1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef HCI_H 46 #define HCI_H 47 48 #include "btstack_config.h" 49 50 #include "btstack_chipset.h" 51 #include "btstack_control.h" 52 #include "btstack_linked_list.h" 53 #include "btstack_util.h" 54 #include "classic/btstack_link_key_db.h" 55 #include "hci_cmd.h" 56 #include "gap.h" 57 #include "hci_transport.h" 58 #include "btstack_run_loop.h" 59 60 #ifdef ENABLE_BLE 61 #include "ble/att_db.h" 62 #endif 63 64 #include <stdint.h> 65 #include <stdlib.h> 66 #include <stdarg.h> 67 68 #if defined __cplusplus 69 extern "C" { 70 #endif 71 72 // packet buffer sizes 73 #define HCI_CMD_HEADER_SIZE 3 74 #define HCI_ACL_HEADER_SIZE 4 75 #define HCI_SCO_HEADER_SIZE 3 76 #define HCI_EVENT_HEADER_SIZE 2 77 78 #define HCI_EVENT_PAYLOAD_SIZE 255 79 #define HCI_CMD_PAYLOAD_SIZE 255 80 81 // Max HCI Command LE payload size: 82 // 64 from LE Generate DHKey command 83 // 32 from LE Encrypt command 84 #if defined(ENABLE_LE_SECURE_CONNECTIONS) && !defined(ENABLE_MICRO_ECC_FOR_LE_SECURE_CONNECTIONS) 85 #define HCI_CMD_PAYLOAD_SIZE_LE 64 86 #else 87 #define HCI_CMD_PAYLOAD_SIZE_LE 32 88 #endif 89 90 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 91 // addition byte in even to terminate remote name request with '\0' 92 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE + 1) 93 94 #ifdef ENABLE_CLASSIC 95 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 96 #else 97 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE_LE) 98 #endif 99 100 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 101 102 // size of hci incoming buffer, big enough for event or acl packet without H4 packet type 103 #ifdef HCI_INCOMING_PACKET_BUFFER_SIZE 104 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 105 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 106 #endif 107 #if HCI_INCOMING_PACKET_BUFFER_SIZE < HCI_EVENT_BUFFER_SIZE 108 #error HCI_INCOMING_PACKET_BUFFER_SIZE must be equal or larger than HCI_EVENT_BUFFER_SIZE 109 #endif 110 #else 111 #if HCI_ACL_BUFFER_SIZE > HCI_EVENT_BUFFER_SIZE 112 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 113 #else 114 #define HCI_INCOMING_PACKET_BUFFER_SIZE HCI_EVENT_BUFFER_SIZE 115 #endif 116 #endif 117 118 // size of hci outgoing buffer, big enough for command or acl packet without H4 packet type 119 #ifdef HCI_OUTGOING_PACKET_BUFFER_SIZE 120 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 121 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 122 #endif 123 #if HCI_OUTGOING_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 124 #error HCI_OUTGOING_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 125 #endif 126 #else 127 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 128 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 129 #else 130 #define HCI_OUTGOING_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 131 #endif 132 #endif 133 134 // additional pre-buffer space for packets to Bluetooth module, for now, used for HCI Transport H4 DMA 135 #ifndef HCI_OUTGOING_PRE_BUFFER_SIZE 136 #ifdef HAVE_HOST_CONTROLLER_API 137 #define HCI_OUTGOING_PRE_BUFFER_SIZE 0 138 #else 139 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 140 #endif 141 #endif 142 143 // BNEP may uncompress the IP Header by 16 bytes, GATT Client requires two additional bytes for long characteristic reads 144 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 145 #ifdef ENABLE_CLASSIC 146 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 147 #else 148 #define HCI_INCOMING_PRE_BUFFER_SIZE 2 149 #endif 150 #endif 151 152 // 153 #define IS_COMMAND(packet, command) ( little_endian_read_16(packet,0) == command.opcode ) 154 155 // check if command complete event for given command 156 #define HCI_EVENT_IS_COMMAND_COMPLETE(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_COMPLETE) && (little_endian_read_16(event,3) == cmd.opcode) ) 157 #define HCI_EVENT_IS_COMMAND_STATUS(event,cmd) ( (event[0] == HCI_EVENT_COMMAND_STATUS) && (little_endian_read_16(event,4) == cmd.opcode) ) 158 159 // Code+Len=2, Pkts+Opcode=3; total=5 160 #define OFFSET_OF_DATA_IN_COMMAND_COMPLETE 5 161 162 // ACL Packet 163 #define READ_ACL_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 164 #define READ_SCO_CONNECTION_HANDLE( buffer ) ( little_endian_read_16(buffer,0) & 0x0fff) 165 #define READ_ACL_FLAGS( buffer ) ( buffer[1] >> 4 ) 166 #define READ_ACL_LENGTH( buffer ) (little_endian_read_16(buffer, 2)) 167 168 // Sneak peak into L2CAP Packet 169 #define READ_L2CAP_LENGTH(buffer) ( little_endian_read_16(buffer, 4)) 170 #define READ_L2CAP_CHANNEL_ID(buffer) ( little_endian_read_16(buffer, 6)) 171 172 /** 173 * LE connection