1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef HCI_H 46 #define HCI_H 47 48 #include "btstack_config.h" 49 50 #include "btstack_chipset.h" 51 #include "btstack_control.h" 52 #include "btstack_linked_list.h" 53 #include "btstack_util.h" 54 #include "hci_cmd.h" 55 #include "gap.h" 56 #include "hci_transport.h" 57 #include "btstack_run_loop.h" 58 59 #ifdef ENABLE_CLASSIC 60 #include "classic/btstack_link_key_db.h" 61 #endif 62 63 #ifdef ENABLE_BLE 64 #include "ble/att_db.h" 65 #endif 66 67 #ifdef HAVE_SCO_TRANSPORT 68 #include "btstack_sco_transport.h" 69 #endif 70 71 #include <stdint.h> 72 #include <stdlib.h> 73 #include <stdarg.h> 74 75 #if defined __cplusplus 76 extern "C" { 77 #endif 78 79 // packet buffer sizes 80 #define HCI_CMD_HEADER_SIZE 3 81 #define HCI_ACL_HEADER_SIZE 4 82 #define HCI_SCO_HEADER_SIZE 3 83 #define HCI_EVENT_HEADER_SIZE 2 84 85 #define HCI_EVENT_PAYLOAD_SIZE 255 86 #define HCI_CMD_PAYLOAD_SIZE 255 87 88 // Max HCI Command LE payload size: 89 // 64 from LE Generate DHKey command 90 // 32 from LE Encrypt command 91 #if defined(ENABLE_LE_SECURE_CONNECTIONS) && !defined(ENABLE_MICRO_ECC_FOR_LE_SECURE_CONNECTIONS) 92 #define HCI_CMD_PAYLOAD_SIZE_LE 64 93 #else 94 #define HCI_CMD_PAYLOAD_SIZE_LE 32 95 #endif 96 97 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 98 // addition byte in even to terminate remote name request with '\0' 99 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE + 1) 100 101 #ifdef ENABLE_CLASSIC 102 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 103 #else 104 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE_LE) 105 #endif 106 107 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 108 109 // size of hci incoming buffer, big enough for event or acl packet without H4 packet type 110 #ifdef HCI_INCOMING_PACKET_BUFFER_SIZE 111 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 112 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 113 #endif 114 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_EVENT_BUFFER_SIZE 115 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_EVENT_BUFFER_SIZE 116 #endif 117 #else 118 #if HCI_ACL_BUFFER_SIZE > HCI_EVENT_BUFFER_SIZE 119 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 120 #else 121 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_EVENT_BUFFER_SIZE 122 #endif 123 #endif 124 125 // size of hci outgoing buffer, big enough for command or acl packet without H4 packet type 126 #ifdef HCI_OUTGOING_PACKET_BUFFER_SIZE 127 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 128 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 129 #endif 130 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 131 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 132 #endif 133 #else 134 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 135 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 136 #else 137 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 138 #endif 139 #endif 140 141 // additional pre-buffer space for packets to Bluetooth module 142 // - H4 requires 1 byte for the packet type 143 // - h5 requires 4 bytes for H5 header 144 #ifndef HCI_OUTGOING_PRE_BUFFER_SIZE 145 #ifdef HAVE_HOST_CONTROLLER_API 146 #define HCI_OUTGOING_PRE_BUFFER_SIZE 0 147 #else 148 #ifdef ENABLE_H5 149 #define HCI_OUTGOING_PRE_BUFFER_SIZE 4 150 #else 151 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 152 #endif 153 #endif 154 #endif 155 156 // BNEP may uncompress the IP Header by 16 bytes, GATT Client requires two additional bytes for long characteristic reads 157 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 158 #ifdef ENABLE_CLASSIC 159 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 160 #else 161 #define HCI_INCOMING_PRE_BUFFER_SIZE 2 162 #endif 163 #endif 164 165 // 166 #define IS_COMMAND(packet, command) ( little_endian_read_16(packet,0) == command.opcode ) 167 168 // check if command complete event for given command 169 #define HCI_EVENT_IS_COMMAND_COMPLETE(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_COMPLETE) && (little_endian_read_16(event,3) == cmd.opcode) ) 170 #define HCI_EVENT_IS_COMMAND_STATUS(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_STATUS) && (little_endian_read_16(event,4) == cmd.opcode) ) 171 172 // Code+Len=2, Pkts+Opcode=3; total=5 173 #define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5 174 175 // ACL Packet 176 #define READ_ACL_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 177 #define READ_SCO_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 178 #define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 ) 179 #define READ_ACL_LENGTH( buffer ) (little_endian_read_16(buffer, 2)) 180 181 // Sneak peak into L2CAP Packet 182 #define READ_L2CAP_LENGTH(buffer) ( little_endian_read_16(buffer, 4)) 183 #define READ_L2CAP_CHANNEL_ID(buffer) ( little_endian_read_16(buffer, 6)) 184 185 /** 186 * LE connection parameter update state 187 */ 188 189 typedef enum { 190 CON_PARAMETER_UPDATE_NONE, 191 // L2CAP 192 CON_PARAMETER_UPDATE_SEND_REQUEST, 193 CON_PARAMETER_UPDATE_SEND_RESPONSE, 194 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 195 CON_PARAMETER_UPDATE_DENY, 196 // HCI - in