_phy_options; 631 632 // LE Security Manager 633 sm_connection_t sm_connection; 634 635 #ifdef ENABLE_LE_LIMIT_ACL_FRAGMENT_BY_MAX_OCTETS 636 uint16_t le_max_tx_octets; 637 #endif 638 639 // ATT Connection 640 att_connection_t att_connection; 641 642 // ATT Server 643 att_server_t att_server; 644 645 #endif 646 647 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 648 l2cap_state_t l2cap_state; 649 #endif 650 651 #ifdef ENABLE_CLASSIC_PAIRING_OOB 652 const uint8_t * classic_oob_c_192; 653 const uint8_t * classic_oob_r_192; 654 const uint8_t * classic_oob_c_256; 655 const uint8_t * classic_oob_r_256; 656 #endif 657 658 } hci_connection_t; 659 660 661 /** 662 * HCI Inititizlization State Machine 663 */ 664 typedef enum hci_init_state{ 665 HCI_INIT_SEND_RESET = 0, 666 HCI_INIT_W4_SEND_RESET, 667 HCI_INIT_SEND_READ_LOCAL_VERSION_INFORMATION, 668 HCI_INIT_W4_SEND_READ_LOCAL_VERSION_INFORMATION, 669 HCI_INIT_SEND_READ_LOCAL_NAME, 670 HCI_INIT_W4_SEND_READ_LOCAL_NAME, 671 672 HCI_INIT_SEND_BAUD_CHANGE, 673 HCI_INIT_W4_SEND_BAUD_CHANGE, 674 HCI_INIT_CUSTOM_INIT, 675 HCI_INIT_W4_CUSTOM_INIT, 676 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 677 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 678 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT_LINK_RESET, 679 HCI_INIT_W4_CUSTOM_INIT_BCM_DELAY, 680 681 HCI_INIT_READ_LOCAL_SUPPORTED_COMMANDS, 682 HCI_INIT_W4_READ_LOCAL_SUPPORTED_COMMANDS, 683 684 HCI_INIT_SEND_BAUD_CHANGE_BCM, 685 HCI_INIT_W4_SEND_BAUD_CHANGE_BCM, 686 687 HCI_INIT_SET_BD_ADDR, 688 HCI_INIT_W4_SET_BD_ADDR, 689 690 HCI_INIT_SEND_RESET_ST_WARM_BOOT, 691 HCI_INIT_W4_SEND_RESET_ST_WARM_BOOT, 692 693 HCI_INIT_READ_BD_ADDR, 694 HCI_INIT_W4_READ_BD_ADDR, 695 696 HCI_INIT_READ_BUFFER_SIZE, 697 HCI_INIT_W4_READ_BUFFER_SIZE, 698 HCI_INIT_READ_LOCAL_SUPPORTED_FEATURES, 699 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATURES, 700 701 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 702 HCI_INIT_HOST_BUFFER_SIZE, 703 HCI_INIT_W4_HOST_BUFFER_SIZE, 704 HCI_INIT_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 705 HCI_INIT_W4_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 706 #endif 707 708 HCI_INIT_SET_EVENT_MASK, 709 HCI_INIT_W4_SET_EVENT_MASK, 710 711 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 712 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 713 HCI_INIT_WRITE_INQUIRY_MODE, 714 HCI_INIT_W4_WRITE_INQUIRY_MODE, 715 HCI_INIT_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 716 HCI_INIT_W4_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 717 HCI_INIT_WRITE_PAGE_TIMEOUT, 718 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 719 720 // SCO over HCI 721 HCI_INIT_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 722 HCI_INIT_W4_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 723 HCI_INIT_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 724 HCI_INIT_W4_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 725 726 // Broadcom SCO Routing and Configuration 727 HCI_INIT_BCM_WRITE_SCO_PCM_INT, 728 HCI_INIT_W4_BCM_WRITE_SCO_PCM_INT, 729 HCI_INIT_BCM_WRITE_I2SPCM_INTERFACE_PARAM, 730 HCI_INIT_W4_BCM_WRITE_I2SPCM_INTERFACE_PARAM, 