1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef __HCI_H 46 #define __HCI_H 47 48 #include "btstack_config.h" 49 50 #include "btstack_chipset.h" 51 #include "btstack_control.h" 52 #include "btstack_linked_list.h" 53 #include "btstack_util.h" 54 #include "classic/btstack_link_key_db.h" 55 #include "hci_cmd.h" 56 #include "gap.h" 57 #include "hci_transport.h" 58 59 #include <stdint.h> 60 #include <stdlib.h> 61 #include <stdarg.h> 62 63 #if defined __cplusplus 64 extern "C" { 65 #endif 66 67 // packet buffer sizes 68 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 69 // addition byte in even to terminate remote name request with '\0' 70 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE + 1) 71 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 72 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 73 74 // size of hci buffers, big enough for command, event, or acl packet without H4 packet type 75 // @note cmd buffer is bigger than event buffer 76 #ifdef HCI_PACKET_BUFFER_SIZE 77 #if HCI_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 78 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 79 #endif 80 #if HCI_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 81 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 82 #endif 83 #else 84 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 85 #define HCI_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 86 #else 87 #define HCI_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 88 #endif 89 #endif 90 91 // additional pre-buffer space for packets to Bluetooth module, for now, used for HCI Transport H4 DMA 92 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 93 94 // BNEP may uncompress the IP Header by 16 bytes 95 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 96 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 97 #endif 98 99 // 100 #define IS_COMMAND(packet, command) (little_endian_read_16(packet,0) == command.opcode) 101 102 // check if command complete event for given command 103 #define HCI_EVENT_IS_COMMAND_COMPLETE(event,cmd) ( event[0] == HCI_EVENT_COMMAND_COMPLETE && little_endian_read_16(event,3) == cmd.opcode) 104 #define HCI_EVENT_IS_COMMAND_STATUS(event,cmd) ( event[0] == HCI_EVENT_COMMAND_STATUS && little_endian_read_16(event,4) == cmd.opcode) 105 106 // Code+Len=2, Pkts+Opcode=3; total=5 107 #define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5 108 109 // ACL Packet 110 #define READ_ACL_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 111 #define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 ) 112 #define READ_ACL_LENGTH( buffer ) (little_endian_read_16(buffer, 2)) 113 114 // Sneak peak into L2CAP Packet 115 #define READ_L2CAP_LENGTH(buffer) ( little_endian_read_16(buffer, 4)) 116 #define READ_L2CAP_CHANNEL_ID(buffer) ( little_endian_read_16(buffer, 6)) 117 118 /** 119 * LE connection parameter update state 120 */ 121 122 typedef enum { 123 CON_PARAMETER_UPDATE_NONE, 124 CON_PARAMETER_UPDATE_SEND_REQUEST, 125 CON_PARAMETER_UPDATE_SEND_RESPONSE, 126 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 127 CON_PARAMETER_UPDATE_DENY 128 } le_con_parameter_update_state_t; 129 130 // Authentication flags 131 typedef enum { 132 AUTH_FLAGS_NONE = 0x0000, 133 RECV_LINK_KEY_REQUEST = 0x0001, 134 HANDLE_LINK_KEY_REQUEST = 0x0002, 135 SENT_LINK_KEY_REPLY = 0x0004, 136 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 137 RECV_LINK_KEY_NOTIFICATION = 0x0010, 138 DENY_PIN_CODE_REQUEST = 0x0040, 139 