respnose to HCI_SUBEVENT_LE_REMOTE_CONNECTION_PARAMETER_REQUEST 197 CON_PARAMETER_UPDATE_REPLY, 198 CON_PARAMETER_UPDATE_NEGATIVE_REPLY, 199 } le_con_parameter_update_state_t; 200 201 // Authentication flags 202 typedef enum { 203 AUTH_FLAGS_NONE = 0x0000, 204 RECV_LINK_KEY_REQUEST = 0x0001, 205 HANDLE_LINK_KEY_REQUEST = 0x0002, 206 SENT_LINK_KEY_REPLY = 0x0004, 207 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 208 RECV_LINK_KEY_NOTIFICATION = 0x0010, 209 DENY_PIN_CODE_REQUEST = 0x0040, 210 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 211 SEND_IO_CAPABILITIES_REPLY = 0x0100, 212 SEND_IO_CAPABILITIES_NEGATIVE_REPLY = 0x0200, 213 SEND_USER_CONFIRM_REPLY = 0x0400, 214 SEND_USER_PASSKEY_REPLY = 0x0800, 215 216 // Classic OOB 217 SEND_REMOTE_OOB_DATA_REPLY = 0x1800, 218 219 // pairing status 220 LEGACY_PAIRING_ACTIVE = 0x2000, 221 SSP_PAIRING_ACTIVE = 0x4000, 222 223 // connection status 224 CONNECTION_AUTHENTICATED = 0x8000, 225 CONNECTION_ENCRYPTED = 0x10000, 226 227 // errands 228 READ_RSSI = 0x20000, 229 WRITE_SUPERVISION_TIMEOUT = 0x40000, 230 231 } hci_authentication_flags_t; 232 233 /** 234 * Connection State 235 */ 236 typedef enum { 237 SEND_CREATE_CONNECTION = 0, 238 SENT_CREATE_CONNECTION, 239 SEND_CANCEL_CONNECTION, 240 SENT_CANCEL_CONNECTION, 241 RECEIVED_CONNECTION_REQUEST, 242 ACCEPTED_CONNECTION_REQUEST, 243 REJECTED_CONNECTION_REQUEST, 244 OPEN, 245 SEND_DISCONNECT, 246 SENT_DISCONNECT, 247 RECEIVED_DISCONNECTION_COMPLETE 248 } CONNECTION_STATE; 249 250 // bonding flags 251 enum { 252 BONDING_REQUEST_REMOTE_FEATURES_PAGE_0 = 0x0001, 253 BONDING_REQUEST_REMOTE_FEATURES_PAGE_1 = 0x0002, 254 BONDING_REQUEST_REMOTE_FEATURES_PAGE_2 = 0x0004, 255 BONDING_RECEIVED_REMOTE_FEATURES = 0x0008, 256 BONDING_REMOTE_SUPPORTS_SSP_CONTROLLER = 0x0010, 257 BONDING_REMOTE_SUPPORTS_SSP_HOST = 0x0020, 258 BONDING_REMOTE_SUPPORTS_SC_CONTROLLER = 0x0040, 259 BONDING_REMOTE_SUPPORTS_SC_HOST = 0x0080, 260 BONDING_DISCONNECT_SECURITY_BLOCK = 0x0100, 261 BONDING_DISCONNECT_DEDICATED_DONE = 0x0200, 262 BONDING_SEND_AUTHENTICATE_REQUEST = 0x0400, 263 BONDING_SEND_ENCRYPTION_REQUEST = 0x0800, 264 BONDING_SEND_READ_ENCRYPTION_KEY_SIZE = 0x1000, 265 BONDING_DEDICATED = 0x2000, 266 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x4000, 267 BONDING_SENT_AUTHENTICATE_REQUEST = 0x8000 268 }; 269 270 typedef enum { 271 BLUETOOTH_OFF = 1, 272 BLUETOOTH_ON, 273 BLUETOOTH_ACTIVE 274 } BLUETOOTH_STATE; 275 276 typedef enum { 277 LE_CONNECTING_IDLE, 278 LE_CONNECTING_CANCEL, 279 LE_CONNECTING_DIRECT, 280 LE_CONNECTING_WHITELIST, 281 } le_connecting_state_t; 282 283 #ifdef ENABLE_BLE 284 285 // 286 // SM internal types and globals 287 // 288 289 typedef enum { 290 291 // general states 292 SM_GENERAL_IDLE, 293 SM_GENERAL_SEND_PAIRING_FAILED, 294 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 295 SM_GENERAL_REENCRYPTION_FAILED, 296 297 // Phase 1: Pairing Feature Exchange 298 SM_PH1_W4_USER_RESPONSE, 299 300 // Phase 2: Authenticating and Encrypting 301 302 // get random number for use as TK Passkey if we show it 303 SM_PH2_GET_RANDOM_TK, 304 SM_PH2_W4_RANDOM_TK, 305 306 // get local random number for confirm c1 307 SM_PH2_C1_GET_RANDOM_A, 308 SM_PH2_C1_W4_RANDOM_A, 309 SM_PH2_C1_GET_RANDOM_B, 310 SM_PH2_C1_W4_RANDOM_B, 311 312 // calculate confirm value for local side 313 SM_PH2_C1_GET_ENC_A, 314 SM_PH2_C1_W4_ENC_A, 315 316 // calculate confirm value for remote side 317 SM_PH2_C1_GET_ENC_C, 318 SM_PH2_C1_W4_ENC_C, 319 320 SM_PH2_C1_SEND_PAIRING_CONFIRM, 321 SM_PH2_SEND_PAIRING_RANDOM, 322 323 // calc STK 324 SM_PH2_CALC_STK, 325 SM_PH2_W4_STK, 326 327 SM_PH2_W4_CONNECTION_ENCRYPTED, 328 329 // Phase 3: Transport Specific Key Distribution 330 // calculate DHK, Y, EDIV, and LTK 331 SM_PH3_Y_GET_ENC, 332 SM_PH3_Y_W4_ENC, 333 SM_PH3_LTK_GET_ENC, 334 335 // exchange keys 336 SM_PH3_DISTRIBUTE_KEYS, 337 SM_PH3_RECEIVE_KEYS, 338 339 // Phase 4: re-establish previously distributed LTK 340 SM_PH4_W4_CONNECTION_ENCRYPTED, 341 342 // RESPONDER ROLE 343 SM_RESPONDER_IDLE, 344 SM_RESPONDER_SEND_SECURITY_REQUEST, 345 SM_RESPONDER_PH0_RECEIVED_LTK_REQUEST, 346 SM_RESPONDER_PH0_RECEIVED_LTK_W4_IRK, 347 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 348 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 349 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 350 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED_W4_IRK, 351 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 352 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 353 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 354 SM_RESPONDER_PH2_W4_LTK_REQUEST, 355 SM_RESPONDER_PH2_SEND_LTK_REPLY, 356 SM_RESPONDER_PH4_Y_W4_ENC, 357 SM_RESPONDER_PH4_SEND_LTK_REPLY, 358 359 // INITIATOR ROLE 360 SM_INITIATOR_CONNECTED, 361 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 362 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 363 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 364 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 365 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 366 SM_INITIATOR_PH4_HAS_LTK, 367 368 // LE Secure Connections 369 SM_SC_RECEIVED_LTK_REQUEST, 370 