1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef __HCI_H 46 #define __HCI_H 47 48 #include "btstack-config.h" 49 50 #include <btstack/hci_cmds.h> 51 #include <btstack/utils.h> 52 #include "hci_transport.h" 53 #include "bt_control.h" 54 #include "remote_device_db.h" 55 56 #include <stdint.h> 57 #include <stdlib.h> 58 #include <stdarg.h> 59 #include <btstack/linked_list.h> 60 61 #if defined __cplusplus 62 extern "C" { 63 #endif 64 65 // packet header sizes 66 #define HCI_CMD_HEADER_SIZE 3 67 #define HCI_ACL_HEADER_SIZE 4 68 #define HCI_SCO_HEADER_SIZE 3 69 #define HCI_EVENT_HEADER_SIZE 2 70 71 // packet sizes (max payload) 72 #define HCI_ACL_DM1_SIZE 17 73 #define HCI_ACL_DH1_SIZE 27 74 #define HCI_ACL_2DH1_SIZE 54 75 #define HCI_ACL_3DH1_SIZE 83 76 #define HCI_ACL_DM3_SIZE 121 77 #define HCI_ACL_DH3_SIZE 183 78 #define HCI_ACL_DM5_SIZE 224 79 #define HCI_ACL_DH5_SIZE 339 80 #define HCI_ACL_2DH3_SIZE 367 81 #define HCI_ACL_3DH3_SIZE 552 82 #define HCI_ACL_2DH5_SIZE 679 83 #define HCI_ACL_3DH5_SIZE 1021 84 85 #define HCI_EVENT_PAYLOAD_SIZE 255 86 #define HCI_CMD_PAYLOAD_SIZE 255 87 88 #define LE_ADVERTISING_DATA_SIZE 31 89 90 // packet buffer sizes 91 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 92 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE) 93 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 94 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 95 96 // size of hci buffers, big enough for command, event, or acl packet without H4 packet type 97 // @note cmd buffer is bigger than event buffer 98 #ifdef HCI_PACKET_BUFFER_SIZE 99 #if HCI_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 100 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 101 #endif 102 #if HCI_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 103 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 104 #endif 105 #else 106 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 107 #define HCI_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 108 #else 109 #define HCI_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 110 #endif 111 #endif 112 113 // additional pre-buffer space for packets to Bluetooth module, for now, used for HCI Transport H4 DMA 114 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 115 116 // BNEP may uncompress the IP Header by 16 bytes 117 #ifdef HAVE_BNEP 118 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 119 #endif 120 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 121 #define HCI_INCOMING_PRE_BUFFER_SIZE 0 122 #endif 123 124 // OGFs 125 #define OGF_LINK_CONTROL 0x01 126 #define OGF_LINK_POLICY 0x02 127 #define OGF_CONTROLLER_BASEBAND 0x03 128 #define OGF_INFORMATIONAL_PARAMETERS 0x04 129 #define OGF_STATUS_PARAMETERS 0x05 130 #define OGF_LE_CONTROLLER 0x08 131 #define OGF_BTSTACK 0x3d 132 #define OGF_VENDOR 0x3f 133 134 // cmds for BTstack 135 // get state: @returns HCI_STATE 136 #define BTSTACK_GET_STATE 0x01 137 138 // set power mode: @param HCI_POWER_MODE 139 #define BTSTACK_SET_POWER_MODE 0x02 140 141 // set capture mode: @param on 142 #define BTSTACK_SET_ACL_CAPTURE_MODE 0x03 143 144 // get BTstack version 145 #define BTSTACK_GET_VERSION 0x04 146 147 // get system Bluetooth state 148 #define BTSTACK_GET_SYSTEM_BLUETOOTH_ENABLED 0x05 149 150 // set system Bluetooth state 151 #define BTSTACK_SET_SYSTEM_BLUETOOTH_ENABLED 