Select one of the symbols to view example projects that use it.
 
Outline
#define BTM_INT_H
tBTM_SEC_DEV_REC
#include "common/bt_defs.h"
#include "common/bt_target.h"
#include "stack/hcidefs.h"
#include "stack/rfcdefs.h"
#include "stack/btm_api.h"
#include "osi/fixed_queue.h"
#include "btm_ble_int.h"
#include "stack/smp_api.h"
#define ESP_VS_REM_LEGACY_AUTH_CMP
tBTM_LOC_BD_NAME
#define BTM_ACL_IS_CONNECTED
#define BTM_LE_ACL_IS_CONNECTED
#define BTM_MAX_SCN
#define BTM_IS_BRCM_CONTROLLER
t_acl_db_param
<anonymous enum>
tBTM_PM_STATE
tBTM_PM_MCB
tACL_CONN
#define TT_DEV_RESET
#define TT_DEV_RLN
#define TT_DEV_RLNKP
tBTM_DEVCB
#define BTM_PER_INQ_MIN_MAX_PERIOD
#define BTM_PER_INQ_MAX_MAX_PERIOD
#define BTM_PER_INQ_MIN_MIN_PERIOD
#define BTM_PER_INQ_MAX_MIN_PERIOD
#define BTM_MAX_INQUIRY_LENGTH
#define BTM_MIN_INQUIRY_LEN
#define BTM_MIN_INQ_TX_POWER
#define BTM_MAX_INQ_TX_POWER
tINQ_BDADDR
tINQ_DB_ENT
<anonymous enum>
tBTM_INQ_TYPE
tBTM_INQUIRY_VAR_ST
#define BTM_CLOCK_OFFSET_VALID
#define BTM_SEC_INVALID_HANDLE
BTM_BD_NAME_PTR
tBTM_SEC_CALLBACK
#define BTM_DATA_HANDLE_MASK
#define BTMD_GET_HANDLE
#define BTM_SCO_2_ESCO
#define BTM_ESCO_2_SCO
#define BTM_SCO_ROUTE_UNKNOWN
tBTM_ESCO_INFO
tSCO_CONN
tSCO_CB
#define btm_accept_sco_link
#define btm_reject_sco_link
#define btm_set_sco_ind_cback
#define btm_sco_chk_pend_rolechange
#define BTM_SEC_OUT_FLAGS
#define BTM_SEC_IN_FLAGS
tBTM_SEC_SERV_REC
tBTM_SEC_BLE_KEYS
tBTM_SEC_BLE
<anonymous enum>
tBTM_BOND_TYPE
tBTM_SEC_DEV_REC
#define BTM_SEC_IS_SM4
#define BTM_SEC_IS_SM4_LEGACY
#define BTM_SEC_IS_SM4_UNKNOWN
#define BTM_SEC_LE_MASK
tBTM_CFG
<anonymous enum>
tBTM_PM_EVENT
tBTM_PM_MSG_DATA
tBTM_PM_MD_CHG_DATA
tBTM_PM_SET_MD_DATA
tBTM_PM_SM_DATA
#define BTM_PM_REC_NOT_USED
tBTM_PM_RCB
<anonymous enum>
tBTM_BLI_EVENT
<anonymous enum>
tBTM_PAIRING_STATE
#define BTM_PAIR_FLAGS_WE_STARTED_DD
#define BTM_PAIR_FLAGS_PEER_STARTED_DD
#define BTM_PAIR_FLAGS_DISC_WHEN_DONE
#define BTM_PAIR_FLAGS_PIN_REQD
#define BTM_PAIR_FLAGS_PRE_FETCH_PIN
#define BTM_PAIR_FLAGS_REJECTED_CONNECT
#define BTM_PAIR_FLAGS_WE_CANCEL_DD
#define BTM_PAIR_FLAGS_LE_ACTIVE
tBTM_SEC_QUEUE_ENTRY
#define CONN_ORIENT_TERM
#define CONN_ORIENT_ORIG
#define CONNLESS_TERM
#define CONNLESS_ORIG
#define CONNECTION_TYPE_ORIG_MASK
#define CONNECTION_TYPE_CONNLESS_MASK
#define CONN_ORIENT_TERM
#define CONN_ORIENT_ORIG
CONNECTION_TYPE
#define BTM_STATE_BUFFER_SIZE
#define BTM_INVALID_HANDLE
tBTM_CB
tBTM_CallbackFunc
conn_callback_func;
#define BTM_SEC_OK
#define BTM_SEC_ENCRYPT
#define BTM_SEC_ENCRYPT_NO_MITM
#define BTM_SEC_ENCRYPT_MITM
#define BTM_SEC_ENC_PENDING
tBTM_SEC_ACTION
btm_cb;
#define btm_cb
tSecDevContext
btm_init();
btm_free();
btm_initiate_rem_name(UINT8 *, tBTM_INQ_INFO *, UINT8, UINT32, tBTM_CMPL_CB *);
btm_process_remote_name(UINT8 *, UINT8 *, UINT16, UINT8);
btm_inq_rmt_name_failed();
btm_clr_inq_db(UINT8 *);
btm_inq_db_init();
btm_process_inq_results(UINT8 *, UINT8);
btm_process_inq_complete(UINT8, UINT8);
btm_process_cancel_complete(UINT8, UINT8);
btm_event_filter_complete(UINT8 *);
btm_inq_stop_on_ssp();
btm_inq_clear_ssp();
btm_inq_db_find(UINT8 *);
btm_inq_find_bdaddr(UINT8 *);
btm_lookup_eir(BD_ADDR_PTR);
btm_acl_free();
btm_acl_init();
btm_acl_created(UINT8 *, UINT8 *, UINT8 *, UINT16, UINT8, tBT_TRANSPORT);
btm_acl_removed(UINT8 *, tBT_TRANSPORT);
btm_acl_device_down();
btm_acl_update_busy_level(tBTM_BLI_EVENT);
btm_acl_link_stat_report(tBTM_ACL_LINK_STAT_EVENT_DATA *);
btm_cont_rswitch(tACL_CONN *, tBTM_SEC_DEV_REC *, UINT8);
btm_handle_to_acl(UINT16);
btm_read_link_policy_complete(UINT8 *);
btm_read_rssi_complete(UINT8 *);
btm_read_tx_power_complete(UINT8 *, BOOLEAN);
btm_acl_pkt_types_changed(UINT8, UINT16, UINT16);
btm_read_link_quality_complete(UINT8 *);
btm_set_packet_types(tACL_CONN *, UINT16);
btm_process_clk_off_comp_evt(UINT16, UINT16);
btm_acl_role_changed(UINT8, UINT8 *, UINT8);
btm_acl_encrypt_change(UINT16, UINT8, UINT8);
btm_get_acl_disc_reason_code();
btm_remove_acl(UINT8 *, tBT_TRANSPORT);
btm_read_remote_features_complete(UINT8 *);
btm_read_remote_ext_features_complete(UINT8 *);
btm_read_remote_ext_features_failed(UINT8, UINT16);
btm_read_remote_version_complete(UINT8 *);
btm_establish_continue(tACL_CONN *);
btm_acl_chk_peer_pkt_type_support(tACL_CONN *, UINT16 *);
btm_get_max_packet_size(UINT8 *);
btm_bda_to_acl(UINT8 *, tBT_TRANSPORT);
btm_acl_notif_conn_collision(UINT8 *);
btm_pm_reset();
btm_pm_sm_alloc();
btm_pm_proc_cmd_status(UINT8);
btm_pm_proc_mode_change(UINT8, UINT16, UINT8, UINT16);
btm_pm_proc_ssr_evt(UINT8 *, UINT16);
#define btm_sco_chk_pend_unpark
btm_qos_setup_complete(UINT8, UINT16, FLOW_SPEC *);
btm_qos_setup_timeout(void *);
btm_sco_init();
btm_sco_free();
btm_sco_connected(UINT8, UINT8 *, UINT16, tBTM_ESCO_DATA *);
btm_esco_proc_conn_chg(UINT8, UINT16, UINT8, UINT8, UINT16, UINT16);
btm_sco_conn_req(UINT8 *, UINT8 *, UINT8);
btm_sco_removed(UINT16, UINT8);
btm_sco_acl_removed(UINT8 *);
btm_route_sco_data(BT_HDR *);
btm_is_sco_active(UINT16);
btm_remove_sco_links(UINT8 *);
btm_is_sco_active_by_bdaddr(UINT8 *);
btm_read_def_esco_mode(tBTM_ESCO_PARAMS *);
btm_find_scb_by_handle(UINT16);
btm_sco_flush_sco_data(UINT16);
btm_dev_init();
btm_dev_timeout(TIMER_LIST_ENT *);
btm_read_local_name_complete(UINT8 *, UINT16);
btm_ble_add_2_white_list_complete(UINT8);
btm_ble_remove_from_white_list_complete(UINT8 *, UINT16);
btm_ble_clear_white_list_complete(UINT8 *, UINT16);
btm_ble_addr_resolvable(UINT8 *, tBTM_SEC_DEV_REC *);
btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *);
btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *);
btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *);
btm_vsc_complete(UINT8 *, UINT16, UINT16, tBTM_CMPL_CB *);
btm_inq_db_reset();
btm_vendor_specific_evt(UINT8 *, UINT8);
btm_delete_stored_link_key_complete(UINT8 *);
btm_report_device_status(tBTM_DEV_STATUS);
btm_set_afh_channels_complete(UINT8 *);
btm_ble_set_channels_complete(UINT8 *);
btm_set_page_timeout_complete(const UINT8 *);
btm_page_to_setup_timeout(void *);
btm_dev_support_switch(UINT8 *);
btm_sec_alloc_dev(UINT8 *);
btm_sec_free_dev(tBTM_SEC_DEV_REC *, tBT_TRANSPORT);
btm_find_dev(UINT8 *);
btm_find_or_alloc_dev(UINT8 *);
btm_find_dev_by_handle(UINT16);
btm_get_bond_type_dev(UINT8 *);
btm_set_bond_type_dev(UINT8 *, tBTM_BOND_TYPE);
btm_sec_dev_init();
btm_sec_dev_free();
btm_dev_support_switch(UINT8 *);
btm_sec_l2cap_access_req(UINT8 *, UINT16, UINT16, CONNECTION_TYPE, tBTM_SEC_CALLBACK *, void *);
btm_sec_mx_access_request(UINT8 *, UINT16, BOOLEAN, UINT32, UINT32, tBTM_SEC_CALLBACK *, void *);
btm_sec_conn_req(UINT8 *, UINT8 *);
btm_create_conn_cancel_complete(UINT8 *);
btm_read_linq_tx_power_complete(UINT8 *);
btm_sec_init(UINT8);
btm_sec_dev_reset();
btm_sec_abort_access_req(UINT8 *);
btm_sec_auth_complete(UINT16, UINT8);
btm_sec_encrypt_change(UINT16, UINT8, UINT8);
btm_sec_connected(UINT8 *, UINT16, UINT8, UINT8);
btm_sec_disconnect(UINT16, UINT8);
btm_sec_disconnected(UINT16, UINT8);
btm_sec_rmt_name_request_complete(UINT8 *, UINT8 *, UINT8);