731 732 #ifdef ENABLE_BLE 733 HCI_INIT_LE_READ_BUFFER_SIZE, 734 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 735 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 736 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 737 HCI_INIT_LE_SET_EVENT_MASK, 738 HCI_INIT_W4_LE_SET_EVENT_MASK, 739 #endif 740 741 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 742 HCI_INIT_LE_READ_MAX_DATA_LENGTH, 743 HCI_INIT_W4_LE_READ_MAX_DATA_LENGTH, 744 HCI_INIT_LE_WRITE_SUGGESTED_DATA_LENGTH, 745 HCI_INIT_W4_LE_WRITE_SUGGESTED_DATA_LENGTH, 746 #endif 747 748 #ifdef ENABLE_LE_CENTRAL 749 HCI_INIT_READ_WHITE_LIST_SIZE, 750 HCI_INIT_W4_READ_WHITE_LIST_SIZE, 751 752 HCI_INIT_LE_SET_SCAN_PARAMETERS, 753 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 754 #endif 755 756 HCI_INIT_DONE, 757 758 HCI_FALLING_ASLEEP_DISCONNECT, 759 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 760 HCI_FALLING_ASLEEP_COMPLETE, 761 762 HCI_INIT_AFTER_SLEEP, 763 764 HCI_HALTING_DISCONNECT_ALL_NO_TIMER, 765 HCI_HALTING_DISCONNECT_ALL_TIMER, 766 HCI_HALTING_W4_TIMER, 767 HCI_HALTING_CLOSE, 768 769 } hci_substate_t; 770 771 #define GAP_TASK_SET_LOCAL_NAME 0x01 772 #define GAP_TASK_SET_EIR_DATA 0x02 773 #define GAP_TASK_SET_CLASS_OF_DEVICE 0x04 774 #define GAP_TASK_SET_DEFAULT_LINK_POLICY 0x08 775 #define GAP_TASK_WRITE_SCAN_ENABLE 0x10 776 #define GAP_TASK_WRITE_PAGE_SCAN_ACTIVITY 0x20 777 #define GAP_TASK_WRITE_PAGE_SCAN_TYPE 0x49 778 779 enum { 780 // Tasks 781 LE_ADVERTISEMENT_TASKS_SET_ADV_DATA = 1 << 0, 782 LE_ADVERTISEMENT_TASKS_SET_SCAN_DATA = 1 << 1, 783 LE_ADVERTISEMENT_TASKS_SET_PARAMS = 1 << 2, 784 // State 785 LE_ADVERTISEMENT_TASKS_PARAMS_SET = 1 << 7, 786 }; 787 788 enum { 789 LE_WHITELIST_ON_CONTROLLER = 1 << 0, 790 LE_WHITELIST_ADD_TO_CONTROLLER = 1 << 1, 791 LE_WHITELIST_REMOVE_FROM_CONTROLLER = 1 << 2, 792 }; 793 794 typedef struct { 795 btstack_linked_item_t item; 796 bd_addr_t address; 797 bd_addr_type_t address_type; 798 uint8_t state; 799 } whitelist_entry_t; 800 801 #define MAX_NUM_RESOLVING_LIST_ENTRIES 64 802 typedef enum { 803 LE_RESOLVING_LIST_SEND_ENABLE_ADDRESS_RESOLUTION, 804 LE_RESOLVING_LIST_READ_SIZE, 805 LE_RESOLVING_LIST_SEND_CLEAR, 806 LE_RESOLVING_LIST_REMOVE_ENTRIES, 807 LE_RESOLVING_LIST_ADD_ENTRIES, 808 LE_RESOLVING_LIST_DONE 809 } le_resolving_list_state_t; 810 811 /** 812 * main data structure 813 */ 814 typedef struct { 815 // transport component with configuration 816 const hci_transport_t * hci_transport; 817 const void * config; 818 819 // chipset driver 820 const btstack_chipset_t * chipset; 821 822 // hardware power controller 823 const btstack_control_t * control; 824 825 #ifdef ENABLE_CLASSIC 826 /* link key db */ 827 const btstack_link_key_db_t * link_key_db; 828 #endif 829 830 // list of existing baseband connections 831 btstack_linked_list_t connections; 832 833 /* callback to L2CAP layer */ 834 btstack_packet_handler_t acl_packet_handler; 835 836 /* callback for SCO data */ 837 btstack_packet_handler_t sco_packet_handler; 838 839 /* callbacks for events */ 840 btstack_linked_list_t event_handlers; 841 842 #ifdef ENABLE_CLASSIC 843 /* callback for reject classic connection */ 844 int (*gap_classic_accept_callback)(bd_addr_t addr, hci_link_type_t link_type); 845 #endif 846 847 // hardware error callback 848 void (*hardware_error_callback)(uint8_t error); 849 850 // basic configuration 851 const char * local_name; 852 const uint8_t * eir_data; 853 uint32_t class_of_device; 854 bd_addr_t local_bd_addr; 855 uint8_t default_link_policy_settings; 856 uint8_t allow_role_switch; 857 uint8_t ssp_enable; 858 uint8_t ssp_io_capability; 859 uint8_t ssp_authentication_requirement; 860 uint8_t ssp_auto_accept; 861 bool secure_connections_enable; 862 bool secure_connections_active; 863 inquiry_mode_t inquiry_mode; 864 865 #ifdef ENABLE_CLASSIC 866 /* GAP tasks, see GAP_TASK_* */ 867 uint16_t gap_tasks; 868 869 /* write page scan activity, 0xffff is no change */ 870 uint16_t new_page_scan_interval; 871 uint16_t new_page_scan_window; 872 873 /* write page scan type, 0xff is no change */ 874 uint8_t new_page_scan_type; 875 876 // Errata-11838 mandates 7 bytes for GAP Security Level 1-3, we use 16 as default 877 uint8_t gap_required_encyrption_key_size; 878 uint16_t link_supervision_timeout; 879 gap_security_level_t gap_security_level; 880 gap_security_level_t gap_minimal_service_security_level; 881 gap_security_mode_t gap_security_mode; 882 883 uint32_t inquiry_lap; // GAP_IAC_GENERAL_INQUIRY or GAP_IAC_LIMITED_INQUIRY 884 885 bool gap_secure_connections_only_mode; 886 #endif 887 888 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 889 uint8_t * hci_packet_buffer; 890 uint8_t hci_packet_buffer_data[HCI_OUTGOING_PRE_BUFFER_SIZE + HCI_OUTGOING_PACKET_BUFFER_SIZE]; 891 bool hci_packet_buffer_reserved; 892 uint16_t acl_fragmentation_pos; 893 uint16_t acl_fragmentation_total_size; 894 uint8_t acl_fragmentation_tx_active; 895 896 /* host to controller flow control */ 897 uint8_t num_cmd_packets; 898 uint8_t acl_packets_total_num; 899 uint16_t acl_data_packet_length; 900 uint8_t sco_packets_total_num; 901 uint8_t sco_data_packet_length; 902 uint8_t synchronous_flow_control_enabled; 903 uint8_t le_acl_packets_total_num; 904 uint16_t le_data_packets_length; 905 uint8_t sco_waiting_for_can_send_now; 906 bool sco_can_send_now; 907 908 /* local supported features */ 909 uint8_t local_supported_features[8]; 910 911 /* local supported commands summary - complete info is 64 bytes */ 912 /* 0 - Read Buffer Size (Octet 14/bit 7) */ 913 /* 1 - Write Le Host Supported (Octet 24/bit 6) */ 914 /* 2 - Write Synchronous Flow Control Enable (Octet 10/bit 4) */ 915 /* 3 - Write Default Erroneous Data Reporting (Octet 18/bit 3) */ 916 /* 4 - LE Write Suggested Default Data Length (Octet 34/bit 0) */ 917 /* 5 - LE Read Maximum Data Length (Octet 35/bit 3) */ 918 /* 6 - LE Set Default PHY (Octet 35/bit 5) */ 919 /* 7 - Read Encryption Key Size (Octet 20/bit 4) */ 920 /* 8 - Read Remote Extended Features (Octet 2/bit 5) */ 921 /* 9 - Write Secure Connections Host (Octet 32/bit 3) */ 922 /* 10 - LE Set Address Resolution Enable (Octet 35/bit 1) */ 923 /* 11 - Remote OOB Extended Data Request Reply (Octet 32/bit 1) */ 924 /* 12 - Read Local OOB Extended