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 140 SEND_IO_CAPABILITIES_REPLY = 0x0100, 141 SEND_USER_CONFIRM_REPLY = 0x0200, 142 SEND_USER_PASSKEY_REPLY = 0x0400, 143 144 // pairing status 145 LEGACY_PAIRING_ACTIVE = 0x2000, 146 SSP_PAIRING_ACTIVE = 0x4000, 147 148 // connection status 149 CONNECTION_ENCRYPTED = 0x8000, 150 } hci_authentication_flags_t; 151 152 /** 153 * Connection State 154 */ 155 typedef enum { 156 SEND_CREATE_CONNECTION = 0, 157 SENT_CREATE_CONNECTION, 158 SEND_CANCEL_CONNECTION, 159 SENT_CANCEL_CONNECTION, 160 RECEIVED_CONNECTION_REQUEST, 161 ACCEPTED_CONNECTION_REQUEST, 162 REJECTED_CONNECTION_REQUEST, 163 OPEN, 164 SEND_DISCONNECT, 165 SENT_DISCONNECT, 166 RECEIVED_DISCONNECTION_COMPLETE 167 } CONNECTION_STATE; 168 169 // bonding flags 170 enum { 171 BONDING_REQUEST_REMOTE_FEATURES = 0x01, 172 BONDING_RECEIVED_REMOTE_FEATURES = 0x02, 173 BONDING_REMOTE_SUPPORTS_SSP = 0x04, 174 BONDING_DISCONNECT_SECURITY_BLOCK = 0x08, 175 BONDING_DISCONNECT_DEDICATED_DONE = 0x10, 176 BONDING_SEND_AUTHENTICATE_REQUEST = 0x20, 177 BONDING_SEND_ENCRYPTION_REQUEST = 0x40, 178 BONDING_DEDICATED = 0x80, 179 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x100 180 }; 181 182 typedef enum { 183 BLUETOOTH_OFF = 1, 184 BLUETOOTH_ON, 185 BLUETOOTH_ACTIVE 186 } BLUETOOTH_STATE; 187 188 // le central scanning state 189 typedef enum { 190 LE_SCAN_IDLE, 191 LE_START_SCAN, 192 LE_SCANNING, 193 LE_STOP_SCAN, 194 } le_scanning_state_t; 195 196 typedef enum { 197 LE_CONNECTING_IDLE, 198 LE_CONNECTING_DIRECT, 199 LE_CONNECTING_WHITELIST, 200 } le_connecting_state_t; 201 202 // 203 // SM internal types and globals 204 // 205 206 typedef enum { 207 208 // general states 209 // state = 0 210 SM_GENERAL_IDLE, 211 SM_GENERAL_SEND_PAIRING_FAILED, 212 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 213 214 // Phase 1: Pairing Feature Exchange 215 SM_PH1_W4_USER_RESPONSE, 216 217 // Phase 2: Authenticating and Encrypting 218 219 // get random number for use as TK Passkey if we show it 220 SM_PH2_GET_RANDOM_TK, 221 SM_PH2_W4_RANDOM_TK, 222 223 // get local random number for confirm c1 224 SM_PH2_C1_GET_RANDOM_A, 225 SM_PH2_C1_W4_RANDOM_A, 226 SM_PH2_C1_GET_RANDOM_B, 227 SM_PH2_C1_W4_RANDOM_B, 228 229 // calculate confirm value for local side 230 // state = 10 231 SM_PH2_C1_GET_ENC_A, 232 SM_PH2_C1_W4_ENC_A, 233 SM_PH2_C1_GET_ENC_B, 234 SM_PH2_C1_W4_ENC_B, 235 236 // calculate confirm value for remote side 237 SM_PH2_C1_GET_ENC_C, 238 SM_PH2_C1_W4_ENC_C, 239 SM_PH2_C1_GET_ENC_D, 240 SM_PH2_C1_W4_ENC_D, 241 242 SM_PH2_C1_SEND_PAIRING_CONFIRM, 243 SM_PH2_SEND_PAIRING_RANDOM, 244 245 // calc STK 246 // state = 20 247 SM_PH2_CALC_STK, 248 SM_PH2_W4_STK, 249 250 SM_PH2_W4_CONNECTION_ENCRYPTED, 251 252 // Phase 3: Transport Specific Key Distribution 253 // calculate DHK, Y, EDIV, and LTK 254 SM_PH3_GET_RANDOM, 255 SM_PH3_W4_RANDOM, 256 SM_PH3_GET_DIV, 257 SM_PH3_W4_DIV, 258 SM_PH3_Y_GET_ENC, 259 SM_PH3_Y_W4_ENC, 260 SM_PH3_LTK_GET_ENC, 261 // state = 30 262 SM_PH3_LTK_W4_ENC, 263 SM_PH3_CSRK_GET_ENC, 264 SM_PH3_CSRK_W4_ENC, 265 266 // exchange keys 267 SM_PH3_DISTRIBUTE_KEYS, 268 SM_PH3_RECEIVE_KEYS, 269 270 // RESPONDER ROLE 271 // state = 35 272 SM_RESPONDER_IDLE, 273 SM_RESPONDER_SEND_SECURITY_REQUEST, 274 SM_RESPONDER_PH0_RECEIVED_LTK_REQUEST, 275 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 276 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 277 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 278 