0x06 152 153 // enable inquiry scan for this client 154 #define BTSTACK_SET_DISCOVERABLE 0x07 155 156 // set global Bluetooth state 157 #define BTSTACK_SET_BLUETOOTH_ENABLED 0x08 158 159 // create l2cap channel: @param bd_addr(48), psm (16) 160 #define L2CAP_CREATE_CHANNEL 0x20 161 162 // disconnect l2cap disconnect, @param channel(16), reason(8) 163 #define L2CAP_DISCONNECT 0x21 164 165 // register l2cap service: @param psm(16), mtu (16) 166 #define L2CAP_REGISTER_SERVICE 0x22 167 168 // unregister l2cap disconnect, @param psm(16) 169 #define L2CAP_UNREGISTER_SERVICE 0x23 170 171 // accept connection @param bd_addr(48), dest cid (16) 172 #define L2CAP_ACCEPT_CONNECTION 0x24 173 174 // decline l2cap disconnect,@param bd_addr(48), dest cid (16), reason(8) 175 #define L2CAP_DECLINE_CONNECTION 0x25 176 177 // create l2cap channel: @param bd_addr(48), psm (16), mtu (16) 178 #define L2CAP_CREATE_CHANNEL_MTU 0x26 179 180 // register SDP Service Record: service record (size) 181 #define SDP_REGISTER_SERVICE_RECORD 0x30 182 183 // unregister SDP Service Record 184 #define SDP_UNREGISTER_SERVICE_RECORD 0x31 185 186 // Get remote RFCOMM services 187 #define SDP_CLIENT_QUERY_RFCOMM_SERVICES 0x32 188 189 // Get remote SDP services 190 #define SDP_CLIENT_QUERY_SERVICES 0x33 191 192 // RFCOMM "HCI" Commands 193 #define RFCOMM_CREATE_CHANNEL 0x40 194 #define RFCOMM_DISCONNECT 0x41 195 #define RFCOMM_REGISTER_SERVICE 0x42 196 #define RFCOMM_UNREGISTER_SERVICE 0x43 197 #define RFCOMM_ACCEPT_CONNECTION 0x44 198 #define RFCOMM_DECLINE_CONNECTION 0x45 199 #define RFCOMM_PERSISTENT_CHANNEL 0x46 200 #define RFCOMM_CREATE_CHANNEL_WITH_CREDITS 0x47 201 #define RFCOMM_REGISTER_SERVICE_WITH_CREDITS 0x48 202 #define RFCOMM_GRANT_CREDITS 0x49 203 204 // GAP Classic 0x50 205 #define GAP_DISCONNECT 0x50 206 207 // GAP LE 0x60 208 #define GAP_LE_SCAN_START 0x60 209 #define GAP_LE_SCAN_STOP 0x61 210 #define GAP_LE_CONNECT 0x62 211 #define GAP_LE_CONNECT_CANCEL 0x63 212 #define GAP_LE_SET_SCAN_PARAMETERS 0x64 213 214 // GATT (Client) 0x70 215 #define GATT_DISCOVER_ALL_PRIMARY_SERVICES 0x70 216 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID16 0x71 217 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID128 0x72 218 #define GATT_FIND_INCLUDED_SERVICES_FOR_SERVICE 0x73 219 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE 0x74 220 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE_BY_UUID128 0x75 221 #define GATT_DISCOVER_CHARACTERISTIC_DESCRIPTORS 0x76 222 #define GATT_READ_VALUE_OF_CHARACTERISTIC 0x77 223 #define GATT_READ_LONG_VALUE_OF_CHARACTERISTIC 0x78 224 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC_WITHOUT_RESPONSE 0x79 225 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC 0x7A 226 #define GATT_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7B 227 #define GATT_RELIABLE_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7C 228 #define GATT_READ_CHARACTERISTIC_DESCRIPTOR 0X7D 229 #define GATT_READ_LONG_CHARACTERISTIC_DESCRIPTOR 0X7E 230 #define GATT_WRITE_CHARACTERISTIC_DESCRIPTOR 0X7F 231 #define GATT_WRITE_LONG_CHARACTERISTIC_DESCRIPTOR 0X80 232 #define GATT_WRITE_CLIENT_CHARACTERISTIC_CONFIGURATION 0X81 233 234 // 235 #define IS_COMMAND(packet, command) (READ_BT_16(packet,0) == command.opcode) 236 237 // data: event(8) 238 #define DAEMON_EVENT_CONNECTION_OPENED 0x50 