btm_sec_rmt_host_support_feat_evt(UINT8 *);
btm_io_capabilities_req(UINT8 *);
btm_io_capabilities_rsp(UINT8 *);
btm_sec_link_key_notification(UINT8 *, UINT8 *, UINT8);
btm_sec_link_key_request(UINT8 *);
btm_sec_pin_code_request(UINT8 *);
btm_sec_update_clock_offset(UINT16, UINT16);
btm_sec_dev_rec_cback_event(tBTM_SEC_DEV_REC *, UINT8, BOOLEAN);
btm_sec_set_peer_sec_caps(tACL_CONN *, tBTM_SEC_DEV_REC *);
btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC *);
btm_sec_find_bonded_dev(UINT8, UINT16 *, tBTM_SEC_DEV_REC **);
btm_sec_is_a_bonded_dev(UINT8 *);
btm_consolidate_dev(tBTM_SEC_DEV_REC *);
btm_sec_is_le_capable_dev(UINT8 *);
btm_ble_init_pseudo_addr(tBTM_SEC_DEV_REC *, UINT8 *);
btm_ble_start_sec_check(UINT8 *, UINT16, BOOLEAN, tBTM_SEC_CALLBACK *, void *);
btm_sec_find_first_serv(CONNECTION_TYPE, UINT16);
btm_inq_db_new(UINT8 *);
btm_rem_oob_req(UINT8 *);
btm_read_local_oob_complete(UINT8 *);
#define btm_rem_oob_req
#define btm_read_local_oob_complete
btm_acl_resubmit_page();
btm_acl_reset_paging();
btm_acl_paging(BT_HDR *, UINT8 *);
btm_sec_clr_service_by_psm(UINT16);
btm_sec_clr_temp_auth_service(UINT8 *);
btm_ble_lock_init();
btm_ble_sem_init();
btm_ble_sem_free();
btm_ble_lock_free();
btm_sec_handle_remote_legacy_auth_cmp(UINT16);
btm_sec_update_legacy_auth_state(tACL_CONN *, UINT8);
btm_sec_legacy_authentication_mutual(tBTM_SEC_DEV_REC *);
btm_find_sec_dev_in_list(void *, void *);
btm_sec_dev_authorization(UINT8 *, BOOLEAN);
Files
loading...
SourceVuESP-IDF Framework and ExamplesESP-IDFcomponents/bt/host/bluedroid/stack/btm/include/btm_int.h
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
/****************************************************************************** * * Copyright (C) 1999-2012 Broadcom Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************//* ... */ /****************************************************************************** * * this file contains the main Bluetooth Manager (BTM) internal * definitions. * ******************************************************************************//* ... */ #ifndef BTM_INT_H #define BTM_INT_H typedef struct tBTM_SEC_DEV_REC tBTM_SEC_DEV_REC; #include "common/bt_defs.h" #include "common/bt_target.h" #include "stack/hcidefs.h" #include "stack/rfcdefs.h" #include "stack/btm_api.h" #include "osi/fixed_queue.h"6 includes #if (BLE_INCLUDED == TRUE) #include "btm_ble_int.h" #endif #if (SMP_INCLUDED == TRUE) #include "stack/smp_api.h" #endif #define ESP_VS_REM_LEGACY_AUTH_CMP 0x03 #if BTM_MAX_LOC_BD_NAME_LEN > 0 typedef char tBTM_LOC_BD_NAME[BTM_MAX_LOC_BD_NAME_LEN + 1]; #endif #define BTM_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda, BT_TRANSPORT_BR_EDR) != NULL) #define BTM_LE_ACL_IS_CONNECTED(bda) (btm_bda_to_acl (bda, BT_TRANSPORT_LE) != NULL) /* Definitions for Server Channel Number (SCN) management *//* ... */ #define BTM_MAX_SCN PORT_MAX_RFC_PORTS /* Define masks for supported and exception 2.0 ACL packet types *//* ... */ #define BTM_ACL_SUPPORTED_PKTS_MASK (HCI_PKT_TYPES_MASK_DM1 | \ HCI_PKT_TYPES_MASK_DH1 | \ HCI_PKT_TYPES_MASK_DM3 | \ HCI_PKT_TYPES_MASK_DH3 | \ HCI_PKT_TYPES_MASK_DM5 | \ HCI_PKT_TYPES_MASK_DH5)... #define BTM_ACL_EXCEPTION_PKTS_MASK (HCI_PKT_TYPES_MASK_NO_2_DH1 | \ HCI_PKT_TYPES_MASK_NO_3_DH1 | \ HCI_PKT_TYPES_MASK_NO_2_DH3 | \ HCI_PKT_TYPES_MASK_NO_3_DH3 | \ HCI_PKT_TYPES_MASK_NO_2_DH5 | \ HCI_PKT_TYPES_MASK_NO_3_DH5)... #define BTM_EPR_AVAILABLE(p) ((HCI_ATOMIC_ENCRYPT_SUPPORTED((p)->peer_lmp_features[HCI_EXT_FEATURES_PAGE_0]) && \ HCI_ATOMIC_ENCRYPT_SUPPORTED(controller_get_interface()->get_features_classic(0)->as_array)) \ ? TRUE : FALSE)... #define BTM_IS_BRCM_CONTROLLER() (controller_get_interface()->get_bt_version()->manufacturer == LMP_COMPID_BROADCOM)7 defines typedef struct t_acl_db_param{ #define ACL_DB_HANDLE 0x00 #define ACL_DB_BDA 0x01 UINT8 type; void *p_data1; void *p_data2; }{ ... }tACL_DB_PARAM; enum { BTM_PM_ST_ACTIVE = BTM_PM_STS_ACTIVE, BTM_PM_ST_HOLD = BTM_PM_STS_HOLD, BTM_PM_ST_SNIFF = BTM_PM_STS_SNIFF, BTM_PM_ST_PARK = BTM_PM_STS_PARK, BTM_PM_ST_PENDING = BTM_PM_STS_PENDING }{ ... }; typedef UINT8 tBTM_PM_STATE; typedef struct { tBTM_PM_PWR_MD req_mode[BTM_MAX_PM_RECORDS + 1]; /* the desired mode and parameters of the connection*/ tBTM_PM_PWR_MD set_mode; /* the mode and parameters sent down to the host controller. */ UINT16 interval; /* the interval from last mode change event. */ #if (BTM_SSR_INCLUDED == TRUE) UINT16 max_lat; /* stored SSR maximum latency */ UINT16 min_rmt_to;/* stored SSR minimum remote timeout */ UINT16 min_loc_to;/* stored SSR minimum local timeout *//* ... */ #endif tBTM_PM_STATE state; /* contains the current mode of the connection */ BOOLEAN chg_ind; /* a request change indication */ }{ ... } tBTM_PM_MCB; /* Define the ACL Management control structure *//* ... */ typedef struct { UINT16 hci_handle; UINT16 pkt_types_mask; UINT16 clock_offset; BD_ADDR remote_addr; DEV_CLASS remote_dc; BD_NAME remote_name; UINT16 manufacturer; UINT16 lmp_subversion; UINT16 link_super_tout; BD_FEATURES peer_lmp_features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Peer LMP Extended features mask table for the device */ UINT8 num_read_pages; UINT8 lmp_version; BOOLEAN in_use; UINT8 link_role; BOOLEAN link_up_issued; /* True if busy_level link up has been issued */ BOOLEAN sc_downgrade; /* Store if security is downgraded or not. */ #define BTM_ACL_LEGACY_AUTH_NONE (0) #define BTM_ACL_LEGACY_AUTH_SELF (1<<0) #define BTM_ACL_LEGACY_AUTH_REMOTE (1<<1) #define BTM_ACL_LEGACY_AUTH_MUTUAL (1<<2) UINT8 legacy_auth_state; #define BTM_ACL_SWKEY_STATE_IDLE 0 #define BTM_ACL_SWKEY_STATE_MODE_CHANGE 1 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_OFF 2 #define BTM_ACL_SWKEY_STATE_SWITCHING 3 #define BTM_ACL_SWKEY_STATE_ENCRYPTION_ON 4 #define BTM_ACL_SWKEY_STATE_IN_PROGRESS 56 defines UINT8 switch_role_state; #define BTM_ACL_ENCRYPT_STATE_IDLE 0 #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_OFF 1 /* encryption turning off */ #define BTM_ACL_ENCRYPT_STATE_TEMP_FUNC 2 /* temporarily off for change link key or role switch */ #define BTM_ACL_ENCRYPT_STATE_ENCRYPT_ON 3 /* encryption turning on */ UINT8 encrypt_state; /* overall BTM encryption state */ #if BLE_INCLUDED == TRUE tBT_TRANSPORT transport; BD_ADDR conn_addr; /* local device address used for this connection */ UINT8 conn_addr_type; /* local device address type for this connection */ BD_ADDR active_remote_addr; /* remote address used on this connection */ UINT8 active_remote_addr_type; /* local device address type for this connection */ BD_FEATURES peer_le_features; /* Peer LE Used features mask for the device */ tBTM_SET_PKT_DATA_LENGTH_CBACK *p_set_pkt_data_cback; tBTM_LE_SET_PKT_DATA_LENGTH_PARAMS data_length_params; BOOLEAN data_len_updating; // data len update cmd cache BOOLEAN data_len_waiting; tBTM_SET_PKT_DATA_LENGTH_CBACK *p_set_data_len_cback_waiting; UINT16 tx_len_waiting;/* ... */ #endif tBTM_PM_MCB *p_pm_mode_db; /* Pointer to PM mode control block per ACL link */ }{ ... } tACL_CONN; /***************************************************** ** TIMER Definitions ******************************************************//* ... */ #define TT_DEV_RESET 1 #define TT_DEV_RLN 2 #define TT_DEV_RLNKP 4 /* Read Link Policy Settings */ /* Define the Device Management control structure *//* ... */ typedef struct { tBTM_DEV_STATUS_CB *p_dev_status_cb; /* Device status change callback */ tBTM_VS_EVT_CB *p_vend_spec_cb[BTM_MAX_VSE_CALLBACKS]; /* Register for vendor specific events */ tBTM_CMPL_CB *p_stored_link_key_cmpl_cb; /* Read/Write/Delete stored link key */ TIMER_LIST_ENT reset_timer; tBTM_CMPL_CB *p_reset_cmpl_cb; TIMER_LIST_ENT rln_timer; tBTM_CMPL_CB *p_rln_cmpl_cb; /* Callback function to be called when */ /* read local name function complete */ TIMER_LIST_ENT rssi_timer; tBTM_CMPL_CB *p_rssi_cmpl_cb; /* Callback function to be called when */ /* read rssi function completes */ TIMER_LIST_ENT lnk_quality_timer; tBTM_CMPL_CB *p_lnk_qual_cmpl_cb;/* Callback function to be called when */ /* read link quality function completes */ TIMER_LIST_ENT txpwer_timer; tBTM_CMPL_CB *p_txpwer_cmpl_cb; /* Callback function to be called when */ /* read inq tx power function completes */ TIMER_LIST_ENT qossu_timer; tBTM_CMPL_CB *p_qossu_cmpl_cb; /* Callback function to be called when */ /* qos setup function completes */ tBTM_ROLE_SWITCH_CMPL switch_role_ref_data; tBTM_CMPL_CB *p_switch_role_cb; /* Callback function to be called when */ /* requested switch role is completed */ TIMER_LIST_ENT tx_power_timer; tBTM_CMPL_CB *p_tx_power_cmpl_cb;/* Callback function to be called */ #if CLASSIC_BT_INCLUDED == TRUE TIMER_LIST_ENT afh_channels_timer; tBTM_CMPL_CB *p_afh_channels_cmpl_cb; /* Callback function to be called When */ /* set AFH channels is completed */ TIMER_LIST_ENT page_timeout_set_timer; tBTM_CMPL_CB *p_page_to_set_cmpl_cb; /* Callback function to be called when */ /* set page timeout is completed */ TIMER_LIST_ENT set_acl_pkt_types_timer; tBTM_CMPL_CB *p_set_acl_pkt_types_cmpl_cb; /* Callback function to be called when */ /* set ACL packet types is completed */ tBTM_CMPL_CB *p_set_min_enc_key_size_cmpl_cb; /* Callback function to be called when */ /* set min encryption key size is completed *//* ... */ #endif DEV_CLASS dev_class; /* Local device class */ #if BLE_INCLUDED == TRUE TIMER_LIST_ENT ble_channels_timer; tBTM_CMPL_CB *p_ble_channels_cmpl_cb; /* Callback function to be called When ble set host channels is completed *//* ... */ tBTM_SET_RPA_TIMEOUT_CMPL_CBACK *p_ble_set_rpa_timeout_cmpl_cb; /* Callback function to be called When ble set rpa timeout is completed *//* ... */ tBTM_ADD_DEV_TO_RESOLVING_LIST_CMPL_CBACK *p_add_dev_to_resolving_list_cmpl_cb; tBTM_SET_PRIVACY_MODE_CMPL_CBACK *p_set_privacy_mode_cmpl_cb; tBTM_CMPL_CB *p_le_test_cmd_cmpl_cb; /* Callback function to be called when LE test mode command has been sent successfully *//* ... */ BD_ADDR read_tx_pwr_addr; /* read TX power target address */ #define BTM_LE_SUPPORT_STATE_SIZE 8 UINT8 le_supported_states[BTM_LE_SUPPORT_STATE_SIZE]; tBTM_BLE_LOCAL_ID_KEYS id_keys; /* local BLE ID keys */ BT_OCTET16 ble_encryption_key_value; /* BLE encryption key */ #if BTM_BLE_CONFORMANCE_TESTING == TRUE BOOLEAN no_disc_if_pair_fail; BOOLEAN enable_test_mac_val; BT_OCTET8 test_mac; BOOLEAN enable_test_local_sign_cntr; UINT32 test_local_sign_cntr;/* ... */ #endif /* ... */ #endif /* BLE_INCLUDED */ tBTM_IO_CAP loc_io_caps; /* IO capability of the local device */ tBTM_AUTH_REQ loc_auth_req; /* the auth_req flag */ BOOLEAN secure_connections_only; /* Rejects service level 0 connections if */ /* itself or peer device doesn't support */ /* secure connections */ }{ ... } tBTM_DEVCB; /* Define the structures and constants used for inquiry *//* ... */ /* Definitions of limits for inquiries */ #define BTM_PER_INQ_MIN_MAX_PERIOD HCI_PER_INQ_MIN_MAX_PERIOD #define BTM_PER_INQ_MAX_MAX_PERIOD HCI_PER_INQ_MAX_MAX_PERIOD #define BTM_PER_INQ_MIN_MIN_PERIOD HCI_PER_INQ_MIN_MIN_PERIOD #define BTM_PER_INQ_MAX_MIN_PERIOD HCI_PER_INQ_MAX_MIN_PERIOD #define BTM_MAX_INQUIRY_LENGTH HCI_MAX_INQUIRY_LENGTH #define BTM_MIN_INQUIRY_LEN 0x01 #define BTM_MIN_INQ_TX_POWER -70 #define BTM_MAX_INQ_TX_POWER 208 defines typedef struct { UINT32 inq_count; /* Used for determining if a response has already been */ /* received for the current inquiry operation. (We do not */ /* want to flood the caller with multiple responses from */ /* the same device. */ BD_ADDR bd_addr; }{ ... } tINQ_BDADDR; typedef struct { UINT32 time_of_resp; UINT32 inq_count; /* "timestamps" the entry with a particular inquiry count */ /* Used for determining if a response has already been */ /* received for the current inquiry operation. (We do not */ /* want to flood the caller with multiple responses from */ /* the same device. */ tBTM_INQ_INFO inq_info; BOOLEAN in_use; #if (BLE_INCLUDED == TRUE) BOOLEAN scan_rsp; #endif }{ ... } tINQ_DB_ENT; enum { INQ_NONE, INQ_LE_OBSERVE, INQ_GENERAL }{ ... }; typedef UINT8 tBTM_INQ_TYPE; typedef struct { tBTM_CMPL_CB *p_remname_cmpl_cb; #define BTM_EXT_RMT_NAME_TIMEOUT 40 TIMER_LIST_ENT rmt_name_timer_ent; UINT16 discoverable_mode; UINT16 connectable_mode; UINT16 page_scan_window; UINT16 page_scan_period; UINT16 inq_scan_window; UINT16 inq_scan_period; UINT16 inq_scan_type; UINT16 page_scan_type; /* current page scan type */ tBTM_INQ_TYPE scan_type; UINT16 page_timeout; BD_ADDR remname_bda; /* Name of bd addr for active remote name request */ #define BTM_RMT_NAME_INACTIVE 0 #define BTM_RMT_NAME_EXT 0x1 /* Initiated through API */ #define BTM_RMT_NAME_SEC 0x2 /* Initiated internally by security manager */ #define BTM_RMT_NAME_INQ 0x4 /* Remote name initiated internally by inquiry */ BOOLEAN remname_active; /* State of a remote name request by external API */ tBTM_CMPL_CB *p_inq_cmpl_cb; tBTM_INQ_RESULTS_CB *p_inq_results_cb; tBTM_CMPL_CB *p_inq_ble_cmpl_cb; /*completion callback exclusively for LE Observe*/ tBTM_INQ_RESULTS_CB *p_inq_ble_results_cb;/*results callback exclusively for LE observe*/ tBTM_CMPL_CB *p_inqfilter_cmpl_cb; /* Called (if not NULL) after inquiry filter completed */ UINT32 inq_counter; /* Counter incremented each time an inquiry completes */ /* Used for determining whether or not duplicate devices */ /* have responded to the same inquiry */ TIMER_LIST_ENT inq_timer_ent; tINQ_BDADDR *p_bd_db; /* Pointer to memory that holds bdaddrs */ UINT16 num_bd_entries; /* Number of entries in database */ UINT16 max_bd_entries; /* Maximum number of entries that can be stored */ tINQ_DB_ENT inq_db[BTM_INQ_DB_SIZE]; tBTM_INQ_PARMS inqparms; /* Contains the parameters for the current inquiry */ tBTM_INQUIRY_CMPL inq_cmpl_info; /* Status and number of responses from the last inquiry */ UINT16 per_min_delay; /* Current periodic minimum delay */ UINT16 per_max_delay; /* Current periodic maximum delay */ BOOLEAN inqfilt_active; UINT8 pending_filt_complete_event; /* to take care of btm_event_filter_complete corresponding to */ /* inquiry that has been cancelled*/ UINT8 inqfilt_type; /* Contains