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 279 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 280 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 281 SM_RESPONDER_PH2_W4_LTK_REQUEST, 282 SM_RESPONDER_PH2_SEND_LTK_REPLY, 283 284 // Phase 4: re-establish previously distributed LTK 285 // state == 46 286 SM_RESPONDER_PH4_Y_GET_ENC, 287 SM_RESPONDER_PH4_Y_W4_ENC, 288 SM_RESPONDER_PH4_LTK_GET_ENC, 289 SM_RESPONDER_PH4_LTK_W4_ENC, 290 SM_RESPONDER_PH4_SEND_LTK_REPLY, 291 292 // INITITIATOR ROLE 293 // state = 51 294 SM_INITIATOR_CONNECTED, 295 SM_INITIATOR_PH0_HAS_LTK, 296 SM_INITIATOR_PH0_SEND_START_ENCRYPTION, 297 SM_INITIATOR_PH0_W4_CONNECTION_ENCRYPTED, 298 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 299 SM_INITIATOR_PH1_SEND_PAIRING_REQUEST, 300 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 301 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 302 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 303 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 304 305 // LE Secure Connections 306 SM_SC_RECEIVED_LTK_REQUEST, 307 SM_SC_SEND_PUBLIC_KEY_COMMAND, 308 SM_SC_W4_PUBLIC_KEY_COMMAND, 309 SM_SC_W2_GET_RANDOM_A, 310 SM_SC_W4_GET_RANDOM_A, 311 SM_SC_W2_GET_RANDOM_B, 312 SM_SC_W4_GET_RANDOM_B, 313 SM_SC_W2_CMAC_FOR_CONFIRMATION, 314 SM_SC_W4_CMAC_FOR_CONFIRMATION, 315 SM_SC_SEND_CONFIRMATION, 316 SM_SC_W2_CMAC_FOR_CHECK_CONFIRMATION, 317 SM_SC_W4_CMAC_FOR_CHECK_CONFIRMATION, 318 SM_SC_W4_CONFIRMATION, 319 SM_SC_SEND_PAIRING_RANDOM, 320 SM_SC_W4_PAIRING_RANDOM, 321 SM_SC_W2_CALCULATE_G2, 322 SM_SC_W4_CALCULATE_G2, 323 SM_SC_W2_CALCULATE_F5_SALT, 324 SM_SC_W4_CALCULATE_F5_SALT, 325 SM_SC_W2_CALCULATE_F5_MACKEY, 326 SM_SC_W4_CALCULATE_F5_MACKEY, 327 SM_SC_W2_CALCULATE_F5_LTK, 328 SM_SC_W4_CALCULATE_F5_LTK, 329 SM_SC_W2_CALCULATE_F6_FOR_DHKEY_CHECK, 330 SM_SC_W4_CALCULATE_F6_FOR_DHKEY_CHECK, 331 SM_SC_W2_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 332 SM_SC_W4_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 333 SM_SC_W4_USER_RESPONSE, 334 SM_SC_SEND_DHKEY_CHECK_COMMAND, 335 SM_SC_W4_DHKEY_CHECK_COMMAND, 336 SM_SC_W4_LTK_REQUEST_SC, 337 SM_SC_W2_CALCULATE_H6_ILK, 338 SM_SC_W4_CALCULATE_H6_ILK, 339 SM_SC_W2_CALCULATE_H6_BR_EDR_LINK_KEY, 340 SM_SC_W4_CALCULATE_H6_BR_EDR_LINK_KEY, 341 } security_manager_state_t; 342 343 typedef enum { 344 IRK_LOOKUP_IDLE, 345 IRK_LOOKUP_W4_READY, 346 IRK_LOOKUP_STARTED, 347 IRK_LOOKUP_SUCCEEDED, 348 IRK_LOOKUP_FAILED 349 } irk_lookup_state_t; 350 351 // Authorization state 352 typedef enum { 353 AUTHORIZATION_UNKNOWN, 354 AUTHORIZATION_PENDING, 355 AUTHORIZATION_DECLINED, 356 AUTHORIZATION_GRANTED 357 } authorization_state_t; 358 359 typedef uint8_t sm_pairing_packet_t[7]; 360 361 // connection info available as long as connection exists 362 typedef struct sm_connection { 363 hci_con_handle_t sm_handle; 364 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 365 uint8_t sm_security_request_received; 366 uint8_t sm_bonding_requested; 367 uint8_t sm_peer_addr_type; 368 bd_addr_t sm_peer_address; 369 security_manager_state_t sm_engine_state; 370 irk_lookup_state_t sm_irk_lookup_state; 371 uint8_t sm_connection_encrypted; 372 uint8_t sm_connection_authenticated; // [0..1] 373 uint8_t sm_actual_encryption_key_size; 374 sm_pairing_packet_t sm_m_preq; // only used during c1 375 authorization_state_t sm_connection_authorization_state; 376 uint16_t sm_local_ediv; 377 uint8_t sm_local_rand[8]; 378 int sm_le_db_index; 379 } sm_connection_t; 380 381 typedef struct { 382 // linked