239 240 // data: event(8) 241 #define DAEMON_EVENT_CONNECTION_CLOSED 0x51 242 243 // data: event(8), nr_connections(8) 244 #define DAEMON_NR_CONNECTIONS_CHANGED 0x52 245 246 // data: event(8) 247 #define DAEMON_EVENT_NEW_RFCOMM_CREDITS 0x53 248 249 // data: event(8) 250 #define DAEMON_EVENT_HCI_PACKET_SENT 0x54 251 252 /** 253 * LE connection parameter update state 254 */ 255 256 typedef enum { 257 CON_PARAMETER_UPDATE_NONE, 258 CON_PARAMETER_UPDATE_SEND_RESPONSE, 259 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 260 CON_PARAMETER_UPDATE_DENY 261 } le_con_parameter_update_state_t; 262 263 typedef struct le_connection_parameter_range{ 264 uint16_t le_conn_interval_min; 265 uint16_t le_conn_interval_max; 266 uint16_t le_conn_latency_min; 267 uint16_t le_conn_latency_max; 268 uint16_t le_supervision_timeout_min; 269 uint16_t le_supervision_timeout_max; 270 } le_connection_parameter_range_t; 271 272 // Authentication flags 273 typedef enum { 274 AUTH_FLAGS_NONE = 0x0000, 275 RECV_LINK_KEY_REQUEST = 0x0001, 276 HANDLE_LINK_KEY_REQUEST = 0x0002, 277 SENT_LINK_KEY_REPLY = 0x0004, 278 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 279 RECV_LINK_KEY_NOTIFICATION = 0x0010, 280 DENY_PIN_CODE_REQUEST = 0x0040, 281 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 282 SEND_IO_CAPABILITIES_REPLY = 0x0100, 283 SEND_USER_CONFIRM_REPLY = 0x0200, 284 SEND_USER_PASSKEY_REPLY = 0x0400, 285 286 // pairing status 287 LEGACY_PAIRING_ACTIVE = 0x2000, 288 SSP_PAIRING_ACTIVE = 0x4000, 289 290 // connection status 291 CONNECTION_ENCRYPTED = 0x8000, 292 } hci_authentication_flags_t; 293 294 /** 295 * Connection State 296 */ 297 typedef enum { 298 SEND_CREATE_CONNECTION = 0, 299 SENT_CREATE_CONNECTION, 300 SEND_CANCEL_CONNECTION, 301 SENT_CANCEL_CONNECTION, 302 RECEIVED_CONNECTION_REQUEST, 303 ACCEPTED_CONNECTION_REQUEST, 304 REJECTED_CONNECTION_REQUEST, 305 OPEN, 306 SEND_DISCONNECT, 307 SENT_DISCONNECT, 308 RECEIVED_DISCONNECTION_COMPLETE 309 } CONNECTION_STATE; 310 311 // bonding flags 312 enum { 313 BONDING_REQUEST_REMOTE_FEATURES = 0x01, 314 BONDING_RECEIVED_REMOTE_FEATURES = 0x02, 315 BONDING_REMOTE_SUPPORTS_SSP = 0x04, 316 BONDING_DISCONNECT_SECURITY_BLOCK = 0x08, 317 BONDING_DISCONNECT_DEDICATED_DONE = 0x10, 318 BONDING_SEND_AUTHENTICATE_REQUEST = 0x20, 319 BONDING_SEND_ENCRYPTION_REQUEST = 0x40, 320 BONDING_DEDICATED = 0x80, 321 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x100 322 }; 323 324 typedef enum { 325 BLUETOOTH_OFF = 1, 326 BLUETOOTH_ON, 327 BLUETOOTH_ACTIVE 328 } BLUETOOTH_STATE; 329 330 // le central scanning state 331 typedef enum { 332 LE_SCAN_IDLE, 333 LE_START_SCAN, 334 LE_SCANNING, 335 LE_STOP_SCAN, 336 } le_scanning_state_t; 337 338 // 339 // SM internal types and globals 340 // 341 342 typedef enum { 343 344 // general states 345 SM_GENERAL_IDLE, 346 SM_GENERAL_SEND_PAIRING_FAILED, 347 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 348 349 // Phase 1: Pairing Feature Exchange 350 SM_PH1_W4_USER_RESPONSE, 351 352 // Phase 2: Authenticating and Encrypting 353 354 // get random number for use as TK Passkey if we show it 355 SM_PH2_GET_RANDOM_TK, 356 SM_PH2_W4_RANDOM_TK, 357 358 // get local random number for confirm c1 359 SM_PH2_C1_GET_RANDOM_A, 360 SM_PH2_C1_W4_RANDOM_A, 361 SM_PH2_C1_GET_RANDOM_B, 362 SM_PH2_C1_W4_RANDOM_B, 363 364 // calculate