SM_SC_SEND_PUBLIC_KEY_COMMAND, 371 SM_SC_W4_PUBLIC_KEY_COMMAND, 372 SM_SC_W4_LOCAL_NONCE, 373 SM_SC_W2_CMAC_FOR_CONFIRMATION, 374 SM_SC_W4_CMAC_FOR_CONFIRMATION, 375 SM_SC_SEND_CONFIRMATION, 376 SM_SC_W2_CMAC_FOR_CHECK_CONFIRMATION, 377 SM_SC_W4_CMAC_FOR_CHECK_CONFIRMATION, 378 SM_SC_W4_CONFIRMATION, 379 SM_SC_SEND_PAIRING_RANDOM, 380 SM_SC_W4_PAIRING_RANDOM, 381 SM_SC_W2_CALCULATE_G2, 382 SM_SC_W4_CALCULATE_G2, 383 SM_SC_W4_CALCULATE_DHKEY, 384 SM_SC_W2_CALCULATE_F5_SALT, 385 SM_SC_W4_CALCULATE_F5_SALT, 386 SM_SC_W2_CALCULATE_F5_MACKEY, 387 SM_SC_W4_CALCULATE_F5_MACKEY, 388 SM_SC_W2_CALCULATE_F5_LTK, 389 SM_SC_W4_CALCULATE_F5_LTK, 390 SM_SC_W2_CALCULATE_F6_FOR_DHKEY_CHECK, 391 SM_SC_W4_CALCULATE_F6_FOR_DHKEY_CHECK, 392 SM_SC_W2_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 393 SM_SC_W4_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 394 SM_SC_W4_USER_RESPONSE, 395 SM_SC_SEND_DHKEY_CHECK_COMMAND, 396 SM_SC_W4_DHKEY_CHECK_COMMAND, 397 SM_SC_W4_LTK_REQUEST_SC, 398 SM_SC_W2_CALCULATE_ILK_USING_H6, 399 SM_SC_W2_CALCULATE_ILK_USING_H7, 400 SM_SC_W4_CALCULATE_ILK, 401 SM_SC_W2_CALCULATE_BR_EDR_LINK_KEY, 402 SM_SC_W4_CALCULATE_BR_EDR_LINK_KEY, 403 } security_manager_state_t; 404 405 typedef enum { 406 IRK_LOOKUP_IDLE, 407 IRK_LOOKUP_W4_READY, 408 IRK_LOOKUP_STARTED, 409 IRK_LOOKUP_SUCCEEDED, 410 IRK_LOOKUP_FAILED 411 } irk_lookup_state_t; 412 413 typedef uint8_t sm_pairing_packet_t[7]; 414 415 // connection info available as long as connection exists 416 typedef struct sm_connection { 417 hci_con_handle_t sm_handle; 418 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 419 uint8_t sm_security_request_received; 420 uint8_t sm_pairing_requested; 421 uint8_t sm_peer_addr_type; 422 bd_addr_t sm_peer_address; 423 security_manager_state_t sm_engine_state; 424 irk_lookup_state_t sm_irk_lookup_state; 425 uint8_t sm_connection_encrypted; 426 uint8_t sm_connection_authenticated; // [0..1] 427 uint8_t sm_connection_sc; 428 uint8_t sm_actual_encryption_key_size; 429 sm_pairing_packet_t sm_m_preq; // only used during c1 430 authorization_state_t sm_connection_authorization_state; 431 uint16_t sm_local_ediv; 432 uint8_t sm_local_rand[8]; 433 int sm_le_db_index; 434 bool sm_pairing_active; 435 bool sm_reencryption_active; 436 } sm_connection_t; 437 438 // 439 // ATT Server 440 // 441 442 // max ATT request matches L2CAP PDU -- allow to use smaller buffer 443 #ifndef ATT_REQUEST_BUFFER_SIZE 444 #define ATT_REQUEST_BUFFER_SIZE HCI_ACL_PAYLOAD_SIZE 445 #endif 446 447 typedef enum { 448 ATT_SERVER_IDLE, 449 ATT_SERVER_REQUEST_RECEIVED, 450 ATT_SERVER_W4_SIGNED_WRITE_VALIDATION, 451 ATT_SERVER_REQUEST_RECEIVED_AND_VALIDATED, 452 ATT_SERVER_RESPONSE_PENDING, 453 } att_server_state_t; 454 455 typedef struct { 456 att_server_state_t state; 457 458 uint8_t peer_addr_type; 459 bd_addr_t peer_address; 460 461 int ir_le_device_db_index; 462 uint8_t ir_lookup_active; 463 uint8_t pairing_active; 464 465 int value_indication_handle; 466 btstack_timer_source_t value_indication_timer; 467 468 btstack_linked_list_t notification_requests; 469 btstack_linked_list_t indication_requests; 470 471 #ifdef ENABLE_GATT_OVER_CLASSIC 472 uint16_t l2cap_cid; 473 #endif 474 475 uint16_t request_size; 476 uint8_t request_buffer[ATT_REQUEST_BUFFER_SIZE]; 477 478 } att_server_t; 479 480 #endif 481 482 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 483 typedef enum { 484 L2CAP_INFORMATION_STATE_IDLE = 0, 485 L2CAP_INFORMATION_STATE_W2_SEND_EXTENDED_FEATURE_REQUEST, 486 L2CAP_INFORMATION_STATE_W4_EXTENDED_FEATURE_RESPONSE, 487 L2CAP_INFORMATION_STATE_DONE 488 } l2cap_information_state_t; 489 490 typedef struct { 491 l2cap_information_state_t information_state; 492 uint16_t extended_feature_mask; 493 } l2cap_state_t; 494 #endif 495 496 // 497 typedef struct { 498 // linked list - assert: first field 499 btstack_linked_item_t item; 500 501 // remote side 502 bd_addr_t address; 503 504 // module handle 505 hci_con_handle_t con_handle; 506 507 // le public, le random, classic 508 bd_addr_type_t address_type; 509 510 // role: 0 - master, 1 - slave 511 uint8_t role; 512 513 // connection state 514 CONNECTION_STATE state; 515 516 // bonding 517 uint16_t bonding_flags; 518 uint8_t bonding_status; 519 520 // encryption key size (in octets) 521 uint8_t encryption_key_size; 522 523 // requested security level 524 gap_security_level_t requested_security_level; 525 526 // 527 link_key_type_t link_key_type; 528 529 // remote supported features 530 /* bit 0 - eSCO */ 531 /* bit 1 - extended features */ 532 uint8_t remote_supported_features[1]; 533 534 #ifdef ENABLE_CLASSIC 535 // IO Capabilities Response 536 uint8_t io_cap_response_auth_req; 537 538 // connection mode, default ACL_CONNECTION_MODE_ACTIVE 539 uint8_t connection_mode; 540 541 // enter/exit sniff mode requests 542 uint16_t sniff_min_interval; // 0: idle, 0xffff exit sniff, else enter sniff 543 uint16_t sniff_max_interval; 544 uint16_t sniff_attempt; 545 uint16_t sniff_timeout; 546 547 // sniff subrating 548 uint16_t sniff_subrating_max_latency; // 0xffff = not set 549 uint16_t sniff_subrating_min_remote_timeout; 550 uint16_t sniff_subrating_min_local_timeout; 551 552 // QoS 553 hci_service_type_t qos_service_type; 554 uint32_t qos_token_rate; 555 uint32_t qos_peak_bandwidth; 556 uint32_t qos_latency; 557 uint32_t qos_delay_variation; 558 559 #ifdef ENABLE_SCO_OVER_HCI 560 // track SCO rx event 561 uint32_t sco_rx_ms; 562 uint8_t sco_rx_count; 563 uint8_t sco_rx_valid; 564 #endif 565 // generate sco can send now based on received packets, using timeout below 566 uint8_t sco_tx_ready; 567 568 // request role switch 569 hci_role_t request_role; 570 571 btstack_timer_source_t timeout_sco; 572 #endif /* ENABLE_CLASSIC */ 573 574 // authentication and other errands 575 uint32_t authentication_flags; 576 577 btstack_timer_source_t timeout; 578 579 // timeout in system ticks (HAVE_EMBEDDED_TICK) or milliseconds (HAVE_EMBEDDED_TIME_MS) 580 uint32_t timestamp; 581 582 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 583 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 584 uint16_t acl_recombination_pos; 585 uint16_t acl_recombination_length; 586 587 588 // number packets sent to controller 589 uint8_t num_packets_sent; 590 591 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 592 uint8_t num_packets_completed; 593 #endif 594 595 // LE Connection parameter update 596 le_con_parameter_update_state_t le_con_parameter_update_state; 597 uint8_t le_con_param_update_identifier; 598 uint16_t le_conn_interval_min; 599 uint16_t le_conn_interval_max; 600 uint16_t le_conn_latency; 601 uint16_t le_supervision_timeout; 602 603 #ifdef ENABLE_BLE 604 uint16_t le_connection_interval; 605 606 // LE PHY Update via set phy command 607 uint8_t le_phy_update_all_phys; // 0xff for idle 608 uint8_t le_phy_update_tx_phys; 609 uint8_t le_phy_update_rx_phys; 610 int8_t le_phy_update_phy_options; 611 612 // LE Security Manager 613 sm_connection_t sm_connection; 614 615 #ifdef ENABLE_LE_LIMIT_ACL_FRAGMENT_BY_MAX_OCTETS 616 uint16_t le_max_tx_octets; 617 #endif 618 619 // ATT Connection 620 att_connection_t att_connection; 621 622 // ATT Server 623 att_server_t att_server; 624 625 #endif 626 627 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 628 l2cap_state_t l2cap_state; 629 #endif 630 631 #ifdef ENABLE_CLASSIC_PAIRING_OOB 632 const uint8_t * classic_oob_c_192; 633 const uint8_t * classic_oob_r_192; 634 const uint8_t * classic_oob_c_256; 635 const uint8_t * classic_oob_r_256; 636 #endif 637 638 } hci_connection_t; 639 640 641 /** 642 * HCI Inititizlization State Machine 643 */ 644 typedef enum hci_init_state{ 645 HCI_INIT_SEND_RESET = 0, 646 HCI_INIT_W4_SEND_RESET, 647 HCI_INIT_SEND_READ_LOCAL_VERSION_INFORMATION, 648 HCI_INIT_W4_SEND_READ_LOCAL_VERSION_INFORMATION, 649 HCI_INIT_SEND_READ_LOCAL_NAME, 650 HCI_INIT_W4_SEND_READ_LOCAL_NAME, 651 652 HCI_INIT_SEND_BAUD_CHANGE, 653 HCI_INIT_W4_SEND_BAUD_CHANGE, 654 HCI_INIT_CUSTOM_INIT, 655 HCI_INIT_W4_CUSTOM_INIT, 656 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 657 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 658 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT_LINK_RESET, 659 HCI_INIT_W4_CUSTOM_INIT_BCM_DELAY, 660 661 HCI_INIT_READ_LOCAL_SUPPORTED_COMMANDS, 662 HCI_INIT_W4_READ_LOCAL_SUPPORTED_COMMANDS, 663 664 HCI_INIT_SEND_BAUD_CHANGE_BCM, 665 HCI_INIT_W4_SEND_BAUD_CHANGE_BCM, 666 667 HCI_INIT_SET_BD_ADDR, 668 HCI_INIT_W4_SET_BD_ADDR, 669 670 HCI_INIT_SEND_RESET_ST_WARM_BOOT, 671 HCI_INIT_W4_SEND_RESET_ST_WARM_BOOT, 672 673 HCI_INIT_READ_BD_ADDR, 674 HCI_INIT_W4_READ_BD_ADDR, 675 676 HCI_INIT_READ_BUFFER_SIZE, 677 HCI_INIT_W4_READ_BUFFER_SIZE, 678 HCI_INIT_READ_LOCAL_SUPPORTED_FEATURES, 679 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATURES, 680 681 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 682 HCI_INIT_HOST_BUFFER_SIZE, 683 HCI_INIT_W4_HOST_BUFFER_SIZE, 684 HCI_INIT_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 685 HCI_INIT_W4_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 686 #endif 687 688 HCI_INIT_SET_EVENT_MASK, 689 HCI_INIT_W4_SET_EVENT_MASK, 690 691 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 692 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 693 HCI_INIT_WRITE_PAGE_TIMEOUT, 694 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 695 HCI_INIT_WRITE_DEFAULT_LINK_POLICY_SETTING, 696 HCI_INIT_W4_WRITE_DEFAULT_LINK_POLICY_SETTING, 697 HCI_INIT_WRITE_CLASS_OF_DEVICE, 698 HCI_INIT_W4_WRITE_CLASS_OF_DEVICE, 699 HCI_INIT_WRITE_LOCAL_NAME, 700 HCI_INIT_W4_WRITE_LOCAL_NAME, 701 HCI_INIT_WRITE_EIR_DATA, 702 HCI_INIT_W4_WRITE_EIR_DATA, 703 HCI_INIT_WRITE_INQUIRY_MODE, 704 HCI_INIT_W4_WRITE_INQUIRY_MODE, 705 HCI_INIT_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 706 HCI_INIT_W4_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 707 HCI_INIT_WRITE_SCAN_ENABLE, 708 HCI_INIT_W4_WRITE_SCAN_ENABLE, 709 710 // SCO over HCI 711 HCI_INIT_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 712 HCI_INIT_W4_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 713 HCI_INIT_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 714 HCI_INIT_W4_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 715 716 // Broadcom SCO Routing and Configuration 717 HCI_INIT_BCM_WRITE_SCO_PCM_INT, 718 HCI_INIT_W4_BCM_WRITE_SCO_PCM_INT, 719 