list - assert: first field 383 btstack_linked_item_t item; 384 385 // remote side 386 bd_addr_t address; 387 388 // module handle 389 hci_con_handle_t con_handle; 390 391 // le public, le random, classic 392 bd_addr_type_t address_type; 393 394 // role: 0 - master, 1 - slave 395 uint8_t role; 396 397 // connection state 398 CONNECTION_STATE state; 399 400 // bonding 401 uint16_t bonding_flags; 402 uint8_t bonding_status; 403 // requested security level 404 gap_security_level_t requested_security_level; 405 406 // 407 link_key_type_t link_key_type; 408 409 // remote supported features 410 uint8_t remote_supported_feature_eSCO; 411 412 // errands 413 uint32_t authentication_flags; 414 415 btstack_timer_source_t timeout; 416 417 // timeout in system ticks (HAVE_EMBEDDED_TICK) or milliseconds (HAVE_EMBEDDED_TIME_MS) 418 uint32_t timestamp; 419 420 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 421 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 422 uint16_t acl_recombination_pos; 423 uint16_t acl_recombination_length; 424 425 // number packets sent to controller 426 uint8_t num_acl_packets_sent; 427 uint8_t num_sco_packets_sent; 428 429 // LE Connection parameter update 430 le_con_parameter_update_state_t le_con_parameter_update_state; 431 uint8_t le_con_param_update_identifier; 432 uint16_t le_conn_interval_min; 433 uint16_t le_conn_interval_max; 434 uint16_t le_conn_latency; 435 uint16_t le_supervision_timeout; 436 437 #ifdef ENABLE_BLE 438 // LE Security Manager 439 sm_connection_t sm_connection; 440 #endif 441 442 } hci_connection_t; 443 444 445 /** 446 * HCI Inititizlization State Machine 447 */ 448 typedef enum hci_init_state{ 449 HCI_INIT_SEND_RESET = 0, 450 HCI_INIT_W4_SEND_RESET, 451 HCI_INIT_SEND_READ_LOCAL_VERSION_INFORMATION, 452 HCI_INIT_W4_SEND_READ_LOCAL_VERSION_INFORMATION, 453 454 HCI_INIT_SEND_BAUD_CHANGE, 455 HCI_INIT_W4_SEND_BAUD_CHANGE, 456 HCI_INIT_CUSTOM_INIT, 457 HCI_INIT_W4_CUSTOM_INIT, 458 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 459 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 460 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT_LINK_RESET, 461 462 HCI_INIT_READ_LOCAL_SUPPORTED_COMMANDS, 463 HCI_INIT_W4_READ_LOCAL_SUPPORTED_COMMANDS, 464 465 HCI_INIT_SEND_BAUD_CHANGE_BCM, 466 HCI_INIT_W4_SEND_BAUD_CHANGE_BCM, 467 468 HCI_INIT_SET_BD_ADDR, 469 HCI_INIT_W4_SET_BD_ADDR, 470 471 HCI_INIT_SEND_RESET_ST_WARM_BOOT, 472 HCI_INIT_W4_SEND_RESET_ST_WARM_BOOT, 473 474 HCI_INIT_READ_BD_ADDR, 475 HCI_INIT_W4_READ_BD_ADDR, 476 477 HCI_INIT_READ_BUFFER_SIZE, 478 HCI_INIT_W4_READ_BUFFER_SIZE, 479 HCI_INIT_READ_LOCAL_SUPPORTED_FEATURES, 480 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATURES, 481 HCI_INIT_SET_EVENT_MASK, 482 HCI_INIT_W4_SET_EVENT_MASK, 483 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 484 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 485 HCI_INIT_WRITE_PAGE_TIMEOUT, 486 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 487 HCI_INIT_WRITE_CLASS_OF_DEVICE, 488 HCI_INIT_W4_WRITE_CLASS_OF_DEVICE, 489 HCI_INIT_WRITE_LOCAL_NAME, 490 HCI_INIT_W4_WRITE_LOCAL_NAME, 491 HCI_INIT_WRITE_INQUIRY_MODE, 492 HCI_INIT_W4_WRITE_INQUIRY_MODE, 493 HCI_INIT_WRITE_SCAN_ENABLE, 494 HCI_INIT_W4_WRITE_SCAN_ENABLE, 495 496 HCI_INIT_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 497 HCI_INIT_W4_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 498 HCI_INIT_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 499 HCI_INIT_W4_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 