Data command (Octet 32/bit 6) */ 925 uint8_t local_supported_commands[2]; 926 927 /* bluetooth device information from hci read local version information */ 928 // uint16_t hci_version; 929 // uint16_t hci_revision; 930 // uint16_t lmp_version; 931 uint16_t manufacturer; 932 // uint16_t lmp_subversion; 933 934 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 935 uint16_t packet_types; 936 937 938 /* hci state machine */ 939 HCI_STATE state; 940 hci_substate_t substate; 941 btstack_timer_source_t timeout; 942 btstack_chipset_result_t chipset_result; 943 944 uint16_t last_cmd_opcode; 945 946 uint8_t cmds_ready; 947 948 /* buffer for scan enable cmd - 0xff no change */ 949 uint8_t new_scan_enable_value; 950 951 uint8_t discoverable; 952 uint8_t connectable; 953 uint8_t bondable; 954 955 uint8_t inquiry_state; // see hci.c for state defines 956 957 bd_addr_t remote_name_addr; 958 uint16_t remote_name_clock_offset; 959 uint8_t remote_name_page_scan_repetition_mode; 960 uint8_t remote_name_state; // see hci.c for state defines 961 962 bd_addr_t gap_pairing_addr; 963 uint8_t gap_pairing_state; // see hci.c for state defines 964 uint8_t gap_pairing_pin_len; 965 union { 966 const uint8_t * gap_pairing_pin; 967 uint32_t gap_pairing_passkey; 968 } gap_pairing_input; 969 970 uint16_t sco_voice_setting; 971 uint16_t sco_voice_setting_active; 972 973 uint8_t loopback_mode; 974 975 // buffer for single connection decline 976 uint8_t decline_reason; 977 bd_addr_t decline_addr; 978 979 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 980 uint8_t host_completed_packets; 981 #endif 982 983 #ifdef ENABLE_BLE 984 uint8_t le_own_addr_type; 985 bd_addr_t le_random_address; 986 uint8_t le_random_address_set; 987 988 // LE Whitelist Management 989 uint8_t le_whitelist_capacity; 990 btstack_linked_list_t le_whitelist; 991 #endif 992 993 #ifdef ENABLE_LE_CENTRAL 994 bool le_scanning_enabled; 995 bool le_scanning_active; 996 997 le_connecting_state_t le_connecting_state; 998 le_connecting_state_t le_connecting_request; 999 1000 bool le_scanning_param_update; 1001 uint8_t le_scan_type; 1002 uint8_t le_scan_filter_policy; 1003 uint16_t le_scan_interval; 1004 uint16_t le_scan_window; 1005 1006 // Connection parameters 1007 uint16_t le_connection_interval_min; 1008 uint16_t le_connection_interval_max; 1009 uint16_t le_connection_latency; 1010 uint16_t le_supervision_timeout; 1011 uint16_t le_minimum_ce_length; 1012 uint16_t le_maximum_ce_length; 1013 uint16_t le_connection_scan_interval; 1014 uint16_t le_connection_scan_window; 1015 uint8_t le_connection_own_addr_type; 1016 bd_addr_t le_connection_own_address; 1017 #endif 1018 1019 le_connection_parameter_range_t le_connection_parameter_range; 1020 1021 #ifdef ENABLE_LE_PERIPHERAL 1022 uint8_t * le_advertisements_data; 1023 uint8_t le_advertisements_data_len; 1024 1025 uint8_t * le_scan_response_data; 1026 uint8_t le_scan_response_data_len; 1027 1028 bool le_advertisements_active; 1029 bool le_advertisements_enabled; 1030 bool le_advertisements_enabled_for_current_roles; 1031 uint8_t le_advertisements_todo; 1032 1033 uint16_t le_advertisements_interval_min; 