the inquiry filter type (BD ADDR, COD, or Clear) */ #define BTM_INQ_INACTIVE_STATE 0 #define BTM_INQ_CLR_FILT_STATE 1 /* Currently clearing the inquiry filter preceding the inquiry request */ /* (bypassed if filtering is not used) */ #define BTM_INQ_SET_FILT_STATE 2 /* Sets the new filter (or turns off filtering) in this state */ #define BTM_INQ_ACTIVE_STATE 3 /* Actual inquiry or periodic inquiry is in progress */ #define BTM_INQ_REMNAME_STATE 4 /* Remote name requests are active */5 defines UINT8 state; /* Current state that the inquiry process is in */ UINT8 inq_active; /* Bit Mask indicating type of inquiry is active */ BOOLEAN no_inc_ssp; /* TRUE, to stop inquiry on incoming SSP */ #if (defined(BTA_HOST_INTERLEAVE_SEARCH) && BTA_HOST_INTERLEAVE_SEARCH == TRUE) btm_inq_state next_state; /*interleaving state to determine next mode to be inquired*/ #endif }{ ... } tBTM_INQUIRY_VAR_ST; /* The MSB of the clock offset field indicates that the offset is valid if TRUE */ #define BTM_CLOCK_OFFSET_VALID 0x8000 /* Define the structures needed by security management *//* ... */ #define BTM_SEC_INVALID_HANDLE 0xFFFF typedef UINT8 *BTM_BD_NAME_PTR; /* Pointer to Device name */ /* Security callback is called by this unit when security ** procedures are completed. Parameters are ** BD Address of remote ** Result of the operation *//* ... */ typedef tBTM_SEC_CBACK tBTM_SEC_CALLBACK; #define BTM_DATA_HANDLE_MASK 0x0FFF #define BTMD_GET_HANDLE(u16) (UINT16)((u16) & BTM_DATA_HANDLE_MASK) typedef void (tBTM_SCO_IND_CBACK) (UINT16 sco_inx) ; /* MACROs to convert from SCO packet types mask to ESCO and back */ #define BTM_SCO_PKT_TYPE_MASK ( HCI_PKT_TYPES_MASK_HV1 \ | HCI_PKT_TYPES_MASK_HV2 \ | HCI_PKT_TYPES_MASK_HV3)... /* Mask defining only the SCO types of an esco packet type */ #define BTM_ESCO_PKT_TYPE_MASK ( HCI_ESCO_PKT_TYPES_MASK_HV1 \ | HCI_ESCO_PKT_TYPES_MASK_HV2 \ | HCI_ESCO_PKT_TYPES_MASK_HV3)... #define BTM_SCO_2_ESCO(scotype) ((UINT16)(((scotype) & BTM_SCO_PKT_TYPE_MASK) >> 5)) #define BTM_ESCO_2_SCO(escotype) ((UINT16)(((escotype) & BTM_ESCO_PKT_TYPE_MASK) << 5)) /* Define masks for supported and exception 2.0 SCO packet types *//* ... */ #define BTM_SCO_SUPPORTED_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_HV1 | \ HCI_ESCO_PKT_TYPES_MASK_HV2 | \ HCI_ESCO_PKT_TYPES_MASK_HV3 | \ HCI_ESCO_PKT_TYPES_MASK_EV3 | \ HCI_ESCO_PKT_TYPES_MASK_EV4 | \ HCI_ESCO_PKT_TYPES_MASK_EV5)... #define BTM_SCO_EXCEPTION_PKTS_MASK (HCI_ESCO_PKT_TYPES_MASK_NO_2_EV3 | \ HCI_ESCO_PKT_TYPES_MASK_NO_3_EV3 | \ HCI_ESCO_PKT_TYPES_MASK_NO_2_EV5 | \ HCI_ESCO_PKT_TYPES_MASK_NO_3_EV5)... #define BTM_SCO_ROUTE_UNKNOWN 0xff7 defines /* Define the structure that contains (e)SCO data */ typedef struct { tBTM_ESCO_CBACK *p_esco_cback; /* Callback for eSCO events */ tBTM_ESCO_PARAMS setup; tBTM_ESCO_DATA data; /* Connection complete information */ UINT8 hci_status; }{ ... } tBTM_ESCO_INFO; /* Define the structure used for SCO Management *//* ... */ typedef struct { tBTM_ESCO_INFO esco; /* Current settings */ #if BTM_SCO_HCI_INCLUDED == TRUE #define BTM_SCO_XMIT_QUEUE_THRS 30 #define BTM_SCO_XMIT_QUEUE_HIGH_WM 20 fixed_queue_t *xmit_data_q; /* SCO data transmitting queue */ INT16 sent_not_acked; tBTM_SCO_PKT_STAT_NUMS pkt_stat_nums;/* ... */ #endif tBTM_SCO_CB *p_conn_cb; /* Callback for when connected */ tBTM_SCO_CB *p_disc_cb; /* Callback for when disconnect */ UINT16 state; /* The state of the SCO link */ UINT16 hci_handle; /* HCI Handle */ BOOLEAN is_orig; /* TRUE if the originator */ BOOLEAN rem_bd_known; /* TRUE if remote BD addr known */ }{ ... } tSCO_CONN; /* SCO Management control block */ typedef struct { tBTM_SCO_IND_CBACK *app_sco_ind_cb; #if BTM_SCO_HCI_INCLUDED == TRUE tBTM_SCO_DATA_CB *p_data_cb; /* Callback for SCO data over HCI */ UINT32 xmit_window_size; /* Total SCO window in bytes */ UINT16 num_lm_sco_bufs;/* ... */ #endif tSCO_CONN sco_db[BTM_MAX_SCO_LINKS]; tBTM_ESCO_PARAMS def_esco_parms; BD_ADDR xfer_addr; BOOLEAN esco_supported; /* TRUE if 1.2 cntlr AND supports eSCO links */ tBTM_SCO_TYPE desired_sco_mode; tBTM_SCO_TYPE xfer_sco_type; tBTM_SCO_PCM_PARAM sco_pcm_param; tBTM_SCO_CODEC_TYPE codec_in_use; /* None, CVSD, MSBC, etc. */ #if BTM_SCO_HCI_INCLUDED == TRUE tBTM_SCO_ROUTE_TYPE sco_path; #endif }{ ... } tSCO_CB; #if BTM_SCO_INCLUDED == TRUE void btm_set_sco_ind_cback( tBTM_SCO_IND_CBACK *sco_ind_cb ); void btm_accept_sco_link(UINT16 sco_inx, tBTM_ESCO_PARAMS *p_setup, tBTM_SCO_CB *p_conn_cb, tBTM_SCO_CB *p_disc_cb); void btm_reject_sco_link(UINT16 sco_inx ); void btm_sco_chk_pend_rolechange (UINT16 hci_handle);/* ... */ #else #define btm_accept_sco_link(sco_inx, p_setup, p_conn_cb, p_disc_cb) #define btm_reject_sco_link(sco_inx) #define btm_set_sco_ind_cback(sco_ind_cb) #define btm_sco_chk_pend_rolechange(hci_handle)/* ... */ #endif /* BTM_SCO_INCLUDED */ /* ** Define structure for Security Service Record. ** A record exists for each service registered with the Security Manager *//* ... */ #define BTM_SEC_OUT_FLAGS (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | BTM_SEC_OUT_AUTHORIZE) #define BTM_SEC_IN_FLAGS (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | BTM_SEC_IN_AUTHORIZE) #define BTM_SEC_OUT_LEVEL4_FLAGS (BTM_SEC_OUT_AUTHENTICATE | BTM_SEC_OUT_ENCRYPT | \ BTM_SEC_OUT_MITM | BTM_SEC_MODE4_LEVEL4)... #define BTM_SEC_IN_LEVEL4_FLAGS (BTM_SEC_IN_AUTHENTICATE | BTM_SEC_IN_ENCRYPT | \ BTM_SEC_IN_MITM | BTM_SEC_MODE4_LEVEL4)... typedef struct { UINT32 mx_proto_id; /* Service runs over this multiplexer protocol */ UINT32 orig_mx_chan_id; /* Channel on the multiplexer protocol */ UINT32 term_mx_chan_id; /* Channel on the multiplexer protocol */ UINT16 psm; /* L2CAP PSM value */ UINT16 security_flags; /* Bitmap of required security features */ UINT8 service_id; /* Passed in authorization callback */ #if (L2CAP_UCD_INCLUDED == TRUE) UINT16 ucd_security_flags; /* Bitmap of required security features for UCD */ #endif #if BTM_SEC_SERVICE_NAME_LEN > 0 UINT8 orig_service_name[BTM_SEC_SERVICE_NAME_LEN + 1]; UINT8 term_service_name[BTM_SEC_SERVICE_NAME_LEN + 1];/* ... */ #endif }{ ... } tBTM_SEC_SERV_REC; #if BLE_INCLUDED == TRUE /* LE Security information of device in Slave Role */ typedef struct { BT_OCTET16 irk; /* peer diverified identity root */ BT_OCTET16 pltk; /* peer long term key */ BT_OCTET16 pcsrk; /* peer SRK peer device used to secured sign local data */ BT_OCTET16 lltk; /* local long term key */ BT_OCTET16 lcsrk; /* local SRK peer device used to secured sign local data */ BT_OCTET8 rand; /* random vector for LTK generation */ UINT16 ediv; /* LTK diversifier of this slave device */ UINT16 div; /* local DIV to generate local LTK=d1(ER,DIV,0) and CSRK=d1(ER,DIV,1) */ UINT8 sec_level; /* local pairing security level */ UINT8 key_size; /* key size of the LTK delivered to peer device */ UINT8 srk_sec_level; /* security property of peer SRK for this device */ UINT8 local_csrk_sec_level; /* security property of local CSRK for this device */ UINT32 counter; /* peer sign counter for verifying