confirm value for local side 365 SM_PH2_C1_GET_ENC_A, 366 SM_PH2_C1_W4_ENC_A, 367 SM_PH2_C1_GET_ENC_B, 368 SM_PH2_C1_W4_ENC_B, 369 370 // calculate confirm value for remote side 371 SM_PH2_C1_GET_ENC_C, 372 SM_PH2_C1_W4_ENC_C, 373 SM_PH2_C1_GET_ENC_D, 374 SM_PH2_C1_W4_ENC_D, 375 376 SM_PH2_C1_SEND_PAIRING_CONFIRM, 377 SM_PH2_SEND_PAIRING_RANDOM, 378 379 // calc STK 380 SM_PH2_CALC_STK, 381 SM_PH2_W4_STK, 382 383 SM_PH2_W4_CONNECTION_ENCRYPTED, 384 385 // Phase 3: Transport Specific Key Distribution 386 387 // calculate DHK, Y, EDIV, and LTK 388 SM_PH3_GET_RANDOM, 389 SM_PH3_W4_RANDOM, 390 SM_PH3_GET_DIV, 391 SM_PH3_W4_DIV, 392 SM_PH3_Y_GET_ENC, 393 SM_PH3_Y_W4_ENC, 394 SM_PH3_LTK_GET_ENC, 395 SM_PH3_LTK_W4_ENC, 396 SM_PH3_CSRK_GET_ENC, 397 SM_PH3_CSRK_W4_ENC, 398 399 // exchange keys 400 SM_PH3_DISTRIBUTE_KEYS, 401 SM_PH3_RECEIVE_KEYS, 402 403 // Phase 4: re-establish previously distributed LTK 404 SM_PH4_Y_GET_ENC, 405 SM_PH4_Y_W4_ENC, 406 SM_PH4_LTK_GET_ENC, 407 SM_PH4_LTK_W4_ENC, 408 SM_PH4_SEND_LTK, 409 410 // RESPONDER ROLE 411 SM_RESPONDER_SEND_SECURITY_REQUEST, 412 SM_RESPONDER_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 413 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 414 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 415 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 416 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 417 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 418 SM_RESPONDER_PH2_W4_LTK_REQUEST, 419 SM_RESPONDER_PH2_SEND_LTK_REPLY, 420 421 // INITITIATOR ROLE 422 SM_INITIATOR_CONNECTED, 423 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 424 SM_INITIATOR_PH1_SEND_PAIRING_REQUEST, 425 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 426 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 427 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 428 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 429 SM_INITIATOR_PH3_XXXX, 430 431 } security_manager_state_t; 432 433 typedef enum { 434 CSRK_LOOKUP_IDLE, 435 CSRK_LOOKUP_W4_READY, 436 CSRK_LOOKUP_STARTED, 437 } csrk_lookup_state_t; 438 439 // Authorization state 440 typedef enum { 441 AUTHORIZATION_UNKNOWN, 442 AUTHORIZATION_PENDING, 443 AUTHORIZATION_DECLINED, 444 AUTHORIZATION_GRANTED 445 } authorization_state_t; 446 447 typedef struct sm_pairing_packet { 448 uint8_t code; 449 uint8_t io_capability; 450 uint8_t oob_data_flag; 451 uint8_t auth_req; 452 uint8_t max_encryption_key_size; 453 uint8_t initiator_key_distribution; 454 uint8_t responder_key_distribution; 455 } sm_pairing_packet_t; 456 457 // connection info available as long as connection exists 458 typedef struct sm_connection { 459 uint16_t sm_handle; 460 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 461 bd_addr_t sm_peer_address; 462 uint8_t sm_peer_addr_type; 463 security_manager_state_t sm_engine_state; 464 csrk_lookup_state_t sm_csrk_lookup_state; 465 uint8_t sm_connection_encrypted; 466 uint8_t sm_connection_authenticated; // [0..1] 467 uint8_t sm_actual_encryption_key_size; 468 sm_pairing_packet_t sm_m_preq; // only used during c1 469 authorization_state_t sm_connection_authorization_state; 470 timer_source_t sm_timeout; 471 } sm_connection_t; 472 473 typedef struct { 474 // linked list - assert: first field 475 linked_item_t item; 476 477 // remote side 478 bd_addr_t address; 479 