500 501 HCI_INIT_LE_READ_BUFFER_SIZE, 502 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 503 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 504 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 505 HCI_INIT_READ_WHITE_LIST_SIZE, 506 HCI_INIT_W4_READ_WHITE_LIST_SIZE, 507 508 HCI_INIT_LE_SET_SCAN_PARAMETERS, 509 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 510 511 HCI_INIT_DONE, 512 513 HCI_FALLING_ASLEEP_DISCONNECT, 514 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 515 HCI_FALLING_ASLEEP_COMPLETE, 516 517 HCI_INIT_AFTER_SLEEP 518 519 } hci_substate_t; 520 521 enum { 522 LE_ADVERTISEMENT_TASKS_DISABLE = 1 << 0, 523 LE_ADVERTISEMENT_TASKS_SET_ADV_DATA = 1 << 1, 524 LE_ADVERTISEMENT_TASKS_SET_SCAN_DATA = 1 << 2, 525 LE_ADVERTISEMENT_TASKS_SET_PARAMS = 1 << 3, 526 LE_ADVERTISEMENT_TASKS_ENABLE = 1 << 4, 527 }; 528 529 enum { 530 LE_WHITELIST_ON_CONTROLLER = 1 << 0, 531 LE_WHITELIST_ADD_TO_CONTROLLER = 1 << 1, 532 LE_WHITELIST_REMOVE_FROM_CONTROLLER = 1 << 2, 533 }; 534 535 typedef struct { 536 btstack_linked_item_t item; 537 bd_addr_t address; 538 bd_addr_type_t address_type; 539 uint8_t state; 540 } whitelist_entry_t; 541 542 /** 543 * main data structure 544 */ 545 typedef struct { 546 // transport component with configuration 547 const hci_transport_t * hci_transport; 548 const void * config; 549 550 // chipset driver 551 const btstack_chipset_t * chipset; 552 553 // hardware power controller 554 const btstack_control_t * control; 555 556 /* link key db */ 557 const btstack_link_key_db_t * link_key_db; 558 559 // list of existing baseband connections 560 btstack_linked_list_t connections; 561 562 /* callback to L2CAP layer */ 563 btstack_packet_handler_t acl_packet_handler; 564 565 /* callback for SCO data */ 566 btstack_packet_handler_t sco_packet_handler; 567 568 /* callbacks for events */ 569 btstack_linked_list_t event_handlers; 570 571 // local version information callback 572 void (*local_version_information_callback)(uint8_t * local_version_information); 573 574 // hardware error callback 575 void (*hardware_error_callback)(uint8_t error); 576 577 // basic configuration 578 const char * local_name; 579 uint32_t class_of_device; 580 bd_addr_t local_bd_addr; 581 uint8_t ssp_enable; 582 uint8_t ssp_io_capability; 583 uint8_t ssp_authentication_requirement; 584 uint8_t ssp_auto_accept; 585 inquiry_mode_t inquiry_mode; 586 587 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 588 uint8_t * hci_packet_buffer; 589 uint8_t hci_packet_buffer_data[HCI_OUTGOING_PRE_BUFFER_SIZE + HCI_PACKET_BUFFER_SIZE]; 590 uint8_t hci_packet_buffer_reserved; 591 uint16_t acl_fragmentation_pos; 592 uint16_t acl_fragmentation_total_size; 593 594 /* host to controller flow control */ 595 uint8_t num_cmd_packets; 596 uint8_t acl_packets_total_num; 597 uint16_t acl_data_packet_length; 598 uint8_t sco_packets_total_num; 599 uint8_t sco_data_packet_length; 600 uint8_t synchronous_flow_control_enabled; 601 uint8_t le_acl_packets_total_num; 602 uint16_t le_data_packets_length; 603 uint8_t sco_waiting_for_can_send_now; 604 605 /* local supported features */ 606 uint8_t local_supported_features[8]; 607 608 /* local supported commands summary - complete info is 64 bytes */ 609 /* 0 - read buffer size */ 610 /* 1 - write le host supported */ 611 uint8_t local_supported_commands[1]; 612 613 /* bluetooth device information from hci read local version information */ 614 // uint16_t hci_version; 615 // uint16_t