rcv signed cmd */ UINT32 local_counter; /* local sign counter for sending signed write cmd*/ }{ ... } tBTM_SEC_BLE_KEYS; typedef struct { BD_ADDR pseudo_addr; /* LE pseudo address of the device if different from device address */ tBLE_ADDR_TYPE ble_addr_type; /* LE device type: public or random address */ tBLE_ADDR_TYPE static_addr_type; /* static address type */ BD_ADDR static_addr; /* static address */ #define BTM_WHITE_LIST_BIT 0x01 #define BTM_RESOLVING_LIST_BIT 0x02 UINT8 in_controller_list; /* in controller resolving list or not */ UINT8 resolving_list_index; #if BLE_PRIVACY_SPT == TRUE BD_ADDR cur_rand_addr; /* current random address */ #define BTM_BLE_ADDR_PSEUDO 0 /* address index device record */ #define BTM_BLE_ADDR_RRA 1 /* cur_rand_addr */ #define BTM_BLE_ADDR_STATIC 2 /* static_addr */ UINT8 active_addr_type;/* ... */ #endif #if SMP_INCLUDED == TRUE tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */ tBTM_SEC_BLE_KEYS keys; /* LE device security info in slave rode */ #if (SMP_SLAVE_CON_PARAMS_UPD_ENABLE == TRUE) bool skip_update_conn_param; /* skip update connection paraams or not*/ #endif UINT16 auth_mode; /* Authentication mode *//* ... */ #endif #if (BLE_PRIVACY_SPT == TRUE && (!CONTROLLER_RPA_LIST_ENABLE)) tBLE_ADDR_TYPE current_addr_type; /* current adv addr type*/ BD_ADDR current_addr; /* current adv addr*/ bool current_addr_valid; /* current addr info is valid or not*//* ... */ #endif }{ ... } tBTM_SEC_BLE; /* ... */ #endif /* BLE_INCLUDED */ /* Peering bond type */ enum { BOND_TYPE_UNKNOWN, BOND_TYPE_PERSISTENT, BOND_TYPE_TEMPORARY }{ ... }; typedef UINT8 tBTM_BOND_TYPE; /* ** Define structure for Security Device Record. ** A record exists for each device authenticated with this device *//* ... */ struct tBTM_SEC_DEV_REC{ tBTM_SEC_SERV_REC *p_cur_service; tBTM_SEC_CALLBACK *p_callback; void *p_ref_data; UINT32 timestamp; /* Timestamp of the last connection */ UINT32 trusted_mask[BTM_SEC_SERVICE_ARRAY_SIZE]; /* Bitwise OR of trusted services */ UINT16 hci_handle; /* Handle to connection when exists */ UINT16 clock_offset; /* Latest known clock offset */ BD_ADDR bd_addr; /* BD_ADDR of the device */ DEV_CLASS dev_class; /* DEV_CLASS of the device */ LINK_KEY link_key; /* Device link key */ UINT8 pin_code_length; /* Length of the pin_code used for paring */ #define BTM_SEC_AUTHORIZED BTM_SEC_FLAG_AUTHORIZED /* 0x01 */ #define BTM_SEC_AUTHENTICATED BTM_SEC_FLAG_AUTHENTICATED /* 0x02 */ #define BTM_SEC_ENCRYPTED BTM_SEC_FLAG_ENCRYPTED /* 0x04 */ #define BTM_SEC_NAME_KNOWN 0x08 #define BTM_SEC_LINK_KEY_KNOWN BTM_SEC_FLAG_LKEY_KNOWN /* 0x10 */ #define BTM_SEC_LINK_KEY_AUTHED BTM_SEC_FLAG_LKEY_AUTHED /* 0x20 */ #define BTM_SEC_ROLE_SWITCHED 0x40 #define BTM_SEC_IN_USE 0x80 /* LE link security flag */ #define BTM_SEC_LE_AUTHORIZATION 0x0100 /* LE link is authorized */ #define BTM_SEC_LE_AUTHENTICATED 0x0200 /* LE link is encrypted after pairing with MITM */ #define BTM_SEC_LE_ENCRYPTED 0x0400 /* LE link is encrypted */ #define BTM_SEC_LE_NAME_KNOWN 0x0800 /* not used */ #define BTM_SEC_LE_LINK_KEY_KNOWN 0x1000 /* bonded with peer (peer LTK and/or SRK is saved) */ #define BTM_SEC_LE_LINK_KEY_AUTHED 0x2000 /* pairing is done with MITM */ #define BTM_SEC_16_DIGIT_PIN_AUTHED 0x4000 /* pairing is done with 16 digit pin */15 defines UINT16 sec_flags; /* Current device security state */ tBTM_BD_NAME sec_bd_name; /* User friendly name of the device. (may be truncated to save space in dev_rec table) */ BD_FEATURES features[HCI_EXT_FEATURES_PAGE_MAX + 1]; /* Features supported by the device */ UINT8 num_read_pages; #define BTM_SEC_STATE_IDLE 0 #define BTM_SEC_STATE_AUTHENTICATING 1 #define BTM_SEC_STATE_ENCRYPTING 2 #define BTM_SEC_STATE_GETTING_NAME 3 #define BTM_SEC_STATE_AUTHORIZING 4 #define BTM_SEC_STATE_SWITCHING_ROLE 5 #define BTM_SEC_STATE_DISCONNECTING 6 /* disconnecting BR/EDR */ #define BTM_SEC_STATE_DELAY_FOR_ENC 7 /* delay to check for encryption to work around */ /* controller problems */ #define BTM_SEC_STATE_DISCONNECTING_BLE 8 /* disconnecting BLE */ #define BTM_SEC_STATE_DISCONNECTING_BOTH 9 /* disconnecting BR/EDR and BLE */10 defines UINT8 sec_state; /* Operating state */ BOOLEAN is_originator; /* TRUE if device is originating connection */ #if (L2CAP_UCD_INCLUDED == TRUE) BOOLEAN is_ucd; /* TRUE if device is sending or receiving UCD */ /* if incoming security failed, received UCD will be discarded *//* ... */ #endif BOOLEAN role_master; /* TRUE if current mode is master */ UINT16 security_required; /* Security required for connection */ BOOLEAN link_key_not_sent; /* link key notification has not been sent waiting for name */ UINT8 link_key_type; /* Type of key used in pairing */ BOOLEAN link_key_changed; /* Changed link key during current connection */ #define BTM_MAX_PRE_SM4_LKEY_TYPE BTM_LKEY_TYPE_REMOTE_UNIT /* the link key type used by legacy pairing */ #define BTM_SM4_UNKNOWN 0x00 #define BTM_SM4_KNOWN 0x10 #define BTM_SM4_TRUE 0x11 #define BTM_SM4_REQ_PEND 0x08 /* set this bit when getting remote features */ #define BTM_SM4_UPGRADE 0x04 /* set this bit when upgrading link key */ #define BTM_SM4_RETRY 0x02 /* set this bit to retry on HCI_ERR_KEY_MISSING or HCI_ERR_LMP_ERR_TRANS_COLLISION */ #define BTM_SM4_DD_ACP 0x20 /* set this bit to indicate peer initiated dedicated bonding */ #define BTM_SM4_CONN_PEND 0x40 /* set this bit to indicate accepting acl conn; to be cleared on btm_acl_created */9 defines UINT8 sm4; /* BTM_SM4_TRUE, if the peer supports SM4 */ tBTM_IO_CAP rmt_io_caps; /* IO capability of the peer device */ tBTM_AUTH_REQ rmt_auth_req; /* the auth_req flag as in the IO caps rsp evt */ BOOLEAN remote_supports_secure_connections; BOOLEAN remote_features_needed; /* set to true if the local device is in */ /* "Secure Connections Only" mode and it receives */ /* HCI_IO_CAPABILITY_REQUEST_EVT from the peer before */ /* it knows peer's support for Secure Connections */ BOOLEAN remote_secure_connection_previous_state; /* Stores if peer ever supported secure connection. This will be helpful to know when peer device downgrades it's security. *//* ... */ UINT16 ble_hci_handle; /* use in DUMO connection */ #define BTM_ENC_MODE_UNKNOWN 0xff UINT8 enc_mode; /* encryption mode of current link */ UINT8 enc_key_size; /* current link encryption key size */ tBT_DEVICE_TYPE device_type; BOOLEAN new_encryption_key_is_p256; /* Set to TRUE when the newly generated LK ** is generated from P-256. ** Link encrypted with such LK can be used ** for SM over BR/EDR. *//* ... */ BOOLEAN no_smp_on_br; /* if set to TRUE then SMP on BR/EDR doesn't */ /* work, i.e. link keys crosspairing */ /* SC BR/EDR->SC LE doesn't happen */ tBTM_BOND_TYPE bond_type; /* peering bond type */ #if BLE_INCLUDED == TRUE tBTM_SEC_BLE ble; tBTM_LE_CONN_PRAMS conn_params; #if (BLE_50_FEATURE_SUPPORT == TRUE) tBTM_EXT_CONN_PARAMS ext_conn_params; #endif // #if (BLE_50_FEATURE_SUPPORT == TRUE)/* ... */ #endif // btla-specific ++ #if BTM_DISC_DURING_RS == TRUE #define BTM_SEC_RS_NOT_PENDING 0 /* Role Switch not in