1034 uint16_t le_advertisements_interval_max; 1035 uint8_t le_advertisements_type; 1036 uint8_t le_advertisements_direct_address_type; 1037 uint8_t le_advertisements_channel_map; 1038 uint8_t le_advertisements_filter_policy; 1039 bd_addr_t le_advertisements_direct_address; 1040 uint8_t le_advertisements_own_addr_type; 1041 bd_addr_t le_advertisements_own_address; 1042 1043 uint8_t le_max_number_peripheral_connections; 1044 #endif 1045 1046 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 1047 // LE Data Length 1048 uint16_t le_supported_max_tx_octets; 1049 uint16_t le_supported_max_tx_time; 1050 #endif 1051 1052 // custom BD ADDR 1053 bd_addr_t custom_bd_addr; 1054 uint8_t custom_bd_addr_set; 1055 1056 #ifdef ENABLE_CLASSIC 1057 uint8_t master_slave_policy; 1058 #endif 1059 1060 // address and address_type of active create connection command (ACL, SCO, LE) 1061 bd_addr_t outgoing_addr; 1062 bd_addr_type_t outgoing_addr_type; 1063 1064 // LE Resolving List 1065 #ifdef ENABLE_LE_PRIVACY_ADDRESS_RESOLUTION 1066 le_resolving_list_state_t le_resolving_list_state; 1067 uint16_t le_resolving_list_size; 1068 uint8_t le_resolving_list_add_entries[(MAX_NUM_RESOLVING_LIST_ENTRIES + 7) / 8]; 1069 uint8_t le_resolving_list_remove_entries[(MAX_NUM_RESOLVING_LIST_ENTRIES + 7) / 8]; 1070 #endif 1071 1072 #ifdef ENABLE_CLASSIC_PAIRING_OOB 1073 bool classic_read_local_oob_data; 1074 hci_con_handle_t classic_oob_con_handle; 1075 #endif 1076 1077 #ifdef HAVE_SCO_TRANSPORT 1078 const btstack_sco_transport_t * sco_transport; 1079 #endif 1080 } hci_stack_t; 1081 1082 1083 /* API_START */ 1084 1085 1086 // HCI init and configuration 1087 1088 1089 /** 1090 * @brief Set up HCI. Needs to be called before any other function. 1091 */ 1092 void hci_init(const hci_transport_t *transport, const void *config); 1093 1094 /** 1095 * @brief Configure Bluetooth chipset driver. Has to be called before power on, or right after receiving the local version information. 1096 */ 1097 void hci_set_chipset(const btstack_chipset_t *chipset_driver); 1098 1099 /** 1100 * @brief Configure Bluetooth hardware control. Has to be called before power on. 1101 * @[aram hardware_control implementation 1102 */ 1103 void hci_set_control(const btstack_control_t *hardware_control); 1104 1105 #ifdef HAVE_SCO_TRANSPORT 1106 /** 1107 * @brief Set SCO Transport implementation for SCO over PCM mode 1108 * @param sco_transport that sends SCO over I2S or PCM interface 1109 */ 1110 void hci_set_sco_transport(const btstack_sco_transport_t *sco_transport); 1111 #endif 1112 1113 #ifdef ENABLE_CLASSIC 1114 /** 1115 * @brief Configure Bluetooth hardware control. Has to be called before power on. 1116 */ 1117 void hci_set_link_key_db(btstack_link_key_db_t const * link_key_db); 1118 #endif 1119 1120 /** 1121 * @brief Set callback for Bluetooth Hardware Error 1122 */ 1123 void hci_set_hardware_error_callback(void (*fn)(uint8_t error)); 1124 1125 /** 1126 * @brief Set Public BD ADDR - passed on to Bluetooth chipset during init if supported in bt_control_h 1127 */ 1128 void hci_set_bd_addr(bd_addr_t addr); 1129 1130 /** 1131 * @brief Configure Voice