parameter update state 174 */ 175 176 typedef enum { 177 CON_PARAMETER_UPDATE_NONE, 178 // L2CAP 179 CON_PARAMETER_UPDATE_SEND_REQUEST, 180 CON_PARAMETER_UPDATE_SEND_RESPONSE, 181 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 182 CON_PARAMETER_UPDATE_DENY, 183 // HCI - in respnose to HCI_SUBEVENT_LE_REMOTE_CONNECTION_PARAMETER_REQUEST 184 CON_PARAMETER_UPDATE_REPLY, 185 CON_PARAMETER_UPDATE_NEGATIVE_REPLY, 186 } le_con_parameter_update_state_t; 187 188 // Authentication flags 189 typedef enum { 190 AUTH_FLAGS_NONE = 0x0000, 191 RECV_LINK_KEY_REQUEST = 0x0001, 192 HANDLE_LINK_KEY_REQUEST = 0x0002, 193 SENT_LINK_KEY_REPLY = 0x0004, 194 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 195 RECV_LINK_KEY_NOTIFICATION = 0x0010, 196 DENY_PIN_CODE_REQUEST = 0x0040, 197 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 198 SEND_IO_CAPABILITIES_REPLY = 0x0100, 199 SEND_USER_CONFIRM_REPLY = 0x0200, 200 SEND_USER_PASSKEY_REPLY = 0x0400, 201 202 // pairing status 203 LEGACY_PAIRING_ACTIVE = 0x2000, 204 SSP_PAIRING_ACTIVE = 0x4000, 205 206 // connection status 207 CONNECTION_ENCRYPTED = 0x8000, 208 209 // errands 210 READ_RSSI = 0x10000, 211 WRITE_SUPERVISION_TIMEOUT = 0x20000, 212 213 } hci_authentication_flags_t; 214 215 /** 216 * Connection State 217 */ 218 typedef enum { 219 SEND_CREATE_CONNECTION = 0, 220 SENT_CREATE_CONNECTION, 221 SEND_CANCEL_CONNECTION, 222 SENT_CANCEL_CONNECTION, 223 RECEIVED_CONNECTION_REQUEST, 224 ACCEPTED_CONNECTION_REQUEST, 225 REJECTED_CONNECTION_REQUEST, 226 OPEN, 227 SEND_DISCONNECT, 228 SENT_DISCONNECT, 229 RECEIVED_DISCONNECTION_COMPLETE 230 } CONNECTION_STATE; 231 232 // bonding flags 233 enum { 234 BONDING_REQUEST_REMOTE_FEATURES = 0x01, 235 BONDING_RECEIVED_REMOTE_FEATURES = 0x02, 236 BONDING_REMOTE_SUPPORTS_SSP = 0x04, 237 BONDING_DISCONNECT_SECURITY_BLOCK = 0x08, 238 BONDING_DISCONNECT_DEDICATED_DONE = 0x10, 239 BONDING_SEND_AUTHENTICATE_REQUEST = 0x20, 240 BONDING_SEND_ENCRYPTION_REQUEST = 0x40, 241 BONDING_SEND_READ_ENCRYPTION_KEY_SIZE = 0x80, 242 BONDING_DEDICATED = 0x100, 243 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x200 244 }; 245 246 typedef enum { 247 BLUETOOTH_OFF = 1, 248 BLUETOOTH_ON, 249 BLUETOOTH_ACTIVE 250 } BLUETOOTH_STATE; 251 252 typedef enum { 253 LE_CONNECTING_IDLE, 254 LE_CONNECTING_DIRECT, 255 LE_CONNECTING_WHITELIST, 256 } le_connecting_state_t; 257 258 #ifdef ENABLE_BLE 259 260 // 261 // SM internal types and globals 262 // 263 264 typedef enum { 265 266 // general states 267 SM_GENERAL_IDLE, 268 SM_GENERAL_SEND_PAIRING_FAILED, 269 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 270 271 // Phase 1: Pairing Feature Exchange 272 SM_PH1_W4_USER_RESPONSE, 273 274 // Phase 2: Authenticating and Encrypting 275 276 // get random number for use as TK Passkey if we show it 277 SM_PH2_GET_RANDOM_TK, 278 SM_PH2_W4_RANDOM_TK, 279 280 // get local random number for confirm c1 281 SM_PH2_C1_GET_RANDOM_A, 282 SM_PH2_C1_W4_RANDOM_A, 283 SM_PH2_C1_GET_RANDOM_B, 284 SM_PH2_C1_W4_RANDOM_B, 285 286 // calculate confirm value for local side 287 SM_PH2_C1_GET_ENC_A, 288 SM_PH2_C1_W4_ENC_A, 289 290 // calculate confirm value for remote side 291 SM_PH2_C1_GET_ENC_C, 292 SM_PH2_C1_W4_ENC_C, 293 294 SM_PH2_C1_SEND_PAIRING_CONFIRM, 295 SM_PH2_SEND_PAIRING_RANDOM, 296 297 // calc STK 298 SM_PH2_CALC_STK, 299 SM_PH2_W4_STK, 300 301 SM_PH2_W4_CONNECTION_ENCRYPTED, 302 303 // Phase 3: Transport Specific Key Distribution 304 // calculate DHK, Y, EDIV, and LTK 305 SM_PH3_Y_GET_ENC, 306 SM_PH3_Y_W4_ENC, 307 SM_PH3_LTK_GET_ENC, 308 309 // exchange keys 310 SM_PH3_DISTRIBUTE_KEYS, 311 SM_PH3_RECEIVE_KEYS, 312 313 // RESPONDER ROLE 314 SM_RESPONDER_IDLE, 315 SM_RESPONDER_SEND_SECURITY_REQUEST, 316 SM_RESPONDER_PH0_RECEIVED_LTK_REQUEST, 317 SM_RESPONDER_PH0_RECEIVED_LTK_W4_IRK, 318 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 319 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 320 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 321 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 322 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 323 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 324 SM_RESPONDER_PH2_W4_LTK_REQUEST, 325 SM_RESPONDER_PH2_SEND_LTK_REPLY, 326 327 // Phase 4: re-establish previously distributed LTK 328 SM_RESPONDER_PH4_Y_GET_ENC, 329 SM_RESPONDER_PH4_Y_W4_ENC, 330 SM_RESPONDER_PH4_SEND_LTK_REPLY, 331 332 // INITITIATOR ROLE 333 SM_INITIATOR_CONNECTED, 334 SM_INITIATOR_PH0_HAS_LTK, 335 SM_INITIATOR_PH0_SEND_START_ENCRYPTION, 336 SM_INITIATOR_PH0_W4_CONNECTION_ENCRYPTED, 337 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 338 SM_INITIATOR_PH1_SEND_PAIRING_REQUEST, 