progress */ #define BTM_SEC_RS_PENDING 1 /* Role Switch in progress */ #define BTM_SEC_DISC_PENDING 2 /* Disconnect is pending */ UINT8 rs_disc_pending;/* ... */ #endif // btla-specific -- #define BTM_SEC_NO_LAST_SERVICE_ID 0 UINT8 last_author_service_id; /* ID of last serviced authorized: Reset after each l2cap connection */ BOOLEAN enc_init_by_we; }{ ... }; #define BTM_SEC_IS_SM4(sm) ((BOOLEAN)(BTM_SM4_TRUE == ((sm)&BTM_SM4_TRUE))) #define BTM_SEC_IS_SM4_LEGACY(sm) ((BOOLEAN)(BTM_SM4_KNOWN == ((sm)&BTM_SM4_TRUE))) #define BTM_SEC_IS_SM4_UNKNOWN(sm) ((BOOLEAN)(BTM_SM4_UNKNOWN == ((sm)&BTM_SM4_TRUE))) #define BTM_SEC_LE_MASK (BTM_SEC_LE_AUTHENTICATED|BTM_SEC_LE_ENCRYPTED|BTM_SEC_LE_LINK_KEY_KNOWN|BTM_SEC_LE_LINK_KEY_AUTHED) /* ** Define device configuration structure *//* ... */ typedef struct { #if BTM_MAX_LOC_BD_NAME_LEN > 0 tBTM_LOC_BD_NAME bredr_bd_name; /* local BREDR device name */ tBTM_LOC_BD_NAME ble_bd_name; /* local BLE device name *//* ... */ #endif BOOLEAN pin_type; /* TRUE if PIN type is fixed */ UINT8 pin_code_len; /* Bonding information */ PIN_CODE pin_code; /* PIN CODE if pin type is fixed */ BOOLEAN connectable; /* If TRUE page scan should be enabled */ UINT8 def_inq_scan_mode; /* ??? limited/general/none */ }{ ... } tBTM_CFG; enum { BTM_PM_SET_MODE_EVT, /* Set power mode API is called. */ BTM_PM_UPDATE_EVT, BTM_PM_RD_MODE_EVT /* Read power mode API is called. */ }{ ... }; typedef UINT8 tBTM_PM_EVENT; typedef struct { UINT16 event; UINT16 len; UINT8 link_ind; }{ ... } tBTM_PM_MSG_DATA; typedef struct { UINT8 hci_status; UINT8 mode; UINT16 interval; }{ ... } tBTM_PM_MD_CHG_DATA; typedef struct { UINT8 pm_id; /* the entity that calls SetPowerMode API */ tBTM_PM_PWR_MD *p_pmd; }{ ... } tBTM_PM_SET_MD_DATA; typedef struct { void *p_data; UINT8 link_ind; }{ ... } tBTM_PM_SM_DATA; #define BTM_PM_REC_NOT_USED 0 typedef struct { tBTM_PM_STATUS_CBACK *cback;/* to notify the registered party of mode change event */ UINT8 mask; /* registered request mask. 0, if this entry is not used */ }{ ... } tBTM_PM_RCB; enum { BTM_BLI_ACL_UP_EVT, BTM_BLI_ACL_DOWN_EVT, BTM_BLI_PAGE_EVT, BTM_BLI_PAGE_DONE_EVT, BTM_BLI_INQ_EVT, BTM_BLI_INQ_CANCEL_EVT, BTM_BLI_INQ_DONE_EVT }{ ... }; typedef UINT8 tBTM_BLI_EVENT; /* Pairing State */ enum { BTM_PAIR_STATE_IDLE, /* Idle */ BTM_PAIR_STATE_GET_REM_NAME, /* Getting the remote name (to check for SM4) */ BTM_PAIR_STATE_WAIT_PIN_REQ, /* Started authentication, waiting for PIN req (PIN is pre-fetched) */ BTM_PAIR_STATE_WAIT_LOCAL_PIN, /* Waiting for local PIN code */ BTM_PAIR_STATE_WAIT_NUMERIC_CONFIRM, /* Waiting user 'yes' to numeric confirmation */ BTM_PAIR_STATE_KEY_ENTRY, /* Key entry state (we are a keyboard) */ BTM_PAIR_STATE_WAIT_LOCAL_OOB_RSP, /* Waiting for local response to peer OOB data */ BTM_PAIR_STATE_WAIT_LOCAL_IOCAPS, /* Waiting for local IO capabilities and OOB data */ BTM_PAIR_STATE_INCOMING_SSP, /* Incoming SSP (got peer IO caps when idle) */ BTM_PAIR_STATE_WAIT_AUTH_COMPLETE, /* All done, waiting authentication complete */ BTM_PAIR_STATE_WAIT_DISCONNECT /* Waiting to disconnect the ACL */ }{ ... }; typedef UINT8 tBTM_PAIRING_STATE; #define BTM_PAIR_FLAGS_WE_STARTED_DD 0x01 /* We want to do dedicated bonding */ #define BTM_PAIR_FLAGS_PEER_STARTED_DD 0x02 /* Peer initiated dedicated bonding */ #define BTM_PAIR_FLAGS_DISC_WHEN_DONE 0x04 /* Disconnect when done */ #define BTM_PAIR_FLAGS_PIN_REQD 0x08 /* set this bit when pin_callback is called */ #define BTM_PAIR_FLAGS_PRE_FETCH_PIN 0x10 /* set this bit when pre-fetch pin */ #define BTM_PAIR_FLAGS_REJECTED_CONNECT 0x20 /* set this bit when rejected incoming connection */ #define BTM_PAIR_FLAGS_WE_CANCEL_DD 0x40 /* set this bit when cancelling a bonding procedure */ #define BTM_PAIR_FLAGS_LE_ACTIVE 0x80 /* use this bit when SMP pairing is active */8 defines typedef struct { BOOLEAN is_mux; BD_ADDR bd_addr; UINT16 psm; BOOLEAN is_orig; tBTM_SEC_CALLBACK *p_callback; void *p_ref_data; UINT32 mx_proto_id; UINT32 mx_chan_id; tBT_TRANSPORT transport; }{ ... } tBTM_SEC_QUEUE_ENTRY; #if (L2CAP_UCD_INCLUDED == TRUE) #define CONN_ORIENT_TERM 0x00 /* incoming connection oriented */ #define CONN_ORIENT_ORIG 0x01 /* outgoing connection oriented */ #define CONNLESS_TERM 0x02 /* incoming connectionless */ #define CONNLESS_ORIG 0x03 /* outgoing connectionless */ #define CONNECTION_TYPE_ORIG_MASK 0x01 /* mask for direction */ #define CONNECTION_TYPE_CONNLESS_MASK 0x02 /* mask for connectionless or not */6 defines typedef UINT8 CONNECTION_TYPE; /* ... */ #else #define CONN_ORIENT_TERM FALSE #define CONN_ORIENT_ORIG TRUE typedef BOOLEAN CONNECTION_TYPE; /* ... */ #endif /* (L2CAP_UCD_INCLUDED == TRUE) */ /* Define a structure to hold all the BTM data *//* ... */ #define BTM_STATE_BUFFER_SIZE 5 /* size of state buffer */ #define BTM_INVALID_HANDLE 0xFFFF typedef struct { tBTM_CFG cfg; /* Device configuration */ /**************************************************** ** ACL Management ****************************************************//* ... */ list_t *p_acl_db_list; #if (CLASSIC_BT_INCLUDED == TRUE) UINT8 btm_scn[BTM_MAX_SCN]; /* current SCNs: TRUE if SCN is in use */ #endif ///CLASSIC_BT_INCLUDED == TRUE UINT16 btm_def_link_policy; UINT16 btm_def_link_super_tout; tBTM_ACL_LINK_STAT_CB *p_acl_link_stat_cb; /* Callback for when ACL link related events came */ tBTM_BL_EVENT_MASK bl_evt_mask; tBTM_BL_CHANGE_CB *p_bl_changed_cb; /* Callback for when Busy Level changed */ /**************************************************** ** Power Management ****************************************************//* ... */ list_t *p_pm_mode_db_list; tBTM_PM_RCB pm_reg_db[BTM_MAX_PM_RECORDS + 1]; /* per application/module */ UINT16 pm_pend_link_hdl; /* the index of acl_db, which has a pending PM cmd */ UINT8 pm_pend_id; /* the id pf the module, which has a pending PM cmd */ /***************************************************** ** Device control *****************************************************//* ... */ tBTM_DEVCB devcb; /***************************************************** ** BLE Device controllers *****************************************************//* ... */ #if (BLE_INCLUDED == TRUE) tBTM_BLE_CB ble_ctr_cb; UINT16 enc_handle; BT_OCTET8 enc_rand; /* received rand value from LTK request*/ UINT16 ediv; /* received ediv value from LTK request */ UINT8 key_size; tBTM_BLE_VSC_CB cmn_ble_vsc_cb; BOOLEAN addr_res_en; /* internal use for test: address resolution enable/disable *//* ... */ #endif /* Packet types supported by the local device */ UINT16 btm_acl_pkt_types_supported; UINT16 btm_sco_pkt_types_supported; /***************************************************** ** Inquiry *****************************************************//* ... */ tBTM_INQUIRY_VAR_ST btm_inq_vars; /***************************************************** ** SCO Management *****************************************************//* ... */ #if BTM_SCO_INCLUDED == TRUE tSCO_CB sco_cb; #endif /***************************************************** ** Security Management *****************************************************//* ... */ tBTM_APPL_INFO api; #define BTM_SEC_MAX_RMT_NAME_CALLBACKS 2 tBTM_RMT_NAME_CALLBACK *p_rmt_name_callback[BTM_SEC_MAX_RMT_NAME_CALLBACKS]; #if (SMP_INCLUDED == TRUE) tBTM_SEC_DEV_REC *p_collided_dev_rec; #endif ///SMP_INCLUDED == TRUE TIMER_LIST_ENT sec_collision_tle; UINT32 collision_start_time; UINT32 max_collision_delay; UINT32 dev_rec_count; /* Counter used for device record timestamp */ UINT8 security_mode; BOOLEAN pairing_disabled; BOOLEAN connect_only_paired; BOOLEAN security_mode_changed; /* mode changed during bonding */ BOOLEAN sec_req_pending; /* TRUE if a request is pending */ #if (CLASSIC_BT_INCLUDED == TRUE) BOOLEAN pin_type_changed; /* pin type changed during bonding */ #endif ///CLASSIC_BT_INCLUDED == TRUE #if (SMP_INCLUDED == TRUE) #if (CLASSIC_BT_INCLUDED == TRUE) // btla-specific ++ #ifdef PORCHE_PAIRING_CONFLICT UINT8 pin_code_len_saved; /* for legacy devices */ #endif // btla-specific -- UINT8 pin_code_len; /* for legacy devices */ PIN_CODE pin_code; /* for legacy devices */ UINT8 disc_reason; /* for legacy devices */ UINT16 disc_handle; /* for legacy devices *//* ... */ #endif ///CLASSIC_BT_INCLUDED == TRUE tBTM_PAIRING_STATE pairing_state; /* The current pairing state */ UINT8 pairing_flags; /* The current pairing flags */ BD_ADDR pairing_bda; /* The device currently pairing */ TIMER_LIST_ENT pairing_tle; /* Timer for pairing process */ /* ... */ #endif ///SMP_INCLUDED == TRUE #if SMP_INCLUDED == TRUE || CLASSIC_BT_INCLUDED == TRUE tBTM_SEC_SERV_REC sec_serv_rec[BTM_SEC_MAX_SERVICE_RECORDS]; #endif // SMP_INCLUDED == TRUE || BT_CLASSIC_ENABLED == TRUE list_t *p_sec_dev_rec_list; tBTM_SEC_SERV_REC *p_out_serv; tBTM_MKEY_CALLBACK *mkey_cback; BD_ADDR connecting_bda; DEV_CLASS connecting_dc; UINT8 acl_disc_reason; UINT8 trace_level; UINT8 busy_level; /* the current busy level */ BOOLEAN is_paging; /* TRUE, if paging is in progress */ BOOLEAN is_inquiry; /* TRUE, if inquiry is in progress */ fixed_queue_t *page_queue; BOOLEAN paging; BOOLEAN discing; fixed_queue_t *sec_pending_q; /* pending sequrity requests in tBTM_SEC_QUEUE_ENTRY format */ #if (!defined(BT_TRACE_VERBOSE) || (BT_TRACE_VERBOSE == FALSE)) char state_temp_buffer[BTM_STATE_BUFFER_SIZE]; #endif }{ ... } tBTM_CB; typedef struct{ //connection parameters update callback tBTM_UPDATE_CONN_PARAM_CBACK *update_conn_param_cb; // setting packet data length callback tBTM_SET_PKT_DATA_LENGTH_CBACK *set_pkt_data_length_cb; }{ ... }tBTM_CallbackFunc; extern tBTM_CallbackFunc conn_callback_func; /* security action for L2CAP COC channels */ #define BTM_SEC_OK 1 #define BTM_SEC_ENCRYPT 2 /* encrypt the link with current key */ #define BTM_SEC_ENCRYPT_NO_MITM 3 /* unauthenticated encryption or better */ #define BTM_SEC_ENCRYPT_MITM 4 /* authenticated encryption */ #define BTM_SEC_ENC_PENDING 5 /* wait for link encryption pending */5 defines typedef UINT8 tBTM_SEC_ACTION; #ifdef __cplusplus extern "C" {/* ... */ #endif #if BTM_DYNAMIC_MEMORY == FALSE extern tBTM_CB btm_cb; #else extern tBTM_CB *btm_cb_ptr; #define btm_cb (*btm_cb_ptr)/* ... */ #endif typedef struct tSecDevContext { #define SEC_DEV_BTDM_BDA 0x01 #define SEC_DEV_BDA 0x02 #define SEC_DEV_HDL 0x03 #define SEC_DEV_ID_ADDR 0x04 UINT8 type; BOOLEAN free_check; union { BD_ADDR_PTR p_bd_addr; UINT16 handle; }{ ... }context; }{ ... }tSecDevContext; /* Internal functions provided by btm_main.c ******************************************** *//* ... */ void btm_init (void); void btm_free (void); /* Internal functions provided by btm_inq.c ******************************************* *//* ... */ tBTM_STATUS btm_initiate_rem_name (BD_ADDR remote_bda, tBTM_INQ_INFO *p_cur, UINT8 origin, UINT32 timeout, tBTM_CMPL_CB *p_cb); void btm_process_remote_name (BD_ADDR bda, BD_NAME name, UINT16 evt_len, UINT8 hci_status); void btm_inq_rmt_name_failed(void); /* Inquiry related functions */ void btm_clr_inq_db (BD_ADDR p_bda); void btm_inq_db_init (void); void btm_process_inq_results (UINT8 *p, UINT8 inq_res_mode); void btm_process_inq_complete (UINT8 status, UINT8 mode); void btm_process_cancel_complete(UINT8 status, UINT8 mode); void btm_event_filter_complete (UINT8 *p); void btm_inq_stop_on_ssp(void); void btm_inq_clear_ssp(void); tINQ_DB_ENT *btm_inq_db_find (BD_ADDR p_bda); BOOLEAN btm_inq_find_bdaddr (BD_ADDR p_bda); BOOLEAN btm_lookup_eir(BD_ADDR_PTR p_rem_addr); /* Internal functions provided by btm_acl.c ******************************************** *//* ... */ void btm_acl_free(void); void btm_acl_init (void); void btm_acl_created (BD_ADDR bda, DEV_CLASS dc, UINT8 bdn[BTM_MAX_REM_BD_NAME_LEN], UINT16 hci_handle, UINT8 link_role, tBT_TRANSPORT transport); void btm_acl_removed (BD_ADDR bda, tBT_TRANSPORT transport); void btm_acl_device_down (void); void btm_acl_update_busy_level (tBTM_BLI_EVENT event); void btm_acl_link_stat_report(tBTM_ACL_LINK_STAT_EVENT_DATA *p_data); void btm_cont_rswitch (tACL_CONN *p, tBTM_SEC_DEV_REC *p_dev_rec, UINT8 hci_status); tACL_CONN *btm_handle_to_acl (UINT16 hci_handle); void btm_read_link_policy_complete (UINT8 *p); void btm_read_rssi_complete (UINT8 *p); void btm_read_tx_power_complete (UINT8 *p, BOOLEAN is_ble); void btm_acl_pkt_types_changed(UINT8 status, UINT16 handle, UINT16 pkt_types); void btm_read_link_quality_complete (UINT8 *p); tBTM_STATUS btm_set_packet_types (tACL_CONN *p, UINT16 pkt_types); void btm_process_clk_off_comp_evt (UINT16 hci_handle, UINT16 clock_offset); void btm_acl_role_changed (UINT8 hci_status, BD_ADDR bd_addr, UINT8 new_role); void btm_acl_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable); UINT16 btm_get_acl_disc_reason_code (void); tBTM_STATUS btm_remove_acl (BD_ADDR bd_addr, tBT_TRANSPORT transport); void btm_read_remote_features_complete (UINT8 *p); void btm_read_remote_ext_features_complete (UINT8 *p); void btm_read_remote_ext_features_failed (UINT8 status, UINT16 handle); void btm_read_remote_version_complete (UINT8 *p); void btm_establish_continue (tACL_CONN *p_acl_cb); // btla-specific ++ void btm_acl_chk_peer_pkt_type_support (tACL_CONN *p, UINT16 *p_pkt_type); // btla-specific -- /* Read maximum data packet that can be sent over current connection */ UINT16 btm_get_max_packet_size (BD_ADDR addr); tACL_CONN *btm_bda_to_acl (BD_ADDR bda, tBT_TRANSPORT transport); BOOLEAN btm_acl_notif_conn_collision (BD_ADDR bda); void btm_pm_reset(void); tBTM_PM_MCB *btm_pm_sm_alloc(void); void btm_pm_proc_cmd_status(UINT8 status); void btm_pm_proc_mode_change (UINT8 hci_status, UINT16 hci_handle, UINT8 mode, UINT16 interval); void btm_pm_proc_ssr_evt (UINT8 *p, UINT16 evt_len); #if BTM_SCO_INCLUDED == TRUE void btm_sco_chk_pend_unpark (UINT8 hci_status, UINT16 hci_handle); #if (BTM_SCO_HCI_INCLUDED == TRUE ) void btm_sco_process_num_bufs (UINT16 num_lm_sco_bufs); void btm_sco_process_num_completed_pkts (UINT8 *p);/* ... */ #endif /* (BTM_SCO_HCI_INCLUDED == TRUE ) *//* ... */ #else #define btm_sco_chk_pend_unpark(hci_status, hci_handle) #endif /* BTM_SCO_INCLUDED */ void