HCI_INIT_BCM_WRITE_I2SPCM_INTERFACE_PARAM, 720 HCI_INIT_W4_BCM_WRITE_I2SPCM_INTERFACE_PARAM, 721 722 #ifdef ENABLE_BLE 723 HCI_INIT_LE_READ_BUFFER_SIZE, 724 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 725 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 726 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 727 HCI_INIT_LE_SET_EVENT_MASK, 728 HCI_INIT_W4_LE_SET_EVENT_MASK, 729 #endif 730 731 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 732 HCI_INIT_LE_READ_MAX_DATA_LENGTH, 733 HCI_INIT_W4_LE_READ_MAX_DATA_LENGTH, 734 HCI_INIT_LE_WRITE_SUGGESTED_DATA_LENGTH, 735 HCI_INIT_W4_LE_WRITE_SUGGESTED_DATA_LENGTH, 736 #endif 737 738 #ifdef ENABLE_LE_CENTRAL 739 HCI_INIT_READ_WHITE_LIST_SIZE, 740 HCI_INIT_W4_READ_WHITE_LIST_SIZE, 741 742 HCI_INIT_LE_SET_SCAN_PARAMETERS, 743 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 744 #endif 745 746 HCI_INIT_DONE, 747 748 HCI_FALLING_ASLEEP_DISCONNECT, 749 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 750 HCI_FALLING_ASLEEP_COMPLETE, 751 752 HCI_INIT_AFTER_SLEEP, 753 754 HCI_HALTING_DISCONNECT_ALL_NO_TIMER, 755 HCI_HALTING_DISCONNECT_ALL_TIMER, 756 HCI_HALTING_W4_TIMER, 757 HCI_HALTING_CLOSE, 758 759 } hci_substate_t; 760 761 enum { 762 LE_ADVERTISEMENT_TASKS_SET_ADV_DATA = 1 << 0, 763 LE_ADVERTISEMENT_TASKS_SET_SCAN_DATA = 1 << 1, 764 LE_ADVERTISEMENT_TASKS_SET_PARAMS = 1 << 2, 765 }; 766 767 enum { 768 LE_WHITELIST_ON_CONTROLLER = 1 << 0, 769 LE_WHITELIST_ADD_TO_CONTROLLER = 1 << 1, 770 LE_WHITELIST_REMOVE_FROM_CONTROLLER = 1 << 2, 771 }; 772 773 typedef struct { 774 btstack_linked_item_t item; 775 bd_addr_t address; 776 bd_addr_type_t address_type; 777 uint8_t state; 778 } whitelist_entry_t; 779 780 #define MAX_NUM_RESOLVING_LIST_ENTRIES 64 781 typedef enum { 782 LE_RESOLVING_LIST_SEND_ENABLE_ADDRESS_RESOLUTION, 783 LE_RESOLVING_LIST_READ_SIZE, 784 LE_RESOLVING_LIST_SEND_CLEAR, 785 LE_RESOLVING_LIST_REMOVE_ENTRIES, 786 LE_RESOLVING_LIST_ADD_ENTRIES, 787 LE_RESOLVING_LIST_DONE 788 } le_resolving_list_state_t; 789 790 /** 791 * main data structure 792 */ 793 typedef struct { 794 // transport component with configuration 795 const hci_transport_t * hci_transport; 796 const void * config; 797 798 // chipset driver 799 const btstack_chipset_t * chipset; 800 801 // hardware power controller 802 const btstack_control_t * control; 803 804 #ifdef ENABLE_CLASSIC 805 /* link key db */ 806 const btstack_link_key_db_t * link_key_db; 807 #endif 808 809 // list of existing baseband connections 810 btstack_linked_list_t connections; 811 812 /* callback to L2CAP layer */ 813 btstack_packet_handler_t acl_packet_handler; 814 815 /* callback for SCO data */ 816 btstack_packet_handler_t sco_packet_handler; 817 818 /* callbacks for events */ 819 btstack_linked_list_t event_handlers; 820 821 #ifdef ENABLE_CLASSIC 822 /* callback for reject classic connection */ 823 int (*gap_classic_accept_callback)(bd_addr_t addr, hci_link_type_t link_type); 824 #endif 825 826 // hardware error callback 827 void (*hardware_error_callback)(uint8_t error); 828 829 // basic configuration 830 const char * local_name; 831 const uint8_t * eir_data; 832 uint32_t class_of_device; 833 bd_addr_t local_bd_addr; 834 uint8_t default_link_policy_settings; 835 uint8_t allow_role_switch; 836 uint8_t ssp_enable; 837 uint8_t ssp_io_capability; 838 uint8_t ssp_authentication_requirement; 839 uint8_t ssp_auto_accept; 840 bool secure_connections_enable; 841 bool secure_connections_active; 842 inquiry_mode_t inquiry_mode; 843 844 #ifdef ENABLE_CLASSIC 845 /* write page scan activity, 0xffff is no change */ 846 uint16_t new_page_scan_interval; 847 uint16_t new_page_scan_window; 848 849 /* write page scan type, 0xff is no change */ 850 uint8_t new_page_scan_type; 851 852 // Errata-11838 mandates 7 bytes for GAP Security Level 1-3, we use 16 as default 853 uint8_t gap_required_encyrption_key_size; 854 uint16_t link_supervision_timeout; 855 gap_security_level_t gap_security_level; 856 #endif 857 858 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 859 uint8_t * hci_packet_buffer; 860 uint8_t hci_packet_buffer_data[HCI_OUTGOING_PRE_BUFFER_SIZE + HCI_OUTGOING_PACKET_BUFFER_SIZE]; 861 uint8_t hci_packet_buffer_reserved; 862 uint16_t acl_fragmentation_pos; 863 uint16_t acl_fragmentation_total_size; 864 uint8_t acl_fragmentation_tx_active; 865 866 /* host to controller flow control */ 867 uint8_t num_cmd_packets; 868 uint8_t acl_packets_total_num; 869 uint16_t acl_data_packet_length; 870 uint8_t sco_packets_total_num; 871 uint8_t sco_data_packet_length; 872 uint8_t synchronous_flow_control_enabled; 873 uint8_t le_acl_packets_total_num; 874 uint16_t le_data_packets_length; 875 uint8_t sco_waiting_for_can_send_now; 876 uint8_t sco_can_send_now; 877 878 /* local supported features */ 879 uint8_t local_supported_features[8]; 880 881 /* local supported commands summary - complete info is 64 bytes */ 882 /* 0 - Read Buffer Size (Octet 14/bit 7) */ 883 /* 1 - Write Le Host Supported (Octet 24/bit 6) */ 884 /* 2 - Write Synchronous Flow Control Enable (Octet 10/bit 4) */ 885 /* 3 - Write Default Erroneous Data Reporting (Octet 18/bit 3) */ 886 /* 4 - LE Write Suggested Default