480 // module handle 481 hci_con_handle_t con_handle; 482 483 // le public, le random, classic 484 bd_addr_type_t address_type; 485 486 // connection state 487 CONNECTION_STATE state; 488 489 // bonding 490 uint16_t bonding_flags; 491 uint8_t bonding_status; 492 // requested security level 493 gap_security_level_t requested_security_level; 494 495 // 496 link_key_type_t link_key_type; 497 498 // errands 499 uint32_t authentication_flags; 500 501 timer_source_t timeout; 502 503 #ifdef HAVE_TIME 504 // timer 505 struct timeval timestamp; 506 #endif 507 #ifdef HAVE_TICK 508 uint32_t timestamp; // timeout in system ticks 509 #endif 510 511 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 512 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 513 uint16_t acl_recombination_pos; 514 uint16_t acl_recombination_length; 515 516 // number packets sent to controller 517 uint8_t num_acl_packets_sent; 518 uint8_t num_sco_packets_sent; 519 520 // LE Connection parameter update 521 le_con_parameter_update_state_t le_con_parameter_update_state; 522 uint16_t le_conn_interval_min; 523 uint16_t le_conn_interval_max; 524 uint16_t le_conn_latency; 525 uint16_t le_supervision_timeout; 526 uint16_t le_update_con_parameter_response; 527 528 #ifdef HAVE_BLE 529 // LE Security Manager 530 sm_connection_t sm_connection; 531 #endif 532 533 } hci_connection_t; 534 535 /** 536 * main data structure 537 */ 538 typedef struct { 539 // transport component with configuration 540 hci_transport_t * hci_transport; 541 void * config; 542 543 // basic configuration 544 const char * local_name; 545 uint32_t class_of_device; 546 bd_addr_t local_bd_addr; 547 uint8_t ssp_enable; 548 uint8_t ssp_io_capability; 549 uint8_t ssp_authentication_requirement; 550 uint8_t ssp_auto_accept; 551 552 // hardware power controller 553 bt_control_t * control; 554 555 // list of existing baseband connections 556 linked_list_t connections; 557 558 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 559 uint8_t hci_packet_buffer_prefix[HCI_OUTGOING_PRE_BUFFER_SIZE]; 560 uint8_t hci_packet_buffer[HCI_PACKET_BUFFER_SIZE]; // opcode (16), len(8) 561 uint8_t hci_packet_buffer_reserved; 562 uint16_t acl_fragmentation_pos; 563 uint16_t acl_fragmentation_total_size; 564 565 /* host to controller flow control */ 566 uint8_t num_cmd_packets; 567 uint8_t acl_packets_total_num; 568 uint16_t acl_data_packet_length; 569 uint8_t sco_packets_total_num; 570 uint8_t sco_data_packet_length; 571 uint8_t le_acl_packets_total_num; 572 uint16_t le_data_packets_length; 573 574 /* local supported features */ 575 uint8_t local_supported_features[8]; 576 577 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 578 uint16_t packet_types; 579 580 /* callback to L2CAP layer */ 581 void (*packet_handler)(uint8_t packet_type, uint8_t *packet, uint16_t size); 582 583 /* remote device db */ 584 remote_device_db_t const*remote_device_db; 585 586 /* hci state machine */ 587 HCI_STATE state; 588 uint8_t substate; 589 uint8_t cmds_ready; 590 591 uint16_t last_cmd_opcode; 592 593 uint8_t discoverable; 594 uint8_t connectable; 595 uint8_t bondable; 596 597 /* buffer for scan enable cmd - 0xff no change */ 598 uint8_t new_scan_enable_value; 599 600 // buffer for single connection decline 601 uint8_t decline_reason; 602 bd_addr_t decline_addr; 603 604 uint8_t adv_addr_type; 