btm_qos_setup_complete (UINT8 status, UINT16 handle, FLOW_SPEC *p_flow); void btm_qos_setup_timeout (void *p_tle); #if (BLE_50_FEATURE_SUPPORT == TRUE) void btm_create_sync_callback(UINT8 status); void btm_set_phy_callback(UINT8 status); void btm_read_phy_callback(uint8_t hci_status, uint16_t conn_handle, uint8_t tx_phy, uint8_t rx_phy);/* ... */ #endif #if (BLE_FEAT_PERIODIC_ADV_SYNC_TRANSFER == TRUE) void btm_ble_periodic_adv_sync_trans_complete(UINT16 op_code, UINT8 hci_status, UINT16 conn_handle); #endif /* Internal functions provided by btm_sco.c ******************************************** *//* ... */ void btm_sco_init (void); void btm_sco_free(void); void btm_sco_connected (UINT8 hci_status, BD_ADDR bda, UINT16 hci_handle, tBTM_ESCO_DATA *p_esco_data); void btm_esco_proc_conn_chg (UINT8 status, UINT16 handle, UINT8 tx_interval, UINT8 retrans_window, UINT16 rx_pkt_len, UINT16 tx_pkt_len); void btm_sco_conn_req (BD_ADDR bda, DEV_CLASS dev_class, UINT8 link_type); void btm_sco_removed (UINT16 hci_handle, UINT8 reason); void btm_sco_acl_removed (BD_ADDR bda); void btm_route_sco_data (BT_HDR *p_msg); BOOLEAN btm_is_sco_active (UINT16 handle); void btm_remove_sco_links (BD_ADDR bda); BOOLEAN btm_is_sco_active_by_bdaddr (BD_ADDR remote_bda); tBTM_SCO_TYPE btm_read_def_esco_mode (tBTM_ESCO_PARAMS *p_parms); UINT16 btm_find_scb_by_handle (UINT16 handle); void btm_sco_flush_sco_data(UINT16 sco_inx); /* Internal functions provided by btm_devctl.c ********************************************** *//* ... */ void btm_dev_init (void); void btm_dev_timeout (TIMER_LIST_ENT *p_tle); void btm_read_local_name_complete (UINT8 *p, UINT16 evt_len); #if (BLE_INCLUDED == TRUE) void btm_ble_add_2_white_list_complete(UINT8 status); void btm_ble_remove_from_white_list_complete(UINT8 *p, UINT16 evt_len); void btm_ble_clear_white_list_complete(UINT8 *p, UINT16 evt_len); BOOLEAN btm_ble_addr_resolvable(BD_ADDR rpa, tBTM_SEC_DEV_REC *p_dev_rec); tBTM_STATUS btm_ble_read_resolving_list_entry(tBTM_SEC_DEV_REC *p_dev_rec); BOOLEAN btm_ble_resolving_list_load_dev(tBTM_SEC_DEV_REC *p_dev_rec); void btm_ble_resolving_list_remove_dev(tBTM_SEC_DEV_REC *p_dev_rec);/* ... */ #endif /* BLE_INCLUDED */ /* Vendor Specific Command complete evt handler */ void btm_vsc_complete (UINT8 *p, UINT16 cc_opcode, UINT16 evt_len, tBTM_CMPL_CB *p_vsc_cplt_cback); void btm_inq_db_reset (void); void btm_vendor_specific_evt (UINT8 *p, UINT8 evt_len); void btm_delete_stored_link_key_complete (UINT8 *p); void btm_report_device_status (tBTM_DEV_STATUS status); void btm_set_afh_channels_complete (UINT8 *p); void btm_ble_set_channels_complete (UINT8 *p); #if (ENC_KEY_SIZE_CTRL_MODE != ENC_KEY_SIZE_CTRL_MODE_NONE) void btm_set_min_enc_key_size_complete(const UINT8 *p); #endif void btm_set_page_timeout_complete (const UINT8 *p); void btm_page_to_setup_timeout (void *p_tle); /* Internal functions provided by btm_dev.c ********************************************** *//* ... */ BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr); tBTM_SEC_DEV_REC *btm_sec_alloc_dev (BD_ADDR bd_addr); void btm_sec_free_dev (tBTM_SEC_DEV_REC *p_dev_rec, tBT_TRANSPORT transport); tBTM_SEC_DEV_REC *btm_find_dev (BD_ADDR bd_addr); tBTM_SEC_DEV_REC *btm_find_or_alloc_dev (BD_ADDR bd_addr); tBTM_SEC_DEV_REC *btm_find_dev_by_handle (UINT16 handle); tBTM_BOND_TYPE btm_get_bond_type_dev(BD_ADDR bd_addr); BOOLEAN btm_set_bond_type_dev(BD_ADDR bd_addr, tBTM_BOND_TYPE bond_type); void btm_sec_dev_init(void); void btm_sec_dev_free(void); /* Internal functions provided by btm_sec.c ********************************************** *//* ... */ BOOLEAN btm_dev_support_switch (BD_ADDR bd_addr); tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data); tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data); void btm_sec_conn_req (UINT8 *bda, UINT8 *dc); void btm_create_conn_cancel_complete (UINT8 *p); void btm_read_linq_tx_power_complete (UINT8 *p); void btm_sec_init (UINT8 sec_mode); void btm_sec_dev_reset (void); void btm_sec_abort_access_req (BD_ADDR bd_addr); void btm_sec_auth_complete (UINT16 handle, UINT8 status); void btm_sec_encrypt_change (UINT16 handle, UINT8 status, UINT8 encr_enable); void btm_sec_connected (UINT8 *bda, UINT16 handle, UINT8 status, UINT8 enc_mode); tBTM_STATUS btm_sec_disconnect (UINT16 handle, UINT8 reason); void btm_sec_disconnected (UINT16 handle, UINT8 reason); void btm_sec_rmt_name_request_complete (UINT8 *bd_addr, UINT8 *bd_name, UINT8 status); void btm_sec_rmt_host_support_feat_evt (UINT8 *p); void btm_io_capabilities_req (UINT8 *p); void btm_io_capabilities_rsp (UINT8 *p); #if (CLASSIC_BT_INCLUDED == TRUE) void btm_proc_sp_req_evt (tBTM_SP_EVT event, UINT8 *p); void btm_keypress_notif_evt (UINT8 *p); void btm_simple_pair_complete (UINT8 *p);/* ... */ #endif /* (CLASSIC_BT_INCLUDED == TRUE) */ void btm_sec_link_key_notification (UINT8 *p_bda, UINT8 *p_link_key, UINT8 key_type); void btm_sec_link_key_request (UINT8 *p_bda); void btm_sec_pin_code_request (UINT8 *p_bda); void btm_sec_update_clock_offset (UINT16 handle, UINT16 clock_offset); void btm_sec_dev_rec_cback_event (tBTM_SEC_DEV_REC *p_dev_rec, UINT8 res, BOOLEAN is_le_transport); void btm_sec_set_peer_sec_caps (tACL_CONN *p_acl_cb, tBTM_SEC_DEV_REC *p_dev_rec); #if BLE_INCLUDED == TRUE void btm_sec_clear_ble_keys (tBTM_SEC_DEV_REC *p_dev_rec); BOOLEAN btm_sec_find_bonded_dev (UINT8 start_idx, UINT16 *p_found_handle, tBTM_SEC_DEV_REC **p_rec); BOOLEAN btm_sec_is_a_bonded_dev (BD_ADDR bda); void btm_consolidate_dev(tBTM_SEC_DEV_REC *p_target_rec); BOOLEAN btm_sec_is_le_capable_dev (BD_ADDR bda); BOOLEAN btm_ble_init_pseudo_addr (tBTM_SEC_DEV_REC *p_dev_rec, BD_ADDR new_pseudo_addr); extern BOOLEAN btm_ble_start_sec_check(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data);/* ... */ #endif /* BLE_INCLUDED */ extern tBTM_SEC_SERV_REC *btm_sec_find_first_serv (CONNECTION_TYPE conn_type, UINT16 psm); tINQ_DB_ENT *btm_inq_db_new (BD_ADDR p_bda); #if BTM_OOB_INCLUDED == TRUE void btm_rem_oob_req (UINT8 *p); void btm_read_local_oob_complete (UINT8 *p);/* ... */ #else #define btm_rem_oob_req(p) #define btm_read_local_oob_complete(p)/* ... */ #endif void btm_acl_resubmit_page (void); void btm_acl_reset_paging (void); void btm_acl_paging (BT_HDR *p, BD_ADDR dest); UINT8 btm_sec_clr_service_by_psm (UINT16 psm); void btm_sec_clr_temp_auth_service (BD_ADDR bda); void btm_ble_lock_init(void); void btm_ble_sem_init(void); void btm_ble_sem_free(void); void btm_ble_lock_free(void); void btm_sec_handle_remote_legacy_auth_cmp(UINT16 handle); void btm_sec_update_legacy_auth_state(tACL_CONN *p_acl_cb, UINT8 legacy_auth_state); BOOLEAN btm_sec_legacy_authentication_mutual (tBTM_SEC_DEV_REC *p_dev_rec); BOOLEAN btm_find_sec_dev_in_list (void *p_node_data, void *context); BOOLEAN btm_sec_dev_authorization(BD_ADDR bd_addr, BOOLEAN authorized); /* #ifdef __cplusplus } #endif *//* ... */ /* ... */ #endif
Details
Show:
from
Types: Columns:
This file uses the notable symbols shown below. Click anywhere in the file to view more details.