Data Length (Octet 34/bit 0) */ 887 /* 5 - LE Read Maximum Data Length (Octet 35/bit 3) */ 888 /* 6 - LE Set Default PHY (Octet 35/bit 5) */ 889 /* 7 - Read Encryption Key Size (Octet 20/bit 4) */ 890 /* 8 - Read Remote Extended Features (Octet 2/bit 5) */ 891 /* 9 - Write Secure Connections Host (Octet 32/bit 3) */ 892 /* 10 - LE Set Address Resolution Enable (Octet 35/bit 1) */ 893 /* 11 - Remote OOB Extended Data Request Reply (Octet 32/bit 1) */ 894 /* 12 - Read Local OOB Extended Data command (Octet 32/bit 6) */ 895 uint8_t local_supported_commands[2]; 896 897 /* bluetooth device information from hci read local version information */ 898 // uint16_t hci_version; 899 // uint16_t hci_revision; 900 // uint16_t lmp_version; 901 uint16_t manufacturer; 902 // uint16_t lmp_subversion; 903 904 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 905 uint16_t packet_types; 906 907 908 /* hci state machine */ 909 HCI_STATE state; 910 hci_substate_t substate; 911 btstack_timer_source_t timeout; 912 btstack_chipset_result_t chipset_result; 913 914 uint16_t last_cmd_opcode; 915 916 uint8_t cmds_ready; 917 918 /* buffer for scan enable cmd - 0xff no change */ 919 uint8_t new_scan_enable_value; 920 921 uint8_t discoverable; 922 uint8_t connectable; 923 uint8_t bondable; 924 925 uint8_t inquiry_state; // see hci.c for state defines 926 927 bd_addr_t remote_name_addr; 928 uint16_t remote_name_clock_offset; 929 uint8_t remote_name_page_scan_repetition_mode; 930 uint8_t remote_name_state; // see hci.c for state defines 931 932 bd_addr_t gap_pairing_addr; 933 uint8_t gap_pairing_state; // see hci.c for state defines 934 uint8_t gap_pairing_pin_len; 935 union { 936 const uint8_t * gap_pairing_pin; 937 uint32_t gap_pairing_passkey; 938 } gap_pairing_input; 939 940 uint16_t sco_voice_setting; 941 uint16_t sco_voice_setting_active; 942 943 uint8_t loopback_mode; 944 945 // buffer for single connection decline 946 uint8_t decline_reason; 947 bd_addr_t decline_addr; 948 949 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 950 uint8_t host_completed_packets; 951 #endif 952 953 #ifdef ENABLE_BLE 954 uint8_t le_own_addr_type; 955 bd_addr_t le_random_address; 956 uint8_t le_random_address_set; 957 958 // LE Whitelist Management 959 uint8_t le_whitelist_capacity; 960 btstack_linked_list_t le_whitelist; 961 #endif 962 963 #ifdef ENABLE_LE_CENTRAL 964 bool le_scanning_enabled; 965 bool le_scanning_active; 966 967 le_connecting_state_t le_connecting_state; 968 le_connecting_state_t le_connecting_request; 969 970 bool le_scanning_param_update; 971 uint8_t le_scan_type; 972 uint8_t le_scan_filter_policy; 973 uint16_t le_scan_interval; 974 uint16_t le_scan_window; 975 976 // Connection parameters 977 uint16_t le_connection_interval_min; 978 uint16_t le_connection_interval_max; 979 uint16_t le_connection_latency; 980 uint16_t le_supervision_timeout; 981 uint16_t le_minimum_ce_length; 982 uint16_t le_maximum_ce_length; 983 uint16_t le_connection_scan_interval; 984 uint16_t le_connection_scan_window; 985 #endif 986 987 le_connection_parameter_range_t le_connection_parameter_range; 988 989 #ifdef ENABLE_LE_PERIPHERAL 990 uint8_t * le_advertisements_data; 991 uint8_t le_advertisements_data_len; 992 993 uint8_t * le_scan_response_data; 994 uint8_t le_scan_response_data_len; 995 996 bool le_advertisements_active; 997 bool le_advertisements_enabled; 998 bool le_advertisements_enabled_for_current_roles; 999 uint8_t le_advertisements_todo; 1000 1001 uint16_t le_advertisements_interval_min; 1002 uint16_t le_advertisements_interval_max; 1003 uint8_t le_advertisements_type; 1004 uint8_t le_advertisements_direct_address_type; 1005 uint8_t le_advertisements_channel_map; 1006 uint8_t le_advertisements_filter_policy; 1007 bd_addr_t le_advertisements_direct_address; 1008 1009 uint8_t le_max_number_peripheral_connections; 1010 #endif 1011 1012 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 1013 // LE Data Length 1014 uint16_t le_supported_max_tx_octets; 1015 uint16_t le_supported_max_tx_time; 1016 #endif 1017 1018 // custom BD ADDR 1019 bd_addr_t custom_bd_addr; 1020 uint8_t custom_bd_addr_set; 1021 1022 #ifdef ENABLE_CLASSIC 1023 uint8_t master_slave_policy; 1024 #endif 1025 1026 // address and address_type of active create connection command (ACL, SCO, LE) 1027 bd_addr_t outgoing_addr; 1028 bd_addr_type_t outgoing_addr_type; 1029 1030 // LE Resolving List 1031 #ifdef ENABLE_LE_PRIVACY_ADDRESS_RESOLUTION 1032 le_resolving_list_state_t le_resolving_list_state; 1033 uint16_t le_resolving_list_size; 1034 uint8_t le_resolving_list_add_entries[(MAX_NUM_RESOLVING_LIST_ENTRIES + 7) / 8]; 1035 uint8_t le_resolving_list_remove_entries[(MAX_NUM_RESOLVING_LIST_ENTRIES + 7) / 8]; 1036 #endif 1037 1038 #ifdef ENABLE_CLASSIC_PAIRING_OOB 1039 bool classic_read_local_oob_data; 1040 #endif 1041 1042 #ifdef HAVE_SCO_TRANSPORT 1043 const btstack_sco_transport_t * sco_transport; 1044 #endif 1045 } hci_stack_t; 1046 1047 1048 /* API_START */ 1049 1050 1051 // HCI init and configuration 1052 1053 1054 /** 1055 * @brief Set up HCI. Needs to be called before any other function. 