339 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 340 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 341 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 342 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 343 344 // LE Secure Connections 345 SM_SC_RECEIVED_LTK_REQUEST, 346 SM_SC_SEND_PUBLIC_KEY_COMMAND, 347 SM_SC_W4_PUBLIC_KEY_COMMAND, 348 SM_SC_W4_LOCAL_NONCE, 349 SM_SC_W2_CMAC_FOR_CONFIRMATION, 350 SM_SC_W4_CMAC_FOR_CONFIRMATION, 351 SM_SC_SEND_CONFIRMATION, 352 SM_SC_W2_CMAC_FOR_CHECK_CONFIRMATION, 353 SM_SC_W4_CMAC_FOR_CHECK_CONFIRMATION, 354 SM_SC_W4_CONFIRMATION, 355 SM_SC_SEND_PAIRING_RANDOM, 356 SM_SC_W4_PAIRING_RANDOM, 357 SM_SC_W2_CALCULATE_G2, 358 SM_SC_W4_CALCULATE_G2, 359 SM_SC_W4_CALCULATE_DHKEY, 360 SM_SC_W2_CALCULATE_F5_SALT, 361 SM_SC_W4_CALCULATE_F5_SALT, 362 SM_SC_W2_CALCULATE_F5_MACKEY, 363 SM_SC_W4_CALCULATE_F5_MACKEY, 364 SM_SC_W2_CALCULATE_F5_LTK, 365 SM_SC_W4_CALCULATE_F5_LTK, 366 SM_SC_W2_CALCULATE_F6_FOR_DHKEY_CHECK, 367 SM_SC_W4_CALCULATE_F6_FOR_DHKEY_CHECK, 368 SM_SC_W2_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 369 SM_SC_W4_CALCULATE_F6_TO_VERIFY_DHKEY_CHECK, 370 SM_SC_W4_USER_RESPONSE, 371 SM_SC_SEND_DHKEY_CHECK_COMMAND, 372 SM_SC_W4_DHKEY_CHECK_COMMAND, 373 SM_SC_W4_LTK_REQUEST_SC, 374 SM_SC_W2_CALCULATE_H6_ILK, 375 SM_SC_W4_CALCULATE_H6_ILK, 376 SM_SC_W2_CALCULATE_H6_BR_EDR_LINK_KEY, 377 SM_SC_W4_CALCULATE_H6_BR_EDR_LINK_KEY, 378 } security_manager_state_t; 379 380 typedef enum { 381 IRK_LOOKUP_IDLE, 382 IRK_LOOKUP_W4_READY, 383 IRK_LOOKUP_STARTED, 384 IRK_LOOKUP_SUCCEEDED, 385 IRK_LOOKUP_FAILED 386 } irk_lookup_state_t; 387 388 typedef uint8_t sm_pairing_packet_t[7]; 389 390 // connection info available as long as connection exists 391 typedef struct sm_connection { 392 hci_con_handle_t sm_handle; 393 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 394 uint8_t sm_security_request_received; 395 uint8_t sm_pairing_requested; 396 uint8_t sm_peer_addr_type; 397 bd_addr_t sm_peer_address; 398 security_manager_state_t sm_engine_state; 399 irk_lookup_state_t sm_irk_lookup_state; 400 uint8_t sm_connection_encrypted; 401 uint8_t sm_connection_authenticated; // [0..1] 402 uint8_t sm_connection_sc; 403 uint8_t sm_actual_encryption_key_size; 404 sm_pairing_packet_t sm_m_preq; // only used during c1 405 authorization_state_t sm_connection_authorization_state; 406 uint16_t sm_local_ediv; 407 uint8_t sm_local_rand[8]; 408 int sm_le_db_index; 409 } sm_connection_t; 410 411 // 412 // ATT Server 413 // 414 415 // max ATT request matches L2CAP PDU -- allow to use smaller buffer 416 #ifndef ATT_REQUEST_BUFFER_SIZE 417 #define ATT_REQUEST_BUFFER_SIZE HCI_ACL_PAYLOAD_SIZE 418 #endif 419 420 typedef enum { 421 ATT_SERVER_IDLE, 422 ATT_SERVER_REQUEST_RECEIVED, 423 ATT_SERVER_W4_SIGNED_WRITE_VALIDATION, 424 ATT_SERVER_REQUEST_RECEIVED_AND_VALIDATED, 425 ATT_SERVER_RESPONSE_PENDING, 426 } att_server_state_t; 427 428 typedef struct { 429 att_server_state_t state; 430 431 uint8_t peer_addr_type; 432 bd_addr_t peer_address; 433 434 int ir_le_device_db_index; 435 uint8_t ir_lookup_active; 436 uint8_t pairing_active; 437 438 int value_indication_handle; 439 btstack_timer_source_t value_indication_timer; 440 441 att_connection_t connection; 442 443 btstack_linked_list_t notification_requests; 444 btstack_linked_list_t indication_requests; 445 446 #ifdef ENABLE_GATT_OVER_CLASSIC 447 uint16_t l2cap_cid; 448 #endif 449 450 uint16_t request_size; 451 uint8_t request_buffer[ATT_REQUEST_BUFFER_SIZE]; 452 453 } att_server_t; 454 455 #endif 456 457 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 458 typedef enum { 459 L2CAP_INFORMATION_STATE_IDLE = 0, 460 L2CAP_INFORMATION_STATE_W2_SEND_EXTENDED_FEATURE_REQUEST, 461 L2CAP_INFORMATION_STATE_W4_EXTENDED_FEATURE_RESPONSE, 462 L2CAP_INFORMATION_STATE_DONE 463 } l2cap_information_state_t; 464 465 typedef struct { 466 l2cap_information_state_t information_state; 467 uint16_t extended_feature_mask; 468 } l2cap_state_t; 469 #endif 470 471 // 472 typedef struct { 473 // linked list - assert: first field 474 btstack_linked_item_t item; 475 476 // remote side 477 bd_addr_t address; 478 479 // module handle 480 hci_con_handle_t con_handle; 481 482 // le public, le random, classic 483 bd_addr_type_t address_type; 484 485 // role: 0 - master, 1 - slave 486 uint8_t role; 487 488 // connection state 489 CONNECTION_STATE state; 490 491 // bonding 492 uint16_t bonding_flags; 493 uint8_t bonding_status; 494 495 // encryption key size (in octets) 496 uint8_t encryption_key_size; 497 498 // requested security level 499 gap_security_level_t requested_security_level; 500 501 // 502 link_key_type_t