hci_revision; 616 // uint16_t lmp_version; 617 uint16_t manufacturer; 618 // uint16_t lmp_subversion; 619 620 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 621 uint16_t packet_types; 622 623 624 /* hci state machine */ 625 HCI_STATE state; 626 hci_substate_t substate; 627 btstack_timer_source_t timeout; 628 uint8_t cmds_ready; 629 630 uint16_t last_cmd_opcode; 631 632 uint8_t discoverable; 633 uint8_t connectable; 634 uint8_t bondable; 635 636 /* buffer for scan enable cmd - 0xff no change */ 637 uint8_t new_scan_enable_value; 638 639 uint16_t sco_voice_setting; 640 641 uint8_t loopback_mode; 642 643 // buffer for single connection decline 644 uint8_t decline_reason; 645 bd_addr_t decline_addr; 646 647 uint8_t adv_addr_type; 648 bd_addr_t adv_address; 649 650 le_scanning_state_t le_scanning_state; 651 le_connecting_state_t le_connecting_state; 652 653 // buffer for le scan type command - 0xff not set 654 uint8_t le_scan_type; 655 uint16_t le_scan_interval; 656 uint16_t le_scan_window; 657 658 le_connection_parameter_range_t le_connection_parameter_range; 659 660 uint8_t * le_advertisements_data; 661 uint8_t le_advertisements_data_len; 662 663 uint8_t * le_scan_response_data; 664 uint8_t le_scan_response_data_len; 665 666 uint8_t le_advertisements_active; 667 uint8_t le_advertisements_enabled; 668 uint8_t le_advertisements_todo; 669 670 uint16_t le_advertisements_interval_min; 671 uint16_t le_advertisements_interval_max; 672 uint8_t le_advertisements_type; 673 uint8_t le_advertisements_own_address_type; 674 uint8_t le_advertisements_direct_address_type; 675 uint8_t le_advertisements_channel_map; 676 uint8_t le_advertisements_filter_policy; 677 bd_addr_t le_advertisements_direct_address; 678 679 // LE Whitelist Management 680 uint16_t le_whitelist_capacity; 681 btstack_linked_list_t le_whitelist; 682 683 // custom BD ADDR 684 bd_addr_t custom_bd_addr; 685 uint8_t custom_bd_addr_set; 686 687 } hci_stack_t; 688 689 690 /* API_START */ 691 692 693 // HCI init and configuration 694 695 696 /** 697 * @brief Set up HCI. Needs to be called before any other function. 698 */ 699 void hci_init(const hci_transport_t *transport, const void *config); 700 701 /** 702 * @brief Configure Bluetooth chipset driver. Has to be called before power on, or right after receiving the local version information. 703 */ 704 void hci_set_chipset(const btstack_chipset_t *chipset_driver); 705 706 /** 707 * @brief Configure Bluetooth hardware control. Has to be called before power on. 708 */ 709 void hci_set_control(const btstack_control_t *hardware_control); 710 711 /** 712 * @brief Configure Bluetooth hardware control. Has to be called before power on. 713 */ 714 void hci_set_link_key_db(btstack_link_key_db_t const * link_key_db); 715 716 /** 717 * @brief Set callback for Bluetooth Hardware Error 718 */ 719 void hci_set_hardware_error_callback(void (*fn)(uint8_t error)); 720 721 /** 722 * @brief Set callback for local information from Bluetooth controller right after HCI Reset 723 * @note Can be used to select chipset driver dynamically during startup 724 */ 725 void hci_set_local_version_information_callback(void (*fn)(uint8_t * local_version_information)); 726 727 /** 728 * @brief Set Public BD ADDR - passed on to Bluetooth chipset during init if supported in bt_control_h 729 */ 730 void hci_set_bd_addr(bd_addr_t addr); 731 732 /** 733 * @brief Configure Voice Setting for use with SCO data in HSP/HFP 734 */ 735 void hci_set_sco_voice_setting(uint16_t