1056 */ 1057 void hci_init(const hci_transport_t *transport, const void *config); 1058 1059 /** 1060 * @brief Configure Bluetooth chipset driver. Has to be called before power on, or right after receiving the local version information. 1061 */ 1062 void hci_set_chipset(const btstack_chipset_t *chipset_driver); 1063 1064 /** 1065 * @brief Configure Bluetooth hardware control. Has to be called before power on. 1066 * @[aram hardware_control implementation 1067 */ 1068 void hci_set_control(const btstack_control_t *hardware_control); 1069 1070 #ifdef HAVE_SCO_TRANSPORT 1071 /** 1072 * @brief Set SCO Transport implementation for SCO over PCM mode 1073 * @param sco_transport that sends SCO over I2S or PCM interface 1074 */ 1075 void hci_set_sco_transport(const btstack_sco_transport_t *sco_transport); 1076 #endif 1077 1078 #ifdef ENABLE_CLASSIC 1079 /** 1080 * @brief Configure Bluetooth hardware control. Has to be called before power on. 1081 */ 1082 void hci_set_link_key_db(btstack_link_key_db_t const * link_key_db); 1083 #endif 1084 1085 /** 1086 * @brief Set callback for Bluetooth Hardware Error 1087 */ 1088 void hci_set_hardware_error_callback(void (*fn)(uint8_t error)); 1089 1090 /** 1091 * @brief Set Public BD ADDR - passed on to Bluetooth chipset during init if supported in bt_control_h 1092 */ 1093 void hci_set_bd_addr(bd_addr_t addr); 1094 1095 /** 1096 * @brief Configure Voice Setting for use with SCO data in HSP/HFP 1097 */ 1098 void hci_set_sco_voice_setting(uint16_t voice_setting); 1099 1100 /** 1101 * @brief Get SCO Voice Setting 1102 * @return current voice setting 1103 */ 1104 uint16_t hci_get_sco_voice_setting(void); 1105 1106 /** 1107 * @brief Set inquiry mode: standard, with RSSI, with RSSI + Extended Inquiry Results. Has to be called before power on. 1108 * @param inquriy_mode see bluetooth_defines.h 1109 */ 1110 void hci_set_inquiry_mode(inquiry_mode_t mode); 1111 1112 /** 1113 * @brief Requests the change of BTstack power mode. 1114 */ 1115 int hci_power_control(HCI_POWER_MODE mode); 1116 1117 /** 1118 * @brief Shutdown HCI 1119 */ 1120 void hci_close(void); 1121 1122 1123 // Callback registration 1124 1125 1126 /** 1127 * @brief Add event packet handler. 1128 */ 1129 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler); 1130 1131 /** 1132 * @brief Registers a packet handler for ACL data. Used by L2CAP 1133 */ 1134 void hci_register_acl_packet_handler(btstack_packet_handler_t handler); 1135 1136 /** 1137 * @brief Registers a packet handler for SCO data. Used for HSP and HFP profiles. 1138 */ 1139 void hci_register_sco_packet_handler(btstack_packet_handler_t handler); 1140 1141 1142 // Sending HCI Commands 1143 1144 /** 1145 * @brief Check if CMD packet can be sent to controller 1146 */ 1147 int hci_can_send_command_packet_now(void); 1148 1149 /** 1150 * @brief Creates and sends HCI command packets based on a template and a list of parameters. Will return error if outgoing data buffer is occupied. 1151 */ 1152 int hci_send_cmd(const hci_cmd_t *cmd, ...); 1153 1154 1155 // Sending SCO Packets 1156 1157 /** @brief Get SCO packet length for current SCO Voice setting 1158 * @note Using SCO packets of the exact length is required for USB transfer 1159 * @return Length of SCO packets in bytes (not audio frames) incl. 3 byte header 1160 */ 1161 int hci_get_sco_packet_length(void); 1162 1163 /** 1164 * @brief Request emission of HCI_EVENT_SCO_CAN_SEND_NOW as soon as possible 1165 * @note HCI_EVENT_SCO_CAN_SEND_NOW might be emitted during call to this function 1166 * so packet handler should be ready to handle it 1167 */ 1168 void hci_request_sco_can_send_now_event(void); 1169 1170 /** 1171 * @brief Check HCI packet buffer and if SCO packet can be sent to controller 1172 */ 1173 int hci_can_send_sco_packet_now(void); 1174 1175 /** 1176 * @brief Check if SCO packet can be sent to controller 1177 */ 1178 int hci_can_send_prepared_sco_packet_now(void); 1179 1180 /** 1181 * @brief Send SCO packet prepared in HCI packet buffer 1182 */ 1183 int hci_send_sco_packet_buffer(int size); 1184 1185 1186 // Outgoing packet buffer, also used for SCO packets 1187 // see hci_can_send_prepared_sco_packet_now amn hci_send_sco_packet_buffer 1188 1189 /** 1190 * Reserves outgoing packet buffer. 1191 * @return 1 on success 1192 */ 1193 int hci_reserve_packet_buffer(void); 1194 1195 /** 1196 * Get pointer for outgoing packet buffer 1197 */ 1198 uint8_t* hci_get_outgoing_packet_buffer(void); 1199 1200 /** 1201 * Release outgoing packet buffer\ 1202 * @note only called instead of hci_send_preparared 1203 */ 1204 void hci_release_packet_buffer(void); 1205 1206 /** 1207 * @brief Sets the master/slave policy 1208 * @param policy (0: attempt to become master, 1: let connecting device decide) 1209 */ 1210 void hci_set_master_slave_policy(uint8_t policy); 1211 1212 /* API_END */ 1213 1214 1215 /** 1216 * va_list version of hci_send_cmd, call hci_send_cmd_packet 1217 */ 1218 int hci_send_cmd_va_arg(const hci_cmd_t *cmd, va_list argtr); 1219 1220 /** 1221 * Get connection iterator. Only used by l2cap.c and sm.c 1222 */ 1223 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it); 1224 1225 /** 1226 * Get internal hci_connection_t for given handle. Used