link_key_type; 503 504 // remote supported features 505 uint8_t remote_supported_feature_eSCO; 506 507 #ifdef ENABLE_CLASSIC 508 // connection mode, default ACL_CONNECTION_MODE_ACTIVE 509 uint8_t connection_mode; 510 511 // enter/exit sniff mode requests 512 uint16_t sniff_min_interval; // 0: idle, 0xffff exit sniff, else enter sniff 513 uint16_t sniff_max_interval; 514 uint16_t sniff_attempt; 515 uint16_t sniff_timeout; 516 517 // track SCO rx event 518 uint32_t sco_rx_ms; 519 uint8_t sco_rx_count; 520 uint8_t sco_rx_valid; 521 522 // generate sco can send now based on received packets, using timeout below 523 uint8_t sco_tx_ready; 524 525 btstack_timer_source_t timeout_sco; 526 #endif /* ENABLE_CLASSIC */ 527 528 // authentication and other errands 529 uint32_t authentication_flags; 530 531 btstack_timer_source_t timeout; 532 533 // timeout in system ticks (HAVE_EMBEDDED_TICK) or milliseconds (HAVE_EMBEDDED_TIME_MS) 534 uint32_t timestamp; 535 536 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 537 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 538 uint16_t acl_recombination_pos; 539 uint16_t acl_recombination_length; 540 541 542 // number packets sent to controller 543 uint8_t num_packets_sent; 544 545 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 546 uint8_t num_packets_completed; 547 #endif 548 549 // LE Connection parameter update 550 le_con_parameter_update_state_t le_con_parameter_update_state; 551 uint8_t le_con_param_update_identifier; 552 uint16_t le_conn_interval_min; 553 uint16_t le_conn_interval_max; 554 uint16_t le_conn_latency; 555 uint16_t le_supervision_timeout; 556 557 #ifdef ENABLE_BLE 558 uint16_t le_connection_interval; 559 560 // LE PHY Update via set phy command 561 uint8_t le_phy_update_all_phys; // 0xff for idle 562 uint8_t le_phy_update_tx_phys; 563 uint8_t le_phy_update_rx_phys; 564 int8_t le_phy_update_phy_options; 565 566 // LE Security Manager 567 sm_connection_t sm_connection; 568 569 #ifdef ENABLE_LE_LIMIT_ACL_FRAGMENT_BY_MAX_OCTETS 570 uint16_t le_max_tx_octets; 571 #endif 572 573 // ATT Server 574 att_server_t att_server; 575 #endif 576 577 #ifdef ENABLE_L2CAP_ENHANCED_RETRANSMISSION_MODE 578 l2cap_state_t l2cap_state; 579 #endif 580 581 } hci_connection_t; 582 583 584 /** 585 * HCI Inititizlization State Machine 586 */ 587 typedef enum hci_init_state{ 588 HCI_INIT_SEND_RESET = 0, 589 HCI_INIT_W4_SEND_RESET, 590 HCI_INIT_SEND_READ_LOCAL_VERSION_INFORMATION, 591 HCI_INIT_W4_SEND_READ_LOCAL_VERSION_INFORMATION, 592 HCI_INIT_SEND_READ_LOCAL_NAME, 593 HCI_INIT_W4_SEND_READ_LOCAL_NAME, 594 595 HCI_INIT_SEND_BAUD_CHANGE, 596 HCI_INIT_W4_SEND_BAUD_CHANGE, 597 HCI_INIT_CUSTOM_INIT, 598 HCI_INIT_W4_CUSTOM_INIT, 599 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 600 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 601 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT_LINK_RESET, 602 HCI_INIT_W4_CUSTOM_INIT_BCM_DELAY, 603 604 HCI_INIT_READ_LOCAL_SUPPORTED_COMMANDS, 605 HCI_INIT_W4_READ_LOCAL_SUPPORTED_COMMANDS, 606 607 HCI_INIT_SEND_BAUD_CHANGE_BCM, 608 HCI_INIT_W4_SEND_BAUD_CHANGE_BCM, 609 610 HCI_INIT_SET_BD_ADDR, 611 HCI_INIT_W4_SET_BD_ADDR, 612 613 HCI_INIT_SEND_RESET_ST_WARM_BOOT, 614 HCI_INIT_W4_SEND_RESET_ST_WARM_BOOT, 615 616 HCI_INIT_READ_BD_ADDR, 617 HCI_INIT_W4_READ_BD_ADDR, 618 619 HCI_INIT_READ_BUFFER_SIZE, 620 HCI_INIT_W4_READ_BUFFER_SIZE, 621 HCI_INIT_READ_LOCAL_SUPPORTED_FEATURES, 622 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATURES, 623 624 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 625 HCI_INIT_HOST_BUFFER_SIZE, 626 HCI_INIT_W4_HOST_BUFFER_SIZE, 627 HCI_INIT_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 628 HCI_INIT_W4_SET_CONTROLLER_TO_HOST_FLOW_CONTROL, 629 #endif 630 631 HCI_INIT_SET_EVENT_MASK, 632 HCI_INIT_W4_SET_EVENT_MASK, 633 634 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 635 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 636 HCI_INIT_WRITE_PAGE_TIMEOUT, 637 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 638 HCI_INIT_WRITE_DEFAULT_LINK_POLICY_SETTING, 639 HCI_INIT_W4_WRITE_DEFAULT_LINK_POLICY_SETTING, 640 HCI_INIT_WRITE_CLASS_OF_DEVICE, 641 HCI_INIT_W4_WRITE_CLASS_OF_DEVICE, 642 HCI_INIT_WRITE_LOCAL_NAME, 643 HCI_INIT_W4_WRITE_LOCAL_NAME, 644 HCI_INIT_WRITE_EIR_DATA, 645 HCI_INIT_W4_WRITE_EIR_DATA, 646 HCI_INIT_WRITE_INQUIRY_MODE, 647 HCI_INIT_W4_WRITE_INQUIRY_MODE, 648 HCI_INIT_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 649 HCI_INIT_W4_WRITE_SECURE_CONNECTIONS_HOST_ENABLE, 650 HCI_INIT_WRITE_SCAN_ENABLE, 651 HCI_INIT_W4_WRITE_SCAN_ENABLE, 652 653 // SCO over HCI 654 HCI_INIT_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 