Setting for use with SCO data in HSP/HFP 1132 */ 1133 void hci_set_sco_voice_setting(uint16_t voice_setting); 1134 1135 /** 1136 * @brief Get SCO Voice Setting 1137 * @return current voice setting 1138 */ 1139 uint16_t hci_get_sco_voice_setting(void); 1140 1141 /** 1142 * @brief Set inquiry mode: standard, with RSSI, with RSSI + Extended Inquiry Results. Has to be called before power on. 1143 * @param inquriy_mode see bluetooth_defines.h 1144 */ 1145 void hci_set_inquiry_mode(inquiry_mode_t inquriy_mode); 1146 1147 /** 1148 * @brief Requests the change of BTstack power mode. 1149 * @param power_mode 1150 * @return 0 if success, otherwise error 1151 */ 1152 int hci_power_control(HCI_POWER_MODE power_mode); 1153 1154 /** 1155 * @brief Shutdown HCI 1156 */ 1157 void hci_close(void); 1158 1159 1160 // Callback registration 1161 1162 1163 /** 1164 * @brief Add event packet handler. 1165 */ 1166 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler); 1167 1168 /** 1169 * @brief Registers a packet handler for ACL data. Used by L2CAP 1170 */ 1171 void hci_register_acl_packet_handler(btstack_packet_handler_t handler); 1172 1173 /** 1174 * @brief Registers a packet handler for SCO data. Used for HSP and HFP profiles. 1175 */ 1176 void hci_register_sco_packet_handler(btstack_packet_handler_t handler); 1177 1178 1179 // Sending HCI Commands 1180 1181 /** 1182 * @brief Check if CMD packet can be sent to controller 1183 * @return true if command can be sent 1184 */ 1185 bool hci_can_send_command_packet_now(void); 1186 1187 /** 1188 * @brief Creates and sends HCI command packets based on a template and a list of parameters. Will return error if outgoing data buffer is occupied. 1189 * @return status 1190 */ 1191 uint8_t hci_send_cmd(const hci_cmd_t * cmd, ...); 1192 1193 1194 // Sending SCO Packets 1195 1196 /** @brief Get SCO packet length for current SCO Voice setting 1197 * @note Using SCO packets of the exact length is required for USB transfer 1198 * @return Length of SCO packets in bytes (not audio frames) incl. 3 byte header 1199 */ 1200 uint16_t hci_get_sco_packet_length(void); 1201 1202 /** 1203 * @brief Request emission of HCI_EVENT_SCO_CAN_SEND_NOW as soon as possible 1204 * @note HCI_EVENT_SCO_CAN_SEND_NOW might be emitted during call to this function 1205 * so packet handler should be ready to handle it 1206 */ 1207 void hci_request_sco_can_send_now_event(void); 1208 1209 /** 1210 * @brief Check HCI packet buffer and if SCO packet can be sent to controller 1211 * @return true if sco packet can be sent 1212 */ 1213 bool hci_can_send_sco_packet_now(void); 1214 1215 /** 1216 * @brief Check if SCO packet can be sent to controller 1217 * @return true if sco packet can be sent 1218 */ 1219 bool hci_can_send_prepared_sco_packet_now(void); 1220 1221 /** 1222 * @brief Send SCO packet prepared in HCI packet buffer 1223 */ 1224 uint8_t hci_send_sco_packet_buffer(int size); 1225 1226 /** 1227 * Reserves outgoing packet buffer. 