by L2CAP, SM, daemon 1227 */ 1228 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 1229 1230 /** 1231 * Get internal hci_connection_t for given Bluetooth addres. Called by L2CAP 1232 */ 1233 hci_connection_t * hci_connection_for_bd_addr_and_type(const bd_addr_t addr, bd_addr_type_t addr_type); 1234 1235 /** 1236 * Check if outgoing packet buffer is reserved. Used for internal checks in l2cap.c 1237 */ 1238 int hci_is_packet_buffer_reserved(void); 1239 1240 /** 1241 * Check hci packet buffer is free and a classic acl packet can be sent to controller 1242 */ 1243 int hci_can_send_acl_classic_packet_now(void); 1244 1245 /** 1246 * Check hci packet buffer is free and an LE acl packet can be sent to controller 1247 */ 1248 int hci_can_send_acl_le_packet_now(void); 1249 1250 /** 1251 * Check hci packet buffer is free and an acl packet for the given handle can be sent to controller 1252 */ 1253 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 1254 1255 /** 1256 * Check if acl packet for the given handle can be sent to controller 1257 */ 1258 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 1259 1260 /** 1261 * Send acl packet prepared in hci packet buffer 1262 */ 1263 int hci_send_acl_packet_buffer(int size); 1264 1265 /** 1266 * Check if authentication is active. It delays automatic disconnect while no L2CAP connection 1267 * Called by l2cap. 1268 */ 1269 int hci_authentication_active_for_handle(hci_con_handle_t handle); 1270 1271 /** 1272 * Get maximal ACL Classic data packet length based on used buffer size. Called by L2CAP 1273 */ 1274 uint16_t hci_max_acl_data_packet_length(void); 1275 1276 /** 1277 * Get supported packet types. Called by L2CAP 1278 */ 1279 uint16_t hci_usable_acl_packet_types(void); 1280 1281 /** 1282 * Check if ACL packets marked as non flushable can be sent. Called by L2CAP 1283 */ 1284 int hci_non_flushable_packet_boundary_flag_supported(void); 1285 1286 /** 1287 * Check if extended SCO Link is supported 1288 */ 1289 int hci_extended_sco_link_supported(void); 1290 1291 /** 1292 * Check if SSP is supported on both sides. Called by L2CAP 1293 */ 1294 int gap_ssp_supported_on_both_sides(hci_con_handle_t handle); 1295 1296 /** 1297 * Disconn because of security block. Called by L2CAP 1298 */ 1299 void hci_disconnect_security_block(hci_con_handle_t con_handle); 1300 1301 /** 1302 * Query if remote side supports eSCO 1303 */ 1304 int hci_remote_esco_supported(hci_con_handle_t con_handle); 1305 1306 /** 1307 * Emit current HCI state. Called by daemon 1308 */ 1309 void hci_emit_state(void); 1310 1311 /** 1312 * Send complete CMD packet. Called by daemon and hci_send_cmd_va_arg 1313 * @returns 0 if command was successfully sent to HCI Transport layer 1314 */ 1315 int hci_send_cmd_packet(uint8_t *packet, int size); 1316 1317 /** 1318 * Disconnect all HCI connections. Called by daemon 1319 */ 1320 void hci_disconnect_all(void); 1321 1322 /** 1323 * Get number of free acl slots for packets of given handle. Called by daemon 1324 */ 1325 int hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 1326 1327 /** 1328 * @brief Set Advertisement Parameters 1329 * @param adv_int_min 1330 * @param adv_int_max 1331 * @param adv_type 1332 * @param direct_address_type 1333 * @param direct_address 1334 * @param channel_map 1335 * @param filter_policy 1336 * 1337 * @note internal use. use gap_advertisements_set_params from gap.h instead. 1338 */ 1339 void hci_le_advertisements_set_params(uint16_t adv_int_min, uint16_t adv_int_max, uint8_t adv_type, 1340 uint8_t direct_address_typ, bd_addr_t direct_address, uint8_t channel_map, uint8_t filter_policy); 1341 1342 /** 1343 * 1344 * @note internal use. use gap_random_address_set_mode from gap.h instead. 1345 */ 1346 void hci_le_set_own_address_type(uint8_t own_address_type); 1347 1348 /** 1349 * @note internal use by sm 1350 */ 1351 void hci_load_le_device_db_entry_into_resolving_list(uint16_t le_device_db_index); 1352 1353 /** 1354 * @note internal use by sm 1355 */ 1356 void hci_remove_le_device_db_entry_from_resolving_list(uint16_t le_device_db_index); 1357 1358 /** 1359 * @brief Get Manufactured 1360 * @return manufacturer id 1361 */ 1362 uint16_t hci_get_manufacturer(void); 1363 1364 /** 1365 * Defer halt. Used by btstack_crypto to allow current HCI operation to complete 1366 */ 1367 void hci_halting_defer(void); 1368 1369 // Only for PTS testing 1370 1371 /** 1372 * Disable automatic L2CAP disconnect if no L2CAP connection is established 1373 */ 1374 void hci_disable_l2cap_timeout_check(void); 1375 1376 /** 1377 * Get Classic Allow Role Switch param 1378 */ 1379 uint8_t hci_get_allow_role_switch(void); 1380 1381 /** 1382 * Get state 1383 */ 1384 HCI_STATE hci_get_state(void); 1385 1386 /** 1387 * @brief De-Init HCI 1388 */ 1389 void hci_deinit(void); 1390 1391 // setup test connections, used for fuzzing 1392 void hci_setup_test_connections_fuzz(void); 1393 1394 // free all connections, used for fuzzing 1395 void hci_free_connections_fuzz(void); 1396 1397 // simulate stack bootup 1398 void hci_simulate_working_fuzz(void); 1399 1400 1401 #if defined __cplusplus 1402 } 1403 #endif 1404 1405 #endif // HCI_H 1406