voice_setting); 736 737 /** 738 * @brief Get SCO Voice Setting 739 * @return current voice setting 740 */ 741 uint16_t hci_get_sco_voice_setting(void); 742 743 /** 744 * @brief Set inquiry mode: standard, with RSSI, with RSSI + Extended Inquiry Results. Has to be called before power on. 745 * @param inquriy_mode see bluetooth_defines.h 746 */ 747 void hci_set_inquiry_mode(inquiry_mode_t mode); 748 749 /** 750 * @brief Requests the change of BTstack power mode. 751 */ 752 int hci_power_control(HCI_POWER_MODE mode); 753 754 /** 755 * @brief Shutdown HCI 756 */ 757 void hci_close(void); 758 759 760 // Callback registration 761 762 763 /** 764 * @brief Add event packet handler. 765 */ 766 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler); 767 768 /** 769 * @brief Registers a packet handler for ACL data. Used by L2CAP 770 */ 771 void hci_register_acl_packet_handler(btstack_packet_handler_t handler); 772 773 /** 774 * @brief Registers a packet handler for SCO data. Used for HSP and HFP profiles. 775 */ 776 void hci_register_sco_packet_handler(btstack_packet_handler_t handler); 777 778 779 // Sending HCI Commands 780 781 /** 782 * @brief Check if CMD packet can be sent to controller 783 */ 784 int hci_can_send_command_packet_now(void); 785 786 /** 787 * @brief Creates and sends HCI command packets based on a template and a list of parameters. Will return error if outgoing data buffer is occupied. 788 */ 789 int hci_send_cmd(const hci_cmd_t *cmd, ...); 790 791 792 // Sending SCO Packets 793 794 /** @brief Get SCO packet length for current SCO Voice setting 795 * @note Using SCO packets of the exact length is required for USB transfer 796 * @return Length of SCO packets in bytes (not audio frames) incl. 3 byte header 797 */ 798 int hci_get_sco_packet_length(void); 799 800 /** 801 * @brief Request emission of HCI_EVENT_SCO_CAN_SEND_NOW as soon as possible 802 * @note HCI_EVENT_SCO_CAN_SEND_NOW might be emitted during call to this function 803 * so packet handler should be ready to handle it 804 */ 805 void hci_request_sco_can_send_now_event(void); 806 807 /** 808 * @brief Check HCI packet buffer and if SCO packet can be sent to controller 809 */ 810 int hci_can_send_sco_packet_now(void); 811 812 /** 813 * @brief Check if SCO packet can be sent to controller 814 */ 815 int hci_can_send_prepared_sco_packet_now(void); 816 817 /** 818 * @brief Send SCO packet prepared in HCI packet buffer 819 */ 820 int hci_send_sco_packet_buffer(int size); 821 822 823 // Outgoing packet buffer, also used for SCO packets 824 // see hci_can_send_prepared_sco_packet_now amn hci_send_sco_packet_buffer 825 826 /** 827 * Reserves outgoing packet buffer. 828 * @return 1 on success 829 */ 830 int hci_reserve_packet_buffer(void); 831 832 /** 833 * Get pointer for outgoing packet buffer 834 */ 835 uint8_t* hci_get_outgoing_packet_buffer(void); 836 837 /** 838 * Release outgoing packet buffer\ 839 * @note only called instead of hci_send_preparared 840 */ 841 void hci_release_packet_buffer(void); 842 843 844 /* API_END */ 845 846 847 848 /** 849 * Get connection iterator. Only used by l2cap.c and sm.c 850 */ 851 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it); 852 853 /** 854 * Get internal hci_connection_t for given handle. Used by L2CAP, SM, daemon 855 */ 856 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 857 858 /** 859 * Get internal hci_connection_t for given Bluetooth addres. Called by L2CAP 860 */ 861 hci_connection_t * hci_connection_for_bd_addr_and_type(bd_addr_t