655 HCI_INIT_W4_WRITE_SYNCHRONOUS_FLOW_CONTROL_ENABLE, 656 HCI_INIT_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 657 HCI_INIT_W4_WRITE_DEFAULT_ERRONEOUS_DATA_REPORTING, 658 659 // SCO over HCI Broadcom 660 HCI_INIT_BCM_WRITE_SCO_PCM_INT, 661 HCI_INIT_W4_BCM_WRITE_SCO_PCM_INT, 662 663 #ifdef ENABLE_BLE 664 HCI_INIT_LE_READ_BUFFER_SIZE, 665 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 666 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 667 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 668 HCI_INIT_LE_SET_EVENT_MASK, 669 HCI_INIT_W4_LE_SET_EVENT_MASK, 670 #endif 671 672 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 673 HCI_INIT_LE_READ_MAX_DATA_LENGTH, 674 HCI_INIT_W4_LE_READ_MAX_DATA_LENGTH, 675 HCI_INIT_LE_WRITE_SUGGESTED_DATA_LENGTH, 676 HCI_INIT_W4_LE_WRITE_SUGGESTED_DATA_LENGTH, 677 #endif 678 679 #ifdef ENABLE_LE_CENTRAL 680 HCI_INIT_READ_WHITE_LIST_SIZE, 681 HCI_INIT_W4_READ_WHITE_LIST_SIZE, 682 683 HCI_INIT_LE_SET_SCAN_PARAMETERS, 684 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 685 #endif 686 687 HCI_INIT_DONE, 688 689 HCI_FALLING_ASLEEP_DISCONNECT, 690 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 691 HCI_FALLING_ASLEEP_COMPLETE, 692 693 HCI_INIT_AFTER_SLEEP, 694 695 HCI_HALTING_DISCONNECT_ALL_NO_TIMER, 696 HCI_HALTING_DISCONNECT_ALL_TIMER, 697 HCI_HALTING_W4_TIMER, 698 HCI_HALTING_CLOSE, 699 700 } hci_substate_t; 701 702 enum { 703 LE_ADVERTISEMENT_TASKS_DISABLE = 1 << 0, 704 LE_ADVERTISEMENT_TASKS_SET_ADV_DATA = 1 << 1, 705 LE_ADVERTISEMENT_TASKS_SET_SCAN_DATA = 1 << 2, 706 LE_ADVERTISEMENT_TASKS_SET_PARAMS = 1 << 3, 707 LE_ADVERTISEMENT_TASKS_ENABLE = 1 << 4, 708 }; 709 710 enum { 711 LE_WHITELIST_ON_CONTROLLER = 1 << 0, 712 LE_WHITELIST_ADD_TO_CONTROLLER = 1 << 1, 713 LE_WHITELIST_REMOVE_FROM_CONTROLLER = 1 << 2, 714 }; 715 716 typedef struct { 717 btstack_linked_item_t item; 718 bd_addr_t address; 719 bd_addr_type_t address_type; 720 uint8_t state; 721 } whitelist_entry_t; 722 723 /** 724 * main data structure 725 */ 726 typedef struct { 727 // transport component with configuration 728 const hci_transport_t * hci_transport; 729 const void * config; 730 731 // chipset driver 732 const btstack_chipset_t * chipset; 733 734 // hardware power controller 735 const btstack_control_t * control; 736 737 /* link key db */ 738 const btstack_link_key_db_t * link_key_db; 739 740 // list of existing baseband connections 741 btstack_linked_list_t connections; 742 743 /* callback to L2CAP layer */ 744 btstack_packet_handler_t acl_packet_handler; 745 746 /* callback for SCO data */ 747 btstack_packet_handler_t sco_packet_handler; 748 749 /* callbacks for events */ 750 btstack_linked_list_t event_handlers; 751 752 #ifdef ENABLE_CLASSIC 753 /* callback for reject classic connection */ 754 int (*gap_classic_accept_callback)(bd_addr_t addr); 755 #endif 756 757 // hardware error callback 758 void (*hardware_error_callback)(uint8_t error); 759 760 // basic configuration 761 const char * local_name; 762 const uint8_t * eir_data; 763 uint32_t class_of_device; 764 bd_addr_t local_bd_addr; 765 uint8_t default_link_policy_settings; 766 uint8_t allow_role_switch; 767 uint8_t ssp_enable; 768 uint8_t ssp_io_capability; 769 uint8_t ssp_authentication_requirement; 770 uint8_t ssp_auto_accept; 771 bool secure_connections_enable; 772 inquiry_mode_t inquiry_mode; 773 #ifdef ENABLE_CLASSIC 774 // Errata-11838 mandates 7 bytes for GAP Security Level 1-3, we use 16 as default 775 uint8_t gap_required_encyrption_key_size; 776 uint16_t link_supervision_timeout; 777 gap_security_level_t gap_security_level; 778 #endif 779 780 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 781 uint8_t * hci_packet_buffer; 782 uint8_t hci_packet_buffer_data[HCI_OUTGOING_PRE_BUFFER_SIZE + HCI_OUTGOING_PACKET_BUFFER_SIZE]; 783 uint8_t hci_packet_buffer_reserved; 784 uint16_t acl_fragmentation_pos; 785 uint16_t acl_fragmentation_total_size; 786 uint8_t acl_fragmentation_tx_active; 787 788 /* host to controller flow control */ 789 uint8_t num_cmd_packets; 790 uint8_t acl_packets_total_num; 791 uint16_t acl_data_packet_length; 792 uint8_t sco_packets_total_num; 793 uint8_t sco_data_packet_length; 794 uint8_t synchronous_flow_control_enabled; 795 uint8_t le_acl_packets_total_num; 796 uint16_t le_data_packets_length; 797 uint8_t sco_waiting_for_can_send_now; 798 uint8_t sco_can_send_now; 799 800 /* local supported features */ 801 uint8_t local_supported_features[8]; 802 803 /* local supported commands summary - complete info is 64 bytes */ 804 /* 0 - Read Buffer Size (Octet 14/bit 7) */ 805 /* 1 - Write Le Host Supported (Octet 24/bit 6) */ 806 /* 2 - Write Synchronous Flow Control Enable (Octet 10/bit 4) */ 807 /* 3 - Write Default Erroneous Data Reporting (Octet 18/bit 3) */ 808 /* 4 - LE Write Suggested Default Data Length (Octet 34/bit 0) */ 809 /* 5 - LE Read Maximum Data Length (Octet 35/bit 3) */ 810 /* 6 - LE Set Default PHY (Octet 35/bit 5) */ 811 /* 7 - Read Encryption Key Size (Octet 20/bit 4) */ 812 /* 8 - Read Remote Extended Features (Octet 2/bit 5) */ 813 /* 9 - Write Secure Connections Host (Octet 32/bit 3) */ 814 uint8_t local_supported_commands[2]; 815 816 /* bluetooth device information from hci read local version information */ 817 // uint16_t hci_version; 818 // uint16_t hci_revision; 819 // uint16_t lmp_version; 820 uint16_t manufacturer; 821 // uint16_t lmp_subversion; 822 823 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 824 uint16_t packet_types; 825 826 827 /* hci state machine */ 828 HCI_STATE state; 829 hci_substate_t substate; 830 btstack_timer_source_t timeout; 831 btstack_chipset_result_t chipset_result; 832 833 uint16_t last_cmd_opcode; 834 835 uint8_t cmds_ready; 836 837 /* buffer for scan enable cmd - 0xff no change */ 838 uint8_t new_scan_enable_value; 839 840 uint8_t discoverable; 841 uint8_t connectable; 842 uint8_t bondable; 843 844 uint8_t inquiry_state; // see hci.c for state defines 845 846 bd_addr_t remote_name_addr; 847 uint16_t remote_name_clock_offset; 848 uint8_t remote_name_page_scan_repetition_mode; 849 uint8_t remote_name_state; // see hci.c for state defines 850 851 bd_addr_t gap_pairing_addr; 852 uint8_t gap_pairing_state; // see hci.c for state defines 853 union { 854 const char * gap_pairing_pin; 855 uint32_t gap_pairing_passkey; 856 } gap_pairing_input; 857 858 uint16_t sco_voice_setting; 859 uint16_t sco_voice_setting_active; 860 861 uint8_t loopback_mode; 862 863 // buffer for single connection decline 864 uint8_t decline_reason; 865 bd_addr_t decline_addr; 866 867 #ifdef ENABLE_HCI_CONTROLLER_TO_HOST_FLOW_CONTROL 868 uint8_t host_completed_packets; 869 #endif 870 871 #ifdef ENABLE_BLE 872 uint8_t le_own_addr_type; 873 bd_addr_t le_random_address; 874 uint8_t le_random_address_set; 875 #endif 876 877 #ifdef ENABLE_LE_CENTRAL 878 uint8_t le_scanning_enabled; 879 uint8_t le_scanning_active; 880 881 le_connecting_state_t le_connecting_state; 882 883 // buffer for le scan type command - 0xff not set 884 uint8_t le_scan_type; 885 uint16_t le_scan_interval; 886 uint16_t le_scan_window; 887 888 // LE Whitelist Management 889 uint8_t le_whitelist_capacity; 890 btstack_linked_list_t le_whitelist; 891 892 // Connection parameters 893 uint16_t le_connection_interval_min; 894 uint16_t le_connection_interval_max; 895 uint16_t le_connection_latency; 896 uint16_t le_supervision_timeout; 897 uint16_t le_minimum_ce_length; 898 uint16_t le_maximum_ce_length; 899 uint16_t le_connection_scan_interval; 900 uint16_t le_connection_scan_window; 901 #endif 902 903 le_connection_parameter_range_t le_connection_parameter_range; 904 905 #ifdef ENABLE_LE_PERIPHERAL 906 uint8_t * le_advertisements_data; 907 uint8_t le_advertisements_data_len; 908 909 uint8_t * le_scan_response_data; 910 uint8_t le_scan_response_data_len; 911 912 uint8_t le_advertisements_active; 913 uint8_t le_advertisements_enabled; 914 uint8_t le_advertisements_todo; 915 916 uint16_t le_advertisements_interval_min; 917 uint16_t le_advertisements_interval_max; 918 uint8_t le_advertisements_type; 919 uint8_t le_advertisements_direct_address_type; 920 uint8_t le_advertisements_channel_map; 921 uint8_t le_advertisements_filter_policy; 922 bd_addr_t le_advertisements_direct_address; 923 924 uint8_t le_max_number_peripheral_connections; 925 #endif 926 927 #ifdef ENABLE_LE_DATA_LENGTH_EXTENSION 928 // LE Data Length 929 uint16_t le_supported_max_tx_octets; 930 uint16_t le_supported_max_tx_time; 931 #endif 932 933 // custom BD ADDR 934 bd_addr_t custom_bd_addr; 935 uint8_t custom_bd_addr_set; 936 937 #ifdef ENABLE_CLASSIC 938 uint8_t master_slave_policy; 939 #endif 940 941 // address and address_type of active create connection command (ACL, SCO, LE) 942 bd_addr_t outgoing_addr; 943 bd_addr_type_t outgoing_addr_type; 944 } hci_stack_t; 945 946 947 /* API_START */ 948 949 950 // HCI init and configuration 951 952 953 /** 954 * @brief Set up HCI. Needs to be called before any other function. 955 */ 956 void hci_init(const hci_transport_t *transport, const void *config); 957 958 /** 959 * @brief Configure Bluetooth chipset driver. Has to be called before power on, or right after receiving the local version information. 