605 bd_addr_t adv_address; 606 607 le_scanning_state_t le_scanning_state; 608 609 // buffer for le scan type command - 0xff not set 610 uint8_t le_scan_type; 611 uint16_t le_scan_interval; 612 uint16_t le_scan_window; 613 614 le_connection_parameter_range_t le_connection_parameter_range; 615 616 // custom BD ADDR 617 bd_addr_t custom_bd_addr; 618 uint8_t custom_bd_addr_set; 619 620 } hci_stack_t; 621 622 /** 623 * set connection iterator 624 */ 625 void hci_connections_get_iterator(linked_list_iterator_t *it); 626 627 le_connection_parameter_range_t gap_le_get_connection_parameter_range(); 628 void gap_le_set_connection_parameter_range(le_connection_parameter_range_t range); 629 630 // *************** le client start 631 632 le_command_status_t le_central_start_scan(void); 633 le_command_status_t le_central_stop_scan(void); 634 le_command_status_t le_central_connect(bd_addr_t * addr, bd_addr_type_t addr_type); 635 le_command_status_t le_central_connect_cancel(void); 636 le_command_status_t gap_disconnect(hci_con_handle_t handle); 637 void le_central_set_scan_parameters(uint8_t scan_type, uint16_t scan_interval, uint16_t scan_window); 638 639 // *************** le client end 640 641 // create and send hci command packets based on a template and a list of parameters 642 uint16_t hci_create_cmd(uint8_t *hci_cmd_buffer, hci_cmd_t *cmd, ...); 643 uint16_t hci_create_cmd_internal(uint8_t *hci_cmd_buffer, const hci_cmd_t *cmd, va_list argptr); 644 645 void hci_connectable_control(uint8_t enable); 646 void hci_close(void); 647 648 /** 649 * run the hci control loop once 650 */ 651 void hci_run(void); 652 653 // send complete CMD packet 654 int hci_send_cmd_packet(uint8_t *packet, int size); 655 656 // send ACL packet prepared in hci packet buffer - not working yet 657 // int hci_send_acl_packet_buffer(int size); 658 659 // send SCO packet prepared in hci packet buffer 660 int hci_send_sco_packet_buffer(int size); 661 662 // new functions replacing hci_can_send_packet_now[_using_packet_buffer] 663 int hci_can_send_command_packet_now(void); 664 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 665 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 666 int hci_can_send_sco_packet_now(hci_con_handle_t con_handle); 667 int hci_can_send_prepared_sco_packet_now(hci_con_handle_t con_handle); 668 669 // reserves outgoing packet buffer. @returns 1 if successful 670 int hci_reserve_packet_buffer(void); 671 void hci_release_packet_buffer(void); 672 673 // used for internal checks in l2cap[-le].c 674 int hci_is_packet_buffer_reserved(void); 675 676 // get point to packet buffer 677 uint8_t* hci_get_outgoing_packet_buffer(void); 678 679 bd_addr_t * hci_local_bd_addr(void); 680 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 681 hci_connection_t * hci_connection_for_bd_addr_and_type(bd_addr_t *addr, bd_addr_type_t addr_type); 682 int hci_is_le_connection(hci_connection_t * connection); 683 uint8_t hci_number_outgoing_packets(hci_con_handle_t handle); 684 uint8_t hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 685 int hci_authentication_active_for_handle(hci_con_handle_t handle); 686 uint16_t hci_max_acl_data_packet_length(void); 687 uint16_t hci_max_acl_le_data_packet_length(void); 688 uint16_t hci_usable_acl_packet_types(void); 689 int hci_non_flushable_packet_boundary_flag_supported(void); 