addr, bd_addr_type_t addr_type); 862 863 /** 864 * Check if outgoing packet buffer is reserved. Used for internal checks in l2cap.c 865 */ 866 int hci_is_packet_buffer_reserved(void); 867 868 /** 869 * Check hci packet buffer is free and a classic acl packet can be sent to controller 870 */ 871 int hci_can_send_acl_classic_packet_now(void); 872 873 /** 874 * Check hci packet buffer is free and an LE acl packet can be sent to controller 875 */ 876 int hci_can_send_acl_le_packet_now(void); 877 878 /** 879 * Check hci packet buffer is free and an acl packet for the given handle can be sent to controller 880 */ 881 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 882 883 /** 884 * Check if acl packet for the given handle can be sent to controller 885 */ 886 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 887 888 /** 889 * Send acl packet prepared in hci packet buffer 890 */ 891 int hci_send_acl_packet_buffer(int size); 892 893 /** 894 * Check if authentication is active. It delays automatic disconnect while no L2CAP connection 895 * Called by l2cap. 896 */ 897 int hci_authentication_active_for_handle(hci_con_handle_t handle); 898 899 /** 900 * Get maximal ACL Classic data packet length based on used buffer size. Called by L2CAP 901 */ 902 uint16_t hci_max_acl_data_packet_length(void); 903 904 /** 905 * Get supported packet types. Called by L2CAP 906 */ 907 uint16_t hci_usable_acl_packet_types(void); 908 909 /** 910 * Check if ACL packets marked as non flushable can be sent. Called by L2CAP 911 */ 912 int hci_non_flushable_packet_boundary_flag_supported(void); 913 914 /** 915 * Check if extended SCO Link is supported 916 */ 917 int hci_extended_sco_link_supported(void); 918 919 /** 920 * Check if SSP is supported on both sides. Called by L2CAP 921 */ 922 int gap_ssp_supported_on_both_sides(hci_con_handle_t handle); 923 924 /** 925 * Disconn because of security block. Called by L2CAP 926 */ 927 void hci_disconnect_security_block(hci_con_handle_t con_handle); 928 929 /** 930 * Query if remote side supports eSCO 931 */ 932 int hci_remote_esco_supported(hci_con_handle_t con_handle); 933 934 /** 935 * Emit current HCI state. Called by daemon 936 */ 937 void hci_emit_state(void); 938 939 /** 940 * Send complete CMD packet. Called by daemon 941 */ 942 int hci_send_cmd_packet(uint8_t *packet, int size); 943 944 /** 945 * Disconnect all HCI connections. Called by daemon 946 */ 947 void hci_disconnect_all(void); 948 949 /** 950 * Get number of free acl slots for packets of given handle. Called by daemon 951 */ 952 int hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 953 954 /** 955 * @brief Set Advertisement Parameters 956 * @param adv_int_min 957 * @param adv_int_max 958 * @param adv_type 959 * @param own_address_type 960 * @param direct_address_type 961 * @param direct_address 962 * @param channel_map 963 * @param filter_policy 964 * 965 * @note internal use. use gap_advertisements_set_params from gap_le.h instead. 966 */ 967 void hci_le_advertisements_set_params(uint16_t adv_int_min, uint16_t adv_int_max, uint8_t adv_type, 968 uint8_t own_address_type, uint8_t direct_address_typ, bd_addr_t direct_address, 969 uint8_t channel_map, uint8_t filter_policy); 970 971 972 // Only for PTS testing 973 974 /** 975 * Disable automatic L2CAP disconnect if no L2CAP connection is established 976 */ 977 void hci_disable_l2cap_timeout_check(void); 978 979 #if defined __cplusplus 980 } 981 #endif 982 983 #endif // __HCI_H 984