960 */ 961 void hci_set_chipset(const btstack_chipset_t *chipset_driver); 962 963 /** 964 * @brief Configure Bluetooth hardware control. Has to be called before power on. 965 */ 966 void hci_set_control(const btstack_control_t *hardware_control); 967 968 /** 969 * @brief Configure Bluetooth hardware control. Has to be called before power on. 970 */ 971 void hci_set_link_key_db(btstack_link_key_db_t const * link_key_db); 972 973 /** 974 * @brief Set callback for Bluetooth Hardware Error 975 */ 976 void hci_set_hardware_error_callback(void (*fn)(uint8_t error)); 977 978 /** 979 * @brief Set Public BD ADDR - passed on to Bluetooth chipset during init if supported in bt_control_h 980 */ 981 void hci_set_bd_addr(bd_addr_t addr); 982 983 /** 984 * @brief Configure Voice Setting for use with SCO data in HSP/HFP 985 */ 986 void hci_set_sco_voice_setting(uint16_t voice_setting); 987 988 /** 989 * @brief Get SCO Voice Setting 990 * @return current voice setting 991 */ 992 uint16_t hci_get_sco_voice_setting(void); 993 994 /** 995 * @brief Set inquiry mode: standard, with RSSI, with RSSI + Extended Inquiry Results. Has to be called before power on. 996 * @param inquriy_mode see bluetooth_defines.h 997 */ 998 void hci_set_inquiry_mode(inquiry_mode_t mode); 999 1000 /** 1001 * @brief Requests the change of BTstack power mode. 1002 */ 1003 int hci_power_control(HCI_POWER_MODE mode); 1004 1005 /** 1006 * @brief Shutdown HCI 1007 */ 1008 void hci_close(void); 1009 1010 1011 // Callback registration 1012 1013 1014 /** 1015 * @brief Add event packet handler. 1016 */ 1017 void hci_add_event_handler(btstack_packet_callback_registration_t * callback_handler); 1018 1019 /** 1020 * @brief Registers a packet handler for ACL data. Used by L2CAP 1021 */ 1022 void hci_register_acl_packet_handler(btstack_packet_handler_t handler); 1023 1024 /** 1025 * @brief Registers a packet handler for SCO data. Used for HSP and HFP profiles. 1026 */ 1027 void hci_register_sco_packet_handler(btstack_packet_handler_t handler); 1028 1029 1030 // Sending HCI Commands 1031 1032 /** 1033 * @brief Check if CMD packet can be sent to controller 1034 */ 1035 int hci_can_send_command_packet_now(void); 1036 1037 /** 1038 * @brief Creates and sends HCI command packets based on a template and a list of parameters. Will return error if outgoing data buffer is occupied. 1039 */ 1040 int hci_send_cmd(const hci_cmd_t *cmd, ...); 1041 1042 1043 // Sending SCO Packets 1044 1045 /** @brief Get SCO packet length for current SCO Voice setting 1046 * @note Using SCO packets of the exact length is required for USB transfer 1047 * @return Length of SCO packets in bytes (not audio frames) incl. 3 byte header 1048 */ 1049 int hci_get_sco_packet_length(void); 1050 1051 /** 1052 * @brief Request emission of HCI_EVENT_SCO_CAN_SEND_NOW as soon as possible 1053 * @note HCI_EVENT_SCO_CAN_SEND_NOW might be emitted during call to this function 1054 * so packet handler should be ready to handle it 1055 */ 1056 void hci_request_sco_can_send_now_event(void); 1057 1058 /** 1059 * @brief Check HCI packet buffer and if SCO packet can be sent to controller 1060 */ 1061 int hci_can_send_sco_packet_now(void); 1062 1063 /** 1064 * @brief Check if SCO packet can be sent to controller 1065 */ 1066 int hci_can_send_prepared_sco_packet_now(void); 1067 1068 /** 1069 * @brief Send SCO packet prepared in HCI packet buffer 1070 */ 1071 int hci_send_sco_packet_buffer(int size); 1072 1073 1074 // Outgoing packet buffer, also used for SCO packets 1075 // see hci_can_send_prepared_sco_packet_now amn hci_send_sco_packet_buffer 1076 1077 /** 1078 * Reserves outgoing packet buffer. 1079 * @return 1 on success 1080 */ 1081 int hci_reserve_packet_buffer(void); 1082 1083 /** 1084 * Get pointer for outgoing packet buffer 1085 */ 1086 uint8_t* hci_get_outgoing_packet_buffer(void); 1087 1088 /** 1089 * Release outgoing packet buffer\ 1090 * @note only called instead of hci_send_preparared 1091 */ 1092 void hci_release_packet_buffer(void); 1093 1094 /** 1095 * @brief Sets the master/slave policy 1096 * @param policy (0: attempt to become master, 1: let connecting device decide) 1097 */ 1098 void hci_set_master_slave_policy(uint8_t policy); 1099 1100 /* API_END */ 1101 1102 1103 /** 1104 * va_list version of hci_send_cmd, call hci_send_cmd_packet 1105 */ 1106 int hci_send_cmd_va_arg(const hci_cmd_t *cmd, va_list argtr); 1107 1108 /** 1109 * Get connection iterator. Only used by l2cap.c and sm.c 1110 */ 1111 void hci_connections_get_iterator(btstack_linked_list_iterator_t *it); 1112 1113 /** 1114 * Get internal hci_connection_t for given handle. Used by L2CAP, SM, daemon 1115 */ 1116 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 1117 1118 /** 1119 * Get internal hci_connection_t