690 691 void hci_disconnect_all(void); 692 693 void hci_emit_state(void); 694 void hci_emit_connection_complete(hci_connection_t *conn, uint8_t status); 695 void hci_emit_l2cap_check_timeout(hci_connection_t *conn); 696 void hci_emit_disconnection_complete(uint16_t handle, uint8_t reason); 697 void hci_emit_nr_connections_changed(void); 698 void hci_emit_hci_open_failed(void); 699 void hci_emit_btstack_version(void); 700 void hci_emit_system_bluetooth_enabled(uint8_t enabled); 701 void hci_emit_remote_name_cached(bd_addr_t *addr, device_name_t *name); 702 void hci_emit_discoverable_enabled(uint8_t enabled); 703 void hci_emit_security_level(hci_con_handle_t con_handle, gap_security_level_t level); 704 void hci_emit_dedicated_bonding_result(bd_addr_t address, uint8_t status); 705 706 // query if remote side supports SSP 707 // query if the local side supports SSP 708 int hci_local_ssp_activated(void); 709 710 // query if the remote side supports SSP 711 int hci_remote_ssp_supported(hci_con_handle_t con_handle); 712 713 // query if both sides support SSP 714 int hci_ssp_supported_on_both_sides(hci_con_handle_t handle); 715 716 // disable automatic l2cap disconnect for testing 717 void hci_disable_l2cap_timeout_check(void); 718 719 // disconnect because of security block 720 void hci_disconnect_security_block(hci_con_handle_t con_handle); 721 722 /** Embedded API **/ 723 724 // Set up HCI. Needs to be called before any other function 725 void hci_init(hci_transport_t *transport, void *config, bt_control_t *control, remote_device_db_t const* remote_device_db); 726 727 // Set class of device that will be set during Bluetooth init 728 void hci_set_class_of_device(uint32_t class_of_device); 729 730 // Set Public BD ADDR - passed on to Bluetooth chipset if supported in bt_control_h 731 void hci_set_bd_addr(bd_addr_t addr); 732 733 // Registers a packet handler. Used if L2CAP is not used (rarely). 734 void hci_register_packet_handler(void (*handler)(uint8_t packet_type, uint8_t *packet, uint16_t size)); 735 736 // Requests the change of BTstack power mode. 737 int hci_power_control(HCI_POWER_MODE mode); 738 739 // Allows to control if device is discoverable. OFF by default. 740 void hci_discoverable_control(uint8_t enable); 741 742 // Creates and sends HCI command packets based on a template and 743 // a list of parameters. Will return error if outgoing data buffer 744 // is occupied. 745 int hci_send_cmd(const hci_cmd_t *cmd, ...); 746 747 // Deletes link key for remote device with baseband address. 748 void hci_drop_link_key_for_bd_addr(bd_addr_t *addr); 749 750 // Configure Secure Simple Pairing 751 752 // enable will enable SSP during init 753 void hci_ssp_set_enable(int enable); 754 755 // if set, BTstack will respond to io capability request using authentication requirement 756 void hci_ssp_set_io_capability(int ssp_io_capability); 757 void hci_ssp_set_authentication_requirement(int authentication_requirement); 758 759 // if set, BTstack will confirm a numberic comparion and enter '000000' if requested 760 void hci_ssp_set_auto_accept(int auto_accept); 761 762 // get addr type and address used in advertisement packets 763 void hci_le_advertisement_address(uint8_t * addr_type, bd_addr_t * addr); 764 765 766 #if defined __cplusplus 767 } 768 #endif 769 770 #endif // __HCI_H 771