1228 * @return true on success 1229 */ 1230 bool hci_reserve_packet_buffer(void); 1231 1232 /** 1233 * Get pointer for outgoing packet buffer 1234 */ 1235 uint8_t* hci_get_outgoing_packet_buffer(void); 1236 1237 /** 1238 * Release outgoing packet buffer\ 1239 * @note only called instead of hci_send_preparared 1240 */ 1241 void hci_release_packet_buffer(void); 1242 1243 /** 1244 * @brief Sets the master/slave policy 1245 * @param policy (0: attempt to become master, 1: let connecting device decide) 1246 */ 1247 void hci_set_master_slave_policy(uint8_t policy); 1248 1249 /* API_END */ 1250 1251 1252 /** 1253 * va_list version of hci_send_cmd, call hci_send_cmd_packet 1254 * @return status 1255 */ 1256 uint8_t hci_send_cmd_va_arg(const hci_cmd_t * cmd, va_list argptr); 1257 1258 /** 1259 * Get connection iterator. Only used by l2cap.c and sm.c 1260 */ 1261 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it); 1262 1263 /** 1264 * Get internal hci_connection_t for given handle. Used by L2CAP, SM, daemon 1265 */ 1266 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 1267 1268 /** 1269 * Get internal hci_connection_t for given Bluetooth addres. Called by L2CAP 1270 */ 1271 hci_connection_t * hci_connection_for_bd_addr_and_type(const bd_addr_t addr, bd_addr_type_t addr_type); 1272 1273 /** 1274 * Check if outgoing packet buffer is reserved. Used for internal checks in l2cap.c 1275 * @return true if packet buffer is reserved 1276 */ 1277 bool hci_is_packet_buffer_reserved(void); 1278 1279 /** 1280 * Check hci packet buffer is free and a classic acl packet can be sent to controller 1281 * @return true if ACL Classic packet can be sent now 1282 */ 1283 bool hci_can_send_acl_classic_packet_now(void); 1284 1285 /** 1286 * Check hci packet buffer is free and an LE acl packet can be sent to controller 1287 * @return true if ACL LE packet can be sent now 1288 */ 1289 bool hci_can_send_acl_le_packet_now(void); 1290 1291 /** 1292 * Check hci packet buffer is free and an acl packet for the given handle can be sent to controller 1293 * @return true if ACL packet for con_handle can be sent now 1294 */ 1295 bool hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 1296 1297 /** 1298 * Check if acl packet for the given handle can be sent to controller 1299 * @return true if ACL packet for con_handle can be sent now 1300 */ 1301 bool hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 1302 1303 /** 1304 * Send acl packet prepared in hci packet buffer 1305 * @return status 1306 */ 1307 uint8_t hci_send_acl_packet_buffer(int size); 1308 1309 /** 1310 * Check if authentication is active. It delays automatic disconnect while no L2CAP connection 1311 * Called by l2cap. 1312 */ 1313 bool hci_authentication_active_for_handle(hci_con_handle_t handle); 1314 1315 /** 1316 * Get maximal ACL Classic data packet length based on used buffer size. Called by L2CAP 1317 */ 1318 uint16_t hci_max_acl_data_packet_length(void); 1319 1320 /** 1321 * Get supported packet types. Called by L2CAP 1322 */ 1323 uint16_t hci_usable_acl_packet_types(void); 1324 1325 /** 1326 * Check if ACL packets marked as non flushable can be sent. Called by L2CAP 1327 */ 1328 bool hci_non_flushable_packet_boundary_flag_supported(void); 1329 1330 /** 1331 * Check if extended SCO Link is supported 1332 */ 1333 bool hci_extended_sco_link_supported(void); 1334 1335 /** 1336 * Check if SSP is supported on both sides. Called by L2CAP 1337 */ 1338 bool gap_ssp_supported_on_both_sides(hci_con_handle_t handle); 1339 1340 /** 1341 * Disconn because of security block. Called by L2CAP 1342 */ 1343 void hci_disconnect_security_block(hci_con_handle_t con_handle); 1344 1345 /** 1346 * Query if remote side supports eSCO 1347 */ 1348 bool hci_remote_esco_supported(hci_con_handle_t con_handle); 1349 1350 /** 1351 * Emit current HCI state. Called by daemon 1352 */ 1353 void hci_emit_state(void); 1354 1355 /** 1356 * Send complete CMD packet. Called by daemon and hci_send_cmd_va_arg 1357 * @return status 1358 */ 1359 uint8_t hci_send_cmd_packet(uint8_t *packet, int size); 1360 1361 /** 1362 * Disconnect all HCI connections. Called by daemon 1363 */ 1364 void hci_disconnect_all(void); 1365 1366 /** 1367 * Get number of free acl slots for packets of given handle. Called by daemon 1368 */ 1369 int hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 1370 1371 /** 1372 * @brief Set Advertisement Parameters 1373 * @param adv_int_min 1374 * @param adv_int_max 1375 * @param adv_type 1376 * @param direct_address_type 1377 * @param direct_address 1378 * @param channel_map 1379 * @param filter_policy 1380 * 1381 * @note internal use. use gap_advertisements_set_params from gap.h instead. 1382 */ 1383 void hci_le_advertisements_set_params(uint16_t adv_int_min, uint16_t adv_int_max, uint8_t adv_type, 1384 uint8_t direct_address_typ, bd_addr_t direct_address, uint8_t channel_map, uint8_t filter_policy); 1385 1386 /** 1387 * 1388 * @note internal use. use gap_random_address_set_mode from gap.h instead. 1389 */ 1390 void hci_le_set_own_address_type(uint8_t own_address_type); 1391 1392 /** 1393 * @note internal use by sm 1394 */ 1395 void hci_load_le_device_db_entry_into_resolving_list(uint16_t le_device_db_index); 1396 1397 /** 1398 * @note internal use by sm 1399 */ 1400 void hci_remove_le_device_db_entry_from_resolving_list(uint16_t le_device_db_index); 1401 1402 /** 1403 * @brief Get Manufactured 1404 * @return manufacturer id 1405 */ 1406 uint16_t hci_get_manufacturer(void); 1407 1408 /** 1409 * Defer halt. Used by btstack_crypto to allow current HCI operation to complete 1410 */ 1411 void hci_halting_defer(void); 1412 1413 // Only for PTS testing 1414 1415 /** 1416 * Disable automatic L2CAP disconnect if no L2CAP connection is established 1417 */ 1418 void hci_disable_l2cap_timeout_check(void); 1419 1420 /** 1421 * Get Classic Allow Role Switch param 1422 */ 1423 uint8_t hci_get_allow_role_switch(void); 1424 1425 /** 1426 * Get state 1427 */ 1428 HCI_STATE hci_get_state(void); 1429 1430 /** 1431 * @brief De-Init HCI 1432 */ 1433 void hci_deinit(void); 1434 1435 // setup test connections, used for fuzzing 1436 void hci_setup_test_connections_fuzz(void); 1437 1438 // free all connections, used for fuzzing 1439 void hci_free_connections_fuzz(void); 1440 1441 // simulate stack bootup 1442 void hci_simulate_working_fuzz(void); 1443 1444 1445 #if defined __cplusplus 1446 } 1447 #endif 1448 1449 #endif // HCI_H 1450