for given Bluetooth addres. Called by L2CAP 1120 */ 1121 hci_connection_t * hci_connection_for_bd_addr_and_type(bd_addr_t addr, bd_addr_type_t addr_type); 1122 1123 /** 1124 * Check if outgoing packet buffer is reserved. Used for internal checks in l2cap.c 1125 */ 1126 int hci_is_packet_buffer_reserved(void); 1127 1128 /** 1129 * Check hci packet buffer is free and a classic acl packet can be sent to controller 1130 */ 1131 int hci_can_send_acl_classic_packet_now(void); 1132 1133 /** 1134 * Check hci packet buffer is free and an LE acl packet can be sent to controller 1135 */ 1136 int hci_can_send_acl_le_packet_now(void); 1137 1138 /** 1139 * Check hci packet buffer is free and an acl packet for the given handle can be sent to controller 1140 */ 1141 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 1142 1143 /** 1144 * Check if acl packet for the given handle can be sent to controller 1145 */ 1146 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 1147 1148 /** 1149 * Send acl packet prepared in hci packet buffer 1150 */ 1151 int hci_send_acl_packet_buffer(int size); 1152 1153 /** 1154 * Check if authentication is active. It delays automatic disconnect while no L2CAP connection 1155 * Called by l2cap. 1156 */ 1157 int hci_authentication_active_for_handle(hci_con_handle_t handle); 1158 1159 /** 1160 * Get maximal ACL Classic data packet length based on used buffer size. Called by L2CAP 1161 */ 1162 uint16_t hci_max_acl_data_packet_length(void); 1163 1164 /** 1165 * Get supported packet types. Called by L2CAP 1166 */ 1167 uint16_t hci_usable_acl_packet_types(void); 1168 1169 /** 1170 * Check if ACL packets marked as non flushable can be sent. Called by L2CAP 1171 */ 1172 int hci_non_flushable_packet_boundary_flag_supported(void); 1173 1174 /** 1175 * Check if extended SCO Link is supported 1176 */ 1177 int hci_extended_sco_link_supported(void); 1178 1179 /** 1180 * Check if SSP is supported on both sides. Called by L2CAP 1181 */ 1182 int gap_ssp_supported_on_both_sides(hci_con_handle_t handle); 1183 1184 /** 1185 * Disconn because of security block. Called by L2CAP 1186 */ 1187 void hci_disconnect_security_block(hci_con_handle_t con_handle); 1188 1189 /** 1190 * Query if remote side supports eSCO 1191 */ 1192 int hci_remote_esco_supported(hci_con_handle_t con_handle); 1193 1194 /** 1195 * Emit current HCI state. Called by daemon 1196 */ 1197 void hci_emit_state(void); 1198 1199 /** 1200 * Send complete CMD packet. Called by daemon and hci_send_cmd_va_arg 1201 * @returns 0 if command was successfully sent to HCI Transport layer 1202 */ 1203 int hci_send_cmd_packet(uint8_t *packet, int size); 1204 1205 /** 1206 * Disconnect all HCI connections. Called by daemon 1207 */ 1208 void hci_disconnect_all(void); 1209 1210 /** 1211 * Get number of free acl slots for packets of given handle. Called by daemon 1212 */ 1213 int hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 1214 1215 /** 1216 * @brief Set Advertisement Parameters 1217 * @param adv_int_min 1218 * @param adv_int_max 1219 * @param adv_type 1220 * @param direct_address_type 1221 * @param direct_address 1222 * @param channel_map 1223 * @param filter_policy 1224 * 1225 * @note internal use. use gap_advertisements_set_params from gap.h instead. 1226 */ 1227 void hci_le_advertisements_set_params(uint16_t adv_int_min, uint16_t adv_int_max, uint8_t adv_type, 1228 uint8_t direct_address_typ, bd_addr_t direct_address, uint8_t channel_map, uint8_t filter_policy); 1229 1230 /** 1231 * 1232 * @note internal use. use gap_random_address_set_mode from gap.h instead. 1233 */ 1234 void hci_le_set_own_address_type(uint8_t own_address_type); 1235 1236 /** 1237 * @brief Get Manufactured 1238 * @return manufacturer id 1239 */ 1240 uint16_t hci_get_manufacturer(void); 1241 1242 /** 1243 * Defer halt. Used by btstack_crypto to allow current HCI operation to complete 1244 */ 1245 void hci_halting_defer(void); 1246 1247 // Only for PTS testing 1248 1249 /** 1250 * Disable automatic L2CAP disconnect if no L2CAP connection is established 1251 */ 1252 void hci_disable_l2cap_timeout_check(void); 1253 1254 /** 1255 * Get Classic Allow Role Switch param 1256 */ 1257 uint8_t hci_get_allow_role_switch(void); 1258 1259 /** 1260 * Get state 1261 */ 1262 HCI_STATE hci_get_state(void); 1263 1264 // setup test connections, used for fuzzing 1265 void hci_setup_test_connections_fuzz(void); 1266 1267 // free all connections, used for fuzzing 1268 void hci_free_connections_fuzz(void); 1269 1270 // simulate stack bootup 1271 void hci_simulate_working_fuzz(void); 1272 1273 #if defined __cplusplus 1274 } 1275 #endif 1276 1277 #endif // HCI_H 1278